pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,557 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+ from . import outputs
17
+ from ._inputs import *
18
+
19
+ __all__ = ['SecretStaticAccountArgs', 'SecretStaticAccount']
20
+
21
+ @pulumi.input_type
22
+ class SecretStaticAccountArgs:
23
+ def __init__(__self__, *,
24
+ backend: pulumi.Input[_builtins.str],
25
+ service_account_email: pulumi.Input[_builtins.str],
26
+ static_account: pulumi.Input[_builtins.str],
27
+ bindings: Optional[pulumi.Input[Sequence[pulumi.Input['SecretStaticAccountBindingArgs']]]] = None,
28
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
29
+ secret_type: Optional[pulumi.Input[_builtins.str]] = None,
30
+ token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
31
+ """
32
+ The set of arguments for constructing a SecretStaticAccount resource.
33
+ :param pulumi.Input[_builtins.str] backend: Path where the GCP Secrets Engine is mounted
34
+ :param pulumi.Input[_builtins.str] service_account_email: Email of the GCP service account to manage.
35
+ :param pulumi.Input[_builtins.str] static_account: Name of the Static Account to create
36
+ :param pulumi.Input[Sequence[pulumi.Input['SecretStaticAccountBindingArgs']]] bindings: Bindings to create for this static account. This can be specified multiple times for multiple bindings. Structure is documented below.
37
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
38
+ The value should not contain leading or trailing forward slashes.
39
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
40
+ *Available only for Vault Enterprise*.
41
+ :param pulumi.Input[_builtins.str] secret_type: Type of secret generated for this static account. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
42
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only).
43
+ """
44
+ pulumi.set(__self__, "backend", backend)
45
+ pulumi.set(__self__, "service_account_email", service_account_email)
46
+ pulumi.set(__self__, "static_account", static_account)
47
+ if bindings is not None:
48
+ pulumi.set(__self__, "bindings", bindings)
49
+ if namespace is not None:
50
+ pulumi.set(__self__, "namespace", namespace)
51
+ if secret_type is not None:
52
+ pulumi.set(__self__, "secret_type", secret_type)
53
+ if token_scopes is not None:
54
+ pulumi.set(__self__, "token_scopes", token_scopes)
55
+
56
+ @_builtins.property
57
+ @pulumi.getter
58
+ def backend(self) -> pulumi.Input[_builtins.str]:
59
+ """
60
+ Path where the GCP Secrets Engine is mounted
61
+ """
62
+ return pulumi.get(self, "backend")
63
+
64
+ @backend.setter
65
+ def backend(self, value: pulumi.Input[_builtins.str]):
66
+ pulumi.set(self, "backend", value)
67
+
68
+ @_builtins.property
69
+ @pulumi.getter(name="serviceAccountEmail")
70
+ def service_account_email(self) -> pulumi.Input[_builtins.str]:
71
+ """
72
+ Email of the GCP service account to manage.
73
+ """
74
+ return pulumi.get(self, "service_account_email")
75
+
76
+ @service_account_email.setter
77
+ def service_account_email(self, value: pulumi.Input[_builtins.str]):
78
+ pulumi.set(self, "service_account_email", value)
79
+
80
+ @_builtins.property
81
+ @pulumi.getter(name="staticAccount")
82
+ def static_account(self) -> pulumi.Input[_builtins.str]:
83
+ """
84
+ Name of the Static Account to create
85
+ """
86
+ return pulumi.get(self, "static_account")
87
+
88
+ @static_account.setter
89
+ def static_account(self, value: pulumi.Input[_builtins.str]):
90
+ pulumi.set(self, "static_account", value)
91
+
92
+ @_builtins.property
93
+ @pulumi.getter
94
+ def bindings(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretStaticAccountBindingArgs']]]]:
95
+ """
96
+ Bindings to create for this static account. This can be specified multiple times for multiple bindings. Structure is documented below.
97
+ """
98
+ return pulumi.get(self, "bindings")
99
+
100
+ @bindings.setter
101
+ def bindings(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretStaticAccountBindingArgs']]]]):
102
+ pulumi.set(self, "bindings", value)
103
+
104
+ @_builtins.property
105
+ @pulumi.getter
106
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
107
+ """
108
+ The namespace to provision the resource in.
109
+ The value should not contain leading or trailing forward slashes.
110
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
111
+ *Available only for Vault Enterprise*.
112
+ """
113
+ return pulumi.get(self, "namespace")
114
+
115
+ @namespace.setter
116
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
117
+ pulumi.set(self, "namespace", value)
118
+
119
+ @_builtins.property
120
+ @pulumi.getter(name="secretType")
121
+ def secret_type(self) -> Optional[pulumi.Input[_builtins.str]]:
122
+ """
123
+ Type of secret generated for this static account. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
124
+ """
125
+ return pulumi.get(self, "secret_type")
126
+
127
+ @secret_type.setter
128
+ def secret_type(self, value: Optional[pulumi.Input[_builtins.str]]):
129
+ pulumi.set(self, "secret_type", value)
130
+
131
+ @_builtins.property
132
+ @pulumi.getter(name="tokenScopes")
133
+ def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
134
+ """
135
+ List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only).
136
+ """
137
+ return pulumi.get(self, "token_scopes")
138
+
139
+ @token_scopes.setter
140
+ def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
141
+ pulumi.set(self, "token_scopes", value)
142
+
143
+
144
+ @pulumi.input_type
145
+ class _SecretStaticAccountState:
146
+ def __init__(__self__, *,
147
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
148
+ bindings: Optional[pulumi.Input[Sequence[pulumi.Input['SecretStaticAccountBindingArgs']]]] = None,
149
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
150
+ secret_type: Optional[pulumi.Input[_builtins.str]] = None,
151
+ service_account_email: Optional[pulumi.Input[_builtins.str]] = None,
152
+ service_account_project: Optional[pulumi.Input[_builtins.str]] = None,
153
+ static_account: Optional[pulumi.Input[_builtins.str]] = None,
154
+ token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
155
+ """
156
+ Input properties used for looking up and filtering SecretStaticAccount resources.
157
+ :param pulumi.Input[_builtins.str] backend: Path where the GCP Secrets Engine is mounted
158
+ :param pulumi.Input[Sequence[pulumi.Input['SecretStaticAccountBindingArgs']]] bindings: Bindings to create for this static account. This can be specified multiple times for multiple bindings. Structure is documented below.
159
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
160
+ The value should not contain leading or trailing forward slashes.
161
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
162
+ *Available only for Vault Enterprise*.
163
+ :param pulumi.Input[_builtins.str] secret_type: Type of secret generated for this static account. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
164
+ :param pulumi.Input[_builtins.str] service_account_email: Email of the GCP service account to manage.
165
+ :param pulumi.Input[_builtins.str] service_account_project: Project the service account belongs to.
166
+ :param pulumi.Input[_builtins.str] static_account: Name of the Static Account to create
167
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only).
168
+ """
169
+ if backend is not None:
170
+ pulumi.set(__self__, "backend", backend)
171
+ if bindings is not None:
172
+ pulumi.set(__self__, "bindings", bindings)
173
+ if namespace is not None:
174
+ pulumi.set(__self__, "namespace", namespace)
175
+ if secret_type is not None:
176
+ pulumi.set(__self__, "secret_type", secret_type)
177
+ if service_account_email is not None:
178
+ pulumi.set(__self__, "service_account_email", service_account_email)
179
+ if service_account_project is not None:
180
+ pulumi.set(__self__, "service_account_project", service_account_project)
181
+ if static_account is not None:
182
+ pulumi.set(__self__, "static_account", static_account)
183
+ if token_scopes is not None:
184
+ pulumi.set(__self__, "token_scopes", token_scopes)
185
+
186
+ @_builtins.property
187
+ @pulumi.getter
188
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
189
+ """
190
+ Path where the GCP Secrets Engine is mounted
191
+ """
192
+ return pulumi.get(self, "backend")
193
+
194
+ @backend.setter
195
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
196
+ pulumi.set(self, "backend", value)
197
+
198
+ @_builtins.property
199
+ @pulumi.getter
200
+ def bindings(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretStaticAccountBindingArgs']]]]:
201
+ """
202
+ Bindings to create for this static account. This can be specified multiple times for multiple bindings. Structure is documented below.
203
+ """
204
+ return pulumi.get(self, "bindings")
205
+
206
+ @bindings.setter
207
+ def bindings(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretStaticAccountBindingArgs']]]]):
208
+ pulumi.set(self, "bindings", value)
209
+
210
+ @_builtins.property
211
+ @pulumi.getter
212
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
213
+ """
214
+ The namespace to provision the resource in.
215
+ The value should not contain leading or trailing forward slashes.
216
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
217
+ *Available only for Vault Enterprise*.
218
+ """
219
+ return pulumi.get(self, "namespace")
220
+
221
+ @namespace.setter
222
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
223
+ pulumi.set(self, "namespace", value)
224
+
225
+ @_builtins.property
226
+ @pulumi.getter(name="secretType")
227
+ def secret_type(self) -> Optional[pulumi.Input[_builtins.str]]:
228
+ """
229
+ Type of secret generated for this static account. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
230
+ """
231
+ return pulumi.get(self, "secret_type")
232
+
233
+ @secret_type.setter
234
+ def secret_type(self, value: Optional[pulumi.Input[_builtins.str]]):
235
+ pulumi.set(self, "secret_type", value)
236
+
237
+ @_builtins.property
238
+ @pulumi.getter(name="serviceAccountEmail")
239
+ def service_account_email(self) -> Optional[pulumi.Input[_builtins.str]]:
240
+ """
241
+ Email of the GCP service account to manage.
242
+ """
243
+ return pulumi.get(self, "service_account_email")
244
+
245
+ @service_account_email.setter
246
+ def service_account_email(self, value: Optional[pulumi.Input[_builtins.str]]):
247
+ pulumi.set(self, "service_account_email", value)
248
+
249
+ @_builtins.property
250
+ @pulumi.getter(name="serviceAccountProject")
251
+ def service_account_project(self) -> Optional[pulumi.Input[_builtins.str]]:
252
+ """
253
+ Project the service account belongs to.
254
+ """
255
+ return pulumi.get(self, "service_account_project")
256
+
257
+ @service_account_project.setter
258
+ def service_account_project(self, value: Optional[pulumi.Input[_builtins.str]]):
259
+ pulumi.set(self, "service_account_project", value)
260
+
261
+ @_builtins.property
262
+ @pulumi.getter(name="staticAccount")
263
+ def static_account(self) -> Optional[pulumi.Input[_builtins.str]]:
264
+ """
265
+ Name of the Static Account to create
266
+ """
267
+ return pulumi.get(self, "static_account")
268
+
269
+ @static_account.setter
270
+ def static_account(self, value: Optional[pulumi.Input[_builtins.str]]):
271
+ pulumi.set(self, "static_account", value)
272
+
273
+ @_builtins.property
274
+ @pulumi.getter(name="tokenScopes")
275
+ def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
276
+ """
277
+ List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only).
278
+ """
279
+ return pulumi.get(self, "token_scopes")
280
+
281
+ @token_scopes.setter
282
+ def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
283
+ pulumi.set(self, "token_scopes", value)
284
+
285
+
286
+ @pulumi.type_token("vault:gcp/secretStaticAccount:SecretStaticAccount")
287
+ class SecretStaticAccount(pulumi.CustomResource):
288
+ @overload
289
+ def __init__(__self__,
290
+ resource_name: str,
291
+ opts: Optional[pulumi.ResourceOptions] = None,
292
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
293
+ bindings: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretStaticAccountBindingArgs', 'SecretStaticAccountBindingArgsDict']]]]] = None,
294
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
295
+ secret_type: Optional[pulumi.Input[_builtins.str]] = None,
296
+ service_account_email: Optional[pulumi.Input[_builtins.str]] = None,
297
+ static_account: Optional[pulumi.Input[_builtins.str]] = None,
298
+ token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
299
+ __props__=None):
300
+ """
301
+ Creates a Static Account in the [GCP Secrets Engine](https://www.vaultproject.io/docs/secrets/gcp/index.html) for Vault.
302
+
303
+ Each [static account](https://www.vaultproject.io/docs/secrets/gcp/index.html#static-accounts) is tied to a separately managed
304
+ Service Account, and can have one or more [bindings](https://www.vaultproject.io/docs/secrets/gcp/index.html#bindings) associated with it.
305
+
306
+ ## Example Usage
307
+
308
+ ```python
309
+ import pulumi
310
+ import pulumi_google as google
311
+ import pulumi_std as std
312
+ import pulumi_vault as vault
313
+
314
+ this = google.index.ServiceAccount("this", account_id=my-awesome-account)
315
+ gcp = vault.gcp.SecretBackend("gcp",
316
+ path="gcp",
317
+ credentials=std.file(input="credentials.json").result)
318
+ static_account = vault.gcp.SecretStaticAccount("static_account",
319
+ backend=gcp.path,
320
+ static_account="project_viewer",
321
+ secret_type="access_token",
322
+ token_scopes=["https://www.googleapis.com/auth/cloud-platform"],
323
+ service_account_email=this["email"],
324
+ bindings=[{
325
+ "resource": f"//cloudresourcemanager.googleapis.com/projects/{this['project']}",
326
+ "roles": ["roles/viewer"],
327
+ }])
328
+ ```
329
+
330
+ ## Import
331
+
332
+ A static account can be imported using its Vault Path. For example, referencing the example above,
333
+
334
+ ```sh
335
+ $ pulumi import vault:gcp/secretStaticAccount:SecretStaticAccount static_account gcp/static-account/project_viewer
336
+ ```
337
+
338
+ :param str resource_name: The name of the resource.
339
+ :param pulumi.ResourceOptions opts: Options for the resource.
340
+ :param pulumi.Input[_builtins.str] backend: Path where the GCP Secrets Engine is mounted
341
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretStaticAccountBindingArgs', 'SecretStaticAccountBindingArgsDict']]]] bindings: Bindings to create for this static account. This can be specified multiple times for multiple bindings. Structure is documented below.
342
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
343
+ The value should not contain leading or trailing forward slashes.
344
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
345
+ *Available only for Vault Enterprise*.
346
+ :param pulumi.Input[_builtins.str] secret_type: Type of secret generated for this static account. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
347
+ :param pulumi.Input[_builtins.str] service_account_email: Email of the GCP service account to manage.
348
+ :param pulumi.Input[_builtins.str] static_account: Name of the Static Account to create
349
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only).
350
+ """
351
+ ...
352
+ @overload
353
+ def __init__(__self__,
354
+ resource_name: str,
355
+ args: SecretStaticAccountArgs,
356
+ opts: Optional[pulumi.ResourceOptions] = None):
357
+ """
358
+ Creates a Static Account in the [GCP Secrets Engine](https://www.vaultproject.io/docs/secrets/gcp/index.html) for Vault.
359
+
360
+ Each [static account](https://www.vaultproject.io/docs/secrets/gcp/index.html#static-accounts) is tied to a separately managed
361
+ Service Account, and can have one or more [bindings](https://www.vaultproject.io/docs/secrets/gcp/index.html#bindings) associated with it.
362
+
363
+ ## Example Usage
364
+
365
+ ```python
366
+ import pulumi
367
+ import pulumi_google as google
368
+ import pulumi_std as std
369
+ import pulumi_vault as vault
370
+
371
+ this = google.index.ServiceAccount("this", account_id=my-awesome-account)
372
+ gcp = vault.gcp.SecretBackend("gcp",
373
+ path="gcp",
374
+ credentials=std.file(input="credentials.json").result)
375
+ static_account = vault.gcp.SecretStaticAccount("static_account",
376
+ backend=gcp.path,
377
+ static_account="project_viewer",
378
+ secret_type="access_token",
379
+ token_scopes=["https://www.googleapis.com/auth/cloud-platform"],
380
+ service_account_email=this["email"],
381
+ bindings=[{
382
+ "resource": f"//cloudresourcemanager.googleapis.com/projects/{this['project']}",
383
+ "roles": ["roles/viewer"],
384
+ }])
385
+ ```
386
+
387
+ ## Import
388
+
389
+ A static account can be imported using its Vault Path. For example, referencing the example above,
390
+
391
+ ```sh
392
+ $ pulumi import vault:gcp/secretStaticAccount:SecretStaticAccount static_account gcp/static-account/project_viewer
393
+ ```
394
+
395
+ :param str resource_name: The name of the resource.
396
+ :param SecretStaticAccountArgs args: The arguments to use to populate this resource's properties.
397
+ :param pulumi.ResourceOptions opts: Options for the resource.
398
+ """
399
+ ...
400
+ def __init__(__self__, resource_name: str, *args, **kwargs):
401
+ resource_args, opts = _utilities.get_resource_args_opts(SecretStaticAccountArgs, pulumi.ResourceOptions, *args, **kwargs)
402
+ if resource_args is not None:
403
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
404
+ else:
405
+ __self__._internal_init(resource_name, *args, **kwargs)
406
+
407
+ def _internal_init(__self__,
408
+ resource_name: str,
409
+ opts: Optional[pulumi.ResourceOptions] = None,
410
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
411
+ bindings: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretStaticAccountBindingArgs', 'SecretStaticAccountBindingArgsDict']]]]] = None,
412
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
413
+ secret_type: Optional[pulumi.Input[_builtins.str]] = None,
414
+ service_account_email: Optional[pulumi.Input[_builtins.str]] = None,
415
+ static_account: Optional[pulumi.Input[_builtins.str]] = None,
416
+ token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
417
+ __props__=None):
418
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
419
+ if not isinstance(opts, pulumi.ResourceOptions):
420
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
421
+ if opts.id is None:
422
+ if __props__ is not None:
423
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
424
+ __props__ = SecretStaticAccountArgs.__new__(SecretStaticAccountArgs)
425
+
426
+ if backend is None and not opts.urn:
427
+ raise TypeError("Missing required property 'backend'")
428
+ __props__.__dict__["backend"] = backend
429
+ __props__.__dict__["bindings"] = bindings
430
+ __props__.__dict__["namespace"] = namespace
431
+ __props__.__dict__["secret_type"] = secret_type
432
+ if service_account_email is None and not opts.urn:
433
+ raise TypeError("Missing required property 'service_account_email'")
434
+ __props__.__dict__["service_account_email"] = service_account_email
435
+ if static_account is None and not opts.urn:
436
+ raise TypeError("Missing required property 'static_account'")
437
+ __props__.__dict__["static_account"] = static_account
438
+ __props__.__dict__["token_scopes"] = token_scopes
439
+ __props__.__dict__["service_account_project"] = None
440
+ super(SecretStaticAccount, __self__).__init__(
441
+ 'vault:gcp/secretStaticAccount:SecretStaticAccount',
442
+ resource_name,
443
+ __props__,
444
+ opts)
445
+
446
+ @staticmethod
447
+ def get(resource_name: str,
448
+ id: pulumi.Input[str],
449
+ opts: Optional[pulumi.ResourceOptions] = None,
450
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
451
+ bindings: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretStaticAccountBindingArgs', 'SecretStaticAccountBindingArgsDict']]]]] = None,
452
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
453
+ secret_type: Optional[pulumi.Input[_builtins.str]] = None,
454
+ service_account_email: Optional[pulumi.Input[_builtins.str]] = None,
455
+ service_account_project: Optional[pulumi.Input[_builtins.str]] = None,
456
+ static_account: Optional[pulumi.Input[_builtins.str]] = None,
457
+ token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None) -> 'SecretStaticAccount':
458
+ """
459
+ Get an existing SecretStaticAccount resource's state with the given name, id, and optional extra
460
+ properties used to qualify the lookup.
461
+
462
+ :param str resource_name: The unique name of the resulting resource.
463
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
464
+ :param pulumi.ResourceOptions opts: Options for the resource.
465
+ :param pulumi.Input[_builtins.str] backend: Path where the GCP Secrets Engine is mounted
466
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretStaticAccountBindingArgs', 'SecretStaticAccountBindingArgsDict']]]] bindings: Bindings to create for this static account. This can be specified multiple times for multiple bindings. Structure is documented below.
467
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
468
+ The value should not contain leading or trailing forward slashes.
469
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
470
+ *Available only for Vault Enterprise*.
471
+ :param pulumi.Input[_builtins.str] secret_type: Type of secret generated for this static account. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
472
+ :param pulumi.Input[_builtins.str] service_account_email: Email of the GCP service account to manage.
473
+ :param pulumi.Input[_builtins.str] service_account_project: Project the service account belongs to.
474
+ :param pulumi.Input[_builtins.str] static_account: Name of the Static Account to create
475
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only).
476
+ """
477
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
478
+
479
+ __props__ = _SecretStaticAccountState.__new__(_SecretStaticAccountState)
480
+
481
+ __props__.__dict__["backend"] = backend
482
+ __props__.__dict__["bindings"] = bindings
483
+ __props__.__dict__["namespace"] = namespace
484
+ __props__.__dict__["secret_type"] = secret_type
485
+ __props__.__dict__["service_account_email"] = service_account_email
486
+ __props__.__dict__["service_account_project"] = service_account_project
487
+ __props__.__dict__["static_account"] = static_account
488
+ __props__.__dict__["token_scopes"] = token_scopes
489
+ return SecretStaticAccount(resource_name, opts=opts, __props__=__props__)
490
+
491
+ @_builtins.property
492
+ @pulumi.getter
493
+ def backend(self) -> pulumi.Output[_builtins.str]:
494
+ """
495
+ Path where the GCP Secrets Engine is mounted
496
+ """
497
+ return pulumi.get(self, "backend")
498
+
499
+ @_builtins.property
500
+ @pulumi.getter
501
+ def bindings(self) -> pulumi.Output[Optional[Sequence['outputs.SecretStaticAccountBinding']]]:
502
+ """
503
+ Bindings to create for this static account. This can be specified multiple times for multiple bindings. Structure is documented below.
504
+ """
505
+ return pulumi.get(self, "bindings")
506
+
507
+ @_builtins.property
508
+ @pulumi.getter
509
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
510
+ """
511
+ The namespace to provision the resource in.
512
+ The value should not contain leading or trailing forward slashes.
513
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
514
+ *Available only for Vault Enterprise*.
515
+ """
516
+ return pulumi.get(self, "namespace")
517
+
518
+ @_builtins.property
519
+ @pulumi.getter(name="secretType")
520
+ def secret_type(self) -> pulumi.Output[_builtins.str]:
521
+ """
522
+ Type of secret generated for this static account. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
523
+ """
524
+ return pulumi.get(self, "secret_type")
525
+
526
+ @_builtins.property
527
+ @pulumi.getter(name="serviceAccountEmail")
528
+ def service_account_email(self) -> pulumi.Output[_builtins.str]:
529
+ """
530
+ Email of the GCP service account to manage.
531
+ """
532
+ return pulumi.get(self, "service_account_email")
533
+
534
+ @_builtins.property
535
+ @pulumi.getter(name="serviceAccountProject")
536
+ def service_account_project(self) -> pulumi.Output[_builtins.str]:
537
+ """
538
+ Project the service account belongs to.
539
+ """
540
+ return pulumi.get(self, "service_account_project")
541
+
542
+ @_builtins.property
543
+ @pulumi.getter(name="staticAccount")
544
+ def static_account(self) -> pulumi.Output[_builtins.str]:
545
+ """
546
+ Name of the Static Account to create
547
+ """
548
+ return pulumi.get(self, "static_account")
549
+
550
+ @_builtins.property
551
+ @pulumi.getter(name="tokenScopes")
552
+ def token_scopes(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
553
+ """
554
+ List of OAuth scopes to assign to `access_token` secrets generated under this static account (`access_token` static accounts only).
555
+ """
556
+ return pulumi.get(self, "token_scopes")
557
+
@@ -0,0 +1,11 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ from .. import _utilities
7
+ import typing
8
+ # Export this package's modules as members:
9
+ from .endpoint import *
10
+ from .get_secret import *
11
+ from .secret import *