pulumi-vault 6.7.0a1743490126__py3-none-any.whl → 6.7.0a1744183682__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744183682.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743490126.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -63,7 +64,7 @@ class GetSecretResult:
|
|
63
64
|
|
64
65
|
@property
|
65
66
|
@pulumi.getter
|
66
|
-
def data(self) -> Mapping[str, str]:
|
67
|
+
def data(self) -> Mapping[str, builtins.str]:
|
67
68
|
"""
|
68
69
|
A mapping whose keys are the top-level data keys returned from
|
69
70
|
Vault and whose values are the corresponding values. This map can only
|
@@ -74,7 +75,7 @@ class GetSecretResult:
|
|
74
75
|
|
75
76
|
@property
|
76
77
|
@pulumi.getter(name="dataJson")
|
77
|
-
def data_json(self) -> str:
|
78
|
+
def data_json(self) -> builtins.str:
|
78
79
|
"""
|
79
80
|
A string containing the full data payload retrieved from
|
80
81
|
Vault, serialized in JSON format.
|
@@ -83,7 +84,7 @@ class GetSecretResult:
|
|
83
84
|
|
84
85
|
@property
|
85
86
|
@pulumi.getter
|
86
|
-
def id(self) -> str:
|
87
|
+
def id(self) -> builtins.str:
|
87
88
|
"""
|
88
89
|
The provider-assigned unique ID for this managed resource.
|
89
90
|
"""
|
@@ -91,7 +92,7 @@ class GetSecretResult:
|
|
91
92
|
|
92
93
|
@property
|
93
94
|
@pulumi.getter(name="leaseDuration")
|
94
|
-
def lease_duration(self) -> int:
|
95
|
+
def lease_duration(self) -> builtins.int:
|
95
96
|
"""
|
96
97
|
The duration of the secret lease, in seconds relative
|
97
98
|
to the time the data was requested. Once this time has passed any plan
|
@@ -101,7 +102,7 @@ class GetSecretResult:
|
|
101
102
|
|
102
103
|
@property
|
103
104
|
@pulumi.getter(name="leaseId")
|
104
|
-
def lease_id(self) -> str:
|
105
|
+
def lease_id(self) -> builtins.str:
|
105
106
|
"""
|
106
107
|
The lease identifier assigned by Vault, if any.
|
107
108
|
"""
|
@@ -109,32 +110,32 @@ class GetSecretResult:
|
|
109
110
|
|
110
111
|
@property
|
111
112
|
@pulumi.getter(name="leaseRenewable")
|
112
|
-
def lease_renewable(self) -> bool:
|
113
|
+
def lease_renewable(self) -> builtins.bool:
|
113
114
|
return pulumi.get(self, "lease_renewable")
|
114
115
|
|
115
116
|
@property
|
116
117
|
@pulumi.getter(name="leaseStartTime")
|
117
|
-
def lease_start_time(self) -> str:
|
118
|
+
def lease_start_time(self) -> builtins.str:
|
118
119
|
return pulumi.get(self, "lease_start_time")
|
119
120
|
|
120
121
|
@property
|
121
122
|
@pulumi.getter
|
122
|
-
def namespace(self) -> Optional[str]:
|
123
|
+
def namespace(self) -> Optional[builtins.str]:
|
123
124
|
return pulumi.get(self, "namespace")
|
124
125
|
|
125
126
|
@property
|
126
127
|
@pulumi.getter
|
127
|
-
def path(self) -> str:
|
128
|
+
def path(self) -> builtins.str:
|
128
129
|
return pulumi.get(self, "path")
|
129
130
|
|
130
131
|
@property
|
131
132
|
@pulumi.getter
|
132
|
-
def version(self) -> Optional[int]:
|
133
|
+
def version(self) -> Optional[builtins.int]:
|
133
134
|
return pulumi.get(self, "version")
|
134
135
|
|
135
136
|
@property
|
136
137
|
@pulumi.getter(name="withLeaseStartTime")
|
137
|
-
def with_lease_start_time(self) -> Optional[bool]:
|
138
|
+
def with_lease_start_time(self) -> Optional[builtins.bool]:
|
138
139
|
return pulumi.get(self, "with_lease_start_time")
|
139
140
|
|
140
141
|
|
@@ -157,10 +158,10 @@ class AwaitableGetSecretResult(GetSecretResult):
|
|
157
158
|
with_lease_start_time=self.with_lease_start_time)
|
158
159
|
|
159
160
|
|
160
|
-
def get_secret(namespace: Optional[str] = None,
|
161
|
-
path: Optional[str] = None,
|
162
|
-
version: Optional[int] = None,
|
163
|
-
with_lease_start_time: Optional[bool] = None,
|
161
|
+
def get_secret(namespace: Optional[builtins.str] = None,
|
162
|
+
path: Optional[builtins.str] = None,
|
163
|
+
version: Optional[builtins.int] = None,
|
164
|
+
with_lease_start_time: Optional[builtins.bool] = None,
|
164
165
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecretResult:
|
165
166
|
"""
|
166
167
|
## Example Usage
|
@@ -195,19 +196,19 @@ def get_secret(namespace: Optional[str] = None,
|
|
195
196
|
Use of this resource requires the `read` capability on the given path.
|
196
197
|
|
197
198
|
|
198
|
-
:param str namespace: The namespace of the target resource.
|
199
|
+
:param builtins.str namespace: The namespace of the target resource.
|
199
200
|
The value should not contain leading or trailing forward slashes.
|
200
201
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
201
202
|
*Available only for Vault Enterprise*.
|
202
|
-
:param str path: The full logical path from which to request data.
|
203
|
+
:param builtins.str path: The full logical path from which to request data.
|
203
204
|
To read data from the "generic" secret backend mounted in Vault by
|
204
205
|
default, this should be prefixed with `secret/`. Reading from other backends
|
205
206
|
with this data source is possible; consult each backend's documentation
|
206
207
|
to see which endpoints support the `GET` method.
|
207
|
-
:param int version: The version of the secret to read. This is used by the
|
208
|
+
:param builtins.int version: The version of the secret to read. This is used by the
|
208
209
|
Vault KV secrets engine - version 2 to indicate which version of the secret
|
209
210
|
to read.
|
210
|
-
:param bool with_lease_start_time: If set to true, stores `lease_start_time` in the TF state.
|
211
|
+
:param builtins.bool with_lease_start_time: If set to true, stores `lease_start_time` in the TF state.
|
211
212
|
Note that storing the `lease_start_time` in the TF state will cause a persistent drift
|
212
213
|
on every `pulumi preview` and will require a `pulumi up`.
|
213
214
|
"""
|
@@ -231,10 +232,10 @@ def get_secret(namespace: Optional[str] = None,
|
|
231
232
|
path=pulumi.get(__ret__, 'path'),
|
232
233
|
version=pulumi.get(__ret__, 'version'),
|
233
234
|
with_lease_start_time=pulumi.get(__ret__, 'with_lease_start_time'))
|
234
|
-
def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
235
|
-
path: Optional[pulumi.Input[str]] = None,
|
236
|
-
version: Optional[pulumi.Input[Optional[int]]] = None,
|
237
|
-
with_lease_start_time: Optional[pulumi.Input[Optional[bool]]] = None,
|
235
|
+
def get_secret_output(namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
236
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
237
|
+
version: Optional[pulumi.Input[Optional[builtins.int]]] = None,
|
238
|
+
with_lease_start_time: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
|
238
239
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecretResult]:
|
239
240
|
"""
|
240
241
|
## Example Usage
|
@@ -269,19 +270,19 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
|
269
270
|
Use of this resource requires the `read` capability on the given path.
|
270
271
|
|
271
272
|
|
272
|
-
:param str namespace: The namespace of the target resource.
|
273
|
+
:param builtins.str namespace: The namespace of the target resource.
|
273
274
|
The value should not contain leading or trailing forward slashes.
|
274
275
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
275
276
|
*Available only for Vault Enterprise*.
|
276
|
-
:param str path: The full logical path from which to request data.
|
277
|
+
:param builtins.str path: The full logical path from which to request data.
|
277
278
|
To read data from the "generic" secret backend mounted in Vault by
|
278
279
|
default, this should be prefixed with `secret/`. Reading from other backends
|
279
280
|
with this data source is possible; consult each backend's documentation
|
280
281
|
to see which endpoints support the `GET` method.
|
281
|
-
:param int version: The version of the secret to read. This is used by the
|
282
|
+
:param builtins.int version: The version of the secret to read. This is used by the
|
282
283
|
Vault KV secrets engine - version 2 to indicate which version of the secret
|
283
284
|
to read.
|
284
|
-
:param bool with_lease_start_time: If set to true, stores `lease_start_time` in the TF state.
|
285
|
+
:param builtins.bool with_lease_start_time: If set to true, stores `lease_start_time` in the TF state.
|
285
286
|
Note that storing the `lease_start_time` in the TF state will cause a persistent drift
|
286
287
|
on every `pulumi preview` and will require a `pulumi up`.
|
287
288
|
"""
|
pulumi_vault/generic/secret.py
CHANGED
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,28 +20,28 @@ __all__ = ['SecretArgs', 'Secret']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class SecretArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
data_json: pulumi.Input[str],
|
23
|
-
path: pulumi.Input[str],
|
24
|
-
delete_all_versions: Optional[pulumi.Input[bool]] = None,
|
25
|
-
disable_read: Optional[pulumi.Input[bool]] = None,
|
26
|
-
namespace: Optional[pulumi.Input[str]] = None):
|
23
|
+
data_json: pulumi.Input[builtins.str],
|
24
|
+
path: pulumi.Input[builtins.str],
|
25
|
+
delete_all_versions: Optional[pulumi.Input[builtins.bool]] = None,
|
26
|
+
disable_read: Optional[pulumi.Input[builtins.bool]] = None,
|
27
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None):
|
27
28
|
"""
|
28
29
|
The set of arguments for constructing a Secret resource.
|
29
|
-
:param pulumi.Input[str] data_json: String containing a JSON-encoded object that will be
|
30
|
+
:param pulumi.Input[builtins.str] data_json: String containing a JSON-encoded object that will be
|
30
31
|
written as the secret data at the given path.
|
31
|
-
:param pulumi.Input[str] path: The full logical path at which to write the given data.
|
32
|
+
:param pulumi.Input[builtins.str] path: The full logical path at which to write the given data.
|
32
33
|
To write data into the "generic" secret backend mounted in Vault by default,
|
33
34
|
this should be prefixed with `secret/`. Writing to other backends with this
|
34
35
|
resource is possible; consult each backend's documentation to see which
|
35
36
|
endpoints support the `PUT` and `DELETE` methods.
|
36
|
-
:param pulumi.Input[bool] delete_all_versions: true/false. Only applicable for kv-v2 stores.
|
37
|
+
:param pulumi.Input[builtins.bool] delete_all_versions: true/false. Only applicable for kv-v2 stores.
|
37
38
|
If set to `true`, permanently deletes all versions for
|
38
39
|
the specified key. The default behavior is to only delete the latest version of the
|
39
40
|
secret.
|
40
|
-
:param pulumi.Input[bool] disable_read: true/false. Set this to true if your vault
|
41
|
+
:param pulumi.Input[builtins.bool] disable_read: true/false. Set this to true if your vault
|
41
42
|
authentication is not able to read the data. Setting this to `true` will
|
42
43
|
break drift detection. Defaults to false.
|
43
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
44
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
44
45
|
The value should not contain leading or trailing forward slashes.
|
45
46
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
46
47
|
*Available only for Vault Enterprise*.
|
@@ -56,7 +57,7 @@ class SecretArgs:
|
|
56
57
|
|
57
58
|
@property
|
58
59
|
@pulumi.getter(name="dataJson")
|
59
|
-
def data_json(self) -> pulumi.Input[str]:
|
60
|
+
def data_json(self) -> pulumi.Input[builtins.str]:
|
60
61
|
"""
|
61
62
|
String containing a JSON-encoded object that will be
|
62
63
|
written as the secret data at the given path.
|
@@ -64,12 +65,12 @@ class SecretArgs:
|
|
64
65
|
return pulumi.get(self, "data_json")
|
65
66
|
|
66
67
|
@data_json.setter
|
67
|
-
def data_json(self, value: pulumi.Input[str]):
|
68
|
+
def data_json(self, value: pulumi.Input[builtins.str]):
|
68
69
|
pulumi.set(self, "data_json", value)
|
69
70
|
|
70
71
|
@property
|
71
72
|
@pulumi.getter
|
72
|
-
def path(self) -> pulumi.Input[str]:
|
73
|
+
def path(self) -> pulumi.Input[builtins.str]:
|
73
74
|
"""
|
74
75
|
The full logical path at which to write the given data.
|
75
76
|
To write data into the "generic" secret backend mounted in Vault by default,
|
@@ -80,12 +81,12 @@ class SecretArgs:
|
|
80
81
|
return pulumi.get(self, "path")
|
81
82
|
|
82
83
|
@path.setter
|
83
|
-
def path(self, value: pulumi.Input[str]):
|
84
|
+
def path(self, value: pulumi.Input[builtins.str]):
|
84
85
|
pulumi.set(self, "path", value)
|
85
86
|
|
86
87
|
@property
|
87
88
|
@pulumi.getter(name="deleteAllVersions")
|
88
|
-
def delete_all_versions(self) -> Optional[pulumi.Input[bool]]:
|
89
|
+
def delete_all_versions(self) -> Optional[pulumi.Input[builtins.bool]]:
|
89
90
|
"""
|
90
91
|
true/false. Only applicable for kv-v2 stores.
|
91
92
|
If set to `true`, permanently deletes all versions for
|
@@ -95,12 +96,12 @@ class SecretArgs:
|
|
95
96
|
return pulumi.get(self, "delete_all_versions")
|
96
97
|
|
97
98
|
@delete_all_versions.setter
|
98
|
-
def delete_all_versions(self, value: Optional[pulumi.Input[bool]]):
|
99
|
+
def delete_all_versions(self, value: Optional[pulumi.Input[builtins.bool]]):
|
99
100
|
pulumi.set(self, "delete_all_versions", value)
|
100
101
|
|
101
102
|
@property
|
102
103
|
@pulumi.getter(name="disableRead")
|
103
|
-
def disable_read(self) -> Optional[pulumi.Input[bool]]:
|
104
|
+
def disable_read(self) -> Optional[pulumi.Input[builtins.bool]]:
|
104
105
|
"""
|
105
106
|
true/false. Set this to true if your vault
|
106
107
|
authentication is not able to read the data. Setting this to `true` will
|
@@ -109,12 +110,12 @@ class SecretArgs:
|
|
109
110
|
return pulumi.get(self, "disable_read")
|
110
111
|
|
111
112
|
@disable_read.setter
|
112
|
-
def disable_read(self, value: Optional[pulumi.Input[bool]]):
|
113
|
+
def disable_read(self, value: Optional[pulumi.Input[builtins.bool]]):
|
113
114
|
pulumi.set(self, "disable_read", value)
|
114
115
|
|
115
116
|
@property
|
116
117
|
@pulumi.getter
|
117
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
118
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
118
119
|
"""
|
119
120
|
The namespace to provision the resource in.
|
120
121
|
The value should not contain leading or trailing forward slashes.
|
@@ -124,39 +125,39 @@ class SecretArgs:
|
|
124
125
|
return pulumi.get(self, "namespace")
|
125
126
|
|
126
127
|
@namespace.setter
|
127
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
128
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
128
129
|
pulumi.set(self, "namespace", value)
|
129
130
|
|
130
131
|
|
131
132
|
@pulumi.input_type
|
132
133
|
class _SecretState:
|
133
134
|
def __init__(__self__, *,
|
134
|
-
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
135
|
-
data_json: Optional[pulumi.Input[str]] = None,
|
136
|
-
delete_all_versions: Optional[pulumi.Input[bool]] = None,
|
137
|
-
disable_read: Optional[pulumi.Input[bool]] = None,
|
138
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
139
|
-
path: Optional[pulumi.Input[str]] = None):
|
135
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
|
136
|
+
data_json: Optional[pulumi.Input[builtins.str]] = None,
|
137
|
+
delete_all_versions: Optional[pulumi.Input[builtins.bool]] = None,
|
138
|
+
disable_read: Optional[pulumi.Input[builtins.bool]] = None,
|
139
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
140
|
+
path: Optional[pulumi.Input[builtins.str]] = None):
|
140
141
|
"""
|
141
142
|
Input properties used for looking up and filtering Secret resources.
|
142
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
|
143
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] data: A mapping whose keys are the top-level data keys returned from
|
143
144
|
Vault and whose values are the corresponding values. This map can only
|
144
145
|
represent string data, so any non-string values returned from Vault are
|
145
146
|
serialized as JSON.
|
146
|
-
:param pulumi.Input[str] data_json: String containing a JSON-encoded object that will be
|
147
|
+
:param pulumi.Input[builtins.str] data_json: String containing a JSON-encoded object that will be
|
147
148
|
written as the secret data at the given path.
|
148
|
-
:param pulumi.Input[bool] delete_all_versions: true/false. Only applicable for kv-v2 stores.
|
149
|
+
:param pulumi.Input[builtins.bool] delete_all_versions: true/false. Only applicable for kv-v2 stores.
|
149
150
|
If set to `true`, permanently deletes all versions for
|
150
151
|
the specified key. The default behavior is to only delete the latest version of the
|
151
152
|
secret.
|
152
|
-
:param pulumi.Input[bool] disable_read: true/false. Set this to true if your vault
|
153
|
+
:param pulumi.Input[builtins.bool] disable_read: true/false. Set this to true if your vault
|
153
154
|
authentication is not able to read the data. Setting this to `true` will
|
154
155
|
break drift detection. Defaults to false.
|
155
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
156
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
156
157
|
The value should not contain leading or trailing forward slashes.
|
157
158
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
158
159
|
*Available only for Vault Enterprise*.
|
159
|
-
:param pulumi.Input[str] path: The full logical path at which to write the given data.
|
160
|
+
:param pulumi.Input[builtins.str] path: The full logical path at which to write the given data.
|
160
161
|
To write data into the "generic" secret backend mounted in Vault by default,
|
161
162
|
this should be prefixed with `secret/`. Writing to other backends with this
|
162
163
|
resource is possible; consult each backend's documentation to see which
|
@@ -177,7 +178,7 @@ class _SecretState:
|
|
177
178
|
|
178
179
|
@property
|
179
180
|
@pulumi.getter
|
180
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
181
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
|
181
182
|
"""
|
182
183
|
A mapping whose keys are the top-level data keys returned from
|
183
184
|
Vault and whose values are the corresponding values. This map can only
|
@@ -187,12 +188,12 @@ class _SecretState:
|
|
187
188
|
return pulumi.get(self, "data")
|
188
189
|
|
189
190
|
@data.setter
|
190
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
191
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
|
191
192
|
pulumi.set(self, "data", value)
|
192
193
|
|
193
194
|
@property
|
194
195
|
@pulumi.getter(name="dataJson")
|
195
|
-
def data_json(self) -> Optional[pulumi.Input[str]]:
|
196
|
+
def data_json(self) -> Optional[pulumi.Input[builtins.str]]:
|
196
197
|
"""
|
197
198
|
String containing a JSON-encoded object that will be
|
198
199
|
written as the secret data at the given path.
|
@@ -200,12 +201,12 @@ class _SecretState:
|
|
200
201
|
return pulumi.get(self, "data_json")
|
201
202
|
|
202
203
|
@data_json.setter
|
203
|
-
def data_json(self, value: Optional[pulumi.Input[str]]):
|
204
|
+
def data_json(self, value: Optional[pulumi.Input[builtins.str]]):
|
204
205
|
pulumi.set(self, "data_json", value)
|
205
206
|
|
206
207
|
@property
|
207
208
|
@pulumi.getter(name="deleteAllVersions")
|
208
|
-
def delete_all_versions(self) -> Optional[pulumi.Input[bool]]:
|
209
|
+
def delete_all_versions(self) -> Optional[pulumi.Input[builtins.bool]]:
|
209
210
|
"""
|
210
211
|
true/false. Only applicable for kv-v2 stores.
|
211
212
|
If set to `true`, permanently deletes all versions for
|
@@ -215,12 +216,12 @@ class _SecretState:
|
|
215
216
|
return pulumi.get(self, "delete_all_versions")
|
216
217
|
|
217
218
|
@delete_all_versions.setter
|
218
|
-
def delete_all_versions(self, value: Optional[pulumi.Input[bool]]):
|
219
|
+
def delete_all_versions(self, value: Optional[pulumi.Input[builtins.bool]]):
|
219
220
|
pulumi.set(self, "delete_all_versions", value)
|
220
221
|
|
221
222
|
@property
|
222
223
|
@pulumi.getter(name="disableRead")
|
223
|
-
def disable_read(self) -> Optional[pulumi.Input[bool]]:
|
224
|
+
def disable_read(self) -> Optional[pulumi.Input[builtins.bool]]:
|
224
225
|
"""
|
225
226
|
true/false. Set this to true if your vault
|
226
227
|
authentication is not able to read the data. Setting this to `true` will
|
@@ -229,12 +230,12 @@ class _SecretState:
|
|
229
230
|
return pulumi.get(self, "disable_read")
|
230
231
|
|
231
232
|
@disable_read.setter
|
232
|
-
def disable_read(self, value: Optional[pulumi.Input[bool]]):
|
233
|
+
def disable_read(self, value: Optional[pulumi.Input[builtins.bool]]):
|
233
234
|
pulumi.set(self, "disable_read", value)
|
234
235
|
|
235
236
|
@property
|
236
237
|
@pulumi.getter
|
237
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
238
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
238
239
|
"""
|
239
240
|
The namespace to provision the resource in.
|
240
241
|
The value should not contain leading or trailing forward slashes.
|
@@ -244,12 +245,12 @@ class _SecretState:
|
|
244
245
|
return pulumi.get(self, "namespace")
|
245
246
|
|
246
247
|
@namespace.setter
|
247
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
248
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
248
249
|
pulumi.set(self, "namespace", value)
|
249
250
|
|
250
251
|
@property
|
251
252
|
@pulumi.getter
|
252
|
-
def path(self) -> Optional[pulumi.Input[str]]:
|
253
|
+
def path(self) -> Optional[pulumi.Input[builtins.str]]:
|
253
254
|
"""
|
254
255
|
The full logical path at which to write the given data.
|
255
256
|
To write data into the "generic" secret backend mounted in Vault by default,
|
@@ -260,7 +261,7 @@ class _SecretState:
|
|
260
261
|
return pulumi.get(self, "path")
|
261
262
|
|
262
263
|
@path.setter
|
263
|
-
def path(self, value: Optional[pulumi.Input[str]]):
|
264
|
+
def path(self, value: Optional[pulumi.Input[builtins.str]]):
|
264
265
|
pulumi.set(self, "path", value)
|
265
266
|
|
266
267
|
|
@@ -269,11 +270,11 @@ class Secret(pulumi.CustomResource):
|
|
269
270
|
def __init__(__self__,
|
270
271
|
resource_name: str,
|
271
272
|
opts: Optional[pulumi.ResourceOptions] = None,
|
272
|
-
data_json: Optional[pulumi.Input[str]] = None,
|
273
|
-
delete_all_versions: Optional[pulumi.Input[bool]] = None,
|
274
|
-
disable_read: Optional[pulumi.Input[bool]] = None,
|
275
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
276
|
-
path: Optional[pulumi.Input[str]] = None,
|
273
|
+
data_json: Optional[pulumi.Input[builtins.str]] = None,
|
274
|
+
delete_all_versions: Optional[pulumi.Input[builtins.bool]] = None,
|
275
|
+
disable_read: Optional[pulumi.Input[builtins.bool]] = None,
|
276
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
277
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
277
278
|
__props__=None):
|
278
279
|
"""
|
279
280
|
## Import
|
@@ -286,20 +287,20 @@ class Secret(pulumi.CustomResource):
|
|
286
287
|
|
287
288
|
:param str resource_name: The name of the resource.
|
288
289
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
289
|
-
:param pulumi.Input[str] data_json: String containing a JSON-encoded object that will be
|
290
|
+
:param pulumi.Input[builtins.str] data_json: String containing a JSON-encoded object that will be
|
290
291
|
written as the secret data at the given path.
|
291
|
-
:param pulumi.Input[bool] delete_all_versions: true/false. Only applicable for kv-v2 stores.
|
292
|
+
:param pulumi.Input[builtins.bool] delete_all_versions: true/false. Only applicable for kv-v2 stores.
|
292
293
|
If set to `true`, permanently deletes all versions for
|
293
294
|
the specified key. The default behavior is to only delete the latest version of the
|
294
295
|
secret.
|
295
|
-
:param pulumi.Input[bool] disable_read: true/false. Set this to true if your vault
|
296
|
+
:param pulumi.Input[builtins.bool] disable_read: true/false. Set this to true if your vault
|
296
297
|
authentication is not able to read the data. Setting this to `true` will
|
297
298
|
break drift detection. Defaults to false.
|
298
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
299
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
299
300
|
The value should not contain leading or trailing forward slashes.
|
300
301
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
301
302
|
*Available only for Vault Enterprise*.
|
302
|
-
:param pulumi.Input[str] path: The full logical path at which to write the given data.
|
303
|
+
:param pulumi.Input[builtins.str] path: The full logical path at which to write the given data.
|
303
304
|
To write data into the "generic" secret backend mounted in Vault by default,
|
304
305
|
this should be prefixed with `secret/`. Writing to other backends with this
|
305
306
|
resource is possible; consult each backend's documentation to see which
|
@@ -335,11 +336,11 @@ class Secret(pulumi.CustomResource):
|
|
335
336
|
def _internal_init(__self__,
|
336
337
|
resource_name: str,
|
337
338
|
opts: Optional[pulumi.ResourceOptions] = None,
|
338
|
-
data_json: Optional[pulumi.Input[str]] = None,
|
339
|
-
delete_all_versions: Optional[pulumi.Input[bool]] = None,
|
340
|
-
disable_read: Optional[pulumi.Input[bool]] = None,
|
341
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
342
|
-
path: Optional[pulumi.Input[str]] = None,
|
339
|
+
data_json: Optional[pulumi.Input[builtins.str]] = None,
|
340
|
+
delete_all_versions: Optional[pulumi.Input[builtins.bool]] = None,
|
341
|
+
disable_read: Optional[pulumi.Input[builtins.bool]] = None,
|
342
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
343
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
343
344
|
__props__=None):
|
344
345
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
345
346
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -371,12 +372,12 @@ class Secret(pulumi.CustomResource):
|
|
371
372
|
def get(resource_name: str,
|
372
373
|
id: pulumi.Input[str],
|
373
374
|
opts: Optional[pulumi.ResourceOptions] = None,
|
374
|
-
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
375
|
-
data_json: Optional[pulumi.Input[str]] = None,
|
376
|
-
delete_all_versions: Optional[pulumi.Input[bool]] = None,
|
377
|
-
disable_read: Optional[pulumi.Input[bool]] = None,
|
378
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
379
|
-
path: Optional[pulumi.Input[str]] = None) -> 'Secret':
|
375
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
|
376
|
+
data_json: Optional[pulumi.Input[builtins.str]] = None,
|
377
|
+
delete_all_versions: Optional[pulumi.Input[builtins.bool]] = None,
|
378
|
+
disable_read: Optional[pulumi.Input[builtins.bool]] = None,
|
379
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
380
|
+
path: Optional[pulumi.Input[builtins.str]] = None) -> 'Secret':
|
380
381
|
"""
|
381
382
|
Get an existing Secret resource's state with the given name, id, and optional extra
|
382
383
|
properties used to qualify the lookup.
|
@@ -384,24 +385,24 @@ class Secret(pulumi.CustomResource):
|
|
384
385
|
:param str resource_name: The unique name of the resulting resource.
|
385
386
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
386
387
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
387
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
|
388
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] data: A mapping whose keys are the top-level data keys returned from
|
388
389
|
Vault and whose values are the corresponding values. This map can only
|
389
390
|
represent string data, so any non-string values returned from Vault are
|
390
391
|
serialized as JSON.
|
391
|
-
:param pulumi.Input[str] data_json: String containing a JSON-encoded object that will be
|
392
|
+
:param pulumi.Input[builtins.str] data_json: String containing a JSON-encoded object that will be
|
392
393
|
written as the secret data at the given path.
|
393
|
-
:param pulumi.Input[bool] delete_all_versions: true/false. Only applicable for kv-v2 stores.
|
394
|
+
:param pulumi.Input[builtins.bool] delete_all_versions: true/false. Only applicable for kv-v2 stores.
|
394
395
|
If set to `true`, permanently deletes all versions for
|
395
396
|
the specified key. The default behavior is to only delete the latest version of the
|
396
397
|
secret.
|
397
|
-
:param pulumi.Input[bool] disable_read: true/false. Set this to true if your vault
|
398
|
+
:param pulumi.Input[builtins.bool] disable_read: true/false. Set this to true if your vault
|
398
399
|
authentication is not able to read the data. Setting this to `true` will
|
399
400
|
break drift detection. Defaults to false.
|
400
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
401
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
401
402
|
The value should not contain leading or trailing forward slashes.
|
402
403
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
403
404
|
*Available only for Vault Enterprise*.
|
404
|
-
:param pulumi.Input[str] path: The full logical path at which to write the given data.
|
405
|
+
:param pulumi.Input[builtins.str] path: The full logical path at which to write the given data.
|
405
406
|
To write data into the "generic" secret backend mounted in Vault by default,
|
406
407
|
this should be prefixed with `secret/`. Writing to other backends with this
|
407
408
|
resource is possible; consult each backend's documentation to see which
|
@@ -421,7 +422,7 @@ class Secret(pulumi.CustomResource):
|
|
421
422
|
|
422
423
|
@property
|
423
424
|
@pulumi.getter
|
424
|
-
def data(self) -> pulumi.Output[Mapping[str, str]]:
|
425
|
+
def data(self) -> pulumi.Output[Mapping[str, builtins.str]]:
|
425
426
|
"""
|
426
427
|
A mapping whose keys are the top-level data keys returned from
|
427
428
|
Vault and whose values are the corresponding values. This map can only
|
@@ -432,7 +433,7 @@ class Secret(pulumi.CustomResource):
|
|
432
433
|
|
433
434
|
@property
|
434
435
|
@pulumi.getter(name="dataJson")
|
435
|
-
def data_json(self) -> pulumi.Output[str]:
|
436
|
+
def data_json(self) -> pulumi.Output[builtins.str]:
|
436
437
|
"""
|
437
438
|
String containing a JSON-encoded object that will be
|
438
439
|
written as the secret data at the given path.
|
@@ -441,7 +442,7 @@ class Secret(pulumi.CustomResource):
|
|
441
442
|
|
442
443
|
@property
|
443
444
|
@pulumi.getter(name="deleteAllVersions")
|
444
|
-
def delete_all_versions(self) -> pulumi.Output[Optional[bool]]:
|
445
|
+
def delete_all_versions(self) -> pulumi.Output[Optional[builtins.bool]]:
|
445
446
|
"""
|
446
447
|
true/false. Only applicable for kv-v2 stores.
|
447
448
|
If set to `true`, permanently deletes all versions for
|
@@ -452,7 +453,7 @@ class Secret(pulumi.CustomResource):
|
|
452
453
|
|
453
454
|
@property
|
454
455
|
@pulumi.getter(name="disableRead")
|
455
|
-
def disable_read(self) -> pulumi.Output[Optional[bool]]:
|
456
|
+
def disable_read(self) -> pulumi.Output[Optional[builtins.bool]]:
|
456
457
|
"""
|
457
458
|
true/false. Set this to true if your vault
|
458
459
|
authentication is not able to read the data. Setting this to `true` will
|
@@ -462,7 +463,7 @@ class Secret(pulumi.CustomResource):
|
|
462
463
|
|
463
464
|
@property
|
464
465
|
@pulumi.getter
|
465
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
466
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
466
467
|
"""
|
467
468
|
The namespace to provision the resource in.
|
468
469
|
The value should not contain leading or trailing forward slashes.
|
@@ -473,7 +474,7 @@ class Secret(pulumi.CustomResource):
|
|
473
474
|
|
474
475
|
@property
|
475
476
|
@pulumi.getter
|
476
|
-
def path(self) -> pulumi.Output[str]:
|
477
|
+
def path(self) -> pulumi.Output[builtins.str]:
|
477
478
|
"""
|
478
479
|
The full logical path at which to write the given data.
|
479
480
|
To write data into the "generic" secret backend mounted in Vault by default,
|