pulumi-vault 6.3.0a1723109142__py3-none-any.whl → 6.3.1a1728636480__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +19 -4
- pulumi_vault/ad/secret_backend.py +5 -0
- pulumi_vault/ad/secret_library.py +5 -0
- pulumi_vault/ad/secret_role.py +5 -0
- pulumi_vault/alicloud/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_login.py +5 -0
- pulumi_vault/approle/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
- pulumi_vault/audit.py +5 -0
- pulumi_vault/audit_request_header.py +5 -0
- pulumi_vault/auth_backend.py +10 -5
- pulumi_vault/aws/auth_backend_cert.py +5 -0
- pulumi_vault/aws/auth_backend_client.py +5 -0
- pulumi_vault/aws/auth_backend_config_identity.py +5 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
- pulumi_vault/aws/auth_backend_login.py +12 -7
- pulumi_vault/aws/auth_backend_role.py +5 -0
- pulumi_vault/aws/auth_backend_role_tag.py +5 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
- pulumi_vault/aws/auth_backend_sts_role.py +5 -0
- pulumi_vault/aws/get_access_credentials.py +31 -4
- pulumi_vault/aws/get_static_access_credentials.py +18 -4
- pulumi_vault/aws/secret_backend.py +5 -0
- pulumi_vault/aws/secret_backend_role.py +5 -0
- pulumi_vault/aws/secret_backend_static_role.py +5 -0
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +5 -0
- pulumi_vault/azure/auth_backend_role.py +5 -0
- pulumi_vault/azure/backend.py +5 -0
- pulumi_vault/azure/backend_role.py +23 -18
- pulumi_vault/azure/get_access_credentials.py +36 -4
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +5 -0
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +21 -0
- pulumi_vault/config/outputs.py +5 -0
- pulumi_vault/config/ui_custom_message.py +24 -19
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +5 -0
- pulumi_vault/consul/secret_backend_role.py +5 -0
- pulumi_vault/database/_inputs.py +2091 -140
- pulumi_vault/database/outputs.py +59 -54
- pulumi_vault/database/secret_backend_connection.py +115 -110
- pulumi_vault/database/secret_backend_role.py +25 -20
- pulumi_vault/database/secret_backend_static_role.py +11 -6
- pulumi_vault/database/secrets_mount.py +139 -134
- pulumi_vault/egp_policy.py +5 -0
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +15 -10
- pulumi_vault/gcp/auth_backend_role.py +5 -0
- pulumi_vault/gcp/get_auth_backend_role.py +42 -4
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +5 -0
- pulumi_vault/gcp/secret_impersonated_account.py +5 -0
- pulumi_vault/gcp/secret_roleset.py +18 -13
- pulumi_vault/gcp/secret_static_account.py +18 -13
- pulumi_vault/generic/endpoint.py +5 -0
- pulumi_vault/generic/get_secret.py +25 -5
- pulumi_vault/generic/secret.py +12 -7
- pulumi_vault/get_auth_backend.py +21 -4
- pulumi_vault/get_auth_backends.py +16 -4
- pulumi_vault/get_namespace.py +18 -5
- pulumi_vault/get_namespaces.py +13 -4
- pulumi_vault/get_nomad_access_token.py +28 -8
- pulumi_vault/get_policy_document.py +27 -16
- pulumi_vault/get_raft_autopilot_state.py +26 -7
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +10 -5
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +5 -0
- pulumi_vault/github/user.py +5 -0
- pulumi_vault/identity/entity.py +5 -0
- pulumi_vault/identity/entity_alias.py +5 -0
- pulumi_vault/identity/entity_policies.py +5 -0
- pulumi_vault/identity/get_entity.py +35 -5
- pulumi_vault/identity/get_group.py +42 -6
- pulumi_vault/identity/get_oidc_client_creds.py +16 -4
- pulumi_vault/identity/get_oidc_openid_config.py +26 -4
- pulumi_vault/identity/get_oidc_public_keys.py +16 -5
- pulumi_vault/identity/group.py +5 -0
- pulumi_vault/identity/group_alias.py +5 -0
- pulumi_vault/identity/group_member_entity_ids.py +5 -0
- pulumi_vault/identity/group_member_group_ids.py +5 -0
- pulumi_vault/identity/group_policies.py +5 -0
- pulumi_vault/identity/mfa_duo.py +5 -0
- pulumi_vault/identity/mfa_login_enforcement.py +5 -0
- pulumi_vault/identity/mfa_okta.py +5 -0
- pulumi_vault/identity/mfa_pingid.py +5 -0
- pulumi_vault/identity/mfa_totp.py +5 -0
- pulumi_vault/identity/oidc.py +5 -0
- pulumi_vault/identity/oidc_assignment.py +5 -0
- pulumi_vault/identity/oidc_client.py +5 -0
- pulumi_vault/identity/oidc_key.py +5 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
- pulumi_vault/identity/oidc_provider.py +5 -0
- pulumi_vault/identity/oidc_role.py +5 -0
- pulumi_vault/identity/oidc_scope.py +5 -0
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +14 -9
- pulumi_vault/jwt/auth_backend_role.py +33 -28
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +5 -0
- pulumi_vault/kmip/secret_role.py +5 -0
- pulumi_vault/kmip/secret_scope.py +5 -0
- pulumi_vault/kubernetes/auth_backend_config.py +5 -0
- pulumi_vault/kubernetes/auth_backend_role.py +5 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
- pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
- pulumi_vault/kubernetes/get_service_account_token.py +28 -4
- pulumi_vault/kubernetes/secret_backend.py +19 -14
- pulumi_vault/kubernetes/secret_backend_role.py +5 -0
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +20 -5
- pulumi_vault/kv/get_secret_subkeys_v2.py +24 -5
- pulumi_vault/kv/get_secret_v2.py +27 -6
- pulumi_vault/kv/get_secrets_list.py +15 -4
- pulumi_vault/kv/get_secrets_list_v2.py +18 -4
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +12 -7
- pulumi_vault/kv/secret_backend_v2.py +5 -0
- pulumi_vault/kv/secret_v2.py +46 -41
- pulumi_vault/ldap/auth_backend.py +5 -0
- pulumi_vault/ldap/auth_backend_group.py +5 -0
- pulumi_vault/ldap/auth_backend_user.py +5 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
- pulumi_vault/ldap/get_static_credentials.py +23 -4
- pulumi_vault/ldap/secret_backend.py +19 -14
- pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
- pulumi_vault/ldap/secret_backend_library_set.py +5 -0
- pulumi_vault/ldap/secret_backend_static_role.py +5 -0
- pulumi_vault/managed/_inputs.py +205 -0
- pulumi_vault/managed/keys.py +20 -15
- pulumi_vault/managed/outputs.py +5 -0
- pulumi_vault/mfa_duo.py +5 -0
- pulumi_vault/mfa_okta.py +5 -0
- pulumi_vault/mfa_pingid.py +5 -0
- pulumi_vault/mfa_totp.py +5 -0
- pulumi_vault/mongodbatlas/secret_backend.py +5 -0
- pulumi_vault/mongodbatlas/secret_role.py +5 -0
- pulumi_vault/mount.py +21 -16
- pulumi_vault/namespace.py +19 -14
- pulumi_vault/nomad_secret_backend.py +5 -0
- pulumi_vault/nomad_secret_role.py +5 -0
- pulumi_vault/okta/_inputs.py +39 -0
- pulumi_vault/okta/auth_backend.py +31 -26
- pulumi_vault/okta/auth_backend_group.py +5 -0
- pulumi_vault/okta/auth_backend_user.py +5 -0
- pulumi_vault/okta/outputs.py +5 -0
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +5 -0
- pulumi_vault/pkisecret/_inputs.py +49 -8
- pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
- pulumi_vault/pkisecret/backend_config_est.py +24 -19
- pulumi_vault/pkisecret/get_backend_config_est.py +23 -5
- pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
- pulumi_vault/pkisecret/get_backend_issuers.py +18 -5
- pulumi_vault/pkisecret/get_backend_key.py +19 -4
- pulumi_vault/pkisecret/get_backend_keys.py +18 -5
- pulumi_vault/pkisecret/outputs.py +17 -12
- pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
- pulumi_vault/pkisecret/secret_backend_key.py +5 -0
- pulumi_vault/pkisecret/secret_backend_role.py +10 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
- pulumi_vault/plugin.py +5 -0
- pulumi_vault/plugin_pinned_version.py +5 -0
- pulumi_vault/policy.py +5 -0
- pulumi_vault/provider.py +47 -42
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +5 -0
- pulumi_vault/quota_rate_limit.py +5 -0
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +5 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +43 -38
- pulumi_vault/raft_autopilot.py +5 -0
- pulumi_vault/raft_snapshot_agent_config.py +5 -0
- pulumi_vault/rgp_policy.py +5 -0
- pulumi_vault/saml/auth_backend.py +5 -0
- pulumi_vault/saml/auth_backend_role.py +19 -14
- pulumi_vault/secrets/_inputs.py +30 -0
- pulumi_vault/secrets/outputs.py +5 -0
- pulumi_vault/secrets/sync_association.py +7 -2
- pulumi_vault/secrets/sync_aws_destination.py +19 -14
- pulumi_vault/secrets/sync_azure_destination.py +19 -14
- pulumi_vault/secrets/sync_config.py +5 -0
- pulumi_vault/secrets/sync_gcp_destination.py +19 -14
- pulumi_vault/secrets/sync_gh_destination.py +5 -0
- pulumi_vault/secrets/sync_github_apps.py +5 -0
- pulumi_vault/secrets/sync_vercel_destination.py +5 -0
- pulumi_vault/ssh/_inputs.py +22 -0
- pulumi_vault/ssh/outputs.py +5 -0
- pulumi_vault/ssh/secret_backend_ca.py +5 -0
- pulumi_vault/ssh/secret_backend_role.py +38 -33
- pulumi_vault/terraformcloud/secret_backend.py +5 -0
- pulumi_vault/terraformcloud/secret_creds.py +5 -0
- pulumi_vault/terraformcloud/secret_role.py +5 -0
- pulumi_vault/token.py +5 -0
- pulumi_vault/tokenauth/auth_backend_role.py +5 -14
- pulumi_vault/transform/alphabet.py +5 -0
- pulumi_vault/transform/get_decode.py +38 -14
- pulumi_vault/transform/get_encode.py +38 -14
- pulumi_vault/transform/role.py +5 -0
- pulumi_vault/transform/template.py +19 -14
- pulumi_vault/transform/transformation.py +5 -0
- pulumi_vault/transit/get_decrypt.py +21 -4
- pulumi_vault/transit/get_encrypt.py +23 -4
- pulumi_vault/transit/secret_backend_key.py +12 -7
- pulumi_vault/transit/secret_cache_config.py +5 -0
- {pulumi_vault-6.3.0a1723109142.dist-info → pulumi_vault-6.3.1a1728636480.dist-info}/METADATA +3 -2
- pulumi_vault-6.3.1a1728636480.dist-info/RECORD +256 -0
- {pulumi_vault-6.3.0a1723109142.dist-info → pulumi_vault-6.3.1a1728636480.dist-info}/WHEEL +1 -1
- pulumi_vault-6.3.0a1723109142.dist-info/RECORD +0 -256
- {pulumi_vault-6.3.0a1723109142.dist-info → pulumi_vault-6.3.1a1728636480.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendArgs', 'SecretBackend']
|
@@ -31,7 +36,7 @@ class SecretBackendArgs:
|
|
31
36
|
local: Optional[pulumi.Input[bool]] = None,
|
32
37
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
33
38
|
namespace: Optional[pulumi.Input[str]] = None,
|
34
|
-
options: Optional[pulumi.Input[Mapping[str,
|
39
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
35
40
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
36
41
|
plugin_version: Optional[pulumi.Input[str]] = None,
|
37
42
|
seal_wrap: Optional[pulumi.Input[bool]] = None,
|
@@ -64,7 +69,7 @@ class SecretBackendArgs:
|
|
64
69
|
The value should not contain leading or trailing forward slashes.
|
65
70
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
66
71
|
*Available only for Vault Enterprise*.
|
67
|
-
:param pulumi.Input[Mapping[str,
|
72
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
|
68
73
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
69
74
|
:param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
70
75
|
:param pulumi.Input[bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
@@ -331,14 +336,14 @@ class SecretBackendArgs:
|
|
331
336
|
|
332
337
|
@property
|
333
338
|
@pulumi.getter
|
334
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str,
|
339
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
335
340
|
"""
|
336
341
|
Specifies mount type specific options that are passed to the backend
|
337
342
|
"""
|
338
343
|
return pulumi.get(self, "options")
|
339
344
|
|
340
345
|
@options.setter
|
341
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str,
|
346
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
342
347
|
pulumi.set(self, "options", value)
|
343
348
|
|
344
349
|
@property
|
@@ -412,7 +417,7 @@ class _SecretBackendState:
|
|
412
417
|
local: Optional[pulumi.Input[bool]] = None,
|
413
418
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
414
419
|
namespace: Optional[pulumi.Input[str]] = None,
|
415
|
-
options: Optional[pulumi.Input[Mapping[str,
|
420
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
416
421
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
417
422
|
path: Optional[pulumi.Input[str]] = None,
|
418
423
|
plugin_version: Optional[pulumi.Input[str]] = None,
|
@@ -446,7 +451,7 @@ class _SecretBackendState:
|
|
446
451
|
The value should not contain leading or trailing forward slashes.
|
447
452
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
448
453
|
*Available only for Vault Enterprise*.
|
449
|
-
:param pulumi.Input[Mapping[str,
|
454
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
|
450
455
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
451
456
|
:param pulumi.Input[str] path: Where the secret backend will be mounted
|
452
457
|
:param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
@@ -717,14 +722,14 @@ class _SecretBackendState:
|
|
717
722
|
|
718
723
|
@property
|
719
724
|
@pulumi.getter
|
720
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str,
|
725
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
721
726
|
"""
|
722
727
|
Specifies mount type specific options that are passed to the backend
|
723
728
|
"""
|
724
729
|
return pulumi.get(self, "options")
|
725
730
|
|
726
731
|
@options.setter
|
727
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str,
|
732
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
728
733
|
pulumi.set(self, "options", value)
|
729
734
|
|
730
735
|
@property
|
@@ -811,7 +816,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
811
816
|
local: Optional[pulumi.Input[bool]] = None,
|
812
817
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
813
818
|
namespace: Optional[pulumi.Input[str]] = None,
|
814
|
-
options: Optional[pulumi.Input[Mapping[str,
|
819
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
815
820
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
816
821
|
path: Optional[pulumi.Input[str]] = None,
|
817
822
|
plugin_version: Optional[pulumi.Input[str]] = None,
|
@@ -872,7 +877,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
872
877
|
The value should not contain leading or trailing forward slashes.
|
873
878
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
874
879
|
*Available only for Vault Enterprise*.
|
875
|
-
:param pulumi.Input[Mapping[str,
|
880
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
|
876
881
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
877
882
|
:param pulumi.Input[str] path: Where the secret backend will be mounted
|
878
883
|
:param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
@@ -945,7 +950,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
945
950
|
local: Optional[pulumi.Input[bool]] = None,
|
946
951
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
947
952
|
namespace: Optional[pulumi.Input[str]] = None,
|
948
|
-
options: Optional[pulumi.Input[Mapping[str,
|
953
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
949
954
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
950
955
|
path: Optional[pulumi.Input[str]] = None,
|
951
956
|
plugin_version: Optional[pulumi.Input[str]] = None,
|
@@ -1014,7 +1019,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1014
1019
|
local: Optional[pulumi.Input[bool]] = None,
|
1015
1020
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
1016
1021
|
namespace: Optional[pulumi.Input[str]] = None,
|
1017
|
-
options: Optional[pulumi.Input[Mapping[str,
|
1022
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
1018
1023
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1019
1024
|
path: Optional[pulumi.Input[str]] = None,
|
1020
1025
|
plugin_version: Optional[pulumi.Input[str]] = None,
|
@@ -1053,7 +1058,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1053
1058
|
The value should not contain leading or trailing forward slashes.
|
1054
1059
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1055
1060
|
*Available only for Vault Enterprise*.
|
1056
|
-
:param pulumi.Input[Mapping[str,
|
1061
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
|
1057
1062
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
1058
1063
|
:param pulumi.Input[str] path: Where the secret backend will be mounted
|
1059
1064
|
:param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
@@ -1238,7 +1243,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1238
1243
|
|
1239
1244
|
@property
|
1240
1245
|
@pulumi.getter
|
1241
|
-
def options(self) -> pulumi.Output[Optional[Mapping[str,
|
1246
|
+
def options(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
|
1242
1247
|
"""
|
1243
1248
|
Specifies mount type specific options that are passed to the backend
|
1244
1249
|
"""
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendRoleArgs', 'SecretBackendRole']
|
pulumi_vault/kv/_inputs.py
CHANGED
@@ -4,25 +4,57 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
13
18
|
'SecretV2CustomMetadataArgs',
|
19
|
+
'SecretV2CustomMetadataArgsDict',
|
14
20
|
]
|
15
21
|
|
22
|
+
MYPY = False
|
23
|
+
|
24
|
+
if not MYPY:
|
25
|
+
class SecretV2CustomMetadataArgsDict(TypedDict):
|
26
|
+
cas_required: NotRequired[pulumi.Input[bool]]
|
27
|
+
"""
|
28
|
+
If true, all keys will require the cas parameter to be set on all write requests.
|
29
|
+
"""
|
30
|
+
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
31
|
+
"""
|
32
|
+
A mapping whose keys are the top-level data keys returned from
|
33
|
+
Vault and whose values are the corresponding values. This map can only
|
34
|
+
represent string data, so any non-string values returned from Vault are
|
35
|
+
serialized as JSON.
|
36
|
+
"""
|
37
|
+
delete_version_after: NotRequired[pulumi.Input[int]]
|
38
|
+
"""
|
39
|
+
If set, specifies the length of time before a version is deleted.
|
40
|
+
"""
|
41
|
+
max_versions: NotRequired[pulumi.Input[int]]
|
42
|
+
"""
|
43
|
+
The number of versions to keep per key.
|
44
|
+
"""
|
45
|
+
elif False:
|
46
|
+
SecretV2CustomMetadataArgsDict: TypeAlias = Mapping[str, Any]
|
47
|
+
|
16
48
|
@pulumi.input_type
|
17
49
|
class SecretV2CustomMetadataArgs:
|
18
50
|
def __init__(__self__, *,
|
19
51
|
cas_required: Optional[pulumi.Input[bool]] = None,
|
20
|
-
data: Optional[pulumi.Input[Mapping[str,
|
52
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
21
53
|
delete_version_after: Optional[pulumi.Input[int]] = None,
|
22
54
|
max_versions: Optional[pulumi.Input[int]] = None):
|
23
55
|
"""
|
24
56
|
:param pulumi.Input[bool] cas_required: If true, all keys will require the cas parameter to be set on all write requests.
|
25
|
-
:param pulumi.Input[Mapping[str,
|
57
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
|
26
58
|
Vault and whose values are the corresponding values. This map can only
|
27
59
|
represent string data, so any non-string values returned from Vault are
|
28
60
|
serialized as JSON.
|
@@ -52,7 +84,7 @@ class SecretV2CustomMetadataArgs:
|
|
52
84
|
|
53
85
|
@property
|
54
86
|
@pulumi.getter
|
55
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
87
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
56
88
|
"""
|
57
89
|
A mapping whose keys are the top-level data keys returned from
|
58
90
|
Vault and whose values are the corresponding values. This map can only
|
@@ -62,7 +94,7 @@ class SecretV2CustomMetadataArgs:
|
|
62
94
|
return pulumi.get(self, "data")
|
63
95
|
|
64
96
|
@data.setter
|
65
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
97
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
66
98
|
pulumi.set(self, "data", value)
|
67
99
|
|
68
100
|
@property
|
pulumi_vault/kv/get_secret.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -49,7 +54,7 @@ class GetSecretResult:
|
|
49
54
|
|
50
55
|
@property
|
51
56
|
@pulumi.getter
|
52
|
-
def data(self) -> Mapping[str,
|
57
|
+
def data(self) -> Mapping[str, str]:
|
53
58
|
"""
|
54
59
|
A mapping whose keys are the top-level data keys returned from
|
55
60
|
Vault and whose values are the corresponding values. This map can only
|
@@ -181,9 +186,6 @@ def get_secret(namespace: Optional[str] = None,
|
|
181
186
|
lease_renewable=pulumi.get(__ret__, 'lease_renewable'),
|
182
187
|
namespace=pulumi.get(__ret__, 'namespace'),
|
183
188
|
path=pulumi.get(__ret__, 'path'))
|
184
|
-
|
185
|
-
|
186
|
-
@_utilities.lift_output_func(get_secret)
|
187
189
|
def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
188
190
|
path: Optional[pulumi.Input[str]] = None,
|
189
191
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecretResult]:
|
@@ -222,4 +224,17 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
|
222
224
|
*Available only for Vault Enterprise*.
|
223
225
|
:param str path: Full path of the KV-V1 secret.
|
224
226
|
"""
|
225
|
-
|
227
|
+
__args__ = dict()
|
228
|
+
__args__['namespace'] = namespace
|
229
|
+
__args__['path'] = path
|
230
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
231
|
+
__ret__ = pulumi.runtime.invoke_output('vault:kv/getSecret:getSecret', __args__, opts=opts, typ=GetSecretResult)
|
232
|
+
return __ret__.apply(lambda __response__: GetSecretResult(
|
233
|
+
data=pulumi.get(__response__, 'data'),
|
234
|
+
data_json=pulumi.get(__response__, 'data_json'),
|
235
|
+
id=pulumi.get(__response__, 'id'),
|
236
|
+
lease_duration=pulumi.get(__response__, 'lease_duration'),
|
237
|
+
lease_id=pulumi.get(__response__, 'lease_id'),
|
238
|
+
lease_renewable=pulumi.get(__response__, 'lease_renewable'),
|
239
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
240
|
+
path=pulumi.get(__response__, 'path')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -52,7 +57,7 @@ class GetSecretSubkeysV2Result:
|
|
52
57
|
|
53
58
|
@property
|
54
59
|
@pulumi.getter
|
55
|
-
def data(self) -> Mapping[str,
|
60
|
+
def data(self) -> Mapping[str, str]:
|
56
61
|
"""
|
57
62
|
Subkeys for the KV-V2 secret stored as a serialized map of strings.
|
58
63
|
"""
|
@@ -197,9 +202,6 @@ def get_secret_subkeys_v2(depth: Optional[int] = None,
|
|
197
202
|
namespace=pulumi.get(__ret__, 'namespace'),
|
198
203
|
path=pulumi.get(__ret__, 'path'),
|
199
204
|
version=pulumi.get(__ret__, 'version'))
|
200
|
-
|
201
|
-
|
202
|
-
@_utilities.lift_output_func(get_secret_subkeys_v2)
|
203
205
|
def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] = None,
|
204
206
|
mount: Optional[pulumi.Input[str]] = None,
|
205
207
|
name: Optional[pulumi.Input[str]] = None,
|
@@ -253,4 +255,21 @@ def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] =
|
|
253
255
|
:param int version: Specifies the version to return. If not
|
254
256
|
set the latest version is returned.
|
255
257
|
"""
|
256
|
-
|
258
|
+
__args__ = dict()
|
259
|
+
__args__['depth'] = depth
|
260
|
+
__args__['mount'] = mount
|
261
|
+
__args__['name'] = name
|
262
|
+
__args__['namespace'] = namespace
|
263
|
+
__args__['version'] = version
|
264
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
265
|
+
__ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretSubkeysV2:getSecretSubkeysV2', __args__, opts=opts, typ=GetSecretSubkeysV2Result)
|
266
|
+
return __ret__.apply(lambda __response__: GetSecretSubkeysV2Result(
|
267
|
+
data=pulumi.get(__response__, 'data'),
|
268
|
+
data_json=pulumi.get(__response__, 'data_json'),
|
269
|
+
depth=pulumi.get(__response__, 'depth'),
|
270
|
+
id=pulumi.get(__response__, 'id'),
|
271
|
+
mount=pulumi.get(__response__, 'mount'),
|
272
|
+
name=pulumi.get(__response__, 'name'),
|
273
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
274
|
+
path=pulumi.get(__response__, 'path'),
|
275
|
+
version=pulumi.get(__response__, 'version')))
|
pulumi_vault/kv/get_secret_v2.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -69,7 +74,7 @@ class GetSecretV2Result:
|
|
69
74
|
|
70
75
|
@property
|
71
76
|
@pulumi.getter(name="customMetadata")
|
72
|
-
def custom_metadata(self) -> Mapping[str,
|
77
|
+
def custom_metadata(self) -> Mapping[str, str]:
|
73
78
|
"""
|
74
79
|
Custom metadata for the secret.
|
75
80
|
"""
|
@@ -77,7 +82,7 @@ class GetSecretV2Result:
|
|
77
82
|
|
78
83
|
@property
|
79
84
|
@pulumi.getter
|
80
|
-
def data(self) -> Mapping[str,
|
85
|
+
def data(self) -> Mapping[str, str]:
|
81
86
|
"""
|
82
87
|
A mapping whose keys are the top-level data keys returned from
|
83
88
|
Vault and whose values are the corresponding values. This map can only
|
@@ -241,9 +246,6 @@ def get_secret_v2(mount: Optional[str] = None,
|
|
241
246
|
namespace=pulumi.get(__ret__, 'namespace'),
|
242
247
|
path=pulumi.get(__ret__, 'path'),
|
243
248
|
version=pulumi.get(__ret__, 'version'))
|
244
|
-
|
245
|
-
|
246
|
-
@_utilities.lift_output_func(get_secret_v2)
|
247
249
|
def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
248
250
|
name: Optional[pulumi.Input[str]] = None,
|
249
251
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
@@ -293,4 +295,23 @@ def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
|
293
295
|
*Available only for Vault Enterprise*.
|
294
296
|
:param int version: Version of the secret to retrieve.
|
295
297
|
"""
|
296
|
-
|
298
|
+
__args__ = dict()
|
299
|
+
__args__['mount'] = mount
|
300
|
+
__args__['name'] = name
|
301
|
+
__args__['namespace'] = namespace
|
302
|
+
__args__['version'] = version
|
303
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
304
|
+
__ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretV2:getSecretV2', __args__, opts=opts, typ=GetSecretV2Result)
|
305
|
+
return __ret__.apply(lambda __response__: GetSecretV2Result(
|
306
|
+
created_time=pulumi.get(__response__, 'created_time'),
|
307
|
+
custom_metadata=pulumi.get(__response__, 'custom_metadata'),
|
308
|
+
data=pulumi.get(__response__, 'data'),
|
309
|
+
data_json=pulumi.get(__response__, 'data_json'),
|
310
|
+
deletion_time=pulumi.get(__response__, 'deletion_time'),
|
311
|
+
destroyed=pulumi.get(__response__, 'destroyed'),
|
312
|
+
id=pulumi.get(__response__, 'id'),
|
313
|
+
mount=pulumi.get(__response__, 'mount'),
|
314
|
+
name=pulumi.get(__response__, 'name'),
|
315
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
316
|
+
path=pulumi.get(__response__, 'path'),
|
317
|
+
version=pulumi.get(__response__, 'version')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -127,9 +132,6 @@ def get_secrets_list(namespace: Optional[str] = None,
|
|
127
132
|
names=pulumi.get(__ret__, 'names'),
|
128
133
|
namespace=pulumi.get(__ret__, 'namespace'),
|
129
134
|
path=pulumi.get(__ret__, 'path'))
|
130
|
-
|
131
|
-
|
132
|
-
@_utilities.lift_output_func(get_secrets_list)
|
133
135
|
def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
134
136
|
path: Optional[pulumi.Input[str]] = None,
|
135
137
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecretsListResult]:
|
@@ -172,4 +174,13 @@ def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
|
|
172
174
|
*Available only for Vault Enterprise*.
|
173
175
|
:param str path: Full KV-V1 path where secrets will be listed.
|
174
176
|
"""
|
175
|
-
|
177
|
+
__args__ = dict()
|
178
|
+
__args__['namespace'] = namespace
|
179
|
+
__args__['path'] = path
|
180
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
181
|
+
__ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretsList:getSecretsList', __args__, opts=opts, typ=GetSecretsListResult)
|
182
|
+
return __ret__.apply(lambda __response__: GetSecretsListResult(
|
183
|
+
id=pulumi.get(__response__, 'id'),
|
184
|
+
names=pulumi.get(__response__, 'names'),
|
185
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
186
|
+
path=pulumi.get(__response__, 'path')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -166,9 +171,6 @@ def get_secrets_list_v2(mount: Optional[str] = None,
|
|
166
171
|
names=pulumi.get(__ret__, 'names'),
|
167
172
|
namespace=pulumi.get(__ret__, 'namespace'),
|
168
173
|
path=pulumi.get(__ret__, 'path'))
|
169
|
-
|
170
|
-
|
171
|
-
@_utilities.lift_output_func(get_secrets_list_v2)
|
172
174
|
def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
173
175
|
name: Optional[pulumi.Input[Optional[str]]] = None,
|
174
176
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
@@ -226,4 +228,16 @@ def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
|
226
228
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
227
229
|
*Available only for Vault Enterprise*.
|
228
230
|
"""
|
229
|
-
|
231
|
+
__args__ = dict()
|
232
|
+
__args__['mount'] = mount
|
233
|
+
__args__['name'] = name
|
234
|
+
__args__['namespace'] = namespace
|
235
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
236
|
+
__ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretsListV2:getSecretsListV2', __args__, opts=opts, typ=GetSecretsListV2Result)
|
237
|
+
return __ret__.apply(lambda __response__: GetSecretsListV2Result(
|
238
|
+
id=pulumi.get(__response__, 'id'),
|
239
|
+
mount=pulumi.get(__response__, 'mount'),
|
240
|
+
name=pulumi.get(__response__, 'name'),
|
241
|
+
names=pulumi.get(__response__, 'names'),
|
242
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
243
|
+
path=pulumi.get(__response__, 'path')))
|
pulumi_vault/kv/outputs.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -38,12 +43,12 @@ class SecretV2CustomMetadata(dict):
|
|
38
43
|
|
39
44
|
def __init__(__self__, *,
|
40
45
|
cas_required: Optional[bool] = None,
|
41
|
-
data: Optional[Mapping[str,
|
46
|
+
data: Optional[Mapping[str, str]] = None,
|
42
47
|
delete_version_after: Optional[int] = None,
|
43
48
|
max_versions: Optional[int] = None):
|
44
49
|
"""
|
45
50
|
:param bool cas_required: If true, all keys will require the cas parameter to be set on all write requests.
|
46
|
-
:param Mapping[str,
|
51
|
+
:param Mapping[str, str] data: A mapping whose keys are the top-level data keys returned from
|
47
52
|
Vault and whose values are the corresponding values. This map can only
|
48
53
|
represent string data, so any non-string values returned from Vault are
|
49
54
|
serialized as JSON.
|
@@ -69,7 +74,7 @@ class SecretV2CustomMetadata(dict):
|
|
69
74
|
|
70
75
|
@property
|
71
76
|
@pulumi.getter
|
72
|
-
def data(self) -> Optional[Mapping[str,
|
77
|
+
def data(self) -> Optional[Mapping[str, str]]:
|
73
78
|
"""
|
74
79
|
A mapping whose keys are the top-level data keys returned from
|
75
80
|
Vault and whose values are the corresponding values. This map can only
|
pulumi_vault/kv/secret.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretArgs', 'Secret']
|
@@ -76,13 +81,13 @@ class SecretArgs:
|
|
76
81
|
@pulumi.input_type
|
77
82
|
class _SecretState:
|
78
83
|
def __init__(__self__, *,
|
79
|
-
data: Optional[pulumi.Input[Mapping[str,
|
84
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
80
85
|
data_json: Optional[pulumi.Input[str]] = None,
|
81
86
|
namespace: Optional[pulumi.Input[str]] = None,
|
82
87
|
path: Optional[pulumi.Input[str]] = None):
|
83
88
|
"""
|
84
89
|
Input properties used for looking up and filtering Secret resources.
|
85
|
-
:param pulumi.Input[Mapping[str,
|
90
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
|
86
91
|
Vault and whose values are the corresponding values. This map can only
|
87
92
|
represent string data, so any non-string values returned from Vault are
|
88
93
|
serialized as JSON.
|
@@ -105,7 +110,7 @@ class _SecretState:
|
|
105
110
|
|
106
111
|
@property
|
107
112
|
@pulumi.getter
|
108
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
113
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
109
114
|
"""
|
110
115
|
A mapping whose keys are the top-level data keys returned from
|
111
116
|
Vault and whose values are the corresponding values. This map can only
|
@@ -115,7 +120,7 @@ class _SecretState:
|
|
115
120
|
return pulumi.get(self, "data")
|
116
121
|
|
117
122
|
@data.setter
|
118
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
123
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
119
124
|
pulumi.set(self, "data", value)
|
120
125
|
|
121
126
|
@property
|
@@ -317,7 +322,7 @@ class Secret(pulumi.CustomResource):
|
|
317
322
|
def get(resource_name: str,
|
318
323
|
id: pulumi.Input[str],
|
319
324
|
opts: Optional[pulumi.ResourceOptions] = None,
|
320
|
-
data: Optional[pulumi.Input[Mapping[str,
|
325
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
321
326
|
data_json: Optional[pulumi.Input[str]] = None,
|
322
327
|
namespace: Optional[pulumi.Input[str]] = None,
|
323
328
|
path: Optional[pulumi.Input[str]] = None) -> 'Secret':
|
@@ -328,7 +333,7 @@ class Secret(pulumi.CustomResource):
|
|
328
333
|
:param str resource_name: The unique name of the resulting resource.
|
329
334
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
330
335
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
331
|
-
:param pulumi.Input[Mapping[str,
|
336
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
|
332
337
|
Vault and whose values are the corresponding values. This map can only
|
333
338
|
represent string data, so any non-string values returned from Vault are
|
334
339
|
serialized as JSON.
|
@@ -352,7 +357,7 @@ class Secret(pulumi.CustomResource):
|
|
352
357
|
|
353
358
|
@property
|
354
359
|
@pulumi.getter
|
355
|
-
def data(self) -> pulumi.Output[Mapping[str,
|
360
|
+
def data(self) -> pulumi.Output[Mapping[str, str]]:
|
356
361
|
"""
|
357
362
|
A mapping whose keys are the top-level data keys returned from
|
358
363
|
Vault and whose values are the corresponding values. This map can only
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendV2Args', 'SecretBackendV2']
|