pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -19,19 +20,19 @@ __all__ = ['AuthBackendGroupInitArgs', 'AuthBackendGroup']
19
20
  @pulumi.input_type
20
21
  class AuthBackendGroupInitArgs:
21
22
  def __init__(__self__, *,
22
- group_name: pulumi.Input[str],
23
- path: pulumi.Input[str],
24
- namespace: Optional[pulumi.Input[str]] = None,
25
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
23
+ group_name: pulumi.Input[builtins.str],
24
+ path: pulumi.Input[builtins.str],
25
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
26
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
26
27
  """
27
28
  The set of arguments for constructing a AuthBackendGroup resource.
28
- :param pulumi.Input[str] group_name: Name of the group within the Okta
29
- :param pulumi.Input[str] path: The path where the Okta auth backend is mounted
30
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
29
+ :param pulumi.Input[builtins.str] group_name: Name of the group within the Okta
30
+ :param pulumi.Input[builtins.str] path: The path where the Okta auth backend is mounted
31
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
31
32
  The value should not contain leading or trailing forward slashes.
32
33
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
33
34
  *Available only for Vault Enterprise*.
34
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Vault policies to associate with this group
35
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Vault policies to associate with this group
35
36
  """
36
37
  pulumi.set(__self__, "group_name", group_name)
37
38
  pulumi.set(__self__, "path", path)
@@ -42,31 +43,31 @@ class AuthBackendGroupInitArgs:
42
43
 
43
44
  @property
44
45
  @pulumi.getter(name="groupName")
45
- def group_name(self) -> pulumi.Input[str]:
46
+ def group_name(self) -> pulumi.Input[builtins.str]:
46
47
  """
47
48
  Name of the group within the Okta
48
49
  """
49
50
  return pulumi.get(self, "group_name")
50
51
 
51
52
  @group_name.setter
52
- def group_name(self, value: pulumi.Input[str]):
53
+ def group_name(self, value: pulumi.Input[builtins.str]):
53
54
  pulumi.set(self, "group_name", value)
54
55
 
55
56
  @property
56
57
  @pulumi.getter
57
- def path(self) -> pulumi.Input[str]:
58
+ def path(self) -> pulumi.Input[builtins.str]:
58
59
  """
59
60
  The path where the Okta auth backend is mounted
60
61
  """
61
62
  return pulumi.get(self, "path")
62
63
 
63
64
  @path.setter
64
- def path(self, value: pulumi.Input[str]):
65
+ def path(self, value: pulumi.Input[builtins.str]):
65
66
  pulumi.set(self, "path", value)
66
67
 
67
68
  @property
68
69
  @pulumi.getter
69
- def namespace(self) -> Optional[pulumi.Input[str]]:
70
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
70
71
  """
71
72
  The namespace to provision the resource in.
72
73
  The value should not contain leading or trailing forward slashes.
@@ -76,38 +77,38 @@ class AuthBackendGroupInitArgs:
76
77
  return pulumi.get(self, "namespace")
77
78
 
78
79
  @namespace.setter
79
- def namespace(self, value: Optional[pulumi.Input[str]]):
80
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
80
81
  pulumi.set(self, "namespace", value)
81
82
 
82
83
  @property
83
84
  @pulumi.getter
84
- def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
85
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
85
86
  """
86
87
  Vault policies to associate with this group
87
88
  """
88
89
  return pulumi.get(self, "policies")
89
90
 
90
91
  @policies.setter
91
- def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
92
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
92
93
  pulumi.set(self, "policies", value)
93
94
 
94
95
 
95
96
  @pulumi.input_type
96
97
  class _AuthBackendGroupState:
97
98
  def __init__(__self__, *,
98
- group_name: Optional[pulumi.Input[str]] = None,
99
- namespace: Optional[pulumi.Input[str]] = None,
100
- path: Optional[pulumi.Input[str]] = None,
101
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
99
+ group_name: Optional[pulumi.Input[builtins.str]] = None,
100
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
101
+ path: Optional[pulumi.Input[builtins.str]] = None,
102
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
102
103
  """
103
104
  Input properties used for looking up and filtering AuthBackendGroup resources.
104
- :param pulumi.Input[str] group_name: Name of the group within the Okta
105
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
105
+ :param pulumi.Input[builtins.str] group_name: Name of the group within the Okta
106
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
106
107
  The value should not contain leading or trailing forward slashes.
107
108
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
108
109
  *Available only for Vault Enterprise*.
109
- :param pulumi.Input[str] path: The path where the Okta auth backend is mounted
110
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Vault policies to associate with this group
110
+ :param pulumi.Input[builtins.str] path: The path where the Okta auth backend is mounted
111
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Vault policies to associate with this group
111
112
  """
112
113
  if group_name is not None:
113
114
  pulumi.set(__self__, "group_name", group_name)
@@ -120,19 +121,19 @@ class _AuthBackendGroupState:
120
121
 
121
122
  @property
122
123
  @pulumi.getter(name="groupName")
123
- def group_name(self) -> Optional[pulumi.Input[str]]:
124
+ def group_name(self) -> Optional[pulumi.Input[builtins.str]]:
124
125
  """
125
126
  Name of the group within the Okta
126
127
  """
127
128
  return pulumi.get(self, "group_name")
128
129
 
129
130
  @group_name.setter
130
- def group_name(self, value: Optional[pulumi.Input[str]]):
131
+ def group_name(self, value: Optional[pulumi.Input[builtins.str]]):
131
132
  pulumi.set(self, "group_name", value)
132
133
 
133
134
  @property
134
135
  @pulumi.getter
135
- def namespace(self) -> Optional[pulumi.Input[str]]:
136
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
136
137
  """
137
138
  The namespace to provision the resource in.
138
139
  The value should not contain leading or trailing forward slashes.
@@ -142,31 +143,31 @@ class _AuthBackendGroupState:
142
143
  return pulumi.get(self, "namespace")
143
144
 
144
145
  @namespace.setter
145
- def namespace(self, value: Optional[pulumi.Input[str]]):
146
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
146
147
  pulumi.set(self, "namespace", value)
147
148
 
148
149
  @property
149
150
  @pulumi.getter
150
- def path(self) -> Optional[pulumi.Input[str]]:
151
+ def path(self) -> Optional[pulumi.Input[builtins.str]]:
151
152
  """
152
153
  The path where the Okta auth backend is mounted
153
154
  """
154
155
  return pulumi.get(self, "path")
155
156
 
156
157
  @path.setter
157
- def path(self, value: Optional[pulumi.Input[str]]):
158
+ def path(self, value: Optional[pulumi.Input[builtins.str]]):
158
159
  pulumi.set(self, "path", value)
159
160
 
160
161
  @property
161
162
  @pulumi.getter
162
- def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
163
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
163
164
  """
164
165
  Vault policies to associate with this group
165
166
  """
166
167
  return pulumi.get(self, "policies")
167
168
 
168
169
  @policies.setter
169
- def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
170
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
170
171
  pulumi.set(self, "policies", value)
171
172
 
172
173
 
@@ -175,10 +176,10 @@ class AuthBackendGroup(pulumi.CustomResource):
175
176
  def __init__(__self__,
176
177
  resource_name: str,
177
178
  opts: Optional[pulumi.ResourceOptions] = None,
178
- group_name: Optional[pulumi.Input[str]] = None,
179
- namespace: Optional[pulumi.Input[str]] = None,
180
- path: Optional[pulumi.Input[str]] = None,
181
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
179
+ group_name: Optional[pulumi.Input[builtins.str]] = None,
180
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
181
+ path: Optional[pulumi.Input[builtins.str]] = None,
182
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
182
183
  __props__=None):
183
184
  """
184
185
  Provides a resource to create a group in an
@@ -212,13 +213,13 @@ class AuthBackendGroup(pulumi.CustomResource):
212
213
 
213
214
  :param str resource_name: The name of the resource.
214
215
  :param pulumi.ResourceOptions opts: Options for the resource.
215
- :param pulumi.Input[str] group_name: Name of the group within the Okta
216
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
216
+ :param pulumi.Input[builtins.str] group_name: Name of the group within the Okta
217
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
217
218
  The value should not contain leading or trailing forward slashes.
218
219
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
219
220
  *Available only for Vault Enterprise*.
220
- :param pulumi.Input[str] path: The path where the Okta auth backend is mounted
221
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Vault policies to associate with this group
221
+ :param pulumi.Input[builtins.str] path: The path where the Okta auth backend is mounted
222
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Vault policies to associate with this group
222
223
  """
223
224
  ...
224
225
  @overload
@@ -271,10 +272,10 @@ class AuthBackendGroup(pulumi.CustomResource):
271
272
  def _internal_init(__self__,
272
273
  resource_name: str,
273
274
  opts: Optional[pulumi.ResourceOptions] = None,
274
- group_name: Optional[pulumi.Input[str]] = None,
275
- namespace: Optional[pulumi.Input[str]] = None,
276
- path: Optional[pulumi.Input[str]] = None,
277
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
275
+ group_name: Optional[pulumi.Input[builtins.str]] = None,
276
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
277
+ path: Optional[pulumi.Input[builtins.str]] = None,
278
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
278
279
  __props__=None):
279
280
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
280
281
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -302,10 +303,10 @@ class AuthBackendGroup(pulumi.CustomResource):
302
303
  def get(resource_name: str,
303
304
  id: pulumi.Input[str],
304
305
  opts: Optional[pulumi.ResourceOptions] = None,
305
- group_name: Optional[pulumi.Input[str]] = None,
306
- namespace: Optional[pulumi.Input[str]] = None,
307
- path: Optional[pulumi.Input[str]] = None,
308
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None) -> 'AuthBackendGroup':
306
+ group_name: Optional[pulumi.Input[builtins.str]] = None,
307
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
308
+ path: Optional[pulumi.Input[builtins.str]] = None,
309
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None) -> 'AuthBackendGroup':
309
310
  """
310
311
  Get an existing AuthBackendGroup resource's state with the given name, id, and optional extra
311
312
  properties used to qualify the lookup.
@@ -313,13 +314,13 @@ class AuthBackendGroup(pulumi.CustomResource):
313
314
  :param str resource_name: The unique name of the resulting resource.
314
315
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
315
316
  :param pulumi.ResourceOptions opts: Options for the resource.
316
- :param pulumi.Input[str] group_name: Name of the group within the Okta
317
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
317
+ :param pulumi.Input[builtins.str] group_name: Name of the group within the Okta
318
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
318
319
  The value should not contain leading or trailing forward slashes.
319
320
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
320
321
  *Available only for Vault Enterprise*.
321
- :param pulumi.Input[str] path: The path where the Okta auth backend is mounted
322
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Vault policies to associate with this group
322
+ :param pulumi.Input[builtins.str] path: The path where the Okta auth backend is mounted
323
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Vault policies to associate with this group
323
324
  """
324
325
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
325
326
 
@@ -333,7 +334,7 @@ class AuthBackendGroup(pulumi.CustomResource):
333
334
 
334
335
  @property
335
336
  @pulumi.getter(name="groupName")
336
- def group_name(self) -> pulumi.Output[str]:
337
+ def group_name(self) -> pulumi.Output[builtins.str]:
337
338
  """
338
339
  Name of the group within the Okta
339
340
  """
@@ -341,7 +342,7 @@ class AuthBackendGroup(pulumi.CustomResource):
341
342
 
342
343
  @property
343
344
  @pulumi.getter
344
- def namespace(self) -> pulumi.Output[Optional[str]]:
345
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
345
346
  """
346
347
  The namespace to provision the resource in.
347
348
  The value should not contain leading or trailing forward slashes.
@@ -352,7 +353,7 @@ class AuthBackendGroup(pulumi.CustomResource):
352
353
 
353
354
  @property
354
355
  @pulumi.getter
355
- def path(self) -> pulumi.Output[str]:
356
+ def path(self) -> pulumi.Output[builtins.str]:
356
357
  """
357
358
  The path where the Okta auth backend is mounted
358
359
  """
@@ -360,7 +361,7 @@ class AuthBackendGroup(pulumi.CustomResource):
360
361
 
361
362
  @property
362
363
  @pulumi.getter
363
- def policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
364
+ def policies(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
364
365
  """
365
366
  Vault policies to associate with this group
366
367
  """
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -19,21 +20,21 @@ __all__ = ['AuthBackendUserInitArgs', 'AuthBackendUser']
19
20
  @pulumi.input_type
20
21
  class AuthBackendUserInitArgs:
21
22
  def __init__(__self__, *,
22
- path: pulumi.Input[str],
23
- username: pulumi.Input[str],
24
- groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
25
- namespace: Optional[pulumi.Input[str]] = None,
26
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
23
+ path: pulumi.Input[builtins.str],
24
+ username: pulumi.Input[builtins.str],
25
+ groups: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
26
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
27
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
27
28
  """
28
29
  The set of arguments for constructing a AuthBackendUser resource.
29
- :param pulumi.Input[str] path: The path where the Okta auth backend is mounted
30
- :param pulumi.Input[str] username: Name of the user within Okta
31
- :param pulumi.Input[Sequence[pulumi.Input[str]]] groups: List of Okta groups to associate with this user
32
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
30
+ :param pulumi.Input[builtins.str] path: The path where the Okta auth backend is mounted
31
+ :param pulumi.Input[builtins.str] username: Name of the user within Okta
32
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] groups: List of Okta groups to associate with this user
33
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
33
34
  The value should not contain leading or trailing forward slashes.
34
35
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
35
36
  *Available only for Vault Enterprise*.
36
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of Vault policies to associate with this user
37
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: List of Vault policies to associate with this user
37
38
  """
38
39
  pulumi.set(__self__, "path", path)
39
40
  pulumi.set(__self__, "username", username)
@@ -46,43 +47,43 @@ class AuthBackendUserInitArgs:
46
47
 
47
48
  @property
48
49
  @pulumi.getter
49
- def path(self) -> pulumi.Input[str]:
50
+ def path(self) -> pulumi.Input[builtins.str]:
50
51
  """
51
52
  The path where the Okta auth backend is mounted
52
53
  """
53
54
  return pulumi.get(self, "path")
54
55
 
55
56
  @path.setter
56
- def path(self, value: pulumi.Input[str]):
57
+ def path(self, value: pulumi.Input[builtins.str]):
57
58
  pulumi.set(self, "path", value)
58
59
 
59
60
  @property
60
61
  @pulumi.getter
61
- def username(self) -> pulumi.Input[str]:
62
+ def username(self) -> pulumi.Input[builtins.str]:
62
63
  """
63
64
  Name of the user within Okta
64
65
  """
65
66
  return pulumi.get(self, "username")
66
67
 
67
68
  @username.setter
68
- def username(self, value: pulumi.Input[str]):
69
+ def username(self, value: pulumi.Input[builtins.str]):
69
70
  pulumi.set(self, "username", value)
70
71
 
71
72
  @property
72
73
  @pulumi.getter
73
- def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
74
+ def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
74
75
  """
75
76
  List of Okta groups to associate with this user
76
77
  """
77
78
  return pulumi.get(self, "groups")
78
79
 
79
80
  @groups.setter
80
- def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
81
+ def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
81
82
  pulumi.set(self, "groups", value)
82
83
 
83
84
  @property
84
85
  @pulumi.getter
85
- def namespace(self) -> Optional[pulumi.Input[str]]:
86
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
86
87
  """
87
88
  The namespace to provision the resource in.
88
89
  The value should not contain leading or trailing forward slashes.
@@ -92,40 +93,40 @@ class AuthBackendUserInitArgs:
92
93
  return pulumi.get(self, "namespace")
93
94
 
94
95
  @namespace.setter
95
- def namespace(self, value: Optional[pulumi.Input[str]]):
96
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
96
97
  pulumi.set(self, "namespace", value)
97
98
 
98
99
  @property
99
100
  @pulumi.getter
100
- def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
101
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
101
102
  """
102
103
  List of Vault policies to associate with this user
103
104
  """
104
105
  return pulumi.get(self, "policies")
105
106
 
106
107
  @policies.setter
107
- def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
108
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
108
109
  pulumi.set(self, "policies", value)
109
110
 
110
111
 
111
112
  @pulumi.input_type
112
113
  class _AuthBackendUserState:
113
114
  def __init__(__self__, *,
114
- groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
115
- namespace: Optional[pulumi.Input[str]] = None,
116
- path: Optional[pulumi.Input[str]] = None,
117
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
118
- username: Optional[pulumi.Input[str]] = None):
115
+ groups: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
116
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
117
+ path: Optional[pulumi.Input[builtins.str]] = None,
118
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
119
+ username: Optional[pulumi.Input[builtins.str]] = None):
119
120
  """
120
121
  Input properties used for looking up and filtering AuthBackendUser resources.
121
- :param pulumi.Input[Sequence[pulumi.Input[str]]] groups: List of Okta groups to associate with this user
122
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
122
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] groups: List of Okta groups to associate with this user
123
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
123
124
  The value should not contain leading or trailing forward slashes.
124
125
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
125
126
  *Available only for Vault Enterprise*.
126
- :param pulumi.Input[str] path: The path where the Okta auth backend is mounted
127
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of Vault policies to associate with this user
128
- :param pulumi.Input[str] username: Name of the user within Okta
127
+ :param pulumi.Input[builtins.str] path: The path where the Okta auth backend is mounted
128
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: List of Vault policies to associate with this user
129
+ :param pulumi.Input[builtins.str] username: Name of the user within Okta
129
130
  """
130
131
  if groups is not None:
131
132
  pulumi.set(__self__, "groups", groups)
@@ -140,19 +141,19 @@ class _AuthBackendUserState:
140
141
 
141
142
  @property
142
143
  @pulumi.getter
143
- def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
144
+ def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
144
145
  """
145
146
  List of Okta groups to associate with this user
146
147
  """
147
148
  return pulumi.get(self, "groups")
148
149
 
149
150
  @groups.setter
150
- def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
151
+ def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
151
152
  pulumi.set(self, "groups", value)
152
153
 
153
154
  @property
154
155
  @pulumi.getter
155
- def namespace(self) -> Optional[pulumi.Input[str]]:
156
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
156
157
  """
157
158
  The namespace to provision the resource in.
158
159
  The value should not contain leading or trailing forward slashes.
@@ -162,43 +163,43 @@ class _AuthBackendUserState:
162
163
  return pulumi.get(self, "namespace")
163
164
 
164
165
  @namespace.setter
165
- def namespace(self, value: Optional[pulumi.Input[str]]):
166
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
166
167
  pulumi.set(self, "namespace", value)
167
168
 
168
169
  @property
169
170
  @pulumi.getter
170
- def path(self) -> Optional[pulumi.Input[str]]:
171
+ def path(self) -> Optional[pulumi.Input[builtins.str]]:
171
172
  """
172
173
  The path where the Okta auth backend is mounted
173
174
  """
174
175
  return pulumi.get(self, "path")
175
176
 
176
177
  @path.setter
177
- def path(self, value: Optional[pulumi.Input[str]]):
178
+ def path(self, value: Optional[pulumi.Input[builtins.str]]):
178
179
  pulumi.set(self, "path", value)
179
180
 
180
181
  @property
181
182
  @pulumi.getter
182
- def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
183
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
183
184
  """
184
185
  List of Vault policies to associate with this user
185
186
  """
186
187
  return pulumi.get(self, "policies")
187
188
 
188
189
  @policies.setter
189
- def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
190
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
190
191
  pulumi.set(self, "policies", value)
191
192
 
192
193
  @property
193
194
  @pulumi.getter
194
- def username(self) -> Optional[pulumi.Input[str]]:
195
+ def username(self) -> Optional[pulumi.Input[builtins.str]]:
195
196
  """
196
197
  Name of the user within Okta
197
198
  """
198
199
  return pulumi.get(self, "username")
199
200
 
200
201
  @username.setter
201
- def username(self, value: Optional[pulumi.Input[str]]):
202
+ def username(self, value: Optional[pulumi.Input[builtins.str]]):
202
203
  pulumi.set(self, "username", value)
203
204
 
204
205
 
@@ -207,11 +208,11 @@ class AuthBackendUser(pulumi.CustomResource):
207
208
  def __init__(__self__,
208
209
  resource_name: str,
209
210
  opts: Optional[pulumi.ResourceOptions] = None,
210
- groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
211
- namespace: Optional[pulumi.Input[str]] = None,
212
- path: Optional[pulumi.Input[str]] = None,
213
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
214
- username: Optional[pulumi.Input[str]] = None,
211
+ groups: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
212
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
213
+ path: Optional[pulumi.Input[builtins.str]] = None,
214
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
215
+ username: Optional[pulumi.Input[builtins.str]] = None,
215
216
  __props__=None):
216
217
  """
217
218
  Provides a resource to create a user in an
@@ -245,14 +246,14 @@ class AuthBackendUser(pulumi.CustomResource):
245
246
 
246
247
  :param str resource_name: The name of the resource.
247
248
  :param pulumi.ResourceOptions opts: Options for the resource.
248
- :param pulumi.Input[Sequence[pulumi.Input[str]]] groups: List of Okta groups to associate with this user
249
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
249
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] groups: List of Okta groups to associate with this user
250
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
250
251
  The value should not contain leading or trailing forward slashes.
251
252
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
252
253
  *Available only for Vault Enterprise*.
253
- :param pulumi.Input[str] path: The path where the Okta auth backend is mounted
254
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of Vault policies to associate with this user
255
- :param pulumi.Input[str] username: Name of the user within Okta
254
+ :param pulumi.Input[builtins.str] path: The path where the Okta auth backend is mounted
255
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: List of Vault policies to associate with this user
256
+ :param pulumi.Input[builtins.str] username: Name of the user within Okta
256
257
  """
257
258
  ...
258
259
  @overload
@@ -305,11 +306,11 @@ class AuthBackendUser(pulumi.CustomResource):
305
306
  def _internal_init(__self__,
306
307
  resource_name: str,
307
308
  opts: Optional[pulumi.ResourceOptions] = None,
308
- groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
309
- namespace: Optional[pulumi.Input[str]] = None,
310
- path: Optional[pulumi.Input[str]] = None,
311
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
312
- username: Optional[pulumi.Input[str]] = None,
309
+ groups: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
310
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
311
+ path: Optional[pulumi.Input[builtins.str]] = None,
312
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
313
+ username: Optional[pulumi.Input[builtins.str]] = None,
313
314
  __props__=None):
314
315
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
315
316
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -338,11 +339,11 @@ class AuthBackendUser(pulumi.CustomResource):
338
339
  def get(resource_name: str,
339
340
  id: pulumi.Input[str],
340
341
  opts: Optional[pulumi.ResourceOptions] = None,
341
- groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
342
- namespace: Optional[pulumi.Input[str]] = None,
343
- path: Optional[pulumi.Input[str]] = None,
344
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
345
- username: Optional[pulumi.Input[str]] = None) -> 'AuthBackendUser':
342
+ groups: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
343
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
344
+ path: Optional[pulumi.Input[builtins.str]] = None,
345
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
346
+ username: Optional[pulumi.Input[builtins.str]] = None) -> 'AuthBackendUser':
346
347
  """
347
348
  Get an existing AuthBackendUser resource's state with the given name, id, and optional extra
348
349
  properties used to qualify the lookup.
@@ -350,14 +351,14 @@ class AuthBackendUser(pulumi.CustomResource):
350
351
  :param str resource_name: The unique name of the resulting resource.
351
352
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
352
353
  :param pulumi.ResourceOptions opts: Options for the resource.
353
- :param pulumi.Input[Sequence[pulumi.Input[str]]] groups: List of Okta groups to associate with this user
354
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
354
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] groups: List of Okta groups to associate with this user
355
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
355
356
  The value should not contain leading or trailing forward slashes.
356
357
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
357
358
  *Available only for Vault Enterprise*.
358
- :param pulumi.Input[str] path: The path where the Okta auth backend is mounted
359
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of Vault policies to associate with this user
360
- :param pulumi.Input[str] username: Name of the user within Okta
359
+ :param pulumi.Input[builtins.str] path: The path where the Okta auth backend is mounted
360
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: List of Vault policies to associate with this user
361
+ :param pulumi.Input[builtins.str] username: Name of the user within Okta
361
362
  """
362
363
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
363
364
 
@@ -372,7 +373,7 @@ class AuthBackendUser(pulumi.CustomResource):
372
373
 
373
374
  @property
374
375
  @pulumi.getter
375
- def groups(self) -> pulumi.Output[Optional[Sequence[str]]]:
376
+ def groups(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
376
377
  """
377
378
  List of Okta groups to associate with this user
378
379
  """
@@ -380,7 +381,7 @@ class AuthBackendUser(pulumi.CustomResource):
380
381
 
381
382
  @property
382
383
  @pulumi.getter
383
- def namespace(self) -> pulumi.Output[Optional[str]]:
384
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
384
385
  """
385
386
  The namespace to provision the resource in.
386
387
  The value should not contain leading or trailing forward slashes.
@@ -391,7 +392,7 @@ class AuthBackendUser(pulumi.CustomResource):
391
392
 
392
393
  @property
393
394
  @pulumi.getter
394
- def path(self) -> pulumi.Output[str]:
395
+ def path(self) -> pulumi.Output[builtins.str]:
395
396
  """
396
397
  The path where the Okta auth backend is mounted
397
398
  """
@@ -399,7 +400,7 @@ class AuthBackendUser(pulumi.CustomResource):
399
400
 
400
401
  @property
401
402
  @pulumi.getter
402
- def policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
403
+ def policies(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
403
404
  """
404
405
  List of Vault policies to associate with this user
405
406
  """
@@ -407,7 +408,7 @@ class AuthBackendUser(pulumi.CustomResource):
407
408
 
408
409
  @property
409
410
  @pulumi.getter
410
- def username(self) -> pulumi.Output[str]:
411
+ def username(self) -> pulumi.Output[builtins.str]:
411
412
  """
412
413
  Name of the user within Okta
413
414
  """