pulumi-vault 7.6.0a1764657486__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1399 -0
- pulumi_vault/_inputs.py +2701 -0
- pulumi_vault/_utilities.py +331 -0
- pulumi_vault/ad/__init__.py +12 -0
- pulumi_vault/ad/get_access_credentials.py +177 -0
- pulumi_vault/ad/secret_backend.py +1916 -0
- pulumi_vault/ad/secret_library.py +546 -0
- pulumi_vault/ad/secret_role.py +499 -0
- pulumi_vault/alicloud/__init__.py +9 -0
- pulumi_vault/alicloud/auth_backend_role.py +866 -0
- pulumi_vault/approle/__init__.py +12 -0
- pulumi_vault/approle/auth_backend_login.py +571 -0
- pulumi_vault/approle/auth_backend_role.py +1082 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
- pulumi_vault/audit.py +499 -0
- pulumi_vault/audit_request_header.py +277 -0
- pulumi_vault/auth_backend.py +565 -0
- pulumi_vault/aws/__init__.py +22 -0
- pulumi_vault/aws/auth_backend_cert.py +420 -0
- pulumi_vault/aws/auth_backend_client.py +1259 -0
- pulumi_vault/aws/auth_backend_config_identity.py +494 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
- pulumi_vault/aws/auth_backend_login.py +1046 -0
- pulumi_vault/aws/auth_backend_role.py +1961 -0
- pulumi_vault/aws/auth_backend_role_tag.py +638 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
- pulumi_vault/aws/auth_backend_sts_role.py +414 -0
- pulumi_vault/aws/get_access_credentials.py +369 -0
- pulumi_vault/aws/get_static_access_credentials.py +137 -0
- pulumi_vault/aws/secret_backend.py +2018 -0
- pulumi_vault/aws/secret_backend_role.py +1188 -0
- pulumi_vault/aws/secret_backend_static_role.py +639 -0
- pulumi_vault/azure/__init__.py +15 -0
- pulumi_vault/azure/_inputs.py +108 -0
- pulumi_vault/azure/auth_backend_config.py +1096 -0
- pulumi_vault/azure/auth_backend_role.py +1176 -0
- pulumi_vault/azure/backend.py +1793 -0
- pulumi_vault/azure/backend_role.py +883 -0
- pulumi_vault/azure/get_access_credentials.py +400 -0
- pulumi_vault/azure/outputs.py +107 -0
- pulumi_vault/cert_auth_backend_role.py +1539 -0
- pulumi_vault/config/__init__.py +9 -0
- pulumi_vault/config/__init__.pyi +164 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +1225 -0
- pulumi_vault/config/ui_custom_message.py +530 -0
- pulumi_vault/config/vars.py +230 -0
- pulumi_vault/consul/__init__.py +10 -0
- pulumi_vault/consul/secret_backend.py +1517 -0
- pulumi_vault/consul/secret_backend_role.py +847 -0
- pulumi_vault/database/__init__.py +14 -0
- pulumi_vault/database/_inputs.py +11907 -0
- pulumi_vault/database/outputs.py +8496 -0
- pulumi_vault/database/secret_backend_connection.py +1676 -0
- pulumi_vault/database/secret_backend_role.py +840 -0
- pulumi_vault/database/secret_backend_static_role.py +881 -0
- pulumi_vault/database/secrets_mount.py +2160 -0
- pulumi_vault/egp_policy.py +399 -0
- pulumi_vault/gcp/__init__.py +17 -0
- pulumi_vault/gcp/_inputs.py +441 -0
- pulumi_vault/gcp/auth_backend.py +1486 -0
- pulumi_vault/gcp/auth_backend_role.py +1235 -0
- pulumi_vault/gcp/get_auth_backend_role.py +514 -0
- pulumi_vault/gcp/outputs.py +302 -0
- pulumi_vault/gcp/secret_backend.py +1807 -0
- pulumi_vault/gcp/secret_impersonated_account.py +484 -0
- pulumi_vault/gcp/secret_roleset.py +554 -0
- pulumi_vault/gcp/secret_static_account.py +557 -0
- pulumi_vault/generic/__init__.py +11 -0
- pulumi_vault/generic/endpoint.py +786 -0
- pulumi_vault/generic/get_secret.py +306 -0
- pulumi_vault/generic/secret.py +486 -0
- pulumi_vault/get_auth_backend.py +226 -0
- pulumi_vault/get_auth_backends.py +170 -0
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +202 -0
- pulumi_vault/get_nomad_access_token.py +210 -0
- pulumi_vault/get_policy_document.py +160 -0
- pulumi_vault/get_raft_autopilot_state.py +267 -0
- pulumi_vault/github/__init__.py +13 -0
- pulumi_vault/github/_inputs.py +225 -0
- pulumi_vault/github/auth_backend.py +1194 -0
- pulumi_vault/github/outputs.py +174 -0
- pulumi_vault/github/team.py +380 -0
- pulumi_vault/github/user.py +380 -0
- pulumi_vault/identity/__init__.py +35 -0
- pulumi_vault/identity/entity.py +447 -0
- pulumi_vault/identity/entity_alias.py +398 -0
- pulumi_vault/identity/entity_policies.py +455 -0
- pulumi_vault/identity/get_entity.py +384 -0
- pulumi_vault/identity/get_group.py +467 -0
- pulumi_vault/identity/get_oidc_client_creds.py +175 -0
- pulumi_vault/identity/get_oidc_openid_config.py +334 -0
- pulumi_vault/identity/get_oidc_public_keys.py +179 -0
- pulumi_vault/identity/group.py +805 -0
- pulumi_vault/identity/group_alias.py +386 -0
- pulumi_vault/identity/group_member_entity_ids.py +444 -0
- pulumi_vault/identity/group_member_group_ids.py +467 -0
- pulumi_vault/identity/group_policies.py +471 -0
- pulumi_vault/identity/mfa_duo.py +674 -0
- pulumi_vault/identity/mfa_login_enforcement.py +566 -0
- pulumi_vault/identity/mfa_okta.py +626 -0
- pulumi_vault/identity/mfa_pingid.py +616 -0
- pulumi_vault/identity/mfa_totp.py +758 -0
- pulumi_vault/identity/oidc.py +268 -0
- pulumi_vault/identity/oidc_assignment.py +375 -0
- pulumi_vault/identity/oidc_client.py +667 -0
- pulumi_vault/identity/oidc_key.py +474 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
- pulumi_vault/identity/oidc_provider.py +550 -0
- pulumi_vault/identity/oidc_role.py +543 -0
- pulumi_vault/identity/oidc_scope.py +355 -0
- pulumi_vault/identity/outputs.py +137 -0
- pulumi_vault/jwt/__init__.py +12 -0
- pulumi_vault/jwt/_inputs.py +225 -0
- pulumi_vault/jwt/auth_backend.py +1347 -0
- pulumi_vault/jwt/auth_backend_role.py +1847 -0
- pulumi_vault/jwt/outputs.py +174 -0
- pulumi_vault/kmip/__init__.py +11 -0
- pulumi_vault/kmip/secret_backend.py +1591 -0
- pulumi_vault/kmip/secret_role.py +1194 -0
- pulumi_vault/kmip/secret_scope.py +372 -0
- pulumi_vault/kubernetes/__init__.py +15 -0
- pulumi_vault/kubernetes/auth_backend_config.py +654 -0
- pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
- pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
- pulumi_vault/kubernetes/get_service_account_token.py +344 -0
- pulumi_vault/kubernetes/secret_backend.py +1341 -0
- pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
- pulumi_vault/kv/__init__.py +18 -0
- pulumi_vault/kv/_inputs.py +124 -0
- pulumi_vault/kv/get_secret.py +240 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
- pulumi_vault/kv/get_secret_v2.py +315 -0
- pulumi_vault/kv/get_secrets_list.py +186 -0
- pulumi_vault/kv/get_secrets_list_v2.py +243 -0
- pulumi_vault/kv/outputs.py +102 -0
- pulumi_vault/kv/secret.py +397 -0
- pulumi_vault/kv/secret_backend_v2.py +455 -0
- pulumi_vault/kv/secret_v2.py +970 -0
- pulumi_vault/ldap/__init__.py +19 -0
- pulumi_vault/ldap/_inputs.py +225 -0
- pulumi_vault/ldap/auth_backend.py +2520 -0
- pulumi_vault/ldap/auth_backend_group.py +386 -0
- pulumi_vault/ldap/auth_backend_user.py +439 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
- pulumi_vault/ldap/get_static_credentials.py +192 -0
- pulumi_vault/ldap/outputs.py +174 -0
- pulumi_vault/ldap/secret_backend.py +2207 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
- pulumi_vault/ldap/secret_backend_library_set.py +552 -0
- pulumi_vault/ldap/secret_backend_static_role.py +541 -0
- pulumi_vault/managed/__init__.py +11 -0
- pulumi_vault/managed/_inputs.py +944 -0
- pulumi_vault/managed/keys.py +398 -0
- pulumi_vault/managed/outputs.py +667 -0
- pulumi_vault/mfa_duo.py +589 -0
- pulumi_vault/mfa_okta.py +623 -0
- pulumi_vault/mfa_pingid.py +670 -0
- pulumi_vault/mfa_totp.py +620 -0
- pulumi_vault/mongodbatlas/__init__.py +10 -0
- pulumi_vault/mongodbatlas/secret_backend.py +388 -0
- pulumi_vault/mongodbatlas/secret_role.py +726 -0
- pulumi_vault/mount.py +1262 -0
- pulumi_vault/namespace.py +452 -0
- pulumi_vault/nomad_secret_backend.py +1559 -0
- pulumi_vault/nomad_secret_role.py +489 -0
- pulumi_vault/oci_auth_backend.py +676 -0
- pulumi_vault/oci_auth_backend_role.py +852 -0
- pulumi_vault/okta/__init__.py +13 -0
- pulumi_vault/okta/_inputs.py +320 -0
- pulumi_vault/okta/auth_backend.py +1231 -0
- pulumi_vault/okta/auth_backend_group.py +369 -0
- pulumi_vault/okta/auth_backend_user.py +416 -0
- pulumi_vault/okta/outputs.py +244 -0
- pulumi_vault/outputs.py +502 -0
- pulumi_vault/pkisecret/__init__.py +38 -0
- pulumi_vault/pkisecret/_inputs.py +270 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
- pulumi_vault/pkisecret/backend_config_acme.py +690 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
- pulumi_vault/pkisecret/backend_config_est.py +756 -0
- pulumi_vault/pkisecret/backend_config_scep.py +738 -0
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
- pulumi_vault/pkisecret/get_backend_key.py +211 -0
- pulumi_vault/pkisecret/get_backend_keys.py +192 -0
- pulumi_vault/pkisecret/outputs.py +270 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
- pulumi_vault/pkisecret/secret_backend_key.py +613 -0
- pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
- pulumi_vault/plugin.py +596 -0
- pulumi_vault/plugin_pinned_version.py +299 -0
- pulumi_vault/policy.py +279 -0
- pulumi_vault/provider.py +781 -0
- pulumi_vault/pulumi-plugin.json +5 -0
- pulumi_vault/py.typed +0 -0
- pulumi_vault/quota_lease_count.py +504 -0
- pulumi_vault/quota_rate_limit.py +751 -0
- pulumi_vault/rabbitmq/__init__.py +12 -0
- pulumi_vault/rabbitmq/_inputs.py +235 -0
- pulumi_vault/rabbitmq/outputs.py +144 -0
- pulumi_vault/rabbitmq/secret_backend.py +1437 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
- pulumi_vault/raft_autopilot.py +609 -0
- pulumi_vault/raft_snapshot_agent_config.py +1591 -0
- pulumi_vault/rgp_policy.py +349 -0
- pulumi_vault/saml/__init__.py +12 -0
- pulumi_vault/saml/_inputs.py +225 -0
- pulumi_vault/saml/auth_backend.py +811 -0
- pulumi_vault/saml/auth_backend_role.py +1068 -0
- pulumi_vault/saml/outputs.py +174 -0
- pulumi_vault/scep_auth_backend_role.py +908 -0
- pulumi_vault/secrets/__init__.py +18 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +450 -0
- pulumi_vault/secrets/sync_aws_destination.py +780 -0
- pulumi_vault/secrets/sync_azure_destination.py +736 -0
- pulumi_vault/secrets/sync_config.py +303 -0
- pulumi_vault/secrets/sync_gcp_destination.py +572 -0
- pulumi_vault/secrets/sync_gh_destination.py +688 -0
- pulumi_vault/secrets/sync_github_apps.py +376 -0
- pulumi_vault/secrets/sync_vercel_destination.py +603 -0
- pulumi_vault/ssh/__init__.py +13 -0
- pulumi_vault/ssh/_inputs.py +76 -0
- pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
- pulumi_vault/ssh/outputs.py +51 -0
- pulumi_vault/ssh/secret_backend_ca.py +588 -0
- pulumi_vault/ssh/secret_backend_role.py +1493 -0
- pulumi_vault/terraformcloud/__init__.py +11 -0
- pulumi_vault/terraformcloud/secret_backend.py +1321 -0
- pulumi_vault/terraformcloud/secret_creds.py +445 -0
- pulumi_vault/terraformcloud/secret_role.py +563 -0
- pulumi_vault/token.py +1026 -0
- pulumi_vault/tokenauth/__init__.py +9 -0
- pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
- pulumi_vault/transform/__init__.py +14 -0
- pulumi_vault/transform/alphabet.py +348 -0
- pulumi_vault/transform/get_decode.py +287 -0
- pulumi_vault/transform/get_encode.py +291 -0
- pulumi_vault/transform/role.py +350 -0
- pulumi_vault/transform/template.py +592 -0
- pulumi_vault/transform/transformation.py +608 -0
- pulumi_vault/transit/__init__.py +15 -0
- pulumi_vault/transit/get_cmac.py +256 -0
- pulumi_vault/transit/get_decrypt.py +181 -0
- pulumi_vault/transit/get_encrypt.py +174 -0
- pulumi_vault/transit/get_sign.py +328 -0
- pulumi_vault/transit/get_verify.py +373 -0
- pulumi_vault/transit/secret_backend_key.py +1202 -0
- pulumi_vault/transit/secret_cache_config.py +302 -0
- pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
- pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
- pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
- pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,306 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
|
|
17
|
+
__all__ = [
|
|
18
|
+
'GetSecretResult',
|
|
19
|
+
'AwaitableGetSecretResult',
|
|
20
|
+
'get_secret',
|
|
21
|
+
'get_secret_output',
|
|
22
|
+
]
|
|
23
|
+
|
|
24
|
+
@pulumi.output_type
|
|
25
|
+
class GetSecretResult:
|
|
26
|
+
"""
|
|
27
|
+
A collection of values returned by getSecret.
|
|
28
|
+
"""
|
|
29
|
+
def __init__(__self__, data=None, data_json=None, id=None, lease_duration=None, lease_id=None, lease_renewable=None, lease_start_time=None, namespace=None, path=None, version=None, with_lease_start_time=None):
|
|
30
|
+
if data and not isinstance(data, dict):
|
|
31
|
+
raise TypeError("Expected argument 'data' to be a dict")
|
|
32
|
+
pulumi.set(__self__, "data", data)
|
|
33
|
+
if data_json and not isinstance(data_json, str):
|
|
34
|
+
raise TypeError("Expected argument 'data_json' to be a str")
|
|
35
|
+
pulumi.set(__self__, "data_json", data_json)
|
|
36
|
+
if id and not isinstance(id, str):
|
|
37
|
+
raise TypeError("Expected argument 'id' to be a str")
|
|
38
|
+
pulumi.set(__self__, "id", id)
|
|
39
|
+
if lease_duration and not isinstance(lease_duration, int):
|
|
40
|
+
raise TypeError("Expected argument 'lease_duration' to be a int")
|
|
41
|
+
pulumi.set(__self__, "lease_duration", lease_duration)
|
|
42
|
+
if lease_id and not isinstance(lease_id, str):
|
|
43
|
+
raise TypeError("Expected argument 'lease_id' to be a str")
|
|
44
|
+
pulumi.set(__self__, "lease_id", lease_id)
|
|
45
|
+
if lease_renewable and not isinstance(lease_renewable, bool):
|
|
46
|
+
raise TypeError("Expected argument 'lease_renewable' to be a bool")
|
|
47
|
+
pulumi.set(__self__, "lease_renewable", lease_renewable)
|
|
48
|
+
if lease_start_time and not isinstance(lease_start_time, str):
|
|
49
|
+
raise TypeError("Expected argument 'lease_start_time' to be a str")
|
|
50
|
+
pulumi.set(__self__, "lease_start_time", lease_start_time)
|
|
51
|
+
if namespace and not isinstance(namespace, str):
|
|
52
|
+
raise TypeError("Expected argument 'namespace' to be a str")
|
|
53
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
54
|
+
if path and not isinstance(path, str):
|
|
55
|
+
raise TypeError("Expected argument 'path' to be a str")
|
|
56
|
+
pulumi.set(__self__, "path", path)
|
|
57
|
+
if version and not isinstance(version, int):
|
|
58
|
+
raise TypeError("Expected argument 'version' to be a int")
|
|
59
|
+
pulumi.set(__self__, "version", version)
|
|
60
|
+
if with_lease_start_time and not isinstance(with_lease_start_time, bool):
|
|
61
|
+
raise TypeError("Expected argument 'with_lease_start_time' to be a bool")
|
|
62
|
+
pulumi.set(__self__, "with_lease_start_time", with_lease_start_time)
|
|
63
|
+
|
|
64
|
+
@_builtins.property
|
|
65
|
+
@pulumi.getter
|
|
66
|
+
def data(self) -> Mapping[str, _builtins.str]:
|
|
67
|
+
"""
|
|
68
|
+
A mapping whose keys are the top-level data keys returned from
|
|
69
|
+
Vault and whose values are the corresponding values. This map can only
|
|
70
|
+
represent string data, so any non-string values returned from Vault are
|
|
71
|
+
serialized as JSON.
|
|
72
|
+
"""
|
|
73
|
+
return pulumi.get(self, "data")
|
|
74
|
+
|
|
75
|
+
@_builtins.property
|
|
76
|
+
@pulumi.getter(name="dataJson")
|
|
77
|
+
def data_json(self) -> _builtins.str:
|
|
78
|
+
"""
|
|
79
|
+
A string containing the full data payload retrieved from
|
|
80
|
+
Vault, serialized in JSON format.
|
|
81
|
+
"""
|
|
82
|
+
return pulumi.get(self, "data_json")
|
|
83
|
+
|
|
84
|
+
@_builtins.property
|
|
85
|
+
@pulumi.getter
|
|
86
|
+
def id(self) -> _builtins.str:
|
|
87
|
+
"""
|
|
88
|
+
The provider-assigned unique ID for this managed resource.
|
|
89
|
+
"""
|
|
90
|
+
return pulumi.get(self, "id")
|
|
91
|
+
|
|
92
|
+
@_builtins.property
|
|
93
|
+
@pulumi.getter(name="leaseDuration")
|
|
94
|
+
def lease_duration(self) -> _builtins.int:
|
|
95
|
+
"""
|
|
96
|
+
The duration of the secret lease, in seconds relative
|
|
97
|
+
to the time the data was requested. Once this time has passed any plan
|
|
98
|
+
generated with this data may fail to apply.
|
|
99
|
+
"""
|
|
100
|
+
return pulumi.get(self, "lease_duration")
|
|
101
|
+
|
|
102
|
+
@_builtins.property
|
|
103
|
+
@pulumi.getter(name="leaseId")
|
|
104
|
+
def lease_id(self) -> _builtins.str:
|
|
105
|
+
"""
|
|
106
|
+
The lease identifier assigned by Vault, if any.
|
|
107
|
+
"""
|
|
108
|
+
return pulumi.get(self, "lease_id")
|
|
109
|
+
|
|
110
|
+
@_builtins.property
|
|
111
|
+
@pulumi.getter(name="leaseRenewable")
|
|
112
|
+
def lease_renewable(self) -> _builtins.bool:
|
|
113
|
+
return pulumi.get(self, "lease_renewable")
|
|
114
|
+
|
|
115
|
+
@_builtins.property
|
|
116
|
+
@pulumi.getter(name="leaseStartTime")
|
|
117
|
+
def lease_start_time(self) -> _builtins.str:
|
|
118
|
+
return pulumi.get(self, "lease_start_time")
|
|
119
|
+
|
|
120
|
+
@_builtins.property
|
|
121
|
+
@pulumi.getter
|
|
122
|
+
def namespace(self) -> Optional[_builtins.str]:
|
|
123
|
+
return pulumi.get(self, "namespace")
|
|
124
|
+
|
|
125
|
+
@_builtins.property
|
|
126
|
+
@pulumi.getter
|
|
127
|
+
def path(self) -> _builtins.str:
|
|
128
|
+
return pulumi.get(self, "path")
|
|
129
|
+
|
|
130
|
+
@_builtins.property
|
|
131
|
+
@pulumi.getter
|
|
132
|
+
def version(self) -> Optional[_builtins.int]:
|
|
133
|
+
return pulumi.get(self, "version")
|
|
134
|
+
|
|
135
|
+
@_builtins.property
|
|
136
|
+
@pulumi.getter(name="withLeaseStartTime")
|
|
137
|
+
def with_lease_start_time(self) -> Optional[_builtins.bool]:
|
|
138
|
+
return pulumi.get(self, "with_lease_start_time")
|
|
139
|
+
|
|
140
|
+
|
|
141
|
+
class AwaitableGetSecretResult(GetSecretResult):
|
|
142
|
+
# pylint: disable=using-constant-test
|
|
143
|
+
def __await__(self):
|
|
144
|
+
if False:
|
|
145
|
+
yield self
|
|
146
|
+
return GetSecretResult(
|
|
147
|
+
data=self.data,
|
|
148
|
+
data_json=self.data_json,
|
|
149
|
+
id=self.id,
|
|
150
|
+
lease_duration=self.lease_duration,
|
|
151
|
+
lease_id=self.lease_id,
|
|
152
|
+
lease_renewable=self.lease_renewable,
|
|
153
|
+
lease_start_time=self.lease_start_time,
|
|
154
|
+
namespace=self.namespace,
|
|
155
|
+
path=self.path,
|
|
156
|
+
version=self.version,
|
|
157
|
+
with_lease_start_time=self.with_lease_start_time)
|
|
158
|
+
|
|
159
|
+
|
|
160
|
+
def get_secret(namespace: Optional[_builtins.str] = None,
|
|
161
|
+
path: Optional[_builtins.str] = None,
|
|
162
|
+
version: Optional[_builtins.int] = None,
|
|
163
|
+
with_lease_start_time: Optional[_builtins.bool] = None,
|
|
164
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecretResult:
|
|
165
|
+
"""
|
|
166
|
+
## Example Usage
|
|
167
|
+
|
|
168
|
+
### Generic secret
|
|
169
|
+
|
|
170
|
+
```python
|
|
171
|
+
import pulumi
|
|
172
|
+
import pulumi_vault as vault
|
|
173
|
+
|
|
174
|
+
rundeck_auth = vault.generic.get_secret(path="secret/rundeck_auth")
|
|
175
|
+
```
|
|
176
|
+
|
|
177
|
+
### KV
|
|
178
|
+
|
|
179
|
+
For this example, consider `example` as a path for a KV engine.
|
|
180
|
+
|
|
181
|
+
```python
|
|
182
|
+
import pulumi
|
|
183
|
+
import pulumi_vault as vault
|
|
184
|
+
|
|
185
|
+
|
|
186
|
+
def not_implemented(msg):
|
|
187
|
+
raise NotImplementedError(msg)
|
|
188
|
+
|
|
189
|
+
example_creds = vault.generic.get_secret(path="example/creds")
|
|
190
|
+
example_template = not_implemented("The template_file data resource is not yet supported.")
|
|
191
|
+
```
|
|
192
|
+
|
|
193
|
+
## Required Vault Capabilities
|
|
194
|
+
|
|
195
|
+
Use of this resource requires the `read` capability on the given path.
|
|
196
|
+
|
|
197
|
+
|
|
198
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
|
199
|
+
The value should not contain leading or trailing forward slashes.
|
|
200
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
201
|
+
*Available only for Vault Enterprise*.
|
|
202
|
+
:param _builtins.str path: The full logical path from which to request data.
|
|
203
|
+
To read data from the "generic" secret backend mounted in Vault by
|
|
204
|
+
default, this should be prefixed with `secret/`. Reading from other backends
|
|
205
|
+
with this data source is possible; consult each backend's documentation
|
|
206
|
+
to see which endpoints support the `GET` method.
|
|
207
|
+
:param _builtins.int version: The version of the secret to read. This is used by the
|
|
208
|
+
Vault KV secrets engine - version 2 to indicate which version of the secret
|
|
209
|
+
to read.
|
|
210
|
+
:param _builtins.bool with_lease_start_time: If set to true, stores `lease_start_time` in the TF state.
|
|
211
|
+
Note that storing the `lease_start_time` in the TF state will cause a persistent drift
|
|
212
|
+
on every `pulumi preview` and will require a `pulumi up`.
|
|
213
|
+
"""
|
|
214
|
+
__args__ = dict()
|
|
215
|
+
__args__['namespace'] = namespace
|
|
216
|
+
__args__['path'] = path
|
|
217
|
+
__args__['version'] = version
|
|
218
|
+
__args__['withLeaseStartTime'] = with_lease_start_time
|
|
219
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
|
220
|
+
__ret__ = pulumi.runtime.invoke('vault:generic/getSecret:getSecret', __args__, opts=opts, typ=GetSecretResult).value
|
|
221
|
+
|
|
222
|
+
return AwaitableGetSecretResult(
|
|
223
|
+
data=pulumi.get(__ret__, 'data'),
|
|
224
|
+
data_json=pulumi.get(__ret__, 'data_json'),
|
|
225
|
+
id=pulumi.get(__ret__, 'id'),
|
|
226
|
+
lease_duration=pulumi.get(__ret__, 'lease_duration'),
|
|
227
|
+
lease_id=pulumi.get(__ret__, 'lease_id'),
|
|
228
|
+
lease_renewable=pulumi.get(__ret__, 'lease_renewable'),
|
|
229
|
+
lease_start_time=pulumi.get(__ret__, 'lease_start_time'),
|
|
230
|
+
namespace=pulumi.get(__ret__, 'namespace'),
|
|
231
|
+
path=pulumi.get(__ret__, 'path'),
|
|
232
|
+
version=pulumi.get(__ret__, 'version'),
|
|
233
|
+
with_lease_start_time=pulumi.get(__ret__, 'with_lease_start_time'))
|
|
234
|
+
def get_secret_output(namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
|
235
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
|
236
|
+
version: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
|
|
237
|
+
with_lease_start_time: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
|
|
238
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecretResult]:
|
|
239
|
+
"""
|
|
240
|
+
## Example Usage
|
|
241
|
+
|
|
242
|
+
### Generic secret
|
|
243
|
+
|
|
244
|
+
```python
|
|
245
|
+
import pulumi
|
|
246
|
+
import pulumi_vault as vault
|
|
247
|
+
|
|
248
|
+
rundeck_auth = vault.generic.get_secret(path="secret/rundeck_auth")
|
|
249
|
+
```
|
|
250
|
+
|
|
251
|
+
### KV
|
|
252
|
+
|
|
253
|
+
For this example, consider `example` as a path for a KV engine.
|
|
254
|
+
|
|
255
|
+
```python
|
|
256
|
+
import pulumi
|
|
257
|
+
import pulumi_vault as vault
|
|
258
|
+
|
|
259
|
+
|
|
260
|
+
def not_implemented(msg):
|
|
261
|
+
raise NotImplementedError(msg)
|
|
262
|
+
|
|
263
|
+
example_creds = vault.generic.get_secret(path="example/creds")
|
|
264
|
+
example_template = not_implemented("The template_file data resource is not yet supported.")
|
|
265
|
+
```
|
|
266
|
+
|
|
267
|
+
## Required Vault Capabilities
|
|
268
|
+
|
|
269
|
+
Use of this resource requires the `read` capability on the given path.
|
|
270
|
+
|
|
271
|
+
|
|
272
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
|
273
|
+
The value should not contain leading or trailing forward slashes.
|
|
274
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
275
|
+
*Available only for Vault Enterprise*.
|
|
276
|
+
:param _builtins.str path: The full logical path from which to request data.
|
|
277
|
+
To read data from the "generic" secret backend mounted in Vault by
|
|
278
|
+
default, this should be prefixed with `secret/`. Reading from other backends
|
|
279
|
+
with this data source is possible; consult each backend's documentation
|
|
280
|
+
to see which endpoints support the `GET` method.
|
|
281
|
+
:param _builtins.int version: The version of the secret to read. This is used by the
|
|
282
|
+
Vault KV secrets engine - version 2 to indicate which version of the secret
|
|
283
|
+
to read.
|
|
284
|
+
:param _builtins.bool with_lease_start_time: If set to true, stores `lease_start_time` in the TF state.
|
|
285
|
+
Note that storing the `lease_start_time` in the TF state will cause a persistent drift
|
|
286
|
+
on every `pulumi preview` and will require a `pulumi up`.
|
|
287
|
+
"""
|
|
288
|
+
__args__ = dict()
|
|
289
|
+
__args__['namespace'] = namespace
|
|
290
|
+
__args__['path'] = path
|
|
291
|
+
__args__['version'] = version
|
|
292
|
+
__args__['withLeaseStartTime'] = with_lease_start_time
|
|
293
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
|
294
|
+
__ret__ = pulumi.runtime.invoke_output('vault:generic/getSecret:getSecret', __args__, opts=opts, typ=GetSecretResult)
|
|
295
|
+
return __ret__.apply(lambda __response__: GetSecretResult(
|
|
296
|
+
data=pulumi.get(__response__, 'data'),
|
|
297
|
+
data_json=pulumi.get(__response__, 'data_json'),
|
|
298
|
+
id=pulumi.get(__response__, 'id'),
|
|
299
|
+
lease_duration=pulumi.get(__response__, 'lease_duration'),
|
|
300
|
+
lease_id=pulumi.get(__response__, 'lease_id'),
|
|
301
|
+
lease_renewable=pulumi.get(__response__, 'lease_renewable'),
|
|
302
|
+
lease_start_time=pulumi.get(__response__, 'lease_start_time'),
|
|
303
|
+
namespace=pulumi.get(__response__, 'namespace'),
|
|
304
|
+
path=pulumi.get(__response__, 'path'),
|
|
305
|
+
version=pulumi.get(__response__, 'version'),
|
|
306
|
+
with_lease_start_time=pulumi.get(__response__, 'with_lease_start_time')))
|