pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -19,20 +20,20 @@ __all__ = ['SecretImpersonatedAccountArgs', 'SecretImpersonatedAccount']
19
20
  @pulumi.input_type
20
21
  class SecretImpersonatedAccountArgs:
21
22
  def __init__(__self__, *,
22
- backend: pulumi.Input[str],
23
- impersonated_account: pulumi.Input[str],
24
- service_account_email: pulumi.Input[str],
25
- namespace: Optional[pulumi.Input[str]] = None,
26
- token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
27
- ttl: Optional[pulumi.Input[str]] = None):
23
+ backend: pulumi.Input[builtins.str],
24
+ impersonated_account: pulumi.Input[builtins.str],
25
+ service_account_email: pulumi.Input[builtins.str],
26
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
27
+ token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
28
+ ttl: Optional[pulumi.Input[builtins.str]] = None):
28
29
  """
29
30
  The set of arguments for constructing a SecretImpersonatedAccount resource.
30
- :param pulumi.Input[str] backend: Path where the GCP Secrets Engine is mounted
31
- :param pulumi.Input[str] impersonated_account: Name of the Impersonated Account to create
32
- :param pulumi.Input[str] service_account_email: Email of the GCP service account to impersonate.
33
- :param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
34
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_scopes: List of OAuth scopes to assign to access tokens generated under this impersonated account.
35
- :param pulumi.Input[str] ttl: Specifies the default TTL for service principals generated using this role.
31
+ :param pulumi.Input[builtins.str] backend: Path where the GCP Secrets Engine is mounted
32
+ :param pulumi.Input[builtins.str] impersonated_account: Name of the Impersonated Account to create
33
+ :param pulumi.Input[builtins.str] service_account_email: Email of the GCP service account to impersonate.
34
+ :param pulumi.Input[builtins.str] namespace: Target namespace. (requires Enterprise)
35
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_scopes: List of OAuth scopes to assign to access tokens generated under this impersonated account.
36
+ :param pulumi.Input[builtins.str] ttl: Specifies the default TTL for service principals generated using this role.
36
37
  Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
37
38
  """
38
39
  pulumi.set(__self__, "backend", backend)
@@ -47,67 +48,67 @@ class SecretImpersonatedAccountArgs:
47
48
 
48
49
  @property
49
50
  @pulumi.getter
50
- def backend(self) -> pulumi.Input[str]:
51
+ def backend(self) -> pulumi.Input[builtins.str]:
51
52
  """
52
53
  Path where the GCP Secrets Engine is mounted
53
54
  """
54
55
  return pulumi.get(self, "backend")
55
56
 
56
57
  @backend.setter
57
- def backend(self, value: pulumi.Input[str]):
58
+ def backend(self, value: pulumi.Input[builtins.str]):
58
59
  pulumi.set(self, "backend", value)
59
60
 
60
61
  @property
61
62
  @pulumi.getter(name="impersonatedAccount")
62
- def impersonated_account(self) -> pulumi.Input[str]:
63
+ def impersonated_account(self) -> pulumi.Input[builtins.str]:
63
64
  """
64
65
  Name of the Impersonated Account to create
65
66
  """
66
67
  return pulumi.get(self, "impersonated_account")
67
68
 
68
69
  @impersonated_account.setter
69
- def impersonated_account(self, value: pulumi.Input[str]):
70
+ def impersonated_account(self, value: pulumi.Input[builtins.str]):
70
71
  pulumi.set(self, "impersonated_account", value)
71
72
 
72
73
  @property
73
74
  @pulumi.getter(name="serviceAccountEmail")
74
- def service_account_email(self) -> pulumi.Input[str]:
75
+ def service_account_email(self) -> pulumi.Input[builtins.str]:
75
76
  """
76
77
  Email of the GCP service account to impersonate.
77
78
  """
78
79
  return pulumi.get(self, "service_account_email")
79
80
 
80
81
  @service_account_email.setter
81
- def service_account_email(self, value: pulumi.Input[str]):
82
+ def service_account_email(self, value: pulumi.Input[builtins.str]):
82
83
  pulumi.set(self, "service_account_email", value)
83
84
 
84
85
  @property
85
86
  @pulumi.getter
86
- def namespace(self) -> Optional[pulumi.Input[str]]:
87
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
87
88
  """
88
89
  Target namespace. (requires Enterprise)
89
90
  """
90
91
  return pulumi.get(self, "namespace")
91
92
 
92
93
  @namespace.setter
93
- def namespace(self, value: Optional[pulumi.Input[str]]):
94
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
94
95
  pulumi.set(self, "namespace", value)
95
96
 
96
97
  @property
97
98
  @pulumi.getter(name="tokenScopes")
98
- def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
99
+ def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
99
100
  """
100
101
  List of OAuth scopes to assign to access tokens generated under this impersonated account.
101
102
  """
102
103
  return pulumi.get(self, "token_scopes")
103
104
 
104
105
  @token_scopes.setter
105
- def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
106
+ def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
106
107
  pulumi.set(self, "token_scopes", value)
107
108
 
108
109
  @property
109
110
  @pulumi.getter
110
- def ttl(self) -> Optional[pulumi.Input[str]]:
111
+ def ttl(self) -> Optional[pulumi.Input[builtins.str]]:
111
112
  """
112
113
  Specifies the default TTL for service principals generated using this role.
113
114
  Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
@@ -115,29 +116,29 @@ class SecretImpersonatedAccountArgs:
115
116
  return pulumi.get(self, "ttl")
116
117
 
117
118
  @ttl.setter
118
- def ttl(self, value: Optional[pulumi.Input[str]]):
119
+ def ttl(self, value: Optional[pulumi.Input[builtins.str]]):
119
120
  pulumi.set(self, "ttl", value)
120
121
 
121
122
 
122
123
  @pulumi.input_type
123
124
  class _SecretImpersonatedAccountState:
124
125
  def __init__(__self__, *,
125
- backend: Optional[pulumi.Input[str]] = None,
126
- impersonated_account: Optional[pulumi.Input[str]] = None,
127
- namespace: Optional[pulumi.Input[str]] = None,
128
- service_account_email: Optional[pulumi.Input[str]] = None,
129
- service_account_project: Optional[pulumi.Input[str]] = None,
130
- token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
131
- ttl: Optional[pulumi.Input[str]] = None):
126
+ backend: Optional[pulumi.Input[builtins.str]] = None,
127
+ impersonated_account: Optional[pulumi.Input[builtins.str]] = None,
128
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
129
+ service_account_email: Optional[pulumi.Input[builtins.str]] = None,
130
+ service_account_project: Optional[pulumi.Input[builtins.str]] = None,
131
+ token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
132
+ ttl: Optional[pulumi.Input[builtins.str]] = None):
132
133
  """
133
134
  Input properties used for looking up and filtering SecretImpersonatedAccount resources.
134
- :param pulumi.Input[str] backend: Path where the GCP Secrets Engine is mounted
135
- :param pulumi.Input[str] impersonated_account: Name of the Impersonated Account to create
136
- :param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
137
- :param pulumi.Input[str] service_account_email: Email of the GCP service account to impersonate.
138
- :param pulumi.Input[str] service_account_project: Project the service account belongs to.
139
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_scopes: List of OAuth scopes to assign to access tokens generated under this impersonated account.
140
- :param pulumi.Input[str] ttl: Specifies the default TTL for service principals generated using this role.
135
+ :param pulumi.Input[builtins.str] backend: Path where the GCP Secrets Engine is mounted
136
+ :param pulumi.Input[builtins.str] impersonated_account: Name of the Impersonated Account to create
137
+ :param pulumi.Input[builtins.str] namespace: Target namespace. (requires Enterprise)
138
+ :param pulumi.Input[builtins.str] service_account_email: Email of the GCP service account to impersonate.
139
+ :param pulumi.Input[builtins.str] service_account_project: Project the service account belongs to.
140
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_scopes: List of OAuth scopes to assign to access tokens generated under this impersonated account.
141
+ :param pulumi.Input[builtins.str] ttl: Specifies the default TTL for service principals generated using this role.
141
142
  Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
142
143
  """
143
144
  if backend is not None:
@@ -157,79 +158,79 @@ class _SecretImpersonatedAccountState:
157
158
 
158
159
  @property
159
160
  @pulumi.getter
160
- def backend(self) -> Optional[pulumi.Input[str]]:
161
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
161
162
  """
162
163
  Path where the GCP Secrets Engine is mounted
163
164
  """
164
165
  return pulumi.get(self, "backend")
165
166
 
166
167
  @backend.setter
167
- def backend(self, value: Optional[pulumi.Input[str]]):
168
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
168
169
  pulumi.set(self, "backend", value)
169
170
 
170
171
  @property
171
172
  @pulumi.getter(name="impersonatedAccount")
172
- def impersonated_account(self) -> Optional[pulumi.Input[str]]:
173
+ def impersonated_account(self) -> Optional[pulumi.Input[builtins.str]]:
173
174
  """
174
175
  Name of the Impersonated Account to create
175
176
  """
176
177
  return pulumi.get(self, "impersonated_account")
177
178
 
178
179
  @impersonated_account.setter
179
- def impersonated_account(self, value: Optional[pulumi.Input[str]]):
180
+ def impersonated_account(self, value: Optional[pulumi.Input[builtins.str]]):
180
181
  pulumi.set(self, "impersonated_account", value)
181
182
 
182
183
  @property
183
184
  @pulumi.getter
184
- def namespace(self) -> Optional[pulumi.Input[str]]:
185
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
185
186
  """
186
187
  Target namespace. (requires Enterprise)
187
188
  """
188
189
  return pulumi.get(self, "namespace")
189
190
 
190
191
  @namespace.setter
191
- def namespace(self, value: Optional[pulumi.Input[str]]):
192
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
192
193
  pulumi.set(self, "namespace", value)
193
194
 
194
195
  @property
195
196
  @pulumi.getter(name="serviceAccountEmail")
196
- def service_account_email(self) -> Optional[pulumi.Input[str]]:
197
+ def service_account_email(self) -> Optional[pulumi.Input[builtins.str]]:
197
198
  """
198
199
  Email of the GCP service account to impersonate.
199
200
  """
200
201
  return pulumi.get(self, "service_account_email")
201
202
 
202
203
  @service_account_email.setter
203
- def service_account_email(self, value: Optional[pulumi.Input[str]]):
204
+ def service_account_email(self, value: Optional[pulumi.Input[builtins.str]]):
204
205
  pulumi.set(self, "service_account_email", value)
205
206
 
206
207
  @property
207
208
  @pulumi.getter(name="serviceAccountProject")
208
- def service_account_project(self) -> Optional[pulumi.Input[str]]:
209
+ def service_account_project(self) -> Optional[pulumi.Input[builtins.str]]:
209
210
  """
210
211
  Project the service account belongs to.
211
212
  """
212
213
  return pulumi.get(self, "service_account_project")
213
214
 
214
215
  @service_account_project.setter
215
- def service_account_project(self, value: Optional[pulumi.Input[str]]):
216
+ def service_account_project(self, value: Optional[pulumi.Input[builtins.str]]):
216
217
  pulumi.set(self, "service_account_project", value)
217
218
 
218
219
  @property
219
220
  @pulumi.getter(name="tokenScopes")
220
- def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
221
+ def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
221
222
  """
222
223
  List of OAuth scopes to assign to access tokens generated under this impersonated account.
223
224
  """
224
225
  return pulumi.get(self, "token_scopes")
225
226
 
226
227
  @token_scopes.setter
227
- def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
228
+ def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
228
229
  pulumi.set(self, "token_scopes", value)
229
230
 
230
231
  @property
231
232
  @pulumi.getter
232
- def ttl(self) -> Optional[pulumi.Input[str]]:
233
+ def ttl(self) -> Optional[pulumi.Input[builtins.str]]:
233
234
  """
234
235
  Specifies the default TTL for service principals generated using this role.
235
236
  Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
@@ -237,7 +238,7 @@ class _SecretImpersonatedAccountState:
237
238
  return pulumi.get(self, "ttl")
238
239
 
239
240
  @ttl.setter
240
- def ttl(self, value: Optional[pulumi.Input[str]]):
241
+ def ttl(self, value: Optional[pulumi.Input[builtins.str]]):
241
242
  pulumi.set(self, "ttl", value)
242
243
 
243
244
 
@@ -246,12 +247,12 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
246
247
  def __init__(__self__,
247
248
  resource_name: str,
248
249
  opts: Optional[pulumi.ResourceOptions] = None,
249
- backend: Optional[pulumi.Input[str]] = None,
250
- impersonated_account: Optional[pulumi.Input[str]] = None,
251
- namespace: Optional[pulumi.Input[str]] = None,
252
- service_account_email: Optional[pulumi.Input[str]] = None,
253
- token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
254
- ttl: Optional[pulumi.Input[str]] = None,
250
+ backend: Optional[pulumi.Input[builtins.str]] = None,
251
+ impersonated_account: Optional[pulumi.Input[builtins.str]] = None,
252
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
253
+ service_account_email: Optional[pulumi.Input[builtins.str]] = None,
254
+ token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
255
+ ttl: Optional[pulumi.Input[builtins.str]] = None,
255
256
  __props__=None):
256
257
  """
257
258
  Creates a Impersonated Account in the [GCP Secrets Engine](https://www.vaultproject.io/docs/secrets/gcp/index.html) for Vault.
@@ -288,12 +289,12 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
288
289
 
289
290
  :param str resource_name: The name of the resource.
290
291
  :param pulumi.ResourceOptions opts: Options for the resource.
291
- :param pulumi.Input[str] backend: Path where the GCP Secrets Engine is mounted
292
- :param pulumi.Input[str] impersonated_account: Name of the Impersonated Account to create
293
- :param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
294
- :param pulumi.Input[str] service_account_email: Email of the GCP service account to impersonate.
295
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_scopes: List of OAuth scopes to assign to access tokens generated under this impersonated account.
296
- :param pulumi.Input[str] ttl: Specifies the default TTL for service principals generated using this role.
292
+ :param pulumi.Input[builtins.str] backend: Path where the GCP Secrets Engine is mounted
293
+ :param pulumi.Input[builtins.str] impersonated_account: Name of the Impersonated Account to create
294
+ :param pulumi.Input[builtins.str] namespace: Target namespace. (requires Enterprise)
295
+ :param pulumi.Input[builtins.str] service_account_email: Email of the GCP service account to impersonate.
296
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_scopes: List of OAuth scopes to assign to access tokens generated under this impersonated account.
297
+ :param pulumi.Input[builtins.str] ttl: Specifies the default TTL for service principals generated using this role.
297
298
  Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
298
299
  """
299
300
  ...
@@ -350,12 +351,12 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
350
351
  def _internal_init(__self__,
351
352
  resource_name: str,
352
353
  opts: Optional[pulumi.ResourceOptions] = None,
353
- backend: Optional[pulumi.Input[str]] = None,
354
- impersonated_account: Optional[pulumi.Input[str]] = None,
355
- namespace: Optional[pulumi.Input[str]] = None,
356
- service_account_email: Optional[pulumi.Input[str]] = None,
357
- token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
358
- ttl: Optional[pulumi.Input[str]] = None,
354
+ backend: Optional[pulumi.Input[builtins.str]] = None,
355
+ impersonated_account: Optional[pulumi.Input[builtins.str]] = None,
356
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
357
+ service_account_email: Optional[pulumi.Input[builtins.str]] = None,
358
+ token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
359
+ ttl: Optional[pulumi.Input[builtins.str]] = None,
359
360
  __props__=None):
360
361
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
361
362
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -388,13 +389,13 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
388
389
  def get(resource_name: str,
389
390
  id: pulumi.Input[str],
390
391
  opts: Optional[pulumi.ResourceOptions] = None,
391
- backend: Optional[pulumi.Input[str]] = None,
392
- impersonated_account: Optional[pulumi.Input[str]] = None,
393
- namespace: Optional[pulumi.Input[str]] = None,
394
- service_account_email: Optional[pulumi.Input[str]] = None,
395
- service_account_project: Optional[pulumi.Input[str]] = None,
396
- token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
397
- ttl: Optional[pulumi.Input[str]] = None) -> 'SecretImpersonatedAccount':
392
+ backend: Optional[pulumi.Input[builtins.str]] = None,
393
+ impersonated_account: Optional[pulumi.Input[builtins.str]] = None,
394
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
395
+ service_account_email: Optional[pulumi.Input[builtins.str]] = None,
396
+ service_account_project: Optional[pulumi.Input[builtins.str]] = None,
397
+ token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
398
+ ttl: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretImpersonatedAccount':
398
399
  """
399
400
  Get an existing SecretImpersonatedAccount resource's state with the given name, id, and optional extra
400
401
  properties used to qualify the lookup.
@@ -402,13 +403,13 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
402
403
  :param str resource_name: The unique name of the resulting resource.
403
404
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
404
405
  :param pulumi.ResourceOptions opts: Options for the resource.
405
- :param pulumi.Input[str] backend: Path where the GCP Secrets Engine is mounted
406
- :param pulumi.Input[str] impersonated_account: Name of the Impersonated Account to create
407
- :param pulumi.Input[str] namespace: Target namespace. (requires Enterprise)
408
- :param pulumi.Input[str] service_account_email: Email of the GCP service account to impersonate.
409
- :param pulumi.Input[str] service_account_project: Project the service account belongs to.
410
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_scopes: List of OAuth scopes to assign to access tokens generated under this impersonated account.
411
- :param pulumi.Input[str] ttl: Specifies the default TTL for service principals generated using this role.
406
+ :param pulumi.Input[builtins.str] backend: Path where the GCP Secrets Engine is mounted
407
+ :param pulumi.Input[builtins.str] impersonated_account: Name of the Impersonated Account to create
408
+ :param pulumi.Input[builtins.str] namespace: Target namespace. (requires Enterprise)
409
+ :param pulumi.Input[builtins.str] service_account_email: Email of the GCP service account to impersonate.
410
+ :param pulumi.Input[builtins.str] service_account_project: Project the service account belongs to.
411
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_scopes: List of OAuth scopes to assign to access tokens generated under this impersonated account.
412
+ :param pulumi.Input[builtins.str] ttl: Specifies the default TTL for service principals generated using this role.
412
413
  Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
413
414
  """
414
415
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -426,7 +427,7 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
426
427
 
427
428
  @property
428
429
  @pulumi.getter
429
- def backend(self) -> pulumi.Output[str]:
430
+ def backend(self) -> pulumi.Output[builtins.str]:
430
431
  """
431
432
  Path where the GCP Secrets Engine is mounted
432
433
  """
@@ -434,7 +435,7 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
434
435
 
435
436
  @property
436
437
  @pulumi.getter(name="impersonatedAccount")
437
- def impersonated_account(self) -> pulumi.Output[str]:
438
+ def impersonated_account(self) -> pulumi.Output[builtins.str]:
438
439
  """
439
440
  Name of the Impersonated Account to create
440
441
  """
@@ -442,7 +443,7 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
442
443
 
443
444
  @property
444
445
  @pulumi.getter
445
- def namespace(self) -> pulumi.Output[Optional[str]]:
446
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
446
447
  """
447
448
  Target namespace. (requires Enterprise)
448
449
  """
@@ -450,7 +451,7 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
450
451
 
451
452
  @property
452
453
  @pulumi.getter(name="serviceAccountEmail")
453
- def service_account_email(self) -> pulumi.Output[str]:
454
+ def service_account_email(self) -> pulumi.Output[builtins.str]:
454
455
  """
455
456
  Email of the GCP service account to impersonate.
456
457
  """
@@ -458,7 +459,7 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
458
459
 
459
460
  @property
460
461
  @pulumi.getter(name="serviceAccountProject")
461
- def service_account_project(self) -> pulumi.Output[str]:
462
+ def service_account_project(self) -> pulumi.Output[builtins.str]:
462
463
  """
463
464
  Project the service account belongs to.
464
465
  """
@@ -466,7 +467,7 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
466
467
 
467
468
  @property
468
469
  @pulumi.getter(name="tokenScopes")
469
- def token_scopes(self) -> pulumi.Output[Optional[Sequence[str]]]:
470
+ def token_scopes(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
470
471
  """
471
472
  List of OAuth scopes to assign to access tokens generated under this impersonated account.
472
473
  """
@@ -474,7 +475,7 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
474
475
 
475
476
  @property
476
477
  @pulumi.getter
477
- def ttl(self) -> pulumi.Output[str]:
478
+ def ttl(self) -> pulumi.Output[builtins.str]:
478
479
  """
479
480
  Specifies the default TTL for service principals generated using this role.
480
481
  Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.