pulumi-vault 6.3.0a1723010642__py3-none-any.whl → 6.3.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (226) hide show
  1. pulumi_vault/_inputs.py +560 -0
  2. pulumi_vault/_utilities.py +1 -1
  3. pulumi_vault/ad/get_access_credentials.py +19 -4
  4. pulumi_vault/ad/secret_backend.py +5 -0
  5. pulumi_vault/ad/secret_library.py +5 -0
  6. pulumi_vault/ad/secret_role.py +5 -0
  7. pulumi_vault/alicloud/auth_backend_role.py +5 -0
  8. pulumi_vault/approle/auth_backend_login.py +5 -0
  9. pulumi_vault/approle/auth_backend_role.py +5 -0
  10. pulumi_vault/approle/auth_backend_role_secret_id.py +5 -0
  11. pulumi_vault/approle/get_auth_backend_role_id.py +17 -4
  12. pulumi_vault/audit.py +5 -0
  13. pulumi_vault/audit_request_header.py +5 -0
  14. pulumi_vault/auth_backend.py +10 -5
  15. pulumi_vault/aws/auth_backend_cert.py +5 -0
  16. pulumi_vault/aws/auth_backend_client.py +5 -0
  17. pulumi_vault/aws/auth_backend_config_identity.py +5 -0
  18. pulumi_vault/aws/auth_backend_identity_whitelist.py +5 -0
  19. pulumi_vault/aws/auth_backend_login.py +12 -7
  20. pulumi_vault/aws/auth_backend_role.py +5 -0
  21. pulumi_vault/aws/auth_backend_role_tag.py +5 -0
  22. pulumi_vault/aws/auth_backend_roletag_blacklist.py +5 -0
  23. pulumi_vault/aws/auth_backend_sts_role.py +5 -0
  24. pulumi_vault/aws/get_access_credentials.py +31 -4
  25. pulumi_vault/aws/get_static_access_credentials.py +18 -4
  26. pulumi_vault/aws/secret_backend.py +5 -0
  27. pulumi_vault/aws/secret_backend_role.py +120 -0
  28. pulumi_vault/aws/secret_backend_static_role.py +5 -0
  29. pulumi_vault/azure/_inputs.py +24 -0
  30. pulumi_vault/azure/auth_backend_config.py +5 -0
  31. pulumi_vault/azure/auth_backend_role.py +5 -0
  32. pulumi_vault/azure/backend.py +5 -0
  33. pulumi_vault/azure/backend_role.py +23 -18
  34. pulumi_vault/azure/get_access_credentials.py +36 -4
  35. pulumi_vault/azure/outputs.py +5 -0
  36. pulumi_vault/cert_auth_backend_role.py +5 -0
  37. pulumi_vault/config/__init__.pyi +5 -0
  38. pulumi_vault/config/_inputs.py +21 -0
  39. pulumi_vault/config/outputs.py +5 -0
  40. pulumi_vault/config/ui_custom_message.py +24 -19
  41. pulumi_vault/config/vars.py +5 -0
  42. pulumi_vault/consul/secret_backend.py +5 -0
  43. pulumi_vault/consul/secret_backend_role.py +5 -0
  44. pulumi_vault/database/_inputs.py +2091 -140
  45. pulumi_vault/database/outputs.py +59 -54
  46. pulumi_vault/database/secret_backend_connection.py +115 -110
  47. pulumi_vault/database/secret_backend_role.py +25 -20
  48. pulumi_vault/database/secret_backend_static_role.py +11 -6
  49. pulumi_vault/database/secrets_mount.py +139 -134
  50. pulumi_vault/egp_policy.py +5 -0
  51. pulumi_vault/gcp/_inputs.py +111 -0
  52. pulumi_vault/gcp/auth_backend.py +15 -10
  53. pulumi_vault/gcp/auth_backend_role.py +5 -0
  54. pulumi_vault/gcp/get_auth_backend_role.py +42 -4
  55. pulumi_vault/gcp/outputs.py +5 -0
  56. pulumi_vault/gcp/secret_backend.py +5 -0
  57. pulumi_vault/gcp/secret_impersonated_account.py +5 -0
  58. pulumi_vault/gcp/secret_roleset.py +18 -13
  59. pulumi_vault/gcp/secret_static_account.py +18 -13
  60. pulumi_vault/generic/endpoint.py +5 -0
  61. pulumi_vault/generic/get_secret.py +25 -5
  62. pulumi_vault/generic/secret.py +12 -7
  63. pulumi_vault/get_auth_backend.py +21 -4
  64. pulumi_vault/get_auth_backends.py +16 -4
  65. pulumi_vault/get_namespace.py +18 -5
  66. pulumi_vault/get_namespaces.py +13 -4
  67. pulumi_vault/get_nomad_access_token.py +28 -8
  68. pulumi_vault/get_policy_document.py +27 -16
  69. pulumi_vault/get_raft_autopilot_state.py +26 -7
  70. pulumi_vault/github/_inputs.py +55 -0
  71. pulumi_vault/github/auth_backend.py +10 -5
  72. pulumi_vault/github/outputs.py +5 -0
  73. pulumi_vault/github/team.py +5 -0
  74. pulumi_vault/github/user.py +5 -0
  75. pulumi_vault/identity/entity.py +5 -0
  76. pulumi_vault/identity/entity_alias.py +5 -0
  77. pulumi_vault/identity/entity_policies.py +5 -0
  78. pulumi_vault/identity/get_entity.py +37 -7
  79. pulumi_vault/identity/get_group.py +42 -6
  80. pulumi_vault/identity/get_oidc_client_creds.py +16 -4
  81. pulumi_vault/identity/get_oidc_openid_config.py +26 -4
  82. pulumi_vault/identity/get_oidc_public_keys.py +16 -5
  83. pulumi_vault/identity/group.py +5 -0
  84. pulumi_vault/identity/group_alias.py +5 -0
  85. pulumi_vault/identity/group_member_entity_ids.py +5 -0
  86. pulumi_vault/identity/group_member_group_ids.py +5 -0
  87. pulumi_vault/identity/group_policies.py +5 -0
  88. pulumi_vault/identity/mfa_duo.py +5 -0
  89. pulumi_vault/identity/mfa_login_enforcement.py +5 -0
  90. pulumi_vault/identity/mfa_okta.py +5 -0
  91. pulumi_vault/identity/mfa_pingid.py +5 -0
  92. pulumi_vault/identity/mfa_totp.py +5 -0
  93. pulumi_vault/identity/oidc.py +5 -0
  94. pulumi_vault/identity/oidc_assignment.py +5 -0
  95. pulumi_vault/identity/oidc_client.py +5 -0
  96. pulumi_vault/identity/oidc_key.py +5 -0
  97. pulumi_vault/identity/oidc_key_allowed_client_id.py +5 -0
  98. pulumi_vault/identity/oidc_provider.py +5 -0
  99. pulumi_vault/identity/oidc_role.py +5 -0
  100. pulumi_vault/identity/oidc_scope.py +5 -0
  101. pulumi_vault/identity/outputs.py +8 -3
  102. pulumi_vault/jwt/_inputs.py +55 -0
  103. pulumi_vault/jwt/auth_backend.py +14 -9
  104. pulumi_vault/jwt/auth_backend_role.py +33 -28
  105. pulumi_vault/jwt/outputs.py +5 -0
  106. pulumi_vault/kmip/secret_backend.py +5 -0
  107. pulumi_vault/kmip/secret_role.py +5 -0
  108. pulumi_vault/kmip/secret_scope.py +5 -0
  109. pulumi_vault/kubernetes/auth_backend_config.py +5 -0
  110. pulumi_vault/kubernetes/auth_backend_role.py +5 -0
  111. pulumi_vault/kubernetes/get_auth_backend_config.py +26 -4
  112. pulumi_vault/kubernetes/get_auth_backend_role.py +39 -4
  113. pulumi_vault/kubernetes/get_service_account_token.py +28 -4
  114. pulumi_vault/kubernetes/secret_backend.py +19 -14
  115. pulumi_vault/kubernetes/secret_backend_role.py +5 -0
  116. pulumi_vault/kv/_inputs.py +36 -4
  117. pulumi_vault/kv/get_secret.py +20 -5
  118. pulumi_vault/kv/get_secret_subkeys_v2.py +24 -5
  119. pulumi_vault/kv/get_secret_v2.py +27 -6
  120. pulumi_vault/kv/get_secrets_list.py +15 -4
  121. pulumi_vault/kv/get_secrets_list_v2.py +18 -4
  122. pulumi_vault/kv/outputs.py +8 -3
  123. pulumi_vault/kv/secret.py +12 -7
  124. pulumi_vault/kv/secret_backend_v2.py +5 -0
  125. pulumi_vault/kv/secret_v2.py +46 -41
  126. pulumi_vault/ldap/auth_backend.py +5 -0
  127. pulumi_vault/ldap/auth_backend_group.py +5 -0
  128. pulumi_vault/ldap/auth_backend_user.py +5 -0
  129. pulumi_vault/ldap/get_dynamic_credentials.py +22 -4
  130. pulumi_vault/ldap/get_static_credentials.py +23 -4
  131. pulumi_vault/ldap/secret_backend.py +19 -14
  132. pulumi_vault/ldap/secret_backend_dynamic_role.py +5 -0
  133. pulumi_vault/ldap/secret_backend_library_set.py +5 -0
  134. pulumi_vault/ldap/secret_backend_static_role.py +5 -0
  135. pulumi_vault/managed/_inputs.py +205 -0
  136. pulumi_vault/managed/keys.py +20 -15
  137. pulumi_vault/managed/outputs.py +5 -0
  138. pulumi_vault/mfa_duo.py +5 -0
  139. pulumi_vault/mfa_okta.py +5 -0
  140. pulumi_vault/mfa_pingid.py +5 -0
  141. pulumi_vault/mfa_totp.py +5 -0
  142. pulumi_vault/mongodbatlas/secret_backend.py +5 -0
  143. pulumi_vault/mongodbatlas/secret_role.py +5 -0
  144. pulumi_vault/mount.py +35 -23
  145. pulumi_vault/namespace.py +19 -14
  146. pulumi_vault/nomad_secret_backend.py +5 -0
  147. pulumi_vault/nomad_secret_role.py +5 -0
  148. pulumi_vault/okta/_inputs.py +39 -0
  149. pulumi_vault/okta/auth_backend.py +31 -26
  150. pulumi_vault/okta/auth_backend_group.py +5 -0
  151. pulumi_vault/okta/auth_backend_user.py +5 -0
  152. pulumi_vault/okta/outputs.py +5 -0
  153. pulumi_vault/outputs.py +5 -0
  154. pulumi_vault/password_policy.py +5 -0
  155. pulumi_vault/pkisecret/_inputs.py +49 -8
  156. pulumi_vault/pkisecret/backend_config_cluster.py +5 -0
  157. pulumi_vault/pkisecret/backend_config_est.py +24 -19
  158. pulumi_vault/pkisecret/get_backend_config_est.py +23 -5
  159. pulumi_vault/pkisecret/get_backend_issuer.py +24 -4
  160. pulumi_vault/pkisecret/get_backend_issuers.py +18 -5
  161. pulumi_vault/pkisecret/get_backend_key.py +19 -4
  162. pulumi_vault/pkisecret/get_backend_keys.py +18 -5
  163. pulumi_vault/pkisecret/outputs.py +17 -12
  164. pulumi_vault/pkisecret/secret_backend_cert.py +5 -0
  165. pulumi_vault/pkisecret/secret_backend_config_ca.py +5 -0
  166. pulumi_vault/pkisecret/secret_backend_config_issuers.py +5 -0
  167. pulumi_vault/pkisecret/secret_backend_config_urls.py +5 -0
  168. pulumi_vault/pkisecret/secret_backend_crl_config.py +5 -0
  169. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +5 -0
  170. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +5 -0
  171. pulumi_vault/pkisecret/secret_backend_issuer.py +5 -0
  172. pulumi_vault/pkisecret/secret_backend_key.py +5 -0
  173. pulumi_vault/pkisecret/secret_backend_role.py +10 -5
  174. pulumi_vault/pkisecret/secret_backend_root_cert.py +5 -0
  175. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +5 -0
  176. pulumi_vault/pkisecret/secret_backend_sign.py +5 -0
  177. pulumi_vault/plugin.py +5 -0
  178. pulumi_vault/plugin_pinned_version.py +5 -0
  179. pulumi_vault/policy.py +5 -0
  180. pulumi_vault/provider.py +47 -42
  181. pulumi_vault/pulumi-plugin.json +1 -1
  182. pulumi_vault/quota_lease_count.py +5 -0
  183. pulumi_vault/quota_rate_limit.py +5 -0
  184. pulumi_vault/rabbitmq/_inputs.py +61 -0
  185. pulumi_vault/rabbitmq/outputs.py +5 -0
  186. pulumi_vault/rabbitmq/secret_backend.py +5 -0
  187. pulumi_vault/rabbitmq/secret_backend_role.py +43 -38
  188. pulumi_vault/raft_autopilot.py +5 -0
  189. pulumi_vault/raft_snapshot_agent_config.py +5 -0
  190. pulumi_vault/rgp_policy.py +5 -0
  191. pulumi_vault/saml/auth_backend.py +5 -0
  192. pulumi_vault/saml/auth_backend_role.py +19 -14
  193. pulumi_vault/secrets/_inputs.py +30 -0
  194. pulumi_vault/secrets/outputs.py +5 -0
  195. pulumi_vault/secrets/sync_association.py +7 -2
  196. pulumi_vault/secrets/sync_aws_destination.py +19 -14
  197. pulumi_vault/secrets/sync_azure_destination.py +19 -14
  198. pulumi_vault/secrets/sync_config.py +5 -0
  199. pulumi_vault/secrets/sync_gcp_destination.py +19 -14
  200. pulumi_vault/secrets/sync_gh_destination.py +5 -0
  201. pulumi_vault/secrets/sync_github_apps.py +5 -0
  202. pulumi_vault/secrets/sync_vercel_destination.py +5 -0
  203. pulumi_vault/ssh/_inputs.py +22 -0
  204. pulumi_vault/ssh/outputs.py +5 -0
  205. pulumi_vault/ssh/secret_backend_ca.py +5 -0
  206. pulumi_vault/ssh/secret_backend_role.py +38 -33
  207. pulumi_vault/terraformcloud/secret_backend.py +5 -0
  208. pulumi_vault/terraformcloud/secret_creds.py +5 -0
  209. pulumi_vault/terraformcloud/secret_role.py +5 -0
  210. pulumi_vault/token.py +5 -0
  211. pulumi_vault/tokenauth/auth_backend_role.py +5 -14
  212. pulumi_vault/transform/alphabet.py +5 -0
  213. pulumi_vault/transform/get_decode.py +38 -14
  214. pulumi_vault/transform/get_encode.py +38 -14
  215. pulumi_vault/transform/role.py +5 -0
  216. pulumi_vault/transform/template.py +19 -14
  217. pulumi_vault/transform/transformation.py +5 -0
  218. pulumi_vault/transit/get_decrypt.py +21 -4
  219. pulumi_vault/transit/get_encrypt.py +23 -4
  220. pulumi_vault/transit/secret_backend_key.py +12 -7
  221. pulumi_vault/transit/secret_cache_config.py +5 -0
  222. {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/METADATA +3 -2
  223. pulumi_vault-6.3.1.dist-info/RECORD +256 -0
  224. {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/WHEEL +1 -1
  225. pulumi_vault-6.3.0a1723010642.dist-info/RECORD +0 -256
  226. {pulumi_vault-6.3.0a1723010642.dist-info → pulumi_vault-6.3.1.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
  from . import outputs
12
17
  from ._inputs import *
@@ -42,7 +47,7 @@ class SecretsMountArgs:
42
47
  mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]] = None,
43
48
  mysqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]] = None,
44
49
  namespace: Optional[pulumi.Input[str]] = None,
45
- options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
50
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
46
51
  oracles: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]] = None,
47
52
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
48
53
  plugin_version: Optional[pulumi.Input[str]] = None,
@@ -94,7 +99,7 @@ class SecretsMountArgs:
94
99
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]] mysqls: A nested block containing configuration options for MySQL connections.
95
100
  *See Configuration Options for more info*
96
101
  :param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
97
- :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
102
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
98
103
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]] oracles: A nested block containing configuration options for Oracle connections.
99
104
  *See Configuration Options for more info*
100
105
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
@@ -511,14 +516,14 @@ class SecretsMountArgs:
511
516
 
512
517
  @property
513
518
  @pulumi.getter
514
- def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
519
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
515
520
  """
516
521
  Specifies mount type specific options that are passed to the backend
517
522
  """
518
523
  return pulumi.get(self, "options")
519
524
 
520
525
  @options.setter
521
- def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
526
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
522
527
  pulumi.set(self, "options", value)
523
528
 
524
529
  @property
@@ -666,7 +671,7 @@ class _SecretsMountState:
666
671
  mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlRdArgs']]]] = None,
667
672
  mysqls: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]]] = None,
668
673
  namespace: Optional[pulumi.Input[str]] = None,
669
- options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
674
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
670
675
  oracles: Optional[pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]]] = None,
671
676
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
672
677
  path: Optional[pulumi.Input[str]] = None,
@@ -720,7 +725,7 @@ class _SecretsMountState:
720
725
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountMysqlArgs']]] mysqls: A nested block containing configuration options for MySQL connections.
721
726
  *See Configuration Options for more info*
722
727
  :param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
723
- :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
728
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
724
729
  :param pulumi.Input[Sequence[pulumi.Input['SecretsMountOracleArgs']]] oracles: A nested block containing configuration options for Oracle connections.
725
730
  *See Configuration Options for more info*
726
731
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
@@ -1155,14 +1160,14 @@ class _SecretsMountState:
1155
1160
 
1156
1161
  @property
1157
1162
  @pulumi.getter
1158
- def options(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
1163
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
1159
1164
  """
1160
1165
  Specifies mount type specific options that are passed to the backend
1161
1166
  """
1162
1167
  return pulumi.get(self, "options")
1163
1168
 
1164
1169
  @options.setter
1165
- def options(self, value: Optional[pulumi.Input[Mapping[str, Any]]]):
1170
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
1166
1171
  pulumi.set(self, "options", value)
1167
1172
 
1168
1173
  @property
@@ -1301,38 +1306,38 @@ class SecretsMount(pulumi.CustomResource):
1301
1306
  allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1302
1307
  audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1303
1308
  audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1304
- cassandras: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountCassandraArgs']]]]] = None,
1305
- couchbases: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountCouchbaseArgs']]]]] = None,
1309
+ cassandras: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCassandraArgs', 'SecretsMountCassandraArgsDict']]]]] = None,
1310
+ couchbases: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCouchbaseArgs', 'SecretsMountCouchbaseArgsDict']]]]] = None,
1306
1311
  default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1307
1312
  delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1308
1313
  description: Optional[pulumi.Input[str]] = None,
1309
- elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountElasticsearchArgs']]]]] = None,
1314
+ elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountElasticsearchArgs', 'SecretsMountElasticsearchArgsDict']]]]] = None,
1310
1315
  external_entropy_access: Optional[pulumi.Input[bool]] = None,
1311
- hanas: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountHanaArgs']]]]] = None,
1316
+ hanas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountHanaArgs', 'SecretsMountHanaArgsDict']]]]] = None,
1312
1317
  identity_token_key: Optional[pulumi.Input[str]] = None,
1313
- influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountInfluxdbArgs']]]]] = None,
1318
+ influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountInfluxdbArgs', 'SecretsMountInfluxdbArgsDict']]]]] = None,
1314
1319
  listing_visibility: Optional[pulumi.Input[str]] = None,
1315
1320
  local: Optional[pulumi.Input[bool]] = None,
1316
1321
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1317
- mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMongodbatlaArgs']]]]] = None,
1318
- mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMongodbArgs']]]]] = None,
1319
- mssqls: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMssqlArgs']]]]] = None,
1320
- mysql_auroras: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMysqlAuroraArgs']]]]] = None,
1321
- mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMysqlLegacyArgs']]]]] = None,
1322
- mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMysqlRdArgs']]]]] = None,
1323
- mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMysqlArgs']]]]] = None,
1322
+ mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbatlaArgs', 'SecretsMountMongodbatlaArgsDict']]]]] = None,
1323
+ mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbArgs', 'SecretsMountMongodbArgsDict']]]]] = None,
1324
+ mssqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMssqlArgs', 'SecretsMountMssqlArgsDict']]]]] = None,
1325
+ mysql_auroras: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlAuroraArgs', 'SecretsMountMysqlAuroraArgsDict']]]]] = None,
1326
+ mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlLegacyArgs', 'SecretsMountMysqlLegacyArgsDict']]]]] = None,
1327
+ mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]]] = None,
1328
+ mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]]] = None,
1324
1329
  namespace: Optional[pulumi.Input[str]] = None,
1325
- options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1326
- oracles: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountOracleArgs']]]]] = None,
1330
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1331
+ oracles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]]] = None,
1327
1332
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1328
1333
  path: Optional[pulumi.Input[str]] = None,
1329
1334
  plugin_version: Optional[pulumi.Input[str]] = None,
1330
- postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountPostgresqlArgs']]]]] = None,
1331
- redis: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountRediArgs']]]]] = None,
1332
- redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountRedisElasticachArgs']]]]] = None,
1333
- redshifts: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountRedshiftArgs']]]]] = None,
1335
+ postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountPostgresqlArgs', 'SecretsMountPostgresqlArgsDict']]]]] = None,
1336
+ redis: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRediArgs', 'SecretsMountRediArgsDict']]]]] = None,
1337
+ redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedisElasticachArgs', 'SecretsMountRedisElasticachArgsDict']]]]] = None,
1338
+ redshifts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedshiftArgs', 'SecretsMountRedshiftArgsDict']]]]] = None,
1334
1339
  seal_wrap: Optional[pulumi.Input[bool]] = None,
1335
- snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountSnowflakeArgs']]]]] = None,
1340
+ snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountSnowflakeArgs', 'SecretsMountSnowflakeArgsDict']]]]] = None,
1336
1341
  __props__=None):
1337
1342
  """
1338
1343
  ## Example Usage
@@ -1343,21 +1348,21 @@ class SecretsMount(pulumi.CustomResource):
1343
1348
 
1344
1349
  db = vault.database.SecretsMount("db",
1345
1350
  path="db",
1346
- mssqls=[vault.database.SecretsMountMssqlArgs(
1347
- name="db1",
1348
- username="sa",
1349
- password="super_secret_1",
1350
- connection_url="sqlserver://{{username}}:{{password}}@127.0.0.1:1433",
1351
- allowed_roles=["dev1"],
1352
- )],
1353
- postgresqls=[vault.database.SecretsMountPostgresqlArgs(
1354
- name="db2",
1355
- username="postgres",
1356
- password="super_secret_2",
1357
- connection_url="postgresql://{{username}}:{{password}}@127.0.0.1:5432/postgres",
1358
- verify_connection=True,
1359
- allowed_roles=["dev2"],
1360
- )])
1351
+ mssqls=[{
1352
+ "name": "db1",
1353
+ "username": "sa",
1354
+ "password": "super_secret_1",
1355
+ "connection_url": "sqlserver://{{username}}:{{password}}@127.0.0.1:1433",
1356
+ "allowed_roles": ["dev1"],
1357
+ }],
1358
+ postgresqls=[{
1359
+ "name": "db2",
1360
+ "username": "postgres",
1361
+ "password": "super_secret_2",
1362
+ "connection_url": "postgresql://{{username}}:{{password}}@127.0.0.1:5432/postgres",
1363
+ "verify_connection": True,
1364
+ "allowed_roles": ["dev2"],
1365
+ }])
1361
1366
  dev1 = vault.database.SecretBackendRole("dev1",
1362
1367
  name="dev1",
1363
1368
  backend=db.path,
@@ -1393,55 +1398,55 @@ class SecretsMount(pulumi.CustomResource):
1393
1398
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1394
1399
  :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1395
1400
  :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1396
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountCassandraArgs']]]] cassandras: A nested block containing configuration options for Cassandra connections.
1401
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCassandraArgs', 'SecretsMountCassandraArgsDict']]]] cassandras: A nested block containing configuration options for Cassandra connections.
1397
1402
  *See Configuration Options for more info*
1398
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountCouchbaseArgs']]]] couchbases: A nested block containing configuration options for Couchbase connections.
1403
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCouchbaseArgs', 'SecretsMountCouchbaseArgsDict']]]] couchbases: A nested block containing configuration options for Couchbase connections.
1399
1404
  *See Configuration Options for more info*
1400
1405
  :param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
1401
1406
  :param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1402
1407
  :param pulumi.Input[str] description: Human-friendly description of the mount
1403
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountElasticsearchArgs']]]] elasticsearches: A nested block containing configuration options for Elasticsearch connections.
1408
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountElasticsearchArgs', 'SecretsMountElasticsearchArgsDict']]]] elasticsearches: A nested block containing configuration options for Elasticsearch connections.
1404
1409
  *See Configuration Options for more info*
1405
1410
  :param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
1406
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountHanaArgs']]]] hanas: A nested block containing configuration options for SAP HanaDB connections.
1411
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountHanaArgs', 'SecretsMountHanaArgsDict']]]] hanas: A nested block containing configuration options for SAP HanaDB connections.
1407
1412
  *See Configuration Options for more info*
1408
1413
  :param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens
1409
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountInfluxdbArgs']]]] influxdbs: A nested block containing configuration options for InfluxDB connections.
1414
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountInfluxdbArgs', 'SecretsMountInfluxdbArgsDict']]]] influxdbs: A nested block containing configuration options for InfluxDB connections.
1410
1415
  *See Configuration Options for more info*
1411
1416
  :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1412
1417
  :param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
1413
1418
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
1414
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMongodbatlaArgs']]]] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
1419
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbatlaArgs', 'SecretsMountMongodbatlaArgsDict']]]] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
1415
1420
  *See Configuration Options for more info*
1416
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMongodbArgs']]]] mongodbs: A nested block containing configuration options for MongoDB connections.
1421
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbArgs', 'SecretsMountMongodbArgsDict']]]] mongodbs: A nested block containing configuration options for MongoDB connections.
1417
1422
  *See Configuration Options for more info*
1418
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMssqlArgs']]]] mssqls: A nested block containing configuration options for MSSQL connections.
1423
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMssqlArgs', 'SecretsMountMssqlArgsDict']]]] mssqls: A nested block containing configuration options for MSSQL connections.
1419
1424
  *See Configuration Options for more info*
1420
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMysqlAuroraArgs']]]] mysql_auroras: A nested block containing configuration options for Aurora MySQL connections.
1425
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlAuroraArgs', 'SecretsMountMysqlAuroraArgsDict']]]] mysql_auroras: A nested block containing configuration options for Aurora MySQL connections.
1421
1426
  *See Configuration Options for more info*
1422
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMysqlLegacyArgs']]]] mysql_legacies: A nested block containing configuration options for legacy MySQL connections.
1427
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlLegacyArgs', 'SecretsMountMysqlLegacyArgsDict']]]] mysql_legacies: A nested block containing configuration options for legacy MySQL connections.
1423
1428
  *See Configuration Options for more info*
1424
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMysqlRdArgs']]]] mysql_rds: A nested block containing configuration options for RDS MySQL connections.
1429
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]] mysql_rds: A nested block containing configuration options for RDS MySQL connections.
1425
1430
  *See Configuration Options for more info*
1426
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMysqlArgs']]]] mysqls: A nested block containing configuration options for MySQL connections.
1431
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]] mysqls: A nested block containing configuration options for MySQL connections.
1427
1432
  *See Configuration Options for more info*
1428
1433
  :param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
1429
- :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
1430
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountOracleArgs']]]] oracles: A nested block containing configuration options for Oracle connections.
1434
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
1435
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]] oracles: A nested block containing configuration options for Oracle connections.
1431
1436
  *See Configuration Options for more info*
1432
1437
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1433
1438
  :param pulumi.Input[str] path: Where the secret backend will be mounted
1434
1439
  :param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1435
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountPostgresqlArgs']]]] postgresqls: A nested block containing configuration options for PostgreSQL connections.
1440
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountPostgresqlArgs', 'SecretsMountPostgresqlArgsDict']]]] postgresqls: A nested block containing configuration options for PostgreSQL connections.
1436
1441
  *See Configuration Options for more info*
1437
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountRediArgs']]]] redis: A nested block containing configuration options for Redis connections.
1442
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRediArgs', 'SecretsMountRediArgsDict']]]] redis: A nested block containing configuration options for Redis connections.
1438
1443
  *See Configuration Options for more info*
1439
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountRedisElasticachArgs']]]] redis_elasticaches: A nested block containing configuration options for Redis ElastiCache connections.
1444
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedisElasticachArgs', 'SecretsMountRedisElasticachArgsDict']]]] redis_elasticaches: A nested block containing configuration options for Redis ElastiCache connections.
1440
1445
  *See Configuration Options for more info*
1441
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountRedshiftArgs']]]] redshifts: A nested block containing configuration options for AWS Redshift connections.
1446
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedshiftArgs', 'SecretsMountRedshiftArgsDict']]]] redshifts: A nested block containing configuration options for AWS Redshift connections.
1442
1447
  *See Configuration Options for more info*
1443
1448
  :param pulumi.Input[bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1444
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountSnowflakeArgs']]]] snowflakes: A nested block containing configuration options for Snowflake connections.
1449
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountSnowflakeArgs', 'SecretsMountSnowflakeArgsDict']]]] snowflakes: A nested block containing configuration options for Snowflake connections.
1445
1450
  *See Configuration Options for more info*
1446
1451
  """
1447
1452
  ...
@@ -1459,21 +1464,21 @@ class SecretsMount(pulumi.CustomResource):
1459
1464
 
1460
1465
  db = vault.database.SecretsMount("db",
1461
1466
  path="db",
1462
- mssqls=[vault.database.SecretsMountMssqlArgs(
1463
- name="db1",
1464
- username="sa",
1465
- password="super_secret_1",
1466
- connection_url="sqlserver://{{username}}:{{password}}@127.0.0.1:1433",
1467
- allowed_roles=["dev1"],
1468
- )],
1469
- postgresqls=[vault.database.SecretsMountPostgresqlArgs(
1470
- name="db2",
1471
- username="postgres",
1472
- password="super_secret_2",
1473
- connection_url="postgresql://{{username}}:{{password}}@127.0.0.1:5432/postgres",
1474
- verify_connection=True,
1475
- allowed_roles=["dev2"],
1476
- )])
1467
+ mssqls=[{
1468
+ "name": "db1",
1469
+ "username": "sa",
1470
+ "password": "super_secret_1",
1471
+ "connection_url": "sqlserver://{{username}}:{{password}}@127.0.0.1:1433",
1472
+ "allowed_roles": ["dev1"],
1473
+ }],
1474
+ postgresqls=[{
1475
+ "name": "db2",
1476
+ "username": "postgres",
1477
+ "password": "super_secret_2",
1478
+ "connection_url": "postgresql://{{username}}:{{password}}@127.0.0.1:5432/postgres",
1479
+ "verify_connection": True,
1480
+ "allowed_roles": ["dev2"],
1481
+ }])
1477
1482
  dev1 = vault.database.SecretBackendRole("dev1",
1478
1483
  name="dev1",
1479
1484
  backend=db.path,
@@ -1520,38 +1525,38 @@ class SecretsMount(pulumi.CustomResource):
1520
1525
  allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1521
1526
  audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1522
1527
  audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1523
- cassandras: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountCassandraArgs']]]]] = None,
1524
- couchbases: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountCouchbaseArgs']]]]] = None,
1528
+ cassandras: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCassandraArgs', 'SecretsMountCassandraArgsDict']]]]] = None,
1529
+ couchbases: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCouchbaseArgs', 'SecretsMountCouchbaseArgsDict']]]]] = None,
1525
1530
  default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1526
1531
  delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1527
1532
  description: Optional[pulumi.Input[str]] = None,
1528
- elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountElasticsearchArgs']]]]] = None,
1533
+ elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountElasticsearchArgs', 'SecretsMountElasticsearchArgsDict']]]]] = None,
1529
1534
  external_entropy_access: Optional[pulumi.Input[bool]] = None,
1530
- hanas: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountHanaArgs']]]]] = None,
1535
+ hanas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountHanaArgs', 'SecretsMountHanaArgsDict']]]]] = None,
1531
1536
  identity_token_key: Optional[pulumi.Input[str]] = None,
1532
- influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountInfluxdbArgs']]]]] = None,
1537
+ influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountInfluxdbArgs', 'SecretsMountInfluxdbArgsDict']]]]] = None,
1533
1538
  listing_visibility: Optional[pulumi.Input[str]] = None,
1534
1539
  local: Optional[pulumi.Input[bool]] = None,
1535
1540
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1536
- mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMongodbatlaArgs']]]]] = None,
1537
- mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMongodbArgs']]]]] = None,
1538
- mssqls: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMssqlArgs']]]]] = None,
1539
- mysql_auroras: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMysqlAuroraArgs']]]]] = None,
1540
- mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMysqlLegacyArgs']]]]] = None,
1541
- mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMysqlRdArgs']]]]] = None,
1542
- mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMysqlArgs']]]]] = None,
1541
+ mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbatlaArgs', 'SecretsMountMongodbatlaArgsDict']]]]] = None,
1542
+ mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbArgs', 'SecretsMountMongodbArgsDict']]]]] = None,
1543
+ mssqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMssqlArgs', 'SecretsMountMssqlArgsDict']]]]] = None,
1544
+ mysql_auroras: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlAuroraArgs', 'SecretsMountMysqlAuroraArgsDict']]]]] = None,
1545
+ mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlLegacyArgs', 'SecretsMountMysqlLegacyArgsDict']]]]] = None,
1546
+ mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]]] = None,
1547
+ mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]]] = None,
1543
1548
  namespace: Optional[pulumi.Input[str]] = None,
1544
- options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1545
- oracles: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountOracleArgs']]]]] = None,
1549
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1550
+ oracles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]]] = None,
1546
1551
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1547
1552
  path: Optional[pulumi.Input[str]] = None,
1548
1553
  plugin_version: Optional[pulumi.Input[str]] = None,
1549
- postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountPostgresqlArgs']]]]] = None,
1550
- redis: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountRediArgs']]]]] = None,
1551
- redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountRedisElasticachArgs']]]]] = None,
1552
- redshifts: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountRedshiftArgs']]]]] = None,
1554
+ postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountPostgresqlArgs', 'SecretsMountPostgresqlArgsDict']]]]] = None,
1555
+ redis: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRediArgs', 'SecretsMountRediArgsDict']]]]] = None,
1556
+ redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedisElasticachArgs', 'SecretsMountRedisElasticachArgsDict']]]]] = None,
1557
+ redshifts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedshiftArgs', 'SecretsMountRedshiftArgsDict']]]]] = None,
1553
1558
  seal_wrap: Optional[pulumi.Input[bool]] = None,
1554
- snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountSnowflakeArgs']]]]] = None,
1559
+ snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountSnowflakeArgs', 'SecretsMountSnowflakeArgsDict']]]]] = None,
1555
1560
  __props__=None):
1556
1561
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
1557
1562
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -1616,39 +1621,39 @@ class SecretsMount(pulumi.CustomResource):
1616
1621
  allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1617
1622
  audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1618
1623
  audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1619
- cassandras: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountCassandraArgs']]]]] = None,
1620
- couchbases: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountCouchbaseArgs']]]]] = None,
1624
+ cassandras: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCassandraArgs', 'SecretsMountCassandraArgsDict']]]]] = None,
1625
+ couchbases: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCouchbaseArgs', 'SecretsMountCouchbaseArgsDict']]]]] = None,
1621
1626
  default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1622
1627
  delegated_auth_accessors: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1623
1628
  description: Optional[pulumi.Input[str]] = None,
1624
- elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountElasticsearchArgs']]]]] = None,
1629
+ elasticsearches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountElasticsearchArgs', 'SecretsMountElasticsearchArgsDict']]]]] = None,
1625
1630
  engine_count: Optional[pulumi.Input[int]] = None,
1626
1631
  external_entropy_access: Optional[pulumi.Input[bool]] = None,
1627
- hanas: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountHanaArgs']]]]] = None,
1632
+ hanas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountHanaArgs', 'SecretsMountHanaArgsDict']]]]] = None,
1628
1633
  identity_token_key: Optional[pulumi.Input[str]] = None,
1629
- influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountInfluxdbArgs']]]]] = None,
1634
+ influxdbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountInfluxdbArgs', 'SecretsMountInfluxdbArgsDict']]]]] = None,
1630
1635
  listing_visibility: Optional[pulumi.Input[str]] = None,
1631
1636
  local: Optional[pulumi.Input[bool]] = None,
1632
1637
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
1633
- mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMongodbatlaArgs']]]]] = None,
1634
- mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMongodbArgs']]]]] = None,
1635
- mssqls: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMssqlArgs']]]]] = None,
1636
- mysql_auroras: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMysqlAuroraArgs']]]]] = None,
1637
- mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMysqlLegacyArgs']]]]] = None,
1638
- mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMysqlRdArgs']]]]] = None,
1639
- mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMysqlArgs']]]]] = None,
1638
+ mongodbatlas: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbatlaArgs', 'SecretsMountMongodbatlaArgsDict']]]]] = None,
1639
+ mongodbs: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbArgs', 'SecretsMountMongodbArgsDict']]]]] = None,
1640
+ mssqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMssqlArgs', 'SecretsMountMssqlArgsDict']]]]] = None,
1641
+ mysql_auroras: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlAuroraArgs', 'SecretsMountMysqlAuroraArgsDict']]]]] = None,
1642
+ mysql_legacies: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlLegacyArgs', 'SecretsMountMysqlLegacyArgsDict']]]]] = None,
1643
+ mysql_rds: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]]] = None,
1644
+ mysqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]]] = None,
1640
1645
  namespace: Optional[pulumi.Input[str]] = None,
1641
- options: Optional[pulumi.Input[Mapping[str, Any]]] = None,
1642
- oracles: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountOracleArgs']]]]] = None,
1646
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
1647
+ oracles: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]]] = None,
1643
1648
  passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1644
1649
  path: Optional[pulumi.Input[str]] = None,
1645
1650
  plugin_version: Optional[pulumi.Input[str]] = None,
1646
- postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountPostgresqlArgs']]]]] = None,
1647
- redis: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountRediArgs']]]]] = None,
1648
- redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountRedisElasticachArgs']]]]] = None,
1649
- redshifts: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountRedshiftArgs']]]]] = None,
1651
+ postgresqls: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountPostgresqlArgs', 'SecretsMountPostgresqlArgsDict']]]]] = None,
1652
+ redis: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRediArgs', 'SecretsMountRediArgsDict']]]]] = None,
1653
+ redis_elasticaches: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedisElasticachArgs', 'SecretsMountRedisElasticachArgsDict']]]]] = None,
1654
+ redshifts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedshiftArgs', 'SecretsMountRedshiftArgsDict']]]]] = None,
1650
1655
  seal_wrap: Optional[pulumi.Input[bool]] = None,
1651
- snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountSnowflakeArgs']]]]] = None) -> 'SecretsMount':
1656
+ snowflakes: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountSnowflakeArgs', 'SecretsMountSnowflakeArgsDict']]]]] = None) -> 'SecretsMount':
1652
1657
  """
1653
1658
  Get an existing SecretsMount resource's state with the given name, id, and optional extra
1654
1659
  properties used to qualify the lookup.
@@ -1663,56 +1668,56 @@ class SecretsMount(pulumi.CustomResource):
1663
1668
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to allow and pass from the request to the plugin
1664
1669
  :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
1665
1670
  :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
1666
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountCassandraArgs']]]] cassandras: A nested block containing configuration options for Cassandra connections.
1671
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCassandraArgs', 'SecretsMountCassandraArgsDict']]]] cassandras: A nested block containing configuration options for Cassandra connections.
1667
1672
  *See Configuration Options for more info*
1668
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountCouchbaseArgs']]]] couchbases: A nested block containing configuration options for Couchbase connections.
1673
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountCouchbaseArgs', 'SecretsMountCouchbaseArgsDict']]]] couchbases: A nested block containing configuration options for Couchbase connections.
1669
1674
  *See Configuration Options for more info*
1670
1675
  :param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for tokens and secrets in seconds
1671
1676
  :param pulumi.Input[Sequence[pulumi.Input[str]]] delegated_auth_accessors: List of headers to allow and pass from the request to the plugin
1672
1677
  :param pulumi.Input[str] description: Human-friendly description of the mount
1673
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountElasticsearchArgs']]]] elasticsearches: A nested block containing configuration options for Elasticsearch connections.
1678
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountElasticsearchArgs', 'SecretsMountElasticsearchArgsDict']]]] elasticsearches: A nested block containing configuration options for Elasticsearch connections.
1674
1679
  *See Configuration Options for more info*
1675
1680
  :param pulumi.Input[int] engine_count: The total number of database secrets engines configured.
1676
1681
  :param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
1677
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountHanaArgs']]]] hanas: A nested block containing configuration options for SAP HanaDB connections.
1682
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountHanaArgs', 'SecretsMountHanaArgsDict']]]] hanas: A nested block containing configuration options for SAP HanaDB connections.
1678
1683
  *See Configuration Options for more info*
1679
1684
  :param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens
1680
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountInfluxdbArgs']]]] influxdbs: A nested block containing configuration options for InfluxDB connections.
1685
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountInfluxdbArgs', 'SecretsMountInfluxdbArgsDict']]]] influxdbs: A nested block containing configuration options for InfluxDB connections.
1681
1686
  *See Configuration Options for more info*
1682
1687
  :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
1683
1688
  :param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
1684
1689
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
1685
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMongodbatlaArgs']]]] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
1690
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbatlaArgs', 'SecretsMountMongodbatlaArgsDict']]]] mongodbatlas: A nested block containing configuration options for MongoDB Atlas connections.
1686
1691
  *See Configuration Options for more info*
1687
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMongodbArgs']]]] mongodbs: A nested block containing configuration options for MongoDB connections.
1692
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMongodbArgs', 'SecretsMountMongodbArgsDict']]]] mongodbs: A nested block containing configuration options for MongoDB connections.
1688
1693
  *See Configuration Options for more info*
1689
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMssqlArgs']]]] mssqls: A nested block containing configuration options for MSSQL connections.
1694
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMssqlArgs', 'SecretsMountMssqlArgsDict']]]] mssqls: A nested block containing configuration options for MSSQL connections.
1690
1695
  *See Configuration Options for more info*
1691
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMysqlAuroraArgs']]]] mysql_auroras: A nested block containing configuration options for Aurora MySQL connections.
1696
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlAuroraArgs', 'SecretsMountMysqlAuroraArgsDict']]]] mysql_auroras: A nested block containing configuration options for Aurora MySQL connections.
1692
1697
  *See Configuration Options for more info*
1693
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMysqlLegacyArgs']]]] mysql_legacies: A nested block containing configuration options for legacy MySQL connections.
1698
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlLegacyArgs', 'SecretsMountMysqlLegacyArgsDict']]]] mysql_legacies: A nested block containing configuration options for legacy MySQL connections.
1694
1699
  *See Configuration Options for more info*
1695
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMysqlRdArgs']]]] mysql_rds: A nested block containing configuration options for RDS MySQL connections.
1700
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlRdArgs', 'SecretsMountMysqlRdArgsDict']]]] mysql_rds: A nested block containing configuration options for RDS MySQL connections.
1696
1701
  *See Configuration Options for more info*
1697
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountMysqlArgs']]]] mysqls: A nested block containing configuration options for MySQL connections.
1702
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountMysqlArgs', 'SecretsMountMysqlArgsDict']]]] mysqls: A nested block containing configuration options for MySQL connections.
1698
1703
  *See Configuration Options for more info*
1699
1704
  :param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
1700
- :param pulumi.Input[Mapping[str, Any]] options: Specifies mount type specific options that are passed to the backend
1701
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountOracleArgs']]]] oracles: A nested block containing configuration options for Oracle connections.
1705
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: Specifies mount type specific options that are passed to the backend
1706
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountOracleArgs', 'SecretsMountOracleArgsDict']]]] oracles: A nested block containing configuration options for Oracle connections.
1702
1707
  *See Configuration Options for more info*
1703
1708
  :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to allow and pass from the request to the plugin
1704
1709
  :param pulumi.Input[str] path: Where the secret backend will be mounted
1705
1710
  :param pulumi.Input[str] plugin_version: Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
1706
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountPostgresqlArgs']]]] postgresqls: A nested block containing configuration options for PostgreSQL connections.
1711
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountPostgresqlArgs', 'SecretsMountPostgresqlArgsDict']]]] postgresqls: A nested block containing configuration options for PostgreSQL connections.
1707
1712
  *See Configuration Options for more info*
1708
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountRediArgs']]]] redis: A nested block containing configuration options for Redis connections.
1713
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRediArgs', 'SecretsMountRediArgsDict']]]] redis: A nested block containing configuration options for Redis connections.
1709
1714
  *See Configuration Options for more info*
1710
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountRedisElasticachArgs']]]] redis_elasticaches: A nested block containing configuration options for Redis ElastiCache connections.
1715
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedisElasticachArgs', 'SecretsMountRedisElasticachArgsDict']]]] redis_elasticaches: A nested block containing configuration options for Redis ElastiCache connections.
1711
1716
  *See Configuration Options for more info*
1712
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountRedshiftArgs']]]] redshifts: A nested block containing configuration options for AWS Redshift connections.
1717
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountRedshiftArgs', 'SecretsMountRedshiftArgsDict']]]] redshifts: A nested block containing configuration options for AWS Redshift connections.
1713
1718
  *See Configuration Options for more info*
1714
1719
  :param pulumi.Input[bool] seal_wrap: Boolean flag that can be explicitly set to true to enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
1715
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretsMountSnowflakeArgs']]]] snowflakes: A nested block containing configuration options for Snowflake connections.
1720
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretsMountSnowflakeArgs', 'SecretsMountSnowflakeArgsDict']]]] snowflakes: A nested block containing configuration options for Snowflake connections.
1716
1721
  *See Configuration Options for more info*
1717
1722
  """
1718
1723
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -1991,7 +1996,7 @@ class SecretsMount(pulumi.CustomResource):
1991
1996
 
1992
1997
  @property
1993
1998
  @pulumi.getter
1994
- def options(self) -> pulumi.Output[Optional[Mapping[str, Any]]]:
1999
+ def options(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
1995
2000
  """
1996
2001
  Specifies mount type specific options that are passed to the backend
1997
2002
  """
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['EgpPolicyArgs', 'EgpPolicy']