pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (269) hide show
  1. pulumi_vault/__init__.py +19 -1
  2. pulumi_vault/_inputs.py +873 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +1016 -439
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +1057 -285
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +887 -256
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +426 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +878 -336
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +400 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +1006 -227
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +431 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +732 -693
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +380 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +909 -271
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/oci_auth_backend.py +683 -0
  168. pulumi_vault/oci_auth_backend_role.py +798 -0
  169. pulumi_vault/okta/__init__.py +1 -1
  170. pulumi_vault/okta/_inputs.py +31 -32
  171. pulumi_vault/okta/auth_backend.py +305 -306
  172. pulumi_vault/okta/auth_backend_group.py +69 -70
  173. pulumi_vault/okta/auth_backend_user.py +86 -87
  174. pulumi_vault/okta/outputs.py +21 -22
  175. pulumi_vault/outputs.py +234 -82
  176. pulumi_vault/pkisecret/__init__.py +1 -1
  177. pulumi_vault/pkisecret/_inputs.py +55 -56
  178. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  179. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  180. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  181. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  182. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  183. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  184. pulumi_vault/pkisecret/backend_config_scep.py +205 -159
  185. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  186. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  187. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  188. pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
  189. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  190. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  191. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  192. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  193. pulumi_vault/pkisecret/outputs.py +61 -62
  194. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  195. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  196. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  197. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  198. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  199. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  200. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  201. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  202. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  203. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  204. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  205. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  206. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  207. pulumi_vault/plugin.py +154 -155
  208. pulumi_vault/plugin_pinned_version.py +52 -53
  209. pulumi_vault/policy.py +52 -53
  210. pulumi_vault/provider.py +160 -161
  211. pulumi_vault/pulumi-plugin.json +1 -1
  212. pulumi_vault/quota_lease_count.py +103 -104
  213. pulumi_vault/quota_rate_limit.py +171 -172
  214. pulumi_vault/rabbitmq/__init__.py +1 -1
  215. pulumi_vault/rabbitmq/_inputs.py +50 -51
  216. pulumi_vault/rabbitmq/outputs.py +34 -35
  217. pulumi_vault/rabbitmq/secret_backend.py +902 -231
  218. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  219. pulumi_vault/raft_autopilot.py +137 -138
  220. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  221. pulumi_vault/rgp_policy.py +69 -70
  222. pulumi_vault/saml/__init__.py +1 -1
  223. pulumi_vault/saml/auth_backend.py +188 -189
  224. pulumi_vault/saml/auth_backend_role.py +290 -291
  225. pulumi_vault/scep_auth_backend_role.py +252 -253
  226. pulumi_vault/secrets/__init__.py +1 -1
  227. pulumi_vault/secrets/_inputs.py +19 -20
  228. pulumi_vault/secrets/outputs.py +13 -14
  229. pulumi_vault/secrets/sync_association.py +88 -89
  230. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  231. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  232. pulumi_vault/secrets/sync_config.py +52 -53
  233. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  234. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  235. pulumi_vault/secrets/sync_github_apps.py +78 -79
  236. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  237. pulumi_vault/ssh/__init__.py +1 -1
  238. pulumi_vault/ssh/_inputs.py +13 -14
  239. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  240. pulumi_vault/ssh/outputs.py +9 -10
  241. pulumi_vault/ssh/secret_backend_ca.py +217 -124
  242. pulumi_vault/ssh/secret_backend_role.py +446 -447
  243. pulumi_vault/terraformcloud/__init__.py +1 -1
  244. pulumi_vault/terraformcloud/secret_backend.py +833 -155
  245. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  246. pulumi_vault/terraformcloud/secret_role.py +117 -118
  247. pulumi_vault/token.py +301 -302
  248. pulumi_vault/tokenauth/__init__.py +1 -1
  249. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  250. pulumi_vault/transform/__init__.py +1 -1
  251. pulumi_vault/transform/alphabet.py +69 -70
  252. pulumi_vault/transform/get_decode.py +57 -58
  253. pulumi_vault/transform/get_encode.py +57 -58
  254. pulumi_vault/transform/role.py +69 -70
  255. pulumi_vault/transform/template.py +137 -138
  256. pulumi_vault/transform/transformation.py +171 -172
  257. pulumi_vault/transit/__init__.py +1 -1
  258. pulumi_vault/transit/get_cmac.py +47 -48
  259. pulumi_vault/transit/get_decrypt.py +25 -26
  260. pulumi_vault/transit/get_encrypt.py +29 -30
  261. pulumi_vault/transit/get_sign.py +71 -72
  262. pulumi_vault/transit/get_verify.py +83 -84
  263. pulumi_vault/transit/secret_backend_key.py +377 -350
  264. pulumi_vault/transit/secret_cache_config.py +52 -53
  265. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
  266. pulumi_vault-7.2.0.dist-info/RECORD +270 -0
  267. pulumi_vault-7.1.0.dist-info/RECORD +0 -268
  268. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
  269. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,20 +19,20 @@ __all__ = ['SecretImpersonatedAccountArgs', 'SecretImpersonatedAccount']
20
19
  @pulumi.input_type
21
20
  class SecretImpersonatedAccountArgs:
22
21
  def __init__(__self__, *,
23
- backend: pulumi.Input[builtins.str],
24
- impersonated_account: pulumi.Input[builtins.str],
25
- service_account_email: pulumi.Input[builtins.str],
26
- namespace: Optional[pulumi.Input[builtins.str]] = None,
27
- token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
28
- ttl: Optional[pulumi.Input[builtins.str]] = None):
22
+ backend: pulumi.Input[_builtins.str],
23
+ impersonated_account: pulumi.Input[_builtins.str],
24
+ service_account_email: pulumi.Input[_builtins.str],
25
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
26
+ token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
+ ttl: Optional[pulumi.Input[_builtins.str]] = None):
29
28
  """
30
29
  The set of arguments for constructing a SecretImpersonatedAccount resource.
31
- :param pulumi.Input[builtins.str] backend: Path where the GCP Secrets Engine is mounted
32
- :param pulumi.Input[builtins.str] impersonated_account: Name of the Impersonated Account to create
33
- :param pulumi.Input[builtins.str] service_account_email: Email of the GCP service account to impersonate.
34
- :param pulumi.Input[builtins.str] namespace: Target namespace. (requires Enterprise)
35
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_scopes: List of OAuth scopes to assign to access tokens generated under this impersonated account.
36
- :param pulumi.Input[builtins.str] ttl: Specifies the default TTL for service principals generated using this role.
30
+ :param pulumi.Input[_builtins.str] backend: Path where the GCP Secrets Engine is mounted
31
+ :param pulumi.Input[_builtins.str] impersonated_account: Name of the Impersonated Account to create
32
+ :param pulumi.Input[_builtins.str] service_account_email: Email of the GCP service account to impersonate.
33
+ :param pulumi.Input[_builtins.str] namespace: Target namespace. (requires Enterprise)
34
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_scopes: List of OAuth scopes to assign to access tokens generated under this impersonated account.
35
+ :param pulumi.Input[_builtins.str] ttl: Specifies the default TTL for service principals generated using this role.
37
36
  Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
38
37
  """
39
38
  pulumi.set(__self__, "backend", backend)
@@ -46,69 +45,69 @@ class SecretImpersonatedAccountArgs:
46
45
  if ttl is not None:
47
46
  pulumi.set(__self__, "ttl", ttl)
48
47
 
49
- @property
48
+ @_builtins.property
50
49
  @pulumi.getter
51
- def backend(self) -> pulumi.Input[builtins.str]:
50
+ def backend(self) -> pulumi.Input[_builtins.str]:
52
51
  """
53
52
  Path where the GCP Secrets Engine is mounted
54
53
  """
55
54
  return pulumi.get(self, "backend")
56
55
 
57
56
  @backend.setter
58
- def backend(self, value: pulumi.Input[builtins.str]):
57
+ def backend(self, value: pulumi.Input[_builtins.str]):
59
58
  pulumi.set(self, "backend", value)
60
59
 
61
- @property
60
+ @_builtins.property
62
61
  @pulumi.getter(name="impersonatedAccount")
63
- def impersonated_account(self) -> pulumi.Input[builtins.str]:
62
+ def impersonated_account(self) -> pulumi.Input[_builtins.str]:
64
63
  """
65
64
  Name of the Impersonated Account to create
66
65
  """
67
66
  return pulumi.get(self, "impersonated_account")
68
67
 
69
68
  @impersonated_account.setter
70
- def impersonated_account(self, value: pulumi.Input[builtins.str]):
69
+ def impersonated_account(self, value: pulumi.Input[_builtins.str]):
71
70
  pulumi.set(self, "impersonated_account", value)
72
71
 
73
- @property
72
+ @_builtins.property
74
73
  @pulumi.getter(name="serviceAccountEmail")
75
- def service_account_email(self) -> pulumi.Input[builtins.str]:
74
+ def service_account_email(self) -> pulumi.Input[_builtins.str]:
76
75
  """
77
76
  Email of the GCP service account to impersonate.
78
77
  """
79
78
  return pulumi.get(self, "service_account_email")
80
79
 
81
80
  @service_account_email.setter
82
- def service_account_email(self, value: pulumi.Input[builtins.str]):
81
+ def service_account_email(self, value: pulumi.Input[_builtins.str]):
83
82
  pulumi.set(self, "service_account_email", value)
84
83
 
85
- @property
84
+ @_builtins.property
86
85
  @pulumi.getter
87
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
86
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
88
87
  """
89
88
  Target namespace. (requires Enterprise)
90
89
  """
91
90
  return pulumi.get(self, "namespace")
92
91
 
93
92
  @namespace.setter
94
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
93
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
95
94
  pulumi.set(self, "namespace", value)
96
95
 
97
- @property
96
+ @_builtins.property
98
97
  @pulumi.getter(name="tokenScopes")
99
- def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
98
+ def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
100
99
  """
101
100
  List of OAuth scopes to assign to access tokens generated under this impersonated account.
102
101
  """
103
102
  return pulumi.get(self, "token_scopes")
104
103
 
105
104
  @token_scopes.setter
106
- def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
105
+ def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
107
106
  pulumi.set(self, "token_scopes", value)
108
107
 
109
- @property
108
+ @_builtins.property
110
109
  @pulumi.getter
111
- def ttl(self) -> Optional[pulumi.Input[builtins.str]]:
110
+ def ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
112
111
  """
113
112
  Specifies the default TTL for service principals generated using this role.
114
113
  Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
@@ -116,29 +115,29 @@ class SecretImpersonatedAccountArgs:
116
115
  return pulumi.get(self, "ttl")
117
116
 
118
117
  @ttl.setter
119
- def ttl(self, value: Optional[pulumi.Input[builtins.str]]):
118
+ def ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
120
119
  pulumi.set(self, "ttl", value)
121
120
 
122
121
 
123
122
  @pulumi.input_type
124
123
  class _SecretImpersonatedAccountState:
125
124
  def __init__(__self__, *,
126
- backend: Optional[pulumi.Input[builtins.str]] = None,
127
- impersonated_account: Optional[pulumi.Input[builtins.str]] = None,
128
- namespace: Optional[pulumi.Input[builtins.str]] = None,
129
- service_account_email: Optional[pulumi.Input[builtins.str]] = None,
130
- service_account_project: Optional[pulumi.Input[builtins.str]] = None,
131
- token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
132
- ttl: Optional[pulumi.Input[builtins.str]] = None):
125
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
126
+ impersonated_account: Optional[pulumi.Input[_builtins.str]] = None,
127
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
128
+ service_account_email: Optional[pulumi.Input[_builtins.str]] = None,
129
+ service_account_project: Optional[pulumi.Input[_builtins.str]] = None,
130
+ token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
131
+ ttl: Optional[pulumi.Input[_builtins.str]] = None):
133
132
  """
134
133
  Input properties used for looking up and filtering SecretImpersonatedAccount resources.
135
- :param pulumi.Input[builtins.str] backend: Path where the GCP Secrets Engine is mounted
136
- :param pulumi.Input[builtins.str] impersonated_account: Name of the Impersonated Account to create
137
- :param pulumi.Input[builtins.str] namespace: Target namespace. (requires Enterprise)
138
- :param pulumi.Input[builtins.str] service_account_email: Email of the GCP service account to impersonate.
139
- :param pulumi.Input[builtins.str] service_account_project: Project the service account belongs to.
140
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_scopes: List of OAuth scopes to assign to access tokens generated under this impersonated account.
141
- :param pulumi.Input[builtins.str] ttl: Specifies the default TTL for service principals generated using this role.
134
+ :param pulumi.Input[_builtins.str] backend: Path where the GCP Secrets Engine is mounted
135
+ :param pulumi.Input[_builtins.str] impersonated_account: Name of the Impersonated Account to create
136
+ :param pulumi.Input[_builtins.str] namespace: Target namespace. (requires Enterprise)
137
+ :param pulumi.Input[_builtins.str] service_account_email: Email of the GCP service account to impersonate.
138
+ :param pulumi.Input[_builtins.str] service_account_project: Project the service account belongs to.
139
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_scopes: List of OAuth scopes to assign to access tokens generated under this impersonated account.
140
+ :param pulumi.Input[_builtins.str] ttl: Specifies the default TTL for service principals generated using this role.
142
141
  Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
143
142
  """
144
143
  if backend is not None:
@@ -156,81 +155,81 @@ class _SecretImpersonatedAccountState:
156
155
  if ttl is not None:
157
156
  pulumi.set(__self__, "ttl", ttl)
158
157
 
159
- @property
158
+ @_builtins.property
160
159
  @pulumi.getter
161
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
160
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
162
161
  """
163
162
  Path where the GCP Secrets Engine is mounted
164
163
  """
165
164
  return pulumi.get(self, "backend")
166
165
 
167
166
  @backend.setter
168
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
167
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
169
168
  pulumi.set(self, "backend", value)
170
169
 
171
- @property
170
+ @_builtins.property
172
171
  @pulumi.getter(name="impersonatedAccount")
173
- def impersonated_account(self) -> Optional[pulumi.Input[builtins.str]]:
172
+ def impersonated_account(self) -> Optional[pulumi.Input[_builtins.str]]:
174
173
  """
175
174
  Name of the Impersonated Account to create
176
175
  """
177
176
  return pulumi.get(self, "impersonated_account")
178
177
 
179
178
  @impersonated_account.setter
180
- def impersonated_account(self, value: Optional[pulumi.Input[builtins.str]]):
179
+ def impersonated_account(self, value: Optional[pulumi.Input[_builtins.str]]):
181
180
  pulumi.set(self, "impersonated_account", value)
182
181
 
183
- @property
182
+ @_builtins.property
184
183
  @pulumi.getter
185
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
184
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
186
185
  """
187
186
  Target namespace. (requires Enterprise)
188
187
  """
189
188
  return pulumi.get(self, "namespace")
190
189
 
191
190
  @namespace.setter
192
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
191
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
193
192
  pulumi.set(self, "namespace", value)
194
193
 
195
- @property
194
+ @_builtins.property
196
195
  @pulumi.getter(name="serviceAccountEmail")
197
- def service_account_email(self) -> Optional[pulumi.Input[builtins.str]]:
196
+ def service_account_email(self) -> Optional[pulumi.Input[_builtins.str]]:
198
197
  """
199
198
  Email of the GCP service account to impersonate.
200
199
  """
201
200
  return pulumi.get(self, "service_account_email")
202
201
 
203
202
  @service_account_email.setter
204
- def service_account_email(self, value: Optional[pulumi.Input[builtins.str]]):
203
+ def service_account_email(self, value: Optional[pulumi.Input[_builtins.str]]):
205
204
  pulumi.set(self, "service_account_email", value)
206
205
 
207
- @property
206
+ @_builtins.property
208
207
  @pulumi.getter(name="serviceAccountProject")
209
- def service_account_project(self) -> Optional[pulumi.Input[builtins.str]]:
208
+ def service_account_project(self) -> Optional[pulumi.Input[_builtins.str]]:
210
209
  """
211
210
  Project the service account belongs to.
212
211
  """
213
212
  return pulumi.get(self, "service_account_project")
214
213
 
215
214
  @service_account_project.setter
216
- def service_account_project(self, value: Optional[pulumi.Input[builtins.str]]):
215
+ def service_account_project(self, value: Optional[pulumi.Input[_builtins.str]]):
217
216
  pulumi.set(self, "service_account_project", value)
218
217
 
219
- @property
218
+ @_builtins.property
220
219
  @pulumi.getter(name="tokenScopes")
221
- def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
220
+ def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
222
221
  """
223
222
  List of OAuth scopes to assign to access tokens generated under this impersonated account.
224
223
  """
225
224
  return pulumi.get(self, "token_scopes")
226
225
 
227
226
  @token_scopes.setter
228
- def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
227
+ def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
229
228
  pulumi.set(self, "token_scopes", value)
230
229
 
231
- @property
230
+ @_builtins.property
232
231
  @pulumi.getter
233
- def ttl(self) -> Optional[pulumi.Input[builtins.str]]:
232
+ def ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
234
233
  """
235
234
  Specifies the default TTL for service principals generated using this role.
236
235
  Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
@@ -238,7 +237,7 @@ class _SecretImpersonatedAccountState:
238
237
  return pulumi.get(self, "ttl")
239
238
 
240
239
  @ttl.setter
241
- def ttl(self, value: Optional[pulumi.Input[builtins.str]]):
240
+ def ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
242
241
  pulumi.set(self, "ttl", value)
243
242
 
244
243
 
@@ -248,12 +247,12 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
248
247
  def __init__(__self__,
249
248
  resource_name: str,
250
249
  opts: Optional[pulumi.ResourceOptions] = None,
251
- backend: Optional[pulumi.Input[builtins.str]] = None,
252
- impersonated_account: Optional[pulumi.Input[builtins.str]] = None,
253
- namespace: Optional[pulumi.Input[builtins.str]] = None,
254
- service_account_email: Optional[pulumi.Input[builtins.str]] = None,
255
- token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
256
- ttl: Optional[pulumi.Input[builtins.str]] = None,
250
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
251
+ impersonated_account: Optional[pulumi.Input[_builtins.str]] = None,
252
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
253
+ service_account_email: Optional[pulumi.Input[_builtins.str]] = None,
254
+ token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
255
+ ttl: Optional[pulumi.Input[_builtins.str]] = None,
257
256
  __props__=None):
258
257
  """
259
258
  Creates a Impersonated Account in the [GCP Secrets Engine](https://www.vaultproject.io/docs/secrets/gcp/index.html) for Vault.
@@ -290,12 +289,12 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
290
289
 
291
290
  :param str resource_name: The name of the resource.
292
291
  :param pulumi.ResourceOptions opts: Options for the resource.
293
- :param pulumi.Input[builtins.str] backend: Path where the GCP Secrets Engine is mounted
294
- :param pulumi.Input[builtins.str] impersonated_account: Name of the Impersonated Account to create
295
- :param pulumi.Input[builtins.str] namespace: Target namespace. (requires Enterprise)
296
- :param pulumi.Input[builtins.str] service_account_email: Email of the GCP service account to impersonate.
297
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_scopes: List of OAuth scopes to assign to access tokens generated under this impersonated account.
298
- :param pulumi.Input[builtins.str] ttl: Specifies the default TTL for service principals generated using this role.
292
+ :param pulumi.Input[_builtins.str] backend: Path where the GCP Secrets Engine is mounted
293
+ :param pulumi.Input[_builtins.str] impersonated_account: Name of the Impersonated Account to create
294
+ :param pulumi.Input[_builtins.str] namespace: Target namespace. (requires Enterprise)
295
+ :param pulumi.Input[_builtins.str] service_account_email: Email of the GCP service account to impersonate.
296
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_scopes: List of OAuth scopes to assign to access tokens generated under this impersonated account.
297
+ :param pulumi.Input[_builtins.str] ttl: Specifies the default TTL for service principals generated using this role.
299
298
  Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
300
299
  """
301
300
  ...
@@ -352,12 +351,12 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
352
351
  def _internal_init(__self__,
353
352
  resource_name: str,
354
353
  opts: Optional[pulumi.ResourceOptions] = None,
355
- backend: Optional[pulumi.Input[builtins.str]] = None,
356
- impersonated_account: Optional[pulumi.Input[builtins.str]] = None,
357
- namespace: Optional[pulumi.Input[builtins.str]] = None,
358
- service_account_email: Optional[pulumi.Input[builtins.str]] = None,
359
- token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
360
- ttl: Optional[pulumi.Input[builtins.str]] = None,
354
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
355
+ impersonated_account: Optional[pulumi.Input[_builtins.str]] = None,
356
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
357
+ service_account_email: Optional[pulumi.Input[_builtins.str]] = None,
358
+ token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
359
+ ttl: Optional[pulumi.Input[_builtins.str]] = None,
361
360
  __props__=None):
362
361
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
363
362
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -390,13 +389,13 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
390
389
  def get(resource_name: str,
391
390
  id: pulumi.Input[str],
392
391
  opts: Optional[pulumi.ResourceOptions] = None,
393
- backend: Optional[pulumi.Input[builtins.str]] = None,
394
- impersonated_account: Optional[pulumi.Input[builtins.str]] = None,
395
- namespace: Optional[pulumi.Input[builtins.str]] = None,
396
- service_account_email: Optional[pulumi.Input[builtins.str]] = None,
397
- service_account_project: Optional[pulumi.Input[builtins.str]] = None,
398
- token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
399
- ttl: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretImpersonatedAccount':
392
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
393
+ impersonated_account: Optional[pulumi.Input[_builtins.str]] = None,
394
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
395
+ service_account_email: Optional[pulumi.Input[_builtins.str]] = None,
396
+ service_account_project: Optional[pulumi.Input[_builtins.str]] = None,
397
+ token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
398
+ ttl: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretImpersonatedAccount':
400
399
  """
401
400
  Get an existing SecretImpersonatedAccount resource's state with the given name, id, and optional extra
402
401
  properties used to qualify the lookup.
@@ -404,13 +403,13 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
404
403
  :param str resource_name: The unique name of the resulting resource.
405
404
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
406
405
  :param pulumi.ResourceOptions opts: Options for the resource.
407
- :param pulumi.Input[builtins.str] backend: Path where the GCP Secrets Engine is mounted
408
- :param pulumi.Input[builtins.str] impersonated_account: Name of the Impersonated Account to create
409
- :param pulumi.Input[builtins.str] namespace: Target namespace. (requires Enterprise)
410
- :param pulumi.Input[builtins.str] service_account_email: Email of the GCP service account to impersonate.
411
- :param pulumi.Input[builtins.str] service_account_project: Project the service account belongs to.
412
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_scopes: List of OAuth scopes to assign to access tokens generated under this impersonated account.
413
- :param pulumi.Input[builtins.str] ttl: Specifies the default TTL for service principals generated using this role.
406
+ :param pulumi.Input[_builtins.str] backend: Path where the GCP Secrets Engine is mounted
407
+ :param pulumi.Input[_builtins.str] impersonated_account: Name of the Impersonated Account to create
408
+ :param pulumi.Input[_builtins.str] namespace: Target namespace. (requires Enterprise)
409
+ :param pulumi.Input[_builtins.str] service_account_email: Email of the GCP service account to impersonate.
410
+ :param pulumi.Input[_builtins.str] service_account_project: Project the service account belongs to.
411
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_scopes: List of OAuth scopes to assign to access tokens generated under this impersonated account.
412
+ :param pulumi.Input[_builtins.str] ttl: Specifies the default TTL for service principals generated using this role.
414
413
  Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.
415
414
  """
416
415
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -426,57 +425,57 @@ class SecretImpersonatedAccount(pulumi.CustomResource):
426
425
  __props__.__dict__["ttl"] = ttl
427
426
  return SecretImpersonatedAccount(resource_name, opts=opts, __props__=__props__)
428
427
 
429
- @property
428
+ @_builtins.property
430
429
  @pulumi.getter
431
- def backend(self) -> pulumi.Output[builtins.str]:
430
+ def backend(self) -> pulumi.Output[_builtins.str]:
432
431
  """
433
432
  Path where the GCP Secrets Engine is mounted
434
433
  """
435
434
  return pulumi.get(self, "backend")
436
435
 
437
- @property
436
+ @_builtins.property
438
437
  @pulumi.getter(name="impersonatedAccount")
439
- def impersonated_account(self) -> pulumi.Output[builtins.str]:
438
+ def impersonated_account(self) -> pulumi.Output[_builtins.str]:
440
439
  """
441
440
  Name of the Impersonated Account to create
442
441
  """
443
442
  return pulumi.get(self, "impersonated_account")
444
443
 
445
- @property
444
+ @_builtins.property
446
445
  @pulumi.getter
447
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
446
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
448
447
  """
449
448
  Target namespace. (requires Enterprise)
450
449
  """
451
450
  return pulumi.get(self, "namespace")
452
451
 
453
- @property
452
+ @_builtins.property
454
453
  @pulumi.getter(name="serviceAccountEmail")
455
- def service_account_email(self) -> pulumi.Output[builtins.str]:
454
+ def service_account_email(self) -> pulumi.Output[_builtins.str]:
456
455
  """
457
456
  Email of the GCP service account to impersonate.
458
457
  """
459
458
  return pulumi.get(self, "service_account_email")
460
459
 
461
- @property
460
+ @_builtins.property
462
461
  @pulumi.getter(name="serviceAccountProject")
463
- def service_account_project(self) -> pulumi.Output[builtins.str]:
462
+ def service_account_project(self) -> pulumi.Output[_builtins.str]:
464
463
  """
465
464
  Project the service account belongs to.
466
465
  """
467
466
  return pulumi.get(self, "service_account_project")
468
467
 
469
- @property
468
+ @_builtins.property
470
469
  @pulumi.getter(name="tokenScopes")
471
- def token_scopes(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
470
+ def token_scopes(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
472
471
  """
473
472
  List of OAuth scopes to assign to access tokens generated under this impersonated account.
474
473
  """
475
474
  return pulumi.get(self, "token_scopes")
476
475
 
477
- @property
476
+ @_builtins.property
478
477
  @pulumi.getter
479
- def ttl(self) -> pulumi.Output[builtins.str]:
478
+ def ttl(self) -> pulumi.Output[_builtins.str]:
480
479
  """
481
480
  Specifies the default TTL for service principals generated using this role.
482
481
  Accepts time suffixed strings ("1h") or an integer number of seconds. Defaults to the system/engine default TTL time.