pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (269) hide show
  1. pulumi_vault/__init__.py +19 -1
  2. pulumi_vault/_inputs.py +873 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +1016 -439
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +1057 -285
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +887 -256
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +426 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +878 -336
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +400 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +1006 -227
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +431 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +732 -693
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +380 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +909 -271
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/oci_auth_backend.py +683 -0
  168. pulumi_vault/oci_auth_backend_role.py +798 -0
  169. pulumi_vault/okta/__init__.py +1 -1
  170. pulumi_vault/okta/_inputs.py +31 -32
  171. pulumi_vault/okta/auth_backend.py +305 -306
  172. pulumi_vault/okta/auth_backend_group.py +69 -70
  173. pulumi_vault/okta/auth_backend_user.py +86 -87
  174. pulumi_vault/okta/outputs.py +21 -22
  175. pulumi_vault/outputs.py +234 -82
  176. pulumi_vault/pkisecret/__init__.py +1 -1
  177. pulumi_vault/pkisecret/_inputs.py +55 -56
  178. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  179. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  180. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  181. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  182. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  183. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  184. pulumi_vault/pkisecret/backend_config_scep.py +205 -159
  185. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  186. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  187. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  188. pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
  189. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  190. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  191. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  192. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  193. pulumi_vault/pkisecret/outputs.py +61 -62
  194. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  195. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  196. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  197. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  198. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  199. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  200. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  201. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  202. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  203. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  204. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  205. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  206. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  207. pulumi_vault/plugin.py +154 -155
  208. pulumi_vault/plugin_pinned_version.py +52 -53
  209. pulumi_vault/policy.py +52 -53
  210. pulumi_vault/provider.py +160 -161
  211. pulumi_vault/pulumi-plugin.json +1 -1
  212. pulumi_vault/quota_lease_count.py +103 -104
  213. pulumi_vault/quota_rate_limit.py +171 -172
  214. pulumi_vault/rabbitmq/__init__.py +1 -1
  215. pulumi_vault/rabbitmq/_inputs.py +50 -51
  216. pulumi_vault/rabbitmq/outputs.py +34 -35
  217. pulumi_vault/rabbitmq/secret_backend.py +902 -231
  218. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  219. pulumi_vault/raft_autopilot.py +137 -138
  220. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  221. pulumi_vault/rgp_policy.py +69 -70
  222. pulumi_vault/saml/__init__.py +1 -1
  223. pulumi_vault/saml/auth_backend.py +188 -189
  224. pulumi_vault/saml/auth_backend_role.py +290 -291
  225. pulumi_vault/scep_auth_backend_role.py +252 -253
  226. pulumi_vault/secrets/__init__.py +1 -1
  227. pulumi_vault/secrets/_inputs.py +19 -20
  228. pulumi_vault/secrets/outputs.py +13 -14
  229. pulumi_vault/secrets/sync_association.py +88 -89
  230. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  231. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  232. pulumi_vault/secrets/sync_config.py +52 -53
  233. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  234. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  235. pulumi_vault/secrets/sync_github_apps.py +78 -79
  236. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  237. pulumi_vault/ssh/__init__.py +1 -1
  238. pulumi_vault/ssh/_inputs.py +13 -14
  239. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  240. pulumi_vault/ssh/outputs.py +9 -10
  241. pulumi_vault/ssh/secret_backend_ca.py +217 -124
  242. pulumi_vault/ssh/secret_backend_role.py +446 -447
  243. pulumi_vault/terraformcloud/__init__.py +1 -1
  244. pulumi_vault/terraformcloud/secret_backend.py +833 -155
  245. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  246. pulumi_vault/terraformcloud/secret_role.py +117 -118
  247. pulumi_vault/token.py +301 -302
  248. pulumi_vault/tokenauth/__init__.py +1 -1
  249. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  250. pulumi_vault/transform/__init__.py +1 -1
  251. pulumi_vault/transform/alphabet.py +69 -70
  252. pulumi_vault/transform/get_decode.py +57 -58
  253. pulumi_vault/transform/get_encode.py +57 -58
  254. pulumi_vault/transform/role.py +69 -70
  255. pulumi_vault/transform/template.py +137 -138
  256. pulumi_vault/transform/transformation.py +171 -172
  257. pulumi_vault/transit/__init__.py +1 -1
  258. pulumi_vault/transit/get_cmac.py +47 -48
  259. pulumi_vault/transit/get_decrypt.py +25 -26
  260. pulumi_vault/transit/get_encrypt.py +29 -30
  261. pulumi_vault/transit/get_sign.py +71 -72
  262. pulumi_vault/transit/get_verify.py +83 -84
  263. pulumi_vault/transit/secret_backend_key.py +377 -350
  264. pulumi_vault/transit/secret_cache_config.py +52 -53
  265. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
  266. pulumi_vault-7.2.0.dist-info/RECORD +270 -0
  267. pulumi_vault-7.1.0.dist-info/RECORD +0 -268
  268. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
  269. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,19 +19,19 @@ __all__ = ['AuthBackendGroupInitArgs', 'AuthBackendGroup']
20
19
  @pulumi.input_type
21
20
  class AuthBackendGroupInitArgs:
22
21
  def __init__(__self__, *,
23
- group_name: pulumi.Input[builtins.str],
24
- path: pulumi.Input[builtins.str],
25
- namespace: Optional[pulumi.Input[builtins.str]] = None,
26
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
22
+ group_name: pulumi.Input[_builtins.str],
23
+ path: pulumi.Input[_builtins.str],
24
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
25
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
27
26
  """
28
27
  The set of arguments for constructing a AuthBackendGroup resource.
29
- :param pulumi.Input[builtins.str] group_name: Name of the group within the Okta
30
- :param pulumi.Input[builtins.str] path: The path where the Okta auth backend is mounted
31
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
28
+ :param pulumi.Input[_builtins.str] group_name: Name of the group within the Okta
29
+ :param pulumi.Input[_builtins.str] path: The path where the Okta auth backend is mounted
30
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
32
31
  The value should not contain leading or trailing forward slashes.
33
32
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
34
33
  *Available only for Vault Enterprise*.
35
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Vault policies to associate with this group
34
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: Vault policies to associate with this group
36
35
  """
37
36
  pulumi.set(__self__, "group_name", group_name)
38
37
  pulumi.set(__self__, "path", path)
@@ -41,33 +40,33 @@ class AuthBackendGroupInitArgs:
41
40
  if policies is not None:
42
41
  pulumi.set(__self__, "policies", policies)
43
42
 
44
- @property
43
+ @_builtins.property
45
44
  @pulumi.getter(name="groupName")
46
- def group_name(self) -> pulumi.Input[builtins.str]:
45
+ def group_name(self) -> pulumi.Input[_builtins.str]:
47
46
  """
48
47
  Name of the group within the Okta
49
48
  """
50
49
  return pulumi.get(self, "group_name")
51
50
 
52
51
  @group_name.setter
53
- def group_name(self, value: pulumi.Input[builtins.str]):
52
+ def group_name(self, value: pulumi.Input[_builtins.str]):
54
53
  pulumi.set(self, "group_name", value)
55
54
 
56
- @property
55
+ @_builtins.property
57
56
  @pulumi.getter
58
- def path(self) -> pulumi.Input[builtins.str]:
57
+ def path(self) -> pulumi.Input[_builtins.str]:
59
58
  """
60
59
  The path where the Okta auth backend is mounted
61
60
  """
62
61
  return pulumi.get(self, "path")
63
62
 
64
63
  @path.setter
65
- def path(self, value: pulumi.Input[builtins.str]):
64
+ def path(self, value: pulumi.Input[_builtins.str]):
66
65
  pulumi.set(self, "path", value)
67
66
 
68
- @property
67
+ @_builtins.property
69
68
  @pulumi.getter
70
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
69
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
71
70
  """
72
71
  The namespace to provision the resource in.
73
72
  The value should not contain leading or trailing forward slashes.
@@ -77,38 +76,38 @@ class AuthBackendGroupInitArgs:
77
76
  return pulumi.get(self, "namespace")
78
77
 
79
78
  @namespace.setter
80
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
79
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
81
80
  pulumi.set(self, "namespace", value)
82
81
 
83
- @property
82
+ @_builtins.property
84
83
  @pulumi.getter
85
- def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
84
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
86
85
  """
87
86
  Vault policies to associate with this group
88
87
  """
89
88
  return pulumi.get(self, "policies")
90
89
 
91
90
  @policies.setter
92
- def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
91
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
93
92
  pulumi.set(self, "policies", value)
94
93
 
95
94
 
96
95
  @pulumi.input_type
97
96
  class _AuthBackendGroupState:
98
97
  def __init__(__self__, *,
99
- group_name: Optional[pulumi.Input[builtins.str]] = None,
100
- namespace: Optional[pulumi.Input[builtins.str]] = None,
101
- path: Optional[pulumi.Input[builtins.str]] = None,
102
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
98
+ group_name: Optional[pulumi.Input[_builtins.str]] = None,
99
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
100
+ path: Optional[pulumi.Input[_builtins.str]] = None,
101
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
103
102
  """
104
103
  Input properties used for looking up and filtering AuthBackendGroup resources.
105
- :param pulumi.Input[builtins.str] group_name: Name of the group within the Okta
106
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
104
+ :param pulumi.Input[_builtins.str] group_name: Name of the group within the Okta
105
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
107
106
  The value should not contain leading or trailing forward slashes.
108
107
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
109
108
  *Available only for Vault Enterprise*.
110
- :param pulumi.Input[builtins.str] path: The path where the Okta auth backend is mounted
111
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Vault policies to associate with this group
109
+ :param pulumi.Input[_builtins.str] path: The path where the Okta auth backend is mounted
110
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: Vault policies to associate with this group
112
111
  """
113
112
  if group_name is not None:
114
113
  pulumi.set(__self__, "group_name", group_name)
@@ -119,21 +118,21 @@ class _AuthBackendGroupState:
119
118
  if policies is not None:
120
119
  pulumi.set(__self__, "policies", policies)
121
120
 
122
- @property
121
+ @_builtins.property
123
122
  @pulumi.getter(name="groupName")
124
- def group_name(self) -> Optional[pulumi.Input[builtins.str]]:
123
+ def group_name(self) -> Optional[pulumi.Input[_builtins.str]]:
125
124
  """
126
125
  Name of the group within the Okta
127
126
  """
128
127
  return pulumi.get(self, "group_name")
129
128
 
130
129
  @group_name.setter
131
- def group_name(self, value: Optional[pulumi.Input[builtins.str]]):
130
+ def group_name(self, value: Optional[pulumi.Input[_builtins.str]]):
132
131
  pulumi.set(self, "group_name", value)
133
132
 
134
- @property
133
+ @_builtins.property
135
134
  @pulumi.getter
136
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
135
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
137
136
  """
138
137
  The namespace to provision the resource in.
139
138
  The value should not contain leading or trailing forward slashes.
@@ -143,31 +142,31 @@ class _AuthBackendGroupState:
143
142
  return pulumi.get(self, "namespace")
144
143
 
145
144
  @namespace.setter
146
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
145
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
147
146
  pulumi.set(self, "namespace", value)
148
147
 
149
- @property
148
+ @_builtins.property
150
149
  @pulumi.getter
151
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
150
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
152
151
  """
153
152
  The path where the Okta auth backend is mounted
154
153
  """
155
154
  return pulumi.get(self, "path")
156
155
 
157
156
  @path.setter
158
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
157
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
159
158
  pulumi.set(self, "path", value)
160
159
 
161
- @property
160
+ @_builtins.property
162
161
  @pulumi.getter
163
- def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
162
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
164
163
  """
165
164
  Vault policies to associate with this group
166
165
  """
167
166
  return pulumi.get(self, "policies")
168
167
 
169
168
  @policies.setter
170
- def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
169
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
171
170
  pulumi.set(self, "policies", value)
172
171
 
173
172
 
@@ -177,10 +176,10 @@ class AuthBackendGroup(pulumi.CustomResource):
177
176
  def __init__(__self__,
178
177
  resource_name: str,
179
178
  opts: Optional[pulumi.ResourceOptions] = None,
180
- group_name: Optional[pulumi.Input[builtins.str]] = None,
181
- namespace: Optional[pulumi.Input[builtins.str]] = None,
182
- path: Optional[pulumi.Input[builtins.str]] = None,
183
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
179
+ group_name: Optional[pulumi.Input[_builtins.str]] = None,
180
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
181
+ path: Optional[pulumi.Input[_builtins.str]] = None,
182
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
184
183
  __props__=None):
185
184
  """
186
185
  Provides a resource to create a group in an
@@ -214,13 +213,13 @@ class AuthBackendGroup(pulumi.CustomResource):
214
213
 
215
214
  :param str resource_name: The name of the resource.
216
215
  :param pulumi.ResourceOptions opts: Options for the resource.
217
- :param pulumi.Input[builtins.str] group_name: Name of the group within the Okta
218
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
216
+ :param pulumi.Input[_builtins.str] group_name: Name of the group within the Okta
217
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
219
218
  The value should not contain leading or trailing forward slashes.
220
219
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
221
220
  *Available only for Vault Enterprise*.
222
- :param pulumi.Input[builtins.str] path: The path where the Okta auth backend is mounted
223
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Vault policies to associate with this group
221
+ :param pulumi.Input[_builtins.str] path: The path where the Okta auth backend is mounted
222
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: Vault policies to associate with this group
224
223
  """
225
224
  ...
226
225
  @overload
@@ -273,10 +272,10 @@ class AuthBackendGroup(pulumi.CustomResource):
273
272
  def _internal_init(__self__,
274
273
  resource_name: str,
275
274
  opts: Optional[pulumi.ResourceOptions] = None,
276
- group_name: Optional[pulumi.Input[builtins.str]] = None,
277
- namespace: Optional[pulumi.Input[builtins.str]] = None,
278
- path: Optional[pulumi.Input[builtins.str]] = None,
279
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
275
+ group_name: Optional[pulumi.Input[_builtins.str]] = None,
276
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
277
+ path: Optional[pulumi.Input[_builtins.str]] = None,
278
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
280
279
  __props__=None):
281
280
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
282
281
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -304,10 +303,10 @@ class AuthBackendGroup(pulumi.CustomResource):
304
303
  def get(resource_name: str,
305
304
  id: pulumi.Input[str],
306
305
  opts: Optional[pulumi.ResourceOptions] = None,
307
- group_name: Optional[pulumi.Input[builtins.str]] = None,
308
- namespace: Optional[pulumi.Input[builtins.str]] = None,
309
- path: Optional[pulumi.Input[builtins.str]] = None,
310
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None) -> 'AuthBackendGroup':
306
+ group_name: Optional[pulumi.Input[_builtins.str]] = None,
307
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
308
+ path: Optional[pulumi.Input[_builtins.str]] = None,
309
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None) -> 'AuthBackendGroup':
311
310
  """
312
311
  Get an existing AuthBackendGroup resource's state with the given name, id, and optional extra
313
312
  properties used to qualify the lookup.
@@ -315,13 +314,13 @@ class AuthBackendGroup(pulumi.CustomResource):
315
314
  :param str resource_name: The unique name of the resulting resource.
316
315
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
317
316
  :param pulumi.ResourceOptions opts: Options for the resource.
318
- :param pulumi.Input[builtins.str] group_name: Name of the group within the Okta
319
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
317
+ :param pulumi.Input[_builtins.str] group_name: Name of the group within the Okta
318
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
320
319
  The value should not contain leading or trailing forward slashes.
321
320
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
322
321
  *Available only for Vault Enterprise*.
323
- :param pulumi.Input[builtins.str] path: The path where the Okta auth backend is mounted
324
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Vault policies to associate with this group
322
+ :param pulumi.Input[_builtins.str] path: The path where the Okta auth backend is mounted
323
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: Vault policies to associate with this group
325
324
  """
326
325
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
327
326
 
@@ -333,17 +332,17 @@ class AuthBackendGroup(pulumi.CustomResource):
333
332
  __props__.__dict__["policies"] = policies
334
333
  return AuthBackendGroup(resource_name, opts=opts, __props__=__props__)
335
334
 
336
- @property
335
+ @_builtins.property
337
336
  @pulumi.getter(name="groupName")
338
- def group_name(self) -> pulumi.Output[builtins.str]:
337
+ def group_name(self) -> pulumi.Output[_builtins.str]:
339
338
  """
340
339
  Name of the group within the Okta
341
340
  """
342
341
  return pulumi.get(self, "group_name")
343
342
 
344
- @property
343
+ @_builtins.property
345
344
  @pulumi.getter
346
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
345
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
347
346
  """
348
347
  The namespace to provision the resource in.
349
348
  The value should not contain leading or trailing forward slashes.
@@ -352,17 +351,17 @@ class AuthBackendGroup(pulumi.CustomResource):
352
351
  """
353
352
  return pulumi.get(self, "namespace")
354
353
 
355
- @property
354
+ @_builtins.property
356
355
  @pulumi.getter
357
- def path(self) -> pulumi.Output[builtins.str]:
356
+ def path(self) -> pulumi.Output[_builtins.str]:
358
357
  """
359
358
  The path where the Okta auth backend is mounted
360
359
  """
361
360
  return pulumi.get(self, "path")
362
361
 
363
- @property
362
+ @_builtins.property
364
363
  @pulumi.getter
365
- def policies(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
364
+ def policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
366
365
  """
367
366
  Vault policies to associate with this group
368
367
  """