pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -62,9 +61,9 @@ class GetSecretResult:
|
|
62
61
|
raise TypeError("Expected argument 'with_lease_start_time' to be a bool")
|
63
62
|
pulumi.set(__self__, "with_lease_start_time", with_lease_start_time)
|
64
63
|
|
65
|
-
@property
|
64
|
+
@_builtins.property
|
66
65
|
@pulumi.getter
|
67
|
-
def data(self) -> Mapping[str,
|
66
|
+
def data(self) -> Mapping[str, _builtins.str]:
|
68
67
|
"""
|
69
68
|
A mapping whose keys are the top-level data keys returned from
|
70
69
|
Vault and whose values are the corresponding values. This map can only
|
@@ -73,26 +72,26 @@ class GetSecretResult:
|
|
73
72
|
"""
|
74
73
|
return pulumi.get(self, "data")
|
75
74
|
|
76
|
-
@property
|
75
|
+
@_builtins.property
|
77
76
|
@pulumi.getter(name="dataJson")
|
78
|
-
def data_json(self) ->
|
77
|
+
def data_json(self) -> _builtins.str:
|
79
78
|
"""
|
80
79
|
A string containing the full data payload retrieved from
|
81
80
|
Vault, serialized in JSON format.
|
82
81
|
"""
|
83
82
|
return pulumi.get(self, "data_json")
|
84
83
|
|
85
|
-
@property
|
84
|
+
@_builtins.property
|
86
85
|
@pulumi.getter
|
87
|
-
def id(self) ->
|
86
|
+
def id(self) -> _builtins.str:
|
88
87
|
"""
|
89
88
|
The provider-assigned unique ID for this managed resource.
|
90
89
|
"""
|
91
90
|
return pulumi.get(self, "id")
|
92
91
|
|
93
|
-
@property
|
92
|
+
@_builtins.property
|
94
93
|
@pulumi.getter(name="leaseDuration")
|
95
|
-
def lease_duration(self) ->
|
94
|
+
def lease_duration(self) -> _builtins.int:
|
96
95
|
"""
|
97
96
|
The duration of the secret lease, in seconds relative
|
98
97
|
to the time the data was requested. Once this time has passed any plan
|
@@ -100,42 +99,42 @@ class GetSecretResult:
|
|
100
99
|
"""
|
101
100
|
return pulumi.get(self, "lease_duration")
|
102
101
|
|
103
|
-
@property
|
102
|
+
@_builtins.property
|
104
103
|
@pulumi.getter(name="leaseId")
|
105
|
-
def lease_id(self) ->
|
104
|
+
def lease_id(self) -> _builtins.str:
|
106
105
|
"""
|
107
106
|
The lease identifier assigned by Vault, if any.
|
108
107
|
"""
|
109
108
|
return pulumi.get(self, "lease_id")
|
110
109
|
|
111
|
-
@property
|
110
|
+
@_builtins.property
|
112
111
|
@pulumi.getter(name="leaseRenewable")
|
113
|
-
def lease_renewable(self) ->
|
112
|
+
def lease_renewable(self) -> _builtins.bool:
|
114
113
|
return pulumi.get(self, "lease_renewable")
|
115
114
|
|
116
|
-
@property
|
115
|
+
@_builtins.property
|
117
116
|
@pulumi.getter(name="leaseStartTime")
|
118
|
-
def lease_start_time(self) ->
|
117
|
+
def lease_start_time(self) -> _builtins.str:
|
119
118
|
return pulumi.get(self, "lease_start_time")
|
120
119
|
|
121
|
-
@property
|
120
|
+
@_builtins.property
|
122
121
|
@pulumi.getter
|
123
|
-
def namespace(self) -> Optional[
|
122
|
+
def namespace(self) -> Optional[_builtins.str]:
|
124
123
|
return pulumi.get(self, "namespace")
|
125
124
|
|
126
|
-
@property
|
125
|
+
@_builtins.property
|
127
126
|
@pulumi.getter
|
128
|
-
def path(self) ->
|
127
|
+
def path(self) -> _builtins.str:
|
129
128
|
return pulumi.get(self, "path")
|
130
129
|
|
131
|
-
@property
|
130
|
+
@_builtins.property
|
132
131
|
@pulumi.getter
|
133
|
-
def version(self) -> Optional[
|
132
|
+
def version(self) -> Optional[_builtins.int]:
|
134
133
|
return pulumi.get(self, "version")
|
135
134
|
|
136
|
-
@property
|
135
|
+
@_builtins.property
|
137
136
|
@pulumi.getter(name="withLeaseStartTime")
|
138
|
-
def with_lease_start_time(self) -> Optional[
|
137
|
+
def with_lease_start_time(self) -> Optional[_builtins.bool]:
|
139
138
|
return pulumi.get(self, "with_lease_start_time")
|
140
139
|
|
141
140
|
|
@@ -158,10 +157,10 @@ class AwaitableGetSecretResult(GetSecretResult):
|
|
158
157
|
with_lease_start_time=self.with_lease_start_time)
|
159
158
|
|
160
159
|
|
161
|
-
def get_secret(namespace: Optional[
|
162
|
-
path: Optional[
|
163
|
-
version: Optional[
|
164
|
-
with_lease_start_time: Optional[
|
160
|
+
def get_secret(namespace: Optional[_builtins.str] = None,
|
161
|
+
path: Optional[_builtins.str] = None,
|
162
|
+
version: Optional[_builtins.int] = None,
|
163
|
+
with_lease_start_time: Optional[_builtins.bool] = None,
|
165
164
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecretResult:
|
166
165
|
"""
|
167
166
|
## Example Usage
|
@@ -196,19 +195,19 @@ def get_secret(namespace: Optional[builtins.str] = None,
|
|
196
195
|
Use of this resource requires the `read` capability on the given path.
|
197
196
|
|
198
197
|
|
199
|
-
:param
|
198
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
200
199
|
The value should not contain leading or trailing forward slashes.
|
201
200
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
202
201
|
*Available only for Vault Enterprise*.
|
203
|
-
:param
|
202
|
+
:param _builtins.str path: The full logical path from which to request data.
|
204
203
|
To read data from the "generic" secret backend mounted in Vault by
|
205
204
|
default, this should be prefixed with `secret/`. Reading from other backends
|
206
205
|
with this data source is possible; consult each backend's documentation
|
207
206
|
to see which endpoints support the `GET` method.
|
208
|
-
:param
|
207
|
+
:param _builtins.int version: The version of the secret to read. This is used by the
|
209
208
|
Vault KV secrets engine - version 2 to indicate which version of the secret
|
210
209
|
to read.
|
211
|
-
:param
|
210
|
+
:param _builtins.bool with_lease_start_time: If set to true, stores `lease_start_time` in the TF state.
|
212
211
|
Note that storing the `lease_start_time` in the TF state will cause a persistent drift
|
213
212
|
on every `pulumi preview` and will require a `pulumi up`.
|
214
213
|
"""
|
@@ -232,10 +231,10 @@ def get_secret(namespace: Optional[builtins.str] = None,
|
|
232
231
|
path=pulumi.get(__ret__, 'path'),
|
233
232
|
version=pulumi.get(__ret__, 'version'),
|
234
233
|
with_lease_start_time=pulumi.get(__ret__, 'with_lease_start_time'))
|
235
|
-
def get_secret_output(namespace: Optional[pulumi.Input[Optional[
|
236
|
-
path: Optional[pulumi.Input[
|
237
|
-
version: Optional[pulumi.Input[Optional[
|
238
|
-
with_lease_start_time: Optional[pulumi.Input[Optional[
|
234
|
+
def get_secret_output(namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
235
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
236
|
+
version: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
|
237
|
+
with_lease_start_time: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
|
239
238
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecretResult]:
|
240
239
|
"""
|
241
240
|
## Example Usage
|
@@ -270,19 +269,19 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[builtins.str]]]
|
|
270
269
|
Use of this resource requires the `read` capability on the given path.
|
271
270
|
|
272
271
|
|
273
|
-
:param
|
272
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
274
273
|
The value should not contain leading or trailing forward slashes.
|
275
274
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
276
275
|
*Available only for Vault Enterprise*.
|
277
|
-
:param
|
276
|
+
:param _builtins.str path: The full logical path from which to request data.
|
278
277
|
To read data from the "generic" secret backend mounted in Vault by
|
279
278
|
default, this should be prefixed with `secret/`. Reading from other backends
|
280
279
|
with this data source is possible; consult each backend's documentation
|
281
280
|
to see which endpoints support the `GET` method.
|
282
|
-
:param
|
281
|
+
:param _builtins.int version: The version of the secret to read. This is used by the
|
283
282
|
Vault KV secrets engine - version 2 to indicate which version of the secret
|
284
283
|
to read.
|
285
|
-
:param
|
284
|
+
:param _builtins.bool with_lease_start_time: If set to true, stores `lease_start_time` in the TF state.
|
286
285
|
Note that storing the `lease_start_time` in the TF state will cause a persistent drift
|
287
286
|
on every `pulumi preview` and will require a `pulumi up`.
|
288
287
|
"""
|
pulumi_vault/generic/secret.py
CHANGED
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,28 +19,28 @@ __all__ = ['SecretArgs', 'Secret']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class SecretArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
data_json: pulumi.Input[
|
24
|
-
path: pulumi.Input[
|
25
|
-
delete_all_versions: Optional[pulumi.Input[
|
26
|
-
disable_read: Optional[pulumi.Input[
|
27
|
-
namespace: Optional[pulumi.Input[
|
22
|
+
data_json: pulumi.Input[_builtins.str],
|
23
|
+
path: pulumi.Input[_builtins.str],
|
24
|
+
delete_all_versions: Optional[pulumi.Input[_builtins.bool]] = None,
|
25
|
+
disable_read: Optional[pulumi.Input[_builtins.bool]] = None,
|
26
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None):
|
28
27
|
"""
|
29
28
|
The set of arguments for constructing a Secret resource.
|
30
|
-
:param pulumi.Input[
|
29
|
+
:param pulumi.Input[_builtins.str] data_json: String containing a JSON-encoded object that will be
|
31
30
|
written as the secret data at the given path.
|
32
|
-
:param pulumi.Input[
|
31
|
+
:param pulumi.Input[_builtins.str] path: The full logical path at which to write the given data.
|
33
32
|
To write data into the "generic" secret backend mounted in Vault by default,
|
34
33
|
this should be prefixed with `secret/`. Writing to other backends with this
|
35
34
|
resource is possible; consult each backend's documentation to see which
|
36
35
|
endpoints support the `PUT` and `DELETE` methods.
|
37
|
-
:param pulumi.Input[
|
36
|
+
:param pulumi.Input[_builtins.bool] delete_all_versions: true/false. Only applicable for kv-v2 stores.
|
38
37
|
If set to `true`, permanently deletes all versions for
|
39
38
|
the specified key. The default behavior is to only delete the latest version of the
|
40
39
|
secret.
|
41
|
-
:param pulumi.Input[
|
40
|
+
:param pulumi.Input[_builtins.bool] disable_read: true/false. Set this to true if your vault
|
42
41
|
authentication is not able to read the data. Setting this to `true` will
|
43
42
|
break drift detection. Defaults to false.
|
44
|
-
:param pulumi.Input[
|
43
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
45
44
|
The value should not contain leading or trailing forward slashes.
|
46
45
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
47
46
|
*Available only for Vault Enterprise*.
|
@@ -55,9 +54,9 @@ class SecretArgs:
|
|
55
54
|
if namespace is not None:
|
56
55
|
pulumi.set(__self__, "namespace", namespace)
|
57
56
|
|
58
|
-
@property
|
57
|
+
@_builtins.property
|
59
58
|
@pulumi.getter(name="dataJson")
|
60
|
-
def data_json(self) -> pulumi.Input[
|
59
|
+
def data_json(self) -> pulumi.Input[_builtins.str]:
|
61
60
|
"""
|
62
61
|
String containing a JSON-encoded object that will be
|
63
62
|
written as the secret data at the given path.
|
@@ -65,12 +64,12 @@ class SecretArgs:
|
|
65
64
|
return pulumi.get(self, "data_json")
|
66
65
|
|
67
66
|
@data_json.setter
|
68
|
-
def data_json(self, value: pulumi.Input[
|
67
|
+
def data_json(self, value: pulumi.Input[_builtins.str]):
|
69
68
|
pulumi.set(self, "data_json", value)
|
70
69
|
|
71
|
-
@property
|
70
|
+
@_builtins.property
|
72
71
|
@pulumi.getter
|
73
|
-
def path(self) -> pulumi.Input[
|
72
|
+
def path(self) -> pulumi.Input[_builtins.str]:
|
74
73
|
"""
|
75
74
|
The full logical path at which to write the given data.
|
76
75
|
To write data into the "generic" secret backend mounted in Vault by default,
|
@@ -81,12 +80,12 @@ class SecretArgs:
|
|
81
80
|
return pulumi.get(self, "path")
|
82
81
|
|
83
82
|
@path.setter
|
84
|
-
def path(self, value: pulumi.Input[
|
83
|
+
def path(self, value: pulumi.Input[_builtins.str]):
|
85
84
|
pulumi.set(self, "path", value)
|
86
85
|
|
87
|
-
@property
|
86
|
+
@_builtins.property
|
88
87
|
@pulumi.getter(name="deleteAllVersions")
|
89
|
-
def delete_all_versions(self) -> Optional[pulumi.Input[
|
88
|
+
def delete_all_versions(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
90
89
|
"""
|
91
90
|
true/false. Only applicable for kv-v2 stores.
|
92
91
|
If set to `true`, permanently deletes all versions for
|
@@ -96,12 +95,12 @@ class SecretArgs:
|
|
96
95
|
return pulumi.get(self, "delete_all_versions")
|
97
96
|
|
98
97
|
@delete_all_versions.setter
|
99
|
-
def delete_all_versions(self, value: Optional[pulumi.Input[
|
98
|
+
def delete_all_versions(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
100
99
|
pulumi.set(self, "delete_all_versions", value)
|
101
100
|
|
102
|
-
@property
|
101
|
+
@_builtins.property
|
103
102
|
@pulumi.getter(name="disableRead")
|
104
|
-
def disable_read(self) -> Optional[pulumi.Input[
|
103
|
+
def disable_read(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
105
104
|
"""
|
106
105
|
true/false. Set this to true if your vault
|
107
106
|
authentication is not able to read the data. Setting this to `true` will
|
@@ -110,12 +109,12 @@ class SecretArgs:
|
|
110
109
|
return pulumi.get(self, "disable_read")
|
111
110
|
|
112
111
|
@disable_read.setter
|
113
|
-
def disable_read(self, value: Optional[pulumi.Input[
|
112
|
+
def disable_read(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
114
113
|
pulumi.set(self, "disable_read", value)
|
115
114
|
|
116
|
-
@property
|
115
|
+
@_builtins.property
|
117
116
|
@pulumi.getter
|
118
|
-
def namespace(self) -> Optional[pulumi.Input[
|
117
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
119
118
|
"""
|
120
119
|
The namespace to provision the resource in.
|
121
120
|
The value should not contain leading or trailing forward slashes.
|
@@ -125,39 +124,39 @@ class SecretArgs:
|
|
125
124
|
return pulumi.get(self, "namespace")
|
126
125
|
|
127
126
|
@namespace.setter
|
128
|
-
def namespace(self, value: Optional[pulumi.Input[
|
127
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
129
128
|
pulumi.set(self, "namespace", value)
|
130
129
|
|
131
130
|
|
132
131
|
@pulumi.input_type
|
133
132
|
class _SecretState:
|
134
133
|
def __init__(__self__, *,
|
135
|
-
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
136
|
-
data_json: Optional[pulumi.Input[
|
137
|
-
delete_all_versions: Optional[pulumi.Input[
|
138
|
-
disable_read: Optional[pulumi.Input[
|
139
|
-
namespace: Optional[pulumi.Input[
|
140
|
-
path: Optional[pulumi.Input[
|
134
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
135
|
+
data_json: Optional[pulumi.Input[_builtins.str]] = None,
|
136
|
+
delete_all_versions: Optional[pulumi.Input[_builtins.bool]] = None,
|
137
|
+
disable_read: Optional[pulumi.Input[_builtins.bool]] = None,
|
138
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
139
|
+
path: Optional[pulumi.Input[_builtins.str]] = None):
|
141
140
|
"""
|
142
141
|
Input properties used for looking up and filtering Secret resources.
|
143
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
142
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] data: A mapping whose keys are the top-level data keys returned from
|
144
143
|
Vault and whose values are the corresponding values. This map can only
|
145
144
|
represent string data, so any non-string values returned from Vault are
|
146
145
|
serialized as JSON.
|
147
|
-
:param pulumi.Input[
|
146
|
+
:param pulumi.Input[_builtins.str] data_json: String containing a JSON-encoded object that will be
|
148
147
|
written as the secret data at the given path.
|
149
|
-
:param pulumi.Input[
|
148
|
+
:param pulumi.Input[_builtins.bool] delete_all_versions: true/false. Only applicable for kv-v2 stores.
|
150
149
|
If set to `true`, permanently deletes all versions for
|
151
150
|
the specified key. The default behavior is to only delete the latest version of the
|
152
151
|
secret.
|
153
|
-
:param pulumi.Input[
|
152
|
+
:param pulumi.Input[_builtins.bool] disable_read: true/false. Set this to true if your vault
|
154
153
|
authentication is not able to read the data. Setting this to `true` will
|
155
154
|
break drift detection. Defaults to false.
|
156
|
-
:param pulumi.Input[
|
155
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
157
156
|
The value should not contain leading or trailing forward slashes.
|
158
157
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
159
158
|
*Available only for Vault Enterprise*.
|
160
|
-
:param pulumi.Input[
|
159
|
+
:param pulumi.Input[_builtins.str] path: The full logical path at which to write the given data.
|
161
160
|
To write data into the "generic" secret backend mounted in Vault by default,
|
162
161
|
this should be prefixed with `secret/`. Writing to other backends with this
|
163
162
|
resource is possible; consult each backend's documentation to see which
|
@@ -176,9 +175,9 @@ class _SecretState:
|
|
176
175
|
if path is not None:
|
177
176
|
pulumi.set(__self__, "path", path)
|
178
177
|
|
179
|
-
@property
|
178
|
+
@_builtins.property
|
180
179
|
@pulumi.getter
|
181
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
180
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
182
181
|
"""
|
183
182
|
A mapping whose keys are the top-level data keys returned from
|
184
183
|
Vault and whose values are the corresponding values. This map can only
|
@@ -188,12 +187,12 @@ class _SecretState:
|
|
188
187
|
return pulumi.get(self, "data")
|
189
188
|
|
190
189
|
@data.setter
|
191
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
190
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
192
191
|
pulumi.set(self, "data", value)
|
193
192
|
|
194
|
-
@property
|
193
|
+
@_builtins.property
|
195
194
|
@pulumi.getter(name="dataJson")
|
196
|
-
def data_json(self) -> Optional[pulumi.Input[
|
195
|
+
def data_json(self) -> Optional[pulumi.Input[_builtins.str]]:
|
197
196
|
"""
|
198
197
|
String containing a JSON-encoded object that will be
|
199
198
|
written as the secret data at the given path.
|
@@ -201,12 +200,12 @@ class _SecretState:
|
|
201
200
|
return pulumi.get(self, "data_json")
|
202
201
|
|
203
202
|
@data_json.setter
|
204
|
-
def data_json(self, value: Optional[pulumi.Input[
|
203
|
+
def data_json(self, value: Optional[pulumi.Input[_builtins.str]]):
|
205
204
|
pulumi.set(self, "data_json", value)
|
206
205
|
|
207
|
-
@property
|
206
|
+
@_builtins.property
|
208
207
|
@pulumi.getter(name="deleteAllVersions")
|
209
|
-
def delete_all_versions(self) -> Optional[pulumi.Input[
|
208
|
+
def delete_all_versions(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
210
209
|
"""
|
211
210
|
true/false. Only applicable for kv-v2 stores.
|
212
211
|
If set to `true`, permanently deletes all versions for
|
@@ -216,12 +215,12 @@ class _SecretState:
|
|
216
215
|
return pulumi.get(self, "delete_all_versions")
|
217
216
|
|
218
217
|
@delete_all_versions.setter
|
219
|
-
def delete_all_versions(self, value: Optional[pulumi.Input[
|
218
|
+
def delete_all_versions(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
220
219
|
pulumi.set(self, "delete_all_versions", value)
|
221
220
|
|
222
|
-
@property
|
221
|
+
@_builtins.property
|
223
222
|
@pulumi.getter(name="disableRead")
|
224
|
-
def disable_read(self) -> Optional[pulumi.Input[
|
223
|
+
def disable_read(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
225
224
|
"""
|
226
225
|
true/false. Set this to true if your vault
|
227
226
|
authentication is not able to read the data. Setting this to `true` will
|
@@ -230,12 +229,12 @@ class _SecretState:
|
|
230
229
|
return pulumi.get(self, "disable_read")
|
231
230
|
|
232
231
|
@disable_read.setter
|
233
|
-
def disable_read(self, value: Optional[pulumi.Input[
|
232
|
+
def disable_read(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
234
233
|
pulumi.set(self, "disable_read", value)
|
235
234
|
|
236
|
-
@property
|
235
|
+
@_builtins.property
|
237
236
|
@pulumi.getter
|
238
|
-
def namespace(self) -> Optional[pulumi.Input[
|
237
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
239
238
|
"""
|
240
239
|
The namespace to provision the resource in.
|
241
240
|
The value should not contain leading or trailing forward slashes.
|
@@ -245,12 +244,12 @@ class _SecretState:
|
|
245
244
|
return pulumi.get(self, "namespace")
|
246
245
|
|
247
246
|
@namespace.setter
|
248
|
-
def namespace(self, value: Optional[pulumi.Input[
|
247
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
249
248
|
pulumi.set(self, "namespace", value)
|
250
249
|
|
251
|
-
@property
|
250
|
+
@_builtins.property
|
252
251
|
@pulumi.getter
|
253
|
-
def path(self) -> Optional[pulumi.Input[
|
252
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
254
253
|
"""
|
255
254
|
The full logical path at which to write the given data.
|
256
255
|
To write data into the "generic" secret backend mounted in Vault by default,
|
@@ -261,7 +260,7 @@ class _SecretState:
|
|
261
260
|
return pulumi.get(self, "path")
|
262
261
|
|
263
262
|
@path.setter
|
264
|
-
def path(self, value: Optional[pulumi.Input[
|
263
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
265
264
|
pulumi.set(self, "path", value)
|
266
265
|
|
267
266
|
|
@@ -271,11 +270,11 @@ class Secret(pulumi.CustomResource):
|
|
271
270
|
def __init__(__self__,
|
272
271
|
resource_name: str,
|
273
272
|
opts: Optional[pulumi.ResourceOptions] = None,
|
274
|
-
data_json: Optional[pulumi.Input[
|
275
|
-
delete_all_versions: Optional[pulumi.Input[
|
276
|
-
disable_read: Optional[pulumi.Input[
|
277
|
-
namespace: Optional[pulumi.Input[
|
278
|
-
path: Optional[pulumi.Input[
|
273
|
+
data_json: Optional[pulumi.Input[_builtins.str]] = None,
|
274
|
+
delete_all_versions: Optional[pulumi.Input[_builtins.bool]] = None,
|
275
|
+
disable_read: Optional[pulumi.Input[_builtins.bool]] = None,
|
276
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
277
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
279
278
|
__props__=None):
|
280
279
|
"""
|
281
280
|
## Import
|
@@ -288,20 +287,20 @@ class Secret(pulumi.CustomResource):
|
|
288
287
|
|
289
288
|
:param str resource_name: The name of the resource.
|
290
289
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
291
|
-
:param pulumi.Input[
|
290
|
+
:param pulumi.Input[_builtins.str] data_json: String containing a JSON-encoded object that will be
|
292
291
|
written as the secret data at the given path.
|
293
|
-
:param pulumi.Input[
|
292
|
+
:param pulumi.Input[_builtins.bool] delete_all_versions: true/false. Only applicable for kv-v2 stores.
|
294
293
|
If set to `true`, permanently deletes all versions for
|
295
294
|
the specified key. The default behavior is to only delete the latest version of the
|
296
295
|
secret.
|
297
|
-
:param pulumi.Input[
|
296
|
+
:param pulumi.Input[_builtins.bool] disable_read: true/false. Set this to true if your vault
|
298
297
|
authentication is not able to read the data. Setting this to `true` will
|
299
298
|
break drift detection. Defaults to false.
|
300
|
-
:param pulumi.Input[
|
299
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
301
300
|
The value should not contain leading or trailing forward slashes.
|
302
301
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
303
302
|
*Available only for Vault Enterprise*.
|
304
|
-
:param pulumi.Input[
|
303
|
+
:param pulumi.Input[_builtins.str] path: The full logical path at which to write the given data.
|
305
304
|
To write data into the "generic" secret backend mounted in Vault by default,
|
306
305
|
this should be prefixed with `secret/`. Writing to other backends with this
|
307
306
|
resource is possible; consult each backend's documentation to see which
|
@@ -337,11 +336,11 @@ class Secret(pulumi.CustomResource):
|
|
337
336
|
def _internal_init(__self__,
|
338
337
|
resource_name: str,
|
339
338
|
opts: Optional[pulumi.ResourceOptions] = None,
|
340
|
-
data_json: Optional[pulumi.Input[
|
341
|
-
delete_all_versions: Optional[pulumi.Input[
|
342
|
-
disable_read: Optional[pulumi.Input[
|
343
|
-
namespace: Optional[pulumi.Input[
|
344
|
-
path: Optional[pulumi.Input[
|
339
|
+
data_json: Optional[pulumi.Input[_builtins.str]] = None,
|
340
|
+
delete_all_versions: Optional[pulumi.Input[_builtins.bool]] = None,
|
341
|
+
disable_read: Optional[pulumi.Input[_builtins.bool]] = None,
|
342
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
343
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
345
344
|
__props__=None):
|
346
345
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
347
346
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -373,12 +372,12 @@ class Secret(pulumi.CustomResource):
|
|
373
372
|
def get(resource_name: str,
|
374
373
|
id: pulumi.Input[str],
|
375
374
|
opts: Optional[pulumi.ResourceOptions] = None,
|
376
|
-
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
377
|
-
data_json: Optional[pulumi.Input[
|
378
|
-
delete_all_versions: Optional[pulumi.Input[
|
379
|
-
disable_read: Optional[pulumi.Input[
|
380
|
-
namespace: Optional[pulumi.Input[
|
381
|
-
path: Optional[pulumi.Input[
|
375
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
376
|
+
data_json: Optional[pulumi.Input[_builtins.str]] = None,
|
377
|
+
delete_all_versions: Optional[pulumi.Input[_builtins.bool]] = None,
|
378
|
+
disable_read: Optional[pulumi.Input[_builtins.bool]] = None,
|
379
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
380
|
+
path: Optional[pulumi.Input[_builtins.str]] = None) -> 'Secret':
|
382
381
|
"""
|
383
382
|
Get an existing Secret resource's state with the given name, id, and optional extra
|
384
383
|
properties used to qualify the lookup.
|
@@ -386,24 +385,24 @@ class Secret(pulumi.CustomResource):
|
|
386
385
|
:param str resource_name: The unique name of the resulting resource.
|
387
386
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
388
387
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
389
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
388
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] data: A mapping whose keys are the top-level data keys returned from
|
390
389
|
Vault and whose values are the corresponding values. This map can only
|
391
390
|
represent string data, so any non-string values returned from Vault are
|
392
391
|
serialized as JSON.
|
393
|
-
:param pulumi.Input[
|
392
|
+
:param pulumi.Input[_builtins.str] data_json: String containing a JSON-encoded object that will be
|
394
393
|
written as the secret data at the given path.
|
395
|
-
:param pulumi.Input[
|
394
|
+
:param pulumi.Input[_builtins.bool] delete_all_versions: true/false. Only applicable for kv-v2 stores.
|
396
395
|
If set to `true`, permanently deletes all versions for
|
397
396
|
the specified key. The default behavior is to only delete the latest version of the
|
398
397
|
secret.
|
399
|
-
:param pulumi.Input[
|
398
|
+
:param pulumi.Input[_builtins.bool] disable_read: true/false. Set this to true if your vault
|
400
399
|
authentication is not able to read the data. Setting this to `true` will
|
401
400
|
break drift detection. Defaults to false.
|
402
|
-
:param pulumi.Input[
|
401
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
403
402
|
The value should not contain leading or trailing forward slashes.
|
404
403
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
405
404
|
*Available only for Vault Enterprise*.
|
406
|
-
:param pulumi.Input[
|
405
|
+
:param pulumi.Input[_builtins.str] path: The full logical path at which to write the given data.
|
407
406
|
To write data into the "generic" secret backend mounted in Vault by default,
|
408
407
|
this should be prefixed with `secret/`. Writing to other backends with this
|
409
408
|
resource is possible; consult each backend's documentation to see which
|
@@ -421,9 +420,9 @@ class Secret(pulumi.CustomResource):
|
|
421
420
|
__props__.__dict__["path"] = path
|
422
421
|
return Secret(resource_name, opts=opts, __props__=__props__)
|
423
422
|
|
424
|
-
@property
|
423
|
+
@_builtins.property
|
425
424
|
@pulumi.getter
|
426
|
-
def data(self) -> pulumi.Output[Mapping[str,
|
425
|
+
def data(self) -> pulumi.Output[Mapping[str, _builtins.str]]:
|
427
426
|
"""
|
428
427
|
A mapping whose keys are the top-level data keys returned from
|
429
428
|
Vault and whose values are the corresponding values. This map can only
|
@@ -432,18 +431,18 @@ class Secret(pulumi.CustomResource):
|
|
432
431
|
"""
|
433
432
|
return pulumi.get(self, "data")
|
434
433
|
|
435
|
-
@property
|
434
|
+
@_builtins.property
|
436
435
|
@pulumi.getter(name="dataJson")
|
437
|
-
def data_json(self) -> pulumi.Output[
|
436
|
+
def data_json(self) -> pulumi.Output[_builtins.str]:
|
438
437
|
"""
|
439
438
|
String containing a JSON-encoded object that will be
|
440
439
|
written as the secret data at the given path.
|
441
440
|
"""
|
442
441
|
return pulumi.get(self, "data_json")
|
443
442
|
|
444
|
-
@property
|
443
|
+
@_builtins.property
|
445
444
|
@pulumi.getter(name="deleteAllVersions")
|
446
|
-
def delete_all_versions(self) -> pulumi.Output[Optional[
|
445
|
+
def delete_all_versions(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
447
446
|
"""
|
448
447
|
true/false. Only applicable for kv-v2 stores.
|
449
448
|
If set to `true`, permanently deletes all versions for
|
@@ -452,9 +451,9 @@ class Secret(pulumi.CustomResource):
|
|
452
451
|
"""
|
453
452
|
return pulumi.get(self, "delete_all_versions")
|
454
453
|
|
455
|
-
@property
|
454
|
+
@_builtins.property
|
456
455
|
@pulumi.getter(name="disableRead")
|
457
|
-
def disable_read(self) -> pulumi.Output[Optional[
|
456
|
+
def disable_read(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
458
457
|
"""
|
459
458
|
true/false. Set this to true if your vault
|
460
459
|
authentication is not able to read the data. Setting this to `true` will
|
@@ -462,9 +461,9 @@ class Secret(pulumi.CustomResource):
|
|
462
461
|
"""
|
463
462
|
return pulumi.get(self, "disable_read")
|
464
463
|
|
465
|
-
@property
|
464
|
+
@_builtins.property
|
466
465
|
@pulumi.getter
|
467
|
-
def namespace(self) -> pulumi.Output[Optional[
|
466
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
468
467
|
"""
|
469
468
|
The namespace to provision the resource in.
|
470
469
|
The value should not contain leading or trailing forward slashes.
|
@@ -473,9 +472,9 @@ class Secret(pulumi.CustomResource):
|
|
473
472
|
"""
|
474
473
|
return pulumi.get(self, "namespace")
|
475
474
|
|
476
|
-
@property
|
475
|
+
@_builtins.property
|
477
476
|
@pulumi.getter
|
478
|
-
def path(self) -> pulumi.Output[
|
477
|
+
def path(self) -> pulumi.Output[_builtins.str]:
|
479
478
|
"""
|
480
479
|
The full logical path at which to write the given data.
|
481
480
|
To write data into the "generic" secret backend mounted in Vault by default,
|