pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -21,25 +22,25 @@ __all__ = ['SecretStaticAccountArgs', 'SecretStaticAccount']
21
22
  @pulumi.input_type
22
23
  class SecretStaticAccountArgs:
23
24
  def __init__(__self__, *,
24
- backend: pulumi.Input[str],
25
- service_account_email: pulumi.Input[str],
26
- static_account: pulumi.Input[str],
25
+ backend: pulumi.Input[builtins.str],
26
+ service_account_email: pulumi.Input[builtins.str],
27
+ static_account: pulumi.Input[builtins.str],
27
28
  bindings: Optional[pulumi.Input[Sequence[pulumi.Input['SecretStaticAccountBindingArgs']]]] = None,
28
- namespace: Optional[pulumi.Input[str]] = None,
29
- secret_type: Optional[pulumi.Input[str]] = None,
30
- token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
29
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
30
+ secret_type: Optional[pulumi.Input[builtins.str]] = None,
31
+ token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
31
32
  """
32
33
  The set of arguments for constructing a SecretStaticAccount resource.
33
- :param pulumi.Input[str] backend: Path where the GCP Secrets Engine is mounted
34
- :param pulumi.Input[str] service_account_email: Email of the GCP service account to manage.
35
- :param pulumi.Input[str] static_account: Name of the Static Account to create
34
+ :param pulumi.Input[builtins.str] backend: Path where the GCP Secrets Engine is mounted
35
+ :param pulumi.Input[builtins.str] service_account_email: Email of the GCP service account to manage.
36
+ :param pulumi.Input[builtins.str] static_account: Name of the Static Account to create
36
37
  :param pulumi.Input[Sequence[pulumi.Input['SecretStaticAccountBindingArgs']]] bindings: Bindings to create for this static account. This can be specified multiple times for multiple bindings. Structure is documented below.
37
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
38
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
38
39
  The value should not contain leading or trailing forward slashes.
39
40
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
40
41
  *Available only for Vault Enterprise*.
41
- :param pulumi.Input[str] secret_type: Type of secret generated for this static account. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
42
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only).
42
+ :param pulumi.Input[builtins.str] secret_type: Type of secret generated for this static account. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
43
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only).
43
44
  """
44
45
  pulumi.set(__self__, "backend", backend)
45
46
  pulumi.set(__self__, "service_account_email", service_account_email)
@@ -55,38 +56,38 @@ class SecretStaticAccountArgs:
55
56
 
56
57
  @property
57
58
  @pulumi.getter
58
- def backend(self) -> pulumi.Input[str]:
59
+ def backend(self) -> pulumi.Input[builtins.str]:
59
60
  """
60
61
  Path where the GCP Secrets Engine is mounted
61
62
  """
62
63
  return pulumi.get(self, "backend")
63
64
 
64
65
  @backend.setter
65
- def backend(self, value: pulumi.Input[str]):
66
+ def backend(self, value: pulumi.Input[builtins.str]):
66
67
  pulumi.set(self, "backend", value)
67
68
 
68
69
  @property
69
70
  @pulumi.getter(name="serviceAccountEmail")
70
- def service_account_email(self) -> pulumi.Input[str]:
71
+ def service_account_email(self) -> pulumi.Input[builtins.str]:
71
72
  """
72
73
  Email of the GCP service account to manage.
73
74
  """
74
75
  return pulumi.get(self, "service_account_email")
75
76
 
76
77
  @service_account_email.setter
77
- def service_account_email(self, value: pulumi.Input[str]):
78
+ def service_account_email(self, value: pulumi.Input[builtins.str]):
78
79
  pulumi.set(self, "service_account_email", value)
79
80
 
80
81
  @property
81
82
  @pulumi.getter(name="staticAccount")
82
- def static_account(self) -> pulumi.Input[str]:
83
+ def static_account(self) -> pulumi.Input[builtins.str]:
83
84
  """
84
85
  Name of the Static Account to create
85
86
  """
86
87
  return pulumi.get(self, "static_account")
87
88
 
88
89
  @static_account.setter
89
- def static_account(self, value: pulumi.Input[str]):
90
+ def static_account(self, value: pulumi.Input[builtins.str]):
90
91
  pulumi.set(self, "static_account", value)
91
92
 
92
93
  @property
@@ -103,7 +104,7 @@ class SecretStaticAccountArgs:
103
104
 
104
105
  @property
105
106
  @pulumi.getter
106
- def namespace(self) -> Optional[pulumi.Input[str]]:
107
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
107
108
  """
108
109
  The namespace to provision the resource in.
109
110
  The value should not contain leading or trailing forward slashes.
@@ -113,58 +114,58 @@ class SecretStaticAccountArgs:
113
114
  return pulumi.get(self, "namespace")
114
115
 
115
116
  @namespace.setter
116
- def namespace(self, value: Optional[pulumi.Input[str]]):
117
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
117
118
  pulumi.set(self, "namespace", value)
118
119
 
119
120
  @property
120
121
  @pulumi.getter(name="secretType")
121
- def secret_type(self) -> Optional[pulumi.Input[str]]:
122
+ def secret_type(self) -> Optional[pulumi.Input[builtins.str]]:
122
123
  """
123
124
  Type of secret generated for this static account. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
124
125
  """
125
126
  return pulumi.get(self, "secret_type")
126
127
 
127
128
  @secret_type.setter
128
- def secret_type(self, value: Optional[pulumi.Input[str]]):
129
+ def secret_type(self, value: Optional[pulumi.Input[builtins.str]]):
129
130
  pulumi.set(self, "secret_type", value)
130
131
 
131
132
  @property
132
133
  @pulumi.getter(name="tokenScopes")
133
- def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
134
+ def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
134
135
  """
135
136
  List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only).
136
137
  """
137
138
  return pulumi.get(self, "token_scopes")
138
139
 
139
140
  @token_scopes.setter
140
- def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
141
+ def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
141
142
  pulumi.set(self, "token_scopes", value)
142
143
 
143
144
 
144
145
  @pulumi.input_type
145
146
  class _SecretStaticAccountState:
146
147
  def __init__(__self__, *,
147
- backend: Optional[pulumi.Input[str]] = None,
148
+ backend: Optional[pulumi.Input[builtins.str]] = None,
148
149
  bindings: Optional[pulumi.Input[Sequence[pulumi.Input['SecretStaticAccountBindingArgs']]]] = None,
149
- namespace: Optional[pulumi.Input[str]] = None,
150
- secret_type: Optional[pulumi.Input[str]] = None,
151
- service_account_email: Optional[pulumi.Input[str]] = None,
152
- service_account_project: Optional[pulumi.Input[str]] = None,
153
- static_account: Optional[pulumi.Input[str]] = None,
154
- token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
150
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
151
+ secret_type: Optional[pulumi.Input[builtins.str]] = None,
152
+ service_account_email: Optional[pulumi.Input[builtins.str]] = None,
153
+ service_account_project: Optional[pulumi.Input[builtins.str]] = None,
154
+ static_account: Optional[pulumi.Input[builtins.str]] = None,
155
+ token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
155
156
  """
156
157
  Input properties used for looking up and filtering SecretStaticAccount resources.
157
- :param pulumi.Input[str] backend: Path where the GCP Secrets Engine is mounted
158
+ :param pulumi.Input[builtins.str] backend: Path where the GCP Secrets Engine is mounted
158
159
  :param pulumi.Input[Sequence[pulumi.Input['SecretStaticAccountBindingArgs']]] bindings: Bindings to create for this static account. This can be specified multiple times for multiple bindings. Structure is documented below.
159
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
160
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
160
161
  The value should not contain leading or trailing forward slashes.
161
162
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
162
163
  *Available only for Vault Enterprise*.
163
- :param pulumi.Input[str] secret_type: Type of secret generated for this static account. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
164
- :param pulumi.Input[str] service_account_email: Email of the GCP service account to manage.
165
- :param pulumi.Input[str] service_account_project: Project the service account belongs to.
166
- :param pulumi.Input[str] static_account: Name of the Static Account to create
167
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only).
164
+ :param pulumi.Input[builtins.str] secret_type: Type of secret generated for this static account. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
165
+ :param pulumi.Input[builtins.str] service_account_email: Email of the GCP service account to manage.
166
+ :param pulumi.Input[builtins.str] service_account_project: Project the service account belongs to.
167
+ :param pulumi.Input[builtins.str] static_account: Name of the Static Account to create
168
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only).
168
169
  """
169
170
  if backend is not None:
170
171
  pulumi.set(__self__, "backend", backend)
@@ -185,14 +186,14 @@ class _SecretStaticAccountState:
185
186
 
186
187
  @property
187
188
  @pulumi.getter
188
- def backend(self) -> Optional[pulumi.Input[str]]:
189
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
189
190
  """
190
191
  Path where the GCP Secrets Engine is mounted
191
192
  """
192
193
  return pulumi.get(self, "backend")
193
194
 
194
195
  @backend.setter
195
- def backend(self, value: Optional[pulumi.Input[str]]):
196
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
196
197
  pulumi.set(self, "backend", value)
197
198
 
198
199
  @property
@@ -209,7 +210,7 @@ class _SecretStaticAccountState:
209
210
 
210
211
  @property
211
212
  @pulumi.getter
212
- def namespace(self) -> Optional[pulumi.Input[str]]:
213
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
213
214
  """
214
215
  The namespace to provision the resource in.
215
216
  The value should not contain leading or trailing forward slashes.
@@ -219,67 +220,67 @@ class _SecretStaticAccountState:
219
220
  return pulumi.get(self, "namespace")
220
221
 
221
222
  @namespace.setter
222
- def namespace(self, value: Optional[pulumi.Input[str]]):
223
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
223
224
  pulumi.set(self, "namespace", value)
224
225
 
225
226
  @property
226
227
  @pulumi.getter(name="secretType")
227
- def secret_type(self) -> Optional[pulumi.Input[str]]:
228
+ def secret_type(self) -> Optional[pulumi.Input[builtins.str]]:
228
229
  """
229
230
  Type of secret generated for this static account. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
230
231
  """
231
232
  return pulumi.get(self, "secret_type")
232
233
 
233
234
  @secret_type.setter
234
- def secret_type(self, value: Optional[pulumi.Input[str]]):
235
+ def secret_type(self, value: Optional[pulumi.Input[builtins.str]]):
235
236
  pulumi.set(self, "secret_type", value)
236
237
 
237
238
  @property
238
239
  @pulumi.getter(name="serviceAccountEmail")
239
- def service_account_email(self) -> Optional[pulumi.Input[str]]:
240
+ def service_account_email(self) -> Optional[pulumi.Input[builtins.str]]:
240
241
  """
241
242
  Email of the GCP service account to manage.
242
243
  """
243
244
  return pulumi.get(self, "service_account_email")
244
245
 
245
246
  @service_account_email.setter
246
- def service_account_email(self, value: Optional[pulumi.Input[str]]):
247
+ def service_account_email(self, value: Optional[pulumi.Input[builtins.str]]):
247
248
  pulumi.set(self, "service_account_email", value)
248
249
 
249
250
  @property
250
251
  @pulumi.getter(name="serviceAccountProject")
251
- def service_account_project(self) -> Optional[pulumi.Input[str]]:
252
+ def service_account_project(self) -> Optional[pulumi.Input[builtins.str]]:
252
253
  """
253
254
  Project the service account belongs to.
254
255
  """
255
256
  return pulumi.get(self, "service_account_project")
256
257
 
257
258
  @service_account_project.setter
258
- def service_account_project(self, value: Optional[pulumi.Input[str]]):
259
+ def service_account_project(self, value: Optional[pulumi.Input[builtins.str]]):
259
260
  pulumi.set(self, "service_account_project", value)
260
261
 
261
262
  @property
262
263
  @pulumi.getter(name="staticAccount")
263
- def static_account(self) -> Optional[pulumi.Input[str]]:
264
+ def static_account(self) -> Optional[pulumi.Input[builtins.str]]:
264
265
  """
265
266
  Name of the Static Account to create
266
267
  """
267
268
  return pulumi.get(self, "static_account")
268
269
 
269
270
  @static_account.setter
270
- def static_account(self, value: Optional[pulumi.Input[str]]):
271
+ def static_account(self, value: Optional[pulumi.Input[builtins.str]]):
271
272
  pulumi.set(self, "static_account", value)
272
273
 
273
274
  @property
274
275
  @pulumi.getter(name="tokenScopes")
275
- def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
276
+ def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
276
277
  """
277
278
  List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only).
278
279
  """
279
280
  return pulumi.get(self, "token_scopes")
280
281
 
281
282
  @token_scopes.setter
282
- def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
283
+ def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
283
284
  pulumi.set(self, "token_scopes", value)
284
285
 
285
286
 
@@ -288,13 +289,13 @@ class SecretStaticAccount(pulumi.CustomResource):
288
289
  def __init__(__self__,
289
290
  resource_name: str,
290
291
  opts: Optional[pulumi.ResourceOptions] = None,
291
- backend: Optional[pulumi.Input[str]] = None,
292
+ backend: Optional[pulumi.Input[builtins.str]] = None,
292
293
  bindings: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretStaticAccountBindingArgs', 'SecretStaticAccountBindingArgsDict']]]]] = None,
293
- namespace: Optional[pulumi.Input[str]] = None,
294
- secret_type: Optional[pulumi.Input[str]] = None,
295
- service_account_email: Optional[pulumi.Input[str]] = None,
296
- static_account: Optional[pulumi.Input[str]] = None,
297
- token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
294
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
295
+ secret_type: Optional[pulumi.Input[builtins.str]] = None,
296
+ service_account_email: Optional[pulumi.Input[builtins.str]] = None,
297
+ static_account: Optional[pulumi.Input[builtins.str]] = None,
298
+ token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
298
299
  __props__=None):
299
300
  """
300
301
  Creates a Static Account in the [GCP Secrets Engine](https://www.vaultproject.io/docs/secrets/gcp/index.html) for Vault.
@@ -336,16 +337,16 @@ class SecretStaticAccount(pulumi.CustomResource):
336
337
 
337
338
  :param str resource_name: The name of the resource.
338
339
  :param pulumi.ResourceOptions opts: Options for the resource.
339
- :param pulumi.Input[str] backend: Path where the GCP Secrets Engine is mounted
340
+ :param pulumi.Input[builtins.str] backend: Path where the GCP Secrets Engine is mounted
340
341
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretStaticAccountBindingArgs', 'SecretStaticAccountBindingArgsDict']]]] bindings: Bindings to create for this static account. This can be specified multiple times for multiple bindings. Structure is documented below.
341
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
342
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
342
343
  The value should not contain leading or trailing forward slashes.
343
344
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
344
345
  *Available only for Vault Enterprise*.
345
- :param pulumi.Input[str] secret_type: Type of secret generated for this static account. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
346
- :param pulumi.Input[str] service_account_email: Email of the GCP service account to manage.
347
- :param pulumi.Input[str] static_account: Name of the Static Account to create
348
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only).
346
+ :param pulumi.Input[builtins.str] secret_type: Type of secret generated for this static account. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
347
+ :param pulumi.Input[builtins.str] service_account_email: Email of the GCP service account to manage.
348
+ :param pulumi.Input[builtins.str] static_account: Name of the Static Account to create
349
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only).
349
350
  """
350
351
  ...
351
352
  @overload
@@ -406,13 +407,13 @@ class SecretStaticAccount(pulumi.CustomResource):
406
407
  def _internal_init(__self__,
407
408
  resource_name: str,
408
409
  opts: Optional[pulumi.ResourceOptions] = None,
409
- backend: Optional[pulumi.Input[str]] = None,
410
+ backend: Optional[pulumi.Input[builtins.str]] = None,
410
411
  bindings: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretStaticAccountBindingArgs', 'SecretStaticAccountBindingArgsDict']]]]] = None,
411
- namespace: Optional[pulumi.Input[str]] = None,
412
- secret_type: Optional[pulumi.Input[str]] = None,
413
- service_account_email: Optional[pulumi.Input[str]] = None,
414
- static_account: Optional[pulumi.Input[str]] = None,
415
- token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
412
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
413
+ secret_type: Optional[pulumi.Input[builtins.str]] = None,
414
+ service_account_email: Optional[pulumi.Input[builtins.str]] = None,
415
+ static_account: Optional[pulumi.Input[builtins.str]] = None,
416
+ token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
416
417
  __props__=None):
417
418
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
418
419
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -446,14 +447,14 @@ class SecretStaticAccount(pulumi.CustomResource):
446
447
  def get(resource_name: str,
447
448
  id: pulumi.Input[str],
448
449
  opts: Optional[pulumi.ResourceOptions] = None,
449
- backend: Optional[pulumi.Input[str]] = None,
450
+ backend: Optional[pulumi.Input[builtins.str]] = None,
450
451
  bindings: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretStaticAccountBindingArgs', 'SecretStaticAccountBindingArgsDict']]]]] = None,
451
- namespace: Optional[pulumi.Input[str]] = None,
452
- secret_type: Optional[pulumi.Input[str]] = None,
453
- service_account_email: Optional[pulumi.Input[str]] = None,
454
- service_account_project: Optional[pulumi.Input[str]] = None,
455
- static_account: Optional[pulumi.Input[str]] = None,
456
- token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None) -> 'SecretStaticAccount':
452
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
453
+ secret_type: Optional[pulumi.Input[builtins.str]] = None,
454
+ service_account_email: Optional[pulumi.Input[builtins.str]] = None,
455
+ service_account_project: Optional[pulumi.Input[builtins.str]] = None,
456
+ static_account: Optional[pulumi.Input[builtins.str]] = None,
457
+ token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None) -> 'SecretStaticAccount':
457
458
  """
458
459
  Get an existing SecretStaticAccount resource's state with the given name, id, and optional extra
459
460
  properties used to qualify the lookup.
@@ -461,17 +462,17 @@ class SecretStaticAccount(pulumi.CustomResource):
461
462
  :param str resource_name: The unique name of the resulting resource.
462
463
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
463
464
  :param pulumi.ResourceOptions opts: Options for the resource.
464
- :param pulumi.Input[str] backend: Path where the GCP Secrets Engine is mounted
465
+ :param pulumi.Input[builtins.str] backend: Path where the GCP Secrets Engine is mounted
465
466
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretStaticAccountBindingArgs', 'SecretStaticAccountBindingArgsDict']]]] bindings: Bindings to create for this static account. This can be specified multiple times for multiple bindings. Structure is documented below.
466
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
467
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
467
468
  The value should not contain leading or trailing forward slashes.
468
469
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
469
470
  *Available only for Vault Enterprise*.
470
- :param pulumi.Input[str] secret_type: Type of secret generated for this static account. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
471
- :param pulumi.Input[str] service_account_email: Email of the GCP service account to manage.
472
- :param pulumi.Input[str] service_account_project: Project the service account belongs to.
473
- :param pulumi.Input[str] static_account: Name of the Static Account to create
474
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only).
471
+ :param pulumi.Input[builtins.str] secret_type: Type of secret generated for this static account. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
472
+ :param pulumi.Input[builtins.str] service_account_email: Email of the GCP service account to manage.
473
+ :param pulumi.Input[builtins.str] service_account_project: Project the service account belongs to.
474
+ :param pulumi.Input[builtins.str] static_account: Name of the Static Account to create
475
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only).
475
476
  """
476
477
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
477
478
 
@@ -489,7 +490,7 @@ class SecretStaticAccount(pulumi.CustomResource):
489
490
 
490
491
  @property
491
492
  @pulumi.getter
492
- def backend(self) -> pulumi.Output[str]:
493
+ def backend(self) -> pulumi.Output[builtins.str]:
493
494
  """
494
495
  Path where the GCP Secrets Engine is mounted
495
496
  """
@@ -505,7 +506,7 @@ class SecretStaticAccount(pulumi.CustomResource):
505
506
 
506
507
  @property
507
508
  @pulumi.getter
508
- def namespace(self) -> pulumi.Output[Optional[str]]:
509
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
509
510
  """
510
511
  The namespace to provision the resource in.
511
512
  The value should not contain leading or trailing forward slashes.
@@ -516,7 +517,7 @@ class SecretStaticAccount(pulumi.CustomResource):
516
517
 
517
518
  @property
518
519
  @pulumi.getter(name="secretType")
519
- def secret_type(self) -> pulumi.Output[str]:
520
+ def secret_type(self) -> pulumi.Output[builtins.str]:
520
521
  """
521
522
  Type of secret generated for this static account. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
522
523
  """
@@ -524,7 +525,7 @@ class SecretStaticAccount(pulumi.CustomResource):
524
525
 
525
526
  @property
526
527
  @pulumi.getter(name="serviceAccountEmail")
527
- def service_account_email(self) -> pulumi.Output[str]:
528
+ def service_account_email(self) -> pulumi.Output[builtins.str]:
528
529
  """
529
530
  Email of the GCP service account to manage.
530
531
  """
@@ -532,7 +533,7 @@ class SecretStaticAccount(pulumi.CustomResource):
532
533
 
533
534
  @property
534
535
  @pulumi.getter(name="serviceAccountProject")
535
- def service_account_project(self) -> pulumi.Output[str]:
536
+ def service_account_project(self) -> pulumi.Output[builtins.str]:
536
537
  """
537
538
  Project the service account belongs to.
538
539
  """
@@ -540,7 +541,7 @@ class SecretStaticAccount(pulumi.CustomResource):
540
541
 
541
542
  @property
542
543
  @pulumi.getter(name="staticAccount")
543
- def static_account(self) -> pulumi.Output[str]:
544
+ def static_account(self) -> pulumi.Output[builtins.str]:
544
545
  """
545
546
  Name of the Static Account to create
546
547
  """
@@ -548,7 +549,7 @@ class SecretStaticAccount(pulumi.CustomResource):
548
549
 
549
550
  @property
550
551
  @pulumi.getter(name="tokenScopes")
551
- def token_scopes(self) -> pulumi.Output[Optional[Sequence[str]]]:
552
+ def token_scopes(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
552
553
  """
553
554
  List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only).
554
555
  """
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  from .. import _utilities
6
7
  import typing
7
8
  # Export this package's modules as members: