pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,26 +19,26 @@ __all__ = ['NomadSecretRoleArgs', 'NomadSecretRole']
20
19
  @pulumi.input_type
21
20
  class NomadSecretRoleArgs:
22
21
  def __init__(__self__, *,
23
- backend: pulumi.Input[builtins.str],
24
- role: pulumi.Input[builtins.str],
25
- global_: Optional[pulumi.Input[builtins.bool]] = None,
26
- namespace: Optional[pulumi.Input[builtins.str]] = None,
27
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
28
- type: Optional[pulumi.Input[builtins.str]] = None):
22
+ backend: pulumi.Input[_builtins.str],
23
+ role: pulumi.Input[_builtins.str],
24
+ global_: Optional[pulumi.Input[_builtins.bool]] = None,
25
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
26
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
+ type: Optional[pulumi.Input[_builtins.str]] = None):
29
28
  """
30
29
  The set of arguments for constructing a NomadSecretRole resource.
31
- :param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at.
32
- :param pulumi.Input[builtins.str] role: The name to identify this role within the backend.
30
+ :param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at.
31
+ :param pulumi.Input[_builtins.str] role: The name to identify this role within the backend.
33
32
  Must be unique within the backend.
34
- :param pulumi.Input[builtins.bool] global_: Specifies if the generated token should be global. Defaults to
33
+ :param pulumi.Input[_builtins.bool] global_: Specifies if the generated token should be global. Defaults to
35
34
  false.
36
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
35
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
37
36
  The value should not contain leading or trailing forward slashes.
38
37
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
39
38
  *Available only for Vault Enterprise*.
40
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: List of policies attached to the generated token. This setting is only used
39
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: List of policies attached to the generated token. This setting is only used
41
40
  when `type` is 'client'.
42
- :param pulumi.Input[builtins.str] type: Specifies the type of token to create when using this role. Valid
41
+ :param pulumi.Input[_builtins.str] type: Specifies the type of token to create when using this role. Valid
43
42
  settings are 'client' and 'management'. Defaults to 'client'.
44
43
  """
45
44
  pulumi.set(__self__, "backend", backend)
@@ -53,21 +52,21 @@ class NomadSecretRoleArgs:
53
52
  if type is not None:
54
53
  pulumi.set(__self__, "type", type)
55
54
 
56
- @property
55
+ @_builtins.property
57
56
  @pulumi.getter
58
- def backend(self) -> pulumi.Input[builtins.str]:
57
+ def backend(self) -> pulumi.Input[_builtins.str]:
59
58
  """
60
59
  The unique path this backend should be mounted at.
61
60
  """
62
61
  return pulumi.get(self, "backend")
63
62
 
64
63
  @backend.setter
65
- def backend(self, value: pulumi.Input[builtins.str]):
64
+ def backend(self, value: pulumi.Input[_builtins.str]):
66
65
  pulumi.set(self, "backend", value)
67
66
 
68
- @property
67
+ @_builtins.property
69
68
  @pulumi.getter
70
- def role(self) -> pulumi.Input[builtins.str]:
69
+ def role(self) -> pulumi.Input[_builtins.str]:
71
70
  """
72
71
  The name to identify this role within the backend.
73
72
  Must be unique within the backend.
@@ -75,12 +74,12 @@ class NomadSecretRoleArgs:
75
74
  return pulumi.get(self, "role")
76
75
 
77
76
  @role.setter
78
- def role(self, value: pulumi.Input[builtins.str]):
77
+ def role(self, value: pulumi.Input[_builtins.str]):
79
78
  pulumi.set(self, "role", value)
80
79
 
81
- @property
80
+ @_builtins.property
82
81
  @pulumi.getter(name="global")
83
- def global_(self) -> Optional[pulumi.Input[builtins.bool]]:
82
+ def global_(self) -> Optional[pulumi.Input[_builtins.bool]]:
84
83
  """
85
84
  Specifies if the generated token should be global. Defaults to
86
85
  false.
@@ -88,12 +87,12 @@ class NomadSecretRoleArgs:
88
87
  return pulumi.get(self, "global_")
89
88
 
90
89
  @global_.setter
91
- def global_(self, value: Optional[pulumi.Input[builtins.bool]]):
90
+ def global_(self, value: Optional[pulumi.Input[_builtins.bool]]):
92
91
  pulumi.set(self, "global_", value)
93
92
 
94
- @property
93
+ @_builtins.property
95
94
  @pulumi.getter
96
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
95
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
97
96
  """
98
97
  The namespace to provision the resource in.
99
98
  The value should not contain leading or trailing forward slashes.
@@ -103,12 +102,12 @@ class NomadSecretRoleArgs:
103
102
  return pulumi.get(self, "namespace")
104
103
 
105
104
  @namespace.setter
106
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
105
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
107
106
  pulumi.set(self, "namespace", value)
108
107
 
109
- @property
108
+ @_builtins.property
110
109
  @pulumi.getter
111
- def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
110
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
112
111
  """
113
112
  List of policies attached to the generated token. This setting is only used
114
113
  when `type` is 'client'.
@@ -116,12 +115,12 @@ class NomadSecretRoleArgs:
116
115
  return pulumi.get(self, "policies")
117
116
 
118
117
  @policies.setter
119
- def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
118
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
120
119
  pulumi.set(self, "policies", value)
121
120
 
122
- @property
121
+ @_builtins.property
123
122
  @pulumi.getter
124
- def type(self) -> Optional[pulumi.Input[builtins.str]]:
123
+ def type(self) -> Optional[pulumi.Input[_builtins.str]]:
125
124
  """
126
125
  Specifies the type of token to create when using this role. Valid
127
126
  settings are 'client' and 'management'. Defaults to 'client'.
@@ -129,33 +128,33 @@ class NomadSecretRoleArgs:
129
128
  return pulumi.get(self, "type")
130
129
 
131
130
  @type.setter
132
- def type(self, value: Optional[pulumi.Input[builtins.str]]):
131
+ def type(self, value: Optional[pulumi.Input[_builtins.str]]):
133
132
  pulumi.set(self, "type", value)
134
133
 
135
134
 
136
135
  @pulumi.input_type
137
136
  class _NomadSecretRoleState:
138
137
  def __init__(__self__, *,
139
- backend: Optional[pulumi.Input[builtins.str]] = None,
140
- global_: Optional[pulumi.Input[builtins.bool]] = None,
141
- namespace: Optional[pulumi.Input[builtins.str]] = None,
142
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
143
- role: Optional[pulumi.Input[builtins.str]] = None,
144
- type: Optional[pulumi.Input[builtins.str]] = None):
138
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
139
+ global_: Optional[pulumi.Input[_builtins.bool]] = None,
140
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
141
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
142
+ role: Optional[pulumi.Input[_builtins.str]] = None,
143
+ type: Optional[pulumi.Input[_builtins.str]] = None):
145
144
  """
146
145
  Input properties used for looking up and filtering NomadSecretRole resources.
147
- :param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at.
148
- :param pulumi.Input[builtins.bool] global_: Specifies if the generated token should be global. Defaults to
146
+ :param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at.
147
+ :param pulumi.Input[_builtins.bool] global_: Specifies if the generated token should be global. Defaults to
149
148
  false.
150
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
149
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
151
150
  The value should not contain leading or trailing forward slashes.
152
151
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
153
152
  *Available only for Vault Enterprise*.
154
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: List of policies attached to the generated token. This setting is only used
153
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: List of policies attached to the generated token. This setting is only used
155
154
  when `type` is 'client'.
156
- :param pulumi.Input[builtins.str] role: The name to identify this role within the backend.
155
+ :param pulumi.Input[_builtins.str] role: The name to identify this role within the backend.
157
156
  Must be unique within the backend.
158
- :param pulumi.Input[builtins.str] type: Specifies the type of token to create when using this role. Valid
157
+ :param pulumi.Input[_builtins.str] type: Specifies the type of token to create when using this role. Valid
159
158
  settings are 'client' and 'management'. Defaults to 'client'.
160
159
  """
161
160
  if backend is not None:
@@ -171,21 +170,21 @@ class _NomadSecretRoleState:
171
170
  if type is not None:
172
171
  pulumi.set(__self__, "type", type)
173
172
 
174
- @property
173
+ @_builtins.property
175
174
  @pulumi.getter
176
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
175
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
177
176
  """
178
177
  The unique path this backend should be mounted at.
179
178
  """
180
179
  return pulumi.get(self, "backend")
181
180
 
182
181
  @backend.setter
183
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
182
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
184
183
  pulumi.set(self, "backend", value)
185
184
 
186
- @property
185
+ @_builtins.property
187
186
  @pulumi.getter(name="global")
188
- def global_(self) -> Optional[pulumi.Input[builtins.bool]]:
187
+ def global_(self) -> Optional[pulumi.Input[_builtins.bool]]:
189
188
  """
190
189
  Specifies if the generated token should be global. Defaults to
191
190
  false.
@@ -193,12 +192,12 @@ class _NomadSecretRoleState:
193
192
  return pulumi.get(self, "global_")
194
193
 
195
194
  @global_.setter
196
- def global_(self, value: Optional[pulumi.Input[builtins.bool]]):
195
+ def global_(self, value: Optional[pulumi.Input[_builtins.bool]]):
197
196
  pulumi.set(self, "global_", value)
198
197
 
199
- @property
198
+ @_builtins.property
200
199
  @pulumi.getter
201
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
200
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
202
201
  """
203
202
  The namespace to provision the resource in.
204
203
  The value should not contain leading or trailing forward slashes.
@@ -208,12 +207,12 @@ class _NomadSecretRoleState:
208
207
  return pulumi.get(self, "namespace")
209
208
 
210
209
  @namespace.setter
211
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
210
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
212
211
  pulumi.set(self, "namespace", value)
213
212
 
214
- @property
213
+ @_builtins.property
215
214
  @pulumi.getter
216
- def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
215
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
217
216
  """
218
217
  List of policies attached to the generated token. This setting is only used
219
218
  when `type` is 'client'.
@@ -221,12 +220,12 @@ class _NomadSecretRoleState:
221
220
  return pulumi.get(self, "policies")
222
221
 
223
222
  @policies.setter
224
- def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
223
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
225
224
  pulumi.set(self, "policies", value)
226
225
 
227
- @property
226
+ @_builtins.property
228
227
  @pulumi.getter
229
- def role(self) -> Optional[pulumi.Input[builtins.str]]:
228
+ def role(self) -> Optional[pulumi.Input[_builtins.str]]:
230
229
  """
231
230
  The name to identify this role within the backend.
232
231
  Must be unique within the backend.
@@ -234,12 +233,12 @@ class _NomadSecretRoleState:
234
233
  return pulumi.get(self, "role")
235
234
 
236
235
  @role.setter
237
- def role(self, value: Optional[pulumi.Input[builtins.str]]):
236
+ def role(self, value: Optional[pulumi.Input[_builtins.str]]):
238
237
  pulumi.set(self, "role", value)
239
238
 
240
- @property
239
+ @_builtins.property
241
240
  @pulumi.getter
242
- def type(self) -> Optional[pulumi.Input[builtins.str]]:
241
+ def type(self) -> Optional[pulumi.Input[_builtins.str]]:
243
242
  """
244
243
  Specifies the type of token to create when using this role. Valid
245
244
  settings are 'client' and 'management'. Defaults to 'client'.
@@ -247,7 +246,7 @@ class _NomadSecretRoleState:
247
246
  return pulumi.get(self, "type")
248
247
 
249
248
  @type.setter
250
- def type(self, value: Optional[pulumi.Input[builtins.str]]):
249
+ def type(self, value: Optional[pulumi.Input[_builtins.str]]):
251
250
  pulumi.set(self, "type", value)
252
251
 
253
252
 
@@ -257,12 +256,12 @@ class NomadSecretRole(pulumi.CustomResource):
257
256
  def __init__(__self__,
258
257
  resource_name: str,
259
258
  opts: Optional[pulumi.ResourceOptions] = None,
260
- backend: Optional[pulumi.Input[builtins.str]] = None,
261
- global_: Optional[pulumi.Input[builtins.bool]] = None,
262
- namespace: Optional[pulumi.Input[builtins.str]] = None,
263
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
264
- role: Optional[pulumi.Input[builtins.str]] = None,
265
- type: Optional[pulumi.Input[builtins.str]] = None,
259
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
260
+ global_: Optional[pulumi.Input[_builtins.bool]] = None,
261
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
262
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
263
+ role: Optional[pulumi.Input[_builtins.str]] = None,
264
+ type: Optional[pulumi.Input[_builtins.str]] = None,
266
265
  __props__=None):
267
266
  """
268
267
  ## Example Usage
@@ -295,18 +294,18 @@ class NomadSecretRole(pulumi.CustomResource):
295
294
 
296
295
  :param str resource_name: The name of the resource.
297
296
  :param pulumi.ResourceOptions opts: Options for the resource.
298
- :param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at.
299
- :param pulumi.Input[builtins.bool] global_: Specifies if the generated token should be global. Defaults to
297
+ :param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at.
298
+ :param pulumi.Input[_builtins.bool] global_: Specifies if the generated token should be global. Defaults to
300
299
  false.
301
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
300
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
302
301
  The value should not contain leading or trailing forward slashes.
303
302
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
304
303
  *Available only for Vault Enterprise*.
305
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: List of policies attached to the generated token. This setting is only used
304
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: List of policies attached to the generated token. This setting is only used
306
305
  when `type` is 'client'.
307
- :param pulumi.Input[builtins.str] role: The name to identify this role within the backend.
306
+ :param pulumi.Input[_builtins.str] role: The name to identify this role within the backend.
308
307
  Must be unique within the backend.
309
- :param pulumi.Input[builtins.str] type: Specifies the type of token to create when using this role. Valid
308
+ :param pulumi.Input[_builtins.str] type: Specifies the type of token to create when using this role. Valid
310
309
  settings are 'client' and 'management'. Defaults to 'client'.
311
310
  """
312
311
  ...
@@ -359,12 +358,12 @@ class NomadSecretRole(pulumi.CustomResource):
359
358
  def _internal_init(__self__,
360
359
  resource_name: str,
361
360
  opts: Optional[pulumi.ResourceOptions] = None,
362
- backend: Optional[pulumi.Input[builtins.str]] = None,
363
- global_: Optional[pulumi.Input[builtins.bool]] = None,
364
- namespace: Optional[pulumi.Input[builtins.str]] = None,
365
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
366
- role: Optional[pulumi.Input[builtins.str]] = None,
367
- type: Optional[pulumi.Input[builtins.str]] = None,
361
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
362
+ global_: Optional[pulumi.Input[_builtins.bool]] = None,
363
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
364
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
365
+ role: Optional[pulumi.Input[_builtins.str]] = None,
366
+ type: Optional[pulumi.Input[_builtins.str]] = None,
368
367
  __props__=None):
369
368
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
370
369
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -394,12 +393,12 @@ class NomadSecretRole(pulumi.CustomResource):
394
393
  def get(resource_name: str,
395
394
  id: pulumi.Input[str],
396
395
  opts: Optional[pulumi.ResourceOptions] = None,
397
- backend: Optional[pulumi.Input[builtins.str]] = None,
398
- global_: Optional[pulumi.Input[builtins.bool]] = None,
399
- namespace: Optional[pulumi.Input[builtins.str]] = None,
400
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
401
- role: Optional[pulumi.Input[builtins.str]] = None,
402
- type: Optional[pulumi.Input[builtins.str]] = None) -> 'NomadSecretRole':
396
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
397
+ global_: Optional[pulumi.Input[_builtins.bool]] = None,
398
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
399
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
400
+ role: Optional[pulumi.Input[_builtins.str]] = None,
401
+ type: Optional[pulumi.Input[_builtins.str]] = None) -> 'NomadSecretRole':
403
402
  """
404
403
  Get an existing NomadSecretRole resource's state with the given name, id, and optional extra
405
404
  properties used to qualify the lookup.
@@ -407,18 +406,18 @@ class NomadSecretRole(pulumi.CustomResource):
407
406
  :param str resource_name: The unique name of the resulting resource.
408
407
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
409
408
  :param pulumi.ResourceOptions opts: Options for the resource.
410
- :param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at.
411
- :param pulumi.Input[builtins.bool] global_: Specifies if the generated token should be global. Defaults to
409
+ :param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at.
410
+ :param pulumi.Input[_builtins.bool] global_: Specifies if the generated token should be global. Defaults to
412
411
  false.
413
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
412
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
414
413
  The value should not contain leading or trailing forward slashes.
415
414
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
416
415
  *Available only for Vault Enterprise*.
417
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: List of policies attached to the generated token. This setting is only used
416
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: List of policies attached to the generated token. This setting is only used
418
417
  when `type` is 'client'.
419
- :param pulumi.Input[builtins.str] role: The name to identify this role within the backend.
418
+ :param pulumi.Input[_builtins.str] role: The name to identify this role within the backend.
420
419
  Must be unique within the backend.
421
- :param pulumi.Input[builtins.str] type: Specifies the type of token to create when using this role. Valid
420
+ :param pulumi.Input[_builtins.str] type: Specifies the type of token to create when using this role. Valid
422
421
  settings are 'client' and 'management'. Defaults to 'client'.
423
422
  """
424
423
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -433,26 +432,26 @@ class NomadSecretRole(pulumi.CustomResource):
433
432
  __props__.__dict__["type"] = type
434
433
  return NomadSecretRole(resource_name, opts=opts, __props__=__props__)
435
434
 
436
- @property
435
+ @_builtins.property
437
436
  @pulumi.getter
438
- def backend(self) -> pulumi.Output[builtins.str]:
437
+ def backend(self) -> pulumi.Output[_builtins.str]:
439
438
  """
440
439
  The unique path this backend should be mounted at.
441
440
  """
442
441
  return pulumi.get(self, "backend")
443
442
 
444
- @property
443
+ @_builtins.property
445
444
  @pulumi.getter(name="global")
446
- def global_(self) -> pulumi.Output[builtins.bool]:
445
+ def global_(self) -> pulumi.Output[_builtins.bool]:
447
446
  """
448
447
  Specifies if the generated token should be global. Defaults to
449
448
  false.
450
449
  """
451
450
  return pulumi.get(self, "global_")
452
451
 
453
- @property
452
+ @_builtins.property
454
453
  @pulumi.getter
455
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
454
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
456
455
  """
457
456
  The namespace to provision the resource in.
458
457
  The value should not contain leading or trailing forward slashes.
@@ -461,27 +460,27 @@ class NomadSecretRole(pulumi.CustomResource):
461
460
  """
462
461
  return pulumi.get(self, "namespace")
463
462
 
464
- @property
463
+ @_builtins.property
465
464
  @pulumi.getter
466
- def policies(self) -> pulumi.Output[Sequence[builtins.str]]:
465
+ def policies(self) -> pulumi.Output[Sequence[_builtins.str]]:
467
466
  """
468
467
  List of policies attached to the generated token. This setting is only used
469
468
  when `type` is 'client'.
470
469
  """
471
470
  return pulumi.get(self, "policies")
472
471
 
473
- @property
472
+ @_builtins.property
474
473
  @pulumi.getter
475
- def role(self) -> pulumi.Output[builtins.str]:
474
+ def role(self) -> pulumi.Output[_builtins.str]:
476
475
  """
477
476
  The name to identify this role within the backend.
478
477
  Must be unique within the backend.
479
478
  """
480
479
  return pulumi.get(self, "role")
481
480
 
482
- @property
481
+ @_builtins.property
483
482
  @pulumi.getter
484
- def type(self) -> pulumi.Output[builtins.str]:
483
+ def type(self) -> pulumi.Output[_builtins.str]:
485
484
  """
486
485
  Specifies the type of token to create when using this role. Valid
487
486
  settings are 'client' and 'management'. Defaults to 'client'.
@@ -2,7 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
5
+ import builtins as _builtins
6
6
  from .. import _utilities
7
7
  import typing
8
8
  # Export this package's modules as members:
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -26,11 +25,11 @@ MYPY = False
26
25
 
27
26
  if not MYPY:
28
27
  class AuthBackendGroupArgsDict(TypedDict):
29
- group_name: pulumi.Input[builtins.str]
28
+ group_name: pulumi.Input[_builtins.str]
30
29
  """
31
30
  Name of the Okta group
32
31
  """
33
- policies: pulumi.Input[Sequence[pulumi.Input[builtins.str]]]
32
+ policies: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]
34
33
  """
35
34
  Policies to associate with this group
36
35
  """
@@ -40,51 +39,51 @@ elif False:
40
39
  @pulumi.input_type
41
40
  class AuthBackendGroupArgs:
42
41
  def __init__(__self__, *,
43
- group_name: pulumi.Input[builtins.str],
44
- policies: pulumi.Input[Sequence[pulumi.Input[builtins.str]]]):
42
+ group_name: pulumi.Input[_builtins.str],
43
+ policies: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]):
45
44
  """
46
- :param pulumi.Input[builtins.str] group_name: Name of the Okta group
47
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Policies to associate with this group
45
+ :param pulumi.Input[_builtins.str] group_name: Name of the Okta group
46
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: Policies to associate with this group
48
47
  """
49
48
  pulumi.set(__self__, "group_name", group_name)
50
49
  pulumi.set(__self__, "policies", policies)
51
50
 
52
- @property
51
+ @_builtins.property
53
52
  @pulumi.getter(name="groupName")
54
- def group_name(self) -> pulumi.Input[builtins.str]:
53
+ def group_name(self) -> pulumi.Input[_builtins.str]:
55
54
  """
56
55
  Name of the Okta group
57
56
  """
58
57
  return pulumi.get(self, "group_name")
59
58
 
60
59
  @group_name.setter
61
- def group_name(self, value: pulumi.Input[builtins.str]):
60
+ def group_name(self, value: pulumi.Input[_builtins.str]):
62
61
  pulumi.set(self, "group_name", value)
63
62
 
64
- @property
63
+ @_builtins.property
65
64
  @pulumi.getter
66
- def policies(self) -> pulumi.Input[Sequence[pulumi.Input[builtins.str]]]:
65
+ def policies(self) -> pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]:
67
66
  """
68
67
  Policies to associate with this group
69
68
  """
70
69
  return pulumi.get(self, "policies")
71
70
 
72
71
  @policies.setter
73
- def policies(self, value: pulumi.Input[Sequence[pulumi.Input[builtins.str]]]):
72
+ def policies(self, value: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]):
74
73
  pulumi.set(self, "policies", value)
75
74
 
76
75
 
77
76
  if not MYPY:
78
77
  class AuthBackendUserArgsDict(TypedDict):
79
- username: pulumi.Input[builtins.str]
78
+ username: pulumi.Input[_builtins.str]
80
79
  """
81
80
  Name of the user within Okta
82
81
  """
83
- groups: NotRequired[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]
82
+ groups: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
84
83
  """
85
84
  Groups within the Okta auth backend to associate with this user
86
85
  """
87
- policies: NotRequired[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]
86
+ policies: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
88
87
  """
89
88
  Policies to associate with this user
90
89
  """
@@ -94,13 +93,13 @@ elif False:
94
93
  @pulumi.input_type
95
94
  class AuthBackendUserArgs:
96
95
  def __init__(__self__, *,
97
- username: pulumi.Input[builtins.str],
98
- groups: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
99
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
96
+ username: pulumi.Input[_builtins.str],
97
+ groups: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
98
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
100
99
  """
101
- :param pulumi.Input[builtins.str] username: Name of the user within Okta
102
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] groups: Groups within the Okta auth backend to associate with this user
103
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Policies to associate with this user
100
+ :param pulumi.Input[_builtins.str] username: Name of the user within Okta
101
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] groups: Groups within the Okta auth backend to associate with this user
102
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: Policies to associate with this user
104
103
  """
105
104
  pulumi.set(__self__, "username", username)
106
105
  if groups is not None:
@@ -108,40 +107,40 @@ class AuthBackendUserArgs:
108
107
  if policies is not None:
109
108
  pulumi.set(__self__, "policies", policies)
110
109
 
111
- @property
110
+ @_builtins.property
112
111
  @pulumi.getter
113
- def username(self) -> pulumi.Input[builtins.str]:
112
+ def username(self) -> pulumi.Input[_builtins.str]:
114
113
  """
115
114
  Name of the user within Okta
116
115
  """
117
116
  return pulumi.get(self, "username")
118
117
 
119
118
  @username.setter
120
- def username(self, value: pulumi.Input[builtins.str]):
119
+ def username(self, value: pulumi.Input[_builtins.str]):
121
120
  pulumi.set(self, "username", value)
122
121
 
123
- @property
122
+ @_builtins.property
124
123
  @pulumi.getter
125
- def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
124
+ def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
126
125
  """
127
126
  Groups within the Okta auth backend to associate with this user
128
127
  """
129
128
  return pulumi.get(self, "groups")
130
129
 
131
130
  @groups.setter
132
- def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
131
+ def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
133
132
  pulumi.set(self, "groups", value)
134
133
 
135
- @property
134
+ @_builtins.property
136
135
  @pulumi.getter
137
- def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
136
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
138
137
  """
139
138
  Policies to associate with this user
140
139
  """
141
140
  return pulumi.get(self, "policies")
142
141
 
143
142
  @policies.setter
144
- def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
143
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
145
144
  pulumi.set(self, "policies", value)
146
145
 
147
146