pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,19 +19,19 @@ __all__ = ['AuthBackendGroupInitArgs', 'AuthBackendGroup']
20
19
  @pulumi.input_type
21
20
  class AuthBackendGroupInitArgs:
22
21
  def __init__(__self__, *,
23
- group_name: pulumi.Input[builtins.str],
24
- path: pulumi.Input[builtins.str],
25
- namespace: Optional[pulumi.Input[builtins.str]] = None,
26
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
22
+ group_name: pulumi.Input[_builtins.str],
23
+ path: pulumi.Input[_builtins.str],
24
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
25
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
27
26
  """
28
27
  The set of arguments for constructing a AuthBackendGroup resource.
29
- :param pulumi.Input[builtins.str] group_name: Name of the group within the Okta
30
- :param pulumi.Input[builtins.str] path: The path where the Okta auth backend is mounted
31
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
28
+ :param pulumi.Input[_builtins.str] group_name: Name of the group within the Okta
29
+ :param pulumi.Input[_builtins.str] path: The path where the Okta auth backend is mounted
30
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
32
31
  The value should not contain leading or trailing forward slashes.
33
32
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
34
33
  *Available only for Vault Enterprise*.
35
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Vault policies to associate with this group
34
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: Vault policies to associate with this group
36
35
  """
37
36
  pulumi.set(__self__, "group_name", group_name)
38
37
  pulumi.set(__self__, "path", path)
@@ -41,33 +40,33 @@ class AuthBackendGroupInitArgs:
41
40
  if policies is not None:
42
41
  pulumi.set(__self__, "policies", policies)
43
42
 
44
- @property
43
+ @_builtins.property
45
44
  @pulumi.getter(name="groupName")
46
- def group_name(self) -> pulumi.Input[builtins.str]:
45
+ def group_name(self) -> pulumi.Input[_builtins.str]:
47
46
  """
48
47
  Name of the group within the Okta
49
48
  """
50
49
  return pulumi.get(self, "group_name")
51
50
 
52
51
  @group_name.setter
53
- def group_name(self, value: pulumi.Input[builtins.str]):
52
+ def group_name(self, value: pulumi.Input[_builtins.str]):
54
53
  pulumi.set(self, "group_name", value)
55
54
 
56
- @property
55
+ @_builtins.property
57
56
  @pulumi.getter
58
- def path(self) -> pulumi.Input[builtins.str]:
57
+ def path(self) -> pulumi.Input[_builtins.str]:
59
58
  """
60
59
  The path where the Okta auth backend is mounted
61
60
  """
62
61
  return pulumi.get(self, "path")
63
62
 
64
63
  @path.setter
65
- def path(self, value: pulumi.Input[builtins.str]):
64
+ def path(self, value: pulumi.Input[_builtins.str]):
66
65
  pulumi.set(self, "path", value)
67
66
 
68
- @property
67
+ @_builtins.property
69
68
  @pulumi.getter
70
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
69
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
71
70
  """
72
71
  The namespace to provision the resource in.
73
72
  The value should not contain leading or trailing forward slashes.
@@ -77,38 +76,38 @@ class AuthBackendGroupInitArgs:
77
76
  return pulumi.get(self, "namespace")
78
77
 
79
78
  @namespace.setter
80
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
79
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
81
80
  pulumi.set(self, "namespace", value)
82
81
 
83
- @property
82
+ @_builtins.property
84
83
  @pulumi.getter
85
- def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
84
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
86
85
  """
87
86
  Vault policies to associate with this group
88
87
  """
89
88
  return pulumi.get(self, "policies")
90
89
 
91
90
  @policies.setter
92
- def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
91
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
93
92
  pulumi.set(self, "policies", value)
94
93
 
95
94
 
96
95
  @pulumi.input_type
97
96
  class _AuthBackendGroupState:
98
97
  def __init__(__self__, *,
99
- group_name: Optional[pulumi.Input[builtins.str]] = None,
100
- namespace: Optional[pulumi.Input[builtins.str]] = None,
101
- path: Optional[pulumi.Input[builtins.str]] = None,
102
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
98
+ group_name: Optional[pulumi.Input[_builtins.str]] = None,
99
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
100
+ path: Optional[pulumi.Input[_builtins.str]] = None,
101
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
103
102
  """
104
103
  Input properties used for looking up and filtering AuthBackendGroup resources.
105
- :param pulumi.Input[builtins.str] group_name: Name of the group within the Okta
106
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
104
+ :param pulumi.Input[_builtins.str] group_name: Name of the group within the Okta
105
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
107
106
  The value should not contain leading or trailing forward slashes.
108
107
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
109
108
  *Available only for Vault Enterprise*.
110
- :param pulumi.Input[builtins.str] path: The path where the Okta auth backend is mounted
111
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Vault policies to associate with this group
109
+ :param pulumi.Input[_builtins.str] path: The path where the Okta auth backend is mounted
110
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: Vault policies to associate with this group
112
111
  """
113
112
  if group_name is not None:
114
113
  pulumi.set(__self__, "group_name", group_name)
@@ -119,21 +118,21 @@ class _AuthBackendGroupState:
119
118
  if policies is not None:
120
119
  pulumi.set(__self__, "policies", policies)
121
120
 
122
- @property
121
+ @_builtins.property
123
122
  @pulumi.getter(name="groupName")
124
- def group_name(self) -> Optional[pulumi.Input[builtins.str]]:
123
+ def group_name(self) -> Optional[pulumi.Input[_builtins.str]]:
125
124
  """
126
125
  Name of the group within the Okta
127
126
  """
128
127
  return pulumi.get(self, "group_name")
129
128
 
130
129
  @group_name.setter
131
- def group_name(self, value: Optional[pulumi.Input[builtins.str]]):
130
+ def group_name(self, value: Optional[pulumi.Input[_builtins.str]]):
132
131
  pulumi.set(self, "group_name", value)
133
132
 
134
- @property
133
+ @_builtins.property
135
134
  @pulumi.getter
136
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
135
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
137
136
  """
138
137
  The namespace to provision the resource in.
139
138
  The value should not contain leading or trailing forward slashes.
@@ -143,31 +142,31 @@ class _AuthBackendGroupState:
143
142
  return pulumi.get(self, "namespace")
144
143
 
145
144
  @namespace.setter
146
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
145
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
147
146
  pulumi.set(self, "namespace", value)
148
147
 
149
- @property
148
+ @_builtins.property
150
149
  @pulumi.getter
151
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
150
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
152
151
  """
153
152
  The path where the Okta auth backend is mounted
154
153
  """
155
154
  return pulumi.get(self, "path")
156
155
 
157
156
  @path.setter
158
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
157
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
159
158
  pulumi.set(self, "path", value)
160
159
 
161
- @property
160
+ @_builtins.property
162
161
  @pulumi.getter
163
- def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
162
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
164
163
  """
165
164
  Vault policies to associate with this group
166
165
  """
167
166
  return pulumi.get(self, "policies")
168
167
 
169
168
  @policies.setter
170
- def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
169
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
171
170
  pulumi.set(self, "policies", value)
172
171
 
173
172
 
@@ -177,10 +176,10 @@ class AuthBackendGroup(pulumi.CustomResource):
177
176
  def __init__(__self__,
178
177
  resource_name: str,
179
178
  opts: Optional[pulumi.ResourceOptions] = None,
180
- group_name: Optional[pulumi.Input[builtins.str]] = None,
181
- namespace: Optional[pulumi.Input[builtins.str]] = None,
182
- path: Optional[pulumi.Input[builtins.str]] = None,
183
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
179
+ group_name: Optional[pulumi.Input[_builtins.str]] = None,
180
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
181
+ path: Optional[pulumi.Input[_builtins.str]] = None,
182
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
184
183
  __props__=None):
185
184
  """
186
185
  Provides a resource to create a group in an
@@ -214,13 +213,13 @@ class AuthBackendGroup(pulumi.CustomResource):
214
213
 
215
214
  :param str resource_name: The name of the resource.
216
215
  :param pulumi.ResourceOptions opts: Options for the resource.
217
- :param pulumi.Input[builtins.str] group_name: Name of the group within the Okta
218
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
216
+ :param pulumi.Input[_builtins.str] group_name: Name of the group within the Okta
217
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
219
218
  The value should not contain leading or trailing forward slashes.
220
219
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
221
220
  *Available only for Vault Enterprise*.
222
- :param pulumi.Input[builtins.str] path: The path where the Okta auth backend is mounted
223
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Vault policies to associate with this group
221
+ :param pulumi.Input[_builtins.str] path: The path where the Okta auth backend is mounted
222
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: Vault policies to associate with this group
224
223
  """
225
224
  ...
226
225
  @overload
@@ -273,10 +272,10 @@ class AuthBackendGroup(pulumi.CustomResource):
273
272
  def _internal_init(__self__,
274
273
  resource_name: str,
275
274
  opts: Optional[pulumi.ResourceOptions] = None,
276
- group_name: Optional[pulumi.Input[builtins.str]] = None,
277
- namespace: Optional[pulumi.Input[builtins.str]] = None,
278
- path: Optional[pulumi.Input[builtins.str]] = None,
279
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
275
+ group_name: Optional[pulumi.Input[_builtins.str]] = None,
276
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
277
+ path: Optional[pulumi.Input[_builtins.str]] = None,
278
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
280
279
  __props__=None):
281
280
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
282
281
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -304,10 +303,10 @@ class AuthBackendGroup(pulumi.CustomResource):
304
303
  def get(resource_name: str,
305
304
  id: pulumi.Input[str],
306
305
  opts: Optional[pulumi.ResourceOptions] = None,
307
- group_name: Optional[pulumi.Input[builtins.str]] = None,
308
- namespace: Optional[pulumi.Input[builtins.str]] = None,
309
- path: Optional[pulumi.Input[builtins.str]] = None,
310
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None) -> 'AuthBackendGroup':
306
+ group_name: Optional[pulumi.Input[_builtins.str]] = None,
307
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
308
+ path: Optional[pulumi.Input[_builtins.str]] = None,
309
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None) -> 'AuthBackendGroup':
311
310
  """
312
311
  Get an existing AuthBackendGroup resource's state with the given name, id, and optional extra
313
312
  properties used to qualify the lookup.
@@ -315,13 +314,13 @@ class AuthBackendGroup(pulumi.CustomResource):
315
314
  :param str resource_name: The unique name of the resulting resource.
316
315
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
317
316
  :param pulumi.ResourceOptions opts: Options for the resource.
318
- :param pulumi.Input[builtins.str] group_name: Name of the group within the Okta
319
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
317
+ :param pulumi.Input[_builtins.str] group_name: Name of the group within the Okta
318
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
320
319
  The value should not contain leading or trailing forward slashes.
321
320
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
322
321
  *Available only for Vault Enterprise*.
323
- :param pulumi.Input[builtins.str] path: The path where the Okta auth backend is mounted
324
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Vault policies to associate with this group
322
+ :param pulumi.Input[_builtins.str] path: The path where the Okta auth backend is mounted
323
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: Vault policies to associate with this group
325
324
  """
326
325
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
327
326
 
@@ -333,17 +332,17 @@ class AuthBackendGroup(pulumi.CustomResource):
333
332
  __props__.__dict__["policies"] = policies
334
333
  return AuthBackendGroup(resource_name, opts=opts, __props__=__props__)
335
334
 
336
- @property
335
+ @_builtins.property
337
336
  @pulumi.getter(name="groupName")
338
- def group_name(self) -> pulumi.Output[builtins.str]:
337
+ def group_name(self) -> pulumi.Output[_builtins.str]:
339
338
  """
340
339
  Name of the group within the Okta
341
340
  """
342
341
  return pulumi.get(self, "group_name")
343
342
 
344
- @property
343
+ @_builtins.property
345
344
  @pulumi.getter
346
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
345
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
347
346
  """
348
347
  The namespace to provision the resource in.
349
348
  The value should not contain leading or trailing forward slashes.
@@ -352,17 +351,17 @@ class AuthBackendGroup(pulumi.CustomResource):
352
351
  """
353
352
  return pulumi.get(self, "namespace")
354
353
 
355
- @property
354
+ @_builtins.property
356
355
  @pulumi.getter
357
- def path(self) -> pulumi.Output[builtins.str]:
356
+ def path(self) -> pulumi.Output[_builtins.str]:
358
357
  """
359
358
  The path where the Okta auth backend is mounted
360
359
  """
361
360
  return pulumi.get(self, "path")
362
361
 
363
- @property
362
+ @_builtins.property
364
363
  @pulumi.getter
365
- def policies(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
364
+ def policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
366
365
  """
367
366
  Vault policies to associate with this group
368
367
  """