pulumi-vault 6.7.0a1745304689__py3-none-any.whl → 6.7.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (163) hide show
  1. pulumi_vault/_inputs.py +33 -13
  2. pulumi_vault/ad/secret_backend.py +3 -0
  3. pulumi_vault/ad/secret_library.py +3 -0
  4. pulumi_vault/ad/secret_role.py +3 -0
  5. pulumi_vault/alicloud/auth_backend_role.py +3 -0
  6. pulumi_vault/approle/auth_backend_login.py +3 -0
  7. pulumi_vault/approle/auth_backend_role.py +3 -0
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +3 -0
  9. pulumi_vault/audit.py +3 -0
  10. pulumi_vault/audit_request_header.py +3 -0
  11. pulumi_vault/auth_backend.py +3 -0
  12. pulumi_vault/aws/auth_backend_cert.py +3 -0
  13. pulumi_vault/aws/auth_backend_client.py +3 -0
  14. pulumi_vault/aws/auth_backend_config_identity.py +3 -0
  15. pulumi_vault/aws/auth_backend_identity_whitelist.py +3 -0
  16. pulumi_vault/aws/auth_backend_login.py +3 -0
  17. pulumi_vault/aws/auth_backend_role.py +3 -0
  18. pulumi_vault/aws/auth_backend_role_tag.py +3 -0
  19. pulumi_vault/aws/auth_backend_roletag_blacklist.py +3 -0
  20. pulumi_vault/aws/auth_backend_sts_role.py +3 -0
  21. pulumi_vault/aws/secret_backend.py +3 -0
  22. pulumi_vault/aws/secret_backend_role.py +3 -0
  23. pulumi_vault/aws/secret_backend_static_role.py +3 -0
  24. pulumi_vault/azure/auth_backend_config.py +3 -0
  25. pulumi_vault/azure/auth_backend_role.py +3 -0
  26. pulumi_vault/azure/backend.py +3 -0
  27. pulumi_vault/azure/backend_role.py +50 -0
  28. pulumi_vault/cert_auth_backend_role.py +3 -0
  29. pulumi_vault/config/ui_custom_message.py +3 -0
  30. pulumi_vault/consul/secret_backend.py +3 -0
  31. pulumi_vault/consul/secret_backend_role.py +3 -0
  32. pulumi_vault/database/secret_backend_connection.py +3 -0
  33. pulumi_vault/database/secret_backend_role.py +3 -0
  34. pulumi_vault/database/secret_backend_static_role.py +3 -0
  35. pulumi_vault/database/secrets_mount.py +3 -0
  36. pulumi_vault/egp_policy.py +3 -0
  37. pulumi_vault/gcp/auth_backend.py +3 -0
  38. pulumi_vault/gcp/auth_backend_role.py +3 -0
  39. pulumi_vault/gcp/secret_backend.py +3 -0
  40. pulumi_vault/gcp/secret_impersonated_account.py +3 -0
  41. pulumi_vault/gcp/secret_roleset.py +3 -0
  42. pulumi_vault/gcp/secret_static_account.py +3 -0
  43. pulumi_vault/generic/endpoint.py +3 -0
  44. pulumi_vault/generic/secret.py +3 -0
  45. pulumi_vault/get_namespaces.py +60 -11
  46. pulumi_vault/github/auth_backend.py +3 -0
  47. pulumi_vault/github/team.py +3 -0
  48. pulumi_vault/github/user.py +3 -0
  49. pulumi_vault/identity/entity.py +3 -0
  50. pulumi_vault/identity/entity_alias.py +3 -0
  51. pulumi_vault/identity/entity_policies.py +3 -0
  52. pulumi_vault/identity/group.py +3 -0
  53. pulumi_vault/identity/group_alias.py +3 -0
  54. pulumi_vault/identity/group_member_entity_ids.py +3 -0
  55. pulumi_vault/identity/group_member_group_ids.py +3 -0
  56. pulumi_vault/identity/group_policies.py +3 -0
  57. pulumi_vault/identity/mfa_duo.py +3 -0
  58. pulumi_vault/identity/mfa_login_enforcement.py +3 -0
  59. pulumi_vault/identity/mfa_okta.py +3 -0
  60. pulumi_vault/identity/mfa_pingid.py +3 -0
  61. pulumi_vault/identity/mfa_totp.py +3 -0
  62. pulumi_vault/identity/oidc.py +3 -0
  63. pulumi_vault/identity/oidc_assignment.py +3 -0
  64. pulumi_vault/identity/oidc_client.py +3 -0
  65. pulumi_vault/identity/oidc_key.py +3 -0
  66. pulumi_vault/identity/oidc_key_allowed_client_id.py +3 -0
  67. pulumi_vault/identity/oidc_provider.py +3 -0
  68. pulumi_vault/identity/oidc_role.py +3 -0
  69. pulumi_vault/identity/oidc_scope.py +3 -0
  70. pulumi_vault/jwt/auth_backend.py +3 -0
  71. pulumi_vault/jwt/auth_backend_role.py +3 -0
  72. pulumi_vault/kmip/secret_backend.py +3 -0
  73. pulumi_vault/kmip/secret_role.py +3 -0
  74. pulumi_vault/kmip/secret_scope.py +3 -0
  75. pulumi_vault/kubernetes/auth_backend_config.py +3 -0
  76. pulumi_vault/kubernetes/auth_backend_role.py +3 -0
  77. pulumi_vault/kubernetes/secret_backend.py +3 -0
  78. pulumi_vault/kubernetes/secret_backend_role.py +3 -0
  79. pulumi_vault/kv/secret.py +3 -0
  80. pulumi_vault/kv/secret_backend_v2.py +3 -0
  81. pulumi_vault/kv/secret_v2.py +3 -0
  82. pulumi_vault/ldap/auth_backend.py +3 -0
  83. pulumi_vault/ldap/auth_backend_group.py +3 -0
  84. pulumi_vault/ldap/auth_backend_user.py +3 -0
  85. pulumi_vault/ldap/secret_backend.py +3 -0
  86. pulumi_vault/ldap/secret_backend_dynamic_role.py +3 -0
  87. pulumi_vault/ldap/secret_backend_library_set.py +3 -0
  88. pulumi_vault/ldap/secret_backend_static_role.py +3 -0
  89. pulumi_vault/managed/keys.py +3 -0
  90. pulumi_vault/mfa_duo.py +3 -0
  91. pulumi_vault/mfa_okta.py +3 -0
  92. pulumi_vault/mfa_pingid.py +3 -0
  93. pulumi_vault/mfa_totp.py +3 -0
  94. pulumi_vault/mongodbatlas/secret_backend.py +3 -0
  95. pulumi_vault/mongodbatlas/secret_role.py +3 -0
  96. pulumi_vault/mount.py +3 -0
  97. pulumi_vault/namespace.py +3 -0
  98. pulumi_vault/nomad_secret_backend.py +3 -0
  99. pulumi_vault/nomad_secret_role.py +3 -0
  100. pulumi_vault/okta/auth_backend.py +3 -0
  101. pulumi_vault/okta/auth_backend_group.py +3 -0
  102. pulumi_vault/okta/auth_backend_user.py +3 -0
  103. pulumi_vault/outputs.py +21 -9
  104. pulumi_vault/password_policy.py +3 -0
  105. pulumi_vault/pkisecret/backend_acme_eab.py +3 -0
  106. pulumi_vault/pkisecret/backend_config_acme.py +3 -0
  107. pulumi_vault/pkisecret/backend_config_auto_tidy.py +3 -0
  108. pulumi_vault/pkisecret/backend_config_cluster.py +3 -0
  109. pulumi_vault/pkisecret/backend_config_cmpv2.py +3 -0
  110. pulumi_vault/pkisecret/backend_config_est.py +3 -0
  111. pulumi_vault/pkisecret/secret_backend_cert.py +3 -0
  112. pulumi_vault/pkisecret/secret_backend_config_ca.py +3 -0
  113. pulumi_vault/pkisecret/secret_backend_config_issuers.py +3 -0
  114. pulumi_vault/pkisecret/secret_backend_config_urls.py +3 -0
  115. pulumi_vault/pkisecret/secret_backend_crl_config.py +3 -0
  116. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +3 -0
  117. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +3 -0
  118. pulumi_vault/pkisecret/secret_backend_issuer.py +3 -0
  119. pulumi_vault/pkisecret/secret_backend_key.py +3 -0
  120. pulumi_vault/pkisecret/secret_backend_role.py +3 -0
  121. pulumi_vault/pkisecret/secret_backend_root_cert.py +3 -0
  122. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +3 -0
  123. pulumi_vault/pkisecret/secret_backend_sign.py +3 -0
  124. pulumi_vault/plugin.py +3 -0
  125. pulumi_vault/plugin_pinned_version.py +3 -0
  126. pulumi_vault/policy.py +3 -0
  127. pulumi_vault/provider.py +3 -0
  128. pulumi_vault/pulumi-plugin.json +1 -1
  129. pulumi_vault/quota_lease_count.py +3 -0
  130. pulumi_vault/quota_rate_limit.py +3 -0
  131. pulumi_vault/rabbitmq/secret_backend.py +3 -0
  132. pulumi_vault/rabbitmq/secret_backend_role.py +3 -0
  133. pulumi_vault/raft_autopilot.py +3 -0
  134. pulumi_vault/raft_snapshot_agent_config.py +3 -0
  135. pulumi_vault/rgp_policy.py +3 -0
  136. pulumi_vault/saml/auth_backend.py +3 -0
  137. pulumi_vault/saml/auth_backend_role.py +3 -0
  138. pulumi_vault/secrets/sync_association.py +3 -0
  139. pulumi_vault/secrets/sync_aws_destination.py +3 -0
  140. pulumi_vault/secrets/sync_azure_destination.py +3 -0
  141. pulumi_vault/secrets/sync_config.py +3 -0
  142. pulumi_vault/secrets/sync_gcp_destination.py +3 -0
  143. pulumi_vault/secrets/sync_gh_destination.py +3 -0
  144. pulumi_vault/secrets/sync_github_apps.py +3 -0
  145. pulumi_vault/secrets/sync_vercel_destination.py +3 -0
  146. pulumi_vault/ssh/secret_backend_ca.py +3 -0
  147. pulumi_vault/ssh/secret_backend_role.py +3 -0
  148. pulumi_vault/terraformcloud/secret_backend.py +3 -0
  149. pulumi_vault/terraformcloud/secret_creds.py +3 -0
  150. pulumi_vault/terraformcloud/secret_role.py +3 -0
  151. pulumi_vault/token.py +3 -0
  152. pulumi_vault/tokenauth/auth_backend_role.py +3 -0
  153. pulumi_vault/transform/alphabet.py +3 -0
  154. pulumi_vault/transform/role.py +3 -0
  155. pulumi_vault/transform/template.py +3 -0
  156. pulumi_vault/transform/transformation.py +3 -0
  157. pulumi_vault/transit/secret_backend_key.py +3 -0
  158. pulumi_vault/transit/secret_cache_config.py +3 -0
  159. {pulumi_vault-6.7.0a1745304689.dist-info → pulumi_vault-6.7.1.dist-info}/METADATA +1 -1
  160. pulumi_vault-6.7.1.dist-info/RECORD +265 -0
  161. {pulumi_vault-6.7.0a1745304689.dist-info → pulumi_vault-6.7.1.dist-info}/WHEEL +1 -1
  162. pulumi_vault-6.7.0a1745304689.dist-info/RECORD +0 -265
  163. {pulumi_vault-6.7.0a1745304689.dist-info → pulumi_vault-6.7.1.dist-info}/top_level.txt +0 -0
@@ -1299,6 +1299,9 @@ class _SecretsMountState:
1299
1299
 
1300
1300
 
1301
1301
  class SecretsMount(pulumi.CustomResource):
1302
+
1303
+ pulumi_type = "vault:database/secretsMount:SecretsMount"
1304
+
1302
1305
  @overload
1303
1306
  def __init__(__self__,
1304
1307
  resource_name: str,
@@ -203,6 +203,9 @@ class _EgpPolicyState:
203
203
 
204
204
 
205
205
  class EgpPolicy(pulumi.CustomResource):
206
+
207
+ pulumi_type = "vault:index/egpPolicy:EgpPolicy"
208
+
206
209
  @overload
207
210
  def __init__(__self__,
208
211
  resource_name: str,
@@ -772,6 +772,9 @@ class _AuthBackendState:
772
772
 
773
773
 
774
774
  class AuthBackend(pulumi.CustomResource):
775
+
776
+ pulumi_type = "vault:gcp/authBackend:AuthBackend"
777
+
775
778
  @overload
776
779
  def __init__(__self__,
777
780
  resource_name: str,
@@ -692,6 +692,9 @@ class _AuthBackendRoleState:
692
692
 
693
693
 
694
694
  class AuthBackendRole(pulumi.CustomResource):
695
+
696
+ pulumi_type = "vault:gcp/authBackendRole:AuthBackendRole"
697
+
695
698
  @overload
696
699
  def __init__(__self__,
697
700
  resource_name: str,
@@ -630,6 +630,9 @@ class _SecretBackendState:
630
630
 
631
631
 
632
632
  class SecretBackend(pulumi.CustomResource):
633
+
634
+ pulumi_type = "vault:gcp/secretBackend:SecretBackend"
635
+
633
636
  @overload
634
637
  def __init__(__self__,
635
638
  resource_name: str,
@@ -243,6 +243,9 @@ class _SecretImpersonatedAccountState:
243
243
 
244
244
 
245
245
  class SecretImpersonatedAccount(pulumi.CustomResource):
246
+
247
+ pulumi_type = "vault:gcp/secretImpersonatedAccount:SecretImpersonatedAccount"
248
+
246
249
  @overload
247
250
  def __init__(__self__,
248
251
  resource_name: str,
@@ -284,6 +284,9 @@ class _SecretRolesetState:
284
284
 
285
285
 
286
286
  class SecretRoleset(pulumi.CustomResource):
287
+
288
+ pulumi_type = "vault:gcp/secretRoleset:SecretRoleset"
289
+
287
290
  @overload
288
291
  def __init__(__self__,
289
292
  resource_name: str,
@@ -285,6 +285,9 @@ class _SecretStaticAccountState:
285
285
 
286
286
 
287
287
  class SecretStaticAccount(pulumi.CustomResource):
288
+
289
+ pulumi_type = "vault:gcp/secretStaticAccount:SecretStaticAccount"
290
+
288
291
  @overload
289
292
  def __init__(__self__,
290
293
  resource_name: str,
@@ -398,6 +398,9 @@ class _EndpointState:
398
398
 
399
399
 
400
400
  class Endpoint(pulumi.CustomResource):
401
+
402
+ pulumi_type = "vault:generic/endpoint:Endpoint"
403
+
401
404
  @overload
402
405
  def __init__(__self__,
403
406
  resource_name: str,
@@ -266,6 +266,9 @@ class _SecretState:
266
266
 
267
267
 
268
268
  class Secret(pulumi.CustomResource):
269
+
270
+ pulumi_type = "vault:generic/secret:Secret"
271
+
269
272
  @overload
270
273
  def __init__(__self__,
271
274
  resource_name: str,
@@ -27,7 +27,7 @@ class GetNamespacesResult:
27
27
  """
28
28
  A collection of values returned by getNamespaces.
29
29
  """
30
- def __init__(__self__, id=None, namespace=None, paths=None):
30
+ def __init__(__self__, id=None, namespace=None, paths=None, paths_fqs=None, recursive=None):
31
31
  if id and not isinstance(id, str):
32
32
  raise TypeError("Expected argument 'id' to be a str")
33
33
  pulumi.set(__self__, "id", id)
@@ -37,6 +37,12 @@ class GetNamespacesResult:
37
37
  if paths and not isinstance(paths, list):
38
38
  raise TypeError("Expected argument 'paths' to be a list")
39
39
  pulumi.set(__self__, "paths", paths)
40
+ if paths_fqs and not isinstance(paths_fqs, list):
41
+ raise TypeError("Expected argument 'paths_fqs' to be a list")
42
+ pulumi.set(__self__, "paths_fqs", paths_fqs)
43
+ if recursive and not isinstance(recursive, bool):
44
+ raise TypeError("Expected argument 'recursive' to be a bool")
45
+ pulumi.set(__self__, "recursive", recursive)
40
46
 
41
47
  @property
42
48
  @pulumi.getter
@@ -55,10 +61,23 @@ class GetNamespacesResult:
55
61
  @pulumi.getter
56
62
  def paths(self) -> Sequence[builtins.str]:
57
63
  """
58
- Set of the paths of direct child namespaces.
64
+ Set of the paths of child namespaces.
59
65
  """
60
66
  return pulumi.get(self, "paths")
61
67
 
68
+ @property
69
+ @pulumi.getter(name="pathsFqs")
70
+ def paths_fqs(self) -> Sequence[builtins.str]:
71
+ """
72
+ Set of the fully qualified paths of child namespaces.
73
+ """
74
+ return pulumi.get(self, "paths_fqs")
75
+
76
+ @property
77
+ @pulumi.getter
78
+ def recursive(self) -> Optional[builtins.bool]:
79
+ return pulumi.get(self, "recursive")
80
+
62
81
 
63
82
  class AwaitableGetNamespacesResult(GetNamespacesResult):
64
83
  # pylint: disable=using-constant-test
@@ -68,15 +87,18 @@ class AwaitableGetNamespacesResult(GetNamespacesResult):
68
87
  return GetNamespacesResult(
69
88
  id=self.id,
70
89
  namespace=self.namespace,
71
- paths=self.paths)
90
+ paths=self.paths,
91
+ paths_fqs=self.paths_fqs,
92
+ recursive=self.recursive)
72
93
 
73
94
 
74
95
  def get_namespaces(namespace: Optional[builtins.str] = None,
96
+ recursive: Optional[builtins.bool] = None,
75
97
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetNamespacesResult:
76
98
  """
77
99
  ## Example Usage
78
100
 
79
- ### Child namespaces
101
+ ### Direct child namespaces
80
102
 
81
103
  ```python
82
104
  import pulumi
@@ -85,9 +107,18 @@ def get_namespaces(namespace: Optional[builtins.str] = None,
85
107
  children = vault.get_namespaces()
86
108
  ```
87
109
 
88
- ### Nested namespace
110
+ ### All child namespaces
89
111
 
90
- To fetch the details of nested namespaces:
112
+ ```python
113
+ import pulumi
114
+ import pulumi_vault as vault
115
+
116
+ children = vault.get_namespaces(recursive=True)
117
+ ```
118
+
119
+ ### Child namespace details
120
+
121
+ To fetch the details of child namespaces:
91
122
 
92
123
  ```python
93
124
  import pulumi
@@ -102,22 +133,27 @@ def get_namespaces(namespace: Optional[builtins.str] = None,
102
133
  :param builtins.str namespace: The namespace to provision the resource in.
103
134
  The value should not contain leading or trailing forward slashes.
104
135
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
136
+ :param builtins.bool recursive: If `true`, it will returns all child namespaces of the given namespace. Defaults to `false`, which returns only direct child namespaces.
105
137
  """
106
138
  __args__ = dict()
107
139
  __args__['namespace'] = namespace
140
+ __args__['recursive'] = recursive
108
141
  opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
109
142
  __ret__ = pulumi.runtime.invoke('vault:index/getNamespaces:getNamespaces', __args__, opts=opts, typ=GetNamespacesResult).value
110
143
 
111
144
  return AwaitableGetNamespacesResult(
112
145
  id=pulumi.get(__ret__, 'id'),
113
146
  namespace=pulumi.get(__ret__, 'namespace'),
114
- paths=pulumi.get(__ret__, 'paths'))
147
+ paths=pulumi.get(__ret__, 'paths'),
148
+ paths_fqs=pulumi.get(__ret__, 'paths_fqs'),
149
+ recursive=pulumi.get(__ret__, 'recursive'))
115
150
  def get_namespaces_output(namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
151
+ recursive: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
116
152
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetNamespacesResult]:
117
153
  """
118
154
  ## Example Usage
119
155
 
120
- ### Child namespaces
156
+ ### Direct child namespaces
121
157
 
122
158
  ```python
123
159
  import pulumi
@@ -126,9 +162,18 @@ def get_namespaces_output(namespace: Optional[pulumi.Input[Optional[builtins.str
126
162
  children = vault.get_namespaces()
127
163
  ```
128
164
 
129
- ### Nested namespace
165
+ ### All child namespaces
166
+
167
+ ```python
168
+ import pulumi
169
+ import pulumi_vault as vault
170
+
171
+ children = vault.get_namespaces(recursive=True)
172
+ ```
173
+
174
+ ### Child namespace details
130
175
 
131
- To fetch the details of nested namespaces:
176
+ To fetch the details of child namespaces:
132
177
 
133
178
  ```python
134
179
  import pulumi
@@ -143,12 +188,16 @@ def get_namespaces_output(namespace: Optional[pulumi.Input[Optional[builtins.str
143
188
  :param builtins.str namespace: The namespace to provision the resource in.
144
189
  The value should not contain leading or trailing forward slashes.
145
190
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
191
+ :param builtins.bool recursive: If `true`, it will returns all child namespaces of the given namespace. Defaults to `false`, which returns only direct child namespaces.
146
192
  """
147
193
  __args__ = dict()
148
194
  __args__['namespace'] = namespace
195
+ __args__['recursive'] = recursive
149
196
  opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
150
197
  __ret__ = pulumi.runtime.invoke_output('vault:index/getNamespaces:getNamespaces', __args__, opts=opts, typ=GetNamespacesResult)
151
198
  return __ret__.apply(lambda __response__: GetNamespacesResult(
152
199
  id=pulumi.get(__response__, 'id'),
153
200
  namespace=pulumi.get(__response__, 'namespace'),
154
- paths=pulumi.get(__response__, 'paths')))
201
+ paths=pulumi.get(__response__, 'paths'),
202
+ paths_fqs=pulumi.get(__response__, 'paths_fqs'),
203
+ recursive=pulumi.get(__response__, 'recursive')))
@@ -691,6 +691,9 @@ class _AuthBackendState:
691
691
 
692
692
 
693
693
  class AuthBackend(pulumi.CustomResource):
694
+
695
+ pulumi_type = "vault:github/authBackend:AuthBackend"
696
+
694
697
  @overload
695
698
  def __init__(__self__,
696
699
  resource_name: str,
@@ -181,6 +181,9 @@ class _TeamState:
181
181
 
182
182
 
183
183
  class Team(pulumi.CustomResource):
184
+
185
+ pulumi_type = "vault:github/team:Team"
186
+
184
187
  @overload
185
188
  def __init__(__self__,
186
189
  resource_name: str,
@@ -181,6 +181,9 @@ class _UserState:
181
181
 
182
182
 
183
183
  class User(pulumi.CustomResource):
184
+
185
+ pulumi_type = "vault:github/user:User"
186
+
184
187
  @overload
185
188
  def __init__(__self__,
186
189
  resource_name: str,
@@ -238,6 +238,9 @@ class _EntityState:
238
238
 
239
239
 
240
240
  class Entity(pulumi.CustomResource):
241
+
242
+ pulumi_type = "vault:identity/entity:Entity"
243
+
241
244
  @overload
242
245
  def __init__(__self__,
243
246
  resource_name: str,
@@ -204,6 +204,9 @@ class _EntityAliasState:
204
204
 
205
205
 
206
206
  class EntityAlias(pulumi.CustomResource):
207
+
208
+ pulumi_type = "vault:identity/entityAlias:EntityAlias"
209
+
207
210
  @overload
208
211
  def __init__(__self__,
209
212
  resource_name: str,
@@ -204,6 +204,9 @@ class _EntityPoliciesState:
204
204
 
205
205
 
206
206
  class EntityPolicies(pulumi.CustomResource):
207
+
208
+ pulumi_type = "vault:identity/entityPolicies:EntityPolicies"
209
+
207
210
  @overload
208
211
  def __init__(__self__,
209
212
  resource_name: str,
@@ -398,6 +398,9 @@ class _GroupState:
398
398
 
399
399
 
400
400
  class Group(pulumi.CustomResource):
401
+
402
+ pulumi_type = "vault:identity/group:Group"
403
+
401
404
  @overload
402
405
  def __init__(__self__,
403
406
  resource_name: str,
@@ -171,6 +171,9 @@ class _GroupAliasState:
171
171
 
172
172
 
173
173
  class GroupAlias(pulumi.CustomResource):
174
+
175
+ pulumi_type = "vault:identity/groupAlias:GroupAlias"
176
+
174
177
  @overload
175
178
  def __init__(__self__,
176
179
  resource_name: str,
@@ -189,6 +189,9 @@ class _GroupMemberEntityIdsState:
189
189
 
190
190
 
191
191
  class GroupMemberEntityIds(pulumi.CustomResource):
192
+
193
+ pulumi_type = "vault:identity/groupMemberEntityIds:GroupMemberEntityIds"
194
+
192
195
  @overload
193
196
  def __init__(__self__,
194
197
  resource_name: str,
@@ -201,6 +201,9 @@ class _GroupMemberGroupIdsState:
201
201
 
202
202
 
203
203
  class GroupMemberGroupIds(pulumi.CustomResource):
204
+
205
+ pulumi_type = "vault:identity/groupMemberGroupIds:GroupMemberGroupIds"
206
+
204
207
  @overload
205
208
  def __init__(__self__,
206
209
  resource_name: str,
@@ -204,6 +204,9 @@ class _GroupPoliciesState:
204
204
 
205
205
 
206
206
  class GroupPolicies(pulumi.CustomResource):
207
+
208
+ pulumi_type = "vault:identity/groupPolicies:GroupPolicies"
209
+
207
210
  @overload
208
211
  def __init__(__self__,
209
212
  resource_name: str,
@@ -367,6 +367,9 @@ class _MfaDuoState:
367
367
 
368
368
 
369
369
  class MfaDuo(pulumi.CustomResource):
370
+
371
+ pulumi_type = "vault:identity/mfaDuo:MfaDuo"
372
+
370
373
  @overload
371
374
  def __init__(__self__,
372
375
  resource_name: str,
@@ -305,6 +305,9 @@ class _MfaLoginEnforcementState:
305
305
 
306
306
 
307
307
  class MfaLoginEnforcement(pulumi.CustomResource):
308
+
309
+ pulumi_type = "vault:identity/mfaLoginEnforcement:MfaLoginEnforcement"
310
+
308
311
  @overload
309
312
  def __init__(__self__,
310
313
  resource_name: str,
@@ -336,6 +336,9 @@ class _MfaOktaState:
336
336
 
337
337
 
338
338
  class MfaOkta(pulumi.CustomResource):
339
+
340
+ pulumi_type = "vault:identity/mfaOkta:MfaOkta"
341
+
339
342
  @overload
340
343
  def __init__(__self__,
341
344
  resource_name: str,
@@ -321,6 +321,9 @@ class _MfaPingidState:
321
321
 
322
322
 
323
323
  class MfaPingid(pulumi.CustomResource):
324
+
325
+ pulumi_type = "vault:identity/mfaPingid:MfaPingid"
326
+
324
327
  @overload
325
328
  def __init__(__self__,
326
329
  resource_name: str,
@@ -433,6 +433,9 @@ class _MfaTotpState:
433
433
 
434
434
 
435
435
  class MfaTotp(pulumi.CustomResource):
436
+
437
+ pulumi_type = "vault:identity/mfaTotp:MfaTotp"
438
+
436
439
  @overload
437
440
  def __init__(__self__,
438
441
  resource_name: str,
@@ -122,6 +122,9 @@ class _OidcState:
122
122
 
123
123
 
124
124
  class Oidc(pulumi.CustomResource):
125
+
126
+ pulumi_type = "vault:identity/oidc:Oidc"
127
+
125
128
  @overload
126
129
  def __init__(__self__,
127
130
  resource_name: str,
@@ -174,6 +174,9 @@ class _OidcAssignmentState:
174
174
 
175
175
 
176
176
  class OidcAssignment(pulumi.CustomResource):
177
+
178
+ pulumi_type = "vault:identity/oidcAssignment:OidcAssignment"
179
+
177
180
  @overload
178
181
  def __init__(__self__,
179
182
  resource_name: str,
@@ -360,6 +360,9 @@ class _OidcClientState:
360
360
 
361
361
 
362
362
  class OidcClient(pulumi.CustomResource):
363
+
364
+ pulumi_type = "vault:identity/oidcClient:OidcClient"
365
+
363
366
  @overload
364
367
  def __init__(__self__,
365
368
  resource_name: str,
@@ -250,6 +250,9 @@ class _OidcKeyState:
250
250
 
251
251
 
252
252
  class OidcKey(pulumi.CustomResource):
253
+
254
+ pulumi_type = "vault:identity/oidcKey:OidcKey"
255
+
253
256
  @overload
254
257
  def __init__(__self__,
255
258
  resource_name: str,
@@ -140,6 +140,9 @@ class _OidcKeyAllowedClientIDState:
140
140
 
141
141
 
142
142
  class OidcKeyAllowedClientID(pulumi.CustomResource):
143
+
144
+ pulumi_type = "vault:identity/oidcKeyAllowedClientID:OidcKeyAllowedClientID"
145
+
143
146
  @overload
144
147
  def __init__(__self__,
145
148
  resource_name: str,
@@ -262,6 +262,9 @@ class _OidcProviderState:
262
262
 
263
263
 
264
264
  class OidcProvider(pulumi.CustomResource):
265
+
266
+ pulumi_type = "vault:identity/oidcProvider:OidcProvider"
267
+
265
268
  @overload
266
269
  def __init__(__self__,
267
270
  resource_name: str,
@@ -257,6 +257,9 @@ class _OidcRoleState:
257
257
 
258
258
 
259
259
  class OidcRole(pulumi.CustomResource):
260
+
261
+ pulumi_type = "vault:identity/oidcRole:OidcRole"
262
+
260
263
  @overload
261
264
  def __init__(__self__,
262
265
  resource_name: str,
@@ -174,6 +174,9 @@ class _OidcScopeState:
174
174
 
175
175
 
176
176
  class OidcScope(pulumi.CustomResource):
177
+
178
+ pulumi_type = "vault:identity/oidcScope:OidcScope"
179
+
177
180
  @overload
178
181
  def __init__(__self__,
179
182
  resource_name: str,
@@ -748,6 +748,9 @@ class _AuthBackendState:
748
748
 
749
749
 
750
750
  class AuthBackend(pulumi.CustomResource):
751
+
752
+ pulumi_type = "vault:jwt/authBackend:AuthBackend"
753
+
751
754
  @overload
752
755
  def __init__(__self__,
753
756
  resource_name: str,
@@ -1080,6 +1080,9 @@ class _AuthBackendRoleState:
1080
1080
 
1081
1081
 
1082
1082
  class AuthBackendRole(pulumi.CustomResource):
1083
+
1084
+ pulumi_type = "vault:jwt/authBackendRole:AuthBackendRole"
1085
+
1083
1086
  @overload
1084
1087
  def __init__(__self__,
1085
1088
  resource_name: str,
@@ -469,6 +469,9 @@ class _SecretBackendState:
469
469
 
470
470
 
471
471
  class SecretBackend(pulumi.CustomResource):
472
+
473
+ pulumi_type = "vault:kmip/secretBackend:SecretBackend"
474
+
472
475
  @overload
473
476
  def __init__(__self__,
474
477
  resource_name: str,
@@ -719,6 +719,9 @@ class _SecretRoleState:
719
719
 
720
720
 
721
721
  class SecretRole(pulumi.CustomResource):
722
+
723
+ pulumi_type = "vault:kmip/secretRole:SecretRole"
724
+
722
725
  @overload
723
726
  def __init__(__self__,
724
727
  resource_name: str,
@@ -176,6 +176,9 @@ class _SecretScopeState:
176
176
 
177
177
 
178
178
  class SecretScope(pulumi.CustomResource):
179
+
180
+ pulumi_type = "vault:kmip/secretScope:SecretScope"
181
+
179
182
  @overload
180
183
  def __init__(__self__,
181
184
  resource_name: str,
@@ -365,6 +365,9 @@ class _AuthBackendConfigState:
365
365
 
366
366
 
367
367
  class AuthBackendConfig(pulumi.CustomResource):
368
+
369
+ pulumi_type = "vault:kubernetes/authBackendConfig:AuthBackendConfig"
370
+
368
371
  @overload
369
372
  def __init__(__self__,
370
373
  resource_name: str,
@@ -575,6 +575,9 @@ class _AuthBackendRoleState:
575
575
 
576
576
 
577
577
  class AuthBackendRole(pulumi.CustomResource):
578
+
579
+ pulumi_type = "vault:kubernetes/authBackendRole:AuthBackendRole"
580
+
578
581
  @overload
579
582
  def __init__(__self__,
580
583
  resource_name: str,
@@ -797,6 +797,9 @@ class _SecretBackendState:
797
797
 
798
798
 
799
799
  class SecretBackend(pulumi.CustomResource):
800
+
801
+ pulumi_type = "vault:kubernetes/secretBackend:SecretBackend"
802
+
800
803
  @overload
801
804
  def __init__(__self__,
802
805
  resource_name: str,
@@ -573,6 +573,9 @@ class _SecretBackendRoleState:
573
573
 
574
574
 
575
575
  class SecretBackendRole(pulumi.CustomResource):
576
+
577
+ pulumi_type = "vault:kubernetes/secretBackendRole:SecretBackendRole"
578
+
576
579
  @overload
577
580
  def __init__(__self__,
578
581
  resource_name: str,
pulumi_vault/kv/secret.py CHANGED
@@ -166,6 +166,9 @@ class _SecretState:
166
166
 
167
167
 
168
168
  class Secret(pulumi.CustomResource):
169
+
170
+ pulumi_type = "vault:kv/secret:Secret"
171
+
169
172
  @overload
170
173
  def __init__(__self__,
171
174
  resource_name: str,
@@ -213,6 +213,9 @@ class _SecretBackendV2State:
213
213
 
214
214
 
215
215
  class SecretBackendV2(pulumi.CustomResource):
216
+
217
+ pulumi_type = "vault:kv/secretBackendV2:SecretBackendV2"
218
+
216
219
  @overload
217
220
  def __init__(__self__,
218
221
  resource_name: str,