pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
pulumi_vault/kv/__init__.py
CHANGED
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
from .. import _utilities
|
6
7
|
import typing
|
7
8
|
# Export this package's modules as members:
|
pulumi_vault/kv/_inputs.py
CHANGED
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -23,22 +24,22 @@ MYPY = False
|
|
23
24
|
|
24
25
|
if not MYPY:
|
25
26
|
class SecretV2CustomMetadataArgsDict(TypedDict):
|
26
|
-
cas_required: NotRequired[pulumi.Input[bool]]
|
27
|
+
cas_required: NotRequired[pulumi.Input[builtins.bool]]
|
27
28
|
"""
|
28
29
|
If true, all keys will require the cas parameter to be set on all write requests.
|
29
30
|
"""
|
30
|
-
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
|
31
|
+
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]
|
31
32
|
"""
|
32
33
|
A mapping whose keys are the top-level data keys returned from
|
33
34
|
Vault and whose values are the corresponding values. This map can only
|
34
35
|
represent string data, so any non-string values returned from Vault are
|
35
36
|
serialized as JSON.
|
36
37
|
"""
|
37
|
-
delete_version_after: NotRequired[pulumi.Input[int]]
|
38
|
+
delete_version_after: NotRequired[pulumi.Input[builtins.int]]
|
38
39
|
"""
|
39
40
|
If set, specifies the length of time before a version is deleted.
|
40
41
|
"""
|
41
|
-
max_versions: NotRequired[pulumi.Input[int]]
|
42
|
+
max_versions: NotRequired[pulumi.Input[builtins.int]]
|
42
43
|
"""
|
43
44
|
The number of versions to keep per key.
|
44
45
|
"""
|
@@ -48,18 +49,18 @@ elif False:
|
|
48
49
|
@pulumi.input_type
|
49
50
|
class SecretV2CustomMetadataArgs:
|
50
51
|
def __init__(__self__, *,
|
51
|
-
cas_required: Optional[pulumi.Input[bool]] = None,
|
52
|
-
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
53
|
-
delete_version_after: Optional[pulumi.Input[int]] = None,
|
54
|
-
max_versions: Optional[pulumi.Input[int]] = None):
|
52
|
+
cas_required: Optional[pulumi.Input[builtins.bool]] = None,
|
53
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
|
54
|
+
delete_version_after: Optional[pulumi.Input[builtins.int]] = None,
|
55
|
+
max_versions: Optional[pulumi.Input[builtins.int]] = None):
|
55
56
|
"""
|
56
|
-
:param pulumi.Input[bool] cas_required: If true, all keys will require the cas parameter to be set on all write requests.
|
57
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
|
57
|
+
:param pulumi.Input[builtins.bool] cas_required: If true, all keys will require the cas parameter to be set on all write requests.
|
58
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] data: A mapping whose keys are the top-level data keys returned from
|
58
59
|
Vault and whose values are the corresponding values. This map can only
|
59
60
|
represent string data, so any non-string values returned from Vault are
|
60
61
|
serialized as JSON.
|
61
|
-
:param pulumi.Input[int] delete_version_after: If set, specifies the length of time before a version is deleted.
|
62
|
-
:param pulumi.Input[int] max_versions: The number of versions to keep per key.
|
62
|
+
:param pulumi.Input[builtins.int] delete_version_after: If set, specifies the length of time before a version is deleted.
|
63
|
+
:param pulumi.Input[builtins.int] max_versions: The number of versions to keep per key.
|
63
64
|
"""
|
64
65
|
if cas_required is not None:
|
65
66
|
pulumi.set(__self__, "cas_required", cas_required)
|
@@ -72,19 +73,19 @@ class SecretV2CustomMetadataArgs:
|
|
72
73
|
|
73
74
|
@property
|
74
75
|
@pulumi.getter(name="casRequired")
|
75
|
-
def cas_required(self) -> Optional[pulumi.Input[bool]]:
|
76
|
+
def cas_required(self) -> Optional[pulumi.Input[builtins.bool]]:
|
76
77
|
"""
|
77
78
|
If true, all keys will require the cas parameter to be set on all write requests.
|
78
79
|
"""
|
79
80
|
return pulumi.get(self, "cas_required")
|
80
81
|
|
81
82
|
@cas_required.setter
|
82
|
-
def cas_required(self, value: Optional[pulumi.Input[bool]]):
|
83
|
+
def cas_required(self, value: Optional[pulumi.Input[builtins.bool]]):
|
83
84
|
pulumi.set(self, "cas_required", value)
|
84
85
|
|
85
86
|
@property
|
86
87
|
@pulumi.getter
|
87
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
88
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
|
88
89
|
"""
|
89
90
|
A mapping whose keys are the top-level data keys returned from
|
90
91
|
Vault and whose values are the corresponding values. This map can only
|
@@ -94,31 +95,31 @@ class SecretV2CustomMetadataArgs:
|
|
94
95
|
return pulumi.get(self, "data")
|
95
96
|
|
96
97
|
@data.setter
|
97
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
98
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
|
98
99
|
pulumi.set(self, "data", value)
|
99
100
|
|
100
101
|
@property
|
101
102
|
@pulumi.getter(name="deleteVersionAfter")
|
102
|
-
def delete_version_after(self) -> Optional[pulumi.Input[int]]:
|
103
|
+
def delete_version_after(self) -> Optional[pulumi.Input[builtins.int]]:
|
103
104
|
"""
|
104
105
|
If set, specifies the length of time before a version is deleted.
|
105
106
|
"""
|
106
107
|
return pulumi.get(self, "delete_version_after")
|
107
108
|
|
108
109
|
@delete_version_after.setter
|
109
|
-
def delete_version_after(self, value: Optional[pulumi.Input[int]]):
|
110
|
+
def delete_version_after(self, value: Optional[pulumi.Input[builtins.int]]):
|
110
111
|
pulumi.set(self, "delete_version_after", value)
|
111
112
|
|
112
113
|
@property
|
113
114
|
@pulumi.getter(name="maxVersions")
|
114
|
-
def max_versions(self) -> Optional[pulumi.Input[int]]:
|
115
|
+
def max_versions(self) -> Optional[pulumi.Input[builtins.int]]:
|
115
116
|
"""
|
116
117
|
The number of versions to keep per key.
|
117
118
|
"""
|
118
119
|
return pulumi.get(self, "max_versions")
|
119
120
|
|
120
121
|
@max_versions.setter
|
121
|
-
def max_versions(self, value: Optional[pulumi.Input[int]]):
|
122
|
+
def max_versions(self, value: Optional[pulumi.Input[builtins.int]]):
|
122
123
|
pulumi.set(self, "max_versions", value)
|
123
124
|
|
124
125
|
|
pulumi_vault/kv/get_secret.py
CHANGED
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -54,7 +55,7 @@ class GetSecretResult:
|
|
54
55
|
|
55
56
|
@property
|
56
57
|
@pulumi.getter
|
57
|
-
def data(self) -> Mapping[str, str]:
|
58
|
+
def data(self) -> Mapping[str, builtins.str]:
|
58
59
|
"""
|
59
60
|
A mapping whose keys are the top-level data keys returned from
|
60
61
|
Vault and whose values are the corresponding values. This map can only
|
@@ -65,7 +66,7 @@ class GetSecretResult:
|
|
65
66
|
|
66
67
|
@property
|
67
68
|
@pulumi.getter(name="dataJson")
|
68
|
-
def data_json(self) -> str:
|
69
|
+
def data_json(self) -> builtins.str:
|
69
70
|
"""
|
70
71
|
JSON-encoded string that that is
|
71
72
|
read as the secret data at the given path.
|
@@ -74,7 +75,7 @@ class GetSecretResult:
|
|
74
75
|
|
75
76
|
@property
|
76
77
|
@pulumi.getter
|
77
|
-
def id(self) -> str:
|
78
|
+
def id(self) -> builtins.str:
|
78
79
|
"""
|
79
80
|
The provider-assigned unique ID for this managed resource.
|
80
81
|
"""
|
@@ -82,7 +83,7 @@ class GetSecretResult:
|
|
82
83
|
|
83
84
|
@property
|
84
85
|
@pulumi.getter(name="leaseDuration")
|
85
|
-
def lease_duration(self) -> int:
|
86
|
+
def lease_duration(self) -> builtins.int:
|
86
87
|
"""
|
87
88
|
The duration of the secret lease, in seconds. Once
|
88
89
|
this time has passed any plan generated with this data may fail to apply.
|
@@ -91,7 +92,7 @@ class GetSecretResult:
|
|
91
92
|
|
92
93
|
@property
|
93
94
|
@pulumi.getter(name="leaseId")
|
94
|
-
def lease_id(self) -> str:
|
95
|
+
def lease_id(self) -> builtins.str:
|
95
96
|
"""
|
96
97
|
The lease identifier assigned by Vault, if any.
|
97
98
|
"""
|
@@ -99,7 +100,7 @@ class GetSecretResult:
|
|
99
100
|
|
100
101
|
@property
|
101
102
|
@pulumi.getter(name="leaseRenewable")
|
102
|
-
def lease_renewable(self) -> bool:
|
103
|
+
def lease_renewable(self) -> builtins.bool:
|
103
104
|
"""
|
104
105
|
True if the duration of this lease can be extended
|
105
106
|
through renewal.
|
@@ -108,12 +109,12 @@ class GetSecretResult:
|
|
108
109
|
|
109
110
|
@property
|
110
111
|
@pulumi.getter
|
111
|
-
def namespace(self) -> Optional[str]:
|
112
|
+
def namespace(self) -> Optional[builtins.str]:
|
112
113
|
return pulumi.get(self, "namespace")
|
113
114
|
|
114
115
|
@property
|
115
116
|
@pulumi.getter
|
116
|
-
def path(self) -> str:
|
117
|
+
def path(self) -> builtins.str:
|
117
118
|
return pulumi.get(self, "path")
|
118
119
|
|
119
120
|
|
@@ -133,8 +134,8 @@ class AwaitableGetSecretResult(GetSecretResult):
|
|
133
134
|
path=self.path)
|
134
135
|
|
135
136
|
|
136
|
-
def get_secret(namespace: Optional[str] = None,
|
137
|
-
path: Optional[str] = None,
|
137
|
+
def get_secret(namespace: Optional[builtins.str] = None,
|
138
|
+
path: Optional[builtins.str] = None,
|
138
139
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecretResult:
|
139
140
|
"""
|
140
141
|
## Example Usage
|
@@ -165,11 +166,11 @@ def get_secret(namespace: Optional[str] = None,
|
|
165
166
|
Use of this resource requires the `read` capability on the given path.
|
166
167
|
|
167
168
|
|
168
|
-
:param str namespace: The namespace of the target resource.
|
169
|
+
:param builtins.str namespace: The namespace of the target resource.
|
169
170
|
The value should not contain leading or trailing forward slashes.
|
170
171
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
171
172
|
*Available only for Vault Enterprise*.
|
172
|
-
:param str path: Full path of the KV-V1 secret.
|
173
|
+
:param builtins.str path: Full path of the KV-V1 secret.
|
173
174
|
"""
|
174
175
|
__args__ = dict()
|
175
176
|
__args__['namespace'] = namespace
|
@@ -186,8 +187,8 @@ def get_secret(namespace: Optional[str] = None,
|
|
186
187
|
lease_renewable=pulumi.get(__ret__, 'lease_renewable'),
|
187
188
|
namespace=pulumi.get(__ret__, 'namespace'),
|
188
189
|
path=pulumi.get(__ret__, 'path'))
|
189
|
-
def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
190
|
-
path: Optional[pulumi.Input[str]] = None,
|
190
|
+
def get_secret_output(namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
191
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
191
192
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecretResult]:
|
192
193
|
"""
|
193
194
|
## Example Usage
|
@@ -218,11 +219,11 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
|
218
219
|
Use of this resource requires the `read` capability on the given path.
|
219
220
|
|
220
221
|
|
221
|
-
:param str namespace: The namespace of the target resource.
|
222
|
+
:param builtins.str namespace: The namespace of the target resource.
|
222
223
|
The value should not contain leading or trailing forward slashes.
|
223
224
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
224
225
|
*Available only for Vault Enterprise*.
|
225
|
-
:param str path: Full path of the KV-V1 secret.
|
226
|
+
:param builtins.str path: Full path of the KV-V1 secret.
|
226
227
|
"""
|
227
228
|
__args__ = dict()
|
228
229
|
__args__['namespace'] = namespace
|
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -57,7 +58,7 @@ class GetSecretSubkeysV2Result:
|
|
57
58
|
|
58
59
|
@property
|
59
60
|
@pulumi.getter
|
60
|
-
def data(self) -> Mapping[str, str]:
|
61
|
+
def data(self) -> Mapping[str, builtins.str]:
|
61
62
|
"""
|
62
63
|
Subkeys for the KV-V2 secret stored as a serialized map of strings.
|
63
64
|
"""
|
@@ -65,7 +66,7 @@ class GetSecretSubkeysV2Result:
|
|
65
66
|
|
66
67
|
@property
|
67
68
|
@pulumi.getter(name="dataJson")
|
68
|
-
def data_json(self) -> str:
|
69
|
+
def data_json(self) -> builtins.str:
|
69
70
|
"""
|
70
71
|
Subkeys for the KV-V2 secret read from Vault.
|
71
72
|
"""
|
@@ -73,12 +74,12 @@ class GetSecretSubkeysV2Result:
|
|
73
74
|
|
74
75
|
@property
|
75
76
|
@pulumi.getter
|
76
|
-
def depth(self) -> Optional[int]:
|
77
|
+
def depth(self) -> Optional[builtins.int]:
|
77
78
|
return pulumi.get(self, "depth")
|
78
79
|
|
79
80
|
@property
|
80
81
|
@pulumi.getter
|
81
|
-
def id(self) -> str:
|
82
|
+
def id(self) -> builtins.str:
|
82
83
|
"""
|
83
84
|
The provider-assigned unique ID for this managed resource.
|
84
85
|
"""
|
@@ -86,22 +87,22 @@ class GetSecretSubkeysV2Result:
|
|
86
87
|
|
87
88
|
@property
|
88
89
|
@pulumi.getter
|
89
|
-
def mount(self) -> str:
|
90
|
+
def mount(self) -> builtins.str:
|
90
91
|
return pulumi.get(self, "mount")
|
91
92
|
|
92
93
|
@property
|
93
94
|
@pulumi.getter
|
94
|
-
def name(self) -> str:
|
95
|
+
def name(self) -> builtins.str:
|
95
96
|
return pulumi.get(self, "name")
|
96
97
|
|
97
98
|
@property
|
98
99
|
@pulumi.getter
|
99
|
-
def namespace(self) -> Optional[str]:
|
100
|
+
def namespace(self) -> Optional[builtins.str]:
|
100
101
|
return pulumi.get(self, "namespace")
|
101
102
|
|
102
103
|
@property
|
103
104
|
@pulumi.getter
|
104
|
-
def path(self) -> str:
|
105
|
+
def path(self) -> builtins.str:
|
105
106
|
"""
|
106
107
|
Full path where the KV-V2 secrets are listed.
|
107
108
|
"""
|
@@ -109,7 +110,7 @@ class GetSecretSubkeysV2Result:
|
|
109
110
|
|
110
111
|
@property
|
111
112
|
@pulumi.getter
|
112
|
-
def version(self) -> Optional[int]:
|
113
|
+
def version(self) -> Optional[builtins.int]:
|
113
114
|
return pulumi.get(self, "version")
|
114
115
|
|
115
116
|
|
@@ -130,11 +131,11 @@ class AwaitableGetSecretSubkeysV2Result(GetSecretSubkeysV2Result):
|
|
130
131
|
version=self.version)
|
131
132
|
|
132
133
|
|
133
|
-
def get_secret_subkeys_v2(depth: Optional[int] = None,
|
134
|
-
mount: Optional[str] = None,
|
135
|
-
name: Optional[str] = None,
|
136
|
-
namespace: Optional[str] = None,
|
137
|
-
version: Optional[int] = None,
|
134
|
+
def get_secret_subkeys_v2(depth: Optional[builtins.int] = None,
|
135
|
+
mount: Optional[builtins.str] = None,
|
136
|
+
name: Optional[builtins.str] = None,
|
137
|
+
namespace: Optional[builtins.str] = None,
|
138
|
+
version: Optional[builtins.int] = None,
|
138
139
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecretSubkeysV2Result:
|
139
140
|
"""
|
140
141
|
## Example Usage
|
@@ -167,20 +168,20 @@ def get_secret_subkeys_v2(depth: Optional[int] = None,
|
|
167
168
|
Use of this resource requires the `read` capability on the given path.
|
168
169
|
|
169
170
|
|
170
|
-
:param int depth: Specifies the deepest nesting level to provide in the output.
|
171
|
+
:param builtins.int depth: Specifies the deepest nesting level to provide in the output.
|
171
172
|
If non-zero, keys that reside at the specified depth value will be
|
172
173
|
artificially treated as leaves and will thus be `null` even if further
|
173
174
|
underlying sub-keys exist.
|
174
|
-
:param str mount: Path where KV-V2 engine is mounted.
|
175
|
-
:param str name: Full name of the secret. For a nested secret
|
175
|
+
:param builtins.str mount: Path where KV-V2 engine is mounted.
|
176
|
+
:param builtins.str name: Full name of the secret. For a nested secret
|
176
177
|
the name is the nested path excluding the mount and data
|
177
178
|
prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
|
178
179
|
the name is `foo/bar/baz`.
|
179
|
-
:param str namespace: The namespace of the target resource.
|
180
|
+
:param builtins.str namespace: The namespace of the target resource.
|
180
181
|
The value should not contain leading or trailing forward slashes.
|
181
182
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
182
183
|
*Available only for Vault Enterprise*.
|
183
|
-
:param int version: Specifies the version to return. If not
|
184
|
+
:param builtins.int version: Specifies the version to return. If not
|
184
185
|
set the latest version is returned.
|
185
186
|
"""
|
186
187
|
__args__ = dict()
|
@@ -202,11 +203,11 @@ def get_secret_subkeys_v2(depth: Optional[int] = None,
|
|
202
203
|
namespace=pulumi.get(__ret__, 'namespace'),
|
203
204
|
path=pulumi.get(__ret__, 'path'),
|
204
205
|
version=pulumi.get(__ret__, 'version'))
|
205
|
-
def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] = None,
|
206
|
-
mount: Optional[pulumi.Input[str]] = None,
|
207
|
-
name: Optional[pulumi.Input[str]] = None,
|
208
|
-
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
209
|
-
version: Optional[pulumi.Input[Optional[int]]] = None,
|
206
|
+
def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[builtins.int]]] = None,
|
207
|
+
mount: Optional[pulumi.Input[builtins.str]] = None,
|
208
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
209
|
+
namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
210
|
+
version: Optional[pulumi.Input[Optional[builtins.int]]] = None,
|
210
211
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecretSubkeysV2Result]:
|
211
212
|
"""
|
212
213
|
## Example Usage
|
@@ -239,20 +240,20 @@ def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] =
|
|
239
240
|
Use of this resource requires the `read` capability on the given path.
|
240
241
|
|
241
242
|
|
242
|
-
:param int depth: Specifies the deepest nesting level to provide in the output.
|
243
|
+
:param builtins.int depth: Specifies the deepest nesting level to provide in the output.
|
243
244
|
If non-zero, keys that reside at the specified depth value will be
|
244
245
|
artificially treated as leaves and will thus be `null` even if further
|
245
246
|
underlying sub-keys exist.
|
246
|
-
:param str mount: Path where KV-V2 engine is mounted.
|
247
|
-
:param str name: Full name of the secret. For a nested secret
|
247
|
+
:param builtins.str mount: Path where KV-V2 engine is mounted.
|
248
|
+
:param builtins.str name: Full name of the secret. For a nested secret
|
248
249
|
the name is the nested path excluding the mount and data
|
249
250
|
prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
|
250
251
|
the name is `foo/bar/baz`.
|
251
|
-
:param str namespace: The namespace of the target resource.
|
252
|
+
:param builtins.str namespace: The namespace of the target resource.
|
252
253
|
The value should not contain leading or trailing forward slashes.
|
253
254
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
254
255
|
*Available only for Vault Enterprise*.
|
255
|
-
:param int version: Specifies the version to return. If not
|
256
|
+
:param builtins.int version: Specifies the version to return. If not
|
256
257
|
set the latest version is returned.
|
257
258
|
"""
|
258
259
|
__args__ = dict()
|
pulumi_vault/kv/get_secret_v2.py
CHANGED
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -66,7 +67,7 @@ class GetSecretV2Result:
|
|
66
67
|
|
67
68
|
@property
|
68
69
|
@pulumi.getter(name="createdTime")
|
69
|
-
def created_time(self) -> str:
|
70
|
+
def created_time(self) -> builtins.str:
|
70
71
|
"""
|
71
72
|
Time at which secret was created.
|
72
73
|
"""
|
@@ -74,7 +75,7 @@ class GetSecretV2Result:
|
|
74
75
|
|
75
76
|
@property
|
76
77
|
@pulumi.getter(name="customMetadata")
|
77
|
-
def custom_metadata(self) -> Mapping[str, str]:
|
78
|
+
def custom_metadata(self) -> Mapping[str, builtins.str]:
|
78
79
|
"""
|
79
80
|
Custom metadata for the secret.
|
80
81
|
"""
|
@@ -82,7 +83,7 @@ class GetSecretV2Result:
|
|
82
83
|
|
83
84
|
@property
|
84
85
|
@pulumi.getter
|
85
|
-
def data(self) -> Mapping[str, str]:
|
86
|
+
def data(self) -> Mapping[str, builtins.str]:
|
86
87
|
"""
|
87
88
|
A mapping whose keys are the top-level data keys returned from
|
88
89
|
Vault and whose values are the corresponding values. This map can only
|
@@ -93,7 +94,7 @@ class GetSecretV2Result:
|
|
93
94
|
|
94
95
|
@property
|
95
96
|
@pulumi.getter(name="dataJson")
|
96
|
-
def data_json(self) -> str:
|
97
|
+
def data_json(self) -> builtins.str:
|
97
98
|
"""
|
98
99
|
JSON-encoded string that that is
|
99
100
|
read as the secret data at the given path.
|
@@ -102,7 +103,7 @@ class GetSecretV2Result:
|
|
102
103
|
|
103
104
|
@property
|
104
105
|
@pulumi.getter(name="deletionTime")
|
105
|
-
def deletion_time(self) -> str:
|
106
|
+
def deletion_time(self) -> builtins.str:
|
106
107
|
"""
|
107
108
|
Deletion time for the secret.
|
108
109
|
"""
|
@@ -110,7 +111,7 @@ class GetSecretV2Result:
|
|
110
111
|
|
111
112
|
@property
|
112
113
|
@pulumi.getter
|
113
|
-
def destroyed(self) -> bool:
|
114
|
+
def destroyed(self) -> builtins.bool:
|
114
115
|
"""
|
115
116
|
Indicates whether the secret has been destroyed.
|
116
117
|
"""
|
@@ -118,7 +119,7 @@ class GetSecretV2Result:
|
|
118
119
|
|
119
120
|
@property
|
120
121
|
@pulumi.getter
|
121
|
-
def id(self) -> str:
|
122
|
+
def id(self) -> builtins.str:
|
122
123
|
"""
|
123
124
|
The provider-assigned unique ID for this managed resource.
|
124
125
|
"""
|
@@ -126,22 +127,22 @@ class GetSecretV2Result:
|
|
126
127
|
|
127
128
|
@property
|
128
129
|
@pulumi.getter
|
129
|
-
def mount(self) -> str:
|
130
|
+
def mount(self) -> builtins.str:
|
130
131
|
return pulumi.get(self, "mount")
|
131
132
|
|
132
133
|
@property
|
133
134
|
@pulumi.getter
|
134
|
-
def name(self) -> str:
|
135
|
+
def name(self) -> builtins.str:
|
135
136
|
return pulumi.get(self, "name")
|
136
137
|
|
137
138
|
@property
|
138
139
|
@pulumi.getter
|
139
|
-
def namespace(self) -> Optional[str]:
|
140
|
+
def namespace(self) -> Optional[builtins.str]:
|
140
141
|
return pulumi.get(self, "namespace")
|
141
142
|
|
142
143
|
@property
|
143
144
|
@pulumi.getter
|
144
|
-
def path(self) -> str:
|
145
|
+
def path(self) -> builtins.str:
|
145
146
|
"""
|
146
147
|
Full path where the KVV2 secret is written.
|
147
148
|
"""
|
@@ -149,7 +150,7 @@ class GetSecretV2Result:
|
|
149
150
|
|
150
151
|
@property
|
151
152
|
@pulumi.getter
|
152
|
-
def version(self) -> Optional[int]:
|
153
|
+
def version(self) -> Optional[builtins.int]:
|
153
154
|
"""
|
154
155
|
Version of the secret.
|
155
156
|
"""
|
@@ -176,10 +177,10 @@ class AwaitableGetSecretV2Result(GetSecretV2Result):
|
|
176
177
|
version=self.version)
|
177
178
|
|
178
179
|
|
179
|
-
def get_secret_v2(mount: Optional[str] = None,
|
180
|
-
name: Optional[str] = None,
|
181
|
-
namespace: Optional[str] = None,
|
182
|
-
version: Optional[int] = None,
|
180
|
+
def get_secret_v2(mount: Optional[builtins.str] = None,
|
181
|
+
name: Optional[builtins.str] = None,
|
182
|
+
namespace: Optional[builtins.str] = None,
|
183
|
+
version: Optional[builtins.int] = None,
|
183
184
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecretV2Result:
|
184
185
|
"""
|
185
186
|
## Example Usage
|
@@ -213,16 +214,16 @@ def get_secret_v2(mount: Optional[str] = None,
|
|
213
214
|
Use of this resource requires the `read` capability on the given path.
|
214
215
|
|
215
216
|
|
216
|
-
:param str mount: Path where KV-V2 engine is mounted.
|
217
|
-
:param str name: Full name of the secret. For a nested secret
|
217
|
+
:param builtins.str mount: Path where KV-V2 engine is mounted.
|
218
|
+
:param builtins.str name: Full name of the secret. For a nested secret
|
218
219
|
the name is the nested path excluding the mount and data
|
219
220
|
prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
|
220
221
|
the name is `foo/bar/baz`.
|
221
|
-
:param str namespace: The namespace of the target resource.
|
222
|
+
:param builtins.str namespace: The namespace of the target resource.
|
222
223
|
The value should not contain leading or trailing forward slashes.
|
223
224
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
224
225
|
*Available only for Vault Enterprise*.
|
225
|
-
:param int version: Version of the secret to retrieve.
|
226
|
+
:param builtins.int version: Version of the secret to retrieve.
|
226
227
|
"""
|
227
228
|
__args__ = dict()
|
228
229
|
__args__['mount'] = mount
|
@@ -245,10 +246,10 @@ def get_secret_v2(mount: Optional[str] = None,
|
|
245
246
|
namespace=pulumi.get(__ret__, 'namespace'),
|
246
247
|
path=pulumi.get(__ret__, 'path'),
|
247
248
|
version=pulumi.get(__ret__, 'version'))
|
248
|
-
def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
249
|
-
name: Optional[pulumi.Input[str]] = None,
|
250
|
-
namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
251
|
-
version: Optional[pulumi.Input[Optional[int]]] = None,
|
249
|
+
def get_secret_v2_output(mount: Optional[pulumi.Input[builtins.str]] = None,
|
250
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
251
|
+
namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
|
252
|
+
version: Optional[pulumi.Input[Optional[builtins.int]]] = None,
|
252
253
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecretV2Result]:
|
253
254
|
"""
|
254
255
|
## Example Usage
|
@@ -282,16 +283,16 @@ def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
|
282
283
|
Use of this resource requires the `read` capability on the given path.
|
283
284
|
|
284
285
|
|
285
|
-
:param str mount: Path where KV-V2 engine is mounted.
|
286
|
-
:param str name: Full name of the secret. For a nested secret
|
286
|
+
:param builtins.str mount: Path where KV-V2 engine is mounted.
|
287
|
+
:param builtins.str name: Full name of the secret. For a nested secret
|
287
288
|
the name is the nested path excluding the mount and data
|
288
289
|
prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
|
289
290
|
the name is `foo/bar/baz`.
|
290
|
-
:param str namespace: The namespace of the target resource.
|
291
|
+
:param builtins.str namespace: The namespace of the target resource.
|
291
292
|
The value should not contain leading or trailing forward slashes.
|
292
293
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
293
294
|
*Available only for Vault Enterprise*.
|
294
|
-
:param int version: Version of the secret to retrieve.
|
295
|
+
:param builtins.int version: Version of the secret to retrieve.
|
295
296
|
"""
|
296
297
|
__args__ = dict()
|
297
298
|
__args__['mount'] = mount
|