pulumi-vault 6.7.0a1743490126__py3-none-any.whl → 6.7.0a1744183682__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744183682.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743490126.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -93,12 +94,12 @@ class GetAuthBackendRoleResult:
93
94
 
94
95
  @property
95
96
  @pulumi.getter
96
- def backend(self) -> Optional[str]:
97
+ def backend(self) -> Optional[builtins.str]:
97
98
  return pulumi.get(self, "backend")
98
99
 
99
100
  @property
100
101
  @pulumi.getter(name="boundInstanceGroups")
101
- def bound_instance_groups(self) -> Sequence[str]:
102
+ def bound_instance_groups(self) -> Sequence[builtins.str]:
102
103
  """
103
104
  GCP regions bound to the role. Returned when `type` is `gce`.
104
105
  """
@@ -106,7 +107,7 @@ class GetAuthBackendRoleResult:
106
107
 
107
108
  @property
108
109
  @pulumi.getter(name="boundLabels")
109
- def bound_labels(self) -> Sequence[str]:
110
+ def bound_labels(self) -> Sequence[builtins.str]:
110
111
  """
111
112
  GCP labels bound to the role. Returned when `type` is `gce`.
112
113
  """
@@ -114,7 +115,7 @@ class GetAuthBackendRoleResult:
114
115
 
115
116
  @property
116
117
  @pulumi.getter(name="boundProjects")
117
- def bound_projects(self) -> Sequence[str]:
118
+ def bound_projects(self) -> Sequence[builtins.str]:
118
119
  """
119
120
  GCP projects bound to the role.
120
121
  """
@@ -122,7 +123,7 @@ class GetAuthBackendRoleResult:
122
123
 
123
124
  @property
124
125
  @pulumi.getter(name="boundRegions")
125
- def bound_regions(self) -> Sequence[str]:
126
+ def bound_regions(self) -> Sequence[builtins.str]:
126
127
  """
127
128
  GCP regions bound to the role. Returned when `type` is `gce`.
128
129
  """
@@ -130,7 +131,7 @@ class GetAuthBackendRoleResult:
130
131
 
131
132
  @property
132
133
  @pulumi.getter(name="boundServiceAccounts")
133
- def bound_service_accounts(self) -> Sequence[str]:
134
+ def bound_service_accounts(self) -> Sequence[builtins.str]:
134
135
  """
135
136
  GCP service accounts bound to the role. Returned when `type` is `iam`.
136
137
  """
@@ -138,7 +139,7 @@ class GetAuthBackendRoleResult:
138
139
 
139
140
  @property
140
141
  @pulumi.getter(name="boundZones")
141
- def bound_zones(self) -> Sequence[str]:
142
+ def bound_zones(self) -> Sequence[builtins.str]:
142
143
  """
143
144
  GCP zones bound to the role. Returned when `type` is `gce`.
144
145
  """
@@ -146,7 +147,7 @@ class GetAuthBackendRoleResult:
146
147
 
147
148
  @property
148
149
  @pulumi.getter
149
- def id(self) -> str:
150
+ def id(self) -> builtins.str:
150
151
  """
151
152
  The provider-assigned unique ID for this managed resource.
152
153
  """
@@ -154,12 +155,12 @@ class GetAuthBackendRoleResult:
154
155
 
155
156
  @property
156
157
  @pulumi.getter
157
- def namespace(self) -> Optional[str]:
158
+ def namespace(self) -> Optional[builtins.str]:
158
159
  return pulumi.get(self, "namespace")
159
160
 
160
161
  @property
161
162
  @pulumi.getter(name="roleId")
162
- def role_id(self) -> str:
163
+ def role_id(self) -> builtins.str:
163
164
  """
164
165
  The RoleID of the GCP role.
165
166
  """
@@ -167,12 +168,12 @@ class GetAuthBackendRoleResult:
167
168
 
168
169
  @property
169
170
  @pulumi.getter(name="roleName")
170
- def role_name(self) -> str:
171
+ def role_name(self) -> builtins.str:
171
172
  return pulumi.get(self, "role_name")
172
173
 
173
174
  @property
174
175
  @pulumi.getter(name="tokenBoundCidrs")
175
- def token_bound_cidrs(self) -> Optional[Sequence[str]]:
176
+ def token_bound_cidrs(self) -> Optional[Sequence[builtins.str]]:
176
177
  """
177
178
  List of CIDR blocks; if set, specifies blocks of IP
178
179
  addresses which can authenticate successfully, and ties the resulting token to these blocks
@@ -182,7 +183,7 @@ class GetAuthBackendRoleResult:
182
183
 
183
184
  @property
184
185
  @pulumi.getter(name="tokenExplicitMaxTtl")
185
- def token_explicit_max_ttl(self) -> Optional[int]:
186
+ def token_explicit_max_ttl(self) -> Optional[builtins.int]:
186
187
  """
187
188
  If set, will encode an
188
189
  [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
@@ -193,7 +194,7 @@ class GetAuthBackendRoleResult:
193
194
 
194
195
  @property
195
196
  @pulumi.getter(name="tokenMaxTtl")
196
- def token_max_ttl(self) -> Optional[int]:
197
+ def token_max_ttl(self) -> Optional[builtins.int]:
197
198
  """
198
199
  The maximum lifetime for generated tokens in number of seconds.
199
200
  Its current value will be referenced at renewal time.
@@ -202,7 +203,7 @@ class GetAuthBackendRoleResult:
202
203
 
203
204
  @property
204
205
  @pulumi.getter(name="tokenNoDefaultPolicy")
205
- def token_no_default_policy(self) -> Optional[bool]:
206
+ def token_no_default_policy(self) -> Optional[builtins.bool]:
206
207
  """
207
208
  If set, the default policy will not be set on
208
209
  generated tokens; otherwise it will be added to the policies set in token_policies.
@@ -211,7 +212,7 @@ class GetAuthBackendRoleResult:
211
212
 
212
213
  @property
213
214
  @pulumi.getter(name="tokenNumUses")
214
- def token_num_uses(self) -> Optional[int]:
215
+ def token_num_uses(self) -> Optional[builtins.int]:
215
216
  """
216
217
  The
217
218
  [period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
@@ -221,7 +222,7 @@ class GetAuthBackendRoleResult:
221
222
 
222
223
  @property
223
224
  @pulumi.getter(name="tokenPeriod")
224
- def token_period(self) -> Optional[int]:
225
+ def token_period(self) -> Optional[builtins.int]:
225
226
  """
226
227
  (Optional) If set, indicates that the
227
228
  token generated using this role should never expire. The token should be renewed within the
@@ -232,7 +233,7 @@ class GetAuthBackendRoleResult:
232
233
 
233
234
  @property
234
235
  @pulumi.getter(name="tokenPolicies")
235
- def token_policies(self) -> Optional[Sequence[str]]:
236
+ def token_policies(self) -> Optional[Sequence[builtins.str]]:
236
237
  """
237
238
  List of policies to encode onto generated tokens. Depending
238
239
  on the auth method, this list may be supplemented by user/group/other values.
@@ -241,7 +242,7 @@ class GetAuthBackendRoleResult:
241
242
 
242
243
  @property
243
244
  @pulumi.getter(name="tokenTtl")
244
- def token_ttl(self) -> Optional[int]:
245
+ def token_ttl(self) -> Optional[builtins.int]:
245
246
  """
246
247
  The incremental lifetime for generated tokens in number of seconds.
247
248
  Its current value will be referenced at renewal time.
@@ -250,7 +251,7 @@ class GetAuthBackendRoleResult:
250
251
 
251
252
  @property
252
253
  @pulumi.getter(name="tokenType")
253
- def token_type(self) -> Optional[str]:
254
+ def token_type(self) -> Optional[builtins.str]:
254
255
  """
255
256
  The type of token that should be generated. Can be `service`,
256
257
  `batch`, or `default` to use the mount's tuned default (which unless changed will be
@@ -262,7 +263,7 @@ class GetAuthBackendRoleResult:
262
263
 
263
264
  @property
264
265
  @pulumi.getter
265
- def type(self) -> str:
266
+ def type(self) -> builtins.str:
266
267
  """
267
268
  Type of GCP role. Expected values are `iam` or `gce`.
268
269
  """
@@ -298,18 +299,18 @@ class AwaitableGetAuthBackendRoleResult(GetAuthBackendRoleResult):
298
299
  type=self.type)
299
300
 
300
301
 
301
- def get_auth_backend_role(backend: Optional[str] = None,
302
- namespace: Optional[str] = None,
303
- role_name: Optional[str] = None,
304
- token_bound_cidrs: Optional[Sequence[str]] = None,
305
- token_explicit_max_ttl: Optional[int] = None,
306
- token_max_ttl: Optional[int] = None,
307
- token_no_default_policy: Optional[bool] = None,
308
- token_num_uses: Optional[int] = None,
309
- token_period: Optional[int] = None,
310
- token_policies: Optional[Sequence[str]] = None,
311
- token_ttl: Optional[int] = None,
312
- token_type: Optional[str] = None,
302
+ def get_auth_backend_role(backend: Optional[builtins.str] = None,
303
+ namespace: Optional[builtins.str] = None,
304
+ role_name: Optional[builtins.str] = None,
305
+ token_bound_cidrs: Optional[Sequence[builtins.str]] = None,
306
+ token_explicit_max_ttl: Optional[builtins.int] = None,
307
+ token_max_ttl: Optional[builtins.int] = None,
308
+ token_no_default_policy: Optional[builtins.bool] = None,
309
+ token_num_uses: Optional[builtins.int] = None,
310
+ token_period: Optional[builtins.int] = None,
311
+ token_policies: Optional[Sequence[builtins.str]] = None,
312
+ token_ttl: Optional[builtins.int] = None,
313
+ token_type: Optional[builtins.str] = None,
313
314
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetAuthBackendRoleResult:
314
315
  """
315
316
  Reads a GCP auth role from a Vault server.
@@ -326,35 +327,35 @@ def get_auth_backend_role(backend: Optional[str] = None,
326
327
  ```
327
328
 
328
329
 
329
- :param str backend: The unique name for the GCP backend from which to fetch the role. Defaults to "gcp".
330
- :param str namespace: The namespace of the target resource.
330
+ :param builtins.str backend: The unique name for the GCP backend from which to fetch the role. Defaults to "gcp".
331
+ :param builtins.str namespace: The namespace of the target resource.
331
332
  The value should not contain leading or trailing forward slashes.
332
333
  The `namespace` is always relative to the provider's configured namespace.
333
334
  *Available only for Vault Enterprise*.
334
- :param str role_name: The name of the role to retrieve the Role ID for.
335
- :param Sequence[str] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
335
+ :param builtins.str role_name: The name of the role to retrieve the Role ID for.
336
+ :param Sequence[builtins.str] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
336
337
  addresses which can authenticate successfully, and ties the resulting token to these blocks
337
338
  as well.
338
- :param int token_explicit_max_ttl: If set, will encode an
339
+ :param builtins.int token_explicit_max_ttl: If set, will encode an
339
340
  [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
340
341
  onto the token in number of seconds. This is a hard cap even if `token_ttl` and
341
342
  `token_max_ttl` would otherwise allow a renewal.
342
- :param int token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
343
+ :param builtins.int token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
343
344
  Its current value will be referenced at renewal time.
344
- :param bool token_no_default_policy: If set, the default policy will not be set on
345
+ :param builtins.bool token_no_default_policy: If set, the default policy will not be set on
345
346
  generated tokens; otherwise it will be added to the policies set in token_policies.
346
- :param int token_num_uses: The
347
+ :param builtins.int token_num_uses: The
347
348
  [period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
348
349
  if any, in number of seconds to set on the token.
349
- :param int token_period: (Optional) If set, indicates that the
350
+ :param builtins.int token_period: (Optional) If set, indicates that the
350
351
  token generated using this role should never expire. The token should be renewed within the
351
352
  duration specified by this value. At each renewal, the token's TTL will be set to the
352
353
  value of this field. Specified in seconds.
353
- :param Sequence[str] token_policies: List of policies to encode onto generated tokens. Depending
354
+ :param Sequence[builtins.str] token_policies: List of policies to encode onto generated tokens. Depending
354
355
  on the auth method, this list may be supplemented by user/group/other values.
355
- :param int token_ttl: The incremental lifetime for generated tokens in number of seconds.
356
+ :param builtins.int token_ttl: The incremental lifetime for generated tokens in number of seconds.
356
357
  Its current value will be referenced at renewal time.
357
- :param str token_type: The type of token that should be generated. Can be `service`,
358
+ :param builtins.str token_type: The type of token that should be generated. Can be `service`,
358
359
  `batch`, or `default` to use the mount's tuned default (which unless changed will be
359
360
  `service` tokens). For token store roles, there are two additional possibilities:
360
361
  `default-service` and `default-batch` which specify the type to return unless the client
@@ -398,18 +399,18 @@ def get_auth_backend_role(backend: Optional[str] = None,
398
399
  token_ttl=pulumi.get(__ret__, 'token_ttl'),
399
400
  token_type=pulumi.get(__ret__, 'token_type'),
400
401
  type=pulumi.get(__ret__, 'type'))
401
- def get_auth_backend_role_output(backend: Optional[pulumi.Input[Optional[str]]] = None,
402
- namespace: Optional[pulumi.Input[Optional[str]]] = None,
403
- role_name: Optional[pulumi.Input[str]] = None,
404
- token_bound_cidrs: Optional[pulumi.Input[Optional[Sequence[str]]]] = None,
405
- token_explicit_max_ttl: Optional[pulumi.Input[Optional[int]]] = None,
406
- token_max_ttl: Optional[pulumi.Input[Optional[int]]] = None,
407
- token_no_default_policy: Optional[pulumi.Input[Optional[bool]]] = None,
408
- token_num_uses: Optional[pulumi.Input[Optional[int]]] = None,
409
- token_period: Optional[pulumi.Input[Optional[int]]] = None,
410
- token_policies: Optional[pulumi.Input[Optional[Sequence[str]]]] = None,
411
- token_ttl: Optional[pulumi.Input[Optional[int]]] = None,
412
- token_type: Optional[pulumi.Input[Optional[str]]] = None,
402
+ def get_auth_backend_role_output(backend: Optional[pulumi.Input[Optional[builtins.str]]] = None,
403
+ namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
404
+ role_name: Optional[pulumi.Input[builtins.str]] = None,
405
+ token_bound_cidrs: Optional[pulumi.Input[Optional[Sequence[builtins.str]]]] = None,
406
+ token_explicit_max_ttl: Optional[pulumi.Input[Optional[builtins.int]]] = None,
407
+ token_max_ttl: Optional[pulumi.Input[Optional[builtins.int]]] = None,
408
+ token_no_default_policy: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
409
+ token_num_uses: Optional[pulumi.Input[Optional[builtins.int]]] = None,
410
+ token_period: Optional[pulumi.Input[Optional[builtins.int]]] = None,
411
+ token_policies: Optional[pulumi.Input[Optional[Sequence[builtins.str]]]] = None,
412
+ token_ttl: Optional[pulumi.Input[Optional[builtins.int]]] = None,
413
+ token_type: Optional[pulumi.Input[Optional[builtins.str]]] = None,
413
414
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAuthBackendRoleResult]:
414
415
  """
415
416
  Reads a GCP auth role from a Vault server.
@@ -426,35 +427,35 @@ def get_auth_backend_role_output(backend: Optional[pulumi.Input[Optional[str]]]
426
427
  ```
427
428
 
428
429
 
429
- :param str backend: The unique name for the GCP backend from which to fetch the role. Defaults to "gcp".
430
- :param str namespace: The namespace of the target resource.
430
+ :param builtins.str backend: The unique name for the GCP backend from which to fetch the role. Defaults to "gcp".
431
+ :param builtins.str namespace: The namespace of the target resource.
431
432
  The value should not contain leading or trailing forward slashes.
432
433
  The `namespace` is always relative to the provider's configured namespace.
433
434
  *Available only for Vault Enterprise*.
434
- :param str role_name: The name of the role to retrieve the Role ID for.
435
- :param Sequence[str] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
435
+ :param builtins.str role_name: The name of the role to retrieve the Role ID for.
436
+ :param Sequence[builtins.str] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
436
437
  addresses which can authenticate successfully, and ties the resulting token to these blocks
437
438
  as well.
438
- :param int token_explicit_max_ttl: If set, will encode an
439
+ :param builtins.int token_explicit_max_ttl: If set, will encode an
439
440
  [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
440
441
  onto the token in number of seconds. This is a hard cap even if `token_ttl` and
441
442
  `token_max_ttl` would otherwise allow a renewal.
442
- :param int token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
443
+ :param builtins.int token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
443
444
  Its current value will be referenced at renewal time.
444
- :param bool token_no_default_policy: If set, the default policy will not be set on
445
+ :param builtins.bool token_no_default_policy: If set, the default policy will not be set on
445
446
  generated tokens; otherwise it will be added to the policies set in token_policies.
446
- :param int token_num_uses: The
447
+ :param builtins.int token_num_uses: The
447
448
  [period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
448
449
  if any, in number of seconds to set on the token.
449
- :param int token_period: (Optional) If set, indicates that the
450
+ :param builtins.int token_period: (Optional) If set, indicates that the
450
451
  token generated using this role should never expire. The token should be renewed within the
451
452
  duration specified by this value. At each renewal, the token's TTL will be set to the
452
453
  value of this field. Specified in seconds.
453
- :param Sequence[str] token_policies: List of policies to encode onto generated tokens. Depending
454
+ :param Sequence[builtins.str] token_policies: List of policies to encode onto generated tokens. Depending
454
455
  on the auth method, this list may be supplemented by user/group/other values.
455
- :param int token_ttl: The incremental lifetime for generated tokens in number of seconds.
456
+ :param builtins.int token_ttl: The incremental lifetime for generated tokens in number of seconds.
456
457
  Its current value will be referenced at renewal time.
457
- :param str token_type: The type of token that should be generated. Can be `service`,
458
+ :param builtins.str token_type: The type of token that should be generated. Can be `service`,
458
459
  `batch`, or `default` to use the mount's tuned default (which unless changed will be
459
460
  `service` tokens). For token store roles, there are two additional possibilities:
460
461
  `default-service` and `default-batch` which specify the type to return unless the client
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -24,18 +25,18 @@ __all__ = [
24
25
  @pulumi.output_type
25
26
  class AuthBackendCustomEndpoint(dict):
26
27
  def __init__(__self__, *,
27
- api: Optional[str] = None,
28
- compute: Optional[str] = None,
29
- crm: Optional[str] = None,
30
- iam: Optional[str] = None):
28
+ api: Optional[builtins.str] = None,
29
+ compute: Optional[builtins.str] = None,
30
+ crm: Optional[builtins.str] = None,
31
+ iam: Optional[builtins.str] = None):
31
32
  """
32
- :param str api: Replaces the service endpoint used in API requests to `https://www.googleapis.com`.
33
- :param str compute: Replaces the service endpoint used in API requests to `https://compute.googleapis.com`.
33
+ :param builtins.str api: Replaces the service endpoint used in API requests to `https://www.googleapis.com`.
34
+ :param builtins.str compute: Replaces the service endpoint used in API requests to `https://compute.googleapis.com`.
34
35
 
35
36
  The endpoint value provided for a given key has the form of `scheme://host:port`.
36
37
  The `scheme://` and `:port` portions of the endpoint value are optional.
37
- :param str crm: Replaces the service endpoint used in API requests to `https://cloudresourcemanager.googleapis.com`.
38
- :param str iam: Replaces the service endpoint used in API requests to `https://iam.googleapis.com`.
38
+ :param builtins.str crm: Replaces the service endpoint used in API requests to `https://cloudresourcemanager.googleapis.com`.
39
+ :param builtins.str iam: Replaces the service endpoint used in API requests to `https://iam.googleapis.com`.
39
40
  """
40
41
  if api is not None:
41
42
  pulumi.set(__self__, "api", api)
@@ -48,7 +49,7 @@ class AuthBackendCustomEndpoint(dict):
48
49
 
49
50
  @property
50
51
  @pulumi.getter
51
- def api(self) -> Optional[str]:
52
+ def api(self) -> Optional[builtins.str]:
52
53
  """
53
54
  Replaces the service endpoint used in API requests to `https://www.googleapis.com`.
54
55
  """
@@ -56,7 +57,7 @@ class AuthBackendCustomEndpoint(dict):
56
57
 
57
58
  @property
58
59
  @pulumi.getter
59
- def compute(self) -> Optional[str]:
60
+ def compute(self) -> Optional[builtins.str]:
60
61
  """
61
62
  Replaces the service endpoint used in API requests to `https://compute.googleapis.com`.
62
63
 
@@ -67,7 +68,7 @@ class AuthBackendCustomEndpoint(dict):
67
68
 
68
69
  @property
69
70
  @pulumi.getter
70
- def crm(self) -> Optional[str]:
71
+ def crm(self) -> Optional[builtins.str]:
71
72
  """
72
73
  Replaces the service endpoint used in API requests to `https://cloudresourcemanager.googleapis.com`.
73
74
  """
@@ -75,7 +76,7 @@ class AuthBackendCustomEndpoint(dict):
75
76
 
76
77
  @property
77
78
  @pulumi.getter
78
- def iam(self) -> Optional[str]:
79
+ def iam(self) -> Optional[builtins.str]:
79
80
  """
80
81
  Replaces the service endpoint used in API requests to `https://iam.googleapis.com`.
81
82
  """
@@ -116,32 +117,32 @@ class AuthBackendTune(dict):
116
117
  return super().get(key, default)
117
118
 
118
119
  def __init__(__self__, *,
119
- allowed_response_headers: Optional[Sequence[str]] = None,
120
- audit_non_hmac_request_keys: Optional[Sequence[str]] = None,
121
- audit_non_hmac_response_keys: Optional[Sequence[str]] = None,
122
- default_lease_ttl: Optional[str] = None,
123
- listing_visibility: Optional[str] = None,
124
- max_lease_ttl: Optional[str] = None,
125
- passthrough_request_headers: Optional[Sequence[str]] = None,
126
- token_type: Optional[str] = None):
127
- """
128
- :param Sequence[str] allowed_response_headers: List of headers to whitelist and allowing
120
+ allowed_response_headers: Optional[Sequence[builtins.str]] = None,
121
+ audit_non_hmac_request_keys: Optional[Sequence[builtins.str]] = None,
122
+ audit_non_hmac_response_keys: Optional[Sequence[builtins.str]] = None,
123
+ default_lease_ttl: Optional[builtins.str] = None,
124
+ listing_visibility: Optional[builtins.str] = None,
125
+ max_lease_ttl: Optional[builtins.str] = None,
126
+ passthrough_request_headers: Optional[Sequence[builtins.str]] = None,
127
+ token_type: Optional[builtins.str] = None):
128
+ """
129
+ :param Sequence[builtins.str] allowed_response_headers: List of headers to whitelist and allowing
129
130
  a plugin to include them in the response.
130
- :param Sequence[str] audit_non_hmac_request_keys: Specifies the list of keys that will
131
+ :param Sequence[builtins.str] audit_non_hmac_request_keys: Specifies the list of keys that will
131
132
  not be HMAC'd by audit devices in the request data object.
132
- :param Sequence[str] audit_non_hmac_response_keys: Specifies the list of keys that will
133
+ :param Sequence[builtins.str] audit_non_hmac_response_keys: Specifies the list of keys that will
133
134
  not be HMAC'd by audit devices in the response data object.
134
- :param str default_lease_ttl: Specifies the default time-to-live.
135
+ :param builtins.str default_lease_ttl: Specifies the default time-to-live.
135
136
  If set, this overrides the global default.
136
137
  Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
137
- :param str listing_visibility: Specifies whether to show this mount in
138
+ :param builtins.str listing_visibility: Specifies whether to show this mount in
138
139
  the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
139
- :param str max_lease_ttl: Specifies the maximum time-to-live.
140
+ :param builtins.str max_lease_ttl: Specifies the maximum time-to-live.
140
141
  If set, this overrides the global default.
141
142
  Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
142
- :param Sequence[str] passthrough_request_headers: List of headers to whitelist and
143
+ :param Sequence[builtins.str] passthrough_request_headers: List of headers to whitelist and
143
144
  pass from the request to the backend.
144
- :param str token_type: Specifies the type of tokens that should be returned by
145
+ :param builtins.str token_type: Specifies the type of tokens that should be returned by
145
146
  the mount. Valid values are "default-service", "default-batch", "service", "batch".
146
147
 
147
148
 
@@ -166,7 +167,7 @@ class AuthBackendTune(dict):
166
167
 
167
168
  @property
168
169
  @pulumi.getter(name="allowedResponseHeaders")
169
- def allowed_response_headers(self) -> Optional[Sequence[str]]:
170
+ def allowed_response_headers(self) -> Optional[Sequence[builtins.str]]:
170
171
  """
171
172
  List of headers to whitelist and allowing
172
173
  a plugin to include them in the response.
@@ -175,7 +176,7 @@ class AuthBackendTune(dict):
175
176
 
176
177
  @property
177
178
  @pulumi.getter(name="auditNonHmacRequestKeys")
178
- def audit_non_hmac_request_keys(self) -> Optional[Sequence[str]]:
179
+ def audit_non_hmac_request_keys(self) -> Optional[Sequence[builtins.str]]:
179
180
  """
180
181
  Specifies the list of keys that will
181
182
  not be HMAC'd by audit devices in the request data object.
@@ -184,7 +185,7 @@ class AuthBackendTune(dict):
184
185
 
185
186
  @property
186
187
  @pulumi.getter(name="auditNonHmacResponseKeys")
187
- def audit_non_hmac_response_keys(self) -> Optional[Sequence[str]]:
188
+ def audit_non_hmac_response_keys(self) -> Optional[Sequence[builtins.str]]:
188
189
  """
189
190
  Specifies the list of keys that will
190
191
  not be HMAC'd by audit devices in the response data object.
@@ -193,7 +194,7 @@ class AuthBackendTune(dict):
193
194
 
194
195
  @property
195
196
  @pulumi.getter(name="defaultLeaseTtl")
196
- def default_lease_ttl(self) -> Optional[str]:
197
+ def default_lease_ttl(self) -> Optional[builtins.str]:
197
198
  """
198
199
  Specifies the default time-to-live.
199
200
  If set, this overrides the global default.
@@ -203,7 +204,7 @@ class AuthBackendTune(dict):
203
204
 
204
205
  @property
205
206
  @pulumi.getter(name="listingVisibility")
206
- def listing_visibility(self) -> Optional[str]:
207
+ def listing_visibility(self) -> Optional[builtins.str]:
207
208
  """
208
209
  Specifies whether to show this mount in
209
210
  the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
@@ -212,7 +213,7 @@ class AuthBackendTune(dict):
212
213
 
213
214
  @property
214
215
  @pulumi.getter(name="maxLeaseTtl")
215
- def max_lease_ttl(self) -> Optional[str]:
216
+ def max_lease_ttl(self) -> Optional[builtins.str]:
216
217
  """
217
218
  Specifies the maximum time-to-live.
218
219
  If set, this overrides the global default.
@@ -222,7 +223,7 @@ class AuthBackendTune(dict):
222
223
 
223
224
  @property
224
225
  @pulumi.getter(name="passthroughRequestHeaders")
225
- def passthrough_request_headers(self) -> Optional[Sequence[str]]:
226
+ def passthrough_request_headers(self) -> Optional[Sequence[builtins.str]]:
226
227
  """
227
228
  List of headers to whitelist and
228
229
  pass from the request to the backend.
@@ -231,7 +232,7 @@ class AuthBackendTune(dict):
231
232
 
232
233
  @property
233
234
  @pulumi.getter(name="tokenType")
234
- def token_type(self) -> Optional[str]:
235
+ def token_type(self) -> Optional[builtins.str]:
235
236
  """
236
237
  Specifies the type of tokens that should be returned by
237
238
  the mount. Valid values are "default-service", "default-batch", "service", "batch".
@@ -245,18 +246,18 @@ class AuthBackendTune(dict):
245
246
  @pulumi.output_type
246
247
  class SecretRolesetBinding(dict):
247
248
  def __init__(__self__, *,
248
- resource: str,
249
- roles: Sequence[str]):
249
+ resource: builtins.str,
250
+ roles: Sequence[builtins.str]):
250
251
  """
251
- :param str resource: Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different [formats](https://www.vaultproject.io/docs/secrets/gcp/index.html#roleset-bindings).
252
- :param Sequence[str] roles: List of [GCP IAM roles](https://cloud.google.com/iam/docs/understanding-roles) for the resource.
252
+ :param builtins.str resource: Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different [formats](https://www.vaultproject.io/docs/secrets/gcp/index.html#roleset-bindings).
253
+ :param Sequence[builtins.str] roles: List of [GCP IAM roles](https://cloud.google.com/iam/docs/understanding-roles) for the resource.
253
254
  """
254
255
  pulumi.set(__self__, "resource", resource)
255
256
  pulumi.set(__self__, "roles", roles)
256
257
 
257
258
  @property
258
259
  @pulumi.getter
259
- def resource(self) -> str:
260
+ def resource(self) -> builtins.str:
260
261
  """
261
262
  Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different [formats](https://www.vaultproject.io/docs/secrets/gcp/index.html#roleset-bindings).
262
263
  """
@@ -264,7 +265,7 @@ class SecretRolesetBinding(dict):
264
265
 
265
266
  @property
266
267
  @pulumi.getter
267
- def roles(self) -> Sequence[str]:
268
+ def roles(self) -> Sequence[builtins.str]:
268
269
  """
269
270
  List of [GCP IAM roles](https://cloud.google.com/iam/docs/understanding-roles) for the resource.
270
271
  """
@@ -274,18 +275,18 @@ class SecretRolesetBinding(dict):
274
275
  @pulumi.output_type
275
276
  class SecretStaticAccountBinding(dict):
276
277
  def __init__(__self__, *,
277
- resource: str,
278
- roles: Sequence[str]):
278
+ resource: builtins.str,
279
+ roles: Sequence[builtins.str]):
279
280
  """
280
- :param str resource: Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different [formats](https://www.vaultproject.io/docs/secrets/gcp/index.html#bindings).
281
- :param Sequence[str] roles: List of [GCP IAM roles](https://cloud.google.com/iam/docs/understanding-roles) for the resource.
281
+ :param builtins.str resource: Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different [formats](https://www.vaultproject.io/docs/secrets/gcp/index.html#bindings).
282
+ :param Sequence[builtins.str] roles: List of [GCP IAM roles](https://cloud.google.com/iam/docs/understanding-roles) for the resource.
282
283
  """
283
284
  pulumi.set(__self__, "resource", resource)
284
285
  pulumi.set(__self__, "roles", roles)
285
286
 
286
287
  @property
287
288
  @pulumi.getter
288
- def resource(self) -> str:
289
+ def resource(self) -> builtins.str:
289
290
  """
290
291
  Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different [formats](https://www.vaultproject.io/docs/secrets/gcp/index.html#bindings).
291
292
  """
@@ -293,7 +294,7 @@ class SecretStaticAccountBinding(dict):
293
294
 
294
295
  @property
295
296
  @pulumi.getter
296
- def roles(self) -> Sequence[str]:
297
+ def roles(self) -> Sequence[builtins.str]:
297
298
  """
298
299
  List of [GCP IAM roles](https://cloud.google.com/iam/docs/understanding-roles) for the resource.
299
300
  """