pulumi-vault 6.3.2a1729803197__py3-none-any.whl → 6.4.0a1723454543__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -560
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +4 -19
- pulumi_vault/ad/secret_backend.py +0 -5
- pulumi_vault/ad/secret_library.py +0 -5
- pulumi_vault/ad/secret_role.py +0 -5
- pulumi_vault/alicloud/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_login.py +0 -5
- pulumi_vault/approle/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -5
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
- pulumi_vault/audit.py +0 -5
- pulumi_vault/audit_request_header.py +0 -5
- pulumi_vault/auth_backend.py +0 -5
- pulumi_vault/aws/auth_backend_cert.py +0 -5
- pulumi_vault/aws/auth_backend_client.py +0 -5
- pulumi_vault/aws/auth_backend_config_identity.py +0 -5
- pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
- pulumi_vault/aws/auth_backend_login.py +7 -12
- pulumi_vault/aws/auth_backend_role.py +0 -5
- pulumi_vault/aws/auth_backend_role_tag.py +0 -5
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
- pulumi_vault/aws/auth_backend_sts_role.py +0 -5
- pulumi_vault/aws/get_access_credentials.py +4 -31
- pulumi_vault/aws/get_static_access_credentials.py +4 -18
- pulumi_vault/aws/secret_backend.py +0 -5
- pulumi_vault/aws/secret_backend_role.py +0 -5
- pulumi_vault/aws/secret_backend_static_role.py +0 -5
- pulumi_vault/azure/_inputs.py +0 -24
- pulumi_vault/azure/auth_backend_config.py +0 -5
- pulumi_vault/azure/auth_backend_role.py +0 -5
- pulumi_vault/azure/backend.py +0 -5
- pulumi_vault/azure/backend_role.py +0 -5
- pulumi_vault/azure/get_access_credentials.py +4 -36
- pulumi_vault/azure/outputs.py +0 -5
- pulumi_vault/cert_auth_backend_role.py +0 -5
- pulumi_vault/config/__init__.pyi +0 -5
- pulumi_vault/config/_inputs.py +0 -21
- pulumi_vault/config/outputs.py +0 -5
- pulumi_vault/config/ui_custom_message.py +14 -19
- pulumi_vault/config/vars.py +0 -5
- pulumi_vault/consul/secret_backend.py +0 -5
- pulumi_vault/consul/secret_backend_role.py +0 -5
- pulumi_vault/database/_inputs.py +105 -2056
- pulumi_vault/database/outputs.py +54 -59
- pulumi_vault/database/secret_backend_connection.py +14 -19
- pulumi_vault/database/secret_backend_role.py +14 -19
- pulumi_vault/database/secret_backend_static_role.py +0 -5
- pulumi_vault/database/secrets_mount.py +14 -19
- pulumi_vault/egp_policy.py +0 -5
- pulumi_vault/gcp/_inputs.py +0 -111
- pulumi_vault/gcp/auth_backend.py +0 -5
- pulumi_vault/gcp/auth_backend_role.py +0 -5
- pulumi_vault/gcp/get_auth_backend_role.py +4 -42
- pulumi_vault/gcp/outputs.py +0 -5
- pulumi_vault/gcp/secret_backend.py +0 -5
- pulumi_vault/gcp/secret_impersonated_account.py +0 -5
- pulumi_vault/gcp/secret_roleset.py +0 -5
- pulumi_vault/gcp/secret_static_account.py +0 -5
- pulumi_vault/generic/endpoint.py +0 -5
- pulumi_vault/generic/get_secret.py +5 -25
- pulumi_vault/generic/secret.py +7 -12
- pulumi_vault/get_auth_backend.py +4 -21
- pulumi_vault/get_auth_backends.py +4 -16
- pulumi_vault/get_namespace.py +5 -18
- pulumi_vault/get_namespaces.py +4 -13
- pulumi_vault/get_nomad_access_token.py +8 -28
- pulumi_vault/get_policy_document.py +4 -15
- pulumi_vault/get_raft_autopilot_state.py +7 -26
- pulumi_vault/github/_inputs.py +0 -55
- pulumi_vault/github/auth_backend.py +0 -5
- pulumi_vault/github/outputs.py +0 -5
- pulumi_vault/github/team.py +0 -5
- pulumi_vault/github/user.py +0 -5
- pulumi_vault/identity/entity.py +0 -5
- pulumi_vault/identity/entity_alias.py +0 -5
- pulumi_vault/identity/entity_policies.py +0 -5
- pulumi_vault/identity/get_entity.py +5 -35
- pulumi_vault/identity/get_group.py +6 -42
- pulumi_vault/identity/get_oidc_client_creds.py +4 -16
- pulumi_vault/identity/get_oidc_openid_config.py +4 -26
- pulumi_vault/identity/get_oidc_public_keys.py +5 -16
- pulumi_vault/identity/group.py +0 -5
- pulumi_vault/identity/group_alias.py +0 -5
- pulumi_vault/identity/group_member_entity_ids.py +0 -5
- pulumi_vault/identity/group_member_group_ids.py +0 -5
- pulumi_vault/identity/group_policies.py +0 -5
- pulumi_vault/identity/mfa_duo.py +0 -5
- pulumi_vault/identity/mfa_login_enforcement.py +0 -5
- pulumi_vault/identity/mfa_okta.py +0 -5
- pulumi_vault/identity/mfa_pingid.py +0 -5
- pulumi_vault/identity/mfa_totp.py +0 -5
- pulumi_vault/identity/oidc.py +0 -5
- pulumi_vault/identity/oidc_assignment.py +0 -5
- pulumi_vault/identity/oidc_client.py +0 -5
- pulumi_vault/identity/oidc_key.py +0 -5
- pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
- pulumi_vault/identity/oidc_provider.py +0 -5
- pulumi_vault/identity/oidc_role.py +0 -5
- pulumi_vault/identity/oidc_scope.py +0 -5
- pulumi_vault/identity/outputs.py +3 -8
- pulumi_vault/jwt/_inputs.py +0 -55
- pulumi_vault/jwt/auth_backend.py +0 -5
- pulumi_vault/jwt/auth_backend_role.py +28 -33
- pulumi_vault/jwt/outputs.py +0 -5
- pulumi_vault/kmip/secret_backend.py +0 -5
- pulumi_vault/kmip/secret_role.py +0 -5
- pulumi_vault/kmip/secret_scope.py +0 -5
- pulumi_vault/kubernetes/auth_backend_config.py +0 -5
- pulumi_vault/kubernetes/auth_backend_role.py +0 -5
- pulumi_vault/kubernetes/get_auth_backend_config.py +4 -26
- pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
- pulumi_vault/kubernetes/get_service_account_token.py +4 -28
- pulumi_vault/kubernetes/secret_backend.py +14 -19
- pulumi_vault/kubernetes/secret_backend_role.py +0 -5
- pulumi_vault/kv/_inputs.py +4 -36
- pulumi_vault/kv/get_secret.py +5 -20
- pulumi_vault/kv/get_secret_subkeys_v2.py +5 -24
- pulumi_vault/kv/get_secret_v2.py +6 -27
- pulumi_vault/kv/get_secrets_list.py +4 -15
- pulumi_vault/kv/get_secrets_list_v2.py +4 -18
- pulumi_vault/kv/outputs.py +3 -8
- pulumi_vault/kv/secret.py +7 -12
- pulumi_vault/kv/secret_backend_v2.py +0 -5
- pulumi_vault/kv/secret_v2.py +28 -33
- pulumi_vault/ldap/auth_backend.py +0 -5
- pulumi_vault/ldap/auth_backend_group.py +0 -5
- pulumi_vault/ldap/auth_backend_user.py +0 -5
- pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
- pulumi_vault/ldap/get_static_credentials.py +4 -23
- pulumi_vault/ldap/secret_backend.py +14 -19
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
- pulumi_vault/ldap/secret_backend_library_set.py +0 -5
- pulumi_vault/ldap/secret_backend_static_role.py +0 -5
- pulumi_vault/managed/_inputs.py +0 -205
- pulumi_vault/managed/keys.py +0 -5
- pulumi_vault/managed/outputs.py +0 -5
- pulumi_vault/mfa_duo.py +0 -5
- pulumi_vault/mfa_okta.py +0 -5
- pulumi_vault/mfa_pingid.py +0 -5
- pulumi_vault/mfa_totp.py +0 -5
- pulumi_vault/mongodbatlas/secret_backend.py +0 -5
- pulumi_vault/mongodbatlas/secret_role.py +0 -5
- pulumi_vault/mount.py +16 -21
- pulumi_vault/namespace.py +14 -19
- pulumi_vault/nomad_secret_backend.py +0 -5
- pulumi_vault/nomad_secret_role.py +0 -5
- pulumi_vault/okta/_inputs.py +0 -39
- pulumi_vault/okta/auth_backend.py +0 -5
- pulumi_vault/okta/auth_backend_group.py +0 -5
- pulumi_vault/okta/auth_backend_user.py +0 -5
- pulumi_vault/okta/outputs.py +0 -5
- pulumi_vault/outputs.py +0 -5
- pulumi_vault/password_policy.py +0 -5
- pulumi_vault/pkisecret/_inputs.py +8 -49
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
- pulumi_vault/pkisecret/backend_config_est.py +14 -19
- pulumi_vault/pkisecret/get_backend_config_est.py +5 -23
- pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
- pulumi_vault/pkisecret/get_backend_issuers.py +5 -18
- pulumi_vault/pkisecret/get_backend_key.py +4 -19
- pulumi_vault/pkisecret/get_backend_keys.py +5 -18
- pulumi_vault/pkisecret/outputs.py +12 -17
- pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
- pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
- pulumi_vault/pkisecret/secret_backend_key.py +0 -5
- pulumi_vault/pkisecret/secret_backend_role.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
- pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
- pulumi_vault/plugin.py +0 -5
- pulumi_vault/plugin_pinned_version.py +0 -5
- pulumi_vault/policy.py +0 -5
- pulumi_vault/provider.py +0 -5
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +0 -5
- pulumi_vault/quota_rate_limit.py +0 -5
- pulumi_vault/rabbitmq/_inputs.py +0 -61
- pulumi_vault/rabbitmq/outputs.py +0 -5
- pulumi_vault/rabbitmq/secret_backend.py +0 -5
- pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
- pulumi_vault/raft_autopilot.py +0 -5
- pulumi_vault/raft_snapshot_agent_config.py +0 -5
- pulumi_vault/rgp_policy.py +0 -5
- pulumi_vault/saml/auth_backend.py +0 -5
- pulumi_vault/saml/auth_backend_role.py +14 -19
- pulumi_vault/secrets/_inputs.py +0 -30
- pulumi_vault/secrets/outputs.py +0 -5
- pulumi_vault/secrets/sync_association.py +0 -5
- pulumi_vault/secrets/sync_aws_destination.py +14 -19
- pulumi_vault/secrets/sync_azure_destination.py +14 -19
- pulumi_vault/secrets/sync_config.py +0 -5
- pulumi_vault/secrets/sync_gcp_destination.py +14 -19
- pulumi_vault/secrets/sync_gh_destination.py +0 -5
- pulumi_vault/secrets/sync_github_apps.py +0 -5
- pulumi_vault/secrets/sync_vercel_destination.py +0 -5
- pulumi_vault/ssh/_inputs.py +0 -22
- pulumi_vault/ssh/outputs.py +0 -5
- pulumi_vault/ssh/secret_backend_ca.py +0 -5
- pulumi_vault/ssh/secret_backend_role.py +28 -33
- pulumi_vault/terraformcloud/secret_backend.py +0 -5
- pulumi_vault/terraformcloud/secret_creds.py +0 -5
- pulumi_vault/terraformcloud/secret_role.py +0 -5
- pulumi_vault/token.py +0 -5
- pulumi_vault/tokenauth/auth_backend_role.py +14 -5
- pulumi_vault/transform/alphabet.py +0 -5
- pulumi_vault/transform/get_decode.py +14 -38
- pulumi_vault/transform/get_encode.py +14 -38
- pulumi_vault/transform/role.py +0 -5
- pulumi_vault/transform/template.py +14 -19
- pulumi_vault/transform/transformation.py +0 -5
- pulumi_vault/transit/get_decrypt.py +4 -21
- pulumi_vault/transit/get_encrypt.py +4 -23
- pulumi_vault/transit/secret_backend_key.py +7 -12
- pulumi_vault/transit/secret_cache_config.py +0 -5
- {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/METADATA +2 -3
- pulumi_vault-6.4.0a1723454543.dist-info/RECORD +256 -0
- {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/WHEEL +1 -1
- pulumi_vault-6.3.2a1729803197.dist-info/RECORD +0 -256
- {pulumi_vault-6.3.2a1729803197.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/top_level.txt +0 -0
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendArgs', 'SecretBackend']
|
@@ -36,7 +31,7 @@ class SecretBackendArgs:
|
|
36
31
|
local: Optional[pulumi.Input[bool]] = None,
|
37
32
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
38
33
|
namespace: Optional[pulumi.Input[str]] = None,
|
39
|
-
options: Optional[pulumi.Input[Mapping[str,
|
34
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
40
35
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
41
36
|
plugin_version: Optional[pulumi.Input[str]] = None,
|
42
37
|
seal_wrap: Optional[pulumi.Input[bool]] = None,
|
@@ -69,7 +64,7 @@ class SecretBackendArgs:
|
|
69
64
|
The value should not contain leading or trailing forward slashes.
|
70
65
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
71
66
|
*Available only for Vault Enterprise*.
|
72
|
-
:param pulumi.Input[Mapping[str,
|
67
|
+
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
73
68
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
74
69
|
:param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
75
70
|
:param pulumi.Input[bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
@@ -336,14 +331,14 @@ class SecretBackendArgs:
|
|
336
331
|
|
337
332
|
@property
|
338
333
|
@pulumi.getter
|
339
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str,
|
334
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
340
335
|
"""
|
341
336
|
Specifies mount type specific options that are passed to the backend
|
342
337
|
"""
|
343
338
|
return pulumi.get(self, "options")
|
344
339
|
|
345
340
|
@options.setter
|
346
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str,
|
341
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
347
342
|
pulumi.set(self, "options", value)
|
348
343
|
|
349
344
|
@property
|
@@ -417,7 +412,7 @@ class _SecretBackendState:
|
|
417
412
|
local: Optional[pulumi.Input[bool]] = None,
|
418
413
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
419
414
|
namespace: Optional[pulumi.Input[str]] = None,
|
420
|
-
options: Optional[pulumi.Input[Mapping[str,
|
415
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
421
416
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
422
417
|
path: Optional[pulumi.Input[str]] = None,
|
423
418
|
plugin_version: Optional[pulumi.Input[str]] = None,
|
@@ -451,7 +446,7 @@ class _SecretBackendState:
|
|
451
446
|
The value should not contain leading or trailing forward slashes.
|
452
447
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
453
448
|
*Available only for Vault Enterprise*.
|
454
|
-
:param pulumi.Input[Mapping[str,
|
449
|
+
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
455
450
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
456
451
|
:param pulumi.Input[str] path: Where the secret backend will be mounted
|
457
452
|
:param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
@@ -722,14 +717,14 @@ class _SecretBackendState:
|
|
722
717
|
|
723
718
|
@property
|
724
719
|
@pulumi.getter
|
725
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str,
|
720
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
726
721
|
"""
|
727
722
|
Specifies mount type specific options that are passed to the backend
|
728
723
|
"""
|
729
724
|
return pulumi.get(self, "options")
|
730
725
|
|
731
726
|
@options.setter
|
732
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str,
|
727
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
733
728
|
pulumi.set(self, "options", value)
|
734
729
|
|
735
730
|
@property
|
@@ -816,7 +811,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
816
811
|
local: Optional[pulumi.Input[bool]] = None,
|
817
812
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
818
813
|
namespace: Optional[pulumi.Input[str]] = None,
|
819
|
-
options: Optional[pulumi.Input[Mapping[str,
|
814
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
820
815
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
821
816
|
path: Optional[pulumi.Input[str]] = None,
|
822
817
|
plugin_version: Optional[pulumi.Input[str]] = None,
|
@@ -877,7 +872,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
877
872
|
The value should not contain leading or trailing forward slashes.
|
878
873
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
879
874
|
*Available only for Vault Enterprise*.
|
880
|
-
:param pulumi.Input[Mapping[str,
|
875
|
+
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
881
876
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
882
877
|
:param pulumi.Input[str] path: Where the secret backend will be mounted
|
883
878
|
:param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
@@ -950,7 +945,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
950
945
|
local: Optional[pulumi.Input[bool]] = None,
|
951
946
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
952
947
|
namespace: Optional[pulumi.Input[str]] = None,
|
953
|
-
options: Optional[pulumi.Input[Mapping[str,
|
948
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
954
949
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
955
950
|
path: Optional[pulumi.Input[str]] = None,
|
956
951
|
plugin_version: Optional[pulumi.Input[str]] = None,
|
@@ -1019,7 +1014,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1019
1014
|
local: Optional[pulumi.Input[bool]] = None,
|
1020
1015
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
1021
1016
|
namespace: Optional[pulumi.Input[str]] = None,
|
1022
|
-
options: Optional[pulumi.Input[Mapping[str,
|
1017
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1023
1018
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1024
1019
|
path: Optional[pulumi.Input[str]] = None,
|
1025
1020
|
plugin_version: Optional[pulumi.Input[str]] = None,
|
@@ -1058,7 +1053,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1058
1053
|
The value should not contain leading or trailing forward slashes.
|
1059
1054
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1060
1055
|
*Available only for Vault Enterprise*.
|
1061
|
-
:param pulumi.Input[Mapping[str,
|
1056
|
+
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
1062
1057
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
1063
1058
|
:param pulumi.Input[str] path: Where the secret backend will be mounted
|
1064
1059
|
:param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
@@ -1243,7 +1238,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1243
1238
|
|
1244
1239
|
@property
|
1245
1240
|
@pulumi.getter
|
1246
|
-
def options(self) -> pulumi.Output[Optional[Mapping[str,
|
1241
|
+
def options(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
|
1247
1242
|
"""
|
1248
1243
|
Specifies mount type specific options that are passed to the backend
|
1249
1244
|
"""
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendRoleArgs', 'SecretBackendRole']
|
pulumi_vault/kv/_inputs.py
CHANGED
@@ -4,57 +4,25 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
18
13
|
'SecretV2CustomMetadataArgs',
|
19
|
-
'SecretV2CustomMetadataArgsDict',
|
20
14
|
]
|
21
15
|
|
22
|
-
MYPY = False
|
23
|
-
|
24
|
-
if not MYPY:
|
25
|
-
class SecretV2CustomMetadataArgsDict(TypedDict):
|
26
|
-
cas_required: NotRequired[pulumi.Input[bool]]
|
27
|
-
"""
|
28
|
-
If true, all keys will require the cas parameter to be set on all write requests.
|
29
|
-
"""
|
30
|
-
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
31
|
-
"""
|
32
|
-
A mapping whose keys are the top-level data keys returned from
|
33
|
-
Vault and whose values are the corresponding values. This map can only
|
34
|
-
represent string data, so any non-string values returned from Vault are
|
35
|
-
serialized as JSON.
|
36
|
-
"""
|
37
|
-
delete_version_after: NotRequired[pulumi.Input[int]]
|
38
|
-
"""
|
39
|
-
If set, specifies the length of time before a version is deleted.
|
40
|
-
"""
|
41
|
-
max_versions: NotRequired[pulumi.Input[int]]
|
42
|
-
"""
|
43
|
-
The number of versions to keep per key.
|
44
|
-
"""
|
45
|
-
elif False:
|
46
|
-
SecretV2CustomMetadataArgsDict: TypeAlias = Mapping[str, Any]
|
47
|
-
|
48
16
|
@pulumi.input_type
|
49
17
|
class SecretV2CustomMetadataArgs:
|
50
18
|
def __init__(__self__, *,
|
51
19
|
cas_required: Optional[pulumi.Input[bool]] = None,
|
52
|
-
data: Optional[pulumi.Input[Mapping[str,
|
20
|
+
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
53
21
|
delete_version_after: Optional[pulumi.Input[int]] = None,
|
54
22
|
max_versions: Optional[pulumi.Input[int]] = None):
|
55
23
|
"""
|
56
24
|
:param pulumi.Input[bool] cas_required: If true, all keys will require the cas parameter to be set on all write requests.
|
57
|
-
:param pulumi.Input[Mapping[str,
|
25
|
+
:param pulumi.Input[Mapping[str, Any]] data: A mapping whose keys are the top-level data keys returned from
|
58
26
|
Vault and whose values are the corresponding values. This map can only
|
59
27
|
represent string data, so any non-string values returned from Vault are
|
60
28
|
serialized as JSON.
|
@@ -84,7 +52,7 @@ class SecretV2CustomMetadataArgs:
|
|
84
52
|
|
85
53
|
@property
|
86
54
|
@pulumi.getter
|
87
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
55
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
88
56
|
"""
|
89
57
|
A mapping whose keys are the top-level data keys returned from
|
90
58
|
Vault and whose values are the corresponding values. This map can only
|
@@ -94,7 +62,7 @@ class SecretV2CustomMetadataArgs:
|
|
94
62
|
return pulumi.get(self, "data")
|
95
63
|
|
96
64
|
@data.setter
|
97
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
65
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
98
66
|
pulumi.set(self, "data", value)
|
99
67
|
|
100
68
|
@property
|
pulumi_vault/kv/get_secret.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -54,7 +49,7 @@ class GetSecretResult:
|
|
54
49
|
|
55
50
|
@property
|
56
51
|
@pulumi.getter
|
57
|
-
def data(self) -> Mapping[str,
|
52
|
+
def data(self) -> Mapping[str, Any]:
|
58
53
|
"""
|
59
54
|
A mapping whose keys are the top-level data keys returned from
|
60
55
|
Vault and whose values are the corresponding values. This map can only
|
@@ -186,6 +181,9 @@ def get_secret(namespace: Optional[str] = None,
|
|
186
181
|
lease_renewable=pulumi.get(__ret__, 'lease_renewable'),
|
187
182
|
namespace=pulumi.get(__ret__, 'namespace'),
|
188
183
|
path=pulumi.get(__ret__, 'path'))
|
184
|
+
|
185
|
+
|
186
|
+
@_utilities.lift_output_func(get_secret)
|
189
187
|
def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
190
188
|
path: Optional[pulumi.Input[str]] = None,
|
191
189
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecretResult]:
|
@@ -224,17 +222,4 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
|
224
222
|
*Available only for Vault Enterprise*.
|
225
223
|
:param str path: Full path of the KV-V1 secret.
|
226
224
|
"""
|
227
|
-
|
228
|
-
__args__['namespace'] = namespace
|
229
|
-
__args__['path'] = path
|
230
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
231
|
-
__ret__ = pulumi.runtime.invoke_output('vault:kv/getSecret:getSecret', __args__, opts=opts, typ=GetSecretResult)
|
232
|
-
return __ret__.apply(lambda __response__: GetSecretResult(
|
233
|
-
data=pulumi.get(__response__, 'data'),
|
234
|
-
data_json=pulumi.get(__response__, 'data_json'),
|
235
|
-
id=pulumi.get(__response__, 'id'),
|
236
|
-
lease_duration=pulumi.get(__response__, 'lease_duration'),
|
237
|
-
lease_id=pulumi.get(__response__, 'lease_id'),
|
238
|
-
lease_renewable=pulumi.get(__response__, 'lease_renewable'),
|
239
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
240
|
-
path=pulumi.get(__response__, 'path')))
|
225
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -57,7 +52,7 @@ class GetSecretSubkeysV2Result:
|
|
57
52
|
|
58
53
|
@property
|
59
54
|
@pulumi.getter
|
60
|
-
def data(self) -> Mapping[str,
|
55
|
+
def data(self) -> Mapping[str, Any]:
|
61
56
|
"""
|
62
57
|
Subkeys for the KV-V2 secret stored as a serialized map of strings.
|
63
58
|
"""
|
@@ -202,6 +197,9 @@ def get_secret_subkeys_v2(depth: Optional[int] = None,
|
|
202
197
|
namespace=pulumi.get(__ret__, 'namespace'),
|
203
198
|
path=pulumi.get(__ret__, 'path'),
|
204
199
|
version=pulumi.get(__ret__, 'version'))
|
200
|
+
|
201
|
+
|
202
|
+
@_utilities.lift_output_func(get_secret_subkeys_v2)
|
205
203
|
def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] = None,
|
206
204
|
mount: Optional[pulumi.Input[str]] = None,
|
207
205
|
name: Optional[pulumi.Input[str]] = None,
|
@@ -255,21 +253,4 @@ def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] =
|
|
255
253
|
:param int version: Specifies the version to return. If not
|
256
254
|
set the latest version is returned.
|
257
255
|
"""
|
258
|
-
|
259
|
-
__args__['depth'] = depth
|
260
|
-
__args__['mount'] = mount
|
261
|
-
__args__['name'] = name
|
262
|
-
__args__['namespace'] = namespace
|
263
|
-
__args__['version'] = version
|
264
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
265
|
-
__ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretSubkeysV2:getSecretSubkeysV2', __args__, opts=opts, typ=GetSecretSubkeysV2Result)
|
266
|
-
return __ret__.apply(lambda __response__: GetSecretSubkeysV2Result(
|
267
|
-
data=pulumi.get(__response__, 'data'),
|
268
|
-
data_json=pulumi.get(__response__, 'data_json'),
|
269
|
-
depth=pulumi.get(__response__, 'depth'),
|
270
|
-
id=pulumi.get(__response__, 'id'),
|
271
|
-
mount=pulumi.get(__response__, 'mount'),
|
272
|
-
name=pulumi.get(__response__, 'name'),
|
273
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
274
|
-
path=pulumi.get(__response__, 'path'),
|
275
|
-
version=pulumi.get(__response__, 'version')))
|
256
|
+
...
|
pulumi_vault/kv/get_secret_v2.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -74,7 +69,7 @@ class GetSecretV2Result:
|
|
74
69
|
|
75
70
|
@property
|
76
71
|
@pulumi.getter(name="customMetadata")
|
77
|
-
def custom_metadata(self) -> Mapping[str,
|
72
|
+
def custom_metadata(self) -> Mapping[str, Any]:
|
78
73
|
"""
|
79
74
|
Custom metadata for the secret.
|
80
75
|
"""
|
@@ -82,7 +77,7 @@ class GetSecretV2Result:
|
|
82
77
|
|
83
78
|
@property
|
84
79
|
@pulumi.getter
|
85
|
-
def data(self) -> Mapping[str,
|
80
|
+
def data(self) -> Mapping[str, Any]:
|
86
81
|
"""
|
87
82
|
A mapping whose keys are the top-level data keys returned from
|
88
83
|
Vault and whose values are the corresponding values. This map can only
|
@@ -246,6 +241,9 @@ def get_secret_v2(mount: Optional[str] = None,
|
|
246
241
|
namespace=pulumi.get(__ret__, 'namespace'),
|
247
242
|
path=pulumi.get(__ret__, 'path'),
|
248
243
|
version=pulumi.get(__ret__, 'version'))
|
244
|
+
|
245
|
+
|
246
|
+
@_utilities.lift_output_func(get_secret_v2)
|
249
247
|
def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
250
248
|
name: Optional[pulumi.Input[str]] = None,
|
251
249
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
@@ -295,23 +293,4 @@ def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
|
295
293
|
*Available only for Vault Enterprise*.
|
296
294
|
:param int version: Version of the secret to retrieve.
|
297
295
|
"""
|
298
|
-
|
299
|
-
__args__['mount'] = mount
|
300
|
-
__args__['name'] = name
|
301
|
-
__args__['namespace'] = namespace
|
302
|
-
__args__['version'] = version
|
303
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
304
|
-
__ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretV2:getSecretV2', __args__, opts=opts, typ=GetSecretV2Result)
|
305
|
-
return __ret__.apply(lambda __response__: GetSecretV2Result(
|
306
|
-
created_time=pulumi.get(__response__, 'created_time'),
|
307
|
-
custom_metadata=pulumi.get(__response__, 'custom_metadata'),
|
308
|
-
data=pulumi.get(__response__, 'data'),
|
309
|
-
data_json=pulumi.get(__response__, 'data_json'),
|
310
|
-
deletion_time=pulumi.get(__response__, 'deletion_time'),
|
311
|
-
destroyed=pulumi.get(__response__, 'destroyed'),
|
312
|
-
id=pulumi.get(__response__, 'id'),
|
313
|
-
mount=pulumi.get(__response__, 'mount'),
|
314
|
-
name=pulumi.get(__response__, 'name'),
|
315
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
316
|
-
path=pulumi.get(__response__, 'path'),
|
317
|
-
version=pulumi.get(__response__, 'version')))
|
296
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -132,6 +127,9 @@ def get_secrets_list(namespace: Optional[str] = None,
|
|
132
127
|
names=pulumi.get(__ret__, 'names'),
|
133
128
|
namespace=pulumi.get(__ret__, 'namespace'),
|
134
129
|
path=pulumi.get(__ret__, 'path'))
|
130
|
+
|
131
|
+
|
132
|
+
@_utilities.lift_output_func(get_secrets_list)
|
135
133
|
def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
136
134
|
path: Optional[pulumi.Input[str]] = None,
|
137
135
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecretsListResult]:
|
@@ -174,13 +172,4 @@ def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
|
|
174
172
|
*Available only for Vault Enterprise*.
|
175
173
|
:param str path: Full KV-V1 path where secrets will be listed.
|
176
174
|
"""
|
177
|
-
|
178
|
-
__args__['namespace'] = namespace
|
179
|
-
__args__['path'] = path
|
180
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
181
|
-
__ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretsList:getSecretsList', __args__, opts=opts, typ=GetSecretsListResult)
|
182
|
-
return __ret__.apply(lambda __response__: GetSecretsListResult(
|
183
|
-
id=pulumi.get(__response__, 'id'),
|
184
|
-
names=pulumi.get(__response__, 'names'),
|
185
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
186
|
-
path=pulumi.get(__response__, 'path')))
|
175
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -171,6 +166,9 @@ def get_secrets_list_v2(mount: Optional[str] = None,
|
|
171
166
|
names=pulumi.get(__ret__, 'names'),
|
172
167
|
namespace=pulumi.get(__ret__, 'namespace'),
|
173
168
|
path=pulumi.get(__ret__, 'path'))
|
169
|
+
|
170
|
+
|
171
|
+
@_utilities.lift_output_func(get_secrets_list_v2)
|
174
172
|
def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
175
173
|
name: Optional[pulumi.Input[Optional[str]]] = None,
|
176
174
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
@@ -228,16 +226,4 @@ def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
|
228
226
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
229
227
|
*Available only for Vault Enterprise*.
|
230
228
|
"""
|
231
|
-
|
232
|
-
__args__['mount'] = mount
|
233
|
-
__args__['name'] = name
|
234
|
-
__args__['namespace'] = namespace
|
235
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
236
|
-
__ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretsListV2:getSecretsListV2', __args__, opts=opts, typ=GetSecretsListV2Result)
|
237
|
-
return __ret__.apply(lambda __response__: GetSecretsListV2Result(
|
238
|
-
id=pulumi.get(__response__, 'id'),
|
239
|
-
mount=pulumi.get(__response__, 'mount'),
|
240
|
-
name=pulumi.get(__response__, 'name'),
|
241
|
-
names=pulumi.get(__response__, 'names'),
|
242
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
243
|
-
path=pulumi.get(__response__, 'path')))
|
229
|
+
...
|
pulumi_vault/kv/outputs.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -43,12 +38,12 @@ class SecretV2CustomMetadata(dict):
|
|
43
38
|
|
44
39
|
def __init__(__self__, *,
|
45
40
|
cas_required: Optional[bool] = None,
|
46
|
-
data: Optional[Mapping[str,
|
41
|
+
data: Optional[Mapping[str, Any]] = None,
|
47
42
|
delete_version_after: Optional[int] = None,
|
48
43
|
max_versions: Optional[int] = None):
|
49
44
|
"""
|
50
45
|
:param bool cas_required: If true, all keys will require the cas parameter to be set on all write requests.
|
51
|
-
:param Mapping[str,
|
46
|
+
:param Mapping[str, Any] data: A mapping whose keys are the top-level data keys returned from
|
52
47
|
Vault and whose values are the corresponding values. This map can only
|
53
48
|
represent string data, so any non-string values returned from Vault are
|
54
49
|
serialized as JSON.
|
@@ -74,7 +69,7 @@ class SecretV2CustomMetadata(dict):
|
|
74
69
|
|
75
70
|
@property
|
76
71
|
@pulumi.getter
|
77
|
-
def data(self) -> Optional[Mapping[str,
|
72
|
+
def data(self) -> Optional[Mapping[str, Any]]:
|
78
73
|
"""
|
79
74
|
A mapping whose keys are the top-level data keys returned from
|
80
75
|
Vault and whose values are the corresponding values. This map can only
|
pulumi_vault/kv/secret.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretArgs', 'Secret']
|
@@ -81,13 +76,13 @@ class SecretArgs:
|
|
81
76
|
@pulumi.input_type
|
82
77
|
class _SecretState:
|
83
78
|
def __init__(__self__, *,
|
84
|
-
data: Optional[pulumi.Input[Mapping[str,
|
79
|
+
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
85
80
|
data_json: Optional[pulumi.Input[str]] = None,
|
86
81
|
namespace: Optional[pulumi.Input[str]] = None,
|
87
82
|
path: Optional[pulumi.Input[str]] = None):
|
88
83
|
"""
|
89
84
|
Input properties used for looking up and filtering Secret resources.
|
90
|
-
:param pulumi.Input[Mapping[str,
|
85
|
+
:param pulumi.Input[Mapping[str, Any]] data: A mapping whose keys are the top-level data keys returned from
|
91
86
|
Vault and whose values are the corresponding values. This map can only
|
92
87
|
represent string data, so any non-string values returned from Vault are
|
93
88
|
serialized as JSON.
|
@@ -110,7 +105,7 @@ class _SecretState:
|
|
110
105
|
|
111
106
|
@property
|
112
107
|
@pulumi.getter
|
113
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
108
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
114
109
|
"""
|
115
110
|
A mapping whose keys are the top-level data keys returned from
|
116
111
|
Vault and whose values are the corresponding values. This map can only
|
@@ -120,7 +115,7 @@ class _SecretState:
|
|
120
115
|
return pulumi.get(self, "data")
|
121
116
|
|
122
117
|
@data.setter
|
123
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
118
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
124
119
|
pulumi.set(self, "data", value)
|
125
120
|
|
126
121
|
@property
|
@@ -322,7 +317,7 @@ class Secret(pulumi.CustomResource):
|
|
322
317
|
def get(resource_name: str,
|
323
318
|
id: pulumi.Input[str],
|
324
319
|
opts: Optional[pulumi.ResourceOptions] = None,
|
325
|
-
data: Optional[pulumi.Input[Mapping[str,
|
320
|
+
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
326
321
|
data_json: Optional[pulumi.Input[str]] = None,
|
327
322
|
namespace: Optional[pulumi.Input[str]] = None,
|
328
323
|
path: Optional[pulumi.Input[str]] = None) -> 'Secret':
|
@@ -333,7 +328,7 @@ class Secret(pulumi.CustomResource):
|
|
333
328
|
:param str resource_name: The unique name of the resulting resource.
|
334
329
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
335
330
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
336
|
-
:param pulumi.Input[Mapping[str,
|
331
|
+
:param pulumi.Input[Mapping[str, Any]] data: A mapping whose keys are the top-level data keys returned from
|
337
332
|
Vault and whose values are the corresponding values. This map can only
|
338
333
|
represent string data, so any non-string values returned from Vault are
|
339
334
|
serialized as JSON.
|
@@ -357,7 +352,7 @@ class Secret(pulumi.CustomResource):
|
|
357
352
|
|
358
353
|
@property
|
359
354
|
@pulumi.getter
|
360
|
-
def data(self) -> pulumi.Output[Mapping[str,
|
355
|
+
def data(self) -> pulumi.Output[Mapping[str, Any]]:
|
361
356
|
"""
|
362
357
|
A mapping whose keys are the top-level data keys returned from
|
363
358
|
Vault and whose values are the corresponding values. This map can only
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendV2Args', 'SecretBackendV2']
|