pulumi-vault 6.6.0a1741836364__py3-none-any.whl → 6.7.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +583 -562
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +188 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +68 -18
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +73 -60
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.6.0a1741836364.dist-info → pulumi_vault-6.7.0.dist-info}/METADATA +2 -2
  261. pulumi_vault-6.7.0.dist-info/RECORD +265 -0
  262. {pulumi_vault-6.6.0a1741836364.dist-info → pulumi_vault-6.7.0.dist-info}/WHEEL +1 -1
  263. pulumi_vault-6.6.0a1741836364.dist-info/RECORD +0 -265
  264. {pulumi_vault-6.6.0a1741836364.dist-info → pulumi_vault-6.7.0.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -19,26 +20,26 @@ __all__ = ['NomadSecretRoleArgs', 'NomadSecretRole']
19
20
  @pulumi.input_type
20
21
  class NomadSecretRoleArgs:
21
22
  def __init__(__self__, *,
22
- backend: pulumi.Input[str],
23
- role: pulumi.Input[str],
24
- global_: Optional[pulumi.Input[bool]] = None,
25
- namespace: Optional[pulumi.Input[str]] = None,
26
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
27
- type: Optional[pulumi.Input[str]] = None):
23
+ backend: pulumi.Input[builtins.str],
24
+ role: pulumi.Input[builtins.str],
25
+ global_: Optional[pulumi.Input[builtins.bool]] = None,
26
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
27
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
28
+ type: Optional[pulumi.Input[builtins.str]] = None):
28
29
  """
29
30
  The set of arguments for constructing a NomadSecretRole resource.
30
- :param pulumi.Input[str] backend: The unique path this backend should be mounted at.
31
- :param pulumi.Input[str] role: The name to identify this role within the backend.
31
+ :param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at.
32
+ :param pulumi.Input[builtins.str] role: The name to identify this role within the backend.
32
33
  Must be unique within the backend.
33
- :param pulumi.Input[bool] global_: Specifies if the generated token should be global. Defaults to
34
+ :param pulumi.Input[builtins.bool] global_: Specifies if the generated token should be global. Defaults to
34
35
  false.
35
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
36
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
36
37
  The value should not contain leading or trailing forward slashes.
37
38
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
38
39
  *Available only for Vault Enterprise*.
39
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies attached to the generated token. This setting is only used
40
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: List of policies attached to the generated token. This setting is only used
40
41
  when `type` is 'client'.
41
- :param pulumi.Input[str] type: Specifies the type of token to create when using this role. Valid
42
+ :param pulumi.Input[builtins.str] type: Specifies the type of token to create when using this role. Valid
42
43
  settings are 'client' and 'management'. Defaults to 'client'.
43
44
  """
44
45
  pulumi.set(__self__, "backend", backend)
@@ -54,19 +55,19 @@ class NomadSecretRoleArgs:
54
55
 
55
56
  @property
56
57
  @pulumi.getter
57
- def backend(self) -> pulumi.Input[str]:
58
+ def backend(self) -> pulumi.Input[builtins.str]:
58
59
  """
59
60
  The unique path this backend should be mounted at.
60
61
  """
61
62
  return pulumi.get(self, "backend")
62
63
 
63
64
  @backend.setter
64
- def backend(self, value: pulumi.Input[str]):
65
+ def backend(self, value: pulumi.Input[builtins.str]):
65
66
  pulumi.set(self, "backend", value)
66
67
 
67
68
  @property
68
69
  @pulumi.getter
69
- def role(self) -> pulumi.Input[str]:
70
+ def role(self) -> pulumi.Input[builtins.str]:
70
71
  """
71
72
  The name to identify this role within the backend.
72
73
  Must be unique within the backend.
@@ -74,12 +75,12 @@ class NomadSecretRoleArgs:
74
75
  return pulumi.get(self, "role")
75
76
 
76
77
  @role.setter
77
- def role(self, value: pulumi.Input[str]):
78
+ def role(self, value: pulumi.Input[builtins.str]):
78
79
  pulumi.set(self, "role", value)
79
80
 
80
81
  @property
81
82
  @pulumi.getter(name="global")
82
- def global_(self) -> Optional[pulumi.Input[bool]]:
83
+ def global_(self) -> Optional[pulumi.Input[builtins.bool]]:
83
84
  """
84
85
  Specifies if the generated token should be global. Defaults to
85
86
  false.
@@ -87,12 +88,12 @@ class NomadSecretRoleArgs:
87
88
  return pulumi.get(self, "global_")
88
89
 
89
90
  @global_.setter
90
- def global_(self, value: Optional[pulumi.Input[bool]]):
91
+ def global_(self, value: Optional[pulumi.Input[builtins.bool]]):
91
92
  pulumi.set(self, "global_", value)
92
93
 
93
94
  @property
94
95
  @pulumi.getter
95
- def namespace(self) -> Optional[pulumi.Input[str]]:
96
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
96
97
  """
97
98
  The namespace to provision the resource in.
98
99
  The value should not contain leading or trailing forward slashes.
@@ -102,12 +103,12 @@ class NomadSecretRoleArgs:
102
103
  return pulumi.get(self, "namespace")
103
104
 
104
105
  @namespace.setter
105
- def namespace(self, value: Optional[pulumi.Input[str]]):
106
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
106
107
  pulumi.set(self, "namespace", value)
107
108
 
108
109
  @property
109
110
  @pulumi.getter
110
- def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
111
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
111
112
  """
112
113
  List of policies attached to the generated token. This setting is only used
113
114
  when `type` is 'client'.
@@ -115,12 +116,12 @@ class NomadSecretRoleArgs:
115
116
  return pulumi.get(self, "policies")
116
117
 
117
118
  @policies.setter
118
- def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
119
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
119
120
  pulumi.set(self, "policies", value)
120
121
 
121
122
  @property
122
123
  @pulumi.getter
123
- def type(self) -> Optional[pulumi.Input[str]]:
124
+ def type(self) -> Optional[pulumi.Input[builtins.str]]:
124
125
  """
125
126
  Specifies the type of token to create when using this role. Valid
126
127
  settings are 'client' and 'management'. Defaults to 'client'.
@@ -128,33 +129,33 @@ class NomadSecretRoleArgs:
128
129
  return pulumi.get(self, "type")
129
130
 
130
131
  @type.setter
131
- def type(self, value: Optional[pulumi.Input[str]]):
132
+ def type(self, value: Optional[pulumi.Input[builtins.str]]):
132
133
  pulumi.set(self, "type", value)
133
134
 
134
135
 
135
136
  @pulumi.input_type
136
137
  class _NomadSecretRoleState:
137
138
  def __init__(__self__, *,
138
- backend: Optional[pulumi.Input[str]] = None,
139
- global_: Optional[pulumi.Input[bool]] = None,
140
- namespace: Optional[pulumi.Input[str]] = None,
141
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
142
- role: Optional[pulumi.Input[str]] = None,
143
- type: Optional[pulumi.Input[str]] = None):
139
+ backend: Optional[pulumi.Input[builtins.str]] = None,
140
+ global_: Optional[pulumi.Input[builtins.bool]] = None,
141
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
142
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
143
+ role: Optional[pulumi.Input[builtins.str]] = None,
144
+ type: Optional[pulumi.Input[builtins.str]] = None):
144
145
  """
145
146
  Input properties used for looking up and filtering NomadSecretRole resources.
146
- :param pulumi.Input[str] backend: The unique path this backend should be mounted at.
147
- :param pulumi.Input[bool] global_: Specifies if the generated token should be global. Defaults to
147
+ :param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at.
148
+ :param pulumi.Input[builtins.bool] global_: Specifies if the generated token should be global. Defaults to
148
149
  false.
149
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
150
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
150
151
  The value should not contain leading or trailing forward slashes.
151
152
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
152
153
  *Available only for Vault Enterprise*.
153
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies attached to the generated token. This setting is only used
154
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: List of policies attached to the generated token. This setting is only used
154
155
  when `type` is 'client'.
155
- :param pulumi.Input[str] role: The name to identify this role within the backend.
156
+ :param pulumi.Input[builtins.str] role: The name to identify this role within the backend.
156
157
  Must be unique within the backend.
157
- :param pulumi.Input[str] type: Specifies the type of token to create when using this role. Valid
158
+ :param pulumi.Input[builtins.str] type: Specifies the type of token to create when using this role. Valid
158
159
  settings are 'client' and 'management'. Defaults to 'client'.
159
160
  """
160
161
  if backend is not None:
@@ -172,19 +173,19 @@ class _NomadSecretRoleState:
172
173
 
173
174
  @property
174
175
  @pulumi.getter
175
- def backend(self) -> Optional[pulumi.Input[str]]:
176
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
176
177
  """
177
178
  The unique path this backend should be mounted at.
178
179
  """
179
180
  return pulumi.get(self, "backend")
180
181
 
181
182
  @backend.setter
182
- def backend(self, value: Optional[pulumi.Input[str]]):
183
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
183
184
  pulumi.set(self, "backend", value)
184
185
 
185
186
  @property
186
187
  @pulumi.getter(name="global")
187
- def global_(self) -> Optional[pulumi.Input[bool]]:
188
+ def global_(self) -> Optional[pulumi.Input[builtins.bool]]:
188
189
  """
189
190
  Specifies if the generated token should be global. Defaults to
190
191
  false.
@@ -192,12 +193,12 @@ class _NomadSecretRoleState:
192
193
  return pulumi.get(self, "global_")
193
194
 
194
195
  @global_.setter
195
- def global_(self, value: Optional[pulumi.Input[bool]]):
196
+ def global_(self, value: Optional[pulumi.Input[builtins.bool]]):
196
197
  pulumi.set(self, "global_", value)
197
198
 
198
199
  @property
199
200
  @pulumi.getter
200
- def namespace(self) -> Optional[pulumi.Input[str]]:
201
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
201
202
  """
202
203
  The namespace to provision the resource in.
203
204
  The value should not contain leading or trailing forward slashes.
@@ -207,12 +208,12 @@ class _NomadSecretRoleState:
207
208
  return pulumi.get(self, "namespace")
208
209
 
209
210
  @namespace.setter
210
- def namespace(self, value: Optional[pulumi.Input[str]]):
211
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
211
212
  pulumi.set(self, "namespace", value)
212
213
 
213
214
  @property
214
215
  @pulumi.getter
215
- def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
216
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
216
217
  """
217
218
  List of policies attached to the generated token. This setting is only used
218
219
  when `type` is 'client'.
@@ -220,12 +221,12 @@ class _NomadSecretRoleState:
220
221
  return pulumi.get(self, "policies")
221
222
 
222
223
  @policies.setter
223
- def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
224
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
224
225
  pulumi.set(self, "policies", value)
225
226
 
226
227
  @property
227
228
  @pulumi.getter
228
- def role(self) -> Optional[pulumi.Input[str]]:
229
+ def role(self) -> Optional[pulumi.Input[builtins.str]]:
229
230
  """
230
231
  The name to identify this role within the backend.
231
232
  Must be unique within the backend.
@@ -233,12 +234,12 @@ class _NomadSecretRoleState:
233
234
  return pulumi.get(self, "role")
234
235
 
235
236
  @role.setter
236
- def role(self, value: Optional[pulumi.Input[str]]):
237
+ def role(self, value: Optional[pulumi.Input[builtins.str]]):
237
238
  pulumi.set(self, "role", value)
238
239
 
239
240
  @property
240
241
  @pulumi.getter
241
- def type(self) -> Optional[pulumi.Input[str]]:
242
+ def type(self) -> Optional[pulumi.Input[builtins.str]]:
242
243
  """
243
244
  Specifies the type of token to create when using this role. Valid
244
245
  settings are 'client' and 'management'. Defaults to 'client'.
@@ -246,7 +247,7 @@ class _NomadSecretRoleState:
246
247
  return pulumi.get(self, "type")
247
248
 
248
249
  @type.setter
249
- def type(self, value: Optional[pulumi.Input[str]]):
250
+ def type(self, value: Optional[pulumi.Input[builtins.str]]):
250
251
  pulumi.set(self, "type", value)
251
252
 
252
253
 
@@ -255,12 +256,12 @@ class NomadSecretRole(pulumi.CustomResource):
255
256
  def __init__(__self__,
256
257
  resource_name: str,
257
258
  opts: Optional[pulumi.ResourceOptions] = None,
258
- backend: Optional[pulumi.Input[str]] = None,
259
- global_: Optional[pulumi.Input[bool]] = None,
260
- namespace: Optional[pulumi.Input[str]] = None,
261
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
262
- role: Optional[pulumi.Input[str]] = None,
263
- type: Optional[pulumi.Input[str]] = None,
259
+ backend: Optional[pulumi.Input[builtins.str]] = None,
260
+ global_: Optional[pulumi.Input[builtins.bool]] = None,
261
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
262
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
263
+ role: Optional[pulumi.Input[builtins.str]] = None,
264
+ type: Optional[pulumi.Input[builtins.str]] = None,
264
265
  __props__=None):
265
266
  """
266
267
  ## Example Usage
@@ -293,18 +294,18 @@ class NomadSecretRole(pulumi.CustomResource):
293
294
 
294
295
  :param str resource_name: The name of the resource.
295
296
  :param pulumi.ResourceOptions opts: Options for the resource.
296
- :param pulumi.Input[str] backend: The unique path this backend should be mounted at.
297
- :param pulumi.Input[bool] global_: Specifies if the generated token should be global. Defaults to
297
+ :param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at.
298
+ :param pulumi.Input[builtins.bool] global_: Specifies if the generated token should be global. Defaults to
298
299
  false.
299
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
300
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
300
301
  The value should not contain leading or trailing forward slashes.
301
302
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
302
303
  *Available only for Vault Enterprise*.
303
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies attached to the generated token. This setting is only used
304
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: List of policies attached to the generated token. This setting is only used
304
305
  when `type` is 'client'.
305
- :param pulumi.Input[str] role: The name to identify this role within the backend.
306
+ :param pulumi.Input[builtins.str] role: The name to identify this role within the backend.
306
307
  Must be unique within the backend.
307
- :param pulumi.Input[str] type: Specifies the type of token to create when using this role. Valid
308
+ :param pulumi.Input[builtins.str] type: Specifies the type of token to create when using this role. Valid
308
309
  settings are 'client' and 'management'. Defaults to 'client'.
309
310
  """
310
311
  ...
@@ -357,12 +358,12 @@ class NomadSecretRole(pulumi.CustomResource):
357
358
  def _internal_init(__self__,
358
359
  resource_name: str,
359
360
  opts: Optional[pulumi.ResourceOptions] = None,
360
- backend: Optional[pulumi.Input[str]] = None,
361
- global_: Optional[pulumi.Input[bool]] = None,
362
- namespace: Optional[pulumi.Input[str]] = None,
363
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
364
- role: Optional[pulumi.Input[str]] = None,
365
- type: Optional[pulumi.Input[str]] = None,
361
+ backend: Optional[pulumi.Input[builtins.str]] = None,
362
+ global_: Optional[pulumi.Input[builtins.bool]] = None,
363
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
364
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
365
+ role: Optional[pulumi.Input[builtins.str]] = None,
366
+ type: Optional[pulumi.Input[builtins.str]] = None,
366
367
  __props__=None):
367
368
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
368
369
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -392,12 +393,12 @@ class NomadSecretRole(pulumi.CustomResource):
392
393
  def get(resource_name: str,
393
394
  id: pulumi.Input[str],
394
395
  opts: Optional[pulumi.ResourceOptions] = None,
395
- backend: Optional[pulumi.Input[str]] = None,
396
- global_: Optional[pulumi.Input[bool]] = None,
397
- namespace: Optional[pulumi.Input[str]] = None,
398
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
399
- role: Optional[pulumi.Input[str]] = None,
400
- type: Optional[pulumi.Input[str]] = None) -> 'NomadSecretRole':
396
+ backend: Optional[pulumi.Input[builtins.str]] = None,
397
+ global_: Optional[pulumi.Input[builtins.bool]] = None,
398
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
399
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
400
+ role: Optional[pulumi.Input[builtins.str]] = None,
401
+ type: Optional[pulumi.Input[builtins.str]] = None) -> 'NomadSecretRole':
401
402
  """
402
403
  Get an existing NomadSecretRole resource's state with the given name, id, and optional extra
403
404
  properties used to qualify the lookup.
@@ -405,18 +406,18 @@ class NomadSecretRole(pulumi.CustomResource):
405
406
  :param str resource_name: The unique name of the resulting resource.
406
407
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
407
408
  :param pulumi.ResourceOptions opts: Options for the resource.
408
- :param pulumi.Input[str] backend: The unique path this backend should be mounted at.
409
- :param pulumi.Input[bool] global_: Specifies if the generated token should be global. Defaults to
409
+ :param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at.
410
+ :param pulumi.Input[builtins.bool] global_: Specifies if the generated token should be global. Defaults to
410
411
  false.
411
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
412
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
412
413
  The value should not contain leading or trailing forward slashes.
413
414
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
414
415
  *Available only for Vault Enterprise*.
415
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies attached to the generated token. This setting is only used
416
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: List of policies attached to the generated token. This setting is only used
416
417
  when `type` is 'client'.
417
- :param pulumi.Input[str] role: The name to identify this role within the backend.
418
+ :param pulumi.Input[builtins.str] role: The name to identify this role within the backend.
418
419
  Must be unique within the backend.
419
- :param pulumi.Input[str] type: Specifies the type of token to create when using this role. Valid
420
+ :param pulumi.Input[builtins.str] type: Specifies the type of token to create when using this role. Valid
420
421
  settings are 'client' and 'management'. Defaults to 'client'.
421
422
  """
422
423
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -433,7 +434,7 @@ class NomadSecretRole(pulumi.CustomResource):
433
434
 
434
435
  @property
435
436
  @pulumi.getter
436
- def backend(self) -> pulumi.Output[str]:
437
+ def backend(self) -> pulumi.Output[builtins.str]:
437
438
  """
438
439
  The unique path this backend should be mounted at.
439
440
  """
@@ -441,7 +442,7 @@ class NomadSecretRole(pulumi.CustomResource):
441
442
 
442
443
  @property
443
444
  @pulumi.getter(name="global")
444
- def global_(self) -> pulumi.Output[bool]:
445
+ def global_(self) -> pulumi.Output[builtins.bool]:
445
446
  """
446
447
  Specifies if the generated token should be global. Defaults to
447
448
  false.
@@ -450,7 +451,7 @@ class NomadSecretRole(pulumi.CustomResource):
450
451
 
451
452
  @property
452
453
  @pulumi.getter
453
- def namespace(self) -> pulumi.Output[Optional[str]]:
454
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
454
455
  """
455
456
  The namespace to provision the resource in.
456
457
  The value should not contain leading or trailing forward slashes.
@@ -461,7 +462,7 @@ class NomadSecretRole(pulumi.CustomResource):
461
462
 
462
463
  @property
463
464
  @pulumi.getter
464
- def policies(self) -> pulumi.Output[Sequence[str]]:
465
+ def policies(self) -> pulumi.Output[Sequence[builtins.str]]:
465
466
  """
466
467
  List of policies attached to the generated token. This setting is only used
467
468
  when `type` is 'client'.
@@ -470,7 +471,7 @@ class NomadSecretRole(pulumi.CustomResource):
470
471
 
471
472
  @property
472
473
  @pulumi.getter
473
- def role(self) -> pulumi.Output[str]:
474
+ def role(self) -> pulumi.Output[builtins.str]:
474
475
  """
475
476
  The name to identify this role within the backend.
476
477
  Must be unique within the backend.
@@ -479,7 +480,7 @@ class NomadSecretRole(pulumi.CustomResource):
479
480
 
480
481
  @property
481
482
  @pulumi.getter
482
- def type(self) -> pulumi.Output[str]:
483
+ def type(self) -> pulumi.Output[builtins.str]:
483
484
  """
484
485
  Specifies the type of token to create when using this role. Valid
485
486
  settings are 'client' and 'management'. Defaults to 'client'.
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  from .. import _utilities
6
7
  import typing
7
8
  # Export this package's modules as members:
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -25,11 +26,11 @@ MYPY = False
25
26
 
26
27
  if not MYPY:
27
28
  class AuthBackendGroupArgsDict(TypedDict):
28
- group_name: pulumi.Input[str]
29
+ group_name: pulumi.Input[builtins.str]
29
30
  """
30
31
  Name of the Okta group
31
32
  """
32
- policies: pulumi.Input[Sequence[pulumi.Input[str]]]
33
+ policies: pulumi.Input[Sequence[pulumi.Input[builtins.str]]]
33
34
  """
34
35
  Policies to associate with this group
35
36
  """
@@ -39,51 +40,51 @@ elif False:
39
40
  @pulumi.input_type
40
41
  class AuthBackendGroupArgs:
41
42
  def __init__(__self__, *,
42
- group_name: pulumi.Input[str],
43
- policies: pulumi.Input[Sequence[pulumi.Input[str]]]):
43
+ group_name: pulumi.Input[builtins.str],
44
+ policies: pulumi.Input[Sequence[pulumi.Input[builtins.str]]]):
44
45
  """
45
- :param pulumi.Input[str] group_name: Name of the Okta group
46
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies to associate with this group
46
+ :param pulumi.Input[builtins.str] group_name: Name of the Okta group
47
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Policies to associate with this group
47
48
  """
48
49
  pulumi.set(__self__, "group_name", group_name)
49
50
  pulumi.set(__self__, "policies", policies)
50
51
 
51
52
  @property
52
53
  @pulumi.getter(name="groupName")
53
- def group_name(self) -> pulumi.Input[str]:
54
+ def group_name(self) -> pulumi.Input[builtins.str]:
54
55
  """
55
56
  Name of the Okta group
56
57
  """
57
58
  return pulumi.get(self, "group_name")
58
59
 
59
60
  @group_name.setter
60
- def group_name(self, value: pulumi.Input[str]):
61
+ def group_name(self, value: pulumi.Input[builtins.str]):
61
62
  pulumi.set(self, "group_name", value)
62
63
 
63
64
  @property
64
65
  @pulumi.getter
65
- def policies(self) -> pulumi.Input[Sequence[pulumi.Input[str]]]:
66
+ def policies(self) -> pulumi.Input[Sequence[pulumi.Input[builtins.str]]]:
66
67
  """
67
68
  Policies to associate with this group
68
69
  """
69
70
  return pulumi.get(self, "policies")
70
71
 
71
72
  @policies.setter
72
- def policies(self, value: pulumi.Input[Sequence[pulumi.Input[str]]]):
73
+ def policies(self, value: pulumi.Input[Sequence[pulumi.Input[builtins.str]]]):
73
74
  pulumi.set(self, "policies", value)
74
75
 
75
76
 
76
77
  if not MYPY:
77
78
  class AuthBackendUserArgsDict(TypedDict):
78
- username: pulumi.Input[str]
79
+ username: pulumi.Input[builtins.str]
79
80
  """
80
81
  Name of the user within Okta
81
82
  """
82
- groups: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
83
+ groups: NotRequired[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]
83
84
  """
84
85
  Groups within the Okta auth backend to associate with this user
85
86
  """
86
- policies: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
87
+ policies: NotRequired[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]
87
88
  """
88
89
  Policies to associate with this user
89
90
  """
@@ -93,13 +94,13 @@ elif False:
93
94
  @pulumi.input_type
94
95
  class AuthBackendUserArgs:
95
96
  def __init__(__self__, *,
96
- username: pulumi.Input[str],
97
- groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
98
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
97
+ username: pulumi.Input[builtins.str],
98
+ groups: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
99
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
99
100
  """
100
- :param pulumi.Input[str] username: Name of the user within Okta
101
- :param pulumi.Input[Sequence[pulumi.Input[str]]] groups: Groups within the Okta auth backend to associate with this user
102
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies to associate with this user
101
+ :param pulumi.Input[builtins.str] username: Name of the user within Okta
102
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] groups: Groups within the Okta auth backend to associate with this user
103
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Policies to associate with this user
103
104
  """
104
105
  pulumi.set(__self__, "username", username)
105
106
  if groups is not None:
@@ -109,38 +110,38 @@ class AuthBackendUserArgs:
109
110
 
110
111
  @property
111
112
  @pulumi.getter
112
- def username(self) -> pulumi.Input[str]:
113
+ def username(self) -> pulumi.Input[builtins.str]:
113
114
  """
114
115
  Name of the user within Okta
115
116
  """
116
117
  return pulumi.get(self, "username")
117
118
 
118
119
  @username.setter
119
- def username(self, value: pulumi.Input[str]):
120
+ def username(self, value: pulumi.Input[builtins.str]):
120
121
  pulumi.set(self, "username", value)
121
122
 
122
123
  @property
123
124
  @pulumi.getter
124
- def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
125
+ def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
125
126
  """
126
127
  Groups within the Okta auth backend to associate with this user
127
128
  """
128
129
  return pulumi.get(self, "groups")
129
130
 
130
131
  @groups.setter
131
- def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
132
+ def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
132
133
  pulumi.set(self, "groups", value)
133
134
 
134
135
  @property
135
136
  @pulumi.getter
136
- def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
137
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
137
138
  """
138
139
  Policies to associate with this user
139
140
  """
140
141
  return pulumi.get(self, "policies")
141
142
 
142
143
  @policies.setter
143
- def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
144
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
144
145
  pulumi.set(self, "policies", value)
145
146
 
146
147