pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,441 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = [
18
+ 'AuthBackendCustomEndpointArgs',
19
+ 'AuthBackendCustomEndpointArgsDict',
20
+ 'AuthBackendTuneArgs',
21
+ 'AuthBackendTuneArgsDict',
22
+ 'SecretRolesetBindingArgs',
23
+ 'SecretRolesetBindingArgsDict',
24
+ 'SecretStaticAccountBindingArgs',
25
+ 'SecretStaticAccountBindingArgsDict',
26
+ ]
27
+
28
+ MYPY = False
29
+
30
+ if not MYPY:
31
+ class AuthBackendCustomEndpointArgsDict(TypedDict):
32
+ api: NotRequired[pulumi.Input[_builtins.str]]
33
+ """
34
+ Replaces the service endpoint used in API requests to `https://www.googleapis.com`.
35
+ """
36
+ compute: NotRequired[pulumi.Input[_builtins.str]]
37
+ """
38
+ Replaces the service endpoint used in API requests to `https://compute.googleapis.com`.
39
+
40
+ The endpoint value provided for a given key has the form of `scheme://host:port`.
41
+ The `scheme://` and `:port` portions of the endpoint value are optional.
42
+ """
43
+ crm: NotRequired[pulumi.Input[_builtins.str]]
44
+ """
45
+ Replaces the service endpoint used in API requests to `https://cloudresourcemanager.googleapis.com`.
46
+ """
47
+ iam: NotRequired[pulumi.Input[_builtins.str]]
48
+ """
49
+ Replaces the service endpoint used in API requests to `https://iam.googleapis.com`.
50
+ """
51
+ elif False:
52
+ AuthBackendCustomEndpointArgsDict: TypeAlias = Mapping[str, Any]
53
+
54
+ @pulumi.input_type
55
+ class AuthBackendCustomEndpointArgs:
56
+ def __init__(__self__, *,
57
+ api: Optional[pulumi.Input[_builtins.str]] = None,
58
+ compute: Optional[pulumi.Input[_builtins.str]] = None,
59
+ crm: Optional[pulumi.Input[_builtins.str]] = None,
60
+ iam: Optional[pulumi.Input[_builtins.str]] = None):
61
+ """
62
+ :param pulumi.Input[_builtins.str] api: Replaces the service endpoint used in API requests to `https://www.googleapis.com`.
63
+ :param pulumi.Input[_builtins.str] compute: Replaces the service endpoint used in API requests to `https://compute.googleapis.com`.
64
+
65
+ The endpoint value provided for a given key has the form of `scheme://host:port`.
66
+ The `scheme://` and `:port` portions of the endpoint value are optional.
67
+ :param pulumi.Input[_builtins.str] crm: Replaces the service endpoint used in API requests to `https://cloudresourcemanager.googleapis.com`.
68
+ :param pulumi.Input[_builtins.str] iam: Replaces the service endpoint used in API requests to `https://iam.googleapis.com`.
69
+ """
70
+ if api is not None:
71
+ pulumi.set(__self__, "api", api)
72
+ if compute is not None:
73
+ pulumi.set(__self__, "compute", compute)
74
+ if crm is not None:
75
+ pulumi.set(__self__, "crm", crm)
76
+ if iam is not None:
77
+ pulumi.set(__self__, "iam", iam)
78
+
79
+ @_builtins.property
80
+ @pulumi.getter
81
+ def api(self) -> Optional[pulumi.Input[_builtins.str]]:
82
+ """
83
+ Replaces the service endpoint used in API requests to `https://www.googleapis.com`.
84
+ """
85
+ return pulumi.get(self, "api")
86
+
87
+ @api.setter
88
+ def api(self, value: Optional[pulumi.Input[_builtins.str]]):
89
+ pulumi.set(self, "api", value)
90
+
91
+ @_builtins.property
92
+ @pulumi.getter
93
+ def compute(self) -> Optional[pulumi.Input[_builtins.str]]:
94
+ """
95
+ Replaces the service endpoint used in API requests to `https://compute.googleapis.com`.
96
+
97
+ The endpoint value provided for a given key has the form of `scheme://host:port`.
98
+ The `scheme://` and `:port` portions of the endpoint value are optional.
99
+ """
100
+ return pulumi.get(self, "compute")
101
+
102
+ @compute.setter
103
+ def compute(self, value: Optional[pulumi.Input[_builtins.str]]):
104
+ pulumi.set(self, "compute", value)
105
+
106
+ @_builtins.property
107
+ @pulumi.getter
108
+ def crm(self) -> Optional[pulumi.Input[_builtins.str]]:
109
+ """
110
+ Replaces the service endpoint used in API requests to `https://cloudresourcemanager.googleapis.com`.
111
+ """
112
+ return pulumi.get(self, "crm")
113
+
114
+ @crm.setter
115
+ def crm(self, value: Optional[pulumi.Input[_builtins.str]]):
116
+ pulumi.set(self, "crm", value)
117
+
118
+ @_builtins.property
119
+ @pulumi.getter
120
+ def iam(self) -> Optional[pulumi.Input[_builtins.str]]:
121
+ """
122
+ Replaces the service endpoint used in API requests to `https://iam.googleapis.com`.
123
+ """
124
+ return pulumi.get(self, "iam")
125
+
126
+ @iam.setter
127
+ def iam(self, value: Optional[pulumi.Input[_builtins.str]]):
128
+ pulumi.set(self, "iam", value)
129
+
130
+
131
+ if not MYPY:
132
+ class AuthBackendTuneArgsDict(TypedDict):
133
+ allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
134
+ """
135
+ List of headers to whitelist and allowing
136
+ a plugin to include them in the response.
137
+ """
138
+ audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
139
+ """
140
+ Specifies the list of keys that will
141
+ not be HMAC'd by audit devices in the request data object.
142
+ """
143
+ audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
144
+ """
145
+ Specifies the list of keys that will
146
+ not be HMAC'd by audit devices in the response data object.
147
+ """
148
+ default_lease_ttl: NotRequired[pulumi.Input[_builtins.str]]
149
+ """
150
+ Specifies the default time-to-live.
151
+ If set, this overrides the global default.
152
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
153
+ """
154
+ listing_visibility: NotRequired[pulumi.Input[_builtins.str]]
155
+ """
156
+ Specifies whether to show this mount in
157
+ the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
158
+ """
159
+ max_lease_ttl: NotRequired[pulumi.Input[_builtins.str]]
160
+ """
161
+ Specifies the maximum time-to-live.
162
+ If set, this overrides the global default.
163
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
164
+ """
165
+ passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
166
+ """
167
+ List of headers to whitelist and
168
+ pass from the request to the backend.
169
+ """
170
+ token_type: NotRequired[pulumi.Input[_builtins.str]]
171
+ """
172
+ Specifies the type of tokens that should be returned by
173
+ the mount. Valid values are "default-service", "default-batch", "service", "batch".
174
+
175
+
176
+ For more details on the usage of each argument consult the [Vault GCP API documentation](https://www.vaultproject.io/api-docs/auth/gcp#configure).
177
+ """
178
+ elif False:
179
+ AuthBackendTuneArgsDict: TypeAlias = Mapping[str, Any]
180
+
181
+ @pulumi.input_type
182
+ class AuthBackendTuneArgs:
183
+ def __init__(__self__, *,
184
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
185
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
186
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
187
+ default_lease_ttl: Optional[pulumi.Input[_builtins.str]] = None,
188
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
189
+ max_lease_ttl: Optional[pulumi.Input[_builtins.str]] = None,
190
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
191
+ token_type: Optional[pulumi.Input[_builtins.str]] = None):
192
+ """
193
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to whitelist and allowing
194
+ a plugin to include them in the response.
195
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will
196
+ not be HMAC'd by audit devices in the request data object.
197
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will
198
+ not be HMAC'd by audit devices in the response data object.
199
+ :param pulumi.Input[_builtins.str] default_lease_ttl: Specifies the default time-to-live.
200
+ If set, this overrides the global default.
201
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
202
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in
203
+ the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
204
+ :param pulumi.Input[_builtins.str] max_lease_ttl: Specifies the maximum time-to-live.
205
+ If set, this overrides the global default.
206
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
207
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to whitelist and
208
+ pass from the request to the backend.
209
+ :param pulumi.Input[_builtins.str] token_type: Specifies the type of tokens that should be returned by
210
+ the mount. Valid values are "default-service", "default-batch", "service", "batch".
211
+
212
+
213
+ For more details on the usage of each argument consult the [Vault GCP API documentation](https://www.vaultproject.io/api-docs/auth/gcp#configure).
214
+ """
215
+ if allowed_response_headers is not None:
216
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
217
+ if audit_non_hmac_request_keys is not None:
218
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
219
+ if audit_non_hmac_response_keys is not None:
220
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
221
+ if default_lease_ttl is not None:
222
+ pulumi.set(__self__, "default_lease_ttl", default_lease_ttl)
223
+ if listing_visibility is not None:
224
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
225
+ if max_lease_ttl is not None:
226
+ pulumi.set(__self__, "max_lease_ttl", max_lease_ttl)
227
+ if passthrough_request_headers is not None:
228
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
229
+ if token_type is not None:
230
+ pulumi.set(__self__, "token_type", token_type)
231
+
232
+ @_builtins.property
233
+ @pulumi.getter(name="allowedResponseHeaders")
234
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
235
+ """
236
+ List of headers to whitelist and allowing
237
+ a plugin to include them in the response.
238
+ """
239
+ return pulumi.get(self, "allowed_response_headers")
240
+
241
+ @allowed_response_headers.setter
242
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
243
+ pulumi.set(self, "allowed_response_headers", value)
244
+
245
+ @_builtins.property
246
+ @pulumi.getter(name="auditNonHmacRequestKeys")
247
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
248
+ """
249
+ Specifies the list of keys that will
250
+ not be HMAC'd by audit devices in the request data object.
251
+ """
252
+ return pulumi.get(self, "audit_non_hmac_request_keys")
253
+
254
+ @audit_non_hmac_request_keys.setter
255
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
256
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
257
+
258
+ @_builtins.property
259
+ @pulumi.getter(name="auditNonHmacResponseKeys")
260
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
261
+ """
262
+ Specifies the list of keys that will
263
+ not be HMAC'd by audit devices in the response data object.
264
+ """
265
+ return pulumi.get(self, "audit_non_hmac_response_keys")
266
+
267
+ @audit_non_hmac_response_keys.setter
268
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
269
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
270
+
271
+ @_builtins.property
272
+ @pulumi.getter(name="defaultLeaseTtl")
273
+ def default_lease_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
274
+ """
275
+ Specifies the default time-to-live.
276
+ If set, this overrides the global default.
277
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
278
+ """
279
+ return pulumi.get(self, "default_lease_ttl")
280
+
281
+ @default_lease_ttl.setter
282
+ def default_lease_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
283
+ pulumi.set(self, "default_lease_ttl", value)
284
+
285
+ @_builtins.property
286
+ @pulumi.getter(name="listingVisibility")
287
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
288
+ """
289
+ Specifies whether to show this mount in
290
+ the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
291
+ """
292
+ return pulumi.get(self, "listing_visibility")
293
+
294
+ @listing_visibility.setter
295
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
296
+ pulumi.set(self, "listing_visibility", value)
297
+
298
+ @_builtins.property
299
+ @pulumi.getter(name="maxLeaseTtl")
300
+ def max_lease_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
301
+ """
302
+ Specifies the maximum time-to-live.
303
+ If set, this overrides the global default.
304
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
305
+ """
306
+ return pulumi.get(self, "max_lease_ttl")
307
+
308
+ @max_lease_ttl.setter
309
+ def max_lease_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
310
+ pulumi.set(self, "max_lease_ttl", value)
311
+
312
+ @_builtins.property
313
+ @pulumi.getter(name="passthroughRequestHeaders")
314
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
315
+ """
316
+ List of headers to whitelist and
317
+ pass from the request to the backend.
318
+ """
319
+ return pulumi.get(self, "passthrough_request_headers")
320
+
321
+ @passthrough_request_headers.setter
322
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
323
+ pulumi.set(self, "passthrough_request_headers", value)
324
+
325
+ @_builtins.property
326
+ @pulumi.getter(name="tokenType")
327
+ def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
328
+ """
329
+ Specifies the type of tokens that should be returned by
330
+ the mount. Valid values are "default-service", "default-batch", "service", "batch".
331
+
332
+
333
+ For more details on the usage of each argument consult the [Vault GCP API documentation](https://www.vaultproject.io/api-docs/auth/gcp#configure).
334
+ """
335
+ return pulumi.get(self, "token_type")
336
+
337
+ @token_type.setter
338
+ def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
339
+ pulumi.set(self, "token_type", value)
340
+
341
+
342
+ if not MYPY:
343
+ class SecretRolesetBindingArgsDict(TypedDict):
344
+ resource: pulumi.Input[_builtins.str]
345
+ """
346
+ Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different [formats](https://www.vaultproject.io/docs/secrets/gcp/index.html#roleset-bindings).
347
+ """
348
+ roles: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]
349
+ """
350
+ List of [GCP IAM roles](https://cloud.google.com/iam/docs/understanding-roles) for the resource.
351
+ """
352
+ elif False:
353
+ SecretRolesetBindingArgsDict: TypeAlias = Mapping[str, Any]
354
+
355
+ @pulumi.input_type
356
+ class SecretRolesetBindingArgs:
357
+ def __init__(__self__, *,
358
+ resource: pulumi.Input[_builtins.str],
359
+ roles: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]):
360
+ """
361
+ :param pulumi.Input[_builtins.str] resource: Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different [formats](https://www.vaultproject.io/docs/secrets/gcp/index.html#roleset-bindings).
362
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] roles: List of [GCP IAM roles](https://cloud.google.com/iam/docs/understanding-roles) for the resource.
363
+ """
364
+ pulumi.set(__self__, "resource", resource)
365
+ pulumi.set(__self__, "roles", roles)
366
+
367
+ @_builtins.property
368
+ @pulumi.getter
369
+ def resource(self) -> pulumi.Input[_builtins.str]:
370
+ """
371
+ Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different [formats](https://www.vaultproject.io/docs/secrets/gcp/index.html#roleset-bindings).
372
+ """
373
+ return pulumi.get(self, "resource")
374
+
375
+ @resource.setter
376
+ def resource(self, value: pulumi.Input[_builtins.str]):
377
+ pulumi.set(self, "resource", value)
378
+
379
+ @_builtins.property
380
+ @pulumi.getter
381
+ def roles(self) -> pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]:
382
+ """
383
+ List of [GCP IAM roles](https://cloud.google.com/iam/docs/understanding-roles) for the resource.
384
+ """
385
+ return pulumi.get(self, "roles")
386
+
387
+ @roles.setter
388
+ def roles(self, value: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]):
389
+ pulumi.set(self, "roles", value)
390
+
391
+
392
+ if not MYPY:
393
+ class SecretStaticAccountBindingArgsDict(TypedDict):
394
+ resource: pulumi.Input[_builtins.str]
395
+ """
396
+ Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different [formats](https://www.vaultproject.io/docs/secrets/gcp/index.html#bindings).
397
+ """
398
+ roles: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]
399
+ """
400
+ List of [GCP IAM roles](https://cloud.google.com/iam/docs/understanding-roles) for the resource.
401
+ """
402
+ elif False:
403
+ SecretStaticAccountBindingArgsDict: TypeAlias = Mapping[str, Any]
404
+
405
+ @pulumi.input_type
406
+ class SecretStaticAccountBindingArgs:
407
+ def __init__(__self__, *,
408
+ resource: pulumi.Input[_builtins.str],
409
+ roles: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]):
410
+ """
411
+ :param pulumi.Input[_builtins.str] resource: Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different [formats](https://www.vaultproject.io/docs/secrets/gcp/index.html#bindings).
412
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] roles: List of [GCP IAM roles](https://cloud.google.com/iam/docs/understanding-roles) for the resource.
413
+ """
414
+ pulumi.set(__self__, "resource", resource)
415
+ pulumi.set(__self__, "roles", roles)
416
+
417
+ @_builtins.property
418
+ @pulumi.getter
419
+ def resource(self) -> pulumi.Input[_builtins.str]:
420
+ """
421
+ Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different [formats](https://www.vaultproject.io/docs/secrets/gcp/index.html#bindings).
422
+ """
423
+ return pulumi.get(self, "resource")
424
+
425
+ @resource.setter
426
+ def resource(self, value: pulumi.Input[_builtins.str]):
427
+ pulumi.set(self, "resource", value)
428
+
429
+ @_builtins.property
430
+ @pulumi.getter
431
+ def roles(self) -> pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]:
432
+ """
433
+ List of [GCP IAM roles](https://cloud.google.com/iam/docs/understanding-roles) for the resource.
434
+ """
435
+ return pulumi.get(self, "roles")
436
+
437
+ @roles.setter
438
+ def roles(self, value: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]):
439
+ pulumi.set(self, "roles", value)
440
+
441
+