pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
pulumi_vault/kv/secret_v2.py
CHANGED
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -22,42 +21,42 @@ __all__ = ['SecretV2Args', 'SecretV2']
|
|
22
21
|
@pulumi.input_type
|
23
22
|
class SecretV2Args:
|
24
23
|
def __init__(__self__, *,
|
25
|
-
mount: pulumi.Input[
|
26
|
-
cas: Optional[pulumi.Input[
|
24
|
+
mount: pulumi.Input[_builtins.str],
|
25
|
+
cas: Optional[pulumi.Input[_builtins.int]] = None,
|
27
26
|
custom_metadata: Optional[pulumi.Input['SecretV2CustomMetadataArgs']] = None,
|
28
|
-
data_json: Optional[pulumi.Input[
|
29
|
-
data_json_wo_version: Optional[pulumi.Input[
|
30
|
-
delete_all_versions: Optional[pulumi.Input[
|
31
|
-
disable_read: Optional[pulumi.Input[
|
32
|
-
name: Optional[pulumi.Input[
|
33
|
-
namespace: Optional[pulumi.Input[
|
34
|
-
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
27
|
+
data_json: Optional[pulumi.Input[_builtins.str]] = None,
|
28
|
+
data_json_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
|
29
|
+
delete_all_versions: Optional[pulumi.Input[_builtins.bool]] = None,
|
30
|
+
disable_read: Optional[pulumi.Input[_builtins.bool]] = None,
|
31
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
32
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
33
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None):
|
35
34
|
"""
|
36
35
|
The set of arguments for constructing a SecretV2 resource.
|
37
|
-
:param pulumi.Input[
|
38
|
-
:param pulumi.Input[
|
36
|
+
:param pulumi.Input[_builtins.str] mount: Path where KV-V2 engine is mounted.
|
37
|
+
:param pulumi.Input[_builtins.int] cas: This flag is required if `cas_required` is set to true
|
39
38
|
on either the secret or the engine's config. In order for a
|
40
39
|
write operation to be successful, cas must be set to the current version
|
41
40
|
of the secret.
|
42
41
|
:param pulumi.Input['SecretV2CustomMetadataArgs'] custom_metadata: A nested block that allows configuring metadata for the
|
43
42
|
KV secret. Refer to the
|
44
43
|
Configuration Options for more info.
|
45
|
-
:param pulumi.Input[
|
44
|
+
:param pulumi.Input[_builtins.str] data_json: JSON-encoded string that will be
|
46
45
|
written as the secret data at the given path.
|
47
|
-
:param pulumi.Input[
|
48
|
-
:param pulumi.Input[
|
46
|
+
:param pulumi.Input[_builtins.int] data_json_wo_version: The version of the `data_json_wo`. For more info see updating write-only attributes.
|
47
|
+
:param pulumi.Input[_builtins.bool] delete_all_versions: If set to true, permanently deletes all
|
49
48
|
versions for the specified key.
|
50
|
-
:param pulumi.Input[
|
49
|
+
:param pulumi.Input[_builtins.bool] disable_read: If set to true, disables reading secret from Vault;
|
51
50
|
note: drift won't be detected.
|
52
|
-
:param pulumi.Input[
|
51
|
+
:param pulumi.Input[_builtins.str] name: Full name of the secret. For a nested secret
|
53
52
|
the name is the nested path excluding the mount and data
|
54
53
|
prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
|
55
54
|
the name is `foo/bar/baz`.
|
56
|
-
:param pulumi.Input[
|
55
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
57
56
|
The value should not contain leading or trailing forward slashes.
|
58
57
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
59
58
|
*Available only for Vault Enterprise*.
|
60
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
59
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: An object that holds option settings.
|
61
60
|
"""
|
62
61
|
pulumi.set(__self__, "mount", mount)
|
63
62
|
if cas is not None:
|
@@ -79,21 +78,21 @@ class SecretV2Args:
|
|
79
78
|
if options is not None:
|
80
79
|
pulumi.set(__self__, "options", options)
|
81
80
|
|
82
|
-
@property
|
81
|
+
@_builtins.property
|
83
82
|
@pulumi.getter
|
84
|
-
def mount(self) -> pulumi.Input[
|
83
|
+
def mount(self) -> pulumi.Input[_builtins.str]:
|
85
84
|
"""
|
86
85
|
Path where KV-V2 engine is mounted.
|
87
86
|
"""
|
88
87
|
return pulumi.get(self, "mount")
|
89
88
|
|
90
89
|
@mount.setter
|
91
|
-
def mount(self, value: pulumi.Input[
|
90
|
+
def mount(self, value: pulumi.Input[_builtins.str]):
|
92
91
|
pulumi.set(self, "mount", value)
|
93
92
|
|
94
|
-
@property
|
93
|
+
@_builtins.property
|
95
94
|
@pulumi.getter
|
96
|
-
def cas(self) -> Optional[pulumi.Input[
|
95
|
+
def cas(self) -> Optional[pulumi.Input[_builtins.int]]:
|
97
96
|
"""
|
98
97
|
This flag is required if `cas_required` is set to true
|
99
98
|
on either the secret or the engine's config. In order for a
|
@@ -103,10 +102,10 @@ class SecretV2Args:
|
|
103
102
|
return pulumi.get(self, "cas")
|
104
103
|
|
105
104
|
@cas.setter
|
106
|
-
def cas(self, value: Optional[pulumi.Input[
|
105
|
+
def cas(self, value: Optional[pulumi.Input[_builtins.int]]):
|
107
106
|
pulumi.set(self, "cas", value)
|
108
107
|
|
109
|
-
@property
|
108
|
+
@_builtins.property
|
110
109
|
@pulumi.getter(name="customMetadata")
|
111
110
|
def custom_metadata(self) -> Optional[pulumi.Input['SecretV2CustomMetadataArgs']]:
|
112
111
|
"""
|
@@ -120,9 +119,9 @@ class SecretV2Args:
|
|
120
119
|
def custom_metadata(self, value: Optional[pulumi.Input['SecretV2CustomMetadataArgs']]):
|
121
120
|
pulumi.set(self, "custom_metadata", value)
|
122
121
|
|
123
|
-
@property
|
122
|
+
@_builtins.property
|
124
123
|
@pulumi.getter(name="dataJson")
|
125
|
-
def data_json(self) -> Optional[pulumi.Input[
|
124
|
+
def data_json(self) -> Optional[pulumi.Input[_builtins.str]]:
|
126
125
|
"""
|
127
126
|
JSON-encoded string that will be
|
128
127
|
written as the secret data at the given path.
|
@@ -130,24 +129,24 @@ class SecretV2Args:
|
|
130
129
|
return pulumi.get(self, "data_json")
|
131
130
|
|
132
131
|
@data_json.setter
|
133
|
-
def data_json(self, value: Optional[pulumi.Input[
|
132
|
+
def data_json(self, value: Optional[pulumi.Input[_builtins.str]]):
|
134
133
|
pulumi.set(self, "data_json", value)
|
135
134
|
|
136
|
-
@property
|
135
|
+
@_builtins.property
|
137
136
|
@pulumi.getter(name="dataJsonWoVersion")
|
138
|
-
def data_json_wo_version(self) -> Optional[pulumi.Input[
|
137
|
+
def data_json_wo_version(self) -> Optional[pulumi.Input[_builtins.int]]:
|
139
138
|
"""
|
140
139
|
The version of the `data_json_wo`. For more info see updating write-only attributes.
|
141
140
|
"""
|
142
141
|
return pulumi.get(self, "data_json_wo_version")
|
143
142
|
|
144
143
|
@data_json_wo_version.setter
|
145
|
-
def data_json_wo_version(self, value: Optional[pulumi.Input[
|
144
|
+
def data_json_wo_version(self, value: Optional[pulumi.Input[_builtins.int]]):
|
146
145
|
pulumi.set(self, "data_json_wo_version", value)
|
147
146
|
|
148
|
-
@property
|
147
|
+
@_builtins.property
|
149
148
|
@pulumi.getter(name="deleteAllVersions")
|
150
|
-
def delete_all_versions(self) -> Optional[pulumi.Input[
|
149
|
+
def delete_all_versions(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
151
150
|
"""
|
152
151
|
If set to true, permanently deletes all
|
153
152
|
versions for the specified key.
|
@@ -155,12 +154,12 @@ class SecretV2Args:
|
|
155
154
|
return pulumi.get(self, "delete_all_versions")
|
156
155
|
|
157
156
|
@delete_all_versions.setter
|
158
|
-
def delete_all_versions(self, value: Optional[pulumi.Input[
|
157
|
+
def delete_all_versions(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
159
158
|
pulumi.set(self, "delete_all_versions", value)
|
160
159
|
|
161
|
-
@property
|
160
|
+
@_builtins.property
|
162
161
|
@pulumi.getter(name="disableRead")
|
163
|
-
def disable_read(self) -> Optional[pulumi.Input[
|
162
|
+
def disable_read(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
164
163
|
"""
|
165
164
|
If set to true, disables reading secret from Vault;
|
166
165
|
note: drift won't be detected.
|
@@ -168,12 +167,12 @@ class SecretV2Args:
|
|
168
167
|
return pulumi.get(self, "disable_read")
|
169
168
|
|
170
169
|
@disable_read.setter
|
171
|
-
def disable_read(self, value: Optional[pulumi.Input[
|
170
|
+
def disable_read(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
172
171
|
pulumi.set(self, "disable_read", value)
|
173
172
|
|
174
|
-
@property
|
173
|
+
@_builtins.property
|
175
174
|
@pulumi.getter
|
176
|
-
def name(self) -> Optional[pulumi.Input[
|
175
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
177
176
|
"""
|
178
177
|
Full name of the secret. For a nested secret
|
179
178
|
the name is the nested path excluding the mount and data
|
@@ -183,12 +182,12 @@ class SecretV2Args:
|
|
183
182
|
return pulumi.get(self, "name")
|
184
183
|
|
185
184
|
@name.setter
|
186
|
-
def name(self, value: Optional[pulumi.Input[
|
185
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
187
186
|
pulumi.set(self, "name", value)
|
188
187
|
|
189
|
-
@property
|
188
|
+
@_builtins.property
|
190
189
|
@pulumi.getter
|
191
|
-
def namespace(self) -> Optional[pulumi.Input[
|
190
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
192
191
|
"""
|
193
192
|
The namespace to provision the resource in.
|
194
193
|
The value should not contain leading or trailing forward slashes.
|
@@ -198,70 +197,70 @@ class SecretV2Args:
|
|
198
197
|
return pulumi.get(self, "namespace")
|
199
198
|
|
200
199
|
@namespace.setter
|
201
|
-
def namespace(self, value: Optional[pulumi.Input[
|
200
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
202
201
|
pulumi.set(self, "namespace", value)
|
203
202
|
|
204
|
-
@property
|
203
|
+
@_builtins.property
|
205
204
|
@pulumi.getter
|
206
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
205
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
207
206
|
"""
|
208
207
|
An object that holds option settings.
|
209
208
|
"""
|
210
209
|
return pulumi.get(self, "options")
|
211
210
|
|
212
211
|
@options.setter
|
213
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
212
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
214
213
|
pulumi.set(self, "options", value)
|
215
214
|
|
216
215
|
|
217
216
|
@pulumi.input_type
|
218
217
|
class _SecretV2State:
|
219
218
|
def __init__(__self__, *,
|
220
|
-
cas: Optional[pulumi.Input[
|
219
|
+
cas: Optional[pulumi.Input[_builtins.int]] = None,
|
221
220
|
custom_metadata: Optional[pulumi.Input['SecretV2CustomMetadataArgs']] = None,
|
222
|
-
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
223
|
-
data_json: Optional[pulumi.Input[
|
224
|
-
data_json_wo_version: Optional[pulumi.Input[
|
225
|
-
delete_all_versions: Optional[pulumi.Input[
|
226
|
-
disable_read: Optional[pulumi.Input[
|
227
|
-
metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
228
|
-
mount: Optional[pulumi.Input[
|
229
|
-
name: Optional[pulumi.Input[
|
230
|
-
namespace: Optional[pulumi.Input[
|
231
|
-
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
232
|
-
path: Optional[pulumi.Input[
|
221
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
222
|
+
data_json: Optional[pulumi.Input[_builtins.str]] = None,
|
223
|
+
data_json_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
|
224
|
+
delete_all_versions: Optional[pulumi.Input[_builtins.bool]] = None,
|
225
|
+
disable_read: Optional[pulumi.Input[_builtins.bool]] = None,
|
226
|
+
metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
227
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
228
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
229
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
230
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
231
|
+
path: Optional[pulumi.Input[_builtins.str]] = None):
|
233
232
|
"""
|
234
233
|
Input properties used for looking up and filtering SecretV2 resources.
|
235
|
-
:param pulumi.Input[
|
234
|
+
:param pulumi.Input[_builtins.int] cas: This flag is required if `cas_required` is set to true
|
236
235
|
on either the secret or the engine's config. In order for a
|
237
236
|
write operation to be successful, cas must be set to the current version
|
238
237
|
of the secret.
|
239
238
|
:param pulumi.Input['SecretV2CustomMetadataArgs'] custom_metadata: A nested block that allows configuring metadata for the
|
240
239
|
KV secret. Refer to the
|
241
240
|
Configuration Options for more info.
|
242
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
241
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] data: **Deprecated. Please use new ephemeral resource `kv.SecretV2` to read back
|
243
242
|
secret data from Vault**. A mapping whose keys are the top-level data keys returned from
|
244
243
|
Vault and whose values are the corresponding values. This map can only represent string data,
|
245
244
|
so any non-string values returned from Vault are serialized as JSON.
|
246
|
-
:param pulumi.Input[
|
245
|
+
:param pulumi.Input[_builtins.str] data_json: JSON-encoded string that will be
|
247
246
|
written as the secret data at the given path.
|
248
|
-
:param pulumi.Input[
|
249
|
-
:param pulumi.Input[
|
247
|
+
:param pulumi.Input[_builtins.int] data_json_wo_version: The version of the `data_json_wo`. For more info see updating write-only attributes.
|
248
|
+
:param pulumi.Input[_builtins.bool] delete_all_versions: If set to true, permanently deletes all
|
250
249
|
versions for the specified key.
|
251
|
-
:param pulumi.Input[
|
250
|
+
:param pulumi.Input[_builtins.bool] disable_read: If set to true, disables reading secret from Vault;
|
252
251
|
note: drift won't be detected.
|
253
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
254
|
-
:param pulumi.Input[
|
255
|
-
:param pulumi.Input[
|
252
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] metadata: Metadata associated with this secret read from Vault.
|
253
|
+
:param pulumi.Input[_builtins.str] mount: Path where KV-V2 engine is mounted.
|
254
|
+
:param pulumi.Input[_builtins.str] name: Full name of the secret. For a nested secret
|
256
255
|
the name is the nested path excluding the mount and data
|
257
256
|
prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
|
258
257
|
the name is `foo/bar/baz`.
|
259
|
-
:param pulumi.Input[
|
258
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
260
259
|
The value should not contain leading or trailing forward slashes.
|
261
260
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
262
261
|
*Available only for Vault Enterprise*.
|
263
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
264
|
-
:param pulumi.Input[
|
262
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: An object that holds option settings.
|
263
|
+
:param pulumi.Input[_builtins.str] path: Full path where the KV-V2 secret will be written.
|
265
264
|
"""
|
266
265
|
if cas is not None:
|
267
266
|
pulumi.set(__self__, "cas", cas)
|
@@ -293,9 +292,9 @@ class _SecretV2State:
|
|
293
292
|
if path is not None:
|
294
293
|
pulumi.set(__self__, "path", path)
|
295
294
|
|
296
|
-
@property
|
295
|
+
@_builtins.property
|
297
296
|
@pulumi.getter
|
298
|
-
def cas(self) -> Optional[pulumi.Input[
|
297
|
+
def cas(self) -> Optional[pulumi.Input[_builtins.int]]:
|
299
298
|
"""
|
300
299
|
This flag is required if `cas_required` is set to true
|
301
300
|
on either the secret or the engine's config. In order for a
|
@@ -305,10 +304,10 @@ class _SecretV2State:
|
|
305
304
|
return pulumi.get(self, "cas")
|
306
305
|
|
307
306
|
@cas.setter
|
308
|
-
def cas(self, value: Optional[pulumi.Input[
|
307
|
+
def cas(self, value: Optional[pulumi.Input[_builtins.int]]):
|
309
308
|
pulumi.set(self, "cas", value)
|
310
309
|
|
311
|
-
@property
|
310
|
+
@_builtins.property
|
312
311
|
@pulumi.getter(name="customMetadata")
|
313
312
|
def custom_metadata(self) -> Optional[pulumi.Input['SecretV2CustomMetadataArgs']]:
|
314
313
|
"""
|
@@ -322,10 +321,10 @@ class _SecretV2State:
|
|
322
321
|
def custom_metadata(self, value: Optional[pulumi.Input['SecretV2CustomMetadataArgs']]):
|
323
322
|
pulumi.set(self, "custom_metadata", value)
|
324
323
|
|
325
|
-
@property
|
324
|
+
@_builtins.property
|
326
325
|
@pulumi.getter
|
327
326
|
@_utilities.deprecated("""Deprecated. Will no longer be set on a read.""")
|
328
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
327
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
329
328
|
"""
|
330
329
|
**Deprecated. Please use new ephemeral resource `kv.SecretV2` to read back
|
331
330
|
secret data from Vault**. A mapping whose keys are the top-level data keys returned from
|
@@ -335,12 +334,12 @@ class _SecretV2State:
|
|
335
334
|
return pulumi.get(self, "data")
|
336
335
|
|
337
336
|
@data.setter
|
338
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
337
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
339
338
|
pulumi.set(self, "data", value)
|
340
339
|
|
341
|
-
@property
|
340
|
+
@_builtins.property
|
342
341
|
@pulumi.getter(name="dataJson")
|
343
|
-
def data_json(self) -> Optional[pulumi.Input[
|
342
|
+
def data_json(self) -> Optional[pulumi.Input[_builtins.str]]:
|
344
343
|
"""
|
345
344
|
JSON-encoded string that will be
|
346
345
|
written as the secret data at the given path.
|
@@ -348,24 +347,24 @@ class _SecretV2State:
|
|
348
347
|
return pulumi.get(self, "data_json")
|
349
348
|
|
350
349
|
@data_json.setter
|
351
|
-
def data_json(self, value: Optional[pulumi.Input[
|
350
|
+
def data_json(self, value: Optional[pulumi.Input[_builtins.str]]):
|
352
351
|
pulumi.set(self, "data_json", value)
|
353
352
|
|
354
|
-
@property
|
353
|
+
@_builtins.property
|
355
354
|
@pulumi.getter(name="dataJsonWoVersion")
|
356
|
-
def data_json_wo_version(self) -> Optional[pulumi.Input[
|
355
|
+
def data_json_wo_version(self) -> Optional[pulumi.Input[_builtins.int]]:
|
357
356
|
"""
|
358
357
|
The version of the `data_json_wo`. For more info see updating write-only attributes.
|
359
358
|
"""
|
360
359
|
return pulumi.get(self, "data_json_wo_version")
|
361
360
|
|
362
361
|
@data_json_wo_version.setter
|
363
|
-
def data_json_wo_version(self, value: Optional[pulumi.Input[
|
362
|
+
def data_json_wo_version(self, value: Optional[pulumi.Input[_builtins.int]]):
|
364
363
|
pulumi.set(self, "data_json_wo_version", value)
|
365
364
|
|
366
|
-
@property
|
365
|
+
@_builtins.property
|
367
366
|
@pulumi.getter(name="deleteAllVersions")
|
368
|
-
def delete_all_versions(self) -> Optional[pulumi.Input[
|
367
|
+
def delete_all_versions(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
369
368
|
"""
|
370
369
|
If set to true, permanently deletes all
|
371
370
|
versions for the specified key.
|
@@ -373,12 +372,12 @@ class _SecretV2State:
|
|
373
372
|
return pulumi.get(self, "delete_all_versions")
|
374
373
|
|
375
374
|
@delete_all_versions.setter
|
376
|
-
def delete_all_versions(self, value: Optional[pulumi.Input[
|
375
|
+
def delete_all_versions(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
377
376
|
pulumi.set(self, "delete_all_versions", value)
|
378
377
|
|
379
|
-
@property
|
378
|
+
@_builtins.property
|
380
379
|
@pulumi.getter(name="disableRead")
|
381
|
-
def disable_read(self) -> Optional[pulumi.Input[
|
380
|
+
def disable_read(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
382
381
|
"""
|
383
382
|
If set to true, disables reading secret from Vault;
|
384
383
|
note: drift won't be detected.
|
@@ -386,36 +385,36 @@ class _SecretV2State:
|
|
386
385
|
return pulumi.get(self, "disable_read")
|
387
386
|
|
388
387
|
@disable_read.setter
|
389
|
-
def disable_read(self, value: Optional[pulumi.Input[
|
388
|
+
def disable_read(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
390
389
|
pulumi.set(self, "disable_read", value)
|
391
390
|
|
392
|
-
@property
|
391
|
+
@_builtins.property
|
393
392
|
@pulumi.getter
|
394
|
-
def metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
393
|
+
def metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
395
394
|
"""
|
396
395
|
Metadata associated with this secret read from Vault.
|
397
396
|
"""
|
398
397
|
return pulumi.get(self, "metadata")
|
399
398
|
|
400
399
|
@metadata.setter
|
401
|
-
def metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
400
|
+
def metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
402
401
|
pulumi.set(self, "metadata", value)
|
403
402
|
|
404
|
-
@property
|
403
|
+
@_builtins.property
|
405
404
|
@pulumi.getter
|
406
|
-
def mount(self) -> Optional[pulumi.Input[
|
405
|
+
def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
|
407
406
|
"""
|
408
407
|
Path where KV-V2 engine is mounted.
|
409
408
|
"""
|
410
409
|
return pulumi.get(self, "mount")
|
411
410
|
|
412
411
|
@mount.setter
|
413
|
-
def mount(self, value: Optional[pulumi.Input[
|
412
|
+
def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
|
414
413
|
pulumi.set(self, "mount", value)
|
415
414
|
|
416
|
-
@property
|
415
|
+
@_builtins.property
|
417
416
|
@pulumi.getter
|
418
|
-
def name(self) -> Optional[pulumi.Input[
|
417
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
419
418
|
"""
|
420
419
|
Full name of the secret. For a nested secret
|
421
420
|
the name is the nested path excluding the mount and data
|
@@ -425,12 +424,12 @@ class _SecretV2State:
|
|
425
424
|
return pulumi.get(self, "name")
|
426
425
|
|
427
426
|
@name.setter
|
428
|
-
def name(self, value: Optional[pulumi.Input[
|
427
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
429
428
|
pulumi.set(self, "name", value)
|
430
429
|
|
431
|
-
@property
|
430
|
+
@_builtins.property
|
432
431
|
@pulumi.getter
|
433
|
-
def namespace(self) -> Optional[pulumi.Input[
|
432
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
434
433
|
"""
|
435
434
|
The namespace to provision the resource in.
|
436
435
|
The value should not contain leading or trailing forward slashes.
|
@@ -440,31 +439,31 @@ class _SecretV2State:
|
|
440
439
|
return pulumi.get(self, "namespace")
|
441
440
|
|
442
441
|
@namespace.setter
|
443
|
-
def namespace(self, value: Optional[pulumi.Input[
|
442
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
444
443
|
pulumi.set(self, "namespace", value)
|
445
444
|
|
446
|
-
@property
|
445
|
+
@_builtins.property
|
447
446
|
@pulumi.getter
|
448
|
-
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
447
|
+
def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
449
448
|
"""
|
450
449
|
An object that holds option settings.
|
451
450
|
"""
|
452
451
|
return pulumi.get(self, "options")
|
453
452
|
|
454
453
|
@options.setter
|
455
|
-
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
454
|
+
def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
456
455
|
pulumi.set(self, "options", value)
|
457
456
|
|
458
|
-
@property
|
457
|
+
@_builtins.property
|
459
458
|
@pulumi.getter
|
460
|
-
def path(self) -> Optional[pulumi.Input[
|
459
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
461
460
|
"""
|
462
461
|
Full path where the KV-V2 secret will be written.
|
463
462
|
"""
|
464
463
|
return pulumi.get(self, "path")
|
465
464
|
|
466
465
|
@path.setter
|
467
|
-
def path(self, value: Optional[pulumi.Input[
|
466
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
468
467
|
pulumi.set(self, "path", value)
|
469
468
|
|
470
469
|
|
@@ -474,16 +473,16 @@ class SecretV2(pulumi.CustomResource):
|
|
474
473
|
def __init__(__self__,
|
475
474
|
resource_name: str,
|
476
475
|
opts: Optional[pulumi.ResourceOptions] = None,
|
477
|
-
cas: Optional[pulumi.Input[
|
476
|
+
cas: Optional[pulumi.Input[_builtins.int]] = None,
|
478
477
|
custom_metadata: Optional[pulumi.Input[Union['SecretV2CustomMetadataArgs', 'SecretV2CustomMetadataArgsDict']]] = None,
|
479
|
-
data_json: Optional[pulumi.Input[
|
480
|
-
data_json_wo_version: Optional[pulumi.Input[
|
481
|
-
delete_all_versions: Optional[pulumi.Input[
|
482
|
-
disable_read: Optional[pulumi.Input[
|
483
|
-
mount: Optional[pulumi.Input[
|
484
|
-
name: Optional[pulumi.Input[
|
485
|
-
namespace: Optional[pulumi.Input[
|
486
|
-
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
478
|
+
data_json: Optional[pulumi.Input[_builtins.str]] = None,
|
479
|
+
data_json_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
|
480
|
+
delete_all_versions: Optional[pulumi.Input[_builtins.bool]] = None,
|
481
|
+
disable_read: Optional[pulumi.Input[_builtins.bool]] = None,
|
482
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
483
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
484
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
485
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
487
486
|
__props__=None):
|
488
487
|
"""
|
489
488
|
Writes a KV-V2 secret to a given path in Vault.
|
@@ -559,30 +558,30 @@ class SecretV2(pulumi.CustomResource):
|
|
559
558
|
|
560
559
|
:param str resource_name: The name of the resource.
|
561
560
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
562
|
-
:param pulumi.Input[
|
561
|
+
:param pulumi.Input[_builtins.int] cas: This flag is required if `cas_required` is set to true
|
563
562
|
on either the secret or the engine's config. In order for a
|
564
563
|
write operation to be successful, cas must be set to the current version
|
565
564
|
of the secret.
|
566
565
|
:param pulumi.Input[Union['SecretV2CustomMetadataArgs', 'SecretV2CustomMetadataArgsDict']] custom_metadata: A nested block that allows configuring metadata for the
|
567
566
|
KV secret. Refer to the
|
568
567
|
Configuration Options for more info.
|
569
|
-
:param pulumi.Input[
|
568
|
+
:param pulumi.Input[_builtins.str] data_json: JSON-encoded string that will be
|
570
569
|
written as the secret data at the given path.
|
571
|
-
:param pulumi.Input[
|
572
|
-
:param pulumi.Input[
|
570
|
+
:param pulumi.Input[_builtins.int] data_json_wo_version: The version of the `data_json_wo`. For more info see updating write-only attributes.
|
571
|
+
:param pulumi.Input[_builtins.bool] delete_all_versions: If set to true, permanently deletes all
|
573
572
|
versions for the specified key.
|
574
|
-
:param pulumi.Input[
|
573
|
+
:param pulumi.Input[_builtins.bool] disable_read: If set to true, disables reading secret from Vault;
|
575
574
|
note: drift won't be detected.
|
576
|
-
:param pulumi.Input[
|
577
|
-
:param pulumi.Input[
|
575
|
+
:param pulumi.Input[_builtins.str] mount: Path where KV-V2 engine is mounted.
|
576
|
+
:param pulumi.Input[_builtins.str] name: Full name of the secret. For a nested secret
|
578
577
|
the name is the nested path excluding the mount and data
|
579
578
|
prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
|
580
579
|
the name is `foo/bar/baz`.
|
581
|
-
:param pulumi.Input[
|
580
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
582
581
|
The value should not contain leading or trailing forward slashes.
|
583
582
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
584
583
|
*Available only for Vault Enterprise*.
|
585
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
584
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: An object that holds option settings.
|
586
585
|
"""
|
587
586
|
...
|
588
587
|
@overload
|
@@ -677,16 +676,16 @@ class SecretV2(pulumi.CustomResource):
|
|
677
676
|
def _internal_init(__self__,
|
678
677
|
resource_name: str,
|
679
678
|
opts: Optional[pulumi.ResourceOptions] = None,
|
680
|
-
cas: Optional[pulumi.Input[
|
679
|
+
cas: Optional[pulumi.Input[_builtins.int]] = None,
|
681
680
|
custom_metadata: Optional[pulumi.Input[Union['SecretV2CustomMetadataArgs', 'SecretV2CustomMetadataArgsDict']]] = None,
|
682
|
-
data_json: Optional[pulumi.Input[
|
683
|
-
data_json_wo_version: Optional[pulumi.Input[
|
684
|
-
delete_all_versions: Optional[pulumi.Input[
|
685
|
-
disable_read: Optional[pulumi.Input[
|
686
|
-
mount: Optional[pulumi.Input[
|
687
|
-
name: Optional[pulumi.Input[
|
688
|
-
namespace: Optional[pulumi.Input[
|
689
|
-
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
681
|
+
data_json: Optional[pulumi.Input[_builtins.str]] = None,
|
682
|
+
data_json_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
|
683
|
+
delete_all_versions: Optional[pulumi.Input[_builtins.bool]] = None,
|
684
|
+
disable_read: Optional[pulumi.Input[_builtins.bool]] = None,
|
685
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
686
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
687
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
688
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
690
689
|
__props__=None):
|
691
690
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
692
691
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -723,19 +722,19 @@ class SecretV2(pulumi.CustomResource):
|
|
723
722
|
def get(resource_name: str,
|
724
723
|
id: pulumi.Input[str],
|
725
724
|
opts: Optional[pulumi.ResourceOptions] = None,
|
726
|
-
cas: Optional[pulumi.Input[
|
725
|
+
cas: Optional[pulumi.Input[_builtins.int]] = None,
|
727
726
|
custom_metadata: Optional[pulumi.Input[Union['SecretV2CustomMetadataArgs', 'SecretV2CustomMetadataArgsDict']]] = None,
|
728
|
-
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
729
|
-
data_json: Optional[pulumi.Input[
|
730
|
-
data_json_wo_version: Optional[pulumi.Input[
|
731
|
-
delete_all_versions: Optional[pulumi.Input[
|
732
|
-
disable_read: Optional[pulumi.Input[
|
733
|
-
metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
734
|
-
mount: Optional[pulumi.Input[
|
735
|
-
name: Optional[pulumi.Input[
|
736
|
-
namespace: Optional[pulumi.Input[
|
737
|
-
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
738
|
-
path: Optional[pulumi.Input[
|
727
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
728
|
+
data_json: Optional[pulumi.Input[_builtins.str]] = None,
|
729
|
+
data_json_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
|
730
|
+
delete_all_versions: Optional[pulumi.Input[_builtins.bool]] = None,
|
731
|
+
disable_read: Optional[pulumi.Input[_builtins.bool]] = None,
|
732
|
+
metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
733
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
734
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
735
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
736
|
+
options: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
737
|
+
path: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretV2':
|
739
738
|
"""
|
740
739
|
Get an existing SecretV2 resource's state with the given name, id, and optional extra
|
741
740
|
properties used to qualify the lookup.
|
@@ -743,36 +742,36 @@ class SecretV2(pulumi.CustomResource):
|
|
743
742
|
:param str resource_name: The unique name of the resulting resource.
|
744
743
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
745
744
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
746
|
-
:param pulumi.Input[
|
745
|
+
:param pulumi.Input[_builtins.int] cas: This flag is required if `cas_required` is set to true
|
747
746
|
on either the secret or the engine's config. In order for a
|
748
747
|
write operation to be successful, cas must be set to the current version
|
749
748
|
of the secret.
|
750
749
|
:param pulumi.Input[Union['SecretV2CustomMetadataArgs', 'SecretV2CustomMetadataArgsDict']] custom_metadata: A nested block that allows configuring metadata for the
|
751
750
|
KV secret. Refer to the
|
752
751
|
Configuration Options for more info.
|
753
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
752
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] data: **Deprecated. Please use new ephemeral resource `kv.SecretV2` to read back
|
754
753
|
secret data from Vault**. A mapping whose keys are the top-level data keys returned from
|
755
754
|
Vault and whose values are the corresponding values. This map can only represent string data,
|
756
755
|
so any non-string values returned from Vault are serialized as JSON.
|
757
|
-
:param pulumi.Input[
|
756
|
+
:param pulumi.Input[_builtins.str] data_json: JSON-encoded string that will be
|
758
757
|
written as the secret data at the given path.
|
759
|
-
:param pulumi.Input[
|
760
|
-
:param pulumi.Input[
|
758
|
+
:param pulumi.Input[_builtins.int] data_json_wo_version: The version of the `data_json_wo`. For more info see updating write-only attributes.
|
759
|
+
:param pulumi.Input[_builtins.bool] delete_all_versions: If set to true, permanently deletes all
|
761
760
|
versions for the specified key.
|
762
|
-
:param pulumi.Input[
|
761
|
+
:param pulumi.Input[_builtins.bool] disable_read: If set to true, disables reading secret from Vault;
|
763
762
|
note: drift won't be detected.
|
764
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
765
|
-
:param pulumi.Input[
|
766
|
-
:param pulumi.Input[
|
763
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] metadata: Metadata associated with this secret read from Vault.
|
764
|
+
:param pulumi.Input[_builtins.str] mount: Path where KV-V2 engine is mounted.
|
765
|
+
:param pulumi.Input[_builtins.str] name: Full name of the secret. For a nested secret
|
767
766
|
the name is the nested path excluding the mount and data
|
768
767
|
prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
|
769
768
|
the name is `foo/bar/baz`.
|
770
|
-
:param pulumi.Input[
|
769
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
771
770
|
The value should not contain leading or trailing forward slashes.
|
772
771
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
773
772
|
*Available only for Vault Enterprise*.
|
774
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
775
|
-
:param pulumi.Input[
|
773
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] options: An object that holds option settings.
|
774
|
+
:param pulumi.Input[_builtins.str] path: Full path where the KV-V2 secret will be written.
|
776
775
|
"""
|
777
776
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
778
777
|
|
@@ -793,9 +792,9 @@ class SecretV2(pulumi.CustomResource):
|
|
793
792
|
__props__.__dict__["path"] = path
|
794
793
|
return SecretV2(resource_name, opts=opts, __props__=__props__)
|
795
794
|
|
796
|
-
@property
|
795
|
+
@_builtins.property
|
797
796
|
@pulumi.getter
|
798
|
-
def cas(self) -> pulumi.Output[Optional[
|
797
|
+
def cas(self) -> pulumi.Output[Optional[_builtins.int]]:
|
799
798
|
"""
|
800
799
|
This flag is required if `cas_required` is set to true
|
801
800
|
on either the secret or the engine's config. In order for a
|
@@ -804,7 +803,7 @@ class SecretV2(pulumi.CustomResource):
|
|
804
803
|
"""
|
805
804
|
return pulumi.get(self, "cas")
|
806
805
|
|
807
|
-
@property
|
806
|
+
@_builtins.property
|
808
807
|
@pulumi.getter(name="customMetadata")
|
809
808
|
def custom_metadata(self) -> pulumi.Output['outputs.SecretV2CustomMetadata']:
|
810
809
|
"""
|
@@ -814,10 +813,10 @@ class SecretV2(pulumi.CustomResource):
|
|
814
813
|
"""
|
815
814
|
return pulumi.get(self, "custom_metadata")
|
816
815
|
|
817
|
-
@property
|
816
|
+
@_builtins.property
|
818
817
|
@pulumi.getter
|
819
818
|
@_utilities.deprecated("""Deprecated. Will no longer be set on a read.""")
|
820
|
-
def data(self) -> pulumi.Output[Mapping[str,
|
819
|
+
def data(self) -> pulumi.Output[Mapping[str, _builtins.str]]:
|
821
820
|
"""
|
822
821
|
**Deprecated. Please use new ephemeral resource `kv.SecretV2` to read back
|
823
822
|
secret data from Vault**. A mapping whose keys are the top-level data keys returned from
|
@@ -826,60 +825,60 @@ class SecretV2(pulumi.CustomResource):
|
|
826
825
|
"""
|
827
826
|
return pulumi.get(self, "data")
|
828
827
|
|
829
|
-
@property
|
828
|
+
@_builtins.property
|
830
829
|
@pulumi.getter(name="dataJson")
|
831
|
-
def data_json(self) -> pulumi.Output[Optional[
|
830
|
+
def data_json(self) -> pulumi.Output[Optional[_builtins.str]]:
|
832
831
|
"""
|
833
832
|
JSON-encoded string that will be
|
834
833
|
written as the secret data at the given path.
|
835
834
|
"""
|
836
835
|
return pulumi.get(self, "data_json")
|
837
836
|
|
838
|
-
@property
|
837
|
+
@_builtins.property
|
839
838
|
@pulumi.getter(name="dataJsonWoVersion")
|
840
|
-
def data_json_wo_version(self) -> pulumi.Output[Optional[
|
839
|
+
def data_json_wo_version(self) -> pulumi.Output[Optional[_builtins.int]]:
|
841
840
|
"""
|
842
841
|
The version of the `data_json_wo`. For more info see updating write-only attributes.
|
843
842
|
"""
|
844
843
|
return pulumi.get(self, "data_json_wo_version")
|
845
844
|
|
846
|
-
@property
|
845
|
+
@_builtins.property
|
847
846
|
@pulumi.getter(name="deleteAllVersions")
|
848
|
-
def delete_all_versions(self) -> pulumi.Output[Optional[
|
847
|
+
def delete_all_versions(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
849
848
|
"""
|
850
849
|
If set to true, permanently deletes all
|
851
850
|
versions for the specified key.
|
852
851
|
"""
|
853
852
|
return pulumi.get(self, "delete_all_versions")
|
854
853
|
|
855
|
-
@property
|
854
|
+
@_builtins.property
|
856
855
|
@pulumi.getter(name="disableRead")
|
857
|
-
def disable_read(self) -> pulumi.Output[Optional[
|
856
|
+
def disable_read(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
858
857
|
"""
|
859
858
|
If set to true, disables reading secret from Vault;
|
860
859
|
note: drift won't be detected.
|
861
860
|
"""
|
862
861
|
return pulumi.get(self, "disable_read")
|
863
862
|
|
864
|
-
@property
|
863
|
+
@_builtins.property
|
865
864
|
@pulumi.getter
|
866
|
-
def metadata(self) -> pulumi.Output[Mapping[str,
|
865
|
+
def metadata(self) -> pulumi.Output[Mapping[str, _builtins.str]]:
|
867
866
|
"""
|
868
867
|
Metadata associated with this secret read from Vault.
|
869
868
|
"""
|
870
869
|
return pulumi.get(self, "metadata")
|
871
870
|
|
872
|
-
@property
|
871
|
+
@_builtins.property
|
873
872
|
@pulumi.getter
|
874
|
-
def mount(self) -> pulumi.Output[
|
873
|
+
def mount(self) -> pulumi.Output[_builtins.str]:
|
875
874
|
"""
|
876
875
|
Path where KV-V2 engine is mounted.
|
877
876
|
"""
|
878
877
|
return pulumi.get(self, "mount")
|
879
878
|
|
880
|
-
@property
|
879
|
+
@_builtins.property
|
881
880
|
@pulumi.getter
|
882
|
-
def name(self) -> pulumi.Output[
|
881
|
+
def name(self) -> pulumi.Output[_builtins.str]:
|
883
882
|
"""
|
884
883
|
Full name of the secret. For a nested secret
|
885
884
|
the name is the nested path excluding the mount and data
|
@@ -888,9 +887,9 @@ class SecretV2(pulumi.CustomResource):
|
|
888
887
|
"""
|
889
888
|
return pulumi.get(self, "name")
|
890
889
|
|
891
|
-
@property
|
890
|
+
@_builtins.property
|
892
891
|
@pulumi.getter
|
893
|
-
def namespace(self) -> pulumi.Output[Optional[
|
892
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
894
893
|
"""
|
895
894
|
The namespace to provision the resource in.
|
896
895
|
The value should not contain leading or trailing forward slashes.
|
@@ -899,17 +898,17 @@ class SecretV2(pulumi.CustomResource):
|
|
899
898
|
"""
|
900
899
|
return pulumi.get(self, "namespace")
|
901
900
|
|
902
|
-
@property
|
901
|
+
@_builtins.property
|
903
902
|
@pulumi.getter
|
904
|
-
def options(self) -> pulumi.Output[Optional[Mapping[str,
|
903
|
+
def options(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
|
905
904
|
"""
|
906
905
|
An object that holds option settings.
|
907
906
|
"""
|
908
907
|
return pulumi.get(self, "options")
|
909
908
|
|
910
|
-
@property
|
909
|
+
@_builtins.property
|
911
910
|
@pulumi.getter
|
912
|
-
def path(self) -> pulumi.Output[
|
911
|
+
def path(self) -> pulumi.Output[_builtins.str]:
|
913
912
|
"""
|
914
913
|
Full path where the KV-V2 secret will be written.
|
915
914
|
"""
|