pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,369 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = [
18
+ 'GetAccessCredentialsResult',
19
+ 'AwaitableGetAccessCredentialsResult',
20
+ 'get_access_credentials',
21
+ 'get_access_credentials_output',
22
+ ]
23
+
24
+ @pulumi.output_type
25
+ class GetAccessCredentialsResult:
26
+ """
27
+ A collection of values returned by getAccessCredentials.
28
+ """
29
+ def __init__(__self__, access_key=None, backend=None, id=None, lease_duration=None, lease_id=None, lease_renewable=None, lease_start_time=None, namespace=None, region=None, role=None, role_arn=None, secret_key=None, security_token=None, ttl=None, type=None):
30
+ if access_key and not isinstance(access_key, str):
31
+ raise TypeError("Expected argument 'access_key' to be a str")
32
+ pulumi.set(__self__, "access_key", access_key)
33
+ if backend and not isinstance(backend, str):
34
+ raise TypeError("Expected argument 'backend' to be a str")
35
+ pulumi.set(__self__, "backend", backend)
36
+ if id and not isinstance(id, str):
37
+ raise TypeError("Expected argument 'id' to be a str")
38
+ pulumi.set(__self__, "id", id)
39
+ if lease_duration and not isinstance(lease_duration, int):
40
+ raise TypeError("Expected argument 'lease_duration' to be a int")
41
+ pulumi.set(__self__, "lease_duration", lease_duration)
42
+ if lease_id and not isinstance(lease_id, str):
43
+ raise TypeError("Expected argument 'lease_id' to be a str")
44
+ pulumi.set(__self__, "lease_id", lease_id)
45
+ if lease_renewable and not isinstance(lease_renewable, bool):
46
+ raise TypeError("Expected argument 'lease_renewable' to be a bool")
47
+ pulumi.set(__self__, "lease_renewable", lease_renewable)
48
+ if lease_start_time and not isinstance(lease_start_time, str):
49
+ raise TypeError("Expected argument 'lease_start_time' to be a str")
50
+ pulumi.set(__self__, "lease_start_time", lease_start_time)
51
+ if namespace and not isinstance(namespace, str):
52
+ raise TypeError("Expected argument 'namespace' to be a str")
53
+ pulumi.set(__self__, "namespace", namespace)
54
+ if region and not isinstance(region, str):
55
+ raise TypeError("Expected argument 'region' to be a str")
56
+ pulumi.set(__self__, "region", region)
57
+ if role and not isinstance(role, str):
58
+ raise TypeError("Expected argument 'role' to be a str")
59
+ pulumi.set(__self__, "role", role)
60
+ if role_arn and not isinstance(role_arn, str):
61
+ raise TypeError("Expected argument 'role_arn' to be a str")
62
+ pulumi.set(__self__, "role_arn", role_arn)
63
+ if secret_key and not isinstance(secret_key, str):
64
+ raise TypeError("Expected argument 'secret_key' to be a str")
65
+ pulumi.set(__self__, "secret_key", secret_key)
66
+ if security_token and not isinstance(security_token, str):
67
+ raise TypeError("Expected argument 'security_token' to be a str")
68
+ pulumi.set(__self__, "security_token", security_token)
69
+ if ttl and not isinstance(ttl, str):
70
+ raise TypeError("Expected argument 'ttl' to be a str")
71
+ pulumi.set(__self__, "ttl", ttl)
72
+ if type and not isinstance(type, str):
73
+ raise TypeError("Expected argument 'type' to be a str")
74
+ pulumi.set(__self__, "type", type)
75
+
76
+ @_builtins.property
77
+ @pulumi.getter(name="accessKey")
78
+ def access_key(self) -> _builtins.str:
79
+ """
80
+ The AWS Access Key ID returned by Vault.
81
+ """
82
+ return pulumi.get(self, "access_key")
83
+
84
+ @_builtins.property
85
+ @pulumi.getter
86
+ def backend(self) -> _builtins.str:
87
+ return pulumi.get(self, "backend")
88
+
89
+ @_builtins.property
90
+ @pulumi.getter
91
+ def id(self) -> _builtins.str:
92
+ """
93
+ The provider-assigned unique ID for this managed resource.
94
+ """
95
+ return pulumi.get(self, "id")
96
+
97
+ @_builtins.property
98
+ @pulumi.getter(name="leaseDuration")
99
+ def lease_duration(self) -> _builtins.int:
100
+ """
101
+ The duration of the secret lease, in seconds relative
102
+ to the time the data was requested. Once this time has passed any plan
103
+ generated with this data may fail to apply.
104
+ """
105
+ return pulumi.get(self, "lease_duration")
106
+
107
+ @_builtins.property
108
+ @pulumi.getter(name="leaseId")
109
+ def lease_id(self) -> _builtins.str:
110
+ """
111
+ The lease identifier assigned by Vault.
112
+ """
113
+ return pulumi.get(self, "lease_id")
114
+
115
+ @_builtins.property
116
+ @pulumi.getter(name="leaseRenewable")
117
+ def lease_renewable(self) -> _builtins.bool:
118
+ return pulumi.get(self, "lease_renewable")
119
+
120
+ @_builtins.property
121
+ @pulumi.getter(name="leaseStartTime")
122
+ def lease_start_time(self) -> _builtins.str:
123
+ return pulumi.get(self, "lease_start_time")
124
+
125
+ @_builtins.property
126
+ @pulumi.getter
127
+ def namespace(self) -> Optional[_builtins.str]:
128
+ return pulumi.get(self, "namespace")
129
+
130
+ @_builtins.property
131
+ @pulumi.getter
132
+ def region(self) -> Optional[_builtins.str]:
133
+ return pulumi.get(self, "region")
134
+
135
+ @_builtins.property
136
+ @pulumi.getter
137
+ def role(self) -> _builtins.str:
138
+ return pulumi.get(self, "role")
139
+
140
+ @_builtins.property
141
+ @pulumi.getter(name="roleArn")
142
+ def role_arn(self) -> Optional[_builtins.str]:
143
+ return pulumi.get(self, "role_arn")
144
+
145
+ @_builtins.property
146
+ @pulumi.getter(name="secretKey")
147
+ def secret_key(self) -> _builtins.str:
148
+ """
149
+ The AWS Secret Key returned by Vault.
150
+ """
151
+ return pulumi.get(self, "secret_key")
152
+
153
+ @_builtins.property
154
+ @pulumi.getter(name="securityToken")
155
+ def security_token(self) -> _builtins.str:
156
+ """
157
+ The STS token returned by Vault, if any.
158
+ """
159
+ return pulumi.get(self, "security_token")
160
+
161
+ @_builtins.property
162
+ @pulumi.getter
163
+ def ttl(self) -> Optional[_builtins.str]:
164
+ return pulumi.get(self, "ttl")
165
+
166
+ @_builtins.property
167
+ @pulumi.getter
168
+ def type(self) -> Optional[_builtins.str]:
169
+ return pulumi.get(self, "type")
170
+
171
+
172
+ class AwaitableGetAccessCredentialsResult(GetAccessCredentialsResult):
173
+ # pylint: disable=using-constant-test
174
+ def __await__(self):
175
+ if False:
176
+ yield self
177
+ return GetAccessCredentialsResult(
178
+ access_key=self.access_key,
179
+ backend=self.backend,
180
+ id=self.id,
181
+ lease_duration=self.lease_duration,
182
+ lease_id=self.lease_id,
183
+ lease_renewable=self.lease_renewable,
184
+ lease_start_time=self.lease_start_time,
185
+ namespace=self.namespace,
186
+ region=self.region,
187
+ role=self.role,
188
+ role_arn=self.role_arn,
189
+ secret_key=self.secret_key,
190
+ security_token=self.security_token,
191
+ ttl=self.ttl,
192
+ type=self.type)
193
+
194
+
195
+ def get_access_credentials(backend: Optional[_builtins.str] = None,
196
+ namespace: Optional[_builtins.str] = None,
197
+ region: Optional[_builtins.str] = None,
198
+ role: Optional[_builtins.str] = None,
199
+ role_arn: Optional[_builtins.str] = None,
200
+ ttl: Optional[_builtins.str] = None,
201
+ type: Optional[_builtins.str] = None,
202
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetAccessCredentialsResult:
203
+ """
204
+ ## Example Usage
205
+
206
+ ```python
207
+ import pulumi
208
+ import pulumi_vault as vault
209
+
210
+ aws = vault.aws.SecretBackend("aws",
211
+ access_key="AKIA.....",
212
+ secret_key="SECRETKEYFROMAWS")
213
+ role = vault.aws.SecretBackendRole("role",
214
+ backend=aws.path,
215
+ name="test",
216
+ policy=\"\"\"{
217
+ \\"Version\\": \\"2012-10-17\\",
218
+ \\"Statement\\": [
219
+ {
220
+ \\"Effect\\": \\"Allow\\",
221
+ \\"Action\\": \\"iam:*\\",
222
+ \\"Resource\\": \\"*\\"
223
+ }
224
+ ]
225
+ }
226
+ \"\"\")
227
+ # generally, these blocks would be in a different module
228
+ creds = pulumi.Output.all(
229
+ path=aws.path,
230
+ name=role.name
231
+ ).apply(lambda resolved_outputs: vault.aws.get_access_credentials_output(backend=resolved_outputs['path'],
232
+ role=resolved_outputs['name']))
233
+ ```
234
+
235
+
236
+ :param _builtins.str backend: The path to the AWS secret backend to
237
+ read credentials from, with no leading or trailing `/`s.
238
+ :param _builtins.str namespace: The namespace of the target resource.
239
+ The value should not contain leading or trailing forward slashes.
240
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
241
+ *Available only for Vault Enterprise*.
242
+ :param _builtins.str region: The region the read credentials belong to.
243
+ :param _builtins.str role: The name of the AWS secret backend role to read
244
+ credentials from, with no leading or trailing `/`s.
245
+ :param _builtins.str role_arn: The specific AWS ARN to use
246
+ from the configured role. If the role does not have multiple ARNs, this does
247
+ not need to be specified.
248
+ :param _builtins.str ttl: Specifies the TTL for the use of the STS token. This
249
+ is specified as a string with a duration suffix. Valid only when
250
+ `credential_type` of the connected `aws.SecretBackendRole` resource is `assumed_role` or `federation_token`
251
+ :param _builtins.str type: The type of credentials to read. Defaults
252
+ to `"creds"`, which just returns an AWS Access Key ID and Secret
253
+ Key. Can also be set to `"sts"`, which will return a security token
254
+ in addition to the keys.
255
+ """
256
+ __args__ = dict()
257
+ __args__['backend'] = backend
258
+ __args__['namespace'] = namespace
259
+ __args__['region'] = region
260
+ __args__['role'] = role
261
+ __args__['roleArn'] = role_arn
262
+ __args__['ttl'] = ttl
263
+ __args__['type'] = type
264
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
265
+ __ret__ = pulumi.runtime.invoke('vault:aws/getAccessCredentials:getAccessCredentials', __args__, opts=opts, typ=GetAccessCredentialsResult).value
266
+
267
+ return AwaitableGetAccessCredentialsResult(
268
+ access_key=pulumi.get(__ret__, 'access_key'),
269
+ backend=pulumi.get(__ret__, 'backend'),
270
+ id=pulumi.get(__ret__, 'id'),
271
+ lease_duration=pulumi.get(__ret__, 'lease_duration'),
272
+ lease_id=pulumi.get(__ret__, 'lease_id'),
273
+ lease_renewable=pulumi.get(__ret__, 'lease_renewable'),
274
+ lease_start_time=pulumi.get(__ret__, 'lease_start_time'),
275
+ namespace=pulumi.get(__ret__, 'namespace'),
276
+ region=pulumi.get(__ret__, 'region'),
277
+ role=pulumi.get(__ret__, 'role'),
278
+ role_arn=pulumi.get(__ret__, 'role_arn'),
279
+ secret_key=pulumi.get(__ret__, 'secret_key'),
280
+ security_token=pulumi.get(__ret__, 'security_token'),
281
+ ttl=pulumi.get(__ret__, 'ttl'),
282
+ type=pulumi.get(__ret__, 'type'))
283
+ def get_access_credentials_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
284
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
285
+ region: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
286
+ role: Optional[pulumi.Input[_builtins.str]] = None,
287
+ role_arn: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
288
+ ttl: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
289
+ type: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
290
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAccessCredentialsResult]:
291
+ """
292
+ ## Example Usage
293
+
294
+ ```python
295
+ import pulumi
296
+ import pulumi_vault as vault
297
+
298
+ aws = vault.aws.SecretBackend("aws",
299
+ access_key="AKIA.....",
300
+ secret_key="SECRETKEYFROMAWS")
301
+ role = vault.aws.SecretBackendRole("role",
302
+ backend=aws.path,
303
+ name="test",
304
+ policy=\"\"\"{
305
+ \\"Version\\": \\"2012-10-17\\",
306
+ \\"Statement\\": [
307
+ {
308
+ \\"Effect\\": \\"Allow\\",
309
+ \\"Action\\": \\"iam:*\\",
310
+ \\"Resource\\": \\"*\\"
311
+ }
312
+ ]
313
+ }
314
+ \"\"\")
315
+ # generally, these blocks would be in a different module
316
+ creds = pulumi.Output.all(
317
+ path=aws.path,
318
+ name=role.name
319
+ ).apply(lambda resolved_outputs: vault.aws.get_access_credentials_output(backend=resolved_outputs['path'],
320
+ role=resolved_outputs['name']))
321
+ ```
322
+
323
+
324
+ :param _builtins.str backend: The path to the AWS secret backend to
325
+ read credentials from, with no leading or trailing `/`s.
326
+ :param _builtins.str namespace: The namespace of the target resource.
327
+ The value should not contain leading or trailing forward slashes.
328
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
329
+ *Available only for Vault Enterprise*.
330
+ :param _builtins.str region: The region the read credentials belong to.
331
+ :param _builtins.str role: The name of the AWS secret backend role to read
332
+ credentials from, with no leading or trailing `/`s.
333
+ :param _builtins.str role_arn: The specific AWS ARN to use
334
+ from the configured role. If the role does not have multiple ARNs, this does
335
+ not need to be specified.
336
+ :param _builtins.str ttl: Specifies the TTL for the use of the STS token. This
337
+ is specified as a string with a duration suffix. Valid only when
338
+ `credential_type` of the connected `aws.SecretBackendRole` resource is `assumed_role` or `federation_token`
339
+ :param _builtins.str type: The type of credentials to read. Defaults
340
+ to `"creds"`, which just returns an AWS Access Key ID and Secret
341
+ Key. Can also be set to `"sts"`, which will return a security token
342
+ in addition to the keys.
343
+ """
344
+ __args__ = dict()
345
+ __args__['backend'] = backend
346
+ __args__['namespace'] = namespace
347
+ __args__['region'] = region
348
+ __args__['role'] = role
349
+ __args__['roleArn'] = role_arn
350
+ __args__['ttl'] = ttl
351
+ __args__['type'] = type
352
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
353
+ __ret__ = pulumi.runtime.invoke_output('vault:aws/getAccessCredentials:getAccessCredentials', __args__, opts=opts, typ=GetAccessCredentialsResult)
354
+ return __ret__.apply(lambda __response__: GetAccessCredentialsResult(
355
+ access_key=pulumi.get(__response__, 'access_key'),
356
+ backend=pulumi.get(__response__, 'backend'),
357
+ id=pulumi.get(__response__, 'id'),
358
+ lease_duration=pulumi.get(__response__, 'lease_duration'),
359
+ lease_id=pulumi.get(__response__, 'lease_id'),
360
+ lease_renewable=pulumi.get(__response__, 'lease_renewable'),
361
+ lease_start_time=pulumi.get(__response__, 'lease_start_time'),
362
+ namespace=pulumi.get(__response__, 'namespace'),
363
+ region=pulumi.get(__response__, 'region'),
364
+ role=pulumi.get(__response__, 'role'),
365
+ role_arn=pulumi.get(__response__, 'role_arn'),
366
+ secret_key=pulumi.get(__response__, 'secret_key'),
367
+ security_token=pulumi.get(__response__, 'security_token'),
368
+ ttl=pulumi.get(__response__, 'ttl'),
369
+ type=pulumi.get(__response__, 'type')))
@@ -0,0 +1,137 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = [
18
+ 'GetStaticAccessCredentialsResult',
19
+ 'AwaitableGetStaticAccessCredentialsResult',
20
+ 'get_static_access_credentials',
21
+ 'get_static_access_credentials_output',
22
+ ]
23
+
24
+ @pulumi.output_type
25
+ class GetStaticAccessCredentialsResult:
26
+ """
27
+ A collection of values returned by getStaticAccessCredentials.
28
+ """
29
+ def __init__(__self__, access_key=None, backend=None, id=None, name=None, namespace=None, secret_key=None):
30
+ if access_key and not isinstance(access_key, str):
31
+ raise TypeError("Expected argument 'access_key' to be a str")
32
+ pulumi.set(__self__, "access_key", access_key)
33
+ if backend and not isinstance(backend, str):
34
+ raise TypeError("Expected argument 'backend' to be a str")
35
+ pulumi.set(__self__, "backend", backend)
36
+ if id and not isinstance(id, str):
37
+ raise TypeError("Expected argument 'id' to be a str")
38
+ pulumi.set(__self__, "id", id)
39
+ if name and not isinstance(name, str):
40
+ raise TypeError("Expected argument 'name' to be a str")
41
+ pulumi.set(__self__, "name", name)
42
+ if namespace and not isinstance(namespace, str):
43
+ raise TypeError("Expected argument 'namespace' to be a str")
44
+ pulumi.set(__self__, "namespace", namespace)
45
+ if secret_key and not isinstance(secret_key, str):
46
+ raise TypeError("Expected argument 'secret_key' to be a str")
47
+ pulumi.set(__self__, "secret_key", secret_key)
48
+
49
+ @_builtins.property
50
+ @pulumi.getter(name="accessKey")
51
+ def access_key(self) -> _builtins.str:
52
+ return pulumi.get(self, "access_key")
53
+
54
+ @_builtins.property
55
+ @pulumi.getter
56
+ def backend(self) -> _builtins.str:
57
+ return pulumi.get(self, "backend")
58
+
59
+ @_builtins.property
60
+ @pulumi.getter
61
+ def id(self) -> _builtins.str:
62
+ """
63
+ The provider-assigned unique ID for this managed resource.
64
+ """
65
+ return pulumi.get(self, "id")
66
+
67
+ @_builtins.property
68
+ @pulumi.getter
69
+ def name(self) -> _builtins.str:
70
+ return pulumi.get(self, "name")
71
+
72
+ @_builtins.property
73
+ @pulumi.getter
74
+ def namespace(self) -> Optional[_builtins.str]:
75
+ return pulumi.get(self, "namespace")
76
+
77
+ @_builtins.property
78
+ @pulumi.getter(name="secretKey")
79
+ def secret_key(self) -> _builtins.str:
80
+ return pulumi.get(self, "secret_key")
81
+
82
+
83
+ class AwaitableGetStaticAccessCredentialsResult(GetStaticAccessCredentialsResult):
84
+ # pylint: disable=using-constant-test
85
+ def __await__(self):
86
+ if False:
87
+ yield self
88
+ return GetStaticAccessCredentialsResult(
89
+ access_key=self.access_key,
90
+ backend=self.backend,
91
+ id=self.id,
92
+ name=self.name,
93
+ namespace=self.namespace,
94
+ secret_key=self.secret_key)
95
+
96
+
97
+ def get_static_access_credentials(backend: Optional[_builtins.str] = None,
98
+ name: Optional[_builtins.str] = None,
99
+ namespace: Optional[_builtins.str] = None,
100
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetStaticAccessCredentialsResult:
101
+ """
102
+ Use this data source to access information about an existing resource.
103
+ """
104
+ __args__ = dict()
105
+ __args__['backend'] = backend
106
+ __args__['name'] = name
107
+ __args__['namespace'] = namespace
108
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
109
+ __ret__ = pulumi.runtime.invoke('vault:aws/getStaticAccessCredentials:getStaticAccessCredentials', __args__, opts=opts, typ=GetStaticAccessCredentialsResult).value
110
+
111
+ return AwaitableGetStaticAccessCredentialsResult(
112
+ access_key=pulumi.get(__ret__, 'access_key'),
113
+ backend=pulumi.get(__ret__, 'backend'),
114
+ id=pulumi.get(__ret__, 'id'),
115
+ name=pulumi.get(__ret__, 'name'),
116
+ namespace=pulumi.get(__ret__, 'namespace'),
117
+ secret_key=pulumi.get(__ret__, 'secret_key'))
118
+ def get_static_access_credentials_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
119
+ name: Optional[pulumi.Input[_builtins.str]] = None,
120
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
121
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetStaticAccessCredentialsResult]:
122
+ """
123
+ Use this data source to access information about an existing resource.
124
+ """
125
+ __args__ = dict()
126
+ __args__['backend'] = backend
127
+ __args__['name'] = name
128
+ __args__['namespace'] = namespace
129
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
130
+ __ret__ = pulumi.runtime.invoke_output('vault:aws/getStaticAccessCredentials:getStaticAccessCredentials', __args__, opts=opts, typ=GetStaticAccessCredentialsResult)
131
+ return __ret__.apply(lambda __response__: GetStaticAccessCredentialsResult(
132
+ access_key=pulumi.get(__response__, 'access_key'),
133
+ backend=pulumi.get(__response__, 'backend'),
134
+ id=pulumi.get(__response__, 'id'),
135
+ name=pulumi.get(__response__, 'name'),
136
+ namespace=pulumi.get(__response__, 'namespace'),
137
+ secret_key=pulumi.get(__response__, 'secret_key')))