pulumi-vault 6.4.0__py3-none-any.whl → 6.4.0a1723454543__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -560
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +4 -19
- pulumi_vault/ad/secret_backend.py +0 -5
- pulumi_vault/ad/secret_library.py +0 -5
- pulumi_vault/ad/secret_role.py +0 -5
- pulumi_vault/alicloud/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_login.py +0 -5
- pulumi_vault/approle/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -99
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
- pulumi_vault/audit.py +0 -5
- pulumi_vault/audit_request_header.py +0 -5
- pulumi_vault/auth_backend.py +0 -5
- pulumi_vault/aws/auth_backend_cert.py +0 -5
- pulumi_vault/aws/auth_backend_client.py +0 -5
- pulumi_vault/aws/auth_backend_config_identity.py +0 -5
- pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
- pulumi_vault/aws/auth_backend_login.py +7 -12
- pulumi_vault/aws/auth_backend_role.py +0 -5
- pulumi_vault/aws/auth_backend_role_tag.py +0 -5
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
- pulumi_vault/aws/auth_backend_sts_role.py +0 -5
- pulumi_vault/aws/get_access_credentials.py +4 -31
- pulumi_vault/aws/get_static_access_credentials.py +4 -18
- pulumi_vault/aws/secret_backend.py +0 -5
- pulumi_vault/aws/secret_backend_role.py +0 -5
- pulumi_vault/aws/secret_backend_static_role.py +0 -5
- pulumi_vault/azure/_inputs.py +0 -24
- pulumi_vault/azure/auth_backend_config.py +0 -5
- pulumi_vault/azure/auth_backend_role.py +0 -5
- pulumi_vault/azure/backend.py +0 -5
- pulumi_vault/azure/backend_role.py +0 -5
- pulumi_vault/azure/get_access_credentials.py +4 -36
- pulumi_vault/azure/outputs.py +0 -5
- pulumi_vault/cert_auth_backend_role.py +0 -5
- pulumi_vault/config/__init__.pyi +0 -5
- pulumi_vault/config/_inputs.py +0 -21
- pulumi_vault/config/outputs.py +0 -5
- pulumi_vault/config/ui_custom_message.py +14 -19
- pulumi_vault/config/vars.py +0 -5
- pulumi_vault/consul/secret_backend.py +0 -5
- pulumi_vault/consul/secret_backend_role.py +0 -5
- pulumi_vault/database/_inputs.py +105 -2256
- pulumi_vault/database/outputs.py +54 -199
- pulumi_vault/database/secret_backend_connection.py +14 -19
- pulumi_vault/database/secret_backend_role.py +14 -19
- pulumi_vault/database/secret_backend_static_role.py +1 -69
- pulumi_vault/database/secrets_mount.py +14 -19
- pulumi_vault/egp_policy.py +0 -5
- pulumi_vault/gcp/_inputs.py +0 -111
- pulumi_vault/gcp/auth_backend.py +0 -5
- pulumi_vault/gcp/auth_backend_role.py +0 -5
- pulumi_vault/gcp/get_auth_backend_role.py +4 -42
- pulumi_vault/gcp/outputs.py +0 -5
- pulumi_vault/gcp/secret_backend.py +0 -5
- pulumi_vault/gcp/secret_impersonated_account.py +3 -62
- pulumi_vault/gcp/secret_roleset.py +0 -5
- pulumi_vault/gcp/secret_static_account.py +0 -5
- pulumi_vault/generic/endpoint.py +0 -5
- pulumi_vault/generic/get_secret.py +5 -25
- pulumi_vault/generic/secret.py +7 -12
- pulumi_vault/get_auth_backend.py +4 -21
- pulumi_vault/get_auth_backends.py +4 -16
- pulumi_vault/get_namespace.py +5 -18
- pulumi_vault/get_namespaces.py +4 -13
- pulumi_vault/get_nomad_access_token.py +8 -28
- pulumi_vault/get_policy_document.py +4 -15
- pulumi_vault/get_raft_autopilot_state.py +7 -26
- pulumi_vault/github/_inputs.py +0 -55
- pulumi_vault/github/auth_backend.py +0 -5
- pulumi_vault/github/outputs.py +0 -5
- pulumi_vault/github/team.py +0 -5
- pulumi_vault/github/user.py +0 -5
- pulumi_vault/identity/entity.py +0 -5
- pulumi_vault/identity/entity_alias.py +0 -5
- pulumi_vault/identity/entity_policies.py +0 -5
- pulumi_vault/identity/get_entity.py +5 -35
- pulumi_vault/identity/get_group.py +6 -42
- pulumi_vault/identity/get_oidc_client_creds.py +4 -16
- pulumi_vault/identity/get_oidc_openid_config.py +4 -26
- pulumi_vault/identity/get_oidc_public_keys.py +5 -16
- pulumi_vault/identity/group.py +0 -5
- pulumi_vault/identity/group_alias.py +0 -5
- pulumi_vault/identity/group_member_entity_ids.py +0 -5
- pulumi_vault/identity/group_member_group_ids.py +0 -5
- pulumi_vault/identity/group_policies.py +0 -5
- pulumi_vault/identity/mfa_duo.py +0 -5
- pulumi_vault/identity/mfa_login_enforcement.py +0 -5
- pulumi_vault/identity/mfa_okta.py +0 -5
- pulumi_vault/identity/mfa_pingid.py +0 -5
- pulumi_vault/identity/mfa_totp.py +0 -5
- pulumi_vault/identity/oidc.py +0 -5
- pulumi_vault/identity/oidc_assignment.py +0 -5
- pulumi_vault/identity/oidc_client.py +0 -5
- pulumi_vault/identity/oidc_key.py +0 -5
- pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
- pulumi_vault/identity/oidc_provider.py +0 -5
- pulumi_vault/identity/oidc_role.py +0 -5
- pulumi_vault/identity/oidc_scope.py +0 -5
- pulumi_vault/identity/outputs.py +3 -8
- pulumi_vault/jwt/_inputs.py +0 -55
- pulumi_vault/jwt/auth_backend.py +0 -5
- pulumi_vault/jwt/auth_backend_role.py +28 -33
- pulumi_vault/jwt/outputs.py +0 -5
- pulumi_vault/kmip/secret_backend.py +0 -5
- pulumi_vault/kmip/secret_role.py +0 -5
- pulumi_vault/kmip/secret_scope.py +0 -5
- pulumi_vault/kubernetes/auth_backend_config.py +3 -55
- pulumi_vault/kubernetes/auth_backend_role.py +0 -5
- pulumi_vault/kubernetes/get_auth_backend_config.py +7 -59
- pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
- pulumi_vault/kubernetes/get_service_account_token.py +4 -28
- pulumi_vault/kubernetes/secret_backend.py +14 -19
- pulumi_vault/kubernetes/secret_backend_role.py +0 -5
- pulumi_vault/kv/_inputs.py +4 -36
- pulumi_vault/kv/get_secret.py +5 -20
- pulumi_vault/kv/get_secret_subkeys_v2.py +5 -24
- pulumi_vault/kv/get_secret_v2.py +8 -27
- pulumi_vault/kv/get_secrets_list.py +4 -15
- pulumi_vault/kv/get_secrets_list_v2.py +4 -18
- pulumi_vault/kv/outputs.py +3 -8
- pulumi_vault/kv/secret.py +7 -12
- pulumi_vault/kv/secret_backend_v2.py +0 -5
- pulumi_vault/kv/secret_v2.py +28 -33
- pulumi_vault/ldap/auth_backend.py +0 -52
- pulumi_vault/ldap/auth_backend_group.py +0 -5
- pulumi_vault/ldap/auth_backend_user.py +0 -5
- pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
- pulumi_vault/ldap/get_static_credentials.py +4 -23
- pulumi_vault/ldap/secret_backend.py +14 -19
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
- pulumi_vault/ldap/secret_backend_library_set.py +0 -5
- pulumi_vault/ldap/secret_backend_static_role.py +0 -5
- pulumi_vault/managed/_inputs.py +0 -205
- pulumi_vault/managed/keys.py +0 -5
- pulumi_vault/managed/outputs.py +0 -5
- pulumi_vault/mfa_duo.py +0 -5
- pulumi_vault/mfa_okta.py +0 -5
- pulumi_vault/mfa_pingid.py +0 -5
- pulumi_vault/mfa_totp.py +0 -5
- pulumi_vault/mongodbatlas/secret_backend.py +0 -5
- pulumi_vault/mongodbatlas/secret_role.py +0 -5
- pulumi_vault/mount.py +16 -21
- pulumi_vault/namespace.py +14 -19
- pulumi_vault/nomad_secret_backend.py +0 -5
- pulumi_vault/nomad_secret_role.py +0 -5
- pulumi_vault/okta/_inputs.py +0 -39
- pulumi_vault/okta/auth_backend.py +0 -5
- pulumi_vault/okta/auth_backend_group.py +0 -5
- pulumi_vault/okta/auth_backend_user.py +0 -5
- pulumi_vault/okta/outputs.py +0 -5
- pulumi_vault/outputs.py +0 -5
- pulumi_vault/password_policy.py +0 -5
- pulumi_vault/pkisecret/_inputs.py +8 -49
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
- pulumi_vault/pkisecret/backend_config_est.py +14 -19
- pulumi_vault/pkisecret/get_backend_config_est.py +5 -23
- pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
- pulumi_vault/pkisecret/get_backend_issuers.py +5 -18
- pulumi_vault/pkisecret/get_backend_key.py +4 -19
- pulumi_vault/pkisecret/get_backend_keys.py +5 -18
- pulumi_vault/pkisecret/outputs.py +12 -17
- pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
- pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
- pulumi_vault/pkisecret/secret_backend_key.py +0 -5
- pulumi_vault/pkisecret/secret_backend_role.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
- pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
- pulumi_vault/plugin.py +0 -5
- pulumi_vault/plugin_pinned_version.py +0 -5
- pulumi_vault/policy.py +0 -5
- pulumi_vault/provider.py +0 -5
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +0 -5
- pulumi_vault/quota_rate_limit.py +0 -5
- pulumi_vault/rabbitmq/_inputs.py +0 -61
- pulumi_vault/rabbitmq/outputs.py +0 -5
- pulumi_vault/rabbitmq/secret_backend.py +0 -5
- pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
- pulumi_vault/raft_autopilot.py +0 -5
- pulumi_vault/raft_snapshot_agent_config.py +0 -5
- pulumi_vault/rgp_policy.py +0 -5
- pulumi_vault/saml/auth_backend.py +0 -5
- pulumi_vault/saml/auth_backend_role.py +14 -19
- pulumi_vault/secrets/_inputs.py +0 -30
- pulumi_vault/secrets/outputs.py +0 -5
- pulumi_vault/secrets/sync_association.py +0 -5
- pulumi_vault/secrets/sync_aws_destination.py +14 -19
- pulumi_vault/secrets/sync_azure_destination.py +14 -19
- pulumi_vault/secrets/sync_config.py +0 -5
- pulumi_vault/secrets/sync_gcp_destination.py +14 -19
- pulumi_vault/secrets/sync_gh_destination.py +0 -5
- pulumi_vault/secrets/sync_github_apps.py +0 -5
- pulumi_vault/secrets/sync_vercel_destination.py +0 -5
- pulumi_vault/ssh/_inputs.py +0 -22
- pulumi_vault/ssh/outputs.py +0 -5
- pulumi_vault/ssh/secret_backend_ca.py +0 -5
- pulumi_vault/ssh/secret_backend_role.py +28 -67
- pulumi_vault/terraformcloud/secret_backend.py +0 -5
- pulumi_vault/terraformcloud/secret_creds.py +0 -5
- pulumi_vault/terraformcloud/secret_role.py +0 -5
- pulumi_vault/token.py +0 -5
- pulumi_vault/tokenauth/auth_backend_role.py +14 -5
- pulumi_vault/transform/alphabet.py +0 -5
- pulumi_vault/transform/get_decode.py +14 -38
- pulumi_vault/transform/get_encode.py +14 -38
- pulumi_vault/transform/role.py +0 -5
- pulumi_vault/transform/template.py +14 -19
- pulumi_vault/transform/transformation.py +0 -5
- pulumi_vault/transit/get_decrypt.py +4 -21
- pulumi_vault/transit/get_encrypt.py +4 -23
- pulumi_vault/transit/secret_backend_key.py +7 -12
- pulumi_vault/transit/secret_cache_config.py +0 -5
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/METADATA +2 -3
- pulumi_vault-6.4.0a1723454543.dist-info/RECORD +256 -0
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/WHEEL +1 -1
- pulumi_vault-6.4.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723454543.dist-info}/top_level.txt +0 -0
pulumi_vault/kv/get_secret_v2.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -74,7 +69,7 @@ class GetSecretV2Result:
|
|
74
69
|
|
75
70
|
@property
|
76
71
|
@pulumi.getter(name="customMetadata")
|
77
|
-
def custom_metadata(self) -> Mapping[str,
|
72
|
+
def custom_metadata(self) -> Mapping[str, Any]:
|
78
73
|
"""
|
79
74
|
Custom metadata for the secret.
|
80
75
|
"""
|
@@ -82,7 +77,7 @@ class GetSecretV2Result:
|
|
82
77
|
|
83
78
|
@property
|
84
79
|
@pulumi.getter
|
85
|
-
def data(self) -> Mapping[str,
|
80
|
+
def data(self) -> Mapping[str, Any]:
|
86
81
|
"""
|
87
82
|
A mapping whose keys are the top-level data keys returned from
|
88
83
|
Vault and whose values are the corresponding values. This map can only
|
@@ -199,6 +194,7 @@ def get_secret_v2(mount: Optional[str] = None,
|
|
199
194
|
example_secret_v2 = vault.kv.SecretV2("example",
|
200
195
|
mount=kvv2.path,
|
201
196
|
name="secret",
|
197
|
+
cas=1,
|
202
198
|
delete_all_versions=True,
|
203
199
|
data_json=json.dumps({
|
204
200
|
"zip": "zap",
|
@@ -245,6 +241,9 @@ def get_secret_v2(mount: Optional[str] = None,
|
|
245
241
|
namespace=pulumi.get(__ret__, 'namespace'),
|
246
242
|
path=pulumi.get(__ret__, 'path'),
|
247
243
|
version=pulumi.get(__ret__, 'version'))
|
244
|
+
|
245
|
+
|
246
|
+
@_utilities.lift_output_func(get_secret_v2)
|
248
247
|
def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
249
248
|
name: Optional[pulumi.Input[str]] = None,
|
250
249
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
@@ -268,6 +267,7 @@ def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
|
268
267
|
example_secret_v2 = vault.kv.SecretV2("example",
|
269
268
|
mount=kvv2.path,
|
270
269
|
name="secret",
|
270
|
+
cas=1,
|
271
271
|
delete_all_versions=True,
|
272
272
|
data_json=json.dumps({
|
273
273
|
"zip": "zap",
|
@@ -293,23 +293,4 @@ def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
|
293
293
|
*Available only for Vault Enterprise*.
|
294
294
|
:param int version: Version of the secret to retrieve.
|
295
295
|
"""
|
296
|
-
|
297
|
-
__args__['mount'] = mount
|
298
|
-
__args__['name'] = name
|
299
|
-
__args__['namespace'] = namespace
|
300
|
-
__args__['version'] = version
|
301
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
302
|
-
__ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretV2:getSecretV2', __args__, opts=opts, typ=GetSecretV2Result)
|
303
|
-
return __ret__.apply(lambda __response__: GetSecretV2Result(
|
304
|
-
created_time=pulumi.get(__response__, 'created_time'),
|
305
|
-
custom_metadata=pulumi.get(__response__, 'custom_metadata'),
|
306
|
-
data=pulumi.get(__response__, 'data'),
|
307
|
-
data_json=pulumi.get(__response__, 'data_json'),
|
308
|
-
deletion_time=pulumi.get(__response__, 'deletion_time'),
|
309
|
-
destroyed=pulumi.get(__response__, 'destroyed'),
|
310
|
-
id=pulumi.get(__response__, 'id'),
|
311
|
-
mount=pulumi.get(__response__, 'mount'),
|
312
|
-
name=pulumi.get(__response__, 'name'),
|
313
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
314
|
-
path=pulumi.get(__response__, 'path'),
|
315
|
-
version=pulumi.get(__response__, 'version')))
|
296
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -132,6 +127,9 @@ def get_secrets_list(namespace: Optional[str] = None,
|
|
132
127
|
names=pulumi.get(__ret__, 'names'),
|
133
128
|
namespace=pulumi.get(__ret__, 'namespace'),
|
134
129
|
path=pulumi.get(__ret__, 'path'))
|
130
|
+
|
131
|
+
|
132
|
+
@_utilities.lift_output_func(get_secrets_list)
|
135
133
|
def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
136
134
|
path: Optional[pulumi.Input[str]] = None,
|
137
135
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecretsListResult]:
|
@@ -174,13 +172,4 @@ def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
|
|
174
172
|
*Available only for Vault Enterprise*.
|
175
173
|
:param str path: Full KV-V1 path where secrets will be listed.
|
176
174
|
"""
|
177
|
-
|
178
|
-
__args__['namespace'] = namespace
|
179
|
-
__args__['path'] = path
|
180
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
181
|
-
__ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretsList:getSecretsList', __args__, opts=opts, typ=GetSecretsListResult)
|
182
|
-
return __ret__.apply(lambda __response__: GetSecretsListResult(
|
183
|
-
id=pulumi.get(__response__, 'id'),
|
184
|
-
names=pulumi.get(__response__, 'names'),
|
185
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
186
|
-
path=pulumi.get(__response__, 'path')))
|
175
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -171,6 +166,9 @@ def get_secrets_list_v2(mount: Optional[str] = None,
|
|
171
166
|
names=pulumi.get(__ret__, 'names'),
|
172
167
|
namespace=pulumi.get(__ret__, 'namespace'),
|
173
168
|
path=pulumi.get(__ret__, 'path'))
|
169
|
+
|
170
|
+
|
171
|
+
@_utilities.lift_output_func(get_secrets_list_v2)
|
174
172
|
def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
175
173
|
name: Optional[pulumi.Input[Optional[str]]] = None,
|
176
174
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
@@ -228,16 +226,4 @@ def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
|
228
226
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
229
227
|
*Available only for Vault Enterprise*.
|
230
228
|
"""
|
231
|
-
|
232
|
-
__args__['mount'] = mount
|
233
|
-
__args__['name'] = name
|
234
|
-
__args__['namespace'] = namespace
|
235
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
236
|
-
__ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretsListV2:getSecretsListV2', __args__, opts=opts, typ=GetSecretsListV2Result)
|
237
|
-
return __ret__.apply(lambda __response__: GetSecretsListV2Result(
|
238
|
-
id=pulumi.get(__response__, 'id'),
|
239
|
-
mount=pulumi.get(__response__, 'mount'),
|
240
|
-
name=pulumi.get(__response__, 'name'),
|
241
|
-
names=pulumi.get(__response__, 'names'),
|
242
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
243
|
-
path=pulumi.get(__response__, 'path')))
|
229
|
+
...
|
pulumi_vault/kv/outputs.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -43,12 +38,12 @@ class SecretV2CustomMetadata(dict):
|
|
43
38
|
|
44
39
|
def __init__(__self__, *,
|
45
40
|
cas_required: Optional[bool] = None,
|
46
|
-
data: Optional[Mapping[str,
|
41
|
+
data: Optional[Mapping[str, Any]] = None,
|
47
42
|
delete_version_after: Optional[int] = None,
|
48
43
|
max_versions: Optional[int] = None):
|
49
44
|
"""
|
50
45
|
:param bool cas_required: If true, all keys will require the cas parameter to be set on all write requests.
|
51
|
-
:param Mapping[str,
|
46
|
+
:param Mapping[str, Any] data: A mapping whose keys are the top-level data keys returned from
|
52
47
|
Vault and whose values are the corresponding values. This map can only
|
53
48
|
represent string data, so any non-string values returned from Vault are
|
54
49
|
serialized as JSON.
|
@@ -74,7 +69,7 @@ class SecretV2CustomMetadata(dict):
|
|
74
69
|
|
75
70
|
@property
|
76
71
|
@pulumi.getter
|
77
|
-
def data(self) -> Optional[Mapping[str,
|
72
|
+
def data(self) -> Optional[Mapping[str, Any]]:
|
78
73
|
"""
|
79
74
|
A mapping whose keys are the top-level data keys returned from
|
80
75
|
Vault and whose values are the corresponding values. This map can only
|
pulumi_vault/kv/secret.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretArgs', 'Secret']
|
@@ -81,13 +76,13 @@ class SecretArgs:
|
|
81
76
|
@pulumi.input_type
|
82
77
|
class _SecretState:
|
83
78
|
def __init__(__self__, *,
|
84
|
-
data: Optional[pulumi.Input[Mapping[str,
|
79
|
+
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
85
80
|
data_json: Optional[pulumi.Input[str]] = None,
|
86
81
|
namespace: Optional[pulumi.Input[str]] = None,
|
87
82
|
path: Optional[pulumi.Input[str]] = None):
|
88
83
|
"""
|
89
84
|
Input properties used for looking up and filtering Secret resources.
|
90
|
-
:param pulumi.Input[Mapping[str,
|
85
|
+
:param pulumi.Input[Mapping[str, Any]] data: A mapping whose keys are the top-level data keys returned from
|
91
86
|
Vault and whose values are the corresponding values. This map can only
|
92
87
|
represent string data, so any non-string values returned from Vault are
|
93
88
|
serialized as JSON.
|
@@ -110,7 +105,7 @@ class _SecretState:
|
|
110
105
|
|
111
106
|
@property
|
112
107
|
@pulumi.getter
|
113
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
108
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
114
109
|
"""
|
115
110
|
A mapping whose keys are the top-level data keys returned from
|
116
111
|
Vault and whose values are the corresponding values. This map can only
|
@@ -120,7 +115,7 @@ class _SecretState:
|
|
120
115
|
return pulumi.get(self, "data")
|
121
116
|
|
122
117
|
@data.setter
|
123
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
118
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
124
119
|
pulumi.set(self, "data", value)
|
125
120
|
|
126
121
|
@property
|
@@ -322,7 +317,7 @@ class Secret(pulumi.CustomResource):
|
|
322
317
|
def get(resource_name: str,
|
323
318
|
id: pulumi.Input[str],
|
324
319
|
opts: Optional[pulumi.ResourceOptions] = None,
|
325
|
-
data: Optional[pulumi.Input[Mapping[str,
|
320
|
+
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
326
321
|
data_json: Optional[pulumi.Input[str]] = None,
|
327
322
|
namespace: Optional[pulumi.Input[str]] = None,
|
328
323
|
path: Optional[pulumi.Input[str]] = None) -> 'Secret':
|
@@ -333,7 +328,7 @@ class Secret(pulumi.CustomResource):
|
|
333
328
|
:param str resource_name: The unique name of the resulting resource.
|
334
329
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
335
330
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
336
|
-
:param pulumi.Input[Mapping[str,
|
331
|
+
:param pulumi.Input[Mapping[str, Any]] data: A mapping whose keys are the top-level data keys returned from
|
337
332
|
Vault and whose values are the corresponding values. This map can only
|
338
333
|
represent string data, so any non-string values returned from Vault are
|
339
334
|
serialized as JSON.
|
@@ -357,7 +352,7 @@ class Secret(pulumi.CustomResource):
|
|
357
352
|
|
358
353
|
@property
|
359
354
|
@pulumi.getter
|
360
|
-
def data(self) -> pulumi.Output[Mapping[str,
|
355
|
+
def data(self) -> pulumi.Output[Mapping[str, Any]]:
|
361
356
|
"""
|
362
357
|
A mapping whose keys are the top-level data keys returned from
|
363
358
|
Vault and whose values are the corresponding values. This map can only
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendV2Args', 'SecretBackendV2']
|
pulumi_vault/kv/secret_v2.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
from . import outputs
|
17
12
|
from ._inputs import *
|
@@ -29,7 +24,7 @@ class SecretV2Args:
|
|
29
24
|
disable_read: Optional[pulumi.Input[bool]] = None,
|
30
25
|
name: Optional[pulumi.Input[str]] = None,
|
31
26
|
namespace: Optional[pulumi.Input[str]] = None,
|
32
|
-
options: Optional[pulumi.Input[Mapping[str,
|
27
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None):
|
33
28
|
"""
|
34
29
|
The set of arguments for constructing a SecretV2 resource.
|
35
30
|
:param pulumi.Input[str] data_json: JSON-encoded string that will be
|
@@ -54,7 +49,7 @@ class SecretV2Args:
|
|
54
49
|
The value should not contain leading or trailing forward slashes.
|
55
50
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
56
51
|
*Available only for Vault Enterprise*.
|
57
|
-
:param pulumi.Input[Mapping[str,
|
52
|
+
:param pulumi.Input[Mapping[str, Any]] options: An object that holds option settings.
|
58
53
|
"""
|
59
54
|
pulumi.set(__self__, "data_json", data_json)
|
60
55
|
pulumi.set(__self__, "mount", mount)
|
@@ -185,14 +180,14 @@ class SecretV2Args:
|
|
185
180
|
|
186
181
|
@property
|
187
182
|
@pulumi.getter
|
188
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str,
|
183
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
189
184
|
"""
|
190
185
|
An object that holds option settings.
|
191
186
|
"""
|
192
187
|
return pulumi.get(self, "options")
|
193
188
|
|
194
189
|
@options.setter
|
195
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str,
|
190
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
196
191
|
pulumi.set(self, "options", value)
|
197
192
|
|
198
193
|
|
@@ -201,15 +196,15 @@ class _SecretV2State:
|
|
201
196
|
def __init__(__self__, *,
|
202
197
|
cas: Optional[pulumi.Input[int]] = None,
|
203
198
|
custom_metadata: Optional[pulumi.Input['SecretV2CustomMetadataArgs']] = None,
|
204
|
-
data: Optional[pulumi.Input[Mapping[str,
|
199
|
+
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
205
200
|
data_json: Optional[pulumi.Input[str]] = None,
|
206
201
|
delete_all_versions: Optional[pulumi.Input[bool]] = None,
|
207
202
|
disable_read: Optional[pulumi.Input[bool]] = None,
|
208
|
-
metadata: Optional[pulumi.Input[Mapping[str,
|
203
|
+
metadata: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
209
204
|
mount: Optional[pulumi.Input[str]] = None,
|
210
205
|
name: Optional[pulumi.Input[str]] = None,
|
211
206
|
namespace: Optional[pulumi.Input[str]] = None,
|
212
|
-
options: Optional[pulumi.Input[Mapping[str,
|
207
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
213
208
|
path: Optional[pulumi.Input[str]] = None):
|
214
209
|
"""
|
215
210
|
Input properties used for looking up and filtering SecretV2 resources.
|
@@ -220,7 +215,7 @@ class _SecretV2State:
|
|
220
215
|
:param pulumi.Input['SecretV2CustomMetadataArgs'] custom_metadata: A nested block that allows configuring metadata for the
|
221
216
|
KV secret. Refer to the
|
222
217
|
Configuration Options for more info.
|
223
|
-
:param pulumi.Input[Mapping[str,
|
218
|
+
:param pulumi.Input[Mapping[str, Any]] data: A mapping whose keys are the top-level data keys returned from
|
224
219
|
Vault and whose values are the corresponding values. This map can only
|
225
220
|
represent string data, so any non-string values returned from Vault are
|
226
221
|
serialized as JSON.
|
@@ -230,7 +225,7 @@ class _SecretV2State:
|
|
230
225
|
versions for the specified key.
|
231
226
|
:param pulumi.Input[bool] disable_read: If set to true, disables reading secret from Vault;
|
232
227
|
note: drift won't be detected.
|
233
|
-
:param pulumi.Input[Mapping[str,
|
228
|
+
:param pulumi.Input[Mapping[str, Any]] metadata: Metadata associated with this secret read from Vault.
|
234
229
|
:param pulumi.Input[str] mount: Path where KV-V2 engine is mounted.
|
235
230
|
:param pulumi.Input[str] name: Full name of the secret. For a nested secret
|
236
231
|
the name is the nested path excluding the mount and data
|
@@ -240,7 +235,7 @@ class _SecretV2State:
|
|
240
235
|
The value should not contain leading or trailing forward slashes.
|
241
236
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
242
237
|
*Available only for Vault Enterprise*.
|
243
|
-
:param pulumi.Input[Mapping[str,
|
238
|
+
:param pulumi.Input[Mapping[str, Any]] options: An object that holds option settings.
|
244
239
|
:param pulumi.Input[str] path: Full path where the KV-V2 secret will be written.
|
245
240
|
"""
|
246
241
|
if cas is not None:
|
@@ -299,7 +294,7 @@ class _SecretV2State:
|
|
299
294
|
|
300
295
|
@property
|
301
296
|
@pulumi.getter
|
302
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str,
|
297
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
303
298
|
"""
|
304
299
|
A mapping whose keys are the top-level data keys returned from
|
305
300
|
Vault and whose values are the corresponding values. This map can only
|
@@ -309,7 +304,7 @@ class _SecretV2State:
|
|
309
304
|
return pulumi.get(self, "data")
|
310
305
|
|
311
306
|
@data.setter
|
312
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str,
|
307
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
313
308
|
pulumi.set(self, "data", value)
|
314
309
|
|
315
310
|
@property
|
@@ -353,14 +348,14 @@ class _SecretV2State:
|
|
353
348
|
|
354
349
|
@property
|
355
350
|
@pulumi.getter
|
356
|
-
def metadata(self) -> Optional[pulumi.Input[Mapping[str,
|
351
|
+
def metadata(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
357
352
|
"""
|
358
353
|
Metadata associated with this secret read from Vault.
|
359
354
|
"""
|
360
355
|
return pulumi.get(self, "metadata")
|
361
356
|
|
362
357
|
@metadata.setter
|
363
|
-
def metadata(self, value: Optional[pulumi.Input[Mapping[str,
|
358
|
+
def metadata(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
364
359
|
pulumi.set(self, "metadata", value)
|
365
360
|
|
366
361
|
@property
|
@@ -407,14 +402,14 @@ class _SecretV2State:
|
|
407
402
|
|
408
403
|
@property
|
409
404
|
@pulumi.getter
|
410
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str,
|
405
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
411
406
|
"""
|
412
407
|
An object that holds option settings.
|
413
408
|
"""
|
414
409
|
return pulumi.get(self, "options")
|
415
410
|
|
416
411
|
@options.setter
|
417
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str,
|
412
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
|
418
413
|
pulumi.set(self, "options", value)
|
419
414
|
|
420
415
|
@property
|
@@ -443,7 +438,7 @@ class SecretV2(pulumi.CustomResource):
|
|
443
438
|
mount: Optional[pulumi.Input[str]] = None,
|
444
439
|
name: Optional[pulumi.Input[str]] = None,
|
445
440
|
namespace: Optional[pulumi.Input[str]] = None,
|
446
|
-
options: Optional[pulumi.Input[Mapping[str,
|
441
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
447
442
|
__props__=None):
|
448
443
|
"""
|
449
444
|
Writes a KV-V2 secret to a given path in Vault.
|
@@ -534,7 +529,7 @@ class SecretV2(pulumi.CustomResource):
|
|
534
529
|
The value should not contain leading or trailing forward slashes.
|
535
530
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
536
531
|
*Available only for Vault Enterprise*.
|
537
|
-
:param pulumi.Input[Mapping[str,
|
532
|
+
:param pulumi.Input[Mapping[str, Any]] options: An object that holds option settings.
|
538
533
|
"""
|
539
534
|
...
|
540
535
|
@overload
|
@@ -630,7 +625,7 @@ class SecretV2(pulumi.CustomResource):
|
|
630
625
|
mount: Optional[pulumi.Input[str]] = None,
|
631
626
|
name: Optional[pulumi.Input[str]] = None,
|
632
627
|
namespace: Optional[pulumi.Input[str]] = None,
|
633
|
-
options: Optional[pulumi.Input[Mapping[str,
|
628
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
634
629
|
__props__=None):
|
635
630
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
636
631
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -670,15 +665,15 @@ class SecretV2(pulumi.CustomResource):
|
|
670
665
|
opts: Optional[pulumi.ResourceOptions] = None,
|
671
666
|
cas: Optional[pulumi.Input[int]] = None,
|
672
667
|
custom_metadata: Optional[pulumi.Input[Union['SecretV2CustomMetadataArgs', 'SecretV2CustomMetadataArgsDict']]] = None,
|
673
|
-
data: Optional[pulumi.Input[Mapping[str,
|
668
|
+
data: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
674
669
|
data_json: Optional[pulumi.Input[str]] = None,
|
675
670
|
delete_all_versions: Optional[pulumi.Input[bool]] = None,
|
676
671
|
disable_read: Optional[pulumi.Input[bool]] = None,
|
677
|
-
metadata: Optional[pulumi.Input[Mapping[str,
|
672
|
+
metadata: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
678
673
|
mount: Optional[pulumi.Input[str]] = None,
|
679
674
|
name: Optional[pulumi.Input[str]] = None,
|
680
675
|
namespace: Optional[pulumi.Input[str]] = None,
|
681
|
-
options: Optional[pulumi.Input[Mapping[str,
|
676
|
+
options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
682
677
|
path: Optional[pulumi.Input[str]] = None) -> 'SecretV2':
|
683
678
|
"""
|
684
679
|
Get an existing SecretV2 resource's state with the given name, id, and optional extra
|
@@ -694,7 +689,7 @@ class SecretV2(pulumi.CustomResource):
|
|
694
689
|
:param pulumi.Input[Union['SecretV2CustomMetadataArgs', 'SecretV2CustomMetadataArgsDict']] custom_metadata: A nested block that allows configuring metadata for the
|
695
690
|
KV secret. Refer to the
|
696
691
|
Configuration Options for more info.
|
697
|
-
:param pulumi.Input[Mapping[str,
|
692
|
+
:param pulumi.Input[Mapping[str, Any]] data: A mapping whose keys are the top-level data keys returned from
|
698
693
|
Vault and whose values are the corresponding values. This map can only
|
699
694
|
represent string data, so any non-string values returned from Vault are
|
700
695
|
serialized as JSON.
|
@@ -704,7 +699,7 @@ class SecretV2(pulumi.CustomResource):
|
|
704
699
|
versions for the specified key.
|
705
700
|
:param pulumi.Input[bool] disable_read: If set to true, disables reading secret from Vault;
|
706
701
|
note: drift won't be detected.
|
707
|
-
:param pulumi.Input[Mapping[str,
|
702
|
+
:param pulumi.Input[Mapping[str, Any]] metadata: Metadata associated with this secret read from Vault.
|
708
703
|
:param pulumi.Input[str] mount: Path where KV-V2 engine is mounted.
|
709
704
|
:param pulumi.Input[str] name: Full name of the secret. For a nested secret
|
710
705
|
the name is the nested path excluding the mount and data
|
@@ -714,7 +709,7 @@ class SecretV2(pulumi.CustomResource):
|
|
714
709
|
The value should not contain leading or trailing forward slashes.
|
715
710
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
716
711
|
*Available only for Vault Enterprise*.
|
717
|
-
:param pulumi.Input[Mapping[str,
|
712
|
+
:param pulumi.Input[Mapping[str, Any]] options: An object that holds option settings.
|
718
713
|
:param pulumi.Input[str] path: Full path where the KV-V2 secret will be written.
|
719
714
|
"""
|
720
715
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -758,7 +753,7 @@ class SecretV2(pulumi.CustomResource):
|
|
758
753
|
|
759
754
|
@property
|
760
755
|
@pulumi.getter
|
761
|
-
def data(self) -> pulumi.Output[Mapping[str,
|
756
|
+
def data(self) -> pulumi.Output[Mapping[str, Any]]:
|
762
757
|
"""
|
763
758
|
A mapping whose keys are the top-level data keys returned from
|
764
759
|
Vault and whose values are the corresponding values. This map can only
|
@@ -796,7 +791,7 @@ class SecretV2(pulumi.CustomResource):
|
|
796
791
|
|
797
792
|
@property
|
798
793
|
@pulumi.getter
|
799
|
-
def metadata(self) -> pulumi.Output[Mapping[str,
|
794
|
+
def metadata(self) -> pulumi.Output[Mapping[str, Any]]:
|
800
795
|
"""
|
801
796
|
Metadata associated with this secret read from Vault.
|
802
797
|
"""
|
@@ -834,7 +829,7 @@ class SecretV2(pulumi.CustomResource):
|
|
834
829
|
|
835
830
|
@property
|
836
831
|
@pulumi.getter
|
837
|
-
def options(self) -> pulumi.Output[Optional[Mapping[str,
|
832
|
+
def options(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
|
838
833
|
"""
|
839
834
|
An object that holds option settings.
|
840
835
|
"""
|