pulumi-vault 6.7.0a1743490126__py3-none-any.whl → 6.7.0a1744183682__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744183682.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743490126.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -19,21 +20,21 @@ __all__ = ['AuthBackendGroupArgs', 'AuthBackendGroup']
19
20
  @pulumi.input_type
20
21
  class AuthBackendGroupArgs:
21
22
  def __init__(__self__, *,
22
- groupname: pulumi.Input[str],
23
- backend: Optional[pulumi.Input[str]] = None,
24
- namespace: Optional[pulumi.Input[str]] = None,
25
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
23
+ groupname: pulumi.Input[builtins.str],
24
+ backend: Optional[pulumi.Input[builtins.str]] = None,
25
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
26
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
26
27
  """
27
28
  The set of arguments for constructing a AuthBackendGroup resource.
28
- :param pulumi.Input[str] groupname: The LDAP groupname
29
- :param pulumi.Input[str] backend: Path to the authentication backend
29
+ :param pulumi.Input[builtins.str] groupname: The LDAP groupname
30
+ :param pulumi.Input[builtins.str] backend: Path to the authentication backend
30
31
 
31
32
  For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
32
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
33
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
33
34
  The value should not contain leading or trailing forward slashes.
34
35
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
35
36
  *Available only for Vault Enterprise*.
36
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies which should be granted to members of the group
37
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Policies which should be granted to members of the group
37
38
  """
38
39
  pulumi.set(__self__, "groupname", groupname)
39
40
  if backend is not None:
@@ -45,19 +46,19 @@ class AuthBackendGroupArgs:
45
46
 
46
47
  @property
47
48
  @pulumi.getter
48
- def groupname(self) -> pulumi.Input[str]:
49
+ def groupname(self) -> pulumi.Input[builtins.str]:
49
50
  """
50
51
  The LDAP groupname
51
52
  """
52
53
  return pulumi.get(self, "groupname")
53
54
 
54
55
  @groupname.setter
55
- def groupname(self, value: pulumi.Input[str]):
56
+ def groupname(self, value: pulumi.Input[builtins.str]):
56
57
  pulumi.set(self, "groupname", value)
57
58
 
58
59
  @property
59
60
  @pulumi.getter
60
- def backend(self) -> Optional[pulumi.Input[str]]:
61
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
61
62
  """
62
63
  Path to the authentication backend
63
64
 
@@ -66,12 +67,12 @@ class AuthBackendGroupArgs:
66
67
  return pulumi.get(self, "backend")
67
68
 
68
69
  @backend.setter
69
- def backend(self, value: Optional[pulumi.Input[str]]):
70
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
70
71
  pulumi.set(self, "backend", value)
71
72
 
72
73
  @property
73
74
  @pulumi.getter
74
- def namespace(self) -> Optional[pulumi.Input[str]]:
75
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
75
76
  """
76
77
  The namespace to provision the resource in.
77
78
  The value should not contain leading or trailing forward slashes.
@@ -81,40 +82,40 @@ class AuthBackendGroupArgs:
81
82
  return pulumi.get(self, "namespace")
82
83
 
83
84
  @namespace.setter
84
- def namespace(self, value: Optional[pulumi.Input[str]]):
85
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
85
86
  pulumi.set(self, "namespace", value)
86
87
 
87
88
  @property
88
89
  @pulumi.getter
89
- def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
90
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
90
91
  """
91
92
  Policies which should be granted to members of the group
92
93
  """
93
94
  return pulumi.get(self, "policies")
94
95
 
95
96
  @policies.setter
96
- def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
97
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
97
98
  pulumi.set(self, "policies", value)
98
99
 
99
100
 
100
101
  @pulumi.input_type
101
102
  class _AuthBackendGroupState:
102
103
  def __init__(__self__, *,
103
- backend: Optional[pulumi.Input[str]] = None,
104
- groupname: Optional[pulumi.Input[str]] = None,
105
- namespace: Optional[pulumi.Input[str]] = None,
106
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
104
+ backend: Optional[pulumi.Input[builtins.str]] = None,
105
+ groupname: Optional[pulumi.Input[builtins.str]] = None,
106
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
107
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
107
108
  """
108
109
  Input properties used for looking up and filtering AuthBackendGroup resources.
109
- :param pulumi.Input[str] backend: Path to the authentication backend
110
+ :param pulumi.Input[builtins.str] backend: Path to the authentication backend
110
111
 
111
112
  For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
112
- :param pulumi.Input[str] groupname: The LDAP groupname
113
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
113
+ :param pulumi.Input[builtins.str] groupname: The LDAP groupname
114
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
114
115
  The value should not contain leading or trailing forward slashes.
115
116
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
116
117
  *Available only for Vault Enterprise*.
117
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies which should be granted to members of the group
118
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Policies which should be granted to members of the group
118
119
  """
119
120
  if backend is not None:
120
121
  pulumi.set(__self__, "backend", backend)
@@ -127,7 +128,7 @@ class _AuthBackendGroupState:
127
128
 
128
129
  @property
129
130
  @pulumi.getter
130
- def backend(self) -> Optional[pulumi.Input[str]]:
131
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
131
132
  """
132
133
  Path to the authentication backend
133
134
 
@@ -136,24 +137,24 @@ class _AuthBackendGroupState:
136
137
  return pulumi.get(self, "backend")
137
138
 
138
139
  @backend.setter
139
- def backend(self, value: Optional[pulumi.Input[str]]):
140
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
140
141
  pulumi.set(self, "backend", value)
141
142
 
142
143
  @property
143
144
  @pulumi.getter
144
- def groupname(self) -> Optional[pulumi.Input[str]]:
145
+ def groupname(self) -> Optional[pulumi.Input[builtins.str]]:
145
146
  """
146
147
  The LDAP groupname
147
148
  """
148
149
  return pulumi.get(self, "groupname")
149
150
 
150
151
  @groupname.setter
151
- def groupname(self, value: Optional[pulumi.Input[str]]):
152
+ def groupname(self, value: Optional[pulumi.Input[builtins.str]]):
152
153
  pulumi.set(self, "groupname", value)
153
154
 
154
155
  @property
155
156
  @pulumi.getter
156
- def namespace(self) -> Optional[pulumi.Input[str]]:
157
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
157
158
  """
158
159
  The namespace to provision the resource in.
159
160
  The value should not contain leading or trailing forward slashes.
@@ -163,19 +164,19 @@ class _AuthBackendGroupState:
163
164
  return pulumi.get(self, "namespace")
164
165
 
165
166
  @namespace.setter
166
- def namespace(self, value: Optional[pulumi.Input[str]]):
167
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
167
168
  pulumi.set(self, "namespace", value)
168
169
 
169
170
  @property
170
171
  @pulumi.getter
171
- def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
172
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
172
173
  """
173
174
  Policies which should be granted to members of the group
174
175
  """
175
176
  return pulumi.get(self, "policies")
176
177
 
177
178
  @policies.setter
178
- def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
179
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
179
180
  pulumi.set(self, "policies", value)
180
181
 
181
182
 
@@ -184,10 +185,10 @@ class AuthBackendGroup(pulumi.CustomResource):
184
185
  def __init__(__self__,
185
186
  resource_name: str,
186
187
  opts: Optional[pulumi.ResourceOptions] = None,
187
- backend: Optional[pulumi.Input[str]] = None,
188
- groupname: Optional[pulumi.Input[str]] = None,
189
- namespace: Optional[pulumi.Input[str]] = None,
190
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
188
+ backend: Optional[pulumi.Input[builtins.str]] = None,
189
+ groupname: Optional[pulumi.Input[builtins.str]] = None,
190
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
191
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
191
192
  __props__=None):
192
193
  """
193
194
  Provides a resource to create a group in an [LDAP auth backend within Vault](https://www.vaultproject.io/docs/auth/ldap.html).
@@ -223,15 +224,15 @@ class AuthBackendGroup(pulumi.CustomResource):
223
224
 
224
225
  :param str resource_name: The name of the resource.
225
226
  :param pulumi.ResourceOptions opts: Options for the resource.
226
- :param pulumi.Input[str] backend: Path to the authentication backend
227
+ :param pulumi.Input[builtins.str] backend: Path to the authentication backend
227
228
 
228
229
  For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
229
- :param pulumi.Input[str] groupname: The LDAP groupname
230
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
230
+ :param pulumi.Input[builtins.str] groupname: The LDAP groupname
231
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
231
232
  The value should not contain leading or trailing forward slashes.
232
233
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
233
234
  *Available only for Vault Enterprise*.
234
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies which should be granted to members of the group
235
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Policies which should be granted to members of the group
235
236
  """
236
237
  ...
237
238
  @overload
@@ -286,10 +287,10 @@ class AuthBackendGroup(pulumi.CustomResource):
286
287
  def _internal_init(__self__,
287
288
  resource_name: str,
288
289
  opts: Optional[pulumi.ResourceOptions] = None,
289
- backend: Optional[pulumi.Input[str]] = None,
290
- groupname: Optional[pulumi.Input[str]] = None,
291
- namespace: Optional[pulumi.Input[str]] = None,
292
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
290
+ backend: Optional[pulumi.Input[builtins.str]] = None,
291
+ groupname: Optional[pulumi.Input[builtins.str]] = None,
292
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
293
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
293
294
  __props__=None):
294
295
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
295
296
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -315,10 +316,10 @@ class AuthBackendGroup(pulumi.CustomResource):
315
316
  def get(resource_name: str,
316
317
  id: pulumi.Input[str],
317
318
  opts: Optional[pulumi.ResourceOptions] = None,
318
- backend: Optional[pulumi.Input[str]] = None,
319
- groupname: Optional[pulumi.Input[str]] = None,
320
- namespace: Optional[pulumi.Input[str]] = None,
321
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None) -> 'AuthBackendGroup':
319
+ backend: Optional[pulumi.Input[builtins.str]] = None,
320
+ groupname: Optional[pulumi.Input[builtins.str]] = None,
321
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
322
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None) -> 'AuthBackendGroup':
322
323
  """
323
324
  Get an existing AuthBackendGroup resource's state with the given name, id, and optional extra
324
325
  properties used to qualify the lookup.
@@ -326,15 +327,15 @@ class AuthBackendGroup(pulumi.CustomResource):
326
327
  :param str resource_name: The unique name of the resulting resource.
327
328
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
328
329
  :param pulumi.ResourceOptions opts: Options for the resource.
329
- :param pulumi.Input[str] backend: Path to the authentication backend
330
+ :param pulumi.Input[builtins.str] backend: Path to the authentication backend
330
331
 
331
332
  For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
332
- :param pulumi.Input[str] groupname: The LDAP groupname
333
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
333
+ :param pulumi.Input[builtins.str] groupname: The LDAP groupname
334
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
334
335
  The value should not contain leading or trailing forward slashes.
335
336
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
336
337
  *Available only for Vault Enterprise*.
337
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies which should be granted to members of the group
338
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Policies which should be granted to members of the group
338
339
  """
339
340
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
340
341
 
@@ -348,7 +349,7 @@ class AuthBackendGroup(pulumi.CustomResource):
348
349
 
349
350
  @property
350
351
  @pulumi.getter
351
- def backend(self) -> pulumi.Output[Optional[str]]:
352
+ def backend(self) -> pulumi.Output[Optional[builtins.str]]:
352
353
  """
353
354
  Path to the authentication backend
354
355
 
@@ -358,7 +359,7 @@ class AuthBackendGroup(pulumi.CustomResource):
358
359
 
359
360
  @property
360
361
  @pulumi.getter
361
- def groupname(self) -> pulumi.Output[str]:
362
+ def groupname(self) -> pulumi.Output[builtins.str]:
362
363
  """
363
364
  The LDAP groupname
364
365
  """
@@ -366,7 +367,7 @@ class AuthBackendGroup(pulumi.CustomResource):
366
367
 
367
368
  @property
368
369
  @pulumi.getter
369
- def namespace(self) -> pulumi.Output[Optional[str]]:
370
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
370
371
  """
371
372
  The namespace to provision the resource in.
372
373
  The value should not contain leading or trailing forward slashes.
@@ -377,7 +378,7 @@ class AuthBackendGroup(pulumi.CustomResource):
377
378
 
378
379
  @property
379
380
  @pulumi.getter
380
- def policies(self) -> pulumi.Output[Sequence[str]]:
381
+ def policies(self) -> pulumi.Output[Sequence[builtins.str]]:
381
382
  """
382
383
  Policies which should be granted to members of the group
383
384
  """