pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,21 +19,21 @@ __all__ = ['AuthBackendGroupArgs', 'AuthBackendGroup']
20
19
  @pulumi.input_type
21
20
  class AuthBackendGroupArgs:
22
21
  def __init__(__self__, *,
23
- groupname: pulumi.Input[builtins.str],
24
- backend: Optional[pulumi.Input[builtins.str]] = None,
25
- namespace: Optional[pulumi.Input[builtins.str]] = None,
26
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
22
+ groupname: pulumi.Input[_builtins.str],
23
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
24
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
25
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
27
26
  """
28
27
  The set of arguments for constructing a AuthBackendGroup resource.
29
- :param pulumi.Input[builtins.str] groupname: The LDAP groupname
30
- :param pulumi.Input[builtins.str] backend: Path to the authentication backend
28
+ :param pulumi.Input[_builtins.str] groupname: The LDAP groupname
29
+ :param pulumi.Input[_builtins.str] backend: Path to the authentication backend
31
30
 
32
31
  For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
33
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
32
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
34
33
  The value should not contain leading or trailing forward slashes.
35
34
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
36
35
  *Available only for Vault Enterprise*.
37
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Policies which should be granted to members of the group
36
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: Policies which should be granted to members of the group
38
37
  """
39
38
  pulumi.set(__self__, "groupname", groupname)
40
39
  if backend is not None:
@@ -44,21 +43,21 @@ class AuthBackendGroupArgs:
44
43
  if policies is not None:
45
44
  pulumi.set(__self__, "policies", policies)
46
45
 
47
- @property
46
+ @_builtins.property
48
47
  @pulumi.getter
49
- def groupname(self) -> pulumi.Input[builtins.str]:
48
+ def groupname(self) -> pulumi.Input[_builtins.str]:
50
49
  """
51
50
  The LDAP groupname
52
51
  """
53
52
  return pulumi.get(self, "groupname")
54
53
 
55
54
  @groupname.setter
56
- def groupname(self, value: pulumi.Input[builtins.str]):
55
+ def groupname(self, value: pulumi.Input[_builtins.str]):
57
56
  pulumi.set(self, "groupname", value)
58
57
 
59
- @property
58
+ @_builtins.property
60
59
  @pulumi.getter
61
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
60
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
62
61
  """
63
62
  Path to the authentication backend
64
63
 
@@ -67,12 +66,12 @@ class AuthBackendGroupArgs:
67
66
  return pulumi.get(self, "backend")
68
67
 
69
68
  @backend.setter
70
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
69
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
71
70
  pulumi.set(self, "backend", value)
72
71
 
73
- @property
72
+ @_builtins.property
74
73
  @pulumi.getter
75
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
74
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
76
75
  """
77
76
  The namespace to provision the resource in.
78
77
  The value should not contain leading or trailing forward slashes.
@@ -82,40 +81,40 @@ class AuthBackendGroupArgs:
82
81
  return pulumi.get(self, "namespace")
83
82
 
84
83
  @namespace.setter
85
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
84
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
86
85
  pulumi.set(self, "namespace", value)
87
86
 
88
- @property
87
+ @_builtins.property
89
88
  @pulumi.getter
90
- def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
89
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
91
90
  """
92
91
  Policies which should be granted to members of the group
93
92
  """
94
93
  return pulumi.get(self, "policies")
95
94
 
96
95
  @policies.setter
97
- def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
96
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
98
97
  pulumi.set(self, "policies", value)
99
98
 
100
99
 
101
100
  @pulumi.input_type
102
101
  class _AuthBackendGroupState:
103
102
  def __init__(__self__, *,
104
- backend: Optional[pulumi.Input[builtins.str]] = None,
105
- groupname: Optional[pulumi.Input[builtins.str]] = None,
106
- namespace: Optional[pulumi.Input[builtins.str]] = None,
107
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
103
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
104
+ groupname: Optional[pulumi.Input[_builtins.str]] = None,
105
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
106
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
108
107
  """
109
108
  Input properties used for looking up and filtering AuthBackendGroup resources.
110
- :param pulumi.Input[builtins.str] backend: Path to the authentication backend
109
+ :param pulumi.Input[_builtins.str] backend: Path to the authentication backend
111
110
 
112
111
  For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
113
- :param pulumi.Input[builtins.str] groupname: The LDAP groupname
114
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
112
+ :param pulumi.Input[_builtins.str] groupname: The LDAP groupname
113
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
115
114
  The value should not contain leading or trailing forward slashes.
116
115
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
117
116
  *Available only for Vault Enterprise*.
118
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Policies which should be granted to members of the group
117
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: Policies which should be granted to members of the group
119
118
  """
120
119
  if backend is not None:
121
120
  pulumi.set(__self__, "backend", backend)
@@ -126,9 +125,9 @@ class _AuthBackendGroupState:
126
125
  if policies is not None:
127
126
  pulumi.set(__self__, "policies", policies)
128
127
 
129
- @property
128
+ @_builtins.property
130
129
  @pulumi.getter
131
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
130
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
132
131
  """
133
132
  Path to the authentication backend
134
133
 
@@ -137,24 +136,24 @@ class _AuthBackendGroupState:
137
136
  return pulumi.get(self, "backend")
138
137
 
139
138
  @backend.setter
140
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
139
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
141
140
  pulumi.set(self, "backend", value)
142
141
 
143
- @property
142
+ @_builtins.property
144
143
  @pulumi.getter
145
- def groupname(self) -> Optional[pulumi.Input[builtins.str]]:
144
+ def groupname(self) -> Optional[pulumi.Input[_builtins.str]]:
146
145
  """
147
146
  The LDAP groupname
148
147
  """
149
148
  return pulumi.get(self, "groupname")
150
149
 
151
150
  @groupname.setter
152
- def groupname(self, value: Optional[pulumi.Input[builtins.str]]):
151
+ def groupname(self, value: Optional[pulumi.Input[_builtins.str]]):
153
152
  pulumi.set(self, "groupname", value)
154
153
 
155
- @property
154
+ @_builtins.property
156
155
  @pulumi.getter
157
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
156
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
158
157
  """
159
158
  The namespace to provision the resource in.
160
159
  The value should not contain leading or trailing forward slashes.
@@ -164,19 +163,19 @@ class _AuthBackendGroupState:
164
163
  return pulumi.get(self, "namespace")
165
164
 
166
165
  @namespace.setter
167
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
166
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
168
167
  pulumi.set(self, "namespace", value)
169
168
 
170
- @property
169
+ @_builtins.property
171
170
  @pulumi.getter
172
- def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
171
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
173
172
  """
174
173
  Policies which should be granted to members of the group
175
174
  """
176
175
  return pulumi.get(self, "policies")
177
176
 
178
177
  @policies.setter
179
- def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
178
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
180
179
  pulumi.set(self, "policies", value)
181
180
 
182
181
 
@@ -186,10 +185,10 @@ class AuthBackendGroup(pulumi.CustomResource):
186
185
  def __init__(__self__,
187
186
  resource_name: str,
188
187
  opts: Optional[pulumi.ResourceOptions] = None,
189
- backend: Optional[pulumi.Input[builtins.str]] = None,
190
- groupname: Optional[pulumi.Input[builtins.str]] = None,
191
- namespace: Optional[pulumi.Input[builtins.str]] = None,
192
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
188
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
189
+ groupname: Optional[pulumi.Input[_builtins.str]] = None,
190
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
191
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
193
192
  __props__=None):
194
193
  """
195
194
  Provides a resource to create a group in an [LDAP auth backend within Vault](https://www.vaultproject.io/docs/auth/ldap.html).
@@ -225,15 +224,15 @@ class AuthBackendGroup(pulumi.CustomResource):
225
224
 
226
225
  :param str resource_name: The name of the resource.
227
226
  :param pulumi.ResourceOptions opts: Options for the resource.
228
- :param pulumi.Input[builtins.str] backend: Path to the authentication backend
227
+ :param pulumi.Input[_builtins.str] backend: Path to the authentication backend
229
228
 
230
229
  For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
231
- :param pulumi.Input[builtins.str] groupname: The LDAP groupname
232
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
230
+ :param pulumi.Input[_builtins.str] groupname: The LDAP groupname
231
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
233
232
  The value should not contain leading or trailing forward slashes.
234
233
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
235
234
  *Available only for Vault Enterprise*.
236
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Policies which should be granted to members of the group
235
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: Policies which should be granted to members of the group
237
236
  """
238
237
  ...
239
238
  @overload
@@ -288,10 +287,10 @@ class AuthBackendGroup(pulumi.CustomResource):
288
287
  def _internal_init(__self__,
289
288
  resource_name: str,
290
289
  opts: Optional[pulumi.ResourceOptions] = None,
291
- backend: Optional[pulumi.Input[builtins.str]] = None,
292
- groupname: Optional[pulumi.Input[builtins.str]] = None,
293
- namespace: Optional[pulumi.Input[builtins.str]] = None,
294
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
290
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
291
+ groupname: Optional[pulumi.Input[_builtins.str]] = None,
292
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
293
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
295
294
  __props__=None):
296
295
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
297
296
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -317,10 +316,10 @@ class AuthBackendGroup(pulumi.CustomResource):
317
316
  def get(resource_name: str,
318
317
  id: pulumi.Input[str],
319
318
  opts: Optional[pulumi.ResourceOptions] = None,
320
- backend: Optional[pulumi.Input[builtins.str]] = None,
321
- groupname: Optional[pulumi.Input[builtins.str]] = None,
322
- namespace: Optional[pulumi.Input[builtins.str]] = None,
323
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None) -> 'AuthBackendGroup':
319
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
320
+ groupname: Optional[pulumi.Input[_builtins.str]] = None,
321
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
322
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None) -> 'AuthBackendGroup':
324
323
  """
325
324
  Get an existing AuthBackendGroup resource's state with the given name, id, and optional extra
326
325
  properties used to qualify the lookup.
@@ -328,15 +327,15 @@ class AuthBackendGroup(pulumi.CustomResource):
328
327
  :param str resource_name: The unique name of the resulting resource.
329
328
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
330
329
  :param pulumi.ResourceOptions opts: Options for the resource.
331
- :param pulumi.Input[builtins.str] backend: Path to the authentication backend
330
+ :param pulumi.Input[_builtins.str] backend: Path to the authentication backend
332
331
 
333
332
  For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
334
- :param pulumi.Input[builtins.str] groupname: The LDAP groupname
335
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
333
+ :param pulumi.Input[_builtins.str] groupname: The LDAP groupname
334
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
336
335
  The value should not contain leading or trailing forward slashes.
337
336
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
338
337
  *Available only for Vault Enterprise*.
339
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Policies which should be granted to members of the group
338
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: Policies which should be granted to members of the group
340
339
  """
341
340
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
342
341
 
@@ -348,9 +347,9 @@ class AuthBackendGroup(pulumi.CustomResource):
348
347
  __props__.__dict__["policies"] = policies
349
348
  return AuthBackendGroup(resource_name, opts=opts, __props__=__props__)
350
349
 
351
- @property
350
+ @_builtins.property
352
351
  @pulumi.getter
353
- def backend(self) -> pulumi.Output[Optional[builtins.str]]:
352
+ def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
354
353
  """
355
354
  Path to the authentication backend
356
355
 
@@ -358,17 +357,17 @@ class AuthBackendGroup(pulumi.CustomResource):
358
357
  """
359
358
  return pulumi.get(self, "backend")
360
359
 
361
- @property
360
+ @_builtins.property
362
361
  @pulumi.getter
363
- def groupname(self) -> pulumi.Output[builtins.str]:
362
+ def groupname(self) -> pulumi.Output[_builtins.str]:
364
363
  """
365
364
  The LDAP groupname
366
365
  """
367
366
  return pulumi.get(self, "groupname")
368
367
 
369
- @property
368
+ @_builtins.property
370
369
  @pulumi.getter
371
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
370
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
372
371
  """
373
372
  The namespace to provision the resource in.
374
373
  The value should not contain leading or trailing forward slashes.
@@ -377,9 +376,9 @@ class AuthBackendGroup(pulumi.CustomResource):
377
376
  """
378
377
  return pulumi.get(self, "namespace")
379
378
 
380
- @property
379
+ @_builtins.property
381
380
  @pulumi.getter
382
- def policies(self) -> pulumi.Output[Sequence[builtins.str]]:
381
+ def policies(self) -> pulumi.Output[Sequence[_builtins.str]]:
383
382
  """
384
383
  Policies which should be granted to members of the group
385
384
  """