pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -41,30 +40,30 @@ class GetSecretsListResult:
|
|
41
40
|
raise TypeError("Expected argument 'path' to be a str")
|
42
41
|
pulumi.set(__self__, "path", path)
|
43
42
|
|
44
|
-
@property
|
43
|
+
@_builtins.property
|
45
44
|
@pulumi.getter
|
46
|
-
def id(self) ->
|
45
|
+
def id(self) -> _builtins.str:
|
47
46
|
"""
|
48
47
|
The provider-assigned unique ID for this managed resource.
|
49
48
|
"""
|
50
49
|
return pulumi.get(self, "id")
|
51
50
|
|
52
|
-
@property
|
51
|
+
@_builtins.property
|
53
52
|
@pulumi.getter
|
54
|
-
def names(self) -> Sequence[
|
53
|
+
def names(self) -> Sequence[_builtins.str]:
|
55
54
|
"""
|
56
55
|
List of all secret names listed under the given path.
|
57
56
|
"""
|
58
57
|
return pulumi.get(self, "names")
|
59
58
|
|
60
|
-
@property
|
59
|
+
@_builtins.property
|
61
60
|
@pulumi.getter
|
62
|
-
def namespace(self) -> Optional[
|
61
|
+
def namespace(self) -> Optional[_builtins.str]:
|
63
62
|
return pulumi.get(self, "namespace")
|
64
63
|
|
65
|
-
@property
|
64
|
+
@_builtins.property
|
66
65
|
@pulumi.getter
|
67
|
-
def path(self) ->
|
66
|
+
def path(self) -> _builtins.str:
|
68
67
|
return pulumi.get(self, "path")
|
69
68
|
|
70
69
|
|
@@ -80,8 +79,8 @@ class AwaitableGetSecretsListResult(GetSecretsListResult):
|
|
80
79
|
path=self.path)
|
81
80
|
|
82
81
|
|
83
|
-
def get_secrets_list(namespace: Optional[
|
84
|
-
path: Optional[
|
82
|
+
def get_secrets_list(namespace: Optional[_builtins.str] = None,
|
83
|
+
path: Optional[_builtins.str] = None,
|
85
84
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecretsListResult:
|
86
85
|
"""
|
87
86
|
## Example Usage
|
@@ -116,11 +115,11 @@ def get_secrets_list(namespace: Optional[builtins.str] = None,
|
|
116
115
|
Use of this resource requires the `read` capability on the given path.
|
117
116
|
|
118
117
|
|
119
|
-
:param
|
118
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
120
119
|
The value should not contain leading or trailing forward slashes.
|
121
120
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
122
121
|
*Available only for Vault Enterprise*.
|
123
|
-
:param
|
122
|
+
:param _builtins.str path: Full KV-V1 path where secrets will be listed.
|
124
123
|
"""
|
125
124
|
__args__ = dict()
|
126
125
|
__args__['namespace'] = namespace
|
@@ -133,8 +132,8 @@ def get_secrets_list(namespace: Optional[builtins.str] = None,
|
|
133
132
|
names=pulumi.get(__ret__, 'names'),
|
134
133
|
namespace=pulumi.get(__ret__, 'namespace'),
|
135
134
|
path=pulumi.get(__ret__, 'path'))
|
136
|
-
def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[
|
137
|
-
path: Optional[pulumi.Input[
|
135
|
+
def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
136
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
138
137
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecretsListResult]:
|
139
138
|
"""
|
140
139
|
## Example Usage
|
@@ -169,11 +168,11 @@ def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[builtins.s
|
|
169
168
|
Use of this resource requires the `read` capability on the given path.
|
170
169
|
|
171
170
|
|
172
|
-
:param
|
171
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
173
172
|
The value should not contain leading or trailing forward slashes.
|
174
173
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
175
174
|
*Available only for Vault Enterprise*.
|
176
|
-
:param
|
175
|
+
:param _builtins.str path: Full KV-V1 path where secrets will be listed.
|
177
176
|
"""
|
178
177
|
__args__ = dict()
|
179
178
|
__args__['namespace'] = namespace
|
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -47,40 +46,40 @@ class GetSecretsListV2Result:
|
|
47
46
|
raise TypeError("Expected argument 'path' to be a str")
|
48
47
|
pulumi.set(__self__, "path", path)
|
49
48
|
|
50
|
-
@property
|
49
|
+
@_builtins.property
|
51
50
|
@pulumi.getter
|
52
|
-
def id(self) ->
|
51
|
+
def id(self) -> _builtins.str:
|
53
52
|
"""
|
54
53
|
The provider-assigned unique ID for this managed resource.
|
55
54
|
"""
|
56
55
|
return pulumi.get(self, "id")
|
57
56
|
|
58
|
-
@property
|
57
|
+
@_builtins.property
|
59
58
|
@pulumi.getter
|
60
|
-
def mount(self) ->
|
59
|
+
def mount(self) -> _builtins.str:
|
61
60
|
return pulumi.get(self, "mount")
|
62
61
|
|
63
|
-
@property
|
62
|
+
@_builtins.property
|
64
63
|
@pulumi.getter
|
65
|
-
def name(self) -> Optional[
|
64
|
+
def name(self) -> Optional[_builtins.str]:
|
66
65
|
return pulumi.get(self, "name")
|
67
66
|
|
68
|
-
@property
|
67
|
+
@_builtins.property
|
69
68
|
@pulumi.getter
|
70
|
-
def names(self) -> Sequence[
|
69
|
+
def names(self) -> Sequence[_builtins.str]:
|
71
70
|
"""
|
72
71
|
List of all secret names listed under the given path.
|
73
72
|
"""
|
74
73
|
return pulumi.get(self, "names")
|
75
74
|
|
76
|
-
@property
|
75
|
+
@_builtins.property
|
77
76
|
@pulumi.getter
|
78
|
-
def namespace(self) -> Optional[
|
77
|
+
def namespace(self) -> Optional[_builtins.str]:
|
79
78
|
return pulumi.get(self, "namespace")
|
80
79
|
|
81
|
-
@property
|
80
|
+
@_builtins.property
|
82
81
|
@pulumi.getter
|
83
|
-
def path(self) ->
|
82
|
+
def path(self) -> _builtins.str:
|
84
83
|
"""
|
85
84
|
Full path where the KV-V2 secrets are listed.
|
86
85
|
"""
|
@@ -101,9 +100,9 @@ class AwaitableGetSecretsListV2Result(GetSecretsListV2Result):
|
|
101
100
|
path=self.path)
|
102
101
|
|
103
102
|
|
104
|
-
def get_secrets_list_v2(mount: Optional[
|
105
|
-
name: Optional[
|
106
|
-
namespace: Optional[
|
103
|
+
def get_secrets_list_v2(mount: Optional[_builtins.str] = None,
|
104
|
+
name: Optional[_builtins.str] = None,
|
105
|
+
namespace: Optional[_builtins.str] = None,
|
107
106
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecretsListV2Result:
|
108
107
|
"""
|
109
108
|
## Example Usage
|
@@ -148,12 +147,12 @@ def get_secrets_list_v2(mount: Optional[builtins.str] = None,
|
|
148
147
|
Use of this resource requires the `read` capability on the given path.
|
149
148
|
|
150
149
|
|
151
|
-
:param
|
152
|
-
:param
|
150
|
+
:param _builtins.str mount: Path where KV-V2 engine is mounted.
|
151
|
+
:param _builtins.str name: Full name of the secret. For a nested secret
|
153
152
|
the name is the nested path excluding the mount and data
|
154
153
|
prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
|
155
154
|
the name is `foo/bar/baz`.
|
156
|
-
:param
|
155
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
157
156
|
The value should not contain leading or trailing forward slashes.
|
158
157
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
159
158
|
*Available only for Vault Enterprise*.
|
@@ -172,9 +171,9 @@ def get_secrets_list_v2(mount: Optional[builtins.str] = None,
|
|
172
171
|
names=pulumi.get(__ret__, 'names'),
|
173
172
|
namespace=pulumi.get(__ret__, 'namespace'),
|
174
173
|
path=pulumi.get(__ret__, 'path'))
|
175
|
-
def get_secrets_list_v2_output(mount: Optional[pulumi.Input[
|
176
|
-
name: Optional[pulumi.Input[Optional[
|
177
|
-
namespace: Optional[pulumi.Input[Optional[
|
174
|
+
def get_secrets_list_v2_output(mount: Optional[pulumi.Input[_builtins.str]] = None,
|
175
|
+
name: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
176
|
+
namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
178
177
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecretsListV2Result]:
|
179
178
|
"""
|
180
179
|
## Example Usage
|
@@ -219,12 +218,12 @@ def get_secrets_list_v2_output(mount: Optional[pulumi.Input[builtins.str]] = Non
|
|
219
218
|
Use of this resource requires the `read` capability on the given path.
|
220
219
|
|
221
220
|
|
222
|
-
:param
|
223
|
-
:param
|
221
|
+
:param _builtins.str mount: Path where KV-V2 engine is mounted.
|
222
|
+
:param _builtins.str name: Full name of the secret. For a nested secret
|
224
223
|
the name is the nested path excluding the mount and data
|
225
224
|
prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
|
226
225
|
the name is `foo/bar/baz`.
|
227
|
-
:param
|
226
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
228
227
|
The value should not contain leading or trailing forward slashes.
|
229
228
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
230
229
|
*Available only for Vault Enterprise*.
|
pulumi_vault/kv/outputs.py
CHANGED
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -43,18 +42,18 @@ class SecretV2CustomMetadata(dict):
|
|
43
42
|
return super().get(key, default)
|
44
43
|
|
45
44
|
def __init__(__self__, *,
|
46
|
-
cas_required: Optional[
|
47
|
-
data: Optional[Mapping[str,
|
48
|
-
delete_version_after: Optional[
|
49
|
-
max_versions: Optional[
|
45
|
+
cas_required: Optional[_builtins.bool] = None,
|
46
|
+
data: Optional[Mapping[str, _builtins.str]] = None,
|
47
|
+
delete_version_after: Optional[_builtins.int] = None,
|
48
|
+
max_versions: Optional[_builtins.int] = None):
|
50
49
|
"""
|
51
|
-
:param
|
52
|
-
:param Mapping[str,
|
50
|
+
:param _builtins.bool cas_required: If true, all keys will require the cas parameter to be set on all write requests.
|
51
|
+
:param Mapping[str, _builtins.str] data: **Deprecated. Please use new ephemeral resource `kv.SecretV2` to read back
|
53
52
|
secret data from Vault**. A mapping whose keys are the top-level data keys returned from
|
54
53
|
Vault and whose values are the corresponding values. This map can only represent string data,
|
55
54
|
so any non-string values returned from Vault are serialized as JSON.
|
56
|
-
:param
|
57
|
-
:param
|
55
|
+
:param _builtins.int delete_version_after: If set, specifies the length of time before a version is deleted.
|
56
|
+
:param _builtins.int max_versions: The number of versions to keep per key.
|
58
57
|
"""
|
59
58
|
if cas_required is not None:
|
60
59
|
pulumi.set(__self__, "cas_required", cas_required)
|
@@ -65,17 +64,17 @@ class SecretV2CustomMetadata(dict):
|
|
65
64
|
if max_versions is not None:
|
66
65
|
pulumi.set(__self__, "max_versions", max_versions)
|
67
66
|
|
68
|
-
@property
|
67
|
+
@_builtins.property
|
69
68
|
@pulumi.getter(name="casRequired")
|
70
|
-
def cas_required(self) -> Optional[
|
69
|
+
def cas_required(self) -> Optional[_builtins.bool]:
|
71
70
|
"""
|
72
71
|
If true, all keys will require the cas parameter to be set on all write requests.
|
73
72
|
"""
|
74
73
|
return pulumi.get(self, "cas_required")
|
75
74
|
|
76
|
-
@property
|
75
|
+
@_builtins.property
|
77
76
|
@pulumi.getter
|
78
|
-
def data(self) -> Optional[Mapping[str,
|
77
|
+
def data(self) -> Optional[Mapping[str, _builtins.str]]:
|
79
78
|
"""
|
80
79
|
**Deprecated. Please use new ephemeral resource `kv.SecretV2` to read back
|
81
80
|
secret data from Vault**. A mapping whose keys are the top-level data keys returned from
|
@@ -84,17 +83,17 @@ class SecretV2CustomMetadata(dict):
|
|
84
83
|
"""
|
85
84
|
return pulumi.get(self, "data")
|
86
85
|
|
87
|
-
@property
|
86
|
+
@_builtins.property
|
88
87
|
@pulumi.getter(name="deleteVersionAfter")
|
89
|
-
def delete_version_after(self) -> Optional[
|
88
|
+
def delete_version_after(self) -> Optional[_builtins.int]:
|
90
89
|
"""
|
91
90
|
If set, specifies the length of time before a version is deleted.
|
92
91
|
"""
|
93
92
|
return pulumi.get(self, "delete_version_after")
|
94
93
|
|
95
|
-
@property
|
94
|
+
@_builtins.property
|
96
95
|
@pulumi.getter(name="maxVersions")
|
97
|
-
def max_versions(self) -> Optional[
|
96
|
+
def max_versions(self) -> Optional[_builtins.int]:
|
98
97
|
"""
|
99
98
|
The number of versions to keep per key.
|
100
99
|
"""
|
pulumi_vault/kv/secret.py
CHANGED
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,15 +19,15 @@ __all__ = ['SecretArgs', 'Secret']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class SecretArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
data_json: pulumi.Input[
|
24
|
-
path: pulumi.Input[
|
25
|
-
namespace: Optional[pulumi.Input[
|
22
|
+
data_json: pulumi.Input[_builtins.str],
|
23
|
+
path: pulumi.Input[_builtins.str],
|
24
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None):
|
26
25
|
"""
|
27
26
|
The set of arguments for constructing a Secret resource.
|
28
|
-
:param pulumi.Input[
|
27
|
+
:param pulumi.Input[_builtins.str] data_json: JSON-encoded string that will be
|
29
28
|
written as the secret data at the given path.
|
30
|
-
:param pulumi.Input[
|
31
|
-
:param pulumi.Input[
|
29
|
+
:param pulumi.Input[_builtins.str] path: Full path of the KV-V1 secret.
|
30
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
32
31
|
The value should not contain leading or trailing forward slashes.
|
33
32
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
34
33
|
*Available only for Vault Enterprise*.
|
@@ -38,9 +37,9 @@ class SecretArgs:
|
|
38
37
|
if namespace is not None:
|
39
38
|
pulumi.set(__self__, "namespace", namespace)
|
40
39
|
|
41
|
-
@property
|
40
|
+
@_builtins.property
|
42
41
|
@pulumi.getter(name="dataJson")
|
43
|
-
def data_json(self) -> pulumi.Input[
|
42
|
+
def data_json(self) -> pulumi.Input[_builtins.str]:
|
44
43
|
"""
|
45
44
|
JSON-encoded string that will be
|
46
45
|
written as the secret data at the given path.
|
@@ -48,24 +47,24 @@ class SecretArgs:
|
|
48
47
|
return pulumi.get(self, "data_json")
|
49
48
|
|
50
49
|
@data_json.setter
|
51
|
-
def data_json(self, value: pulumi.Input[
|
50
|
+
def data_json(self, value: pulumi.Input[_builtins.str]):
|
52
51
|
pulumi.set(self, "data_json", value)
|
53
52
|
|
54
|
-
@property
|
53
|
+
@_builtins.property
|
55
54
|
@pulumi.getter
|
56
|
-
def path(self) -> pulumi.Input[
|
55
|
+
def path(self) -> pulumi.Input[_builtins.str]:
|
57
56
|
"""
|
58
57
|
Full path of the KV-V1 secret.
|
59
58
|
"""
|
60
59
|
return pulumi.get(self, "path")
|
61
60
|
|
62
61
|
@path.setter
|
63
|
-
def path(self, value: pulumi.Input[
|
62
|
+
def path(self, value: pulumi.Input[_builtins.str]):
|
64
63
|
pulumi.set(self, "path", value)
|
65
64
|
|
66
|
-
@property
|
65
|
+
@_builtins.property
|
67
66
|
@pulumi.getter
|
68
|
-
def namespace(self) -> Optional[pulumi.Input[
|
67
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
69
68
|
"""
|
70
69
|
The namespace to provision the resource in.
|
71
70
|
The value should not contain leading or trailing forward slashes.
|
@@ -75,30 +74,30 @@ class SecretArgs:
|
|
75
74
|
return pulumi.get(self, "namespace")
|
76
75
|
|
77
76
|
@namespace.setter
|
78
|
-
def namespace(self, value: Optional[pulumi.Input[
|
77
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
79
78
|
pulumi.set(self, "namespace", value)
|
80
79
|
|
81
80
|
|
82
81
|
@pulumi.input_type
|
83
82
|
class _SecretState:
|
84
83
|
def __init__(__self__, *,
|
85
|
-
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
86
|
-
data_json: Optional[pulumi.Input[
|
87
|
-
namespace: Optional[pulumi.Input[
|
88
|
-
path: Optional[pulumi.Input[
|
84
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
85
|
+
data_json: Optional[pulumi.Input[_builtins.str]] = None,
|
86
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
87
|
+
path: Optional[pulumi.Input[_builtins.str]] = None):
|
89
88
|
"""
|
90
89
|
Input properties used for looking up and filtering Secret resources.
|
91
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
90
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] data: A mapping whose keys are the top-level data keys returned from
|
92
91
|
Vault and whose values are the corresponding values. This map can only
|
93
92
|
represent string data, so any non-string values returned from Vault are
|
94
93
|
serialized as JSON.
|
95
|
-
:param pulumi.Input[
|
94
|
+
:param pulumi.Input[_builtins.str] data_json: JSON-encoded string that will be
|
96
95
|
written as the secret data at the given path.
|
97
|
-
:param pulumi.Input[
|
96
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
98
97
|
The value should not contain leading or trailing forward slashes.
|
99
98
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
100
99
|
*Available only for Vault Enterprise*.
|
101
|
-
:param pulumi.Input[
|
100
|
+
:param pulumi.Input[_builtins.str] path: Full path of the KV-V1 secret.
|
102
101
|
"""
|
103
102
|
if data is not None:
|
104
103
|
pulumi.set(__self__, "data", data)
|
@@ -109,9 +108,9 @@ class _SecretState:
|
|
109
108
|
if path is not None:
|
110
109
|
pulumi.set(__self__, "path", path)
|
111
110
|
|
112
|
-
@property
|
111
|
+
@_builtins.property
|
113
112
|
@pulumi.getter
|
114
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
113
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
115
114
|
"""
|
116
115
|
A mapping whose keys are the top-level data keys returned from
|
117
116
|
Vault and whose values are the corresponding values. This map can only
|
@@ -121,12 +120,12 @@ class _SecretState:
|
|
121
120
|
return pulumi.get(self, "data")
|
122
121
|
|
123
122
|
@data.setter
|
124
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
123
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
125
124
|
pulumi.set(self, "data", value)
|
126
125
|
|
127
|
-
@property
|
126
|
+
@_builtins.property
|
128
127
|
@pulumi.getter(name="dataJson")
|
129
|
-
def data_json(self) -> Optional[pulumi.Input[
|
128
|
+
def data_json(self) -> Optional[pulumi.Input[_builtins.str]]:
|
130
129
|
"""
|
131
130
|
JSON-encoded string that will be
|
132
131
|
written as the secret data at the given path.
|
@@ -134,12 +133,12 @@ class _SecretState:
|
|
134
133
|
return pulumi.get(self, "data_json")
|
135
134
|
|
136
135
|
@data_json.setter
|
137
|
-
def data_json(self, value: Optional[pulumi.Input[
|
136
|
+
def data_json(self, value: Optional[pulumi.Input[_builtins.str]]):
|
138
137
|
pulumi.set(self, "data_json", value)
|
139
138
|
|
140
|
-
@property
|
139
|
+
@_builtins.property
|
141
140
|
@pulumi.getter
|
142
|
-
def namespace(self) -> Optional[pulumi.Input[
|
141
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
143
142
|
"""
|
144
143
|
The namespace to provision the resource in.
|
145
144
|
The value should not contain leading or trailing forward slashes.
|
@@ -149,19 +148,19 @@ class _SecretState:
|
|
149
148
|
return pulumi.get(self, "namespace")
|
150
149
|
|
151
150
|
@namespace.setter
|
152
|
-
def namespace(self, value: Optional[pulumi.Input[
|
151
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
153
152
|
pulumi.set(self, "namespace", value)
|
154
153
|
|
155
|
-
@property
|
154
|
+
@_builtins.property
|
156
155
|
@pulumi.getter
|
157
|
-
def path(self) -> Optional[pulumi.Input[
|
156
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
158
157
|
"""
|
159
158
|
Full path of the KV-V1 secret.
|
160
159
|
"""
|
161
160
|
return pulumi.get(self, "path")
|
162
161
|
|
163
162
|
@path.setter
|
164
|
-
def path(self, value: Optional[pulumi.Input[
|
163
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
165
164
|
pulumi.set(self, "path", value)
|
166
165
|
|
167
166
|
|
@@ -171,9 +170,9 @@ class Secret(pulumi.CustomResource):
|
|
171
170
|
def __init__(__self__,
|
172
171
|
resource_name: str,
|
173
172
|
opts: Optional[pulumi.ResourceOptions] = None,
|
174
|
-
data_json: Optional[pulumi.Input[
|
175
|
-
namespace: Optional[pulumi.Input[
|
176
|
-
path: Optional[pulumi.Input[
|
173
|
+
data_json: Optional[pulumi.Input[_builtins.str]] = None,
|
174
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
175
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
177
176
|
__props__=None):
|
178
177
|
"""
|
179
178
|
Writes a KV-V1 secret to a given path in Vault.
|
@@ -220,13 +219,13 @@ class Secret(pulumi.CustomResource):
|
|
220
219
|
|
221
220
|
:param str resource_name: The name of the resource.
|
222
221
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
223
|
-
:param pulumi.Input[
|
222
|
+
:param pulumi.Input[_builtins.str] data_json: JSON-encoded string that will be
|
224
223
|
written as the secret data at the given path.
|
225
|
-
:param pulumi.Input[
|
224
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
226
225
|
The value should not contain leading or trailing forward slashes.
|
227
226
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
228
227
|
*Available only for Vault Enterprise*.
|
229
|
-
:param pulumi.Input[
|
228
|
+
:param pulumi.Input[_builtins.str] path: Full path of the KV-V1 secret.
|
230
229
|
"""
|
231
230
|
...
|
232
231
|
@overload
|
@@ -292,9 +291,9 @@ class Secret(pulumi.CustomResource):
|
|
292
291
|
def _internal_init(__self__,
|
293
292
|
resource_name: str,
|
294
293
|
opts: Optional[pulumi.ResourceOptions] = None,
|
295
|
-
data_json: Optional[pulumi.Input[
|
296
|
-
namespace: Optional[pulumi.Input[
|
297
|
-
path: Optional[pulumi.Input[
|
294
|
+
data_json: Optional[pulumi.Input[_builtins.str]] = None,
|
295
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
296
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
298
297
|
__props__=None):
|
299
298
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
300
299
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -324,10 +323,10 @@ class Secret(pulumi.CustomResource):
|
|
324
323
|
def get(resource_name: str,
|
325
324
|
id: pulumi.Input[str],
|
326
325
|
opts: Optional[pulumi.ResourceOptions] = None,
|
327
|
-
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
328
|
-
data_json: Optional[pulumi.Input[
|
329
|
-
namespace: Optional[pulumi.Input[
|
330
|
-
path: Optional[pulumi.Input[
|
326
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
327
|
+
data_json: Optional[pulumi.Input[_builtins.str]] = None,
|
328
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
329
|
+
path: Optional[pulumi.Input[_builtins.str]] = None) -> 'Secret':
|
331
330
|
"""
|
332
331
|
Get an existing Secret resource's state with the given name, id, and optional extra
|
333
332
|
properties used to qualify the lookup.
|
@@ -335,17 +334,17 @@ class Secret(pulumi.CustomResource):
|
|
335
334
|
:param str resource_name: The unique name of the resulting resource.
|
336
335
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
337
336
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
338
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
337
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] data: A mapping whose keys are the top-level data keys returned from
|
339
338
|
Vault and whose values are the corresponding values. This map can only
|
340
339
|
represent string data, so any non-string values returned from Vault are
|
341
340
|
serialized as JSON.
|
342
|
-
:param pulumi.Input[
|
341
|
+
:param pulumi.Input[_builtins.str] data_json: JSON-encoded string that will be
|
343
342
|
written as the secret data at the given path.
|
344
|
-
:param pulumi.Input[
|
343
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
345
344
|
The value should not contain leading or trailing forward slashes.
|
346
345
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
347
346
|
*Available only for Vault Enterprise*.
|
348
|
-
:param pulumi.Input[
|
347
|
+
:param pulumi.Input[_builtins.str] path: Full path of the KV-V1 secret.
|
349
348
|
"""
|
350
349
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
351
350
|
|
@@ -357,9 +356,9 @@ class Secret(pulumi.CustomResource):
|
|
357
356
|
__props__.__dict__["path"] = path
|
358
357
|
return Secret(resource_name, opts=opts, __props__=__props__)
|
359
358
|
|
360
|
-
@property
|
359
|
+
@_builtins.property
|
361
360
|
@pulumi.getter
|
362
|
-
def data(self) -> pulumi.Output[Mapping[str,
|
361
|
+
def data(self) -> pulumi.Output[Mapping[str, _builtins.str]]:
|
363
362
|
"""
|
364
363
|
A mapping whose keys are the top-level data keys returned from
|
365
364
|
Vault and whose values are the corresponding values. This map can only
|
@@ -368,18 +367,18 @@ class Secret(pulumi.CustomResource):
|
|
368
367
|
"""
|
369
368
|
return pulumi.get(self, "data")
|
370
369
|
|
371
|
-
@property
|
370
|
+
@_builtins.property
|
372
371
|
@pulumi.getter(name="dataJson")
|
373
|
-
def data_json(self) -> pulumi.Output[
|
372
|
+
def data_json(self) -> pulumi.Output[_builtins.str]:
|
374
373
|
"""
|
375
374
|
JSON-encoded string that will be
|
376
375
|
written as the secret data at the given path.
|
377
376
|
"""
|
378
377
|
return pulumi.get(self, "data_json")
|
379
378
|
|
380
|
-
@property
|
379
|
+
@_builtins.property
|
381
380
|
@pulumi.getter
|
382
|
-
def namespace(self) -> pulumi.Output[Optional[
|
381
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
383
382
|
"""
|
384
383
|
The namespace to provision the resource in.
|
385
384
|
The value should not contain leading or trailing forward slashes.
|
@@ -388,9 +387,9 @@ class Secret(pulumi.CustomResource):
|
|
388
387
|
"""
|
389
388
|
return pulumi.get(self, "namespace")
|
390
389
|
|
391
|
-
@property
|
390
|
+
@_builtins.property
|
392
391
|
@pulumi.getter
|
393
|
-
def path(self) -> pulumi.Output[
|
392
|
+
def path(self) -> pulumi.Output[_builtins.str]:
|
394
393
|
"""
|
395
394
|
Full path of the KV-V1 secret.
|
396
395
|
"""
|