pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744183682__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744183682.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -21,25 +22,25 @@ __all__ = ['SecretRolesetArgs', 'SecretRoleset']
21
22
  @pulumi.input_type
22
23
  class SecretRolesetArgs:
23
24
  def __init__(__self__, *,
24
- backend: pulumi.Input[str],
25
+ backend: pulumi.Input[builtins.str],
25
26
  bindings: pulumi.Input[Sequence[pulumi.Input['SecretRolesetBindingArgs']]],
26
- project: pulumi.Input[str],
27
- roleset: pulumi.Input[str],
28
- namespace: Optional[pulumi.Input[str]] = None,
29
- secret_type: Optional[pulumi.Input[str]] = None,
30
- token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
27
+ project: pulumi.Input[builtins.str],
28
+ roleset: pulumi.Input[builtins.str],
29
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
30
+ secret_type: Optional[pulumi.Input[builtins.str]] = None,
31
+ token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
31
32
  """
32
33
  The set of arguments for constructing a SecretRoleset resource.
33
- :param pulumi.Input[str] backend: Path where the GCP Secrets Engine is mounted
34
+ :param pulumi.Input[builtins.str] backend: Path where the GCP Secrets Engine is mounted
34
35
  :param pulumi.Input[Sequence[pulumi.Input['SecretRolesetBindingArgs']]] bindings: Bindings to create for this roleset. This can be specified multiple times for multiple bindings. Structure is documented below.
35
- :param pulumi.Input[str] project: Name of the GCP project that this roleset's service account will belong to.
36
- :param pulumi.Input[str] roleset: Name of the Roleset to create
37
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
36
+ :param pulumi.Input[builtins.str] project: Name of the GCP project that this roleset's service account will belong to.
37
+ :param pulumi.Input[builtins.str] roleset: Name of the Roleset to create
38
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
38
39
  The value should not contain leading or trailing forward slashes.
39
40
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
40
41
  *Available only for Vault Enterprise*.
41
- :param pulumi.Input[str] secret_type: Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
42
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
42
+ :param pulumi.Input[builtins.str] secret_type: Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
43
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
43
44
  """
44
45
  pulumi.set(__self__, "backend", backend)
45
46
  pulumi.set(__self__, "bindings", bindings)
@@ -54,14 +55,14 @@ class SecretRolesetArgs:
54
55
 
55
56
  @property
56
57
  @pulumi.getter
57
- def backend(self) -> pulumi.Input[str]:
58
+ def backend(self) -> pulumi.Input[builtins.str]:
58
59
  """
59
60
  Path where the GCP Secrets Engine is mounted
60
61
  """
61
62
  return pulumi.get(self, "backend")
62
63
 
63
64
  @backend.setter
64
- def backend(self, value: pulumi.Input[str]):
65
+ def backend(self, value: pulumi.Input[builtins.str]):
65
66
  pulumi.set(self, "backend", value)
66
67
 
67
68
  @property
@@ -78,31 +79,31 @@ class SecretRolesetArgs:
78
79
 
79
80
  @property
80
81
  @pulumi.getter
81
- def project(self) -> pulumi.Input[str]:
82
+ def project(self) -> pulumi.Input[builtins.str]:
82
83
  """
83
84
  Name of the GCP project that this roleset's service account will belong to.
84
85
  """
85
86
  return pulumi.get(self, "project")
86
87
 
87
88
  @project.setter
88
- def project(self, value: pulumi.Input[str]):
89
+ def project(self, value: pulumi.Input[builtins.str]):
89
90
  pulumi.set(self, "project", value)
90
91
 
91
92
  @property
92
93
  @pulumi.getter
93
- def roleset(self) -> pulumi.Input[str]:
94
+ def roleset(self) -> pulumi.Input[builtins.str]:
94
95
  """
95
96
  Name of the Roleset to create
96
97
  """
97
98
  return pulumi.get(self, "roleset")
98
99
 
99
100
  @roleset.setter
100
- def roleset(self, value: pulumi.Input[str]):
101
+ def roleset(self, value: pulumi.Input[builtins.str]):
101
102
  pulumi.set(self, "roleset", value)
102
103
 
103
104
  @property
104
105
  @pulumi.getter
105
- def namespace(self) -> Optional[pulumi.Input[str]]:
106
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
106
107
  """
107
108
  The namespace to provision the resource in.
108
109
  The value should not contain leading or trailing forward slashes.
@@ -112,58 +113,58 @@ class SecretRolesetArgs:
112
113
  return pulumi.get(self, "namespace")
113
114
 
114
115
  @namespace.setter
115
- def namespace(self, value: Optional[pulumi.Input[str]]):
116
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
116
117
  pulumi.set(self, "namespace", value)
117
118
 
118
119
  @property
119
120
  @pulumi.getter(name="secretType")
120
- def secret_type(self) -> Optional[pulumi.Input[str]]:
121
+ def secret_type(self) -> Optional[pulumi.Input[builtins.str]]:
121
122
  """
122
123
  Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
123
124
  """
124
125
  return pulumi.get(self, "secret_type")
125
126
 
126
127
  @secret_type.setter
127
- def secret_type(self, value: Optional[pulumi.Input[str]]):
128
+ def secret_type(self, value: Optional[pulumi.Input[builtins.str]]):
128
129
  pulumi.set(self, "secret_type", value)
129
130
 
130
131
  @property
131
132
  @pulumi.getter(name="tokenScopes")
132
- def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
133
+ def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
133
134
  """
134
135
  List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
135
136
  """
136
137
  return pulumi.get(self, "token_scopes")
137
138
 
138
139
  @token_scopes.setter
139
- def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
140
+ def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
140
141
  pulumi.set(self, "token_scopes", value)
141
142
 
142
143
 
143
144
  @pulumi.input_type
144
145
  class _SecretRolesetState:
145
146
  def __init__(__self__, *,
146
- backend: Optional[pulumi.Input[str]] = None,
147
+ backend: Optional[pulumi.Input[builtins.str]] = None,
147
148
  bindings: Optional[pulumi.Input[Sequence[pulumi.Input['SecretRolesetBindingArgs']]]] = None,
148
- namespace: Optional[pulumi.Input[str]] = None,
149
- project: Optional[pulumi.Input[str]] = None,
150
- roleset: Optional[pulumi.Input[str]] = None,
151
- secret_type: Optional[pulumi.Input[str]] = None,
152
- service_account_email: Optional[pulumi.Input[str]] = None,
153
- token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
149
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
150
+ project: Optional[pulumi.Input[builtins.str]] = None,
151
+ roleset: Optional[pulumi.Input[builtins.str]] = None,
152
+ secret_type: Optional[pulumi.Input[builtins.str]] = None,
153
+ service_account_email: Optional[pulumi.Input[builtins.str]] = None,
154
+ token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
154
155
  """
155
156
  Input properties used for looking up and filtering SecretRoleset resources.
156
- :param pulumi.Input[str] backend: Path where the GCP Secrets Engine is mounted
157
+ :param pulumi.Input[builtins.str] backend: Path where the GCP Secrets Engine is mounted
157
158
  :param pulumi.Input[Sequence[pulumi.Input['SecretRolesetBindingArgs']]] bindings: Bindings to create for this roleset. This can be specified multiple times for multiple bindings. Structure is documented below.
158
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
159
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
159
160
  The value should not contain leading or trailing forward slashes.
160
161
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
161
162
  *Available only for Vault Enterprise*.
162
- :param pulumi.Input[str] project: Name of the GCP project that this roleset's service account will belong to.
163
- :param pulumi.Input[str] roleset: Name of the Roleset to create
164
- :param pulumi.Input[str] secret_type: Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
165
- :param pulumi.Input[str] service_account_email: Email of the service account created by Vault for this Roleset.
166
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
163
+ :param pulumi.Input[builtins.str] project: Name of the GCP project that this roleset's service account will belong to.
164
+ :param pulumi.Input[builtins.str] roleset: Name of the Roleset to create
165
+ :param pulumi.Input[builtins.str] secret_type: Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
166
+ :param pulumi.Input[builtins.str] service_account_email: Email of the service account created by Vault for this Roleset.
167
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
167
168
  """
168
169
  if backend is not None:
169
170
  pulumi.set(__self__, "backend", backend)
@@ -184,14 +185,14 @@ class _SecretRolesetState:
184
185
 
185
186
  @property
186
187
  @pulumi.getter
187
- def backend(self) -> Optional[pulumi.Input[str]]:
188
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
188
189
  """
189
190
  Path where the GCP Secrets Engine is mounted
190
191
  """
191
192
  return pulumi.get(self, "backend")
192
193
 
193
194
  @backend.setter
194
- def backend(self, value: Optional[pulumi.Input[str]]):
195
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
195
196
  pulumi.set(self, "backend", value)
196
197
 
197
198
  @property
@@ -208,7 +209,7 @@ class _SecretRolesetState:
208
209
 
209
210
  @property
210
211
  @pulumi.getter
211
- def namespace(self) -> Optional[pulumi.Input[str]]:
212
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
212
213
  """
213
214
  The namespace to provision the resource in.
214
215
  The value should not contain leading or trailing forward slashes.
@@ -218,67 +219,67 @@ class _SecretRolesetState:
218
219
  return pulumi.get(self, "namespace")
219
220
 
220
221
  @namespace.setter
221
- def namespace(self, value: Optional[pulumi.Input[str]]):
222
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
222
223
  pulumi.set(self, "namespace", value)
223
224
 
224
225
  @property
225
226
  @pulumi.getter
226
- def project(self) -> Optional[pulumi.Input[str]]:
227
+ def project(self) -> Optional[pulumi.Input[builtins.str]]:
227
228
  """
228
229
  Name of the GCP project that this roleset's service account will belong to.
229
230
  """
230
231
  return pulumi.get(self, "project")
231
232
 
232
233
  @project.setter
233
- def project(self, value: Optional[pulumi.Input[str]]):
234
+ def project(self, value: Optional[pulumi.Input[builtins.str]]):
234
235
  pulumi.set(self, "project", value)
235
236
 
236
237
  @property
237
238
  @pulumi.getter
238
- def roleset(self) -> Optional[pulumi.Input[str]]:
239
+ def roleset(self) -> Optional[pulumi.Input[builtins.str]]:
239
240
  """
240
241
  Name of the Roleset to create
241
242
  """
242
243
  return pulumi.get(self, "roleset")
243
244
 
244
245
  @roleset.setter
245
- def roleset(self, value: Optional[pulumi.Input[str]]):
246
+ def roleset(self, value: Optional[pulumi.Input[builtins.str]]):
246
247
  pulumi.set(self, "roleset", value)
247
248
 
248
249
  @property
249
250
  @pulumi.getter(name="secretType")
250
- def secret_type(self) -> Optional[pulumi.Input[str]]:
251
+ def secret_type(self) -> Optional[pulumi.Input[builtins.str]]:
251
252
  """
252
253
  Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
253
254
  """
254
255
  return pulumi.get(self, "secret_type")
255
256
 
256
257
  @secret_type.setter
257
- def secret_type(self, value: Optional[pulumi.Input[str]]):
258
+ def secret_type(self, value: Optional[pulumi.Input[builtins.str]]):
258
259
  pulumi.set(self, "secret_type", value)
259
260
 
260
261
  @property
261
262
  @pulumi.getter(name="serviceAccountEmail")
262
- def service_account_email(self) -> Optional[pulumi.Input[str]]:
263
+ def service_account_email(self) -> Optional[pulumi.Input[builtins.str]]:
263
264
  """
264
265
  Email of the service account created by Vault for this Roleset.
265
266
  """
266
267
  return pulumi.get(self, "service_account_email")
267
268
 
268
269
  @service_account_email.setter
269
- def service_account_email(self, value: Optional[pulumi.Input[str]]):
270
+ def service_account_email(self, value: Optional[pulumi.Input[builtins.str]]):
270
271
  pulumi.set(self, "service_account_email", value)
271
272
 
272
273
  @property
273
274
  @pulumi.getter(name="tokenScopes")
274
- def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
275
+ def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
275
276
  """
276
277
  List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
277
278
  """
278
279
  return pulumi.get(self, "token_scopes")
279
280
 
280
281
  @token_scopes.setter
281
- def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
282
+ def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
282
283
  pulumi.set(self, "token_scopes", value)
283
284
 
284
285
 
@@ -287,13 +288,13 @@ class SecretRoleset(pulumi.CustomResource):
287
288
  def __init__(__self__,
288
289
  resource_name: str,
289
290
  opts: Optional[pulumi.ResourceOptions] = None,
290
- backend: Optional[pulumi.Input[str]] = None,
291
+ backend: Optional[pulumi.Input[builtins.str]] = None,
291
292
  bindings: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretRolesetBindingArgs', 'SecretRolesetBindingArgsDict']]]]] = None,
292
- namespace: Optional[pulumi.Input[str]] = None,
293
- project: Optional[pulumi.Input[str]] = None,
294
- roleset: Optional[pulumi.Input[str]] = None,
295
- secret_type: Optional[pulumi.Input[str]] = None,
296
- token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
293
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
294
+ project: Optional[pulumi.Input[builtins.str]] = None,
295
+ roleset: Optional[pulumi.Input[builtins.str]] = None,
296
+ secret_type: Optional[pulumi.Input[builtins.str]] = None,
297
+ token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
297
298
  __props__=None):
298
299
  """
299
300
  Creates a Roleset in the [GCP Secrets Engine](https://www.vaultproject.io/docs/secrets/gcp/index.html) for Vault.
@@ -333,16 +334,16 @@ class SecretRoleset(pulumi.CustomResource):
333
334
 
334
335
  :param str resource_name: The name of the resource.
335
336
  :param pulumi.ResourceOptions opts: Options for the resource.
336
- :param pulumi.Input[str] backend: Path where the GCP Secrets Engine is mounted
337
+ :param pulumi.Input[builtins.str] backend: Path where the GCP Secrets Engine is mounted
337
338
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretRolesetBindingArgs', 'SecretRolesetBindingArgsDict']]]] bindings: Bindings to create for this roleset. This can be specified multiple times for multiple bindings. Structure is documented below.
338
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
339
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
339
340
  The value should not contain leading or trailing forward slashes.
340
341
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
341
342
  *Available only for Vault Enterprise*.
342
- :param pulumi.Input[str] project: Name of the GCP project that this roleset's service account will belong to.
343
- :param pulumi.Input[str] roleset: Name of the Roleset to create
344
- :param pulumi.Input[str] secret_type: Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
345
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
343
+ :param pulumi.Input[builtins.str] project: Name of the GCP project that this roleset's service account will belong to.
344
+ :param pulumi.Input[builtins.str] roleset: Name of the Roleset to create
345
+ :param pulumi.Input[builtins.str] secret_type: Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
346
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
346
347
  """
347
348
  ...
348
349
  @overload
@@ -401,13 +402,13 @@ class SecretRoleset(pulumi.CustomResource):
401
402
  def _internal_init(__self__,
402
403
  resource_name: str,
403
404
  opts: Optional[pulumi.ResourceOptions] = None,
404
- backend: Optional[pulumi.Input[str]] = None,
405
+ backend: Optional[pulumi.Input[builtins.str]] = None,
405
406
  bindings: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretRolesetBindingArgs', 'SecretRolesetBindingArgsDict']]]]] = None,
406
- namespace: Optional[pulumi.Input[str]] = None,
407
- project: Optional[pulumi.Input[str]] = None,
408
- roleset: Optional[pulumi.Input[str]] = None,
409
- secret_type: Optional[pulumi.Input[str]] = None,
410
- token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
407
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
408
+ project: Optional[pulumi.Input[builtins.str]] = None,
409
+ roleset: Optional[pulumi.Input[builtins.str]] = None,
410
+ secret_type: Optional[pulumi.Input[builtins.str]] = None,
411
+ token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
411
412
  __props__=None):
412
413
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
413
414
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -443,14 +444,14 @@ class SecretRoleset(pulumi.CustomResource):
443
444
  def get(resource_name: str,
444
445
  id: pulumi.Input[str],
445
446
  opts: Optional[pulumi.ResourceOptions] = None,
446
- backend: Optional[pulumi.Input[str]] = None,
447
+ backend: Optional[pulumi.Input[builtins.str]] = None,
447
448
  bindings: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretRolesetBindingArgs', 'SecretRolesetBindingArgsDict']]]]] = None,
448
- namespace: Optional[pulumi.Input[str]] = None,
449
- project: Optional[pulumi.Input[str]] = None,
450
- roleset: Optional[pulumi.Input[str]] = None,
451
- secret_type: Optional[pulumi.Input[str]] = None,
452
- service_account_email: Optional[pulumi.Input[str]] = None,
453
- token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None) -> 'SecretRoleset':
449
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
450
+ project: Optional[pulumi.Input[builtins.str]] = None,
451
+ roleset: Optional[pulumi.Input[builtins.str]] = None,
452
+ secret_type: Optional[pulumi.Input[builtins.str]] = None,
453
+ service_account_email: Optional[pulumi.Input[builtins.str]] = None,
454
+ token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None) -> 'SecretRoleset':
454
455
  """
455
456
  Get an existing SecretRoleset resource's state with the given name, id, and optional extra
456
457
  properties used to qualify the lookup.
@@ -458,17 +459,17 @@ class SecretRoleset(pulumi.CustomResource):
458
459
  :param str resource_name: The unique name of the resulting resource.
459
460
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
460
461
  :param pulumi.ResourceOptions opts: Options for the resource.
461
- :param pulumi.Input[str] backend: Path where the GCP Secrets Engine is mounted
462
+ :param pulumi.Input[builtins.str] backend: Path where the GCP Secrets Engine is mounted
462
463
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretRolesetBindingArgs', 'SecretRolesetBindingArgsDict']]]] bindings: Bindings to create for this roleset. This can be specified multiple times for multiple bindings. Structure is documented below.
463
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
464
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
464
465
  The value should not contain leading or trailing forward slashes.
465
466
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
466
467
  *Available only for Vault Enterprise*.
467
- :param pulumi.Input[str] project: Name of the GCP project that this roleset's service account will belong to.
468
- :param pulumi.Input[str] roleset: Name of the Roleset to create
469
- :param pulumi.Input[str] secret_type: Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
470
- :param pulumi.Input[str] service_account_email: Email of the service account created by Vault for this Roleset.
471
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
468
+ :param pulumi.Input[builtins.str] project: Name of the GCP project that this roleset's service account will belong to.
469
+ :param pulumi.Input[builtins.str] roleset: Name of the Roleset to create
470
+ :param pulumi.Input[builtins.str] secret_type: Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
471
+ :param pulumi.Input[builtins.str] service_account_email: Email of the service account created by Vault for this Roleset.
472
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
472
473
  """
473
474
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
474
475
 
@@ -486,7 +487,7 @@ class SecretRoleset(pulumi.CustomResource):
486
487
 
487
488
  @property
488
489
  @pulumi.getter
489
- def backend(self) -> pulumi.Output[str]:
490
+ def backend(self) -> pulumi.Output[builtins.str]:
490
491
  """
491
492
  Path where the GCP Secrets Engine is mounted
492
493
  """
@@ -502,7 +503,7 @@ class SecretRoleset(pulumi.CustomResource):
502
503
 
503
504
  @property
504
505
  @pulumi.getter
505
- def namespace(self) -> pulumi.Output[Optional[str]]:
506
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
506
507
  """
507
508
  The namespace to provision the resource in.
508
509
  The value should not contain leading or trailing forward slashes.
@@ -513,7 +514,7 @@ class SecretRoleset(pulumi.CustomResource):
513
514
 
514
515
  @property
515
516
  @pulumi.getter
516
- def project(self) -> pulumi.Output[str]:
517
+ def project(self) -> pulumi.Output[builtins.str]:
517
518
  """
518
519
  Name of the GCP project that this roleset's service account will belong to.
519
520
  """
@@ -521,7 +522,7 @@ class SecretRoleset(pulumi.CustomResource):
521
522
 
522
523
  @property
523
524
  @pulumi.getter
524
- def roleset(self) -> pulumi.Output[str]:
525
+ def roleset(self) -> pulumi.Output[builtins.str]:
525
526
  """
526
527
  Name of the Roleset to create
527
528
  """
@@ -529,7 +530,7 @@ class SecretRoleset(pulumi.CustomResource):
529
530
 
530
531
  @property
531
532
  @pulumi.getter(name="secretType")
532
- def secret_type(self) -> pulumi.Output[str]:
533
+ def secret_type(self) -> pulumi.Output[builtins.str]:
533
534
  """
534
535
  Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
535
536
  """
@@ -537,7 +538,7 @@ class SecretRoleset(pulumi.CustomResource):
537
538
 
538
539
  @property
539
540
  @pulumi.getter(name="serviceAccountEmail")
540
- def service_account_email(self) -> pulumi.Output[str]:
541
+ def service_account_email(self) -> pulumi.Output[builtins.str]:
541
542
  """
542
543
  Email of the service account created by Vault for this Roleset.
543
544
  """
@@ -545,7 +546,7 @@ class SecretRoleset(pulumi.CustomResource):
545
546
 
546
547
  @property
547
548
  @pulumi.getter(name="tokenScopes")
548
- def token_scopes(self) -> pulumi.Output[Optional[Sequence[str]]]:
549
+ def token_scopes(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
549
550
  """
550
551
  List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
551
552
  """