pulumi-vault 6.4.0__py3-none-any.whl → 6.4.0a1723820369__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -560
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +4 -19
- pulumi_vault/ad/secret_backend.py +0 -5
- pulumi_vault/ad/secret_library.py +0 -5
- pulumi_vault/ad/secret_role.py +0 -5
- pulumi_vault/alicloud/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_login.py +0 -5
- pulumi_vault/approle/auth_backend_role.py +0 -5
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -99
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -17
- pulumi_vault/audit.py +0 -5
- pulumi_vault/audit_request_header.py +0 -5
- pulumi_vault/auth_backend.py +0 -5
- pulumi_vault/aws/auth_backend_cert.py +0 -5
- pulumi_vault/aws/auth_backend_client.py +0 -5
- pulumi_vault/aws/auth_backend_config_identity.py +0 -5
- pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -5
- pulumi_vault/aws/auth_backend_login.py +0 -5
- pulumi_vault/aws/auth_backend_role.py +0 -5
- pulumi_vault/aws/auth_backend_role_tag.py +0 -5
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -5
- pulumi_vault/aws/auth_backend_sts_role.py +0 -5
- pulumi_vault/aws/get_access_credentials.py +4 -31
- pulumi_vault/aws/get_static_access_credentials.py +4 -18
- pulumi_vault/aws/secret_backend.py +0 -5
- pulumi_vault/aws/secret_backend_role.py +0 -5
- pulumi_vault/aws/secret_backend_static_role.py +0 -5
- pulumi_vault/azure/_inputs.py +0 -24
- pulumi_vault/azure/auth_backend_config.py +0 -5
- pulumi_vault/azure/auth_backend_role.py +0 -5
- pulumi_vault/azure/backend.py +0 -5
- pulumi_vault/azure/backend_role.py +0 -5
- pulumi_vault/azure/get_access_credentials.py +4 -36
- pulumi_vault/azure/outputs.py +0 -5
- pulumi_vault/cert_auth_backend_role.py +0 -5
- pulumi_vault/config/__init__.pyi +0 -5
- pulumi_vault/config/_inputs.py +0 -21
- pulumi_vault/config/outputs.py +0 -5
- pulumi_vault/config/ui_custom_message.py +0 -5
- pulumi_vault/config/vars.py +0 -5
- pulumi_vault/consul/secret_backend.py +0 -5
- pulumi_vault/consul/secret_backend_role.py +0 -5
- pulumi_vault/database/_inputs.py +34 -2185
- pulumi_vault/database/outputs.py +0 -145
- pulumi_vault/database/secret_backend_connection.py +0 -5
- pulumi_vault/database/secret_backend_role.py +0 -5
- pulumi_vault/database/secret_backend_static_role.py +1 -69
- pulumi_vault/database/secrets_mount.py +0 -5
- pulumi_vault/egp_policy.py +0 -5
- pulumi_vault/gcp/_inputs.py +0 -111
- pulumi_vault/gcp/auth_backend.py +0 -5
- pulumi_vault/gcp/auth_backend_role.py +0 -5
- pulumi_vault/gcp/get_auth_backend_role.py +4 -42
- pulumi_vault/gcp/outputs.py +0 -5
- pulumi_vault/gcp/secret_backend.py +0 -5
- pulumi_vault/gcp/secret_impersonated_account.py +3 -62
- pulumi_vault/gcp/secret_roleset.py +0 -5
- pulumi_vault/gcp/secret_static_account.py +0 -5
- pulumi_vault/generic/endpoint.py +0 -5
- pulumi_vault/generic/get_secret.py +4 -24
- pulumi_vault/generic/secret.py +0 -5
- pulumi_vault/get_auth_backend.py +4 -21
- pulumi_vault/get_auth_backends.py +4 -16
- pulumi_vault/get_namespace.py +4 -17
- pulumi_vault/get_namespaces.py +4 -13
- pulumi_vault/get_nomad_access_token.py +4 -18
- pulumi_vault/get_policy_document.py +4 -15
- pulumi_vault/get_raft_autopilot_state.py +4 -23
- pulumi_vault/github/_inputs.py +0 -55
- pulumi_vault/github/auth_backend.py +0 -5
- pulumi_vault/github/outputs.py +0 -5
- pulumi_vault/github/team.py +0 -5
- pulumi_vault/github/user.py +0 -5
- pulumi_vault/identity/entity.py +0 -5
- pulumi_vault/identity/entity_alias.py +0 -5
- pulumi_vault/identity/entity_policies.py +0 -5
- pulumi_vault/identity/get_entity.py +4 -34
- pulumi_vault/identity/get_group.py +4 -40
- pulumi_vault/identity/get_oidc_client_creds.py +4 -16
- pulumi_vault/identity/get_oidc_openid_config.py +4 -26
- pulumi_vault/identity/get_oidc_public_keys.py +4 -15
- pulumi_vault/identity/group.py +0 -5
- pulumi_vault/identity/group_alias.py +0 -5
- pulumi_vault/identity/group_member_entity_ids.py +0 -5
- pulumi_vault/identity/group_member_group_ids.py +0 -5
- pulumi_vault/identity/group_policies.py +0 -5
- pulumi_vault/identity/mfa_duo.py +0 -5
- pulumi_vault/identity/mfa_login_enforcement.py +0 -5
- pulumi_vault/identity/mfa_okta.py +0 -5
- pulumi_vault/identity/mfa_pingid.py +0 -5
- pulumi_vault/identity/mfa_totp.py +0 -5
- pulumi_vault/identity/oidc.py +0 -5
- pulumi_vault/identity/oidc_assignment.py +0 -5
- pulumi_vault/identity/oidc_client.py +0 -5
- pulumi_vault/identity/oidc_key.py +0 -5
- pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -5
- pulumi_vault/identity/oidc_provider.py +0 -5
- pulumi_vault/identity/oidc_role.py +0 -5
- pulumi_vault/identity/oidc_scope.py +0 -5
- pulumi_vault/identity/outputs.py +0 -5
- pulumi_vault/jwt/_inputs.py +0 -55
- pulumi_vault/jwt/auth_backend.py +0 -5
- pulumi_vault/jwt/auth_backend_role.py +0 -5
- pulumi_vault/jwt/outputs.py +0 -5
- pulumi_vault/kmip/secret_backend.py +0 -5
- pulumi_vault/kmip/secret_role.py +0 -5
- pulumi_vault/kmip/secret_scope.py +0 -5
- pulumi_vault/kubernetes/auth_backend_config.py +3 -55
- pulumi_vault/kubernetes/auth_backend_role.py +0 -5
- pulumi_vault/kubernetes/get_auth_backend_config.py +7 -59
- pulumi_vault/kubernetes/get_auth_backend_role.py +4 -39
- pulumi_vault/kubernetes/get_service_account_token.py +4 -28
- pulumi_vault/kubernetes/secret_backend.py +0 -5
- pulumi_vault/kubernetes/secret_backend_role.py +0 -5
- pulumi_vault/kv/_inputs.py +0 -32
- pulumi_vault/kv/get_secret.py +4 -19
- pulumi_vault/kv/get_secret_subkeys_v2.py +4 -23
- pulumi_vault/kv/get_secret_v2.py +6 -25
- pulumi_vault/kv/get_secrets_list.py +4 -15
- pulumi_vault/kv/get_secrets_list_v2.py +4 -18
- pulumi_vault/kv/outputs.py +0 -5
- pulumi_vault/kv/secret.py +0 -5
- pulumi_vault/kv/secret_backend_v2.py +0 -5
- pulumi_vault/kv/secret_v2.py +0 -5
- pulumi_vault/ldap/auth_backend.py +0 -52
- pulumi_vault/ldap/auth_backend_group.py +0 -5
- pulumi_vault/ldap/auth_backend_user.py +0 -5
- pulumi_vault/ldap/get_dynamic_credentials.py +4 -22
- pulumi_vault/ldap/get_static_credentials.py +4 -23
- pulumi_vault/ldap/secret_backend.py +0 -5
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -5
- pulumi_vault/ldap/secret_backend_library_set.py +0 -5
- pulumi_vault/ldap/secret_backend_static_role.py +0 -5
- pulumi_vault/managed/_inputs.py +0 -205
- pulumi_vault/managed/keys.py +0 -5
- pulumi_vault/managed/outputs.py +0 -5
- pulumi_vault/mfa_duo.py +0 -5
- pulumi_vault/mfa_okta.py +0 -5
- pulumi_vault/mfa_pingid.py +0 -5
- pulumi_vault/mfa_totp.py +0 -5
- pulumi_vault/mongodbatlas/secret_backend.py +0 -5
- pulumi_vault/mongodbatlas/secret_role.py +0 -5
- pulumi_vault/mount.py +0 -5
- pulumi_vault/namespace.py +0 -5
- pulumi_vault/nomad_secret_backend.py +0 -5
- pulumi_vault/nomad_secret_role.py +0 -5
- pulumi_vault/okta/_inputs.py +0 -39
- pulumi_vault/okta/auth_backend.py +0 -5
- pulumi_vault/okta/auth_backend_group.py +0 -5
- pulumi_vault/okta/auth_backend_user.py +0 -5
- pulumi_vault/okta/outputs.py +0 -5
- pulumi_vault/outputs.py +0 -5
- pulumi_vault/password_policy.py +0 -5
- pulumi_vault/pkisecret/_inputs.py +0 -41
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -5
- pulumi_vault/pkisecret/backend_config_est.py +0 -5
- pulumi_vault/pkisecret/get_backend_config_est.py +4 -22
- pulumi_vault/pkisecret/get_backend_issuer.py +4 -24
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -17
- pulumi_vault/pkisecret/get_backend_key.py +4 -19
- pulumi_vault/pkisecret/get_backend_keys.py +4 -17
- pulumi_vault/pkisecret/outputs.py +0 -5
- pulumi_vault/pkisecret/secret_backend_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -5
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -5
- pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -5
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -5
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -5
- pulumi_vault/pkisecret/secret_backend_key.py +0 -5
- pulumi_vault/pkisecret/secret_backend_role.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -5
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -5
- pulumi_vault/pkisecret/secret_backend_sign.py +0 -5
- pulumi_vault/plugin.py +0 -5
- pulumi_vault/plugin_pinned_version.py +0 -5
- pulumi_vault/policy.py +0 -5
- pulumi_vault/provider.py +0 -5
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +0 -5
- pulumi_vault/quota_rate_limit.py +0 -5
- pulumi_vault/rabbitmq/_inputs.py +0 -61
- pulumi_vault/rabbitmq/outputs.py +0 -5
- pulumi_vault/rabbitmq/secret_backend.py +0 -5
- pulumi_vault/rabbitmq/secret_backend_role.py +0 -5
- pulumi_vault/raft_autopilot.py +0 -5
- pulumi_vault/raft_snapshot_agent_config.py +0 -5
- pulumi_vault/rgp_policy.py +0 -5
- pulumi_vault/saml/auth_backend.py +0 -5
- pulumi_vault/saml/auth_backend_role.py +0 -5
- pulumi_vault/secrets/_inputs.py +0 -30
- pulumi_vault/secrets/outputs.py +0 -5
- pulumi_vault/secrets/sync_association.py +0 -5
- pulumi_vault/secrets/sync_aws_destination.py +0 -5
- pulumi_vault/secrets/sync_azure_destination.py +0 -5
- pulumi_vault/secrets/sync_config.py +0 -5
- pulumi_vault/secrets/sync_gcp_destination.py +0 -5
- pulumi_vault/secrets/sync_gh_destination.py +0 -5
- pulumi_vault/secrets/sync_github_apps.py +0 -5
- pulumi_vault/secrets/sync_vercel_destination.py +0 -5
- pulumi_vault/ssh/_inputs.py +0 -22
- pulumi_vault/ssh/outputs.py +0 -5
- pulumi_vault/ssh/secret_backend_ca.py +0 -5
- pulumi_vault/ssh/secret_backend_role.py +0 -39
- pulumi_vault/terraformcloud/secret_backend.py +0 -5
- pulumi_vault/terraformcloud/secret_creds.py +0 -5
- pulumi_vault/terraformcloud/secret_role.py +0 -5
- pulumi_vault/token.py +0 -5
- pulumi_vault/tokenauth/auth_backend_role.py +14 -5
- pulumi_vault/transform/alphabet.py +0 -5
- pulumi_vault/transform/get_decode.py +4 -28
- pulumi_vault/transform/get_encode.py +4 -28
- pulumi_vault/transform/role.py +0 -5
- pulumi_vault/transform/template.py +0 -5
- pulumi_vault/transform/transformation.py +0 -5
- pulumi_vault/transit/get_decrypt.py +4 -21
- pulumi_vault/transit/get_encrypt.py +4 -23
- pulumi_vault/transit/secret_backend_key.py +0 -5
- pulumi_vault/transit/secret_cache_config.py +0 -5
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/METADATA +2 -3
- pulumi_vault-6.4.0a1723820369.dist-info/RECORD +256 -0
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/WHEEL +1 -1
- pulumi_vault-6.4.0.dist-info/RECORD +0 -256
- {pulumi_vault-6.4.0.dist-info → pulumi_vault-6.4.0a1723820369.dist-info}/top_level.txt +0 -0
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -26,7 +21,7 @@ class GetAuthBackendConfigResult:
|
|
26
21
|
"""
|
27
22
|
A collection of values returned by getAuthBackendConfig.
|
28
23
|
"""
|
29
|
-
def __init__(__self__, backend=None, disable_iss_validation=None, disable_local_ca_jwt=None, id=None, issuer=None, kubernetes_ca_cert=None, kubernetes_host=None, namespace=None, pem_keys=None
|
24
|
+
def __init__(__self__, backend=None, disable_iss_validation=None, disable_local_ca_jwt=None, id=None, issuer=None, kubernetes_ca_cert=None, kubernetes_host=None, namespace=None, pem_keys=None):
|
30
25
|
if backend and not isinstance(backend, str):
|
31
26
|
raise TypeError("Expected argument 'backend' to be a str")
|
32
27
|
pulumi.set(__self__, "backend", backend)
|
@@ -54,9 +49,6 @@ class GetAuthBackendConfigResult:
|
|
54
49
|
if pem_keys and not isinstance(pem_keys, list):
|
55
50
|
raise TypeError("Expected argument 'pem_keys' to be a list")
|
56
51
|
pulumi.set(__self__, "pem_keys", pem_keys)
|
57
|
-
if use_annotations_as_alias_metadata and not isinstance(use_annotations_as_alias_metadata, bool):
|
58
|
-
raise TypeError("Expected argument 'use_annotations_as_alias_metadata' to be a bool")
|
59
|
-
pulumi.set(__self__, "use_annotations_as_alias_metadata", use_annotations_as_alias_metadata)
|
60
52
|
|
61
53
|
@property
|
62
54
|
@pulumi.getter
|
@@ -66,17 +58,11 @@ class GetAuthBackendConfigResult:
|
|
66
58
|
@property
|
67
59
|
@pulumi.getter(name="disableIssValidation")
|
68
60
|
def disable_iss_validation(self) -> bool:
|
69
|
-
"""
|
70
|
-
(Optional) Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
71
|
-
"""
|
72
61
|
return pulumi.get(self, "disable_iss_validation")
|
73
62
|
|
74
63
|
@property
|
75
64
|
@pulumi.getter(name="disableLocalCaJwt")
|
76
65
|
def disable_local_ca_jwt(self) -> bool:
|
77
|
-
"""
|
78
|
-
(Optional) Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
79
|
-
"""
|
80
66
|
return pulumi.get(self, "disable_local_ca_jwt")
|
81
67
|
|
82
68
|
@property
|
@@ -124,14 +110,6 @@ class GetAuthBackendConfigResult:
|
|
124
110
|
"""
|
125
111
|
return pulumi.get(self, "pem_keys")
|
126
112
|
|
127
|
-
@property
|
128
|
-
@pulumi.getter(name="useAnnotationsAsAliasMetadata")
|
129
|
-
def use_annotations_as_alias_metadata(self) -> bool:
|
130
|
-
"""
|
131
|
-
(Optional) Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
|
132
|
-
"""
|
133
|
-
return pulumi.get(self, "use_annotations_as_alias_metadata")
|
134
|
-
|
135
113
|
|
136
114
|
class AwaitableGetAuthBackendConfigResult(GetAuthBackendConfigResult):
|
137
115
|
# pylint: disable=using-constant-test
|
@@ -147,8 +125,7 @@ class AwaitableGetAuthBackendConfigResult(GetAuthBackendConfigResult):
|
|
147
125
|
kubernetes_ca_cert=self.kubernetes_ca_cert,
|
148
126
|
kubernetes_host=self.kubernetes_host,
|
149
127
|
namespace=self.namespace,
|
150
|
-
pem_keys=self.pem_keys
|
151
|
-
use_annotations_as_alias_metadata=self.use_annotations_as_alias_metadata)
|
128
|
+
pem_keys=self.pem_keys)
|
152
129
|
|
153
130
|
|
154
131
|
def get_auth_backend_config(backend: Optional[str] = None,
|
@@ -159,7 +136,6 @@ def get_auth_backend_config(backend: Optional[str] = None,
|
|
159
136
|
kubernetes_host: Optional[str] = None,
|
160
137
|
namespace: Optional[str] = None,
|
161
138
|
pem_keys: Optional[Sequence[str]] = None,
|
162
|
-
use_annotations_as_alias_metadata: Optional[bool] = None,
|
163
139
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetAuthBackendConfigResult:
|
164
140
|
"""
|
165
141
|
Reads the Role of an Kubernetes from a Vault server. See the [Vault
|
@@ -169,8 +145,6 @@ def get_auth_backend_config(backend: Optional[str] = None,
|
|
169
145
|
|
170
146
|
:param str backend: The unique name for the Kubernetes backend the config to
|
171
147
|
retrieve Role attributes for resides in. Defaults to "kubernetes".
|
172
|
-
:param bool disable_iss_validation: (Optional) Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
173
|
-
:param bool disable_local_ca_jwt: (Optional) Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
174
148
|
:param str issuer: Optional JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
|
175
149
|
:param str kubernetes_ca_cert: PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
|
176
150
|
:param str kubernetes_host: Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
|
@@ -179,7 +153,6 @@ def get_auth_backend_config(backend: Optional[str] = None,
|
|
179
153
|
The `namespace` is always relative to the provider's configured namespace.
|
180
154
|
*Available only for Vault Enterprise*.
|
181
155
|
:param Sequence[str] pem_keys: Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
|
182
|
-
:param bool use_annotations_as_alias_metadata: (Optional) Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
|
183
156
|
"""
|
184
157
|
__args__ = dict()
|
185
158
|
__args__['backend'] = backend
|
@@ -190,7 +163,6 @@ def get_auth_backend_config(backend: Optional[str] = None,
|
|
190
163
|
__args__['kubernetesHost'] = kubernetes_host
|
191
164
|
__args__['namespace'] = namespace
|
192
165
|
__args__['pemKeys'] = pem_keys
|
193
|
-
__args__['useAnnotationsAsAliasMetadata'] = use_annotations_as_alias_metadata
|
194
166
|
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
195
167
|
__ret__ = pulumi.runtime.invoke('vault:kubernetes/getAuthBackendConfig:getAuthBackendConfig', __args__, opts=opts, typ=GetAuthBackendConfigResult).value
|
196
168
|
|
@@ -203,8 +175,10 @@ def get_auth_backend_config(backend: Optional[str] = None,
|
|
203
175
|
kubernetes_ca_cert=pulumi.get(__ret__, 'kubernetes_ca_cert'),
|
204
176
|
kubernetes_host=pulumi.get(__ret__, 'kubernetes_host'),
|
205
177
|
namespace=pulumi.get(__ret__, 'namespace'),
|
206
|
-
pem_keys=pulumi.get(__ret__, 'pem_keys')
|
207
|
-
|
178
|
+
pem_keys=pulumi.get(__ret__, 'pem_keys'))
|
179
|
+
|
180
|
+
|
181
|
+
@_utilities.lift_output_func(get_auth_backend_config)
|
208
182
|
def get_auth_backend_config_output(backend: Optional[pulumi.Input[Optional[str]]] = None,
|
209
183
|
disable_iss_validation: Optional[pulumi.Input[Optional[bool]]] = None,
|
210
184
|
disable_local_ca_jwt: Optional[pulumi.Input[Optional[bool]]] = None,
|
@@ -213,7 +187,6 @@ def get_auth_backend_config_output(backend: Optional[pulumi.Input[Optional[str]]
|
|
213
187
|
kubernetes_host: Optional[pulumi.Input[Optional[str]]] = None,
|
214
188
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
215
189
|
pem_keys: Optional[pulumi.Input[Optional[Sequence[str]]]] = None,
|
216
|
-
use_annotations_as_alias_metadata: Optional[pulumi.Input[Optional[bool]]] = None,
|
217
190
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetAuthBackendConfigResult]:
|
218
191
|
"""
|
219
192
|
Reads the Role of an Kubernetes from a Vault server. See the [Vault
|
@@ -223,8 +196,6 @@ def get_auth_backend_config_output(backend: Optional[pulumi.Input[Optional[str]]
|
|
223
196
|
|
224
197
|
:param str backend: The unique name for the Kubernetes backend the config to
|
225
198
|
retrieve Role attributes for resides in. Defaults to "kubernetes".
|
226
|
-
:param bool disable_iss_validation: (Optional) Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
227
|
-
:param bool disable_local_ca_jwt: (Optional) Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault `v1.5.4+` or Vault auth kubernetes plugin `v0.7.1+`
|
228
199
|
:param str issuer: Optional JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
|
229
200
|
:param str kubernetes_ca_cert: PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
|
230
201
|
:param str kubernetes_host: Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
|
@@ -233,28 +204,5 @@ def get_auth_backend_config_output(backend: Optional[pulumi.Input[Optional[str]]
|
|
233
204
|
The `namespace` is always relative to the provider's configured namespace.
|
234
205
|
*Available only for Vault Enterprise*.
|
235
206
|
:param Sequence[str] pem_keys: Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
|
236
|
-
:param bool use_annotations_as_alias_metadata: (Optional) Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault `v1.16+` or Vault auth kubernetes plugin `v0.18.0+`
|
237
207
|
"""
|
238
|
-
|
239
|
-
__args__['backend'] = backend
|
240
|
-
__args__['disableIssValidation'] = disable_iss_validation
|
241
|
-
__args__['disableLocalCaJwt'] = disable_local_ca_jwt
|
242
|
-
__args__['issuer'] = issuer
|
243
|
-
__args__['kubernetesCaCert'] = kubernetes_ca_cert
|
244
|
-
__args__['kubernetesHost'] = kubernetes_host
|
245
|
-
__args__['namespace'] = namespace
|
246
|
-
__args__['pemKeys'] = pem_keys
|
247
|
-
__args__['useAnnotationsAsAliasMetadata'] = use_annotations_as_alias_metadata
|
248
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
249
|
-
__ret__ = pulumi.runtime.invoke_output('vault:kubernetes/getAuthBackendConfig:getAuthBackendConfig', __args__, opts=opts, typ=GetAuthBackendConfigResult)
|
250
|
-
return __ret__.apply(lambda __response__: GetAuthBackendConfigResult(
|
251
|
-
backend=pulumi.get(__response__, 'backend'),
|
252
|
-
disable_iss_validation=pulumi.get(__response__, 'disable_iss_validation'),
|
253
|
-
disable_local_ca_jwt=pulumi.get(__response__, 'disable_local_ca_jwt'),
|
254
|
-
id=pulumi.get(__response__, 'id'),
|
255
|
-
issuer=pulumi.get(__response__, 'issuer'),
|
256
|
-
kubernetes_ca_cert=pulumi.get(__response__, 'kubernetes_ca_cert'),
|
257
|
-
kubernetes_host=pulumi.get(__response__, 'kubernetes_host'),
|
258
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
259
|
-
pem_keys=pulumi.get(__response__, 'pem_keys'),
|
260
|
-
use_annotations_as_alias_metadata=pulumi.get(__response__, 'use_annotations_as_alias_metadata')))
|
208
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -341,6 +336,9 @@ def get_auth_backend_role(audience: Optional[str] = None,
|
|
341
336
|
token_policies=pulumi.get(__ret__, 'token_policies'),
|
342
337
|
token_ttl=pulumi.get(__ret__, 'token_ttl'),
|
343
338
|
token_type=pulumi.get(__ret__, 'token_type'))
|
339
|
+
|
340
|
+
|
341
|
+
@_utilities.lift_output_func(get_auth_backend_role)
|
344
342
|
def get_auth_backend_role_output(audience: Optional[pulumi.Input[Optional[str]]] = None,
|
345
343
|
backend: Optional[pulumi.Input[Optional[str]]] = None,
|
346
344
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
@@ -397,37 +395,4 @@ def get_auth_backend_role_output(audience: Optional[pulumi.Input[Optional[str]]]
|
|
397
395
|
`default-service` and `default-batch` which specify the type to return unless the client
|
398
396
|
requests a different type at generation time.
|
399
397
|
"""
|
400
|
-
|
401
|
-
__args__['audience'] = audience
|
402
|
-
__args__['backend'] = backend
|
403
|
-
__args__['namespace'] = namespace
|
404
|
-
__args__['roleName'] = role_name
|
405
|
-
__args__['tokenBoundCidrs'] = token_bound_cidrs
|
406
|
-
__args__['tokenExplicitMaxTtl'] = token_explicit_max_ttl
|
407
|
-
__args__['tokenMaxTtl'] = token_max_ttl
|
408
|
-
__args__['tokenNoDefaultPolicy'] = token_no_default_policy
|
409
|
-
__args__['tokenNumUses'] = token_num_uses
|
410
|
-
__args__['tokenPeriod'] = token_period
|
411
|
-
__args__['tokenPolicies'] = token_policies
|
412
|
-
__args__['tokenTtl'] = token_ttl
|
413
|
-
__args__['tokenType'] = token_type
|
414
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
415
|
-
__ret__ = pulumi.runtime.invoke_output('vault:kubernetes/getAuthBackendRole:getAuthBackendRole', __args__, opts=opts, typ=GetAuthBackendRoleResult)
|
416
|
-
return __ret__.apply(lambda __response__: GetAuthBackendRoleResult(
|
417
|
-
alias_name_source=pulumi.get(__response__, 'alias_name_source'),
|
418
|
-
audience=pulumi.get(__response__, 'audience'),
|
419
|
-
backend=pulumi.get(__response__, 'backend'),
|
420
|
-
bound_service_account_names=pulumi.get(__response__, 'bound_service_account_names'),
|
421
|
-
bound_service_account_namespaces=pulumi.get(__response__, 'bound_service_account_namespaces'),
|
422
|
-
id=pulumi.get(__response__, 'id'),
|
423
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
424
|
-
role_name=pulumi.get(__response__, 'role_name'),
|
425
|
-
token_bound_cidrs=pulumi.get(__response__, 'token_bound_cidrs'),
|
426
|
-
token_explicit_max_ttl=pulumi.get(__response__, 'token_explicit_max_ttl'),
|
427
|
-
token_max_ttl=pulumi.get(__response__, 'token_max_ttl'),
|
428
|
-
token_no_default_policy=pulumi.get(__response__, 'token_no_default_policy'),
|
429
|
-
token_num_uses=pulumi.get(__response__, 'token_num_uses'),
|
430
|
-
token_period=pulumi.get(__response__, 'token_period'),
|
431
|
-
token_policies=pulumi.get(__response__, 'token_policies'),
|
432
|
-
token_ttl=pulumi.get(__response__, 'token_ttl'),
|
433
|
-
token_type=pulumi.get(__response__, 'token_type')))
|
398
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -259,6 +254,9 @@ def get_service_account_token(backend: Optional[str] = None,
|
|
259
254
|
service_account_namespace=pulumi.get(__ret__, 'service_account_namespace'),
|
260
255
|
service_account_token=pulumi.get(__ret__, 'service_account_token'),
|
261
256
|
ttl=pulumi.get(__ret__, 'ttl'))
|
257
|
+
|
258
|
+
|
259
|
+
@_utilities.lift_output_func(get_service_account_token)
|
262
260
|
def get_service_account_token_output(backend: Optional[pulumi.Input[str]] = None,
|
263
261
|
cluster_role_binding: Optional[pulumi.Input[Optional[bool]]] = None,
|
264
262
|
kubernetes_namespace: Optional[pulumi.Input[str]] = None,
|
@@ -319,26 +317,4 @@ def get_service_account_token_output(backend: Optional[pulumi.Input[str]] = None
|
|
319
317
|
:param str ttl: The TTL of the generated Kubernetes service account token, specified in
|
320
318
|
seconds or as a Go duration format string.
|
321
319
|
"""
|
322
|
-
|
323
|
-
__args__['backend'] = backend
|
324
|
-
__args__['clusterRoleBinding'] = cluster_role_binding
|
325
|
-
__args__['kubernetesNamespace'] = kubernetes_namespace
|
326
|
-
__args__['namespace'] = namespace
|
327
|
-
__args__['role'] = role
|
328
|
-
__args__['ttl'] = ttl
|
329
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
330
|
-
__ret__ = pulumi.runtime.invoke_output('vault:kubernetes/getServiceAccountToken:getServiceAccountToken', __args__, opts=opts, typ=GetServiceAccountTokenResult)
|
331
|
-
return __ret__.apply(lambda __response__: GetServiceAccountTokenResult(
|
332
|
-
backend=pulumi.get(__response__, 'backend'),
|
333
|
-
cluster_role_binding=pulumi.get(__response__, 'cluster_role_binding'),
|
334
|
-
id=pulumi.get(__response__, 'id'),
|
335
|
-
kubernetes_namespace=pulumi.get(__response__, 'kubernetes_namespace'),
|
336
|
-
lease_duration=pulumi.get(__response__, 'lease_duration'),
|
337
|
-
lease_id=pulumi.get(__response__, 'lease_id'),
|
338
|
-
lease_renewable=pulumi.get(__response__, 'lease_renewable'),
|
339
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
340
|
-
role=pulumi.get(__response__, 'role'),
|
341
|
-
service_account_name=pulumi.get(__response__, 'service_account_name'),
|
342
|
-
service_account_namespace=pulumi.get(__response__, 'service_account_namespace'),
|
343
|
-
service_account_token=pulumi.get(__response__, 'service_account_token'),
|
344
|
-
ttl=pulumi.get(__response__, 'ttl')))
|
320
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendArgs', 'SecretBackend']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendRoleArgs', 'SecretBackendRole']
|
pulumi_vault/kv/_inputs.py
CHANGED
@@ -4,47 +4,15 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
18
13
|
'SecretV2CustomMetadataArgs',
|
19
|
-
'SecretV2CustomMetadataArgsDict',
|
20
14
|
]
|
21
15
|
|
22
|
-
MYPY = False
|
23
|
-
|
24
|
-
if not MYPY:
|
25
|
-
class SecretV2CustomMetadataArgsDict(TypedDict):
|
26
|
-
cas_required: NotRequired[pulumi.Input[bool]]
|
27
|
-
"""
|
28
|
-
If true, all keys will require the cas parameter to be set on all write requests.
|
29
|
-
"""
|
30
|
-
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
31
|
-
"""
|
32
|
-
A mapping whose keys are the top-level data keys returned from
|
33
|
-
Vault and whose values are the corresponding values. This map can only
|
34
|
-
represent string data, so any non-string values returned from Vault are
|
35
|
-
serialized as JSON.
|
36
|
-
"""
|
37
|
-
delete_version_after: NotRequired[pulumi.Input[int]]
|
38
|
-
"""
|
39
|
-
If set, specifies the length of time before a version is deleted.
|
40
|
-
"""
|
41
|
-
max_versions: NotRequired[pulumi.Input[int]]
|
42
|
-
"""
|
43
|
-
The number of versions to keep per key.
|
44
|
-
"""
|
45
|
-
elif False:
|
46
|
-
SecretV2CustomMetadataArgsDict: TypeAlias = Mapping[str, Any]
|
47
|
-
|
48
16
|
@pulumi.input_type
|
49
17
|
class SecretV2CustomMetadataArgs:
|
50
18
|
def __init__(__self__, *,
|
pulumi_vault/kv/get_secret.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -186,6 +181,9 @@ def get_secret(namespace: Optional[str] = None,
|
|
186
181
|
lease_renewable=pulumi.get(__ret__, 'lease_renewable'),
|
187
182
|
namespace=pulumi.get(__ret__, 'namespace'),
|
188
183
|
path=pulumi.get(__ret__, 'path'))
|
184
|
+
|
185
|
+
|
186
|
+
@_utilities.lift_output_func(get_secret)
|
189
187
|
def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
190
188
|
path: Optional[pulumi.Input[str]] = None,
|
191
189
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecretResult]:
|
@@ -224,17 +222,4 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
|
224
222
|
*Available only for Vault Enterprise*.
|
225
223
|
:param str path: Full path of the KV-V1 secret.
|
226
224
|
"""
|
227
|
-
|
228
|
-
__args__['namespace'] = namespace
|
229
|
-
__args__['path'] = path
|
230
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
231
|
-
__ret__ = pulumi.runtime.invoke_output('vault:kv/getSecret:getSecret', __args__, opts=opts, typ=GetSecretResult)
|
232
|
-
return __ret__.apply(lambda __response__: GetSecretResult(
|
233
|
-
data=pulumi.get(__response__, 'data'),
|
234
|
-
data_json=pulumi.get(__response__, 'data_json'),
|
235
|
-
id=pulumi.get(__response__, 'id'),
|
236
|
-
lease_duration=pulumi.get(__response__, 'lease_duration'),
|
237
|
-
lease_id=pulumi.get(__response__, 'lease_id'),
|
238
|
-
lease_renewable=pulumi.get(__response__, 'lease_renewable'),
|
239
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
240
|
-
path=pulumi.get(__response__, 'path')))
|
225
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -202,6 +197,9 @@ def get_secret_subkeys_v2(depth: Optional[int] = None,
|
|
202
197
|
namespace=pulumi.get(__ret__, 'namespace'),
|
203
198
|
path=pulumi.get(__ret__, 'path'),
|
204
199
|
version=pulumi.get(__ret__, 'version'))
|
200
|
+
|
201
|
+
|
202
|
+
@_utilities.lift_output_func(get_secret_subkeys_v2)
|
205
203
|
def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] = None,
|
206
204
|
mount: Optional[pulumi.Input[str]] = None,
|
207
205
|
name: Optional[pulumi.Input[str]] = None,
|
@@ -255,21 +253,4 @@ def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] =
|
|
255
253
|
:param int version: Specifies the version to return. If not
|
256
254
|
set the latest version is returned.
|
257
255
|
"""
|
258
|
-
|
259
|
-
__args__['depth'] = depth
|
260
|
-
__args__['mount'] = mount
|
261
|
-
__args__['name'] = name
|
262
|
-
__args__['namespace'] = namespace
|
263
|
-
__args__['version'] = version
|
264
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
265
|
-
__ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretSubkeysV2:getSecretSubkeysV2', __args__, opts=opts, typ=GetSecretSubkeysV2Result)
|
266
|
-
return __ret__.apply(lambda __response__: GetSecretSubkeysV2Result(
|
267
|
-
data=pulumi.get(__response__, 'data'),
|
268
|
-
data_json=pulumi.get(__response__, 'data_json'),
|
269
|
-
depth=pulumi.get(__response__, 'depth'),
|
270
|
-
id=pulumi.get(__response__, 'id'),
|
271
|
-
mount=pulumi.get(__response__, 'mount'),
|
272
|
-
name=pulumi.get(__response__, 'name'),
|
273
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
274
|
-
path=pulumi.get(__response__, 'path'),
|
275
|
-
version=pulumi.get(__response__, 'version')))
|
256
|
+
...
|
pulumi_vault/kv/get_secret_v2.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -199,6 +194,7 @@ def get_secret_v2(mount: Optional[str] = None,
|
|
199
194
|
example_secret_v2 = vault.kv.SecretV2("example",
|
200
195
|
mount=kvv2.path,
|
201
196
|
name="secret",
|
197
|
+
cas=1,
|
202
198
|
delete_all_versions=True,
|
203
199
|
data_json=json.dumps({
|
204
200
|
"zip": "zap",
|
@@ -245,6 +241,9 @@ def get_secret_v2(mount: Optional[str] = None,
|
|
245
241
|
namespace=pulumi.get(__ret__, 'namespace'),
|
246
242
|
path=pulumi.get(__ret__, 'path'),
|
247
243
|
version=pulumi.get(__ret__, 'version'))
|
244
|
+
|
245
|
+
|
246
|
+
@_utilities.lift_output_func(get_secret_v2)
|
248
247
|
def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
249
248
|
name: Optional[pulumi.Input[str]] = None,
|
250
249
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
@@ -268,6 +267,7 @@ def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
|
268
267
|
example_secret_v2 = vault.kv.SecretV2("example",
|
269
268
|
mount=kvv2.path,
|
270
269
|
name="secret",
|
270
|
+
cas=1,
|
271
271
|
delete_all_versions=True,
|
272
272
|
data_json=json.dumps({
|
273
273
|
"zip": "zap",
|
@@ -293,23 +293,4 @@ def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
|
293
293
|
*Available only for Vault Enterprise*.
|
294
294
|
:param int version: Version of the secret to retrieve.
|
295
295
|
"""
|
296
|
-
|
297
|
-
__args__['mount'] = mount
|
298
|
-
__args__['name'] = name
|
299
|
-
__args__['namespace'] = namespace
|
300
|
-
__args__['version'] = version
|
301
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
302
|
-
__ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretV2:getSecretV2', __args__, opts=opts, typ=GetSecretV2Result)
|
303
|
-
return __ret__.apply(lambda __response__: GetSecretV2Result(
|
304
|
-
created_time=pulumi.get(__response__, 'created_time'),
|
305
|
-
custom_metadata=pulumi.get(__response__, 'custom_metadata'),
|
306
|
-
data=pulumi.get(__response__, 'data'),
|
307
|
-
data_json=pulumi.get(__response__, 'data_json'),
|
308
|
-
deletion_time=pulumi.get(__response__, 'deletion_time'),
|
309
|
-
destroyed=pulumi.get(__response__, 'destroyed'),
|
310
|
-
id=pulumi.get(__response__, 'id'),
|
311
|
-
mount=pulumi.get(__response__, 'mount'),
|
312
|
-
name=pulumi.get(__response__, 'name'),
|
313
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
314
|
-
path=pulumi.get(__response__, 'path'),
|
315
|
-
version=pulumi.get(__response__, 'version')))
|
296
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -132,6 +127,9 @@ def get_secrets_list(namespace: Optional[str] = None,
|
|
132
127
|
names=pulumi.get(__ret__, 'names'),
|
133
128
|
namespace=pulumi.get(__ret__, 'namespace'),
|
134
129
|
path=pulumi.get(__ret__, 'path'))
|
130
|
+
|
131
|
+
|
132
|
+
@_utilities.lift_output_func(get_secrets_list)
|
135
133
|
def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
136
134
|
path: Optional[pulumi.Input[str]] = None,
|
137
135
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecretsListResult]:
|
@@ -174,13 +172,4 @@ def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
|
|
174
172
|
*Available only for Vault Enterprise*.
|
175
173
|
:param str path: Full KV-V1 path where secrets will be listed.
|
176
174
|
"""
|
177
|
-
|
178
|
-
__args__['namespace'] = namespace
|
179
|
-
__args__['path'] = path
|
180
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
181
|
-
__ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretsList:getSecretsList', __args__, opts=opts, typ=GetSecretsListResult)
|
182
|
-
return __ret__.apply(lambda __response__: GetSecretsListResult(
|
183
|
-
id=pulumi.get(__response__, 'id'),
|
184
|
-
names=pulumi.get(__response__, 'names'),
|
185
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
186
|
-
path=pulumi.get(__response__, 'path')))
|
175
|
+
...
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
@@ -171,6 +166,9 @@ def get_secrets_list_v2(mount: Optional[str] = None,
|
|
171
166
|
names=pulumi.get(__ret__, 'names'),
|
172
167
|
namespace=pulumi.get(__ret__, 'namespace'),
|
173
168
|
path=pulumi.get(__ret__, 'path'))
|
169
|
+
|
170
|
+
|
171
|
+
@_utilities.lift_output_func(get_secrets_list_v2)
|
174
172
|
def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
175
173
|
name: Optional[pulumi.Input[Optional[str]]] = None,
|
176
174
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
@@ -228,16 +226,4 @@ def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
|
228
226
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
229
227
|
*Available only for Vault Enterprise*.
|
230
228
|
"""
|
231
|
-
|
232
|
-
__args__['mount'] = mount
|
233
|
-
__args__['name'] = name
|
234
|
-
__args__['namespace'] = namespace
|
235
|
-
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
236
|
-
__ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretsListV2:getSecretsListV2', __args__, opts=opts, typ=GetSecretsListV2Result)
|
237
|
-
return __ret__.apply(lambda __response__: GetSecretsListV2Result(
|
238
|
-
id=pulumi.get(__response__, 'id'),
|
239
|
-
mount=pulumi.get(__response__, 'mount'),
|
240
|
-
name=pulumi.get(__response__, 'name'),
|
241
|
-
names=pulumi.get(__response__, 'names'),
|
242
|
-
namespace=pulumi.get(__response__, 'namespace'),
|
243
|
-
path=pulumi.get(__response__, 'path')))
|
229
|
+
...
|
pulumi_vault/kv/outputs.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = [
|
pulumi_vault/kv/secret.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretArgs', 'Secret']
|
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
|
17
12
|
__all__ = ['SecretBackendV2Args', 'SecretBackendV2']
|
pulumi_vault/kv/secret_v2.py
CHANGED
@@ -4,14 +4,9 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
-
import sys
|
8
7
|
import pulumi
|
9
8
|
import pulumi.runtime
|
10
9
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
-
if sys.version_info >= (3, 11):
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
-
else:
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
15
10
|
from .. import _utilities
|
16
11
|
from . import outputs
|
17
12
|
from ._inputs import *
|