pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736850018__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +22 -7
  5. pulumi_vault/ad/secret_backend.py +14 -144
  6. pulumi_vault/ad/secret_library.py +14 -11
  7. pulumi_vault/ad/secret_role.py +12 -11
  8. pulumi_vault/alicloud/auth_backend_role.py +74 -192
  9. pulumi_vault/approle/auth_backend_login.py +12 -11
  10. pulumi_vault/approle/auth_backend_role.py +75 -193
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
  13. pulumi_vault/audit.py +24 -27
  14. pulumi_vault/audit_request_header.py +11 -6
  15. pulumi_vault/auth_backend.py +64 -12
  16. pulumi_vault/aws/auth_backend_cert.py +12 -7
  17. pulumi_vault/aws/auth_backend_client.py +265 -24
  18. pulumi_vault/aws/auth_backend_config_identity.py +12 -11
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +75 -193
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
  24. pulumi_vault/aws/auth_backend_sts_role.py +12 -11
  25. pulumi_vault/aws/get_access_credentials.py +34 -7
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +75 -7
  28. pulumi_vault/aws/secret_backend_role.py +183 -11
  29. pulumi_vault/aws/secret_backend_static_role.py +14 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +151 -17
  32. pulumi_vault/azure/auth_backend_role.py +75 -193
  33. pulumi_vault/azure/backend.py +223 -29
  34. pulumi_vault/azure/backend_role.py +42 -41
  35. pulumi_vault/azure/get_access_credentials.py +39 -11
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -271
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +22 -25
  44. pulumi_vault/consul/secret_backend_role.py +14 -80
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +117 -114
  48. pulumi_vault/database/secret_backend_role.py +29 -24
  49. pulumi_vault/database/secret_backend_static_role.py +85 -15
  50. pulumi_vault/database/secrets_mount.py +425 -138
  51. pulumi_vault/egp_policy.py +16 -15
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +248 -35
  54. pulumi_vault/gcp/auth_backend_role.py +75 -271
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -9
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -16
  58. pulumi_vault/gcp/secret_impersonated_account.py +74 -17
  59. pulumi_vault/gcp/secret_roleset.py +29 -26
  60. pulumi_vault/gcp/secret_static_account.py +37 -34
  61. pulumi_vault/generic/endpoint.py +22 -21
  62. pulumi_vault/generic/get_secret.py +68 -12
  63. pulumi_vault/generic/secret.py +19 -14
  64. pulumi_vault/get_auth_backend.py +24 -11
  65. pulumi_vault/get_auth_backends.py +33 -11
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -15
  69. pulumi_vault/get_policy_document.py +34 -23
  70. pulumi_vault/get_raft_autopilot_state.py +29 -14
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +17 -16
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +14 -13
  75. pulumi_vault/github/user.py +14 -13
  76. pulumi_vault/identity/entity.py +18 -15
  77. pulumi_vault/identity/entity_alias.py +18 -15
  78. pulumi_vault/identity/entity_policies.py +24 -19
  79. pulumi_vault/identity/get_entity.py +40 -14
  80. pulumi_vault/identity/get_group.py +45 -13
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -11
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -13
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -14
  84. pulumi_vault/identity/group.py +50 -49
  85. pulumi_vault/identity/group_alias.py +14 -11
  86. pulumi_vault/identity/group_member_entity_ids.py +24 -74
  87. pulumi_vault/identity/group_member_group_ids.py +36 -27
  88. pulumi_vault/identity/group_policies.py +16 -15
  89. pulumi_vault/identity/mfa_duo.py +9 -8
  90. pulumi_vault/identity/mfa_login_enforcement.py +13 -8
  91. pulumi_vault/identity/mfa_okta.py +9 -8
  92. pulumi_vault/identity/mfa_pingid.py +5 -4
  93. pulumi_vault/identity/mfa_totp.py +5 -4
  94. pulumi_vault/identity/oidc.py +12 -11
  95. pulumi_vault/identity/oidc_assignment.py +22 -13
  96. pulumi_vault/identity/oidc_client.py +34 -25
  97. pulumi_vault/identity/oidc_key.py +28 -19
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
  99. pulumi_vault/identity/oidc_provider.py +34 -23
  100. pulumi_vault/identity/oidc_role.py +40 -27
  101. pulumi_vault/identity/oidc_scope.py +18 -15
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +39 -46
  105. pulumi_vault/jwt/auth_backend_role.py +131 -260
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +22 -21
  108. pulumi_vault/kmip/secret_role.py +12 -11
  109. pulumi_vault/kmip/secret_scope.py +12 -11
  110. pulumi_vault/kubernetes/auth_backend_config.py +55 -7
  111. pulumi_vault/kubernetes/auth_backend_role.py +68 -179
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -15
  115. pulumi_vault/kubernetes/secret_backend.py +314 -29
  116. pulumi_vault/kubernetes/secret_backend_role.py +135 -56
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +23 -12
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
  120. pulumi_vault/kv/get_secret_v2.py +89 -9
  121. pulumi_vault/kv/get_secrets_list.py +22 -15
  122. pulumi_vault/kv/get_secrets_list_v2.py +35 -19
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +19 -18
  125. pulumi_vault/kv/secret_backend_v2.py +12 -11
  126. pulumi_vault/kv/secret_v2.py +55 -52
  127. pulumi_vault/ldap/auth_backend.py +125 -168
  128. pulumi_vault/ldap/auth_backend_group.py +12 -11
  129. pulumi_vault/ldap/auth_backend_user.py +12 -11
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +352 -84
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +14 -11
  135. pulumi_vault/ldap/secret_backend_static_role.py +67 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +27 -43
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +16 -13
  140. pulumi_vault/mfa_okta.py +16 -13
  141. pulumi_vault/mfa_pingid.py +16 -13
  142. pulumi_vault/mfa_totp.py +22 -19
  143. pulumi_vault/mongodbatlas/secret_backend.py +18 -17
  144. pulumi_vault/mongodbatlas/secret_role.py +41 -38
  145. pulumi_vault/mount.py +389 -65
  146. pulumi_vault/namespace.py +26 -21
  147. pulumi_vault/nomad_secret_backend.py +16 -15
  148. pulumi_vault/nomad_secret_role.py +12 -11
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +483 -41
  151. pulumi_vault/okta/auth_backend_group.py +12 -11
  152. pulumi_vault/okta/auth_backend_user.py +12 -11
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +18 -15
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -13
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -12
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
  174. pulumi_vault/pkisecret/secret_backend_key.py +12 -7
  175. pulumi_vault/pkisecret/secret_backend_role.py +19 -16
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +12 -7
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +58 -8
  185. pulumi_vault/quota_rate_limit.py +54 -4
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +16 -15
  189. pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
  190. pulumi_vault/raft_autopilot.py +12 -11
  191. pulumi_vault/raft_snapshot_agent_config.py +121 -311
  192. pulumi_vault/rgp_policy.py +14 -13
  193. pulumi_vault/saml/auth_backend.py +20 -19
  194. pulumi_vault/saml/auth_backend_role.py +90 -199
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -75
  199. pulumi_vault/secrets/sync_aws_destination.py +240 -29
  200. pulumi_vault/secrets/sync_azure_destination.py +90 -33
  201. pulumi_vault/secrets/sync_config.py +7 -6
  202. pulumi_vault/secrets/sync_gcp_destination.py +156 -27
  203. pulumi_vault/secrets/sync_gh_destination.py +187 -15
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +72 -15
  206. pulumi_vault/ssh/_inputs.py +28 -32
  207. pulumi_vault/ssh/outputs.py +11 -32
  208. pulumi_vault/ssh/secret_backend_ca.py +106 -11
  209. pulumi_vault/ssh/secret_backend_role.py +83 -120
  210. pulumi_vault/terraformcloud/secret_backend.py +5 -56
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -24
  212. pulumi_vault/terraformcloud/secret_role.py +14 -76
  213. pulumi_vault/token.py +26 -25
  214. pulumi_vault/tokenauth/auth_backend_role.py +76 -201
  215. pulumi_vault/transform/alphabet.py +16 -13
  216. pulumi_vault/transform/get_decode.py +45 -21
  217. pulumi_vault/transform/get_encode.py +45 -21
  218. pulumi_vault/transform/role.py +16 -13
  219. pulumi_vault/transform/template.py +30 -25
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -25
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +25 -97
  224. pulumi_vault/transit/secret_cache_config.py +12 -11
  225. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736850018.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['EgpPolicyArgs', 'EgpPolicy']
@@ -27,7 +32,7 @@ class EgpPolicyArgs:
27
32
  :param pulumi.Input[str] name: The name of the policy
28
33
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
29
34
  The value should not contain leading or trailing forward slashes.
30
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
35
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
31
36
  *Available only for Vault Enterprise*.
32
37
  """
33
38
  pulumi.set(__self__, "enforcement_level", enforcement_level)
@@ -92,7 +97,7 @@ class EgpPolicyArgs:
92
97
  """
93
98
  The namespace to provision the resource in.
94
99
  The value should not contain leading or trailing forward slashes.
95
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
100
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
96
101
  *Available only for Vault Enterprise*.
97
102
  """
98
103
  return pulumi.get(self, "namespace")
@@ -116,7 +121,7 @@ class _EgpPolicyState:
116
121
  :param pulumi.Input[str] name: The name of the policy
117
122
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
118
123
  The value should not contain leading or trailing forward slashes.
119
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
124
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
120
125
  *Available only for Vault Enterprise*.
121
126
  :param pulumi.Input[Sequence[pulumi.Input[str]]] paths: List of paths to which the policy will be applied to
122
127
  :param pulumi.Input[str] policy: String containing a Sentinel policy
@@ -162,7 +167,7 @@ class _EgpPolicyState:
162
167
  """
163
168
  The namespace to provision the resource in.
164
169
  The value should not contain leading or trailing forward slashes.
165
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
170
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
166
171
  *Available only for Vault Enterprise*.
167
172
  """
168
173
  return pulumi.get(self, "namespace")
@@ -214,21 +219,19 @@ class EgpPolicy(pulumi.CustomResource):
214
219
 
215
220
  ## Example Usage
216
221
 
217
- <!--Start PulumiCodeChooser -->
218
222
  ```python
219
223
  import pulumi
220
224
  import pulumi_vault as vault
221
225
 
222
226
  allow_all = vault.EgpPolicy("allow-all",
223
- enforcement_level="soft-mandatory",
227
+ name="allow-all",
224
228
  paths=["*"],
229
+ enforcement_level="soft-mandatory",
225
230
  policy=\"\"\"main = rule {
226
231
  true
227
232
  }
228
-
229
233
  \"\"\")
230
234
  ```
231
- <!--End PulumiCodeChooser -->
232
235
 
233
236
  :param str resource_name: The name of the resource.
234
237
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -236,7 +239,7 @@ class EgpPolicy(pulumi.CustomResource):
236
239
  :param pulumi.Input[str] name: The name of the policy
237
240
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
238
241
  The value should not contain leading or trailing forward slashes.
239
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
242
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
240
243
  *Available only for Vault Enterprise*.
241
244
  :param pulumi.Input[Sequence[pulumi.Input[str]]] paths: List of paths to which the policy will be applied to
242
245
  :param pulumi.Input[str] policy: String containing a Sentinel policy
@@ -254,21 +257,19 @@ class EgpPolicy(pulumi.CustomResource):
254
257
 
255
258
  ## Example Usage
256
259
 
257
- <!--Start PulumiCodeChooser -->
258
260
  ```python
259
261
  import pulumi
260
262
  import pulumi_vault as vault
261
263
 
262
264
  allow_all = vault.EgpPolicy("allow-all",
263
- enforcement_level="soft-mandatory",
265
+ name="allow-all",
264
266
  paths=["*"],
267
+ enforcement_level="soft-mandatory",
265
268
  policy=\"\"\"main = rule {
266
269
  true
267
270
  }
268
-
269
271
  \"\"\")
270
272
  ```
271
- <!--End PulumiCodeChooser -->
272
273
 
273
274
  :param str resource_name: The name of the resource.
274
275
  :param EgpPolicyArgs args: The arguments to use to populate this resource's properties.
@@ -336,7 +337,7 @@ class EgpPolicy(pulumi.CustomResource):
336
337
  :param pulumi.Input[str] name: The name of the policy
337
338
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
338
339
  The value should not contain leading or trailing forward slashes.
339
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
340
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
340
341
  *Available only for Vault Enterprise*.
341
342
  :param pulumi.Input[Sequence[pulumi.Input[str]]] paths: List of paths to which the policy will be applied to
342
343
  :param pulumi.Input[str] policy: String containing a Sentinel policy
@@ -374,7 +375,7 @@ class EgpPolicy(pulumi.CustomResource):
374
375
  """
375
376
  The namespace to provision the resource in.
376
377
  The value should not contain leading or trailing forward slashes.
377
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
378
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
378
379
  *Available only for Vault Enterprise*.
379
380
  """
380
381
  return pulumi.get(self, "namespace")
@@ -4,18 +4,53 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
13
18
  'AuthBackendCustomEndpointArgs',
19
+ 'AuthBackendCustomEndpointArgsDict',
14
20
  'AuthBackendTuneArgs',
21
+ 'AuthBackendTuneArgsDict',
15
22
  'SecretRolesetBindingArgs',
23
+ 'SecretRolesetBindingArgsDict',
16
24
  'SecretStaticAccountBindingArgs',
25
+ 'SecretStaticAccountBindingArgsDict',
17
26
  ]
18
27
 
28
+ MYPY = False
29
+
30
+ if not MYPY:
31
+ class AuthBackendCustomEndpointArgsDict(TypedDict):
32
+ api: NotRequired[pulumi.Input[str]]
33
+ """
34
+ Replaces the service endpoint used in API requests to `https://www.googleapis.com`.
35
+ """
36
+ compute: NotRequired[pulumi.Input[str]]
37
+ """
38
+ Replaces the service endpoint used in API requests to `https://compute.googleapis.com`.
39
+
40
+ The endpoint value provided for a given key has the form of `scheme://host:port`.
41
+ The `scheme://` and `:port` portions of the endpoint value are optional.
42
+ """
43
+ crm: NotRequired[pulumi.Input[str]]
44
+ """
45
+ Replaces the service endpoint used in API requests to `https://cloudresourcemanager.googleapis.com`.
46
+ """
47
+ iam: NotRequired[pulumi.Input[str]]
48
+ """
49
+ Replaces the service endpoint used in API requests to `https://iam.googleapis.com`.
50
+ """
51
+ elif False:
52
+ AuthBackendCustomEndpointArgsDict: TypeAlias = Mapping[str, Any]
53
+
19
54
  @pulumi.input_type
20
55
  class AuthBackendCustomEndpointArgs:
21
56
  def __init__(__self__, *,
@@ -93,6 +128,56 @@ class AuthBackendCustomEndpointArgs:
93
128
  pulumi.set(self, "iam", value)
94
129
 
95
130
 
131
+ if not MYPY:
132
+ class AuthBackendTuneArgsDict(TypedDict):
133
+ allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
134
+ """
135
+ List of headers to whitelist and allowing
136
+ a plugin to include them in the response.
137
+ """
138
+ audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
139
+ """
140
+ Specifies the list of keys that will
141
+ not be HMAC'd by audit devices in the request data object.
142
+ """
143
+ audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
144
+ """
145
+ Specifies the list of keys that will
146
+ not be HMAC'd by audit devices in the response data object.
147
+ """
148
+ default_lease_ttl: NotRequired[pulumi.Input[str]]
149
+ """
150
+ Specifies the default time-to-live.
151
+ If set, this overrides the global default.
152
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
153
+ """
154
+ listing_visibility: NotRequired[pulumi.Input[str]]
155
+ """
156
+ Specifies whether to show this mount in
157
+ the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
158
+ """
159
+ max_lease_ttl: NotRequired[pulumi.Input[str]]
160
+ """
161
+ Specifies the maximum time-to-live.
162
+ If set, this overrides the global default.
163
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
164
+ """
165
+ passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
166
+ """
167
+ List of headers to whitelist and
168
+ pass from the request to the backend.
169
+ """
170
+ token_type: NotRequired[pulumi.Input[str]]
171
+ """
172
+ Specifies the type of tokens that should be returned by
173
+ the mount. Valid values are "default-service", "default-batch", "service", "batch".
174
+
175
+
176
+ For more details on the usage of each argument consult the [Vault GCP API documentation](https://www.vaultproject.io/api-docs/auth/gcp#configure).
177
+ """
178
+ elif False:
179
+ AuthBackendTuneArgsDict: TypeAlias = Mapping[str, Any]
180
+
96
181
  @pulumi.input_type
97
182
  class AuthBackendTuneArgs:
98
183
  def __init__(__self__, *,
@@ -254,6 +339,19 @@ class AuthBackendTuneArgs:
254
339
  pulumi.set(self, "token_type", value)
255
340
 
256
341
 
342
+ if not MYPY:
343
+ class SecretRolesetBindingArgsDict(TypedDict):
344
+ resource: pulumi.Input[str]
345
+ """
346
+ Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different [formats](https://www.vaultproject.io/docs/secrets/gcp/index.html#roleset-bindings).
347
+ """
348
+ roles: pulumi.Input[Sequence[pulumi.Input[str]]]
349
+ """
350
+ List of [GCP IAM roles](https://cloud.google.com/iam/docs/understanding-roles) for the resource.
351
+ """
352
+ elif False:
353
+ SecretRolesetBindingArgsDict: TypeAlias = Mapping[str, Any]
354
+
257
355
  @pulumi.input_type
258
356
  class SecretRolesetBindingArgs:
259
357
  def __init__(__self__, *,
@@ -291,6 +389,19 @@ class SecretRolesetBindingArgs:
291
389
  pulumi.set(self, "roles", value)
292
390
 
293
391
 
392
+ if not MYPY:
393
+ class SecretStaticAccountBindingArgsDict(TypedDict):
394
+ resource: pulumi.Input[str]
395
+ """
396
+ Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different [formats](https://www.vaultproject.io/docs/secrets/gcp/index.html#bindings).
397
+ """
398
+ roles: pulumi.Input[Sequence[pulumi.Input[str]]]
399
+ """
400
+ List of [GCP IAM roles](https://cloud.google.com/iam/docs/understanding-roles) for the resource.
401
+ """
402
+ elif False:
403
+ SecretStaticAccountBindingArgsDict: TypeAlias = Mapping[str, Any]
404
+
294
405
  @pulumi.input_type
295
406
  class SecretStaticAccountBindingArgs:
296
407
  def __init__(__self__, *,