pulumi-vault 7.6.0a1764657486__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1399 -0
- pulumi_vault/_inputs.py +2701 -0
- pulumi_vault/_utilities.py +331 -0
- pulumi_vault/ad/__init__.py +12 -0
- pulumi_vault/ad/get_access_credentials.py +177 -0
- pulumi_vault/ad/secret_backend.py +1916 -0
- pulumi_vault/ad/secret_library.py +546 -0
- pulumi_vault/ad/secret_role.py +499 -0
- pulumi_vault/alicloud/__init__.py +9 -0
- pulumi_vault/alicloud/auth_backend_role.py +866 -0
- pulumi_vault/approle/__init__.py +12 -0
- pulumi_vault/approle/auth_backend_login.py +571 -0
- pulumi_vault/approle/auth_backend_role.py +1082 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
- pulumi_vault/audit.py +499 -0
- pulumi_vault/audit_request_header.py +277 -0
- pulumi_vault/auth_backend.py +565 -0
- pulumi_vault/aws/__init__.py +22 -0
- pulumi_vault/aws/auth_backend_cert.py +420 -0
- pulumi_vault/aws/auth_backend_client.py +1259 -0
- pulumi_vault/aws/auth_backend_config_identity.py +494 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
- pulumi_vault/aws/auth_backend_login.py +1046 -0
- pulumi_vault/aws/auth_backend_role.py +1961 -0
- pulumi_vault/aws/auth_backend_role_tag.py +638 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
- pulumi_vault/aws/auth_backend_sts_role.py +414 -0
- pulumi_vault/aws/get_access_credentials.py +369 -0
- pulumi_vault/aws/get_static_access_credentials.py +137 -0
- pulumi_vault/aws/secret_backend.py +2018 -0
- pulumi_vault/aws/secret_backend_role.py +1188 -0
- pulumi_vault/aws/secret_backend_static_role.py +639 -0
- pulumi_vault/azure/__init__.py +15 -0
- pulumi_vault/azure/_inputs.py +108 -0
- pulumi_vault/azure/auth_backend_config.py +1096 -0
- pulumi_vault/azure/auth_backend_role.py +1176 -0
- pulumi_vault/azure/backend.py +1793 -0
- pulumi_vault/azure/backend_role.py +883 -0
- pulumi_vault/azure/get_access_credentials.py +400 -0
- pulumi_vault/azure/outputs.py +107 -0
- pulumi_vault/cert_auth_backend_role.py +1539 -0
- pulumi_vault/config/__init__.py +9 -0
- pulumi_vault/config/__init__.pyi +164 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +1225 -0
- pulumi_vault/config/ui_custom_message.py +530 -0
- pulumi_vault/config/vars.py +230 -0
- pulumi_vault/consul/__init__.py +10 -0
- pulumi_vault/consul/secret_backend.py +1517 -0
- pulumi_vault/consul/secret_backend_role.py +847 -0
- pulumi_vault/database/__init__.py +14 -0
- pulumi_vault/database/_inputs.py +11907 -0
- pulumi_vault/database/outputs.py +8496 -0
- pulumi_vault/database/secret_backend_connection.py +1676 -0
- pulumi_vault/database/secret_backend_role.py +840 -0
- pulumi_vault/database/secret_backend_static_role.py +881 -0
- pulumi_vault/database/secrets_mount.py +2160 -0
- pulumi_vault/egp_policy.py +399 -0
- pulumi_vault/gcp/__init__.py +17 -0
- pulumi_vault/gcp/_inputs.py +441 -0
- pulumi_vault/gcp/auth_backend.py +1486 -0
- pulumi_vault/gcp/auth_backend_role.py +1235 -0
- pulumi_vault/gcp/get_auth_backend_role.py +514 -0
- pulumi_vault/gcp/outputs.py +302 -0
- pulumi_vault/gcp/secret_backend.py +1807 -0
- pulumi_vault/gcp/secret_impersonated_account.py +484 -0
- pulumi_vault/gcp/secret_roleset.py +554 -0
- pulumi_vault/gcp/secret_static_account.py +557 -0
- pulumi_vault/generic/__init__.py +11 -0
- pulumi_vault/generic/endpoint.py +786 -0
- pulumi_vault/generic/get_secret.py +306 -0
- pulumi_vault/generic/secret.py +486 -0
- pulumi_vault/get_auth_backend.py +226 -0
- pulumi_vault/get_auth_backends.py +170 -0
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +202 -0
- pulumi_vault/get_nomad_access_token.py +210 -0
- pulumi_vault/get_policy_document.py +160 -0
- pulumi_vault/get_raft_autopilot_state.py +267 -0
- pulumi_vault/github/__init__.py +13 -0
- pulumi_vault/github/_inputs.py +225 -0
- pulumi_vault/github/auth_backend.py +1194 -0
- pulumi_vault/github/outputs.py +174 -0
- pulumi_vault/github/team.py +380 -0
- pulumi_vault/github/user.py +380 -0
- pulumi_vault/identity/__init__.py +35 -0
- pulumi_vault/identity/entity.py +447 -0
- pulumi_vault/identity/entity_alias.py +398 -0
- pulumi_vault/identity/entity_policies.py +455 -0
- pulumi_vault/identity/get_entity.py +384 -0
- pulumi_vault/identity/get_group.py +467 -0
- pulumi_vault/identity/get_oidc_client_creds.py +175 -0
- pulumi_vault/identity/get_oidc_openid_config.py +334 -0
- pulumi_vault/identity/get_oidc_public_keys.py +179 -0
- pulumi_vault/identity/group.py +805 -0
- pulumi_vault/identity/group_alias.py +386 -0
- pulumi_vault/identity/group_member_entity_ids.py +444 -0
- pulumi_vault/identity/group_member_group_ids.py +467 -0
- pulumi_vault/identity/group_policies.py +471 -0
- pulumi_vault/identity/mfa_duo.py +674 -0
- pulumi_vault/identity/mfa_login_enforcement.py +566 -0
- pulumi_vault/identity/mfa_okta.py +626 -0
- pulumi_vault/identity/mfa_pingid.py +616 -0
- pulumi_vault/identity/mfa_totp.py +758 -0
- pulumi_vault/identity/oidc.py +268 -0
- pulumi_vault/identity/oidc_assignment.py +375 -0
- pulumi_vault/identity/oidc_client.py +667 -0
- pulumi_vault/identity/oidc_key.py +474 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
- pulumi_vault/identity/oidc_provider.py +550 -0
- pulumi_vault/identity/oidc_role.py +543 -0
- pulumi_vault/identity/oidc_scope.py +355 -0
- pulumi_vault/identity/outputs.py +137 -0
- pulumi_vault/jwt/__init__.py +12 -0
- pulumi_vault/jwt/_inputs.py +225 -0
- pulumi_vault/jwt/auth_backend.py +1347 -0
- pulumi_vault/jwt/auth_backend_role.py +1847 -0
- pulumi_vault/jwt/outputs.py +174 -0
- pulumi_vault/kmip/__init__.py +11 -0
- pulumi_vault/kmip/secret_backend.py +1591 -0
- pulumi_vault/kmip/secret_role.py +1194 -0
- pulumi_vault/kmip/secret_scope.py +372 -0
- pulumi_vault/kubernetes/__init__.py +15 -0
- pulumi_vault/kubernetes/auth_backend_config.py +654 -0
- pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
- pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
- pulumi_vault/kubernetes/get_service_account_token.py +344 -0
- pulumi_vault/kubernetes/secret_backend.py +1341 -0
- pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
- pulumi_vault/kv/__init__.py +18 -0
- pulumi_vault/kv/_inputs.py +124 -0
- pulumi_vault/kv/get_secret.py +240 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
- pulumi_vault/kv/get_secret_v2.py +315 -0
- pulumi_vault/kv/get_secrets_list.py +186 -0
- pulumi_vault/kv/get_secrets_list_v2.py +243 -0
- pulumi_vault/kv/outputs.py +102 -0
- pulumi_vault/kv/secret.py +397 -0
- pulumi_vault/kv/secret_backend_v2.py +455 -0
- pulumi_vault/kv/secret_v2.py +970 -0
- pulumi_vault/ldap/__init__.py +19 -0
- pulumi_vault/ldap/_inputs.py +225 -0
- pulumi_vault/ldap/auth_backend.py +2520 -0
- pulumi_vault/ldap/auth_backend_group.py +386 -0
- pulumi_vault/ldap/auth_backend_user.py +439 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
- pulumi_vault/ldap/get_static_credentials.py +192 -0
- pulumi_vault/ldap/outputs.py +174 -0
- pulumi_vault/ldap/secret_backend.py +2207 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
- pulumi_vault/ldap/secret_backend_library_set.py +552 -0
- pulumi_vault/ldap/secret_backend_static_role.py +541 -0
- pulumi_vault/managed/__init__.py +11 -0
- pulumi_vault/managed/_inputs.py +944 -0
- pulumi_vault/managed/keys.py +398 -0
- pulumi_vault/managed/outputs.py +667 -0
- pulumi_vault/mfa_duo.py +589 -0
- pulumi_vault/mfa_okta.py +623 -0
- pulumi_vault/mfa_pingid.py +670 -0
- pulumi_vault/mfa_totp.py +620 -0
- pulumi_vault/mongodbatlas/__init__.py +10 -0
- pulumi_vault/mongodbatlas/secret_backend.py +388 -0
- pulumi_vault/mongodbatlas/secret_role.py +726 -0
- pulumi_vault/mount.py +1262 -0
- pulumi_vault/namespace.py +452 -0
- pulumi_vault/nomad_secret_backend.py +1559 -0
- pulumi_vault/nomad_secret_role.py +489 -0
- pulumi_vault/oci_auth_backend.py +676 -0
- pulumi_vault/oci_auth_backend_role.py +852 -0
- pulumi_vault/okta/__init__.py +13 -0
- pulumi_vault/okta/_inputs.py +320 -0
- pulumi_vault/okta/auth_backend.py +1231 -0
- pulumi_vault/okta/auth_backend_group.py +369 -0
- pulumi_vault/okta/auth_backend_user.py +416 -0
- pulumi_vault/okta/outputs.py +244 -0
- pulumi_vault/outputs.py +502 -0
- pulumi_vault/pkisecret/__init__.py +38 -0
- pulumi_vault/pkisecret/_inputs.py +270 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
- pulumi_vault/pkisecret/backend_config_acme.py +690 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
- pulumi_vault/pkisecret/backend_config_est.py +756 -0
- pulumi_vault/pkisecret/backend_config_scep.py +738 -0
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
- pulumi_vault/pkisecret/get_backend_key.py +211 -0
- pulumi_vault/pkisecret/get_backend_keys.py +192 -0
- pulumi_vault/pkisecret/outputs.py +270 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
- pulumi_vault/pkisecret/secret_backend_key.py +613 -0
- pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
- pulumi_vault/plugin.py +596 -0
- pulumi_vault/plugin_pinned_version.py +299 -0
- pulumi_vault/policy.py +279 -0
- pulumi_vault/provider.py +781 -0
- pulumi_vault/pulumi-plugin.json +5 -0
- pulumi_vault/py.typed +0 -0
- pulumi_vault/quota_lease_count.py +504 -0
- pulumi_vault/quota_rate_limit.py +751 -0
- pulumi_vault/rabbitmq/__init__.py +12 -0
- pulumi_vault/rabbitmq/_inputs.py +235 -0
- pulumi_vault/rabbitmq/outputs.py +144 -0
- pulumi_vault/rabbitmq/secret_backend.py +1437 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
- pulumi_vault/raft_autopilot.py +609 -0
- pulumi_vault/raft_snapshot_agent_config.py +1591 -0
- pulumi_vault/rgp_policy.py +349 -0
- pulumi_vault/saml/__init__.py +12 -0
- pulumi_vault/saml/_inputs.py +225 -0
- pulumi_vault/saml/auth_backend.py +811 -0
- pulumi_vault/saml/auth_backend_role.py +1068 -0
- pulumi_vault/saml/outputs.py +174 -0
- pulumi_vault/scep_auth_backend_role.py +908 -0
- pulumi_vault/secrets/__init__.py +18 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +450 -0
- pulumi_vault/secrets/sync_aws_destination.py +780 -0
- pulumi_vault/secrets/sync_azure_destination.py +736 -0
- pulumi_vault/secrets/sync_config.py +303 -0
- pulumi_vault/secrets/sync_gcp_destination.py +572 -0
- pulumi_vault/secrets/sync_gh_destination.py +688 -0
- pulumi_vault/secrets/sync_github_apps.py +376 -0
- pulumi_vault/secrets/sync_vercel_destination.py +603 -0
- pulumi_vault/ssh/__init__.py +13 -0
- pulumi_vault/ssh/_inputs.py +76 -0
- pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
- pulumi_vault/ssh/outputs.py +51 -0
- pulumi_vault/ssh/secret_backend_ca.py +588 -0
- pulumi_vault/ssh/secret_backend_role.py +1493 -0
- pulumi_vault/terraformcloud/__init__.py +11 -0
- pulumi_vault/terraformcloud/secret_backend.py +1321 -0
- pulumi_vault/terraformcloud/secret_creds.py +445 -0
- pulumi_vault/terraformcloud/secret_role.py +563 -0
- pulumi_vault/token.py +1026 -0
- pulumi_vault/tokenauth/__init__.py +9 -0
- pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
- pulumi_vault/transform/__init__.py +14 -0
- pulumi_vault/transform/alphabet.py +348 -0
- pulumi_vault/transform/get_decode.py +287 -0
- pulumi_vault/transform/get_encode.py +291 -0
- pulumi_vault/transform/role.py +350 -0
- pulumi_vault/transform/template.py +592 -0
- pulumi_vault/transform/transformation.py +608 -0
- pulumi_vault/transit/__init__.py +15 -0
- pulumi_vault/transit/get_cmac.py +256 -0
- pulumi_vault/transit/get_decrypt.py +181 -0
- pulumi_vault/transit/get_encrypt.py +174 -0
- pulumi_vault/transit/get_sign.py +328 -0
- pulumi_vault/transit/get_verify.py +373 -0
- pulumi_vault/transit/secret_backend_key.py +1202 -0
- pulumi_vault/transit/secret_cache_config.py +302 -0
- pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
- pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
- pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
- pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,369 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
|
|
17
|
+
__all__ = [
|
|
18
|
+
'GetAccessCredentialsResult',
|
|
19
|
+
'AwaitableGetAccessCredentialsResult',
|
|
20
|
+
'get_access_credentials',
|
|
21
|
+
'get_access_credentials_output',
|
|
22
|
+
]
|
|
23
|
+
|
|
24
|
+
@pulumi.output_type
|
|
25
|
+
class GetAccessCredentialsResult:
|
|
26
|
+
"""
|
|
27
|
+
A collection of values returned by getAccessCredentials.
|
|
28
|
+
"""
|
|
29
|
+
def __init__(__self__, access_key=None, backend=None, id=None, lease_duration=None, lease_id=None, lease_renewable=None, lease_start_time=None, namespace=None, region=None, role=None, role_arn=None, secret_key=None, security_token=None, ttl=None, type=None):
|
|
30
|
+
if access_key and not isinstance(access_key, str):
|
|
31
|
+
raise TypeError("Expected argument 'access_key' to be a str")
|
|
32
|
+
pulumi.set(__self__, "access_key", access_key)
|
|
33
|
+
if backend and not isinstance(backend, str):
|
|
34
|
+
raise TypeError("Expected argument 'backend' to be a str")
|
|
35
|
+
pulumi.set(__self__, "backend", backend)
|
|
36
|
+
if id and not isinstance(id, str):
|
|
37
|
+
raise TypeError("Expected argument 'id' to be a str")
|
|
38
|
+
pulumi.set(__self__, "id", id)
|
|
39
|
+
if lease_duration and not isinstance(lease_duration, int):
|
|
40
|
+
raise TypeError("Expected argument 'lease_duration' to be a int")
|
|
41
|
+
pulumi.set(__self__, "lease_duration", lease_duration)
|
|
42
|
+
if lease_id and not isinstance(lease_id, str):
|
|
43
|
+
raise TypeError("Expected argument 'lease_id' to be a str")
|
|
44
|
+
pulumi.set(__self__, "lease_id", lease_id)
|
|
45
|
+
if lease_renewable and not isinstance(lease_renewable, bool):
|
|
46
|
+
raise TypeError("Expected argument 'lease_renewable' to be a bool")
|
|
47
|
+
pulumi.set(__self__, "lease_renewable", lease_renewable)
|
|
48
|
+
if lease_start_time and not isinstance(lease_start_time, str):
|
|
49
|
+
raise TypeError("Expected argument 'lease_start_time' to be a str")
|
|
50
|
+
pulumi.set(__self__, "lease_start_time", lease_start_time)
|
|
51
|
+
if namespace and not isinstance(namespace, str):
|
|
52
|
+
raise TypeError("Expected argument 'namespace' to be a str")
|
|
53
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
54
|
+
if region and not isinstance(region, str):
|
|
55
|
+
raise TypeError("Expected argument 'region' to be a str")
|
|
56
|
+
pulumi.set(__self__, "region", region)
|
|
57
|
+
if role and not isinstance(role, str):
|
|
58
|
+
raise TypeError("Expected argument 'role' to be a str")
|
|
59
|
+
pulumi.set(__self__, "role", role)
|
|
60
|
+
if role_arn and not isinstance(role_arn, str):
|
|
61
|
+
raise TypeError("Expected argument 'role_arn' to be a str")
|
|
62
|
+
pulumi.set(__self__, "role_arn", role_arn)
|
|
63
|
+
if secret_key and not isinstance(secret_key, str):
|
|
64
|
+
raise TypeError("Expected argument 'secret_key' to be a str")
|
|
65
|
+
pulumi.set(__self__, "secret_key", secret_key)
|
|
66
|
+
if security_token and not isinstance(security_token, str):
|
|
67
|
+
raise TypeError("Expected argument 'security_token' to be a str")
|
|
68
|
+
pulumi.set(__self__, "security_token", security_token)
|
|
69
|
+
if ttl and not isinstance(ttl, str):
|
|
70
|
+
raise TypeError("Expected argument 'ttl' to be a str")
|
|
71
|
+
pulumi.set(__self__, "ttl", ttl)
|
|
72
|
+
if type and not isinstance(type, str):
|
|
73
|
+
raise TypeError("Expected argument 'type' to be a str")
|
|
74
|
+
pulumi.set(__self__, "type", type)
|
|
75
|
+
|
|
76
|
+
@_builtins.property
|
|
77
|
+
@pulumi.getter(name="accessKey")
|
|
78
|
+
def access_key(self) -> _builtins.str:
|
|
79
|
+
"""
|
|
80
|
+
The AWS Access Key ID returned by Vault.
|
|
81
|
+
"""
|
|
82
|
+
return pulumi.get(self, "access_key")
|
|
83
|
+
|
|
84
|
+
@_builtins.property
|
|
85
|
+
@pulumi.getter
|
|
86
|
+
def backend(self) -> _builtins.str:
|
|
87
|
+
return pulumi.get(self, "backend")
|
|
88
|
+
|
|
89
|
+
@_builtins.property
|
|
90
|
+
@pulumi.getter
|
|
91
|
+
def id(self) -> _builtins.str:
|
|
92
|
+
"""
|
|
93
|
+
The provider-assigned unique ID for this managed resource.
|
|
94
|
+
"""
|
|
95
|
+
return pulumi.get(self, "id")
|
|
96
|
+
|
|
97
|
+
@_builtins.property
|
|
98
|
+
@pulumi.getter(name="leaseDuration")
|
|
99
|
+
def lease_duration(self) -> _builtins.int:
|
|
100
|
+
"""
|
|
101
|
+
The duration of the secret lease, in seconds relative
|
|
102
|
+
to the time the data was requested. Once this time has passed any plan
|
|
103
|
+
generated with this data may fail to apply.
|
|
104
|
+
"""
|
|
105
|
+
return pulumi.get(self, "lease_duration")
|
|
106
|
+
|
|
107
|
+
@_builtins.property
|
|
108
|
+
@pulumi.getter(name="leaseId")
|
|
109
|
+
def lease_id(self) -> _builtins.str:
|
|
110
|
+
"""
|
|
111
|
+
The lease identifier assigned by Vault.
|
|
112
|
+
"""
|
|
113
|
+
return pulumi.get(self, "lease_id")
|
|
114
|
+
|
|
115
|
+
@_builtins.property
|
|
116
|
+
@pulumi.getter(name="leaseRenewable")
|
|
117
|
+
def lease_renewable(self) -> _builtins.bool:
|
|
118
|
+
return pulumi.get(self, "lease_renewable")
|
|
119
|
+
|
|
120
|
+
@_builtins.property
|
|
121
|
+
@pulumi.getter(name="leaseStartTime")
|
|
122
|
+
def lease_start_time(self) -> _builtins.str:
|
|
123
|
+
return pulumi.get(self, "lease_start_time")
|
|
124
|
+
|
|
125
|
+
@_builtins.property
|
|
126
|
+
@pulumi.getter
|
|
127
|
+
def namespace(self) -> Optional[_builtins.str]:
|
|
128
|
+
return pulumi.get(self, "namespace")
|
|
129
|
+
|
|
130
|
+
@_builtins.property
|
|
131
|
+
@pulumi.getter
|
|
132
|
+
def region(self) -> Optional[_builtins.str]:
|
|
133
|
+
return pulumi.get(self, "region")
|
|
134
|
+
|
|
135
|
+
@_builtins.property
|
|
136
|
+
@pulumi.getter
|
|
137
|
+
def role(self) -> _builtins.str:
|
|
138
|
+
return pulumi.get(self, "role")
|
|
139
|
+
|
|
140
|
+
@_builtins.property
|
|
141
|
+
@pulumi.getter(name="roleArn")
|
|
142
|
+
def role_arn(self) -> Optional[_builtins.str]:
|
|
143
|
+
return pulumi.get(self, "role_arn")
|
|
144
|
+
|
|
145
|
+
@_builtins.property
|
|
146
|
+
@pulumi.getter(name="secretKey")
|
|
147
|
+
def secret_key(self) -> _builtins.str:
|
|
148
|
+
"""
|
|
149
|
+
The AWS Secret Key returned by Vault.
|
|
150
|
+
"""
|
|
151
|
+
return pulumi.get(self, "secret_key")
|
|
152
|
+
|
|
153
|
+
@_builtins.property
|
|
154
|
+
@pulumi.getter(name="securityToken")
|
|
155
|
+
def security_token(self) -> _builtins.str:
|
|
156
|
+
"""
|
|
157
|
+
The STS token returned by Vault, if any.
|
|
158
|
+
"""
|
|
159
|
+
return pulumi.get(self, "security_token")
|
|
160
|
+
|
|
161
|
+
@_builtins.property
|
|
162
|
+
@pulumi.getter
|
|
163
|
+
def ttl(self) -> Optional[_builtins.str]:
|
|
164
|
+
return pulumi.get(self, "ttl")
|
|
165
|
+
|
|
166
|
+
@_builtins.property
|
|
167
|
+
@pulumi.getter
|
|
168
|
+
def type(self) -> Optional[_builtins.str]:
|
|
169
|
+
return pulumi.get(self, "type")
|
|
170
|
+
|
|
171
|
+
|
|
172
|
+
class AwaitableGetAccessCredentialsResult(GetAccessCredentialsResult):
|
|
173
|
+
# pylint: disable=using-constant-test
|
|
174
|
+
def __await__(self):
|
|
175
|
+
if False:
|
|
176
|
+
yield self
|
|
177
|
+
return GetAccessCredentialsResult(
|
|
178
|
+
access_key=self.access_key,
|
|
179
|
+
backend=self.backend,
|
|
180
|
+
id=self.id,
|
|
181
|
+
lease_duration=self.lease_duration,
|
|
182
|
+
lease_id=self.lease_id,
|
|
183
|
+
lease_renewable=self.lease_renewable,
|
|
184
|
+
lease_start_time=self.lease_start_time,
|
|
185
|
+
namespace=self.namespace,
|
|
186
|
+
region=self.region,
|
|
187
|
+
role=self.role,
|
|
188
|
+
role_arn=self.role_arn,
|
|
189
|
+
secret_key=self.secret_key,
|
|
190
|
+
security_token=self.security_token,
|
|
191
|
+
ttl=self.ttl,
|
|
192
|
+
type=self.type)
|
|
193
|
+
|
|
194
|
+
|
|
195
|
+
def get_access_credentials(backend: Optional[_builtins.str] = None,
|
|
196
|
+
namespace: Optional[_builtins.str] = None,
|
|
197
|
+
region: Optional[_builtins.str] = None,
|
|
198
|
+
role: Optional[_builtins.str] = None,
|
|
199
|
+
role_arn: Optional[_builtins.str] = None,
|
|
200
|
+
ttl: Optional[_builtins.str] = None,
|
|
201
|
+
type: Optional[_builtins.str] = None,
|
|
202
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetAccessCredentialsResult:
|
|
203
|
+
"""
|
|
204
|
+
## Example Usage
|
|
205
|
+
|
|
206
|
+
```python
|
|
207
|
+
import pulumi
|
|
208
|
+
import pulumi_vault as vault
|
|
209
|
+
|
|
210
|
+
aws = vault.aws.SecretBackend("aws",
|
|
211
|
+
access_key="AKIA.....",
|
|
212
|
+
secret_key="SECRETKEYFROMAWS")
|
|
213
|
+
role = vault.aws.SecretBackendRole("role",
|
|
214
|
+
backend=aws.path,
|
|
215
|
+
name="test",
|
|
216
|
+
policy=\"\"\"{
|
|
217
|
+
\\"Version\\": \\"2012-10-17\\",
|
|
218
|
+
\\"Statement\\": [
|
|
219
|
+
{
|
|
220
|
+
\\"Effect\\": \\"Allow\\",
|
|
221
|
+
\\"Action\\": \\"iam:*\\",
|
|
222
|
+
\\"Resource\\": \\"*\\"
|
|
223
|
+
}
|
|
224
|
+
]
|
|
225
|
+
}
|
|
226
|
+
\"\"\")
|
|
227
|
+
# generally, these blocks would be in a different module
|
|
228
|
+
creds = pulumi.Output.all(
|
|
229
|
+
path=aws.path,
|
|
230
|
+
name=role.name
|
|
231
|
+
).apply(lambda resolved_outputs: vault.aws.get_access_credentials_output(backend=resolved_outputs['path'],
|
|
232
|
+
role=resolved_outputs['name']))
|
|
233
|
+
```
|
|
234
|
+
|
|
235
|
+
|
|
236
|
+
:param _builtins.str backend: The path to the AWS secret backend to
|
|
237
|
+
read credentials from, with no leading or trailing `/`s.
|
|
238
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
|
239
|
+
The value should not contain leading or trailing forward slashes.
|
|
240
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
241
|
+
*Available only for Vault Enterprise*.
|
|
242
|
+
:param _builtins.str region: The region the read credentials belong to.
|
|
243
|
+
:param _builtins.str role: The name of the AWS secret backend role to read
|
|
244
|
+
credentials from, with no leading or trailing `/`s.
|
|
245
|
+
:param _builtins.str role_arn: The specific AWS ARN to use
|
|
246
|
+
from the configured role. If the role does not have multiple ARNs, this does
|
|
247
|
+
not need to be specified.
|
|
248
|
+
:param _builtins.str ttl: Specifies the TTL for the use of the STS token. This
|
|
249
|
+
is specified as a string with a duration suffix. Valid only when
|
|
250
|
+
`credential_type` of the connected `aws.SecretBackendRole` resource is `assumed_role` or `federation_token`
|
|
251
|
+
:param _builtins.str type: The type of credentials to read. Defaults
|
|
252
|
+
to `"creds"`, which just returns an AWS Access Key ID and Secret
|
|
253
|
+
Key. Can also be set to `"sts"`, which will return a security token
|
|
254
|
+
in addition to the keys.
|
|
255
|
+
"""
|
|
256
|
+
__args__ = dict()
|
|
257
|
+
__args__['backend'] = backend
|
|
258
|
+
__args__['namespace'] = namespace
|
|
259
|
+
__args__['region'] = region
|
|
260
|
+
__args__['role'] = role
|
|
261
|
+
__args__['roleArn'] = role_arn
|
|
262
|
+
__args__['ttl'] = ttl
|
|
263
|
+
__args__['type'] = type
|
|
264
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
|
265
|
+
__ret__ = pulumi.runtime.invoke('vault:aws/getAccessCredentials:getAccessCredentials', __args__, opts=opts, typ=GetAccessCredentialsResult).value
|
|
266
|
+
|
|
267
|
+
return AwaitableGetAccessCredentialsResult(
|
|
268
|
+
access_key=pulumi.get(__ret__, 'access_key'),
|
|
269
|
+
backend=pulumi.get(__ret__, 'backend'),
|
|
270
|
+
id=pulumi.get(__ret__, 'id'),
|
|
271
|
+
lease_duration=pulumi.get(__ret__, 'lease_duration'),
|
|
272
|
+
lease_id=pulumi.get(__ret__, 'lease_id'),
|
|
273
|
+
lease_renewable=pulumi.get(__ret__, 'lease_renewable'),
|
|
274
|
+
lease_start_time=pulumi.get(__ret__, 'lease_start_time'),
|
|
275
|
+
namespace=pulumi.get(__ret__, 'namespace'),
|
|
276
|
+
region=pulumi.get(__ret__, 'region'),
|
|
277
|
+
role=pulumi.get(__ret__, 'role'),
|
|
278
|
+
role_arn=pulumi.get(__ret__, 'role_arn'),
|
|
279
|
+
secret_key=pulumi.get(__ret__, 'secret_key'),
|
|
280
|
+
security_token=pulumi.get(__ret__, 'security_token'),
|
|
281
|
+
ttl=pulumi.get(__ret__, 'ttl'),
|
|
282
|
+
type=pulumi.get(__ret__, 'type'))
|
|
283
|
+
def get_access_credentials_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
284
|
+
namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
|
285
|
+
region: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
|
286
|
+
role: Optional[pulumi.Input[_builtins.str]] = None,
|
|
287
|
+
role_arn: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
|
288
|
+
ttl: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
|
289
|
+
type: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
|
290
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAccessCredentialsResult]:
|
|
291
|
+
"""
|
|
292
|
+
## Example Usage
|
|
293
|
+
|
|
294
|
+
```python
|
|
295
|
+
import pulumi
|
|
296
|
+
import pulumi_vault as vault
|
|
297
|
+
|
|
298
|
+
aws = vault.aws.SecretBackend("aws",
|
|
299
|
+
access_key="AKIA.....",
|
|
300
|
+
secret_key="SECRETKEYFROMAWS")
|
|
301
|
+
role = vault.aws.SecretBackendRole("role",
|
|
302
|
+
backend=aws.path,
|
|
303
|
+
name="test",
|
|
304
|
+
policy=\"\"\"{
|
|
305
|
+
\\"Version\\": \\"2012-10-17\\",
|
|
306
|
+
\\"Statement\\": [
|
|
307
|
+
{
|
|
308
|
+
\\"Effect\\": \\"Allow\\",
|
|
309
|
+
\\"Action\\": \\"iam:*\\",
|
|
310
|
+
\\"Resource\\": \\"*\\"
|
|
311
|
+
}
|
|
312
|
+
]
|
|
313
|
+
}
|
|
314
|
+
\"\"\")
|
|
315
|
+
# generally, these blocks would be in a different module
|
|
316
|
+
creds = pulumi.Output.all(
|
|
317
|
+
path=aws.path,
|
|
318
|
+
name=role.name
|
|
319
|
+
).apply(lambda resolved_outputs: vault.aws.get_access_credentials_output(backend=resolved_outputs['path'],
|
|
320
|
+
role=resolved_outputs['name']))
|
|
321
|
+
```
|
|
322
|
+
|
|
323
|
+
|
|
324
|
+
:param _builtins.str backend: The path to the AWS secret backend to
|
|
325
|
+
read credentials from, with no leading or trailing `/`s.
|
|
326
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
|
327
|
+
The value should not contain leading or trailing forward slashes.
|
|
328
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
329
|
+
*Available only for Vault Enterprise*.
|
|
330
|
+
:param _builtins.str region: The region the read credentials belong to.
|
|
331
|
+
:param _builtins.str role: The name of the AWS secret backend role to read
|
|
332
|
+
credentials from, with no leading or trailing `/`s.
|
|
333
|
+
:param _builtins.str role_arn: The specific AWS ARN to use
|
|
334
|
+
from the configured role. If the role does not have multiple ARNs, this does
|
|
335
|
+
not need to be specified.
|
|
336
|
+
:param _builtins.str ttl: Specifies the TTL for the use of the STS token. This
|
|
337
|
+
is specified as a string with a duration suffix. Valid only when
|
|
338
|
+
`credential_type` of the connected `aws.SecretBackendRole` resource is `assumed_role` or `federation_token`
|
|
339
|
+
:param _builtins.str type: The type of credentials to read. Defaults
|
|
340
|
+
to `"creds"`, which just returns an AWS Access Key ID and Secret
|
|
341
|
+
Key. Can also be set to `"sts"`, which will return a security token
|
|
342
|
+
in addition to the keys.
|
|
343
|
+
"""
|
|
344
|
+
__args__ = dict()
|
|
345
|
+
__args__['backend'] = backend
|
|
346
|
+
__args__['namespace'] = namespace
|
|
347
|
+
__args__['region'] = region
|
|
348
|
+
__args__['role'] = role
|
|
349
|
+
__args__['roleArn'] = role_arn
|
|
350
|
+
__args__['ttl'] = ttl
|
|
351
|
+
__args__['type'] = type
|
|
352
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
|
353
|
+
__ret__ = pulumi.runtime.invoke_output('vault:aws/getAccessCredentials:getAccessCredentials', __args__, opts=opts, typ=GetAccessCredentialsResult)
|
|
354
|
+
return __ret__.apply(lambda __response__: GetAccessCredentialsResult(
|
|
355
|
+
access_key=pulumi.get(__response__, 'access_key'),
|
|
356
|
+
backend=pulumi.get(__response__, 'backend'),
|
|
357
|
+
id=pulumi.get(__response__, 'id'),
|
|
358
|
+
lease_duration=pulumi.get(__response__, 'lease_duration'),
|
|
359
|
+
lease_id=pulumi.get(__response__, 'lease_id'),
|
|
360
|
+
lease_renewable=pulumi.get(__response__, 'lease_renewable'),
|
|
361
|
+
lease_start_time=pulumi.get(__response__, 'lease_start_time'),
|
|
362
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
|
363
|
+
region=pulumi.get(__response__, 'region'),
|
|
364
|
+
role=pulumi.get(__response__, 'role'),
|
|
365
|
+
role_arn=pulumi.get(__response__, 'role_arn'),
|
|
366
|
+
secret_key=pulumi.get(__response__, 'secret_key'),
|
|
367
|
+
security_token=pulumi.get(__response__, 'security_token'),
|
|
368
|
+
ttl=pulumi.get(__response__, 'ttl'),
|
|
369
|
+
type=pulumi.get(__response__, 'type')))
|
|
@@ -0,0 +1,137 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
|
|
17
|
+
__all__ = [
|
|
18
|
+
'GetStaticAccessCredentialsResult',
|
|
19
|
+
'AwaitableGetStaticAccessCredentialsResult',
|
|
20
|
+
'get_static_access_credentials',
|
|
21
|
+
'get_static_access_credentials_output',
|
|
22
|
+
]
|
|
23
|
+
|
|
24
|
+
@pulumi.output_type
|
|
25
|
+
class GetStaticAccessCredentialsResult:
|
|
26
|
+
"""
|
|
27
|
+
A collection of values returned by getStaticAccessCredentials.
|
|
28
|
+
"""
|
|
29
|
+
def __init__(__self__, access_key=None, backend=None, id=None, name=None, namespace=None, secret_key=None):
|
|
30
|
+
if access_key and not isinstance(access_key, str):
|
|
31
|
+
raise TypeError("Expected argument 'access_key' to be a str")
|
|
32
|
+
pulumi.set(__self__, "access_key", access_key)
|
|
33
|
+
if backend and not isinstance(backend, str):
|
|
34
|
+
raise TypeError("Expected argument 'backend' to be a str")
|
|
35
|
+
pulumi.set(__self__, "backend", backend)
|
|
36
|
+
if id and not isinstance(id, str):
|
|
37
|
+
raise TypeError("Expected argument 'id' to be a str")
|
|
38
|
+
pulumi.set(__self__, "id", id)
|
|
39
|
+
if name and not isinstance(name, str):
|
|
40
|
+
raise TypeError("Expected argument 'name' to be a str")
|
|
41
|
+
pulumi.set(__self__, "name", name)
|
|
42
|
+
if namespace and not isinstance(namespace, str):
|
|
43
|
+
raise TypeError("Expected argument 'namespace' to be a str")
|
|
44
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
45
|
+
if secret_key and not isinstance(secret_key, str):
|
|
46
|
+
raise TypeError("Expected argument 'secret_key' to be a str")
|
|
47
|
+
pulumi.set(__self__, "secret_key", secret_key)
|
|
48
|
+
|
|
49
|
+
@_builtins.property
|
|
50
|
+
@pulumi.getter(name="accessKey")
|
|
51
|
+
def access_key(self) -> _builtins.str:
|
|
52
|
+
return pulumi.get(self, "access_key")
|
|
53
|
+
|
|
54
|
+
@_builtins.property
|
|
55
|
+
@pulumi.getter
|
|
56
|
+
def backend(self) -> _builtins.str:
|
|
57
|
+
return pulumi.get(self, "backend")
|
|
58
|
+
|
|
59
|
+
@_builtins.property
|
|
60
|
+
@pulumi.getter
|
|
61
|
+
def id(self) -> _builtins.str:
|
|
62
|
+
"""
|
|
63
|
+
The provider-assigned unique ID for this managed resource.
|
|
64
|
+
"""
|
|
65
|
+
return pulumi.get(self, "id")
|
|
66
|
+
|
|
67
|
+
@_builtins.property
|
|
68
|
+
@pulumi.getter
|
|
69
|
+
def name(self) -> _builtins.str:
|
|
70
|
+
return pulumi.get(self, "name")
|
|
71
|
+
|
|
72
|
+
@_builtins.property
|
|
73
|
+
@pulumi.getter
|
|
74
|
+
def namespace(self) -> Optional[_builtins.str]:
|
|
75
|
+
return pulumi.get(self, "namespace")
|
|
76
|
+
|
|
77
|
+
@_builtins.property
|
|
78
|
+
@pulumi.getter(name="secretKey")
|
|
79
|
+
def secret_key(self) -> _builtins.str:
|
|
80
|
+
return pulumi.get(self, "secret_key")
|
|
81
|
+
|
|
82
|
+
|
|
83
|
+
class AwaitableGetStaticAccessCredentialsResult(GetStaticAccessCredentialsResult):
|
|
84
|
+
# pylint: disable=using-constant-test
|
|
85
|
+
def __await__(self):
|
|
86
|
+
if False:
|
|
87
|
+
yield self
|
|
88
|
+
return GetStaticAccessCredentialsResult(
|
|
89
|
+
access_key=self.access_key,
|
|
90
|
+
backend=self.backend,
|
|
91
|
+
id=self.id,
|
|
92
|
+
name=self.name,
|
|
93
|
+
namespace=self.namespace,
|
|
94
|
+
secret_key=self.secret_key)
|
|
95
|
+
|
|
96
|
+
|
|
97
|
+
def get_static_access_credentials(backend: Optional[_builtins.str] = None,
|
|
98
|
+
name: Optional[_builtins.str] = None,
|
|
99
|
+
namespace: Optional[_builtins.str] = None,
|
|
100
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetStaticAccessCredentialsResult:
|
|
101
|
+
"""
|
|
102
|
+
Use this data source to access information about an existing resource.
|
|
103
|
+
"""
|
|
104
|
+
__args__ = dict()
|
|
105
|
+
__args__['backend'] = backend
|
|
106
|
+
__args__['name'] = name
|
|
107
|
+
__args__['namespace'] = namespace
|
|
108
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
|
109
|
+
__ret__ = pulumi.runtime.invoke('vault:aws/getStaticAccessCredentials:getStaticAccessCredentials', __args__, opts=opts, typ=GetStaticAccessCredentialsResult).value
|
|
110
|
+
|
|
111
|
+
return AwaitableGetStaticAccessCredentialsResult(
|
|
112
|
+
access_key=pulumi.get(__ret__, 'access_key'),
|
|
113
|
+
backend=pulumi.get(__ret__, 'backend'),
|
|
114
|
+
id=pulumi.get(__ret__, 'id'),
|
|
115
|
+
name=pulumi.get(__ret__, 'name'),
|
|
116
|
+
namespace=pulumi.get(__ret__, 'namespace'),
|
|
117
|
+
secret_key=pulumi.get(__ret__, 'secret_key'))
|
|
118
|
+
def get_static_access_credentials_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
119
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
|
120
|
+
namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
|
121
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetStaticAccessCredentialsResult]:
|
|
122
|
+
"""
|
|
123
|
+
Use this data source to access information about an existing resource.
|
|
124
|
+
"""
|
|
125
|
+
__args__ = dict()
|
|
126
|
+
__args__['backend'] = backend
|
|
127
|
+
__args__['name'] = name
|
|
128
|
+
__args__['namespace'] = namespace
|
|
129
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
|
130
|
+
__ret__ = pulumi.runtime.invoke_output('vault:aws/getStaticAccessCredentials:getStaticAccessCredentials', __args__, opts=opts, typ=GetStaticAccessCredentialsResult)
|
|
131
|
+
return __ret__.apply(lambda __response__: GetStaticAccessCredentialsResult(
|
|
132
|
+
access_key=pulumi.get(__response__, 'access_key'),
|
|
133
|
+
backend=pulumi.get(__response__, 'backend'),
|
|
134
|
+
id=pulumi.get(__response__, 'id'),
|
|
135
|
+
name=pulumi.get(__response__, 'name'),
|
|
136
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
|
137
|
+
secret_key=pulumi.get(__response__, 'secret_key')))
|