pulumi-vault 6.7.0a1743490126__py3-none-any.whl → 6.7.0a1744183682__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744183682.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743490126.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -42,7 +43,7 @@ class GetSecretsListResult:
|
|
42
43
|
|
43
44
|
@property
|
44
45
|
@pulumi.getter
|
45
|
-
def id(self) -> str:
|
46
|
+
def id(self) -> builtins.str:
|
46
47
|
"""
|
47
48
|
The provider-assigned unique ID for this managed resource.
|
48
49
|
"""
|
@@ -50,7 +51,7 @@ class GetSecretsListResult:
|
|
50
51
|
|
51
52
|
@property
|
52
53
|
@pulumi.getter
|
53
|
-
def names(self) -> Sequence[str]:
|
54
|
+
def names(self) -> Sequence[builtins.str]:
|
54
55
|
"""
|
55
56
|
List of all secret names listed under the given path.
|
56
57
|
"""
|
@@ -58,12 +59,12 @@ class GetSecretsListResult:
|
|
58
59
|
|
59
60
|
@property
|
60
61
|
@pulumi.getter
|
61
|
-
def namespace(self) -> Optional[str]:
|
62
|
+
def namespace(self) -> Optional[builtins.str]:
|
62
63
|
return pulumi.get(self, "namespace")
|
63
64
|
|
64
65
|
@property
|
65
66
|
@pulumi.getter
|
66
|
-
def path(self) -> str:
|
67
|
+
def path(self) -> builtins.str:
|
67
68
|
return pulumi.get(self, "path")
|
68
69
|
|
69
70
|
|
@@ -79,8 +80,8 @@ class AwaitableGetSecretsListResult(GetSecretsListResult):
|
|
79
80
|
path=self.path)
|
80
81
|
|
81
82
|
|
82
|
-
def get_secrets_list(namespace: Optional[str] = None,
|
83
|
-
path: Optional[str] = None,
|
83
|
+
def get_secrets_list(namespace: Optional[builtins.str] = None,
|
84
|
+
path: Optional[builtins.str] = None,
|
84
85
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecretsListResult:
|
85
86
|
"""
|
86
87
|
## Example Usage
|
@@ -115,11 +116,11 @@ def get_secrets_list(namespace: Optional[str] = None,
|
|
115
116
|
Use of this resource requires the `read` capability on the given path.
|
116
117
|
|
117
118
|
|
118
|
-
:param str namespace: The namespace of the target resource.
|
119
|
+
:param builtins.str namespace: The namespace of the target resource.
|
119
120
|
The value should not contain leading or trailing forward slashes.
|
120
121
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
121
122
|
*Available only for Vault Enterprise*.
|
122
|
-
:param str path: Full KV-V1 path where secrets will be listed.
|
123
|
+
:param builtins.str path: Full KV-V1 path where secrets will be listed.
|
123
124
|
"""
|
124
125
|
__args__ = dict()
|
125
126
|
__args__['namespace'] = namespace
|
@@ -132,8 +133,8 @@ def get_secrets_list(namespace: Optional[str] = None,
|
|
132
133
|
names=pulumi.get(__ret__, 'names'),
|
133
134
|
namespace=pulumi.get(__ret__, 'namespace'),
|
134
135
|
path=pulumi.get(__ret__, 'path'))
|
135
|
-
def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
136
|
-
path: Optional[pulumi.Input[str]] = None,
|
136
|
+
def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
137
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
137
138
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecretsListResult]:
|
138
139
|
"""
|
139
140
|
## Example Usage
|
@@ -168,11 +169,11 @@ def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
|
|
168
169
|
Use of this resource requires the `read` capability on the given path.
|
169
170
|
|
170
171
|
|
171
|
-
:param str namespace: The namespace of the target resource.
|
172
|
+
:param builtins.str namespace: The namespace of the target resource.
|
172
173
|
The value should not contain leading or trailing forward slashes.
|
173
174
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
174
175
|
*Available only for Vault Enterprise*.
|
175
|
-
:param str path: Full KV-V1 path where secrets will be listed.
|
176
|
+
:param builtins.str path: Full KV-V1 path where secrets will be listed.
|
176
177
|
"""
|
177
178
|
__args__ = dict()
|
178
179
|
__args__['namespace'] = namespace
|
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -48,7 +49,7 @@ class GetSecretsListV2Result:
|
|
48
49
|
|
49
50
|
@property
|
50
51
|
@pulumi.getter
|
51
|
-
def id(self) -> str:
|
52
|
+
def id(self) -> builtins.str:
|
52
53
|
"""
|
53
54
|
The provider-assigned unique ID for this managed resource.
|
54
55
|
"""
|
@@ -56,17 +57,17 @@ class GetSecretsListV2Result:
|
|
56
57
|
|
57
58
|
@property
|
58
59
|
@pulumi.getter
|
59
|
-
def mount(self) -> str:
|
60
|
+
def mount(self) -> builtins.str:
|
60
61
|
return pulumi.get(self, "mount")
|
61
62
|
|
62
63
|
@property
|
63
64
|
@pulumi.getter
|
64
|
-
def name(self) -> Optional[str]:
|
65
|
+
def name(self) -> Optional[builtins.str]:
|
65
66
|
return pulumi.get(self, "name")
|
66
67
|
|
67
68
|
@property
|
68
69
|
@pulumi.getter
|
69
|
-
def names(self) -> Sequence[str]:
|
70
|
+
def names(self) -> Sequence[builtins.str]:
|
70
71
|
"""
|
71
72
|
List of all secret names listed under the given path.
|
72
73
|
"""
|
@@ -74,12 +75,12 @@ class GetSecretsListV2Result:
|
|
74
75
|
|
75
76
|
@property
|
76
77
|
@pulumi.getter
|
77
|
-
def namespace(self) -> Optional[str]:
|
78
|
+
def namespace(self) -> Optional[builtins.str]:
|
78
79
|
return pulumi.get(self, "namespace")
|
79
80
|
|
80
81
|
@property
|
81
82
|
@pulumi.getter
|
82
|
-
def path(self) -> str:
|
83
|
+
def path(self) -> builtins.str:
|
83
84
|
"""
|
84
85
|
Full path where the KV-V2 secrets are listed.
|
85
86
|
"""
|
@@ -100,9 +101,9 @@ class AwaitableGetSecretsListV2Result(GetSecretsListV2Result):
|
|
100
101
|
path=self.path)
|
101
102
|
|
102
103
|
|
103
|
-
def get_secrets_list_v2(mount: Optional[str] = None,
|
104
|
-
name: Optional[str] = None,
|
105
|
-
namespace: Optional[str] = None,
|
104
|
+
def get_secrets_list_v2(mount: Optional[builtins.str] = None,
|
105
|
+
name: Optional[builtins.str] = None,
|
106
|
+
namespace: Optional[builtins.str] = None,
|
106
107
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecretsListV2Result:
|
107
108
|
"""
|
108
109
|
## Example Usage
|
@@ -147,12 +148,12 @@ def get_secrets_list_v2(mount: Optional[str] = None,
|
|
147
148
|
Use of this resource requires the `read` capability on the given path.
|
148
149
|
|
149
150
|
|
150
|
-
:param str mount: Path where KV-V2 engine is mounted.
|
151
|
-
:param str name: Full name of the secret. For a nested secret
|
151
|
+
:param builtins.str mount: Path where KV-V2 engine is mounted.
|
152
|
+
:param builtins.str name: Full name of the secret. For a nested secret
|
152
153
|
the name is the nested path excluding the mount and data
|
153
154
|
prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
|
154
155
|
the name is `foo/bar/baz`.
|
155
|
-
:param str namespace: The namespace of the target resource.
|
156
|
+
:param builtins.str namespace: The namespace of the target resource.
|
156
157
|
The value should not contain leading or trailing forward slashes.
|
157
158
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
158
159
|
*Available only for Vault Enterprise*.
|
@@ -171,9 +172,9 @@ def get_secrets_list_v2(mount: Optional[str] = None,
|
|
171
172
|
names=pulumi.get(__ret__, 'names'),
|
172
173
|
namespace=pulumi.get(__ret__, 'namespace'),
|
173
174
|
path=pulumi.get(__ret__, 'path'))
|
174
|
-
def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
175
|
-
name: Optional[pulumi.Input[Optional[str]]] = None,
|
176
|
-
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
175
|
+
def get_secrets_list_v2_output(mount: Optional[pulumi.Input[builtins.str]] = None,
|
176
|
+
name: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
177
|
+
namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
177
178
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecretsListV2Result]:
|
178
179
|
"""
|
179
180
|
## Example Usage
|
@@ -218,12 +219,12 @@ def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
|
218
219
|
Use of this resource requires the `read` capability on the given path.
|
219
220
|
|
220
221
|
|
221
|
-
:param str mount: Path where KV-V2 engine is mounted.
|
222
|
-
:param str name: Full name of the secret. For a nested secret
|
222
|
+
:param builtins.str mount: Path where KV-V2 engine is mounted.
|
223
|
+
:param builtins.str name: Full name of the secret. For a nested secret
|
223
224
|
the name is the nested path excluding the mount and data
|
224
225
|
prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
|
225
226
|
the name is `foo/bar/baz`.
|
226
|
-
:param str namespace: The namespace of the target resource.
|
227
|
+
:param builtins.str namespace: The namespace of the target resource.
|
227
228
|
The value should not contain leading or trailing forward slashes.
|
228
229
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
229
230
|
*Available only for Vault Enterprise*.
|
pulumi_vault/kv/outputs.py
CHANGED
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -42,18 +43,18 @@ class SecretV2CustomMetadata(dict):
|
|
42
43
|
return super().get(key, default)
|
43
44
|
|
44
45
|
def __init__(__self__, *,
|
45
|
-
cas_required: Optional[bool] = None,
|
46
|
-
data: Optional[Mapping[str, str]] = None,
|
47
|
-
delete_version_after: Optional[int] = None,
|
48
|
-
max_versions: Optional[int] = None):
|
46
|
+
cas_required: Optional[builtins.bool] = None,
|
47
|
+
data: Optional[Mapping[str, builtins.str]] = None,
|
48
|
+
delete_version_after: Optional[builtins.int] = None,
|
49
|
+
max_versions: Optional[builtins.int] = None):
|
49
50
|
"""
|
50
|
-
:param bool cas_required: If true, all keys will require the cas parameter to be set on all write requests.
|
51
|
-
:param Mapping[str, str] data: A mapping whose keys are the top-level data keys returned from
|
51
|
+
:param builtins.bool cas_required: If true, all keys will require the cas parameter to be set on all write requests.
|
52
|
+
:param Mapping[str, builtins.str] data: A mapping whose keys are the top-level data keys returned from
|
52
53
|
Vault and whose values are the corresponding values. This map can only
|
53
54
|
represent string data, so any non-string values returned from Vault are
|
54
55
|
serialized as JSON.
|
55
|
-
:param int delete_version_after: If set, specifies the length of time before a version is deleted.
|
56
|
-
:param int max_versions: The number of versions to keep per key.
|
56
|
+
:param builtins.int delete_version_after: If set, specifies the length of time before a version is deleted.
|
57
|
+
:param builtins.int max_versions: The number of versions to keep per key.
|
57
58
|
"""
|
58
59
|
if cas_required is not None:
|
59
60
|
pulumi.set(__self__, "cas_required", cas_required)
|
@@ -66,7 +67,7 @@ class SecretV2CustomMetadata(dict):
|
|
66
67
|
|
67
68
|
@property
|
68
69
|
@pulumi.getter(name="casRequired")
|
69
|
-
def cas_required(self) -> Optional[bool]:
|
70
|
+
def cas_required(self) -> Optional[builtins.bool]:
|
70
71
|
"""
|
71
72
|
If true, all keys will require the cas parameter to be set on all write requests.
|
72
73
|
"""
|
@@ -74,7 +75,7 @@ class SecretV2CustomMetadata(dict):
|
|
74
75
|
|
75
76
|
@property
|
76
77
|
@pulumi.getter
|
77
|
-
def data(self) -> Optional[Mapping[str, str]]:
|
78
|
+
def data(self) -> Optional[Mapping[str, builtins.str]]:
|
78
79
|
"""
|
79
80
|
A mapping whose keys are the top-level data keys returned from
|
80
81
|
Vault and whose values are the corresponding values. This map can only
|
@@ -85,7 +86,7 @@ class SecretV2CustomMetadata(dict):
|
|
85
86
|
|
86
87
|
@property
|
87
88
|
@pulumi.getter(name="deleteVersionAfter")
|
88
|
-
def delete_version_after(self) -> Optional[int]:
|
89
|
+
def delete_version_after(self) -> Optional[builtins.int]:
|
89
90
|
"""
|
90
91
|
If set, specifies the length of time before a version is deleted.
|
91
92
|
"""
|
@@ -93,7 +94,7 @@ class SecretV2CustomMetadata(dict):
|
|
93
94
|
|
94
95
|
@property
|
95
96
|
@pulumi.getter(name="maxVersions")
|
96
|
-
def max_versions(self) -> Optional[int]:
|
97
|
+
def max_versions(self) -> Optional[builtins.int]:
|
97
98
|
"""
|
98
99
|
The number of versions to keep per key.
|
99
100
|
"""
|
pulumi_vault/kv/secret.py
CHANGED
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,15 +20,15 @@ __all__ = ['SecretArgs', 'Secret']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class SecretArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
data_json: pulumi.Input[str],
|
23
|
-
path: pulumi.Input[str],
|
24
|
-
namespace: Optional[pulumi.Input[str]] = None):
|
23
|
+
data_json: pulumi.Input[builtins.str],
|
24
|
+
path: pulumi.Input[builtins.str],
|
25
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None):
|
25
26
|
"""
|
26
27
|
The set of arguments for constructing a Secret resource.
|
27
|
-
:param pulumi.Input[str] data_json: JSON-encoded string that will be
|
28
|
+
:param pulumi.Input[builtins.str] data_json: JSON-encoded string that will be
|
28
29
|
written as the secret data at the given path.
|
29
|
-
:param pulumi.Input[str] path: Full path of the KV-V1 secret.
|
30
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
30
|
+
:param pulumi.Input[builtins.str] path: Full path of the KV-V1 secret.
|
31
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
31
32
|
The value should not contain leading or trailing forward slashes.
|
32
33
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
33
34
|
*Available only for Vault Enterprise*.
|
@@ -39,7 +40,7 @@ class SecretArgs:
|
|
39
40
|
|
40
41
|
@property
|
41
42
|
@pulumi.getter(name="dataJson")
|
42
|
-
def data_json(self) -> pulumi.Input[str]:
|
43
|
+
def data_json(self) -> pulumi.Input[builtins.str]:
|
43
44
|
"""
|
44
45
|
JSON-encoded string that will be
|
45
46
|
written as the secret data at the given path.
|
@@ -47,24 +48,24 @@ class SecretArgs:
|
|
47
48
|
return pulumi.get(self, "data_json")
|
48
49
|
|
49
50
|
@data_json.setter
|
50
|
-
def data_json(self, value: pulumi.Input[str]):
|
51
|
+
def data_json(self, value: pulumi.Input[builtins.str]):
|
51
52
|
pulumi.set(self, "data_json", value)
|
52
53
|
|
53
54
|
@property
|
54
55
|
@pulumi.getter
|
55
|
-
def path(self) -> pulumi.Input[str]:
|
56
|
+
def path(self) -> pulumi.Input[builtins.str]:
|
56
57
|
"""
|
57
58
|
Full path of the KV-V1 secret.
|
58
59
|
"""
|
59
60
|
return pulumi.get(self, "path")
|
60
61
|
|
61
62
|
@path.setter
|
62
|
-
def path(self, value: pulumi.Input[str]):
|
63
|
+
def path(self, value: pulumi.Input[builtins.str]):
|
63
64
|
pulumi.set(self, "path", value)
|
64
65
|
|
65
66
|
@property
|
66
67
|
@pulumi.getter
|
67
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
68
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
68
69
|
"""
|
69
70
|
The namespace to provision the resource in.
|
70
71
|
The value should not contain leading or trailing forward slashes.
|
@@ -74,30 +75,30 @@ class SecretArgs:
|
|
74
75
|
return pulumi.get(self, "namespace")
|
75
76
|
|
76
77
|
@namespace.setter
|
77
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
78
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
78
79
|
pulumi.set(self, "namespace", value)
|
79
80
|
|
80
81
|
|
81
82
|
@pulumi.input_type
|
82
83
|
class _SecretState:
|
83
84
|
def __init__(__self__, *,
|
84
|
-
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
85
|
-
data_json: Optional[pulumi.Input[str]] = None,
|
86
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
87
|
-
path: Optional[pulumi.Input[str]] = None):
|
85
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
|
86
|
+
data_json: Optional[pulumi.Input[builtins.str]] = None,
|
87
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
88
|
+
path: Optional[pulumi.Input[builtins.str]] = None):
|
88
89
|
"""
|
89
90
|
Input properties used for looking up and filtering Secret resources.
|
90
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
|
91
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] data: A mapping whose keys are the top-level data keys returned from
|
91
92
|
Vault and whose values are the corresponding values. This map can only
|
92
93
|
represent string data, so any non-string values returned from Vault are
|
93
94
|
serialized as JSON.
|
94
|
-
:param pulumi.Input[str] data_json: JSON-encoded string that will be
|
95
|
+
:param pulumi.Input[builtins.str] data_json: JSON-encoded string that will be
|
95
96
|
written as the secret data at the given path.
|
96
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
97
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
97
98
|
The value should not contain leading or trailing forward slashes.
|
98
99
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
99
100
|
*Available only for Vault Enterprise*.
|
100
|
-
:param pulumi.Input[str] path: Full path of the KV-V1 secret.
|
101
|
+
:param pulumi.Input[builtins.str] path: Full path of the KV-V1 secret.
|
101
102
|
"""
|
102
103
|
if data is not None:
|
103
104
|
pulumi.set(__self__, "data", data)
|
@@ -110,7 +111,7 @@ class _SecretState:
|
|
110
111
|
|
111
112
|
@property
|
112
113
|
@pulumi.getter
|
113
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
114
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
|
114
115
|
"""
|
115
116
|
A mapping whose keys are the top-level data keys returned from
|
116
117
|
Vault and whose values are the corresponding values. This map can only
|
@@ -120,12 +121,12 @@ class _SecretState:
|
|
120
121
|
return pulumi.get(self, "data")
|
121
122
|
|
122
123
|
@data.setter
|
123
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
124
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
|
124
125
|
pulumi.set(self, "data", value)
|
125
126
|
|
126
127
|
@property
|
127
128
|
@pulumi.getter(name="dataJson")
|
128
|
-
def data_json(self) -> Optional[pulumi.Input[str]]:
|
129
|
+
def data_json(self) -> Optional[pulumi.Input[builtins.str]]:
|
129
130
|
"""
|
130
131
|
JSON-encoded string that will be
|
131
132
|
written as the secret data at the given path.
|
@@ -133,12 +134,12 @@ class _SecretState:
|
|
133
134
|
return pulumi.get(self, "data_json")
|
134
135
|
|
135
136
|
@data_json.setter
|
136
|
-
def data_json(self, value: Optional[pulumi.Input[str]]):
|
137
|
+
def data_json(self, value: Optional[pulumi.Input[builtins.str]]):
|
137
138
|
pulumi.set(self, "data_json", value)
|
138
139
|
|
139
140
|
@property
|
140
141
|
@pulumi.getter
|
141
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
142
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
142
143
|
"""
|
143
144
|
The namespace to provision the resource in.
|
144
145
|
The value should not contain leading or trailing forward slashes.
|
@@ -148,19 +149,19 @@ class _SecretState:
|
|
148
149
|
return pulumi.get(self, "namespace")
|
149
150
|
|
150
151
|
@namespace.setter
|
151
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
152
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
152
153
|
pulumi.set(self, "namespace", value)
|
153
154
|
|
154
155
|
@property
|
155
156
|
@pulumi.getter
|
156
|
-
def path(self) -> Optional[pulumi.Input[str]]:
|
157
|
+
def path(self) -> Optional[pulumi.Input[builtins.str]]:
|
157
158
|
"""
|
158
159
|
Full path of the KV-V1 secret.
|
159
160
|
"""
|
160
161
|
return pulumi.get(self, "path")
|
161
162
|
|
162
163
|
@path.setter
|
163
|
-
def path(self, value: Optional[pulumi.Input[str]]):
|
164
|
+
def path(self, value: Optional[pulumi.Input[builtins.str]]):
|
164
165
|
pulumi.set(self, "path", value)
|
165
166
|
|
166
167
|
|
@@ -169,9 +170,9 @@ class Secret(pulumi.CustomResource):
|
|
169
170
|
def __init__(__self__,
|
170
171
|
resource_name: str,
|
171
172
|
opts: Optional[pulumi.ResourceOptions] = None,
|
172
|
-
data_json: Optional[pulumi.Input[str]] = None,
|
173
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
174
|
-
path: Optional[pulumi.Input[str]] = None,
|
173
|
+
data_json: Optional[pulumi.Input[builtins.str]] = None,
|
174
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
175
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
175
176
|
__props__=None):
|
176
177
|
"""
|
177
178
|
Writes a KV-V1 secret to a given path in Vault.
|
@@ -218,13 +219,13 @@ class Secret(pulumi.CustomResource):
|
|
218
219
|
|
219
220
|
:param str resource_name: The name of the resource.
|
220
221
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
221
|
-
:param pulumi.Input[str] data_json: JSON-encoded string that will be
|
222
|
+
:param pulumi.Input[builtins.str] data_json: JSON-encoded string that will be
|
222
223
|
written as the secret data at the given path.
|
223
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
224
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
224
225
|
The value should not contain leading or trailing forward slashes.
|
225
226
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
226
227
|
*Available only for Vault Enterprise*.
|
227
|
-
:param pulumi.Input[str] path: Full path of the KV-V1 secret.
|
228
|
+
:param pulumi.Input[builtins.str] path: Full path of the KV-V1 secret.
|
228
229
|
"""
|
229
230
|
...
|
230
231
|
@overload
|
@@ -290,9 +291,9 @@ class Secret(pulumi.CustomResource):
|
|
290
291
|
def _internal_init(__self__,
|
291
292
|
resource_name: str,
|
292
293
|
opts: Optional[pulumi.ResourceOptions] = None,
|
293
|
-
data_json: Optional[pulumi.Input[str]] = None,
|
294
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
295
|
-
path: Optional[pulumi.Input[str]] = None,
|
294
|
+
data_json: Optional[pulumi.Input[builtins.str]] = None,
|
295
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
296
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
296
297
|
__props__=None):
|
297
298
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
298
299
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -322,10 +323,10 @@ class Secret(pulumi.CustomResource):
|
|
322
323
|
def get(resource_name: str,
|
323
324
|
id: pulumi.Input[str],
|
324
325
|
opts: Optional[pulumi.ResourceOptions] = None,
|
325
|
-
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
326
|
-
data_json: Optional[pulumi.Input[str]] = None,
|
327
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
328
|
-
path: Optional[pulumi.Input[str]] = None) -> 'Secret':
|
326
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
|
327
|
+
data_json: Optional[pulumi.Input[builtins.str]] = None,
|
328
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
329
|
+
path: Optional[pulumi.Input[builtins.str]] = None) -> 'Secret':
|
329
330
|
"""
|
330
331
|
Get an existing Secret resource's state with the given name, id, and optional extra
|
331
332
|
properties used to qualify the lookup.
|
@@ -333,17 +334,17 @@ class Secret(pulumi.CustomResource):
|
|
333
334
|
:param str resource_name: The unique name of the resulting resource.
|
334
335
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
335
336
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
336
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
|
337
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] data: A mapping whose keys are the top-level data keys returned from
|
337
338
|
Vault and whose values are the corresponding values. This map can only
|
338
339
|
represent string data, so any non-string values returned from Vault are
|
339
340
|
serialized as JSON.
|
340
|
-
:param pulumi.Input[str] data_json: JSON-encoded string that will be
|
341
|
+
:param pulumi.Input[builtins.str] data_json: JSON-encoded string that will be
|
341
342
|
written as the secret data at the given path.
|
342
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
343
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
343
344
|
The value should not contain leading or trailing forward slashes.
|
344
345
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
345
346
|
*Available only for Vault Enterprise*.
|
346
|
-
:param pulumi.Input[str] path: Full path of the KV-V1 secret.
|
347
|
+
:param pulumi.Input[builtins.str] path: Full path of the KV-V1 secret.
|
347
348
|
"""
|
348
349
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
349
350
|
|
@@ -357,7 +358,7 @@ class Secret(pulumi.CustomResource):
|
|
357
358
|
|
358
359
|
@property
|
359
360
|
@pulumi.getter
|
360
|
-
def data(self) -> pulumi.Output[Mapping[str, str]]:
|
361
|
+
def data(self) -> pulumi.Output[Mapping[str, builtins.str]]:
|
361
362
|
"""
|
362
363
|
A mapping whose keys are the top-level data keys returned from
|
363
364
|
Vault and whose values are the corresponding values. This map can only
|
@@ -368,7 +369,7 @@ class Secret(pulumi.CustomResource):
|
|
368
369
|
|
369
370
|
@property
|
370
371
|
@pulumi.getter(name="dataJson")
|
371
|
-
def data_json(self) -> pulumi.Output[str]:
|
372
|
+
def data_json(self) -> pulumi.Output[builtins.str]:
|
372
373
|
"""
|
373
374
|
JSON-encoded string that will be
|
374
375
|
written as the secret data at the given path.
|
@@ -377,7 +378,7 @@ class Secret(pulumi.CustomResource):
|
|
377
378
|
|
378
379
|
@property
|
379
380
|
@pulumi.getter
|
380
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
381
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
381
382
|
"""
|
382
383
|
The namespace to provision the resource in.
|
383
384
|
The value should not contain leading or trailing forward slashes.
|
@@ -388,7 +389,7 @@ class Secret(pulumi.CustomResource):
|
|
388
389
|
|
389
390
|
@property
|
390
391
|
@pulumi.getter
|
391
|
-
def path(self) -> pulumi.Output[str]:
|
392
|
+
def path(self) -> pulumi.Output[builtins.str]:
|
392
393
|
"""
|
393
394
|
Full path of the KV-V1 secret.
|
394
395
|
"""
|