pulumi-vault 6.4.0a1728108872__py3-none-any.whl → 6.4.0a1729059229__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +19 -4
- pulumi_vault/ad/secret_backend.py +5 -0
- pulumi_vault/ad/secret_library.py +5 -0
- pulumi_vault/ad/secret_role.py +5 -0
- pulumi_vault/alicloud/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_login.py +5 -0
- pulumi_vault/approle/auth_backend_role.py +5 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
- pulumi_vault/audit.py +5 -0
- pulumi_vault/audit_request_header.py +5 -0
- pulumi_vault/auth_backend.py +5 -0
- pulumi_vault/aws/auth_backend_cert.py +5 -0
- pulumi_vault/aws/auth_backend_client.py +5 -0
- pulumi_vault/aws/auth_backend_config_identity.py +5 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
- pulumi_vault/aws/auth_backend_login.py +5 -0
- pulumi_vault/aws/auth_backend_role.py +5 -0
- pulumi_vault/aws/auth_backend_role_tag.py +5 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
- pulumi_vault/aws/auth_backend_sts_role.py +5 -0
- pulumi_vault/aws/get_access_credentials.py +31 -4
- pulumi_vault/aws/get_static_access_credentials.py +18 -4
- pulumi_vault/aws/secret_backend.py +5 -0
- pulumi_vault/aws/secret_backend_role.py +5 -0
- pulumi_vault/aws/secret_backend_static_role.py +5 -0
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +5 -0
- pulumi_vault/azure/auth_backend_role.py +5 -0
- pulumi_vault/azure/backend.py +5 -0
- pulumi_vault/azure/backend_role.py +5 -0
- pulumi_vault/azure/get_access_credentials.py +36 -4
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +5 -0
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +21 -0
- pulumi_vault/config/outputs.py +5 -0
- pulumi_vault/config/ui_custom_message.py +5 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +5 -0
- pulumi_vault/consul/secret_backend_role.py +5 -0
- pulumi_vault/database/_inputs.py +2019 -68
- pulumi_vault/database/outputs.py +5 -0
- pulumi_vault/database/secret_backend_connection.py +5 -0
- pulumi_vault/database/secret_backend_role.py +5 -0
- pulumi_vault/database/secret_backend_static_role.py +5 -0
- pulumi_vault/database/secrets_mount.py +5 -0
- pulumi_vault/egp_policy.py +5 -0
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +5 -0
- pulumi_vault/gcp/auth_backend_role.py +5 -0
- pulumi_vault/gcp/get_auth_backend_role.py +42 -4
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +5 -0
- pulumi_vault/gcp/secret_impersonated_account.py +5 -0
- pulumi_vault/gcp/secret_roleset.py +5 -0
- pulumi_vault/gcp/secret_static_account.py +5 -0
- pulumi_vault/generic/endpoint.py +5 -0
- pulumi_vault/generic/get_secret.py +24 -4
- pulumi_vault/generic/secret.py +5 -0
- pulumi_vault/get_auth_backend.py +21 -4
- pulumi_vault/get_auth_backends.py +16 -4
- pulumi_vault/get_namespace.py +17 -4
- pulumi_vault/get_namespaces.py +13 -4
- pulumi_vault/get_nomad_access_token.py +18 -4
- pulumi_vault/get_policy_document.py +15 -4
- pulumi_vault/get_raft_autopilot_state.py +23 -4
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +5 -0
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +5 -0
- pulumi_vault/github/user.py +5 -0
- pulumi_vault/identity/entity.py +5 -0
- pulumi_vault/identity/entity_alias.py +5 -0
- pulumi_vault/identity/entity_policies.py +5 -0
- pulumi_vault/identity/get_entity.py +34 -4
- pulumi_vault/identity/get_group.py +40 -4
- pulumi_vault/identity/get_oidc_client_creds.py +16 -4
- pulumi_vault/identity/get_oidc_openid_config.py +26 -4
- pulumi_vault/identity/get_oidc_public_keys.py +15 -4
- pulumi_vault/identity/group.py +5 -0
- pulumi_vault/identity/group_alias.py +5 -0
- pulumi_vault/identity/group_member_entity_ids.py +5 -0
- pulumi_vault/identity/group_member_group_ids.py +5 -0
- pulumi_vault/identity/group_policies.py +5 -0
- pulumi_vault/identity/mfa_duo.py +5 -0
- pulumi_vault/identity/mfa_login_enforcement.py +5 -0
- pulumi_vault/identity/mfa_okta.py +5 -0
- pulumi_vault/identity/mfa_pingid.py +5 -0
- pulumi_vault/identity/mfa_totp.py +5 -0
- pulumi_vault/identity/oidc.py +5 -0
- pulumi_vault/identity/oidc_assignment.py +5 -0
- pulumi_vault/identity/oidc_client.py +5 -0
- pulumi_vault/identity/oidc_key.py +5 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
- pulumi_vault/identity/oidc_provider.py +5 -0
- pulumi_vault/identity/oidc_role.py +5 -0
- pulumi_vault/identity/oidc_scope.py +5 -0
- pulumi_vault/identity/outputs.py +5 -0
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +5 -0
- pulumi_vault/jwt/auth_backend_role.py +5 -0
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +5 -0
- pulumi_vault/kmip/secret_role.py +5 -0
- pulumi_vault/kmip/secret_scope.py +5 -0
- pulumi_vault/kubernetes/auth_backend_config.py +5 -0
- pulumi_vault/kubernetes/auth_backend_role.py +5 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
- pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
- pulumi_vault/kubernetes/get_service_account_token.py +28 -4
- pulumi_vault/kubernetes/secret_backend.py +5 -0
- pulumi_vault/kubernetes/secret_backend_role.py +5 -0
- pulumi_vault/kv/_inputs.py +32 -0
- pulumi_vault/kv/get_secret.py +19 -4
- pulumi_vault/kv/get_secret_subkeys_v2.py +23 -4
- pulumi_vault/kv/get_secret_v2.py +25 -4
- pulumi_vault/kv/get_secrets_list.py +15 -4
- pulumi_vault/kv/get_secrets_list_v2.py +18 -4
- pulumi_vault/kv/outputs.py +5 -0
- pulumi_vault/kv/secret.py +5 -0
- pulumi_vault/kv/secret_backend_v2.py +5 -0
- pulumi_vault/kv/secret_v2.py +5 -0
- pulumi_vault/ldap/auth_backend.py +5 -0
- pulumi_vault/ldap/auth_backend_group.py +5 -0
- pulumi_vault/ldap/auth_backend_user.py +5 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
- pulumi_vault/ldap/get_static_credentials.py +23 -4
- pulumi_vault/ldap/secret_backend.py +5 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
- pulumi_vault/ldap/secret_backend_library_set.py +5 -0
- pulumi_vault/ldap/secret_backend_static_role.py +5 -0
- pulumi_vault/managed/_inputs.py +205 -0
- pulumi_vault/managed/keys.py +5 -0
- pulumi_vault/managed/outputs.py +5 -0
- pulumi_vault/mfa_duo.py +5 -0
- pulumi_vault/mfa_okta.py +5 -0
- pulumi_vault/mfa_pingid.py +5 -0
- pulumi_vault/mfa_totp.py +5 -0
- pulumi_vault/mongodbatlas/secret_backend.py +5 -0
- pulumi_vault/mongodbatlas/secret_role.py +5 -0
- pulumi_vault/mount.py +5 -0
- pulumi_vault/namespace.py +5 -0
- pulumi_vault/nomad_secret_backend.py +5 -0
- pulumi_vault/nomad_secret_role.py +5 -0
- pulumi_vault/okta/_inputs.py +39 -0
- pulumi_vault/okta/auth_backend.py +5 -0
- pulumi_vault/okta/auth_backend_group.py +5 -0
- pulumi_vault/okta/auth_backend_user.py +5 -0
- pulumi_vault/okta/outputs.py +5 -0
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +5 -0
- pulumi_vault/pkisecret/_inputs.py +41 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
- pulumi_vault/pkisecret/backend_config_est.py +5 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +22 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
- pulumi_vault/pkisecret/get_backend_issuers.py +17 -4
- pulumi_vault/pkisecret/get_backend_key.py +19 -4
- pulumi_vault/pkisecret/get_backend_keys.py +17 -4
- pulumi_vault/pkisecret/outputs.py +5 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
- pulumi_vault/pkisecret/secret_backend_key.py +5 -0
- pulumi_vault/pkisecret/secret_backend_role.py +5 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
- pulumi_vault/plugin.py +5 -0
- pulumi_vault/plugin_pinned_version.py +5 -0
- pulumi_vault/policy.py +5 -0
- pulumi_vault/provider.py +5 -0
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +5 -0
- pulumi_vault/quota_rate_limit.py +5 -0
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +5 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +5 -0
- pulumi_vault/raft_autopilot.py +5 -0
- pulumi_vault/raft_snapshot_agent_config.py +5 -0
- pulumi_vault/rgp_policy.py +5 -0
- pulumi_vault/saml/auth_backend.py +5 -0
- pulumi_vault/saml/auth_backend_role.py +5 -0
- pulumi_vault/secrets/_inputs.py +30 -0
- pulumi_vault/secrets/outputs.py +5 -0
- pulumi_vault/secrets/sync_association.py +5 -0
- pulumi_vault/secrets/sync_aws_destination.py +5 -0
- pulumi_vault/secrets/sync_azure_destination.py +5 -0
- pulumi_vault/secrets/sync_config.py +5 -0
- pulumi_vault/secrets/sync_gcp_destination.py +5 -0
- pulumi_vault/secrets/sync_gh_destination.py +5 -0
- pulumi_vault/secrets/sync_github_apps.py +5 -0
- pulumi_vault/secrets/sync_vercel_destination.py +5 -0
- pulumi_vault/ssh/_inputs.py +22 -0
- pulumi_vault/ssh/outputs.py +5 -0
- pulumi_vault/ssh/secret_backend_ca.py +5 -0
- pulumi_vault/ssh/secret_backend_role.py +5 -0
- pulumi_vault/terraformcloud/secret_backend.py +5 -0
- pulumi_vault/terraformcloud/secret_creds.py +5 -0
- pulumi_vault/terraformcloud/secret_role.py +5 -0
- pulumi_vault/token.py +5 -0
- pulumi_vault/tokenauth/auth_backend_role.py +5 -0
- pulumi_vault/transform/alphabet.py +5 -0
- pulumi_vault/transform/get_decode.py +28 -4
- pulumi_vault/transform/get_encode.py +28 -4
- pulumi_vault/transform/role.py +5 -0
- pulumi_vault/transform/template.py +5 -0
- pulumi_vault/transform/transformation.py +5 -0
- pulumi_vault/transit/get_decrypt.py +21 -4
- pulumi_vault/transit/get_encrypt.py +23 -4
- pulumi_vault/transit/secret_backend_key.py +5 -0
- pulumi_vault/transit/secret_cache_config.py +5 -0
- {pulumi_vault-6.4.0a1728108872.dist-info → pulumi_vault-6.4.0a1729059229.dist-info}/METADATA +3 -2
- pulumi_vault-6.4.0a1729059229.dist-info/RECORD +256 -0
- pulumi_vault-6.4.0a1728108872.dist-info/RECORD +0 -256
- {pulumi_vault-6.4.0a1728108872.dist-info → pulumi_vault-6.4.0a1729059229.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.4.0a1728108872.dist-info → pulumi_vault-6.4.0a1729059229.dist-info}/top_level.txt +0 -0
pulumi_vault/kv/get_secret.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -181,9 +186,6 @@ def get_secret(namespace: Optional[str] = None,
|
|
181
186
|
lease_renewable=pulumi.get(__ret__, 'lease_renewable'),
|
182
187
|
namespace=pulumi.get(__ret__, 'namespace'),
|
183
188
|
path=pulumi.get(__ret__, 'path'))
|
184
|
-
|
185
|
-
|
186
|
-
@_utilities.lift_output_func(get_secret)
|
187
189
|
def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
188
190
|
path: Optional[pulumi.Input[str]] = None,
|
189
191
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecretResult]:
|
@@ -222,4 +224,17 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
|
222
224
|
*Available only for Vault Enterprise*.
|
223
225
|
:param str path: Full path of the KV-V1 secret.
|
224
226
|
"""
|
225
|
-
|
227
|
+
__args__ = dict()
|
228
|
+
__args__['namespace'] = namespace
|
229
|
+
__args__['path'] = path
|
230
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
231
|
+
__ret__ = pulumi.runtime.invoke_output('vault:kv/getSecret:getSecret', __args__, opts=opts, typ=GetSecretResult)
|
232
|
+
return __ret__.apply(lambda __response__: GetSecretResult(
|
233
|
+
data=pulumi.get(__response__, 'data'),
|
234
|
+
data_json=pulumi.get(__response__, 'data_json'),
|
235
|
+
id=pulumi.get(__response__, 'id'),
|
236
|
+
lease_duration=pulumi.get(__response__, 'lease_duration'),
|
237
|
+
lease_id=pulumi.get(__response__, 'lease_id'),
|
238
|
+
lease_renewable=pulumi.get(__response__, 'lease_renewable'),
|
239
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
240
|
+
path=pulumi.get(__response__, 'path')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -197,9 +202,6 @@ def get_secret_subkeys_v2(depth: Optional[int] = None,
|
|
197
202
|
namespace=pulumi.get(__ret__, 'namespace'),
|
198
203
|
path=pulumi.get(__ret__, 'path'),
|
199
204
|
version=pulumi.get(__ret__, 'version'))
|
200
|
-
|
201
|
-
|
202
|
-
@_utilities.lift_output_func(get_secret_subkeys_v2)
|
203
205
|
def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] = None,
|
204
206
|
mount: Optional[pulumi.Input[str]] = None,
|
205
207
|
name: Optional[pulumi.Input[str]] = None,
|
@@ -253,4 +255,21 @@ def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] =
|
|
253
255
|
:param int version: Specifies the version to return. If not
|
254
256
|
set the latest version is returned.
|
255
257
|
"""
|
256
|
-
|
258
|
+
__args__ = dict()
|
259
|
+
__args__['depth'] = depth
|
260
|
+
__args__['mount'] = mount
|
261
|
+
__args__['name'] = name
|
262
|
+
__args__['namespace'] = namespace
|
263
|
+
__args__['version'] = version
|
264
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
265
|
+
__ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretSubkeysV2:getSecretSubkeysV2', __args__, opts=opts, typ=GetSecretSubkeysV2Result)
|
266
|
+
return __ret__.apply(lambda __response__: GetSecretSubkeysV2Result(
|
267
|
+
data=pulumi.get(__response__, 'data'),
|
268
|
+
data_json=pulumi.get(__response__, 'data_json'),
|
269
|
+
depth=pulumi.get(__response__, 'depth'),
|
270
|
+
id=pulumi.get(__response__, 'id'),
|
271
|
+
mount=pulumi.get(__response__, 'mount'),
|
272
|
+
name=pulumi.get(__response__, 'name'),
|
273
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
274
|
+
path=pulumi.get(__response__, 'path'),
|
275
|
+
version=pulumi.get(__response__, 'version')))
|
pulumi_vault/kv/get_secret_v2.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -241,9 +246,6 @@ def get_secret_v2(mount: Optional[str] = None,
|
|
241
246
|
namespace=pulumi.get(__ret__, 'namespace'),
|
242
247
|
path=pulumi.get(__ret__, 'path'),
|
243
248
|
version=pulumi.get(__ret__, 'version'))
|
244
|
-
|
245
|
-
|
246
|
-
@_utilities.lift_output_func(get_secret_v2)
|
247
249
|
def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
248
250
|
name: Optional[pulumi.Input[str]] = None,
|
249
251
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
@@ -293,4 +295,23 @@ def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
|
293
295
|
*Available only for Vault Enterprise*.
|
294
296
|
:param int version: Version of the secret to retrieve.
|
295
297
|
"""
|
296
|
-
|
298
|
+
__args__ = dict()
|
299
|
+
__args__['mount'] = mount
|
300
|
+
__args__['name'] = name
|
301
|
+
__args__['namespace'] = namespace
|
302
|
+
__args__['version'] = version
|
303
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
304
|
+
__ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretV2:getSecretV2', __args__, opts=opts, typ=GetSecretV2Result)
|
305
|
+
return __ret__.apply(lambda __response__: GetSecretV2Result(
|
306
|
+
created_time=pulumi.get(__response__, 'created_time'),
|
307
|
+
custom_metadata=pulumi.get(__response__, 'custom_metadata'),
|
308
|
+
data=pulumi.get(__response__, 'data'),
|
309
|
+
data_json=pulumi.get(__response__, 'data_json'),
|
310
|
+
deletion_time=pulumi.get(__response__, 'deletion_time'),
|
311
|
+
destroyed=pulumi.get(__response__, 'destroyed'),
|
312
|
+
id=pulumi.get(__response__, 'id'),
|
313
|
+
mount=pulumi.get(__response__, 'mount'),
|
314
|
+
name=pulumi.get(__response__, 'name'),
|
315
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
316
|
+
path=pulumi.get(__response__, 'path'),
|
317
|
+
version=pulumi.get(__response__, 'version')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -127,9 +132,6 @@ def get_secrets_list(namespace: Optional[str] = None,
|
|
127
132
|
names=pulumi.get(__ret__, 'names'),
|
128
133
|
namespace=pulumi.get(__ret__, 'namespace'),
|
129
134
|
path=pulumi.get(__ret__, 'path'))
|
130
|
-
|
131
|
-
|
132
|
-
@_utilities.lift_output_func(get_secrets_list)
|
133
135
|
def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
134
136
|
path: Optional[pulumi.Input[str]] = None,
|
135
137
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecretsListResult]:
|
@@ -172,4 +174,13 @@ def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
|
|
172
174
|
*Available only for Vault Enterprise*.
|
173
175
|
:param str path: Full KV-V1 path where secrets will be listed.
|
174
176
|
"""
|
175
|
-
|
177
|
+
__args__ = dict()
|
178
|
+
__args__['namespace'] = namespace
|
179
|
+
__args__['path'] = path
|
180
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
181
|
+
__ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretsList:getSecretsList', __args__, opts=opts, typ=GetSecretsListResult)
|
182
|
+
return __ret__.apply(lambda __response__: GetSecretsListResult(
|
183
|
+
id=pulumi.get(__response__, 'id'),
|
184
|
+
names=pulumi.get(__response__, 'names'),
|
185
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
186
|
+
path=pulumi.get(__response__, 'path')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -166,9 +171,6 @@ def get_secrets_list_v2(mount: Optional[str] = None,
|
|
166
171
|
names=pulumi.get(__ret__, 'names'),
|
167
172
|
namespace=pulumi.get(__ret__, 'namespace'),
|
168
173
|
path=pulumi.get(__ret__, 'path'))
|
169
|
-
|
170
|
-
|
171
|
-
@_utilities.lift_output_func(get_secrets_list_v2)
|
172
174
|
def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
173
175
|
name: Optional[pulumi.Input[Optional[str]]] = None,
|
174
176
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
@@ -226,4 +228,16 @@ def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
|
226
228
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
227
229
|
*Available only for Vault Enterprise*.
|
228
230
|
"""
|
229
|
-
|
231
|
+
__args__ = dict()
|
232
|
+
__args__['mount'] = mount
|
233
|
+
__args__['name'] = name
|
234
|
+
__args__['namespace'] = namespace
|
235
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
236
|
+
__ret__ = pulumi.runtime.invoke_output('vault:kv/getSecretsListV2:getSecretsListV2', __args__, opts=opts, typ=GetSecretsListV2Result)
|
237
|
+
return __ret__.apply(lambda __response__: GetSecretsListV2Result(
|
238
|
+
id=pulumi.get(__response__, 'id'),
|
239
|
+
mount=pulumi.get(__response__, 'mount'),
|
240
|
+
name=pulumi.get(__response__, 'name'),
|
241
|
+
names=pulumi.get(__response__, 'names'),
|
242
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
243
|
+
path=pulumi.get(__response__, 'path')))
|
pulumi_vault/kv/outputs.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
pulumi_vault/kv/secret.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretArgs', 'Secret']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendV2Args', 'SecretBackendV2']
|
pulumi_vault/kv/secret_v2.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
from . import outputs
|
12
17
|
from ._inputs import *
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AuthBackendArgs', 'AuthBackend']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AuthBackendGroupArgs', 'AuthBackendGroup']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AuthBackendUserArgs', 'AuthBackendUser']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -150,9 +155,6 @@ def get_dynamic_credentials(mount: Optional[str] = None,
|
|
150
155
|
password=pulumi.get(__ret__, 'password'),
|
151
156
|
role_name=pulumi.get(__ret__, 'role_name'),
|
152
157
|
username=pulumi.get(__ret__, 'username'))
|
153
|
-
|
154
|
-
|
155
|
-
@_utilities.lift_output_func(get_dynamic_credentials)
|
156
158
|
def get_dynamic_credentials_output(mount: Optional[pulumi.Input[str]] = None,
|
157
159
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
158
160
|
role_name: Optional[pulumi.Input[str]] = None,
|
@@ -160,4 +162,20 @@ def get_dynamic_credentials_output(mount: Optional[pulumi.Input[str]] = None,
|
|
160
162
|
"""
|
161
163
|
Use this data source to access information about an existing resource.
|
162
164
|
"""
|
163
|
-
|
165
|
+
__args__ = dict()
|
166
|
+
__args__['mount'] = mount
|
167
|
+
__args__['namespace'] = namespace
|
168
|
+
__args__['roleName'] = role_name
|
169
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
170
|
+
__ret__ = pulumi.runtime.invoke_output('vault:ldap/getDynamicCredentials:getDynamicCredentials', __args__, opts=opts, typ=GetDynamicCredentialsResult)
|
171
|
+
return __ret__.apply(lambda __response__: GetDynamicCredentialsResult(
|
172
|
+
distinguished_names=pulumi.get(__response__, 'distinguished_names'),
|
173
|
+
id=pulumi.get(__response__, 'id'),
|
174
|
+
lease_duration=pulumi.get(__response__, 'lease_duration'),
|
175
|
+
lease_id=pulumi.get(__response__, 'lease_id'),
|
176
|
+
lease_renewable=pulumi.get(__response__, 'lease_renewable'),
|
177
|
+
mount=pulumi.get(__response__, 'mount'),
|
178
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
179
|
+
password=pulumi.get(__response__, 'password'),
|
180
|
+
role_name=pulumi.get(__response__, 'role_name'),
|
181
|
+
username=pulumi.get(__response__, 'username')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = [
|
@@ -160,9 +165,6 @@ def get_static_credentials(mount: Optional[str] = None,
|
|
160
165
|
rotation_period=pulumi.get(__ret__, 'rotation_period'),
|
161
166
|
ttl=pulumi.get(__ret__, 'ttl'),
|
162
167
|
username=pulumi.get(__ret__, 'username'))
|
163
|
-
|
164
|
-
|
165
|
-
@_utilities.lift_output_func(get_static_credentials)
|
166
168
|
def get_static_credentials_output(mount: Optional[pulumi.Input[str]] = None,
|
167
169
|
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
168
170
|
role_name: Optional[pulumi.Input[str]] = None,
|
@@ -170,4 +172,21 @@ def get_static_credentials_output(mount: Optional[pulumi.Input[str]] = None,
|
|
170
172
|
"""
|
171
173
|
Use this data source to access information about an existing resource.
|
172
174
|
"""
|
173
|
-
|
175
|
+
__args__ = dict()
|
176
|
+
__args__['mount'] = mount
|
177
|
+
__args__['namespace'] = namespace
|
178
|
+
__args__['roleName'] = role_name
|
179
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
180
|
+
__ret__ = pulumi.runtime.invoke_output('vault:ldap/getStaticCredentials:getStaticCredentials', __args__, opts=opts, typ=GetStaticCredentialsResult)
|
181
|
+
return __ret__.apply(lambda __response__: GetStaticCredentialsResult(
|
182
|
+
dn=pulumi.get(__response__, 'dn'),
|
183
|
+
id=pulumi.get(__response__, 'id'),
|
184
|
+
last_password=pulumi.get(__response__, 'last_password'),
|
185
|
+
last_vault_rotation=pulumi.get(__response__, 'last_vault_rotation'),
|
186
|
+
mount=pulumi.get(__response__, 'mount'),
|
187
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
188
|
+
password=pulumi.get(__response__, 'password'),
|
189
|
+
role_name=pulumi.get(__response__, 'role_name'),
|
190
|
+
rotation_period=pulumi.get(__response__, 'rotation_period'),
|
191
|
+
ttl=pulumi.get(__response__, 'ttl'),
|
192
|
+
username=pulumi.get(__response__, 'username')))
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendArgs', 'SecretBackend']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendDynamicRoleArgs', 'SecretBackendDynamicRole']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendLibrarySetArgs', 'SecretBackendLibrarySet']
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendStaticRoleArgs', 'SecretBackendStaticRole']
|