pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,21 +19,21 @@ __all__ = ['AuthBackendUserInitArgs', 'AuthBackendUser']
20
19
  @pulumi.input_type
21
20
  class AuthBackendUserInitArgs:
22
21
  def __init__(__self__, *,
23
- path: pulumi.Input[builtins.str],
24
- username: pulumi.Input[builtins.str],
25
- groups: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
26
- namespace: Optional[pulumi.Input[builtins.str]] = None,
27
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
22
+ path: pulumi.Input[_builtins.str],
23
+ username: pulumi.Input[_builtins.str],
24
+ groups: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
25
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
26
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
28
27
  """
29
28
  The set of arguments for constructing a AuthBackendUser resource.
30
- :param pulumi.Input[builtins.str] path: The path where the Okta auth backend is mounted
31
- :param pulumi.Input[builtins.str] username: Name of the user within Okta
32
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] groups: List of Okta groups to associate with this user
33
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
29
+ :param pulumi.Input[_builtins.str] path: The path where the Okta auth backend is mounted
30
+ :param pulumi.Input[_builtins.str] username: Name of the user within Okta
31
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] groups: List of Okta groups to associate with this user
32
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
34
33
  The value should not contain leading or trailing forward slashes.
35
34
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
36
35
  *Available only for Vault Enterprise*.
37
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: List of Vault policies to associate with this user
36
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: List of Vault policies to associate with this user
38
37
  """
39
38
  pulumi.set(__self__, "path", path)
40
39
  pulumi.set(__self__, "username", username)
@@ -45,45 +44,45 @@ class AuthBackendUserInitArgs:
45
44
  if policies is not None:
46
45
  pulumi.set(__self__, "policies", policies)
47
46
 
48
- @property
47
+ @_builtins.property
49
48
  @pulumi.getter
50
- def path(self) -> pulumi.Input[builtins.str]:
49
+ def path(self) -> pulumi.Input[_builtins.str]:
51
50
  """
52
51
  The path where the Okta auth backend is mounted
53
52
  """
54
53
  return pulumi.get(self, "path")
55
54
 
56
55
  @path.setter
57
- def path(self, value: pulumi.Input[builtins.str]):
56
+ def path(self, value: pulumi.Input[_builtins.str]):
58
57
  pulumi.set(self, "path", value)
59
58
 
60
- @property
59
+ @_builtins.property
61
60
  @pulumi.getter
62
- def username(self) -> pulumi.Input[builtins.str]:
61
+ def username(self) -> pulumi.Input[_builtins.str]:
63
62
  """
64
63
  Name of the user within Okta
65
64
  """
66
65
  return pulumi.get(self, "username")
67
66
 
68
67
  @username.setter
69
- def username(self, value: pulumi.Input[builtins.str]):
68
+ def username(self, value: pulumi.Input[_builtins.str]):
70
69
  pulumi.set(self, "username", value)
71
70
 
72
- @property
71
+ @_builtins.property
73
72
  @pulumi.getter
74
- def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
73
+ def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
75
74
  """
76
75
  List of Okta groups to associate with this user
77
76
  """
78
77
  return pulumi.get(self, "groups")
79
78
 
80
79
  @groups.setter
81
- def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
80
+ def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
82
81
  pulumi.set(self, "groups", value)
83
82
 
84
- @property
83
+ @_builtins.property
85
84
  @pulumi.getter
86
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
85
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
87
86
  """
88
87
  The namespace to provision the resource in.
89
88
  The value should not contain leading or trailing forward slashes.
@@ -93,40 +92,40 @@ class AuthBackendUserInitArgs:
93
92
  return pulumi.get(self, "namespace")
94
93
 
95
94
  @namespace.setter
96
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
95
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
97
96
  pulumi.set(self, "namespace", value)
98
97
 
99
- @property
98
+ @_builtins.property
100
99
  @pulumi.getter
101
- def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
100
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
102
101
  """
103
102
  List of Vault policies to associate with this user
104
103
  """
105
104
  return pulumi.get(self, "policies")
106
105
 
107
106
  @policies.setter
108
- def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
107
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
109
108
  pulumi.set(self, "policies", value)
110
109
 
111
110
 
112
111
  @pulumi.input_type
113
112
  class _AuthBackendUserState:
114
113
  def __init__(__self__, *,
115
- groups: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
116
- namespace: Optional[pulumi.Input[builtins.str]] = None,
117
- path: Optional[pulumi.Input[builtins.str]] = None,
118
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
119
- username: Optional[pulumi.Input[builtins.str]] = None):
114
+ groups: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
115
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
116
+ path: Optional[pulumi.Input[_builtins.str]] = None,
117
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
118
+ username: Optional[pulumi.Input[_builtins.str]] = None):
120
119
  """
121
120
  Input properties used for looking up and filtering AuthBackendUser resources.
122
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] groups: List of Okta groups to associate with this user
123
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
121
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] groups: List of Okta groups to associate with this user
122
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
124
123
  The value should not contain leading or trailing forward slashes.
125
124
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
126
125
  *Available only for Vault Enterprise*.
127
- :param pulumi.Input[builtins.str] path: The path where the Okta auth backend is mounted
128
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: List of Vault policies to associate with this user
129
- :param pulumi.Input[builtins.str] username: Name of the user within Okta
126
+ :param pulumi.Input[_builtins.str] path: The path where the Okta auth backend is mounted
127
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: List of Vault policies to associate with this user
128
+ :param pulumi.Input[_builtins.str] username: Name of the user within Okta
130
129
  """
131
130
  if groups is not None:
132
131
  pulumi.set(__self__, "groups", groups)
@@ -139,21 +138,21 @@ class _AuthBackendUserState:
139
138
  if username is not None:
140
139
  pulumi.set(__self__, "username", username)
141
140
 
142
- @property
141
+ @_builtins.property
143
142
  @pulumi.getter
144
- def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
143
+ def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
145
144
  """
146
145
  List of Okta groups to associate with this user
147
146
  """
148
147
  return pulumi.get(self, "groups")
149
148
 
150
149
  @groups.setter
151
- def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
150
+ def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
152
151
  pulumi.set(self, "groups", value)
153
152
 
154
- @property
153
+ @_builtins.property
155
154
  @pulumi.getter
156
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
155
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
157
156
  """
158
157
  The namespace to provision the resource in.
159
158
  The value should not contain leading or trailing forward slashes.
@@ -163,43 +162,43 @@ class _AuthBackendUserState:
163
162
  return pulumi.get(self, "namespace")
164
163
 
165
164
  @namespace.setter
166
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
165
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
167
166
  pulumi.set(self, "namespace", value)
168
167
 
169
- @property
168
+ @_builtins.property
170
169
  @pulumi.getter
171
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
170
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
172
171
  """
173
172
  The path where the Okta auth backend is mounted
174
173
  """
175
174
  return pulumi.get(self, "path")
176
175
 
177
176
  @path.setter
178
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
177
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
179
178
  pulumi.set(self, "path", value)
180
179
 
181
- @property
180
+ @_builtins.property
182
181
  @pulumi.getter
183
- def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
182
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
184
183
  """
185
184
  List of Vault policies to associate with this user
186
185
  """
187
186
  return pulumi.get(self, "policies")
188
187
 
189
188
  @policies.setter
190
- def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
189
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
191
190
  pulumi.set(self, "policies", value)
192
191
 
193
- @property
192
+ @_builtins.property
194
193
  @pulumi.getter
195
- def username(self) -> Optional[pulumi.Input[builtins.str]]:
194
+ def username(self) -> Optional[pulumi.Input[_builtins.str]]:
196
195
  """
197
196
  Name of the user within Okta
198
197
  """
199
198
  return pulumi.get(self, "username")
200
199
 
201
200
  @username.setter
202
- def username(self, value: Optional[pulumi.Input[builtins.str]]):
201
+ def username(self, value: Optional[pulumi.Input[_builtins.str]]):
203
202
  pulumi.set(self, "username", value)
204
203
 
205
204
 
@@ -209,11 +208,11 @@ class AuthBackendUser(pulumi.CustomResource):
209
208
  def __init__(__self__,
210
209
  resource_name: str,
211
210
  opts: Optional[pulumi.ResourceOptions] = None,
212
- groups: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
213
- namespace: Optional[pulumi.Input[builtins.str]] = None,
214
- path: Optional[pulumi.Input[builtins.str]] = None,
215
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
216
- username: Optional[pulumi.Input[builtins.str]] = None,
211
+ groups: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
212
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
213
+ path: Optional[pulumi.Input[_builtins.str]] = None,
214
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
215
+ username: Optional[pulumi.Input[_builtins.str]] = None,
217
216
  __props__=None):
218
217
  """
219
218
  Provides a resource to create a user in an
@@ -247,14 +246,14 @@ class AuthBackendUser(pulumi.CustomResource):
247
246
 
248
247
  :param str resource_name: The name of the resource.
249
248
  :param pulumi.ResourceOptions opts: Options for the resource.
250
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] groups: List of Okta groups to associate with this user
251
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
249
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] groups: List of Okta groups to associate with this user
250
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
252
251
  The value should not contain leading or trailing forward slashes.
253
252
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
254
253
  *Available only for Vault Enterprise*.
255
- :param pulumi.Input[builtins.str] path: The path where the Okta auth backend is mounted
256
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: List of Vault policies to associate with this user
257
- :param pulumi.Input[builtins.str] username: Name of the user within Okta
254
+ :param pulumi.Input[_builtins.str] path: The path where the Okta auth backend is mounted
255
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: List of Vault policies to associate with this user
256
+ :param pulumi.Input[_builtins.str] username: Name of the user within Okta
258
257
  """
259
258
  ...
260
259
  @overload
@@ -307,11 +306,11 @@ class AuthBackendUser(pulumi.CustomResource):
307
306
  def _internal_init(__self__,
308
307
  resource_name: str,
309
308
  opts: Optional[pulumi.ResourceOptions] = None,
310
- groups: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
311
- namespace: Optional[pulumi.Input[builtins.str]] = None,
312
- path: Optional[pulumi.Input[builtins.str]] = None,
313
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
314
- username: Optional[pulumi.Input[builtins.str]] = None,
309
+ groups: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
310
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
311
+ path: Optional[pulumi.Input[_builtins.str]] = None,
312
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
313
+ username: Optional[pulumi.Input[_builtins.str]] = None,
315
314
  __props__=None):
316
315
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
317
316
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -340,11 +339,11 @@ class AuthBackendUser(pulumi.CustomResource):
340
339
  def get(resource_name: str,
341
340
  id: pulumi.Input[str],
342
341
  opts: Optional[pulumi.ResourceOptions] = None,
343
- groups: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
344
- namespace: Optional[pulumi.Input[builtins.str]] = None,
345
- path: Optional[pulumi.Input[builtins.str]] = None,
346
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
347
- username: Optional[pulumi.Input[builtins.str]] = None) -> 'AuthBackendUser':
342
+ groups: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
343
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
344
+ path: Optional[pulumi.Input[_builtins.str]] = None,
345
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
346
+ username: Optional[pulumi.Input[_builtins.str]] = None) -> 'AuthBackendUser':
348
347
  """
349
348
  Get an existing AuthBackendUser resource's state with the given name, id, and optional extra
350
349
  properties used to qualify the lookup.
@@ -352,14 +351,14 @@ class AuthBackendUser(pulumi.CustomResource):
352
351
  :param str resource_name: The unique name of the resulting resource.
353
352
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
354
353
  :param pulumi.ResourceOptions opts: Options for the resource.
355
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] groups: List of Okta groups to associate with this user
356
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
354
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] groups: List of Okta groups to associate with this user
355
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
357
356
  The value should not contain leading or trailing forward slashes.
358
357
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
359
358
  *Available only for Vault Enterprise*.
360
- :param pulumi.Input[builtins.str] path: The path where the Okta auth backend is mounted
361
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: List of Vault policies to associate with this user
362
- :param pulumi.Input[builtins.str] username: Name of the user within Okta
359
+ :param pulumi.Input[_builtins.str] path: The path where the Okta auth backend is mounted
360
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: List of Vault policies to associate with this user
361
+ :param pulumi.Input[_builtins.str] username: Name of the user within Okta
363
362
  """
364
363
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
365
364
 
@@ -372,17 +371,17 @@ class AuthBackendUser(pulumi.CustomResource):
372
371
  __props__.__dict__["username"] = username
373
372
  return AuthBackendUser(resource_name, opts=opts, __props__=__props__)
374
373
 
375
- @property
374
+ @_builtins.property
376
375
  @pulumi.getter
377
- def groups(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
376
+ def groups(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
378
377
  """
379
378
  List of Okta groups to associate with this user
380
379
  """
381
380
  return pulumi.get(self, "groups")
382
381
 
383
- @property
382
+ @_builtins.property
384
383
  @pulumi.getter
385
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
384
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
386
385
  """
387
386
  The namespace to provision the resource in.
388
387
  The value should not contain leading or trailing forward slashes.
@@ -391,25 +390,25 @@ class AuthBackendUser(pulumi.CustomResource):
391
390
  """
392
391
  return pulumi.get(self, "namespace")
393
392
 
394
- @property
393
+ @_builtins.property
395
394
  @pulumi.getter
396
- def path(self) -> pulumi.Output[builtins.str]:
395
+ def path(self) -> pulumi.Output[_builtins.str]:
397
396
  """
398
397
  The path where the Okta auth backend is mounted
399
398
  """
400
399
  return pulumi.get(self, "path")
401
400
 
402
- @property
401
+ @_builtins.property
403
402
  @pulumi.getter
404
- def policies(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
403
+ def policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
405
404
  """
406
405
  List of Vault policies to associate with this user
407
406
  """
408
407
  return pulumi.get(self, "policies")
409
408
 
410
- @property
409
+ @_builtins.property
411
410
  @pulumi.getter
412
- def username(self) -> pulumi.Output[builtins.str]:
411
+ def username(self) -> pulumi.Output[_builtins.str]:
413
412
  """
414
413
  Name of the user within Okta
415
414
  """
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -40,26 +39,26 @@ class AuthBackendGroup(dict):
40
39
  return super().get(key, default)
41
40
 
42
41
  def __init__(__self__, *,
43
- group_name: builtins.str,
44
- policies: Sequence[builtins.str]):
42
+ group_name: _builtins.str,
43
+ policies: Sequence[_builtins.str]):
45
44
  """
46
- :param builtins.str group_name: Name of the Okta group
47
- :param Sequence[builtins.str] policies: Policies to associate with this group
45
+ :param _builtins.str group_name: Name of the Okta group
46
+ :param Sequence[_builtins.str] policies: Policies to associate with this group
48
47
  """
49
48
  pulumi.set(__self__, "group_name", group_name)
50
49
  pulumi.set(__self__, "policies", policies)
51
50
 
52
- @property
51
+ @_builtins.property
53
52
  @pulumi.getter(name="groupName")
54
- def group_name(self) -> builtins.str:
53
+ def group_name(self) -> _builtins.str:
55
54
  """
56
55
  Name of the Okta group
57
56
  """
58
57
  return pulumi.get(self, "group_name")
59
58
 
60
- @property
59
+ @_builtins.property
61
60
  @pulumi.getter
62
- def policies(self) -> Sequence[builtins.str]:
61
+ def policies(self) -> Sequence[_builtins.str]:
63
62
  """
64
63
  Policies to associate with this group
65
64
  """
@@ -69,13 +68,13 @@ class AuthBackendGroup(dict):
69
68
  @pulumi.output_type
70
69
  class AuthBackendUser(dict):
71
70
  def __init__(__self__, *,
72
- username: builtins.str,
73
- groups: Optional[Sequence[builtins.str]] = None,
74
- policies: Optional[Sequence[builtins.str]] = None):
71
+ username: _builtins.str,
72
+ groups: Optional[Sequence[_builtins.str]] = None,
73
+ policies: Optional[Sequence[_builtins.str]] = None):
75
74
  """
76
- :param builtins.str username: Name of the user within Okta
77
- :param Sequence[builtins.str] groups: Groups within the Okta auth backend to associate with this user
78
- :param Sequence[builtins.str] policies: Policies to associate with this user
75
+ :param _builtins.str username: Name of the user within Okta
76
+ :param Sequence[_builtins.str] groups: Groups within the Okta auth backend to associate with this user
77
+ :param Sequence[_builtins.str] policies: Policies to associate with this user
79
78
  """
80
79
  pulumi.set(__self__, "username", username)
81
80
  if groups is not None:
@@ -83,25 +82,25 @@ class AuthBackendUser(dict):
83
82
  if policies is not None:
84
83
  pulumi.set(__self__, "policies", policies)
85
84
 
86
- @property
85
+ @_builtins.property
87
86
  @pulumi.getter
88
- def username(self) -> builtins.str:
87
+ def username(self) -> _builtins.str:
89
88
  """
90
89
  Name of the user within Okta
91
90
  """
92
91
  return pulumi.get(self, "username")
93
92
 
94
- @property
93
+ @_builtins.property
95
94
  @pulumi.getter
96
- def groups(self) -> Optional[Sequence[builtins.str]]:
95
+ def groups(self) -> Optional[Sequence[_builtins.str]]:
97
96
  """
98
97
  Groups within the Okta auth backend to associate with this user
99
98
  """
100
99
  return pulumi.get(self, "groups")
101
100
 
102
- @property
101
+ @_builtins.property
103
102
  @pulumi.getter
104
- def policies(self) -> Optional[Sequence[builtins.str]]:
103
+ def policies(self) -> Optional[Sequence[_builtins.str]]:
105
104
  """
106
105
  Policies to associate with this user
107
106
  """