pulumi-vault 6.4.0__py3-none-any.whl → 6.4.0a1723454543__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -560
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +4 -19
- pulumi_vault/ad/secret_backend.py +0 -5
- pulumi_vault/ad/secret_library.py +0 -5
- pulumi_vault/ad/secret_role.py +0 -5
- pulumi_vault/alicloud/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_login.py +0 -5
- pulumi_vault/approle/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -99
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
- pulumi_vault/audit.py +0 -5
- pulumi_vault/audit_request_header.py +0 -5
- pulumi_vault/auth_backend.py +0 -5
- pulumi_vault/aws/auth_backend_cert.py +0 -5
- pulumi_vault/aws/auth_backend_client.py +0 -5
- pulumi_vault/aws/auth_backend_config_identity.py +0 -5
- pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
- pulumi_vault/aws/auth_backend_login.py +7 -12
- pulumi_vault/aws/auth_backend_role.py +0 -5
- pulumi_vault/aws/auth_backend_role_tag.py +0 -5
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
- pulumi_vault/aws/auth_backend_sts_role.py +0 -5
- pulumi_vault/aws/get_access_credentials.py +4 -31
- pulumi_vault/aws/get_static_access_credentials.py +4 -18
- pulumi_vault/aws/secret_backend.py +0 -5
- pulumi_vault/aws/secret_backend_role.py +0 -5
- pulumi_vault/aws/secret_backend_static_role.py +0 -5
- pulumi_vault/azure/_inputs.py +0 -24
- pulumi_vault/azure/auth_backend_config.py +0 -5
- pulumi_vault/azure/auth_backend_role.py +0 -5
- pulumi_vault/azure/backend.py +0 -5
- pulumi_vault/azure/backend_role.py +0 -5
- pulumi_vault/azure/get_access_credentials.py +4 -36
- pulumi_vault/azure/outputs.py +0 -5
- pulumi_vault/cert_auth_backend_role.py +0 -5
- pulumi_vault/config/__init__.pyi +0 -5
- pulumi_vault/config/_inputs.py +0 -21
- pulumi_vault/config/outputs.py +0 -5
- pulumi_vault/config/ui_custom_message.py +14 -19
- pulumi_vault/config/vars.py +0 -5
- pulumi_vault/consul/secret_backend.py +0 -5
- pulumi_vault/consul/secret_backend_role.py +0 -5
- pulumi_vault/database/_inputs.py +105 -2256
- pulumi_vault/database/outputs.py +54 -199
- pulumi_vault/database/secret_backend_connection.py +14 -19
- pulumi_vault/database/secret_backend_role.py +14 -19
- pulumi_vault/database/secret_backend_static_role.py +1 -69
- pulumi_vault/database/secrets_mount.py +14 -19
- pulumi_vault/egp_policy.py +0 -5
- pulumi_vault/gcp/_inputs.py +0 -111
- pulumi_vault/gcp/auth_backend.py +0 -5
- pulumi_vault/gcp/auth_backend_role.py +0 -5
- pulumi_vault/gcp/get_auth_backend_role.py +4 -42
- pulumi_vault/gcp/outputs.py +0 -5
- pulumi_vault/gcp/secret_backend.py +0 -5
- pulumi_vault/gcp/secret_impersonated_account.py +3 -62
- pulumi_vault/gcp/secret_roleset.py +0 -5
- pulumi_vault/gcp/secret_static_account.py +0 -5
- pulumi_vault/generic/endpoint.py +0 -5
- pulumi_vault/generic/get_secret.py +5 -25
- pulumi_vault/generic/secret.py +7 -12
- pulumi_vault/get_auth_backend.py +4 -21
- pulumi_vault/get_auth_backends.py +4 -16
- pulumi_vault/get_namespace.py +5 -18
- pulumi_vault/get_namespaces.py +4 -13
- pulumi_vault/get_nomad_access_token.py +8 -28
- pulumi_vault/get_policy_document.py +4 -15
- pulumi_vault/get_raft_autopilot_state.py +7 -26
- pulumi_vault/github/_inputs.py +0 -55
- pulumi_vault/github/auth_backend.py +0 -5
- pulumi_vault/github/outputs.py +0 -5
- pulumi_vault/github/team.py +0 -5
- pulumi_vault/github/user.py +0 -5
- pulumi_vault/identity/entity.py +0 -5
- pulumi_vault/identity/entity_alias.py +0 -5
- pulumi_vault/identity/entity_policies.py +0 -5
- pulumi_vault/identity/get_entity.py +5 -35
- pulumi_vault/identity/get_group.py +6 -42
- pulumi_vault/identity/get_oidc_client_creds.py +4 -16
- pulumi_vault/identity/get_oidc_openid_config.py +4 -26
- pulumi_vault/identity/get_oidc_public_keys.py +5 -16
- pulumi_vault/identity/group.py +0 -5
- pulumi_vault/identity/group_alias.py +0 -5
- pulumi_vault/identity/group_member_entity_ids.py +0 -5
- pulumi_vault/identity/group_member_group_ids.py +0 -5
- pulumi_vault/identity/group_policies.py +0 -5
- pulumi_vault/identity/mfa_duo.py +0 -5
- pulumi_vault/identity/mfa_login_enforcement.py +0 -5
- pulumi_vault/identity/mfa_okta.py +0 -5
- pulumi_vault/identity/mfa_pingid.py +0 -5
- pulumi_vault/identity/mfa_totp.py +0 -5
- pulumi_vault/identity/oidc.py +0 -5
- pulumi_vault/identity/oidc_assignment.py +0 -5
- pulumi_vault/identity/oidc_client.py +0 -5
- pulumi_vault/identity/oidc_key.py +0 -5
- pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
- pulumi_vault/identity/oidc_provider.py +0 -5
- pulumi_vault/identity/oidc_role.py +0 -5
- pulumi_vault/identity/oidc_scope.py +0 -5
- pulumi_vault/identity/outputs.py +3 -8
- pulumi_vault/jwt/_inputs.py +0 -55
- pulumi_vault/jwt/auth_backend.py +0 -5
- pulumi_vault/jwt/auth_backend_role.py +28 -33
- pulumi_vault/jwt/outputs.py +0 -5
- pulumi_vault/kmip/secret_backend.py +0 -5
- pulumi_vault/kmip/secret_role.py +0 -5
- pulumi_vault/kmip/secret_scope.py +0 -5
- pulumi_vault/kubernetes/auth_backend_config.py +3 -55
- pulumi_vault/kubernetes/auth_backend_role.py +0 -5
- pulumi_vault/kubernetes/get_auth_backend_config.py +7 -59
- pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
- pulumi_vault/kubernetes/get_service_account_token.py +4 -28
- pulumi_vault/kubernetes/secret_backend.py +14 -19
- pulumi_vault/kubernetes/secret_backend_role.py +0 -5
- pulumi_vault/kv/_inputs.py +4 -36
- pulumi_vault/kv/get_secret.py +5 -20
- pulumi_vault/kv/get_secret_subkeys_v2.py +5 -24
- pulumi_vault/kv/get_secret_v2.py +8 -27
- pulumi_vault/kv/get_secrets_list.py +4 -15
- pulumi_vault/kv/get_secrets_list_v2.py +4 -18
- pulumi_vault/kv/outputs.py +3 -8
- pulumi_vault/kv/secret.py +7 -12
- pulumi_vault/kv/secret_backend_v2.py +0 -5
- pulumi_vault/kv/secret_v2.py +28 -33
- pulumi_vault/ldap/auth_backend.py +0 -52
- pulumi_vault/ldap/auth_backend_group.py +0 -5
- pulumi_vault/ldap/auth_backend_user.py +0 -5
- pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
- pulumi_vault/ldap/get_static_credentials.py +4 -23
- pulumi_vault/ldap/secret_backend.py +14 -19
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
- pulumi_vault/ldap/secret_backend_library_set.py +0 -5
- pulumi_vault/ldap/secret_backend_static_role.py +0 -5
- pulumi_vault/managed/_inputs.py +0 -205
- pulumi_vault/managed/keys.py +0 -5
- pulumi_vault/managed/outputs.py +0 -5
- pulumi_vault/mfa_duo.py +0 -5
- pulumi_vault/mfa_okta.py +0 -5
- pulumi_vault/mfa_pingid.py +0 -5
- pulumi_vault/mfa_totp.py +0 -5
- pulumi_vault/mongodbatlas/secret_backend.py +0 -5
- pulumi_vault/mongodbatlas/secret_role.py +0 -5
- pulumi_vault/mount.py +16 -21
- pulumi_vault/namespace.py +14 -19
- pulumi_vault/nomad_secret_backend.py +0 -5
- pulumi_vault/nomad_secret_role.py +0 -5
- pulumi_vault/okta/_inputs.py +0 -39
- pulumi_vault/okta/auth_backend.py +0 -5
- pulumi_vault/okta/auth_backend_group.py +0 -5
- pulumi_vault/okta/auth_backend_user.py +0 -5
- pulumi_vault/okta/outputs.py +0 -5
- pulumi_vault/outputs.py +0 -5
- pulumi_vault/password_policy.py +0 -5
- pulumi_vault/pkisecret/_inputs.py +8 -49
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
- pulumi_vault/pkisecret/backend_config_est.py +14 -19
- pulumi_vault/pkisecret/get_backend_config_est.py +5 -23
- pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
- pulumi_vault/pkisecret/get_backend_issuers.py +5 -18
- pulumi_vault/pkisecret/get_backend_key.py +4 -19
- pulumi_vault/pkisecret/get_backend_keys.py +5 -18
- pulumi_vault/pkisecret/outputs.py +12 -17
- pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
- pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
- pulumi_vault/pkisecret/secret_backend_key.py +0 -5
- pulumi_vault/pkisecret/secret_backend_role.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
- pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
- pulumi_vault/plugin.py +0 -5
- pulumi_vault/plugin_pinned_version.py +0 -5
- pulumi_vault/policy.py +0 -5
- pulumi_vault/provider.py +0 -5
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +0 -5
- pulumi_vault/quota_rate_limit.py +0 -5
- pulumi_vault/rabbitmq/_inputs.py +0 -61
- pulumi_vault/rabbitmq/outputs.py +0 -5
- pulumi_vault/rabbitmq/secret_backend.py +0 -5
- pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
- pulumi_vault/raft_autopilot.py +0 -5
- pulumi_vault/raft_snapshot_agent_config.py +0 -5
- pulumi_vault/rgp_policy.py +0 -5
- pulumi_vault/saml/auth_backend.py +0 -5
- pulumi_vault/saml/auth_backend_role.py +14 -19
- pulumi_vault/secrets/_inputs.py +0 -30
- pulumi_vault/secrets/outputs.py +0 -5
- pulumi_vault/secrets/sync_association.py +0 -5
- pulumi_vault/secrets/sync_aws_destination.py +14 -19
- pulumi_vault/secrets/sync_azure_destination.py +14 -19
- pulumi_vault/secrets/sync_config.py +0 -5
- pulumi_vault/secrets/sync_gcp_destination.py +14 -19
- pulumi_vault/secrets/sync_gh_destination.py +0 -5
- pulumi_vault/secrets/sync_github_apps.py +0 -5
- pulumi_vault/secrets/sync_vercel_destination.py +0 -5
- pulumi_vault/ssh/_inputs.py +0 -22
- pulumi_vault/ssh/outputs.py +0 -5
- pulumi_vault/ssh/secret_backend_ca.py +0 -5
- pulumi_vault/ssh/secret_backend_role.py +28 -67
- pulumi_vault/terraformcloud/secret_backend.py +0 -5
- pulumi_vault/terraformcloud/secret_creds.py +0 -5
- pulumi_vault/terraformcloud/secret_role.py +0 -5
- pulumi_vault/token.py +0 -5
- pulumi_vault/tokenauth/auth_backend_role.py +14 -5
- pulumi_vault/transform/alphabet.py +0 -5
- pulumi_vault/transform/get_decode.py +14 -38
- pulumi_vault/transform/get_encode.py +14 -38
- pulumi_vault/transform/role.py +0 -5
- pulumi_vault/transform/template.py +14 -19
- pulumi_vault/transform/transformation.py +0 -5
- pulumi_vault/transit/get_decrypt.py +4 -21
- pulumi_vault/transit/get_encrypt.py +4 -23
- pulumi_vault/transit/secret_backend_key.py +7 -12
- pulumi_vault/transit/secret_cache_config.py +0 -5
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/METADATA +2 -3
- pulumi_vault-6.4.0a1723454543.dist-info/RECORD +256 -0
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/WHEEL +1 -1
- pulumi_vault-6.4.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/top_level.txt +0 -0
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -26,7 +21,7 @@ class GetAuthBackendConfigResult:
|
|
26
21
|
"""
|
27
22
|
A collection of values returned by getAuthBackendConfig.
|
28
23
|
"""
|
29
|
-
def __init__(__self__, backend=None, disable_iss_validation=None, disable_local_ca_jwt=None, id=None, issuer=None, kubernetes_ca_cert=None, kubernetes_host=None, namespace=None, pem_keys=None
|
24
|
+
def __init__(__self__, backend=None, disable_iss_validation=None, disable_local_ca_jwt=None, id=None, issuer=None, kubernetes_ca_cert=None, kubernetes_host=None, namespace=None, pem_keys=None):
|
30
25
|
if backend and not isinstance(backend, str):
|
31
26
|
raise TypeError("Expected argument 'backend' to be a str")
|
32
27
|
pulumi.set(__self__, "backend", backend)
|
@@ -54,9 +49,6 @@ class GetAuthBackendConfigResult:
|
|
54
49
|
if pem_keys and not isinstance(pem_keys, list):
|
55
50
|
raise TypeError("Expected argument 'pem_keys' to be a list")
|
56
51
|
pulumi.set(__self__, "pem_keys", pem_keys)
|
57
|
-
if use_annotations_as_alias_metadata and not isinstance(use_annotations_as_alias_metadata, bool):
|
58
|
-
raise TypeError("Expected argument 'use_annotations_as_alias_metadata' to be a bool")
|
59
|
-
pulumi.set(__self__, "use_annotations_as_alias_metadata", use_annotations_as_alias_metadata)
|
60
52
|
|
61
53
|
@property
|
62
54
|
@pulumi.getter
|
@@ -66,17 +58,11 @@ class GetAuthBackendConfigResult:
|
|
66
58
|
@property
|
67
59
|
@pulumi.getter(name="disableIssValidation")
|
68
60
|
def disable_iss_validation(self) -> bool:
|
69
|
-
"""
|
70
|
-
(Optional) Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
71
|
-
"""
|
72
61
|
return pulumi.get(self, "disable_iss_validation")
|
73
62
|
|
74
63
|
@property
|
75
64
|
@pulumi.getter(name="disableLocalCaJwt")
|
76
65
|
def disable_local_ca_jwt(self) -> bool:
|
77
|
-
"""
|
78
|
-
(Optional) Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
79
|
-
"""
|
80
66
|
return pulumi.get(self, "disable_local_ca_jwt")
|
81
67
|
|
82
68
|
@property
|
@@ -124,14 +110,6 @@ class GetAuthBackendConfigResult:
|
|
124
110
|
"""
|
125
111
|
return pulumi.get(self, "pem_keys")
|
126
112
|
|
127
|
-
@property
|
128
|
-
@pulumi.getter(name="useAnnotationsAsAliasMetadata")
|
129
|
-
def use_annotations_as_alias_metadata(self) -> bool:
|
130
|
-
"""
|
131
|
-
(Optional) Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
|
132
|
-
"""
|
133
|
-
return pulumi.get(self, "use_annotations_as_alias_metadata")
|
134
|
-
|
135
113
|
|
136
114
|
class AwaitableGetAuthBackendConfigResult(GetAuthBackendConfigResult):
|
137
115
|
# pylint: disable=using-constant-test
|
@@ -147,8 +125,7 @@ class AwaitableGetAuthBackendConfigResult(GetAuthBackendConfigResult):
|
|
147
125
|
kubernetes_ca_cert=self.kubernetes_ca_cert,
|
148
126
|
kubernetes_host=self.kubernetes_host,
|
149
127
|
namespace=self.namespace,
|
150
|
-
pem_keys=self.pem_keys
|
151
|
-
use_annotations_as_alias_metadata=self.use_annotations_as_alias_metadata)
|
128
|
+
pem_keys=self.pem_keys)
|
152
129
|
|
153
130
|
|
154
131
|
def get_auth_backend_config(backend: Optional[str] = None,
|
@@ -159,7 +136,6 @@ def get_auth_backend_config(backend: Optional[str] = None,
|
|
159
136
|
kubernetes_host: Optional[str] = None,
|
160
137
|
namespace: Optional[str] = None,
|
161
138
|
pem_keys: Optional[Sequence[str]] = None,
|
162
|
-
use_annotations_as_alias_metadata: Optional[bool] = None,
|
163
139
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetAuthBackendConfigResult:
|
164
140
|
"""
|
165
141
|
Reads the Role of an Kubernetes from a Vault server. See the [Vault
|
@@ -169,8 +145,6 @@ def get_auth_backend_config(backend: Optional[str] = None,
|
|
169
145
|
|
170
146
|
:param str backend: The unique name for the Kubernetes backend the config to
|
171
147
|
retrieve Role attributes for resides in. Defaults to "kubernetes".
|
172
|
-
:param bool disable_iss_validation: (Optional) Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
173
|
-
:param bool disable_local_ca_jwt: (Optional) Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
174
148
|
:param str issuer: Optional JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
|
175
149
|
:param str kubernetes_ca_cert: PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
|
176
150
|
:param str kubernetes_host: Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
|
@@ -179,7 +153,6 @@ def get_auth_backend_config(backend: Optional[str] = None,
|
|
179
153
|
The `namespace` is always relative to the provider's configured namespace.
|
180
154
|
*Available only for Vault Enterprise*.
|
181
155
|
:param Sequence[str] pem_keys: Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
|
182
|
-
:param bool use_annotations_as_alias_metadata: (Optional) Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
|
183
156
|
"""
|
184
157
|
__args__ = dict()
|
185
158
|
__args__['backend'] = backend
|
@@ -190,7 +163,6 @@ def get_auth_backend_config(backend: Optional[str] = None,
|
|
190
163
|
__args__['kubernetesHost'] = kubernetes_host
|
191
164
|
__args__['namespace'] = namespace
|
192
165
|
__args__['pemKeys'] = pem_keys
|
193
|
-
__args__['useAnnotationsAsAliasMetadata'] = use_annotations_as_alias_metadata
|
194
166
|
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
195
167
|
__ret__ = pulumi.runtime.invoke('vault:kubernetes/getAuthBackendConfig:getAuthBackendConfig', __args__, opts=opts, typ=GetAuthBackendConfigResult).value
|
196
168
|
|
@@ -203,8 +175,10 @@ def get_auth_backend_config(backend: Optional[str] = None,
|
|
203
175
|
kubernetes_ca_cert=pulumi.get(__ret__, 'kubernetes_ca_cert'),
|
204
176
|
kubernetes_host=pulumi.get(__ret__, 'kubernetes_host'),
|
205
177
|
namespace=pulumi.get(__ret__, 'namespace'),
|
206
|
-
pem_keys=pulumi.get(__ret__, 'pem_keys')
|
207
|
-
|
178
|
+
pem_keys=pulumi.get(__ret__, 'pem_keys'))
|
179
|
+
|
180
|
+
|
181
|
+
@_utilities.lift_output_func(get_auth_backend_config)
|
208
182
|
def get_auth_backend_config_output(backend: Optional[pulumi.Input[Optional[str]]] = None,
|
209
183
|
disable_iss_validation: Optional[pulumi.Input[Optional[bool]]] = None,
|
210
184
|
disable_local_ca_jwt: Optional[pulumi.Input[Optional[bool]]] = None,
|
@@ -213,7 +187,6 @@ def get_auth_backend_config_output(backend: Optional[pulumi.Input[Optional[str]]
|
|
213
187
|
kubernetes_host: Optional[pulumi.Input[Optional[str]]] = None,
|
214
188
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
215
189
|
pem_keys: Optional[pulumi.Input[Optional[Sequence[str]]]] = None,
|
216
|
-
use_annotations_as_alias_metadata: Optional[pulumi.Input[Optional[bool]]] = None,
|
217
190
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendConfigResult]:
|
218
191
|
"""
|
219
192
|
Reads the Role of an Kubernetes from a Vault server. See the [Vault
|
@@ -223,8 +196,6 @@ def get_auth_backend_config_output(backend: Optional[pulumi.Input[Optional[str]]
|
|
223
196
|
|
224
197
|
:param str backend: The unique name for the Kubernetes backend the config to
|
225
198
|
retrieve Role attributes for resides in. Defaults to "kubernetes".
|
226
|
-
:param bool disable_iss_validation: (Optional) Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
227
|
-
:param bool disable_local_ca_jwt: (Optional) Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
228
199
|
:param str issuer: Optional JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
|
229
200
|
:param str kubernetes_ca_cert: PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
|
230
201
|
:param str kubernetes_host: Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
|
@@ -233,28 +204,5 @@ def get_auth_backend_config_output(backend: Optional[pulumi.Input[Optional[str]]
|
|
233
204
|
The `namespace` is always relative to the provider's configured namespace.
|
234
205
|
*Available only for Vault Enterprise*.
|
235
206
|
:param Sequence[str] pem_keys: Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
|
236
|
-
:param bool use_annotations_as_alias_metadata: (Optional) Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
|
237
207
|
"""
|
238
|
-
|
239
|
-
__args__['backend'] = backend
|
240
|
-
__args__['disableIssValidation'] = disable_iss_validation
|
241
|
-
__args__['disableLocalCaJwt'] = disable_local_ca_jwt
|
242
|
-
__args__['issuer'] = issuer
|
243
|
-
__args__['kubernetesCaCert'] = kubernetes_ca_cert
|
244
|
-
__args__['kubernetesHost'] = kubernetes_host
|
245
|
-
__args__['namespace'] = namespace
|
246
|
-
__args__['pemKeys'] = pem_keys
|
247
|
-
__args__['useAnnotationsAsAliasMetadata'] = use_annotations_as_alias_metadata
|
248
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
249
|
-
__ret__ = pulumi.runtime.invoke_output('vault:kubernetes/getAuthBackendConfig:getAuthBackendConfig', __args__, opts=opts, typ=GetAuthBackendConfigResult)
|
250
|
-
return __ret__.apply(lambda __response__: GetAuthBackendConfigResult(
|
251
|
-
backend=pulumi.get(__response__, 'backend'),
|
252
|
-
disable_iss_validation=pulumi.get(__response__, 'disable_iss_validation'),
|
253
|
-
disable_local_ca_jwt=pulumi.get(__response__, 'disable_local_ca_jwt'),
|
254
|
-
id=pulumi.get(__response__, 'id'),
|
255
|
-
issuer=pulumi.get(__response__, 'issuer'),
|
256
|
-
kubernetes_ca_cert=pulumi.get(__response__, 'kubernetes_ca_cert'),
|
257
|
-
kubernetes_host=pulumi.get(__response__, 'kubernetes_host'),
|
258
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
259
|
-
pem_keys=pulumi.get(__response__, 'pem_keys'),
|
260
|
-
use_annotations_as_alias_metadata=pulumi.get(__response__, 'use_annotations_as_alias_metadata')))
|
208
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -341,6 +336,9 @@ def get_auth_backend_role(audience: Optional[str] = None,
|
|
341
336
|
token_policies=pulumi.get(__ret__, 'token_policies'),
|
342
337
|
token_ttl=pulumi.get(__ret__, 'token_ttl'),
|
343
338
|
token_type=pulumi.get(__ret__, 'token_type'))
|
339
|
+
|
340
|
+
|
341
|
+
@_utilities.lift_output_func(get_auth_backend_role)
|
344
342
|
def get_auth_backend_role_output(audience: Optional[pulumi.Input[Optional[str]]] = None,
|
345
343
|
backend: Optional[pulumi.Input[Optional[str]]] = None,
|
346
344
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
@@ -397,37 +395,4 @@ def get_auth_backend_role_output(audience: Optional[pulumi.Input[Optional[str]]]
|
|
397
395
|
`default-service` and `default-batch` which specify the type to return unless the client
|
398
396
|
requests a different type at generation time.
|
399
397
|
"""
|
400
|
-
|
401
|
-
__args__['audience'] = audience
|
402
|
-
__args__['backend'] = backend
|
403
|
-
__args__['namespace'] = namespace
|
404
|
-
__args__['roleName'] = role_name
|
405
|
-
__args__['tokenBoundCidrs'] = token_bound_cidrs
|
406
|
-
__args__['tokenExplicitMaxTtl'] = token_explicit_max_ttl
|
407
|
-
__args__['tokenMaxTtl'] = token_max_ttl
|
408
|
-
__args__['tokenNoDefaultPolicy'] = token_no_default_policy
|
409
|
-
__args__['tokenNumUses'] = token_num_uses
|
410
|
-
__args__['tokenPeriod'] = token_period
|
411
|
-
__args__['tokenPolicies'] = token_policies
|
412
|
-
__args__['tokenTtl'] = token_ttl
|
413
|
-
__args__['tokenType'] = token_type
|
414
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
415
|
-
__ret__ = pulumi.runtime.invoke_output('vault:kubernetes/getAuthBackendRole:getAuthBackendRole', __args__, opts=opts, typ=GetAuthBackendRoleResult)
|
416
|
-
return __ret__.apply(lambda __response__: GetAuthBackendRoleResult(
|
417
|
-
alias_name_source=pulumi.get(__response__, 'alias_name_source'),
|
418
|
-
audience=pulumi.get(__response__, 'audience'),
|
419
|
-
backend=pulumi.get(__response__, 'backend'),
|
420
|
-
bound_service_account_names=pulumi.get(__response__, 'bound_service_account_names'),
|
421
|
-
bound_service_account_namespaces=pulumi.get(__response__, 'bound_service_account_namespaces'),
|
422
|
-
id=pulumi.get(__response__, 'id'),
|
423
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
424
|
-
role_name=pulumi.get(__response__, 'role_name'),
|
425
|
-
token_bound_cidrs=pulumi.get(__response__, 'token_bound_cidrs'),
|
426
|
-
token_explicit_max_ttl=pulumi.get(__response__, 'token_explicit_max_ttl'),
|
427
|
-
token_max_ttl=pulumi.get(__response__, 'token_max_ttl'),
|
428
|
-
token_no_default_policy=pulumi.get(__response__, 'token_no_default_policy'),
|
429
|
-
token_num_uses=pulumi.get(__response__, 'token_num_uses'),
|
430
|
-
token_period=pulumi.get(__response__, 'token_period'),
|
431
|
-
token_policies=pulumi.get(__response__, 'token_policies'),
|
432
|
-
token_ttl=pulumi.get(__response__, 'token_ttl'),
|
433
|
-
token_type=pulumi.get(__response__, 'token_type')))
|
398
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -259,6 +254,9 @@ def get_service_account_token(backend: Optional[str] = None,
|
|
259
254
|
service_account_namespace=pulumi.get(__ret__, 'service_account_namespace'),
|
260
255
|
service_account_token=pulumi.get(__ret__, 'service_account_token'),
|
261
256
|
ttl=pulumi.get(__ret__, 'ttl'))
|
257
|
+
|
258
|
+
|
259
|
+
@_utilities.lift_output_func(get_service_account_token)
|
262
260
|
def get_service_account_token_output(backend: Optional[pulumi.Input[str]] = None,
|
263
261
|
cluster_role_binding: Optional[pulumi.Input[Optional[bool]]] = None,
|
264
262
|
kubernetes_namespace: Optional[pulumi.Input[str]] = None,
|
@@ -319,26 +317,4 @@ def get_service_account_token_output(backend: Optional[pulumi.Input[str]] = None
|
|
319
317
|
:param str ttl: The TTL of the generated Kubernetes service account token, specified in
|
320
318
|
seconds or as a Go duration format string.
|
321
319
|
"""
|
322
|
-
|
323
|
-
__args__['backend'] = backend
|
324
|
-
__args__['clusterRoleBinding'] = cluster_role_binding
|
325
|
-
__args__['kubernetesNamespace'] = kubernetes_namespace
|
326
|
-
__args__['namespace'] = namespace
|
327
|
-
__args__['role'] = role
|
328
|
-
__args__['ttl'] = ttl
|
329
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
330
|
-
__ret__ = pulumi.runtime.invoke_output('vault:kubernetes/getServiceAccountToken:getServiceAccountToken', __args__, opts=opts, typ=GetServiceAccountTokenResult)
|
331
|
-
return __ret__.apply(lambda __response__: GetServiceAccountTokenResult(
|
332
|
-
backend=pulumi.get(__response__, 'backend'),
|
333
|
-
cluster_role_binding=pulumi.get(__response__, 'cluster_role_binding'),
|
334
|
-
id=pulumi.get(__response__, 'id'),
|
335
|
-
kubernetes_namespace=pulumi.get(__response__, 'kubernetes_namespace'),
|
336
|
-
lease_duration=pulumi.get(__response__, 'lease_duration'),
|
337
|
-
lease_id=pulumi.get(__response__, 'lease_id'),
|
338
|
-
lease_renewable=pulumi.get(__response__, 'lease_renewable'),
|
339
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
340
|
-
role=pulumi.get(__response__, 'role'),
|
341
|
-
service_account_name=pulumi.get(__response__, 'service_account_name'),
|
342
|
-
service_account_namespace=pulumi.get(__response__, 'service_account_namespace'),
|
343
|
-
service_account_token=pulumi.get(__response__, 'service_account_token'),
|
344
|
-
ttl=pulumi.get(__response__, 'ttl')))
|
320
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendArgs', 'SecretBackend']
|
@@ -36,7 +31,7 @@ class SecretBackendArgs:
|
|
36
31
|
local: Optional[pulumi.Input[bool]] = None,
|
37
32
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
38
33
|
namespace: Optional[pulumi.Input[str]] = None,
|
39
|
-
options: Optional[pulumi.Input[Mapping[str,
|
34
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
40
35
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
41
36
|
plugin_version: Optional[pulumi.Input[str]] = None,
|
42
37
|
seal_wrap: Optional[pulumi.Input[bool]] = None,
|
@@ -69,7 +64,7 @@ class SecretBackendArgs:
|
|
69
64
|
The value should not contain leading or trailing forward slashes.
|
70
65
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
71
66
|
*Available only for Vault Enterprise*.
|
72
|
-
:param pulumi.Input[Mapping[str,
|
67
|
+
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
73
68
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
74
69
|
:param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
75
70
|
:param pulumi.Input[bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
@@ -336,14 +331,14 @@ class SecretBackendArgs:
|
|
336
331
|
|
337
332
|
@property
|
338
333
|
@pulumi.getter
|
339
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str,
|
334
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
340
335
|
"""
|
341
336
|
Specifies mount type specific options that are passed to the backend
|
342
337
|
"""
|
343
338
|
return pulumi.get(self, "options")
|
344
339
|
|
345
340
|
@options.setter
|
346
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str,
|
341
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
347
342
|
pulumi.set(self, "options", value)
|
348
343
|
|
349
344
|
@property
|
@@ -417,7 +412,7 @@ class _SecretBackendState:
|
|
417
412
|
local: Optional[pulumi.Input[bool]] = None,
|
418
413
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
419
414
|
namespace: Optional[pulumi.Input[str]] = None,
|
420
|
-
options: Optional[pulumi.Input[Mapping[str,
|
415
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
421
416
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
422
417
|
path: Optional[pulumi.Input[str]] = None,
|
423
418
|
plugin_version: Optional[pulumi.Input[str]] = None,
|
@@ -451,7 +446,7 @@ class _SecretBackendState:
|
|
451
446
|
The value should not contain leading or trailing forward slashes.
|
452
447
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
453
448
|
*Available only for Vault Enterprise*.
|
454
|
-
:param pulumi.Input[Mapping[str,
|
449
|
+
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
455
450
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
456
451
|
:param pulumi.Input[str] path: Where the secret backend will be mounted
|
457
452
|
:param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
@@ -722,14 +717,14 @@ class _SecretBackendState:
|
|
722
717
|
|
723
718
|
@property
|
724
719
|
@pulumi.getter
|
725
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str,
|
720
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
726
721
|
"""
|
727
722
|
Specifies mount type specific options that are passed to the backend
|
728
723
|
"""
|
729
724
|
return pulumi.get(self, "options")
|
730
725
|
|
731
726
|
@options.setter
|
732
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str,
|
727
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
733
728
|
pulumi.set(self, "options", value)
|
734
729
|
|
735
730
|
@property
|
@@ -816,7 +811,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
816
811
|
local: Optional[pulumi.Input[bool]] = None,
|
817
812
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
818
813
|
namespace: Optional[pulumi.Input[str]] = None,
|
819
|
-
options: Optional[pulumi.Input[Mapping[str,
|
814
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
820
815
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
821
816
|
path: Optional[pulumi.Input[str]] = None,
|
822
817
|
plugin_version: Optional[pulumi.Input[str]] = None,
|
@@ -877,7 +872,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
877
872
|
The value should not contain leading or trailing forward slashes.
|
878
873
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
879
874
|
*Available only for Vault Enterprise*.
|
880
|
-
:param pulumi.Input[Mapping[str,
|
875
|
+
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
881
876
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
882
877
|
:param pulumi.Input[str] path: Where the secret backend will be mounted
|
883
878
|
:param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
@@ -950,7 +945,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
950
945
|
local: Optional[pulumi.Input[bool]] = None,
|
951
946
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
952
947
|
namespace: Optional[pulumi.Input[str]] = None,
|
953
|
-
options: Optional[pulumi.Input[Mapping[str,
|
948
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
954
949
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
955
950
|
path: Optional[pulumi.Input[str]] = None,
|
956
951
|
plugin_version: Optional[pulumi.Input[str]] = None,
|
@@ -1019,7 +1014,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1019
1014
|
local: Optional[pulumi.Input[bool]] = None,
|
1020
1015
|
max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
|
1021
1016
|
namespace: Optional[pulumi.Input[str]] = None,
|
1022
|
-
options: Optional[pulumi.Input[Mapping[str,
|
1017
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
1023
1018
|
passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
1024
1019
|
path: Optional[pulumi.Input[str]] = None,
|
1025
1020
|
plugin_version: Optional[pulumi.Input[str]] = None,
|
@@ -1058,7 +1053,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1058
1053
|
The value should not contain leading or trailing forward slashes.
|
1059
1054
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1060
1055
|
*Available only for Vault Enterprise*.
|
1061
|
-
:param pulumi.Input[Mapping[str,
|
1056
|
+
:param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
|
1062
1057
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
|
1063
1058
|
:param pulumi.Input[str] path: Where the secret backend will be mounted
|
1064
1059
|
:param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
|
@@ -1243,7 +1238,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1243
1238
|
|
1244
1239
|
@property
|
1245
1240
|
@pulumi.getter
|
1246
|
-
def options(self) -> pulumi.Output[Optional[Mapping[str,
|
1241
|
+
def options(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
|
1247
1242
|
"""
|
1248
1243
|
Specifies mount type specific options that are passed to the backend
|
1249
1244
|
"""
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendRoleArgs', 'SecretBackendRole']
|
pulumi_vault/kv/_inputs.py
CHANGED
@@ -4,57 +4,25 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
18
13
|
'SecretV2CustomMetadataArgs',
|
19
|
-
'SecretV2CustomMetadataArgsDict',
|
20
14
|
]
|
21
15
|
|
22
|
-
MYPY = False
|
23
|
-
|
24
|
-
if not MYPY:
|
25
|
-
class SecretV2CustomMetadataArgsDict(TypedDict):
|
26
|
-
cas_required: NotRequired[pulumi.Input[bool]]
|
27
|
-
"""
|
28
|
-
If true, all keys will require the cas parameter to be set on all write requests.
|
29
|
-
"""
|
30
|
-
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
31
|
-
"""
|
32
|
-
A mapping whose keys are the top-level data keys returned from
|
33
|
-
Vault and whose values are the corresponding values. This map can only
|
34
|
-
represent string data, so any non-string values returned from Vault are
|
35
|
-
serialized as JSON.
|
36
|
-
"""
|
37
|
-
delete_version_after: NotRequired[pulumi.Input[int]]
|
38
|
-
"""
|
39
|
-
If set, specifies the length of time before a version is deleted.
|
40
|
-
"""
|
41
|
-
max_versions: NotRequired[pulumi.Input[int]]
|
42
|
-
"""
|
43
|
-
The number of versions to keep per key.
|
44
|
-
"""
|
45
|
-
elif False:
|
46
|
-
SecretV2CustomMetadataArgsDict: TypeAlias = Mapping[str, Any]
|
47
|
-
|
48
16
|
@pulumi.input_type
|
49
17
|
class SecretV2CustomMetadataArgs:
|
50
18
|
def __init__(__self__, *,
|
51
19
|
cas_required: Optional[pulumi.Input[bool]] = None,
|
52
|
-
data: Optional[pulumi.Input[Mapping[str,
|
20
|
+
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
53
21
|
delete_version_after: Optional[pulumi.Input[int]] = None,
|
54
22
|
max_versions: Optional[pulumi.Input[int]] = None):
|
55
23
|
"""
|
56
24
|
:param pulumi.Input[bool] cas_required: If true, all keys will require the cas parameter to be set on all write requests.
|
57
|
-
:param pulumi.Input[Mapping[str,
|
25
|
+
:param pulumi.Input[Mapping[str, Any]] data: A mapping whose keys are the top-level data keys returned from
|
58
26
|
Vault and whose values are the corresponding values. This map can only
|
59
27
|
represent string data, so any non-string values returned from Vault are
|
60
28
|
serialized as JSON.
|
@@ -84,7 +52,7 @@ class SecretV2CustomMetadataArgs:
|
|
84
52
|
|
85
53
|
@property
|
86
54
|
@pulumi.getter
|
87
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
55
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
88
56
|
"""
|
89
57
|
A mapping whose keys are the top-level data keys returned from
|
90
58
|
Vault and whose values are the corresponding values. This map can only
|
@@ -94,7 +62,7 @@ class SecretV2CustomMetadataArgs:
|
|
94
62
|
return pulumi.get(self, "data")
|
95
63
|
|
96
64
|
@data.setter
|
97
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
65
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
98
66
|
pulumi.set(self, "data", value)
|
99
67
|
|
100
68
|
@property
|
pulumi_vault/kv/get_secret.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -54,7 +49,7 @@ class GetSecretResult:
|
|
54
49
|
|
55
50
|
@property
|
56
51
|
@pulumi.getter
|
57
|
-
def data(self) -> Mapping[str,
|
52
|
+
def data(self) -> Mapping[str, Any]:
|
58
53
|
"""
|
59
54
|
A mapping whose keys are the top-level data keys returned from
|
60
55
|
Vault and whose values are the corresponding values. This map can only
|
@@ -186,6 +181,9 @@ def get_secret(namespace: Optional[str] = None,
|
|
186
181
|
lease_renewable=pulumi.get(__ret__, 'lease_renewable'),
|
187
182
|
namespace=pulumi.get(__ret__, 'namespace'),
|
188
183
|
path=pulumi.get(__ret__, 'path'))
|
184
|
+
|
185
|
+
|
186
|
+
@_utilities.lift_output_func(get_secret)
|
189
187
|
def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
190
188
|
path: Optional[pulumi.Input[str]] = None,
|
191
189
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecretResult]:
|
@@ -224,17 +222,4 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
|
224
222
|
*Available only for Vault Enterprise*.
|
225
223
|
:param str path: Full path of the KV-V1 secret.
|
226
224
|
"""
|
227
|
-
|
228
|
-
__args__['namespace'] = namespace
|
229
|
-
__args__['path'] = path
|
230
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
231
|
-
__ret__ = pulumi.runtime.invoke_output('vault:kv/getSecret:getSecret', __args__, opts=opts, typ=GetSecretResult)
|
232
|
-
return __ret__.apply(lambda __response__: GetSecretResult(
|
233
|
-
data=pulumi.get(__response__, 'data'),
|
234
|
-
data_json=pulumi.get(__response__, 'data_json'),
|
235
|
-
id=pulumi.get(__response__, 'id'),
|
236
|
-
lease_duration=pulumi.get(__response__, 'lease_duration'),
|
237
|
-
lease_id=pulumi.get(__response__, 'lease_id'),
|
238
|
-
lease_renewable=pulumi.get(__response__, 'lease_renewable'),
|
239
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
240
|
-
path=pulumi.get(__response__, 'path')))
|
225
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -57,7 +52,7 @@ class GetSecretSubkeysV2Result:
|
|
57
52
|
|
58
53
|
@property
|
59
54
|
@pulumi.getter
|
60
|
-
def data(self) -> Mapping[str,
|
55
|
+
def data(self) -> Mapping[str, Any]:
|
61
56
|
"""
|
62
57
|
Subkeys for the KV-V2 secret stored as a serialized map of strings.
|
63
58
|
"""
|
@@ -202,6 +197,9 @@ def get_secret_subkeys_v2(depth: Optional[int] = None,
|
|
202
197
|
namespace=pulumi.get(__ret__, 'namespace'),
|
203
198
|
path=pulumi.get(__ret__, 'path'),
|
204
199
|
version=pulumi.get(__ret__, 'version'))
|
200
|
+
|
201
|
+
|
202
|
+
@_utilities.lift_output_func(get_secret_subkeys_v2)
|
205
203
|
def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] = None,
|
206
204
|
mount: Optional[pulumi.Input[str]] = None,
|
207
205
|
name: Optional[pulumi.Input[str]] = None,
|
@@ -255,21 +253,4 @@ def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] =
|
|
255
253
|
:param int version: Specifies the version to return. If not
|
256
254
|
set the latest version is returned.
|
257
255
|
"""
|
258
|
-
|
259
|
-
__args__['depth'] = depth
|
260
|
-
__args__['mount'] = mount
|
261
|
-
__args__['name'] = name
|
262
|
-
__args__['namespace'] = namespace
|
263
|
-
__args__['version'] = version
|
264
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
265
|
-
__ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretSubkeysV2:getSecretSubkeysV2', __args__, opts=opts, typ=GetSecretSubkeysV2Result)
|
266
|
-
return __ret__.apply(lambda __response__: GetSecretSubkeysV2Result(
|
267
|
-
data=pulumi.get(__response__, 'data'),
|
268
|
-
data_json=pulumi.get(__response__, 'data_json'),
|
269
|
-
depth=pulumi.get(__response__, 'depth'),
|
270
|
-
id=pulumi.get(__response__, 'id'),
|
271
|
-
mount=pulumi.get(__response__, 'mount'),
|
272
|
-
name=pulumi.get(__response__, 'name'),
|
273
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
274
|
-
path=pulumi.get(__response__, 'path'),
|
275
|
-
version=pulumi.get(__response__, 'version')))
|
256
|
+
...
|