pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
pulumi_vault/kv/__init__.py
CHANGED
@@ -2,7 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
5
|
+
import builtins as _builtins
|
6
6
|
from .. import _utilities
|
7
7
|
import typing
|
8
8
|
# Export this package's modules as members:
|
pulumi_vault/kv/_inputs.py
CHANGED
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -24,22 +23,22 @@ MYPY = False
|
|
24
23
|
|
25
24
|
if not MYPY:
|
26
25
|
class SecretV2CustomMetadataArgsDict(TypedDict):
|
27
|
-
cas_required: NotRequired[pulumi.Input[
|
26
|
+
cas_required: NotRequired[pulumi.Input[_builtins.bool]]
|
28
27
|
"""
|
29
28
|
If true, all keys will require the cas parameter to be set on all write requests.
|
30
29
|
"""
|
31
|
-
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[
|
30
|
+
data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]
|
32
31
|
"""
|
33
32
|
**Deprecated. Please use new ephemeral resource `kv.SecretV2` to read back
|
34
33
|
secret data from Vault**. A mapping whose keys are the top-level data keys returned from
|
35
34
|
Vault and whose values are the corresponding values. This map can only represent string data,
|
36
35
|
so any non-string values returned from Vault are serialized as JSON.
|
37
36
|
"""
|
38
|
-
delete_version_after: NotRequired[pulumi.Input[
|
37
|
+
delete_version_after: NotRequired[pulumi.Input[_builtins.int]]
|
39
38
|
"""
|
40
39
|
If set, specifies the length of time before a version is deleted.
|
41
40
|
"""
|
42
|
-
max_versions: NotRequired[pulumi.Input[
|
41
|
+
max_versions: NotRequired[pulumi.Input[_builtins.int]]
|
43
42
|
"""
|
44
43
|
The number of versions to keep per key.
|
45
44
|
"""
|
@@ -49,18 +48,18 @@ elif False:
|
|
49
48
|
@pulumi.input_type
|
50
49
|
class SecretV2CustomMetadataArgs:
|
51
50
|
def __init__(__self__, *,
|
52
|
-
cas_required: Optional[pulumi.Input[
|
53
|
-
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
54
|
-
delete_version_after: Optional[pulumi.Input[
|
55
|
-
max_versions: Optional[pulumi.Input[
|
51
|
+
cas_required: Optional[pulumi.Input[_builtins.bool]] = None,
|
52
|
+
data: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
53
|
+
delete_version_after: Optional[pulumi.Input[_builtins.int]] = None,
|
54
|
+
max_versions: Optional[pulumi.Input[_builtins.int]] = None):
|
56
55
|
"""
|
57
|
-
:param pulumi.Input[
|
58
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
56
|
+
:param pulumi.Input[_builtins.bool] cas_required: If true, all keys will require the cas parameter to be set on all write requests.
|
57
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] data: **Deprecated. Please use new ephemeral resource `kv.SecretV2` to read back
|
59
58
|
secret data from Vault**. A mapping whose keys are the top-level data keys returned from
|
60
59
|
Vault and whose values are the corresponding values. This map can only represent string data,
|
61
60
|
so any non-string values returned from Vault are serialized as JSON.
|
62
|
-
:param pulumi.Input[
|
63
|
-
:param pulumi.Input[
|
61
|
+
:param pulumi.Input[_builtins.int] delete_version_after: If set, specifies the length of time before a version is deleted.
|
62
|
+
:param pulumi.Input[_builtins.int] max_versions: The number of versions to keep per key.
|
64
63
|
"""
|
65
64
|
if cas_required is not None:
|
66
65
|
pulumi.set(__self__, "cas_required", cas_required)
|
@@ -71,21 +70,21 @@ class SecretV2CustomMetadataArgs:
|
|
71
70
|
if max_versions is not None:
|
72
71
|
pulumi.set(__self__, "max_versions", max_versions)
|
73
72
|
|
74
|
-
@property
|
73
|
+
@_builtins.property
|
75
74
|
@pulumi.getter(name="casRequired")
|
76
|
-
def cas_required(self) -> Optional[pulumi.Input[
|
75
|
+
def cas_required(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
77
76
|
"""
|
78
77
|
If true, all keys will require the cas parameter to be set on all write requests.
|
79
78
|
"""
|
80
79
|
return pulumi.get(self, "cas_required")
|
81
80
|
|
82
81
|
@cas_required.setter
|
83
|
-
def cas_required(self, value: Optional[pulumi.Input[
|
82
|
+
def cas_required(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
84
83
|
pulumi.set(self, "cas_required", value)
|
85
84
|
|
86
|
-
@property
|
85
|
+
@_builtins.property
|
87
86
|
@pulumi.getter
|
88
|
-
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
87
|
+
def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
89
88
|
"""
|
90
89
|
**Deprecated. Please use new ephemeral resource `kv.SecretV2` to read back
|
91
90
|
secret data from Vault**. A mapping whose keys are the top-level data keys returned from
|
@@ -95,31 +94,31 @@ class SecretV2CustomMetadataArgs:
|
|
95
94
|
return pulumi.get(self, "data")
|
96
95
|
|
97
96
|
@data.setter
|
98
|
-
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
97
|
+
def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
99
98
|
pulumi.set(self, "data", value)
|
100
99
|
|
101
|
-
@property
|
100
|
+
@_builtins.property
|
102
101
|
@pulumi.getter(name="deleteVersionAfter")
|
103
|
-
def delete_version_after(self) -> Optional[pulumi.Input[
|
102
|
+
def delete_version_after(self) -> Optional[pulumi.Input[_builtins.int]]:
|
104
103
|
"""
|
105
104
|
If set, specifies the length of time before a version is deleted.
|
106
105
|
"""
|
107
106
|
return pulumi.get(self, "delete_version_after")
|
108
107
|
|
109
108
|
@delete_version_after.setter
|
110
|
-
def delete_version_after(self, value: Optional[pulumi.Input[
|
109
|
+
def delete_version_after(self, value: Optional[pulumi.Input[_builtins.int]]):
|
111
110
|
pulumi.set(self, "delete_version_after", value)
|
112
111
|
|
113
|
-
@property
|
112
|
+
@_builtins.property
|
114
113
|
@pulumi.getter(name="maxVersions")
|
115
|
-
def max_versions(self) -> Optional[pulumi.Input[
|
114
|
+
def max_versions(self) -> Optional[pulumi.Input[_builtins.int]]:
|
116
115
|
"""
|
117
116
|
The number of versions to keep per key.
|
118
117
|
"""
|
119
118
|
return pulumi.get(self, "max_versions")
|
120
119
|
|
121
120
|
@max_versions.setter
|
122
|
-
def max_versions(self, value: Optional[pulumi.Input[
|
121
|
+
def max_versions(self, value: Optional[pulumi.Input[_builtins.int]]):
|
123
122
|
pulumi.set(self, "max_versions", value)
|
124
123
|
|
125
124
|
|
pulumi_vault/kv/get_secret.py
CHANGED
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -53,9 +52,9 @@ class GetSecretResult:
|
|
53
52
|
raise TypeError("Expected argument 'path' to be a str")
|
54
53
|
pulumi.set(__self__, "path", path)
|
55
54
|
|
56
|
-
@property
|
55
|
+
@_builtins.property
|
57
56
|
@pulumi.getter
|
58
|
-
def data(self) -> Mapping[str,
|
57
|
+
def data(self) -> Mapping[str, _builtins.str]:
|
59
58
|
"""
|
60
59
|
A mapping whose keys are the top-level data keys returned from
|
61
60
|
Vault and whose values are the corresponding values. This map can only
|
@@ -64,57 +63,57 @@ class GetSecretResult:
|
|
64
63
|
"""
|
65
64
|
return pulumi.get(self, "data")
|
66
65
|
|
67
|
-
@property
|
66
|
+
@_builtins.property
|
68
67
|
@pulumi.getter(name="dataJson")
|
69
|
-
def data_json(self) ->
|
68
|
+
def data_json(self) -> _builtins.str:
|
70
69
|
"""
|
71
70
|
JSON-encoded string that that is
|
72
71
|
read as the secret data at the given path.
|
73
72
|
"""
|
74
73
|
return pulumi.get(self, "data_json")
|
75
74
|
|
76
|
-
@property
|
75
|
+
@_builtins.property
|
77
76
|
@pulumi.getter
|
78
|
-
def id(self) ->
|
77
|
+
def id(self) -> _builtins.str:
|
79
78
|
"""
|
80
79
|
The provider-assigned unique ID for this managed resource.
|
81
80
|
"""
|
82
81
|
return pulumi.get(self, "id")
|
83
82
|
|
84
|
-
@property
|
83
|
+
@_builtins.property
|
85
84
|
@pulumi.getter(name="leaseDuration")
|
86
|
-
def lease_duration(self) ->
|
85
|
+
def lease_duration(self) -> _builtins.int:
|
87
86
|
"""
|
88
87
|
The duration of the secret lease, in seconds. Once
|
89
88
|
this time has passed any plan generated with this data may fail to apply.
|
90
89
|
"""
|
91
90
|
return pulumi.get(self, "lease_duration")
|
92
91
|
|
93
|
-
@property
|
92
|
+
@_builtins.property
|
94
93
|
@pulumi.getter(name="leaseId")
|
95
|
-
def lease_id(self) ->
|
94
|
+
def lease_id(self) -> _builtins.str:
|
96
95
|
"""
|
97
96
|
The lease identifier assigned by Vault, if any.
|
98
97
|
"""
|
99
98
|
return pulumi.get(self, "lease_id")
|
100
99
|
|
101
|
-
@property
|
100
|
+
@_builtins.property
|
102
101
|
@pulumi.getter(name="leaseRenewable")
|
103
|
-
def lease_renewable(self) ->
|
102
|
+
def lease_renewable(self) -> _builtins.bool:
|
104
103
|
"""
|
105
104
|
True if the duration of this lease can be extended
|
106
105
|
through renewal.
|
107
106
|
"""
|
108
107
|
return pulumi.get(self, "lease_renewable")
|
109
108
|
|
110
|
-
@property
|
109
|
+
@_builtins.property
|
111
110
|
@pulumi.getter
|
112
|
-
def namespace(self) -> Optional[
|
111
|
+
def namespace(self) -> Optional[_builtins.str]:
|
113
112
|
return pulumi.get(self, "namespace")
|
114
113
|
|
115
|
-
@property
|
114
|
+
@_builtins.property
|
116
115
|
@pulumi.getter
|
117
|
-
def path(self) ->
|
116
|
+
def path(self) -> _builtins.str:
|
118
117
|
return pulumi.get(self, "path")
|
119
118
|
|
120
119
|
|
@@ -134,8 +133,8 @@ class AwaitableGetSecretResult(GetSecretResult):
|
|
134
133
|
path=self.path)
|
135
134
|
|
136
135
|
|
137
|
-
def get_secret(namespace: Optional[
|
138
|
-
path: Optional[
|
136
|
+
def get_secret(namespace: Optional[_builtins.str] = None,
|
137
|
+
path: Optional[_builtins.str] = None,
|
139
138
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecretResult:
|
140
139
|
"""
|
141
140
|
## Example Usage
|
@@ -166,11 +165,11 @@ def get_secret(namespace: Optional[builtins.str] = None,
|
|
166
165
|
Use of this resource requires the `read` capability on the given path.
|
167
166
|
|
168
167
|
|
169
|
-
:param
|
168
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
170
169
|
The value should not contain leading or trailing forward slashes.
|
171
170
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
172
171
|
*Available only for Vault Enterprise*.
|
173
|
-
:param
|
172
|
+
:param _builtins.str path: Full path of the KV-V1 secret.
|
174
173
|
"""
|
175
174
|
__args__ = dict()
|
176
175
|
__args__['namespace'] = namespace
|
@@ -187,8 +186,8 @@ def get_secret(namespace: Optional[builtins.str] = None,
|
|
187
186
|
lease_renewable=pulumi.get(__ret__, 'lease_renewable'),
|
188
187
|
namespace=pulumi.get(__ret__, 'namespace'),
|
189
188
|
path=pulumi.get(__ret__, 'path'))
|
190
|
-
def get_secret_output(namespace: Optional[pulumi.Input[Optional[
|
191
|
-
path: Optional[pulumi.Input[
|
189
|
+
def get_secret_output(namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
190
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
192
191
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecretResult]:
|
193
192
|
"""
|
194
193
|
## Example Usage
|
@@ -219,11 +218,11 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[builtins.str]]]
|
|
219
218
|
Use of this resource requires the `read` capability on the given path.
|
220
219
|
|
221
220
|
|
222
|
-
:param
|
221
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
223
222
|
The value should not contain leading or trailing forward slashes.
|
224
223
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
225
224
|
*Available only for Vault Enterprise*.
|
226
|
-
:param
|
225
|
+
:param _builtins.str path: Full path of the KV-V1 secret.
|
227
226
|
"""
|
228
227
|
__args__ = dict()
|
229
228
|
__args__['namespace'] = namespace
|
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -56,61 +55,61 @@ class GetSecretSubkeysV2Result:
|
|
56
55
|
raise TypeError("Expected argument 'version' to be a int")
|
57
56
|
pulumi.set(__self__, "version", version)
|
58
57
|
|
59
|
-
@property
|
58
|
+
@_builtins.property
|
60
59
|
@pulumi.getter
|
61
|
-
def data(self) -> Mapping[str,
|
60
|
+
def data(self) -> Mapping[str, _builtins.str]:
|
62
61
|
"""
|
63
62
|
Subkeys for the KV-V2 secret stored as a serialized map of strings.
|
64
63
|
"""
|
65
64
|
return pulumi.get(self, "data")
|
66
65
|
|
67
|
-
@property
|
66
|
+
@_builtins.property
|
68
67
|
@pulumi.getter(name="dataJson")
|
69
|
-
def data_json(self) ->
|
68
|
+
def data_json(self) -> _builtins.str:
|
70
69
|
"""
|
71
70
|
Subkeys for the KV-V2 secret read from Vault.
|
72
71
|
"""
|
73
72
|
return pulumi.get(self, "data_json")
|
74
73
|
|
75
|
-
@property
|
74
|
+
@_builtins.property
|
76
75
|
@pulumi.getter
|
77
|
-
def depth(self) -> Optional[
|
76
|
+
def depth(self) -> Optional[_builtins.int]:
|
78
77
|
return pulumi.get(self, "depth")
|
79
78
|
|
80
|
-
@property
|
79
|
+
@_builtins.property
|
81
80
|
@pulumi.getter
|
82
|
-
def id(self) ->
|
81
|
+
def id(self) -> _builtins.str:
|
83
82
|
"""
|
84
83
|
The provider-assigned unique ID for this managed resource.
|
85
84
|
"""
|
86
85
|
return pulumi.get(self, "id")
|
87
86
|
|
88
|
-
@property
|
87
|
+
@_builtins.property
|
89
88
|
@pulumi.getter
|
90
|
-
def mount(self) ->
|
89
|
+
def mount(self) -> _builtins.str:
|
91
90
|
return pulumi.get(self, "mount")
|
92
91
|
|
93
|
-
@property
|
92
|
+
@_builtins.property
|
94
93
|
@pulumi.getter
|
95
|
-
def name(self) ->
|
94
|
+
def name(self) -> _builtins.str:
|
96
95
|
return pulumi.get(self, "name")
|
97
96
|
|
98
|
-
@property
|
97
|
+
@_builtins.property
|
99
98
|
@pulumi.getter
|
100
|
-
def namespace(self) -> Optional[
|
99
|
+
def namespace(self) -> Optional[_builtins.str]:
|
101
100
|
return pulumi.get(self, "namespace")
|
102
101
|
|
103
|
-
@property
|
102
|
+
@_builtins.property
|
104
103
|
@pulumi.getter
|
105
|
-
def path(self) ->
|
104
|
+
def path(self) -> _builtins.str:
|
106
105
|
"""
|
107
106
|
Full path where the KV-V2 secrets are listed.
|
108
107
|
"""
|
109
108
|
return pulumi.get(self, "path")
|
110
109
|
|
111
|
-
@property
|
110
|
+
@_builtins.property
|
112
111
|
@pulumi.getter
|
113
|
-
def version(self) -> Optional[
|
112
|
+
def version(self) -> Optional[_builtins.int]:
|
114
113
|
return pulumi.get(self, "version")
|
115
114
|
|
116
115
|
|
@@ -131,11 +130,11 @@ class AwaitableGetSecretSubkeysV2Result(GetSecretSubkeysV2Result):
|
|
131
130
|
version=self.version)
|
132
131
|
|
133
132
|
|
134
|
-
def get_secret_subkeys_v2(depth: Optional[
|
135
|
-
mount: Optional[
|
136
|
-
name: Optional[
|
137
|
-
namespace: Optional[
|
138
|
-
version: Optional[
|
133
|
+
def get_secret_subkeys_v2(depth: Optional[_builtins.int] = None,
|
134
|
+
mount: Optional[_builtins.str] = None,
|
135
|
+
name: Optional[_builtins.str] = None,
|
136
|
+
namespace: Optional[_builtins.str] = None,
|
137
|
+
version: Optional[_builtins.int] = None,
|
139
138
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecretSubkeysV2Result:
|
140
139
|
"""
|
141
140
|
## Example Usage
|
@@ -168,20 +167,20 @@ def get_secret_subkeys_v2(depth: Optional[builtins.int] = None,
|
|
168
167
|
Use of this resource requires the `read` capability on the given path.
|
169
168
|
|
170
169
|
|
171
|
-
:param
|
170
|
+
:param _builtins.int depth: Specifies the deepest nesting level to provide in the output.
|
172
171
|
If non-zero, keys that reside at the specified depth value will be
|
173
172
|
artificially treated as leaves and will thus be `null` even if further
|
174
173
|
underlying sub-keys exist.
|
175
|
-
:param
|
176
|
-
:param
|
174
|
+
:param _builtins.str mount: Path where KV-V2 engine is mounted.
|
175
|
+
:param _builtins.str name: Full name of the secret. For a nested secret
|
177
176
|
the name is the nested path excluding the mount and data
|
178
177
|
prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
|
179
178
|
the name is `foo/bar/baz`.
|
180
|
-
:param
|
179
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
181
180
|
The value should not contain leading or trailing forward slashes.
|
182
181
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
183
182
|
*Available only for Vault Enterprise*.
|
184
|
-
:param
|
183
|
+
:param _builtins.int version: Specifies the version to return. If not
|
185
184
|
set the latest version is returned.
|
186
185
|
"""
|
187
186
|
__args__ = dict()
|
@@ -203,11 +202,11 @@ def get_secret_subkeys_v2(depth: Optional[builtins.int] = None,
|
|
203
202
|
namespace=pulumi.get(__ret__, 'namespace'),
|
204
203
|
path=pulumi.get(__ret__, 'path'),
|
205
204
|
version=pulumi.get(__ret__, 'version'))
|
206
|
-
def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[
|
207
|
-
mount: Optional[pulumi.Input[
|
208
|
-
name: Optional[pulumi.Input[
|
209
|
-
namespace: Optional[pulumi.Input[Optional[
|
210
|
-
version: Optional[pulumi.Input[Optional[
|
205
|
+
def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
|
206
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
207
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
208
|
+
namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
209
|
+
version: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
|
211
210
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecretSubkeysV2Result]:
|
212
211
|
"""
|
213
212
|
## Example Usage
|
@@ -240,20 +239,20 @@ def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[builtins.
|
|
240
239
|
Use of this resource requires the `read` capability on the given path.
|
241
240
|
|
242
241
|
|
243
|
-
:param
|
242
|
+
:param _builtins.int depth: Specifies the deepest nesting level to provide in the output.
|
244
243
|
If non-zero, keys that reside at the specified depth value will be
|
245
244
|
artificially treated as leaves and will thus be `null` even if further
|
246
245
|
underlying sub-keys exist.
|
247
|
-
:param
|
248
|
-
:param
|
246
|
+
:param _builtins.str mount: Path where KV-V2 engine is mounted.
|
247
|
+
:param _builtins.str name: Full name of the secret. For a nested secret
|
249
248
|
the name is the nested path excluding the mount and data
|
250
249
|
prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
|
251
250
|
the name is `foo/bar/baz`.
|
252
|
-
:param
|
251
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
253
252
|
The value should not contain leading or trailing forward slashes.
|
254
253
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
255
254
|
*Available only for Vault Enterprise*.
|
256
|
-
:param
|
255
|
+
:param _builtins.int version: Specifies the version to return. If not
|
257
256
|
set the latest version is returned.
|
258
257
|
"""
|
259
258
|
__args__ = dict()
|
pulumi_vault/kv/get_secret_v2.py
CHANGED
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -65,25 +64,25 @@ class GetSecretV2Result:
|
|
65
64
|
raise TypeError("Expected argument 'version' to be a int")
|
66
65
|
pulumi.set(__self__, "version", version)
|
67
66
|
|
68
|
-
@property
|
67
|
+
@_builtins.property
|
69
68
|
@pulumi.getter(name="createdTime")
|
70
|
-
def created_time(self) ->
|
69
|
+
def created_time(self) -> _builtins.str:
|
71
70
|
"""
|
72
71
|
Time at which secret was created.
|
73
72
|
"""
|
74
73
|
return pulumi.get(self, "created_time")
|
75
74
|
|
76
|
-
@property
|
75
|
+
@_builtins.property
|
77
76
|
@pulumi.getter(name="customMetadata")
|
78
|
-
def custom_metadata(self) -> Mapping[str,
|
77
|
+
def custom_metadata(self) -> Mapping[str, _builtins.str]:
|
79
78
|
"""
|
80
79
|
Custom metadata for the secret.
|
81
80
|
"""
|
82
81
|
return pulumi.get(self, "custom_metadata")
|
83
82
|
|
84
|
-
@property
|
83
|
+
@_builtins.property
|
85
84
|
@pulumi.getter
|
86
|
-
def data(self) -> Mapping[str,
|
85
|
+
def data(self) -> Mapping[str, _builtins.str]:
|
87
86
|
"""
|
88
87
|
A mapping whose keys are the top-level data keys returned from
|
89
88
|
Vault and whose values are the corresponding values. This map can only
|
@@ -92,65 +91,65 @@ class GetSecretV2Result:
|
|
92
91
|
"""
|
93
92
|
return pulumi.get(self, "data")
|
94
93
|
|
95
|
-
@property
|
94
|
+
@_builtins.property
|
96
95
|
@pulumi.getter(name="dataJson")
|
97
|
-
def data_json(self) ->
|
96
|
+
def data_json(self) -> _builtins.str:
|
98
97
|
"""
|
99
98
|
JSON-encoded string that that is
|
100
99
|
read as the secret data at the given path.
|
101
100
|
"""
|
102
101
|
return pulumi.get(self, "data_json")
|
103
102
|
|
104
|
-
@property
|
103
|
+
@_builtins.property
|
105
104
|
@pulumi.getter(name="deletionTime")
|
106
|
-
def deletion_time(self) ->
|
105
|
+
def deletion_time(self) -> _builtins.str:
|
107
106
|
"""
|
108
107
|
Deletion time for the secret.
|
109
108
|
"""
|
110
109
|
return pulumi.get(self, "deletion_time")
|
111
110
|
|
112
|
-
@property
|
111
|
+
@_builtins.property
|
113
112
|
@pulumi.getter
|
114
|
-
def destroyed(self) ->
|
113
|
+
def destroyed(self) -> _builtins.bool:
|
115
114
|
"""
|
116
115
|
Indicates whether the secret has been destroyed.
|
117
116
|
"""
|
118
117
|
return pulumi.get(self, "destroyed")
|
119
118
|
|
120
|
-
@property
|
119
|
+
@_builtins.property
|
121
120
|
@pulumi.getter
|
122
|
-
def id(self) ->
|
121
|
+
def id(self) -> _builtins.str:
|
123
122
|
"""
|
124
123
|
The provider-assigned unique ID for this managed resource.
|
125
124
|
"""
|
126
125
|
return pulumi.get(self, "id")
|
127
126
|
|
128
|
-
@property
|
127
|
+
@_builtins.property
|
129
128
|
@pulumi.getter
|
130
|
-
def mount(self) ->
|
129
|
+
def mount(self) -> _builtins.str:
|
131
130
|
return pulumi.get(self, "mount")
|
132
131
|
|
133
|
-
@property
|
132
|
+
@_builtins.property
|
134
133
|
@pulumi.getter
|
135
|
-
def name(self) ->
|
134
|
+
def name(self) -> _builtins.str:
|
136
135
|
return pulumi.get(self, "name")
|
137
136
|
|
138
|
-
@property
|
137
|
+
@_builtins.property
|
139
138
|
@pulumi.getter
|
140
|
-
def namespace(self) -> Optional[
|
139
|
+
def namespace(self) -> Optional[_builtins.str]:
|
141
140
|
return pulumi.get(self, "namespace")
|
142
141
|
|
143
|
-
@property
|
142
|
+
@_builtins.property
|
144
143
|
@pulumi.getter
|
145
|
-
def path(self) ->
|
144
|
+
def path(self) -> _builtins.str:
|
146
145
|
"""
|
147
146
|
Full path where the KVV2 secret is written.
|
148
147
|
"""
|
149
148
|
return pulumi.get(self, "path")
|
150
149
|
|
151
|
-
@property
|
150
|
+
@_builtins.property
|
152
151
|
@pulumi.getter
|
153
|
-
def version(self) -> Optional[
|
152
|
+
def version(self) -> Optional[_builtins.int]:
|
154
153
|
"""
|
155
154
|
Version of the secret.
|
156
155
|
"""
|
@@ -177,10 +176,10 @@ class AwaitableGetSecretV2Result(GetSecretV2Result):
|
|
177
176
|
version=self.version)
|
178
177
|
|
179
178
|
|
180
|
-
def get_secret_v2(mount: Optional[
|
181
|
-
name: Optional[
|
182
|
-
namespace: Optional[
|
183
|
-
version: Optional[
|
179
|
+
def get_secret_v2(mount: Optional[_builtins.str] = None,
|
180
|
+
name: Optional[_builtins.str] = None,
|
181
|
+
namespace: Optional[_builtins.str] = None,
|
182
|
+
version: Optional[_builtins.int] = None,
|
184
183
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecretV2Result:
|
185
184
|
"""
|
186
185
|
## Example Usage
|
@@ -214,16 +213,16 @@ def get_secret_v2(mount: Optional[builtins.str] = None,
|
|
214
213
|
Use of this resource requires the `read` capability on the given path.
|
215
214
|
|
216
215
|
|
217
|
-
:param
|
218
|
-
:param
|
216
|
+
:param _builtins.str mount: Path where KV-V2 engine is mounted.
|
217
|
+
:param _builtins.str name: Full name of the secret. For a nested secret
|
219
218
|
the name is the nested path excluding the mount and data
|
220
219
|
prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
|
221
220
|
the name is `foo/bar/baz`.
|
222
|
-
:param
|
221
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
223
222
|
The value should not contain leading or trailing forward slashes.
|
224
223
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
225
224
|
*Available only for Vault Enterprise*.
|
226
|
-
:param
|
225
|
+
:param _builtins.int version: Version of the secret to retrieve.
|
227
226
|
"""
|
228
227
|
__args__ = dict()
|
229
228
|
__args__['mount'] = mount
|
@@ -246,10 +245,10 @@ def get_secret_v2(mount: Optional[builtins.str] = None,
|
|
246
245
|
namespace=pulumi.get(__ret__, 'namespace'),
|
247
246
|
path=pulumi.get(__ret__, 'path'),
|
248
247
|
version=pulumi.get(__ret__, 'version'))
|
249
|
-
def get_secret_v2_output(mount: Optional[pulumi.Input[
|
250
|
-
name: Optional[pulumi.Input[
|
251
|
-
namespace: Optional[pulumi.Input[Optional[
|
252
|
-
version: Optional[pulumi.Input[Optional[
|
248
|
+
def get_secret_v2_output(mount: Optional[pulumi.Input[_builtins.str]] = None,
|
249
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
250
|
+
namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
251
|
+
version: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
|
253
252
|
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecretV2Result]:
|
254
253
|
"""
|
255
254
|
## Example Usage
|
@@ -283,16 +282,16 @@ def get_secret_v2_output(mount: Optional[pulumi.Input[builtins.str]] = None,
|
|
283
282
|
Use of this resource requires the `read` capability on the given path.
|
284
283
|
|
285
284
|
|
286
|
-
:param
|
287
|
-
:param
|
285
|
+
:param _builtins.str mount: Path where KV-V2 engine is mounted.
|
286
|
+
:param _builtins.str name: Full name of the secret. For a nested secret
|
288
287
|
the name is the nested path excluding the mount and data
|
289
288
|
prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
|
290
289
|
the name is `foo/bar/baz`.
|
291
|
-
:param
|
290
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
292
291
|
The value should not contain leading or trailing forward slashes.
|
293
292
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
294
293
|
*Available only for Vault Enterprise*.
|
295
|
-
:param
|
294
|
+
:param _builtins.int version: Version of the secret to retrieve.
|
296
295
|
"""
|
297
296
|
__args__ = dict()
|
298
297
|
__args__['mount'] = mount
|