pulumi-vault 6.6.0a1741415971__py3-none-any.whl → 6.7.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +9 -0
- pulumi_vault/_inputs.py +583 -562
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +425 -200
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +523 -306
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +288 -70
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +383 -130
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +432 -186
- pulumi_vault/azure/backend_role.py +188 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +3857 -2200
- pulumi_vault/database/outputs.py +2483 -1330
- pulumi_vault/database/secret_backend_connection.py +333 -112
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +283 -140
- pulumi_vault/database/secrets_mount.py +275 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +426 -205
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +420 -179
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +68 -18
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +754 -533
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +720 -499
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +73 -60
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +31 -36
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +174 -126
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1377 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +152 -104
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +278 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +35 -17
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +139 -25
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -31
- pulumi_vault/pkisecret/secret_backend_cert.py +439 -297
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +237 -182
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +520 -378
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +441 -175
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +894 -644
- pulumi_vault/pkisecret/secret_backend_root_cert.py +851 -427
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +936 -357
- pulumi_vault/pkisecret/secret_backend_sign.py +347 -252
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +2 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +295 -0
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +96 -95
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +3 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +325 -0
- pulumi_vault/transit/get_verify.py +355 -0
- pulumi_vault/transit/secret_backend_key.py +394 -231
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.6.0a1741415971.dist-info → pulumi_vault-6.7.0.dist-info}/METADATA +2 -2
- pulumi_vault-6.7.0.dist-info/RECORD +265 -0
- {pulumi_vault-6.6.0a1741415971.dist-info → pulumi_vault-6.7.0.dist-info}/WHEEL +1 -1
- pulumi_vault-6.6.0a1741415971.dist-info/RECORD +0 -260
- {pulumi_vault-6.6.0a1741415971.dist-info → pulumi_vault-6.7.0.dist-info}/top_level.txt +0 -0
pulumi_vault/kv/secret_v2.py
CHANGED
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -21,40 +22,40 @@ __all__ = ['SecretV2Args', 'SecretV2']
|
|
21
22
|
@pulumi.input_type
|
22
23
|
class SecretV2Args:
|
23
24
|
def __init__(__self__, *,
|
24
|
-
data_json: pulumi.Input[str],
|
25
|
-
mount: pulumi.Input[str],
|
26
|
-
cas: Optional[pulumi.Input[int]] = None,
|
25
|
+
data_json: pulumi.Input[builtins.str],
|
26
|
+
mount: pulumi.Input[builtins.str],
|
27
|
+
cas: Optional[pulumi.Input[builtins.int]] = None,
|
27
28
|
custom_metadata: Optional[pulumi.Input['SecretV2CustomMetadataArgs']] = None,
|
28
|
-
delete_all_versions: Optional[pulumi.Input[bool]] = None,
|
29
|
-
disable_read: Optional[pulumi.Input[bool]] = None,
|
30
|
-
name: Optional[pulumi.Input[str]] = None,
|
31
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
32
|
-
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None):
|
29
|
+
delete_all_versions: Optional[pulumi.Input[builtins.bool]] = None,
|
30
|
+
disable_read: Optional[pulumi.Input[builtins.bool]] = None,
|
31
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
32
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
33
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None):
|
33
34
|
"""
|
34
35
|
The set of arguments for constructing a SecretV2 resource.
|
35
|
-
:param pulumi.Input[str] data_json: JSON-encoded string that will be
|
36
|
+
:param pulumi.Input[builtins.str] data_json: JSON-encoded string that will be
|
36
37
|
written as the secret data at the given path.
|
37
|
-
:param pulumi.Input[str] mount: Path where KV-V2 engine is mounted.
|
38
|
-
:param pulumi.Input[int] cas: This flag is required if `cas_required` is set to true
|
38
|
+
:param pulumi.Input[builtins.str] mount: Path where KV-V2 engine is mounted.
|
39
|
+
:param pulumi.Input[builtins.int] cas: This flag is required if `cas_required` is set to true
|
39
40
|
on either the secret or the engine's config. In order for a
|
40
41
|
write operation to be successful, cas must be set to the current version
|
41
42
|
of the secret.
|
42
43
|
:param pulumi.Input['SecretV2CustomMetadataArgs'] custom_metadata: A nested block that allows configuring metadata for the
|
43
44
|
KV secret. Refer to the
|
44
45
|
Configuration Options for more info.
|
45
|
-
:param pulumi.Input[bool] delete_all_versions: If set to true, permanently deletes all
|
46
|
+
:param pulumi.Input[builtins.bool] delete_all_versions: If set to true, permanently deletes all
|
46
47
|
versions for the specified key.
|
47
|
-
:param pulumi.Input[bool] disable_read: If set to true, disables reading secret from Vault;
|
48
|
+
:param pulumi.Input[builtins.bool] disable_read: If set to true, disables reading secret from Vault;
|
48
49
|
note: drift won't be detected.
|
49
|
-
:param pulumi.Input[str] name: Full name of the secret. For a nested secret
|
50
|
+
:param pulumi.Input[builtins.str] name: Full name of the secret. For a nested secret
|
50
51
|
the name is the nested path excluding the mount and data
|
51
52
|
prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
|
52
53
|
the name is `foo/bar/baz`.
|
53
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
54
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
54
55
|
The value should not contain leading or trailing forward slashes.
|
55
56
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
56
57
|
*Available only for Vault Enterprise*.
|
57
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: An object that holds option settings.
|
58
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] options: An object that holds option settings.
|
58
59
|
"""
|
59
60
|
pulumi.set(__self__, "data_json", data_json)
|
60
61
|
pulumi.set(__self__, "mount", mount)
|
@@ -75,7 +76,7 @@ class SecretV2Args:
|
|
75
76
|
|
76
77
|
@property
|
77
78
|
@pulumi.getter(name="dataJson")
|
78
|
-
def data_json(self) -> pulumi.Input[str]:
|
79
|
+
def data_json(self) -> pulumi.Input[builtins.str]:
|
79
80
|
"""
|
80
81
|
JSON-encoded string that will be
|
81
82
|
written as the secret data at the given path.
|
@@ -83,24 +84,24 @@ class SecretV2Args:
|
|
83
84
|
return pulumi.get(self, "data_json")
|
84
85
|
|
85
86
|
@data_json.setter
|
86
|
-
def data_json(self, value: pulumi.Input[str]):
|
87
|
+
def data_json(self, value: pulumi.Input[builtins.str]):
|
87
88
|
pulumi.set(self, "data_json", value)
|
88
89
|
|
89
90
|
@property
|
90
91
|
@pulumi.getter
|
91
|
-
def mount(self) -> pulumi.Input[str]:
|
92
|
+
def mount(self) -> pulumi.Input[builtins.str]:
|
92
93
|
"""
|
93
94
|
Path where KV-V2 engine is mounted.
|
94
95
|
"""
|
95
96
|
return pulumi.get(self, "mount")
|
96
97
|
|
97
98
|
@mount.setter
|
98
|
-
def mount(self, value: pulumi.Input[str]):
|
99
|
+
def mount(self, value: pulumi.Input[builtins.str]):
|
99
100
|
pulumi.set(self, "mount", value)
|
100
101
|
|
101
102
|
@property
|
102
103
|
@pulumi.getter
|
103
|
-
def cas(self) -> Optional[pulumi.Input[int]]:
|
104
|
+
def cas(self) -> Optional[pulumi.Input[builtins.int]]:
|
104
105
|
"""
|
105
106
|
This flag is required if `cas_required` is set to true
|
106
107
|
on either the secret or the engine's config. In order for a
|
@@ -110,7 +111,7 @@ class SecretV2Args:
|
|
110
111
|
return pulumi.get(self, "cas")
|
111
112
|
|
112
113
|
@cas.setter
|
113
|
-
def cas(self, value: Optional[pulumi.Input[int]]):
|
114
|
+
def cas(self, value: Optional[pulumi.Input[builtins.int]]):
|
114
115
|
pulumi.set(self, "cas", value)
|
115
116
|
|
116
117
|
@property
|
@@ -129,7 +130,7 @@ class SecretV2Args:
|
|
129
130
|
|
130
131
|
@property
|
131
132
|
@pulumi.getter(name="deleteAllVersions")
|
132
|
-
def delete_all_versions(self) -> Optional[pulumi.Input[bool]]:
|
133
|
+
def delete_all_versions(self) -> Optional[pulumi.Input[builtins.bool]]:
|
133
134
|
"""
|
134
135
|
If set to true, permanently deletes all
|
135
136
|
versions for the specified key.
|
@@ -137,12 +138,12 @@ class SecretV2Args:
|
|
137
138
|
return pulumi.get(self, "delete_all_versions")
|
138
139
|
|
139
140
|
@delete_all_versions.setter
|
140
|
-
def delete_all_versions(self, value: Optional[pulumi.Input[bool]]):
|
141
|
+
def delete_all_versions(self, value: Optional[pulumi.Input[builtins.bool]]):
|
141
142
|
pulumi.set(self, "delete_all_versions", value)
|
142
143
|
|
143
144
|
@property
|
144
145
|
@pulumi.getter(name="disableRead")
|
145
|
-
def disable_read(self) -> Optional[pulumi.Input[bool]]:
|
146
|
+
def disable_read(self) -> Optional[pulumi.Input[builtins.bool]]:
|
146
147
|
"""
|
147
148
|
If set to true, disables reading secret from Vault;
|
148
149
|
note: drift won't be detected.
|
@@ -150,12 +151,12 @@ class SecretV2Args:
|
|
150
151
|
return pulumi.get(self, "disable_read")
|
151
152
|
|
152
153
|
@disable_read.setter
|
153
|
-
def disable_read(self, value: Optional[pulumi.Input[bool]]):
|
154
|
+
def disable_read(self, value: Optional[pulumi.Input[builtins.bool]]):
|
154
155
|
pulumi.set(self, "disable_read", value)
|
155
156
|
|
156
157
|
@property
|
157
158
|
@pulumi.getter
|
158
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
159
|
+
def name(self) -> Optional[pulumi.Input[builtins.str]]:
|
159
160
|
"""
|
160
161
|
Full name of the secret. For a nested secret
|
161
162
|
the name is the nested path excluding the mount and data
|
@@ -165,12 +166,12 @@ class SecretV2Args:
|
|
165
166
|
return pulumi.get(self, "name")
|
166
167
|
|
167
168
|
@name.setter
|
168
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
169
|
+
def name(self, value: Optional[pulumi.Input[builtins.str]]):
|
169
170
|
pulumi.set(self, "name", value)
|
170
171
|
|
171
172
|
@property
|
172
173
|
@pulumi.getter
|
173
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
174
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
174
175
|
"""
|
175
176
|
The namespace to provision the resource in.
|
176
177
|
The value should not contain leading or trailing forward slashes.
|
@@ -180,68 +181,68 @@ class SecretV2Args:
|
|
180
181
|
return pulumi.get(self, "namespace")
|
181
182
|
|
182
183
|
@namespace.setter
|
183
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
184
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
184
185
|
pulumi.set(self, "namespace", value)
|
185
186
|
|
186
187
|
@property
|
187
188
|
@pulumi.getter
|
188
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
189
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
|
189
190
|
"""
|
190
191
|
An object that holds option settings.
|
191
192
|
"""
|
192
193
|
return pulumi.get(self, "options")
|
193
194
|
|
194
195
|
@options.setter
|
195
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
196
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
|
196
197
|
pulumi.set(self, "options", value)
|
197
198
|
|
198
199
|
|
199
200
|
@pulumi.input_type
|
200
201
|
class _SecretV2State:
|
201
202
|
def __init__(__self__, *,
|
202
|
-
cas: Optional[pulumi.Input[int]] = None,
|
203
|
+
cas: Optional[pulumi.Input[builtins.int]] = None,
|
203
204
|
custom_metadata: Optional[pulumi.Input['SecretV2CustomMetadataArgs']] = None,
|
204
|
-
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
205
|
-
data_json: Optional[pulumi.Input[str]] = None,
|
206
|
-
delete_all_versions: Optional[pulumi.Input[bool]] = None,
|
207
|
-
disable_read: Optional[pulumi.Input[bool]] = None,
|
208
|
-
metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
209
|
-
mount: Optional[pulumi.Input[str]] = None,
|
210
|
-
name: Optional[pulumi.Input[str]] = None,
|
211
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
212
|
-
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
213
|
-
path: Optional[pulumi.Input[str]] = None):
|
205
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
|
206
|
+
data_json: Optional[pulumi.Input[builtins.str]] = None,
|
207
|
+
delete_all_versions: Optional[pulumi.Input[builtins.bool]] = None,
|
208
|
+
disable_read: Optional[pulumi.Input[builtins.bool]] = None,
|
209
|
+
metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
|
210
|
+
mount: Optional[pulumi.Input[builtins.str]] = None,
|
211
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
212
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
213
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
|
214
|
+
path: Optional[pulumi.Input[builtins.str]] = None):
|
214
215
|
"""
|
215
216
|
Input properties used for looking up and filtering SecretV2 resources.
|
216
|
-
:param pulumi.Input[int] cas: This flag is required if `cas_required` is set to true
|
217
|
+
:param pulumi.Input[builtins.int] cas: This flag is required if `cas_required` is set to true
|
217
218
|
on either the secret or the engine's config. In order for a
|
218
219
|
write operation to be successful, cas must be set to the current version
|
219
220
|
of the secret.
|
220
221
|
:param pulumi.Input['SecretV2CustomMetadataArgs'] custom_metadata: A nested block that allows configuring metadata for the
|
221
222
|
KV secret. Refer to the
|
222
223
|
Configuration Options for more info.
|
223
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
|
224
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] data: A mapping whose keys are the top-level data keys returned from
|
224
225
|
Vault and whose values are the corresponding values. This map can only
|
225
226
|
represent string data, so any non-string values returned from Vault are
|
226
227
|
serialized as JSON.
|
227
|
-
:param pulumi.Input[str] data_json: JSON-encoded string that will be
|
228
|
+
:param pulumi.Input[builtins.str] data_json: JSON-encoded string that will be
|
228
229
|
written as the secret data at the given path.
|
229
|
-
:param pulumi.Input[bool] delete_all_versions: If set to true, permanently deletes all
|
230
|
+
:param pulumi.Input[builtins.bool] delete_all_versions: If set to true, permanently deletes all
|
230
231
|
versions for the specified key.
|
231
|
-
:param pulumi.Input[bool] disable_read: If set to true, disables reading secret from Vault;
|
232
|
+
:param pulumi.Input[builtins.bool] disable_read: If set to true, disables reading secret from Vault;
|
232
233
|
note: drift won't be detected.
|
233
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: Metadata associated with this secret read from Vault.
|
234
|
-
:param pulumi.Input[str] mount: Path where KV-V2 engine is mounted.
|
235
|
-
:param pulumi.Input[str] name: Full name of the secret. For a nested secret
|
234
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] metadata: Metadata associated with this secret read from Vault.
|
235
|
+
:param pulumi.Input[builtins.str] mount: Path where KV-V2 engine is mounted.
|
236
|
+
:param pulumi.Input[builtins.str] name: Full name of the secret. For a nested secret
|
236
237
|
the name is the nested path excluding the mount and data
|
237
238
|
prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
|
238
239
|
the name is `foo/bar/baz`.
|
239
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
240
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
240
241
|
The value should not contain leading or trailing forward slashes.
|
241
242
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
242
243
|
*Available only for Vault Enterprise*.
|
243
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: An object that holds option settings.
|
244
|
-
:param pulumi.Input[str] path: Full path where the KV-V2 secret will be written.
|
244
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] options: An object that holds option settings.
|
245
|
+
:param pulumi.Input[builtins.str] path: Full path where the KV-V2 secret will be written.
|
245
246
|
"""
|
246
247
|
if cas is not None:
|
247
248
|
pulumi.set(__self__, "cas", cas)
|
@@ -270,7 +271,7 @@ class _SecretV2State:
|
|
270
271
|
|
271
272
|
@property
|
272
273
|
@pulumi.getter
|
273
|
-
def cas(self) -> Optional[pulumi.Input[int]]:
|
274
|
+
def cas(self) -> Optional[pulumi.Input[builtins.int]]:
|
274
275
|
"""
|
275
276
|
This flag is required if `cas_required` is set to true
|
276
277
|
on either the secret or the engine's config. In order for a
|
@@ -280,7 +281,7 @@ class _SecretV2State:
|
|
280
281
|
return pulumi.get(self, "cas")
|
281
282
|
|
282
283
|
@cas.setter
|
283
|
-
def cas(self, value: Optional[pulumi.Input[int]]):
|
284
|
+
def cas(self, value: Optional[pulumi.Input[builtins.int]]):
|
284
285
|
pulumi.set(self, "cas", value)
|
285
286
|
|
286
287
|
@property
|
@@ -299,7 +300,7 @@ class _SecretV2State:
|
|
299
300
|
|
300
301
|
@property
|
301
302
|
@pulumi.getter
|
302
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
303
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
|
303
304
|
"""
|
304
305
|
A mapping whose keys are the top-level data keys returned from
|
305
306
|
Vault and whose values are the corresponding values. This map can only
|
@@ -309,12 +310,12 @@ class _SecretV2State:
|
|
309
310
|
return pulumi.get(self, "data")
|
310
311
|
|
311
312
|
@data.setter
|
312
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
313
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
|
313
314
|
pulumi.set(self, "data", value)
|
314
315
|
|
315
316
|
@property
|
316
317
|
@pulumi.getter(name="dataJson")
|
317
|
-
def data_json(self) -> Optional[pulumi.Input[str]]:
|
318
|
+
def data_json(self) -> Optional[pulumi.Input[builtins.str]]:
|
318
319
|
"""
|
319
320
|
JSON-encoded string that will be
|
320
321
|
written as the secret data at the given path.
|
@@ -322,12 +323,12 @@ class _SecretV2State:
|
|
322
323
|
return pulumi.get(self, "data_json")
|
323
324
|
|
324
325
|
@data_json.setter
|
325
|
-
def data_json(self, value: Optional[pulumi.Input[str]]):
|
326
|
+
def data_json(self, value: Optional[pulumi.Input[builtins.str]]):
|
326
327
|
pulumi.set(self, "data_json", value)
|
327
328
|
|
328
329
|
@property
|
329
330
|
@pulumi.getter(name="deleteAllVersions")
|
330
|
-
def delete_all_versions(self) -> Optional[pulumi.Input[bool]]:
|
331
|
+
def delete_all_versions(self) -> Optional[pulumi.Input[builtins.bool]]:
|
331
332
|
"""
|
332
333
|
If set to true, permanently deletes all
|
333
334
|
versions for the specified key.
|
@@ -335,12 +336,12 @@ class _SecretV2State:
|
|
335
336
|
return pulumi.get(self, "delete_all_versions")
|
336
337
|
|
337
338
|
@delete_all_versions.setter
|
338
|
-
def delete_all_versions(self, value: Optional[pulumi.Input[bool]]):
|
339
|
+
def delete_all_versions(self, value: Optional[pulumi.Input[builtins.bool]]):
|
339
340
|
pulumi.set(self, "delete_all_versions", value)
|
340
341
|
|
341
342
|
@property
|
342
343
|
@pulumi.getter(name="disableRead")
|
343
|
-
def disable_read(self) -> Optional[pulumi.Input[bool]]:
|
344
|
+
def disable_read(self) -> Optional[pulumi.Input[builtins.bool]]:
|
344
345
|
"""
|
345
346
|
If set to true, disables reading secret from Vault;
|
346
347
|
note: drift won't be detected.
|
@@ -348,36 +349,36 @@ class _SecretV2State:
|
|
348
349
|
return pulumi.get(self, "disable_read")
|
349
350
|
|
350
351
|
@disable_read.setter
|
351
|
-
def disable_read(self, value: Optional[pulumi.Input[bool]]):
|
352
|
+
def disable_read(self, value: Optional[pulumi.Input[builtins.bool]]):
|
352
353
|
pulumi.set(self, "disable_read", value)
|
353
354
|
|
354
355
|
@property
|
355
356
|
@pulumi.getter
|
356
|
-
def metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
357
|
+
def metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
|
357
358
|
"""
|
358
359
|
Metadata associated with this secret read from Vault.
|
359
360
|
"""
|
360
361
|
return pulumi.get(self, "metadata")
|
361
362
|
|
362
363
|
@metadata.setter
|
363
|
-
def metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
364
|
+
def metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
|
364
365
|
pulumi.set(self, "metadata", value)
|
365
366
|
|
366
367
|
@property
|
367
368
|
@pulumi.getter
|
368
|
-
def mount(self) -> Optional[pulumi.Input[str]]:
|
369
|
+
def mount(self) -> Optional[pulumi.Input[builtins.str]]:
|
369
370
|
"""
|
370
371
|
Path where KV-V2 engine is mounted.
|
371
372
|
"""
|
372
373
|
return pulumi.get(self, "mount")
|
373
374
|
|
374
375
|
@mount.setter
|
375
|
-
def mount(self, value: Optional[pulumi.Input[str]]):
|
376
|
+
def mount(self, value: Optional[pulumi.Input[builtins.str]]):
|
376
377
|
pulumi.set(self, "mount", value)
|
377
378
|
|
378
379
|
@property
|
379
380
|
@pulumi.getter
|
380
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
381
|
+
def name(self) -> Optional[pulumi.Input[builtins.str]]:
|
381
382
|
"""
|
382
383
|
Full name of the secret. For a nested secret
|
383
384
|
the name is the nested path excluding the mount and data
|
@@ -387,12 +388,12 @@ class _SecretV2State:
|
|
387
388
|
return pulumi.get(self, "name")
|
388
389
|
|
389
390
|
@name.setter
|
390
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
391
|
+
def name(self, value: Optional[pulumi.Input[builtins.str]]):
|
391
392
|
pulumi.set(self, "name", value)
|
392
393
|
|
393
394
|
@property
|
394
395
|
@pulumi.getter
|
395
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
396
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
396
397
|
"""
|
397
398
|
The namespace to provision the resource in.
|
398
399
|
The value should not contain leading or trailing forward slashes.
|
@@ -402,31 +403,31 @@ class _SecretV2State:
|
|
402
403
|
return pulumi.get(self, "namespace")
|
403
404
|
|
404
405
|
@namespace.setter
|
405
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
406
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
406
407
|
pulumi.set(self, "namespace", value)
|
407
408
|
|
408
409
|
@property
|
409
410
|
@pulumi.getter
|
410
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
411
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
|
411
412
|
"""
|
412
413
|
An object that holds option settings.
|
413
414
|
"""
|
414
415
|
return pulumi.get(self, "options")
|
415
416
|
|
416
417
|
@options.setter
|
417
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
418
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
|
418
419
|
pulumi.set(self, "options", value)
|
419
420
|
|
420
421
|
@property
|
421
422
|
@pulumi.getter
|
422
|
-
def path(self) -> Optional[pulumi.Input[str]]:
|
423
|
+
def path(self) -> Optional[pulumi.Input[builtins.str]]:
|
423
424
|
"""
|
424
425
|
Full path where the KV-V2 secret will be written.
|
425
426
|
"""
|
426
427
|
return pulumi.get(self, "path")
|
427
428
|
|
428
429
|
@path.setter
|
429
|
-
def path(self, value: Optional[pulumi.Input[str]]):
|
430
|
+
def path(self, value: Optional[pulumi.Input[builtins.str]]):
|
430
431
|
pulumi.set(self, "path", value)
|
431
432
|
|
432
433
|
|
@@ -435,15 +436,15 @@ class SecretV2(pulumi.CustomResource):
|
|
435
436
|
def __init__(__self__,
|
436
437
|
resource_name: str,
|
437
438
|
opts: Optional[pulumi.ResourceOptions] = None,
|
438
|
-
cas: Optional[pulumi.Input[int]] = None,
|
439
|
+
cas: Optional[pulumi.Input[builtins.int]] = None,
|
439
440
|
custom_metadata: Optional[pulumi.Input[Union['SecretV2CustomMetadataArgs', 'SecretV2CustomMetadataArgsDict']]] = None,
|
440
|
-
data_json: Optional[pulumi.Input[str]] = None,
|
441
|
-
delete_all_versions: Optional[pulumi.Input[bool]] = None,
|
442
|
-
disable_read: Optional[pulumi.Input[bool]] = None,
|
443
|
-
mount: Optional[pulumi.Input[str]] = None,
|
444
|
-
name: Optional[pulumi.Input[str]] = None,
|
445
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
446
|
-
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
441
|
+
data_json: Optional[pulumi.Input[builtins.str]] = None,
|
442
|
+
delete_all_versions: Optional[pulumi.Input[builtins.bool]] = None,
|
443
|
+
disable_read: Optional[pulumi.Input[builtins.bool]] = None,
|
444
|
+
mount: Optional[pulumi.Input[builtins.str]] = None,
|
445
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
446
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
447
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
|
447
448
|
__props__=None):
|
448
449
|
"""
|
449
450
|
Writes a KV-V2 secret to a given path in Vault.
|
@@ -512,29 +513,29 @@ class SecretV2(pulumi.CustomResource):
|
|
512
513
|
|
513
514
|
:param str resource_name: The name of the resource.
|
514
515
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
515
|
-
:param pulumi.Input[int] cas: This flag is required if `cas_required` is set to true
|
516
|
+
:param pulumi.Input[builtins.int] cas: This flag is required if `cas_required` is set to true
|
516
517
|
on either the secret or the engine's config. In order for a
|
517
518
|
write operation to be successful, cas must be set to the current version
|
518
519
|
of the secret.
|
519
520
|
:param pulumi.Input[Union['SecretV2CustomMetadataArgs', 'SecretV2CustomMetadataArgsDict']] custom_metadata: A nested block that allows configuring metadata for the
|
520
521
|
KV secret. Refer to the
|
521
522
|
Configuration Options for more info.
|
522
|
-
:param pulumi.Input[str] data_json: JSON-encoded string that will be
|
523
|
+
:param pulumi.Input[builtins.str] data_json: JSON-encoded string that will be
|
523
524
|
written as the secret data at the given path.
|
524
|
-
:param pulumi.Input[bool] delete_all_versions: If set to true, permanently deletes all
|
525
|
+
:param pulumi.Input[builtins.bool] delete_all_versions: If set to true, permanently deletes all
|
525
526
|
versions for the specified key.
|
526
|
-
:param pulumi.Input[bool] disable_read: If set to true, disables reading secret from Vault;
|
527
|
+
:param pulumi.Input[builtins.bool] disable_read: If set to true, disables reading secret from Vault;
|
527
528
|
note: drift won't be detected.
|
528
|
-
:param pulumi.Input[str] mount: Path where KV-V2 engine is mounted.
|
529
|
-
:param pulumi.Input[str] name: Full name of the secret. For a nested secret
|
529
|
+
:param pulumi.Input[builtins.str] mount: Path where KV-V2 engine is mounted.
|
530
|
+
:param pulumi.Input[builtins.str] name: Full name of the secret. For a nested secret
|
530
531
|
the name is the nested path excluding the mount and data
|
531
532
|
prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
|
532
533
|
the name is `foo/bar/baz`.
|
533
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
534
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
534
535
|
The value should not contain leading or trailing forward slashes.
|
535
536
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
536
537
|
*Available only for Vault Enterprise*.
|
537
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: An object that holds option settings.
|
538
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] options: An object that holds option settings.
|
538
539
|
"""
|
539
540
|
...
|
540
541
|
@overload
|
@@ -622,15 +623,15 @@ class SecretV2(pulumi.CustomResource):
|
|
622
623
|
def _internal_init(__self__,
|
623
624
|
resource_name: str,
|
624
625
|
opts: Optional[pulumi.ResourceOptions] = None,
|
625
|
-
cas: Optional[pulumi.Input[int]] = None,
|
626
|
+
cas: Optional[pulumi.Input[builtins.int]] = None,
|
626
627
|
custom_metadata: Optional[pulumi.Input[Union['SecretV2CustomMetadataArgs', 'SecretV2CustomMetadataArgsDict']]] = None,
|
627
|
-
data_json: Optional[pulumi.Input[str]] = None,
|
628
|
-
delete_all_versions: Optional[pulumi.Input[bool]] = None,
|
629
|
-
disable_read: Optional[pulumi.Input[bool]] = None,
|
630
|
-
mount: Optional[pulumi.Input[str]] = None,
|
631
|
-
name: Optional[pulumi.Input[str]] = None,
|
632
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
633
|
-
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
628
|
+
data_json: Optional[pulumi.Input[builtins.str]] = None,
|
629
|
+
delete_all_versions: Optional[pulumi.Input[builtins.bool]] = None,
|
630
|
+
disable_read: Optional[pulumi.Input[builtins.bool]] = None,
|
631
|
+
mount: Optional[pulumi.Input[builtins.str]] = None,
|
632
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
633
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
634
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
|
634
635
|
__props__=None):
|
635
636
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
636
637
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -668,18 +669,18 @@ class SecretV2(pulumi.CustomResource):
|
|
668
669
|
def get(resource_name: str,
|
669
670
|
id: pulumi.Input[str],
|
670
671
|
opts: Optional[pulumi.ResourceOptions] = None,
|
671
|
-
cas: Optional[pulumi.Input[int]] = None,
|
672
|
+
cas: Optional[pulumi.Input[builtins.int]] = None,
|
672
673
|
custom_metadata: Optional[pulumi.Input[Union['SecretV2CustomMetadataArgs', 'SecretV2CustomMetadataArgsDict']]] = None,
|
673
|
-
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
674
|
-
data_json: Optional[pulumi.Input[str]] = None,
|
675
|
-
delete_all_versions: Optional[pulumi.Input[bool]] = None,
|
676
|
-
disable_read: Optional[pulumi.Input[bool]] = None,
|
677
|
-
metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
678
|
-
mount: Optional[pulumi.Input[str]] = None,
|
679
|
-
name: Optional[pulumi.Input[str]] = None,
|
680
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
681
|
-
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
682
|
-
path: Optional[pulumi.Input[str]] = None) -> 'SecretV2':
|
674
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
|
675
|
+
data_json: Optional[pulumi.Input[builtins.str]] = None,
|
676
|
+
delete_all_versions: Optional[pulumi.Input[builtins.bool]] = None,
|
677
|
+
disable_read: Optional[pulumi.Input[builtins.bool]] = None,
|
678
|
+
metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
|
679
|
+
mount: Optional[pulumi.Input[builtins.str]] = None,
|
680
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
681
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
682
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
|
683
|
+
path: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretV2':
|
683
684
|
"""
|
684
685
|
Get an existing SecretV2 resource's state with the given name, id, and optional extra
|
685
686
|
properties used to qualify the lookup.
|
@@ -687,35 +688,35 @@ class SecretV2(pulumi.CustomResource):
|
|
687
688
|
:param str resource_name: The unique name of the resulting resource.
|
688
689
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
689
690
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
690
|
-
:param pulumi.Input[int] cas: This flag is required if `cas_required` is set to true
|
691
|
+
:param pulumi.Input[builtins.int] cas: This flag is required if `cas_required` is set to true
|
691
692
|
on either the secret or the engine's config. In order for a
|
692
693
|
write operation to be successful, cas must be set to the current version
|
693
694
|
of the secret.
|
694
695
|
:param pulumi.Input[Union['SecretV2CustomMetadataArgs', 'SecretV2CustomMetadataArgsDict']] custom_metadata: A nested block that allows configuring metadata for the
|
695
696
|
KV secret. Refer to the
|
696
697
|
Configuration Options for more info.
|
697
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
|
698
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] data: A mapping whose keys are the top-level data keys returned from
|
698
699
|
Vault and whose values are the corresponding values. This map can only
|
699
700
|
represent string data, so any non-string values returned from Vault are
|
700
701
|
serialized as JSON.
|
701
|
-
:param pulumi.Input[str] data_json: JSON-encoded string that will be
|
702
|
+
:param pulumi.Input[builtins.str] data_json: JSON-encoded string that will be
|
702
703
|
written as the secret data at the given path.
|
703
|
-
:param pulumi.Input[bool] delete_all_versions: If set to true, permanently deletes all
|
704
|
+
:param pulumi.Input[builtins.bool] delete_all_versions: If set to true, permanently deletes all
|
704
705
|
versions for the specified key.
|
705
|
-
:param pulumi.Input[bool] disable_read: If set to true, disables reading secret from Vault;
|
706
|
+
:param pulumi.Input[builtins.bool] disable_read: If set to true, disables reading secret from Vault;
|
706
707
|
note: drift won't be detected.
|
707
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: Metadata associated with this secret read from Vault.
|
708
|
-
:param pulumi.Input[str] mount: Path where KV-V2 engine is mounted.
|
709
|
-
:param pulumi.Input[str] name: Full name of the secret. For a nested secret
|
708
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] metadata: Metadata associated with this secret read from Vault.
|
709
|
+
:param pulumi.Input[builtins.str] mount: Path where KV-V2 engine is mounted.
|
710
|
+
:param pulumi.Input[builtins.str] name: Full name of the secret. For a nested secret
|
710
711
|
the name is the nested path excluding the mount and data
|
711
712
|
prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
|
712
713
|
the name is `foo/bar/baz`.
|
713
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
714
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
714
715
|
The value should not contain leading or trailing forward slashes.
|
715
716
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
716
717
|
*Available only for Vault Enterprise*.
|
717
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: An object that holds option settings.
|
718
|
-
:param pulumi.Input[str] path: Full path where the KV-V2 secret will be written.
|
718
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] options: An object that holds option settings.
|
719
|
+
:param pulumi.Input[builtins.str] path: Full path where the KV-V2 secret will be written.
|
719
720
|
"""
|
720
721
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
721
722
|
|
@@ -737,7 +738,7 @@ class SecretV2(pulumi.CustomResource):
|
|
737
738
|
|
738
739
|
@property
|
739
740
|
@pulumi.getter
|
740
|
-
def cas(self) -> pulumi.Output[Optional[int]]:
|
741
|
+
def cas(self) -> pulumi.Output[Optional[builtins.int]]:
|
741
742
|
"""
|
742
743
|
This flag is required if `cas_required` is set to true
|
743
744
|
on either the secret or the engine's config. In order for a
|
@@ -758,7 +759,7 @@ class SecretV2(pulumi.CustomResource):
|
|
758
759
|
|
759
760
|
@property
|
760
761
|
@pulumi.getter
|
761
|
-
def data(self) -> pulumi.Output[Mapping[str, str]]:
|
762
|
+
def data(self) -> pulumi.Output[Mapping[str, builtins.str]]:
|
762
763
|
"""
|
763
764
|
A mapping whose keys are the top-level data keys returned from
|
764
765
|
Vault and whose values are the corresponding values. This map can only
|
@@ -769,7 +770,7 @@ class SecretV2(pulumi.CustomResource):
|
|
769
770
|
|
770
771
|
@property
|
771
772
|
@pulumi.getter(name="dataJson")
|
772
|
-
def data_json(self) -> pulumi.Output[str]:
|
773
|
+
def data_json(self) -> pulumi.Output[builtins.str]:
|
773
774
|
"""
|
774
775
|
JSON-encoded string that will be
|
775
776
|
written as the secret data at the given path.
|
@@ -778,7 +779,7 @@ class SecretV2(pulumi.CustomResource):
|
|
778
779
|
|
779
780
|
@property
|
780
781
|
@pulumi.getter(name="deleteAllVersions")
|
781
|
-
def delete_all_versions(self) -> pulumi.Output[Optional[bool]]:
|
782
|
+
def delete_all_versions(self) -> pulumi.Output[Optional[builtins.bool]]:
|
782
783
|
"""
|
783
784
|
If set to true, permanently deletes all
|
784
785
|
versions for the specified key.
|
@@ -787,7 +788,7 @@ class SecretV2(pulumi.CustomResource):
|
|
787
788
|
|
788
789
|
@property
|
789
790
|
@pulumi.getter(name="disableRead")
|
790
|
-
def disable_read(self) -> pulumi.Output[Optional[bool]]:
|
791
|
+
def disable_read(self) -> pulumi.Output[Optional[builtins.bool]]:
|
791
792
|
"""
|
792
793
|
If set to true, disables reading secret from Vault;
|
793
794
|
note: drift won't be detected.
|
@@ -796,7 +797,7 @@ class SecretV2(pulumi.CustomResource):
|
|
796
797
|
|
797
798
|
@property
|
798
799
|
@pulumi.getter
|
799
|
-
def metadata(self) -> pulumi.Output[Mapping[str, str]]:
|
800
|
+
def metadata(self) -> pulumi.Output[Mapping[str, builtins.str]]:
|
800
801
|
"""
|
801
802
|
Metadata associated with this secret read from Vault.
|
802
803
|
"""
|
@@ -804,7 +805,7 @@ class SecretV2(pulumi.CustomResource):
|
|
804
805
|
|
805
806
|
@property
|
806
807
|
@pulumi.getter
|
807
|
-
def mount(self) -> pulumi.Output[str]:
|
808
|
+
def mount(self) -> pulumi.Output[builtins.str]:
|
808
809
|
"""
|
809
810
|
Path where KV-V2 engine is mounted.
|
810
811
|
"""
|
@@ -812,7 +813,7 @@ class SecretV2(pulumi.CustomResource):
|
|
812
813
|
|
813
814
|
@property
|
814
815
|
@pulumi.getter
|
815
|
-
def name(self) -> pulumi.Output[str]:
|
816
|
+
def name(self) -> pulumi.Output[builtins.str]:
|
816
817
|
"""
|
817
818
|
Full name of the secret. For a nested secret
|
818
819
|
the name is the nested path excluding the mount and data
|
@@ -823,7 +824,7 @@ class SecretV2(pulumi.CustomResource):
|
|
823
824
|
|
824
825
|
@property
|
825
826
|
@pulumi.getter
|
826
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
827
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
827
828
|
"""
|
828
829
|
The namespace to provision the resource in.
|
829
830
|
The value should not contain leading or trailing forward slashes.
|
@@ -834,7 +835,7 @@ class SecretV2(pulumi.CustomResource):
|
|
834
835
|
|
835
836
|
@property
|
836
837
|
@pulumi.getter
|
837
|
-
def options(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
|
838
|
+
def options(self) -> pulumi.Output[Optional[Mapping[str, builtins.str]]]:
|
838
839
|
"""
|
839
840
|
An object that holds option settings.
|
840
841
|
"""
|
@@ -842,7 +843,7 @@ class SecretV2(pulumi.CustomResource):
|
|
842
843
|
|
843
844
|
@property
|
844
845
|
@pulumi.getter
|
845
|
-
def path(self) -> pulumi.Output[str]:
|
846
|
+
def path(self) -> pulumi.Output[builtins.str]:
|
846
847
|
"""
|
847
848
|
Full path where the KV-V2 secret will be written.
|
848
849
|
"""
|