pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,306 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = [
18
+ 'GetSecretResult',
19
+ 'AwaitableGetSecretResult',
20
+ 'get_secret',
21
+ 'get_secret_output',
22
+ ]
23
+
24
+ @pulumi.output_type
25
+ class GetSecretResult:
26
+ """
27
+ A collection of values returned by getSecret.
28
+ """
29
+ def __init__(__self__, data=None, data_json=None, id=None, lease_duration=None, lease_id=None, lease_renewable=None, lease_start_time=None, namespace=None, path=None, version=None, with_lease_start_time=None):
30
+ if data and not isinstance(data, dict):
31
+ raise TypeError("Expected argument 'data' to be a dict")
32
+ pulumi.set(__self__, "data", data)
33
+ if data_json and not isinstance(data_json, str):
34
+ raise TypeError("Expected argument 'data_json' to be a str")
35
+ pulumi.set(__self__, "data_json", data_json)
36
+ if id and not isinstance(id, str):
37
+ raise TypeError("Expected argument 'id' to be a str")
38
+ pulumi.set(__self__, "id", id)
39
+ if lease_duration and not isinstance(lease_duration, int):
40
+ raise TypeError("Expected argument 'lease_duration' to be a int")
41
+ pulumi.set(__self__, "lease_duration", lease_duration)
42
+ if lease_id and not isinstance(lease_id, str):
43
+ raise TypeError("Expected argument 'lease_id' to be a str")
44
+ pulumi.set(__self__, "lease_id", lease_id)
45
+ if lease_renewable and not isinstance(lease_renewable, bool):
46
+ raise TypeError("Expected argument 'lease_renewable' to be a bool")
47
+ pulumi.set(__self__, "lease_renewable", lease_renewable)
48
+ if lease_start_time and not isinstance(lease_start_time, str):
49
+ raise TypeError("Expected argument 'lease_start_time' to be a str")
50
+ pulumi.set(__self__, "lease_start_time", lease_start_time)
51
+ if namespace and not isinstance(namespace, str):
52
+ raise TypeError("Expected argument 'namespace' to be a str")
53
+ pulumi.set(__self__, "namespace", namespace)
54
+ if path and not isinstance(path, str):
55
+ raise TypeError("Expected argument 'path' to be a str")
56
+ pulumi.set(__self__, "path", path)
57
+ if version and not isinstance(version, int):
58
+ raise TypeError("Expected argument 'version' to be a int")
59
+ pulumi.set(__self__, "version", version)
60
+ if with_lease_start_time and not isinstance(with_lease_start_time, bool):
61
+ raise TypeError("Expected argument 'with_lease_start_time' to be a bool")
62
+ pulumi.set(__self__, "with_lease_start_time", with_lease_start_time)
63
+
64
+ @_builtins.property
65
+ @pulumi.getter
66
+ def data(self) -> Mapping[str, _builtins.str]:
67
+ """
68
+ A mapping whose keys are the top-level data keys returned from
69
+ Vault and whose values are the corresponding values. This map can only
70
+ represent string data, so any non-string values returned from Vault are
71
+ serialized as JSON.
72
+ """
73
+ return pulumi.get(self, "data")
74
+
75
+ @_builtins.property
76
+ @pulumi.getter(name="dataJson")
77
+ def data_json(self) -> _builtins.str:
78
+ """
79
+ A string containing the full data payload retrieved from
80
+ Vault, serialized in JSON format.
81
+ """
82
+ return pulumi.get(self, "data_json")
83
+
84
+ @_builtins.property
85
+ @pulumi.getter
86
+ def id(self) -> _builtins.str:
87
+ """
88
+ The provider-assigned unique ID for this managed resource.
89
+ """
90
+ return pulumi.get(self, "id")
91
+
92
+ @_builtins.property
93
+ @pulumi.getter(name="leaseDuration")
94
+ def lease_duration(self) -> _builtins.int:
95
+ """
96
+ The duration of the secret lease, in seconds relative
97
+ to the time the data was requested. Once this time has passed any plan
98
+ generated with this data may fail to apply.
99
+ """
100
+ return pulumi.get(self, "lease_duration")
101
+
102
+ @_builtins.property
103
+ @pulumi.getter(name="leaseId")
104
+ def lease_id(self) -> _builtins.str:
105
+ """
106
+ The lease identifier assigned by Vault, if any.
107
+ """
108
+ return pulumi.get(self, "lease_id")
109
+
110
+ @_builtins.property
111
+ @pulumi.getter(name="leaseRenewable")
112
+ def lease_renewable(self) -> _builtins.bool:
113
+ return pulumi.get(self, "lease_renewable")
114
+
115
+ @_builtins.property
116
+ @pulumi.getter(name="leaseStartTime")
117
+ def lease_start_time(self) -> _builtins.str:
118
+ return pulumi.get(self, "lease_start_time")
119
+
120
+ @_builtins.property
121
+ @pulumi.getter
122
+ def namespace(self) -> Optional[_builtins.str]:
123
+ return pulumi.get(self, "namespace")
124
+
125
+ @_builtins.property
126
+ @pulumi.getter
127
+ def path(self) -> _builtins.str:
128
+ return pulumi.get(self, "path")
129
+
130
+ @_builtins.property
131
+ @pulumi.getter
132
+ def version(self) -> Optional[_builtins.int]:
133
+ return pulumi.get(self, "version")
134
+
135
+ @_builtins.property
136
+ @pulumi.getter(name="withLeaseStartTime")
137
+ def with_lease_start_time(self) -> Optional[_builtins.bool]:
138
+ return pulumi.get(self, "with_lease_start_time")
139
+
140
+
141
+ class AwaitableGetSecretResult(GetSecretResult):
142
+ # pylint: disable=using-constant-test
143
+ def __await__(self):
144
+ if False:
145
+ yield self
146
+ return GetSecretResult(
147
+ data=self.data,
148
+ data_json=self.data_json,
149
+ id=self.id,
150
+ lease_duration=self.lease_duration,
151
+ lease_id=self.lease_id,
152
+ lease_renewable=self.lease_renewable,
153
+ lease_start_time=self.lease_start_time,
154
+ namespace=self.namespace,
155
+ path=self.path,
156
+ version=self.version,
157
+ with_lease_start_time=self.with_lease_start_time)
158
+
159
+
160
+ def get_secret(namespace: Optional[_builtins.str] = None,
161
+ path: Optional[_builtins.str] = None,
162
+ version: Optional[_builtins.int] = None,
163
+ with_lease_start_time: Optional[_builtins.bool] = None,
164
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecretResult:
165
+ """
166
+ ## Example Usage
167
+
168
+ ### Generic secret
169
+
170
+ ```python
171
+ import pulumi
172
+ import pulumi_vault as vault
173
+
174
+ rundeck_auth = vault.generic.get_secret(path="secret/rundeck_auth")
175
+ ```
176
+
177
+ ### KV
178
+
179
+ For this example, consider `example` as a path for a KV engine.
180
+
181
+ ```python
182
+ import pulumi
183
+ import pulumi_vault as vault
184
+
185
+
186
+ def not_implemented(msg):
187
+ raise NotImplementedError(msg)
188
+
189
+ example_creds = vault.generic.get_secret(path="example/creds")
190
+ example_template = not_implemented("The template_file data resource is not yet supported.")
191
+ ```
192
+
193
+ ## Required Vault Capabilities
194
+
195
+ Use of this resource requires the `read` capability on the given path.
196
+
197
+
198
+ :param _builtins.str namespace: The namespace of the target resource.
199
+ The value should not contain leading or trailing forward slashes.
200
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
201
+ *Available only for Vault Enterprise*.
202
+ :param _builtins.str path: The full logical path from which to request data.
203
+ To read data from the "generic" secret backend mounted in Vault by
204
+ default, this should be prefixed with `secret/`. Reading from other backends
205
+ with this data source is possible; consult each backend's documentation
206
+ to see which endpoints support the `GET` method.
207
+ :param _builtins.int version: The version of the secret to read. This is used by the
208
+ Vault KV secrets engine - version 2 to indicate which version of the secret
209
+ to read.
210
+ :param _builtins.bool with_lease_start_time: If set to true, stores `lease_start_time` in the TF state.
211
+ Note that storing the `lease_start_time` in the TF state will cause a persistent drift
212
+ on every `pulumi preview` and will require a `pulumi up`.
213
+ """
214
+ __args__ = dict()
215
+ __args__['namespace'] = namespace
216
+ __args__['path'] = path
217
+ __args__['version'] = version
218
+ __args__['withLeaseStartTime'] = with_lease_start_time
219
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
220
+ __ret__ = pulumi.runtime.invoke('vault:generic/getSecret:getSecret', __args__, opts=opts, typ=GetSecretResult).value
221
+
222
+ return AwaitableGetSecretResult(
223
+ data=pulumi.get(__ret__, 'data'),
224
+ data_json=pulumi.get(__ret__, 'data_json'),
225
+ id=pulumi.get(__ret__, 'id'),
226
+ lease_duration=pulumi.get(__ret__, 'lease_duration'),
227
+ lease_id=pulumi.get(__ret__, 'lease_id'),
228
+ lease_renewable=pulumi.get(__ret__, 'lease_renewable'),
229
+ lease_start_time=pulumi.get(__ret__, 'lease_start_time'),
230
+ namespace=pulumi.get(__ret__, 'namespace'),
231
+ path=pulumi.get(__ret__, 'path'),
232
+ version=pulumi.get(__ret__, 'version'),
233
+ with_lease_start_time=pulumi.get(__ret__, 'with_lease_start_time'))
234
+ def get_secret_output(namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
235
+ path: Optional[pulumi.Input[_builtins.str]] = None,
236
+ version: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
237
+ with_lease_start_time: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
238
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecretResult]:
239
+ """
240
+ ## Example Usage
241
+
242
+ ### Generic secret
243
+
244
+ ```python
245
+ import pulumi
246
+ import pulumi_vault as vault
247
+
248
+ rundeck_auth = vault.generic.get_secret(path="secret/rundeck_auth")
249
+ ```
250
+
251
+ ### KV
252
+
253
+ For this example, consider `example` as a path for a KV engine.
254
+
255
+ ```python
256
+ import pulumi
257
+ import pulumi_vault as vault
258
+
259
+
260
+ def not_implemented(msg):
261
+ raise NotImplementedError(msg)
262
+
263
+ example_creds = vault.generic.get_secret(path="example/creds")
264
+ example_template = not_implemented("The template_file data resource is not yet supported.")
265
+ ```
266
+
267
+ ## Required Vault Capabilities
268
+
269
+ Use of this resource requires the `read` capability on the given path.
270
+
271
+
272
+ :param _builtins.str namespace: The namespace of the target resource.
273
+ The value should not contain leading or trailing forward slashes.
274
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
275
+ *Available only for Vault Enterprise*.
276
+ :param _builtins.str path: The full logical path from which to request data.
277
+ To read data from the "generic" secret backend mounted in Vault by
278
+ default, this should be prefixed with `secret/`. Reading from other backends
279
+ with this data source is possible; consult each backend's documentation
280
+ to see which endpoints support the `GET` method.
281
+ :param _builtins.int version: The version of the secret to read. This is used by the
282
+ Vault KV secrets engine - version 2 to indicate which version of the secret
283
+ to read.
284
+ :param _builtins.bool with_lease_start_time: If set to true, stores `lease_start_time` in the TF state.
285
+ Note that storing the `lease_start_time` in the TF state will cause a persistent drift
286
+ on every `pulumi preview` and will require a `pulumi up`.
287
+ """
288
+ __args__ = dict()
289
+ __args__['namespace'] = namespace
290
+ __args__['path'] = path
291
+ __args__['version'] = version
292
+ __args__['withLeaseStartTime'] = with_lease_start_time
293
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
294
+ __ret__ = pulumi.runtime.invoke_output('vault:generic/getSecret:getSecret', __args__, opts=opts, typ=GetSecretResult)
295
+ return __ret__.apply(lambda __response__: GetSecretResult(
296
+ data=pulumi.get(__response__, 'data'),
297
+ data_json=pulumi.get(__response__, 'data_json'),
298
+ id=pulumi.get(__response__, 'id'),
299
+ lease_duration=pulumi.get(__response__, 'lease_duration'),
300
+ lease_id=pulumi.get(__response__, 'lease_id'),
301
+ lease_renewable=pulumi.get(__response__, 'lease_renewable'),
302
+ lease_start_time=pulumi.get(__response__, 'lease_start_time'),
303
+ namespace=pulumi.get(__response__, 'namespace'),
304
+ path=pulumi.get(__response__, 'path'),
305
+ version=pulumi.get(__response__, 'version'),
306
+ with_lease_start_time=pulumi.get(__response__, 'with_lease_start_time')))