pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,1399 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ from . import _utilities
7
+ import typing
8
+ # Export this package's modules as members:
9
+ from .audit import *
10
+ from .audit_request_header import *
11
+ from .auth_backend import *
12
+ from .cert_auth_backend_role import *
13
+ from .egp_policy import *
14
+ from .get_auth_backend import *
15
+ from .get_auth_backends import *
16
+ from .get_namespace import *
17
+ from .get_namespaces import *
18
+ from .get_nomad_access_token import *
19
+ from .get_policy_document import *
20
+ from .get_raft_autopilot_state import *
21
+ from .mfa_duo import *
22
+ from .mfa_okta import *
23
+ from .mfa_pingid import *
24
+ from .mfa_totp import *
25
+ from .mount import *
26
+ from .namespace import *
27
+ from .nomad_secret_backend import *
28
+ from .nomad_secret_role import *
29
+ from .oci_auth_backend import *
30
+ from .oci_auth_backend_role import *
31
+ from .plugin import *
32
+ from .plugin_pinned_version import *
33
+ from .policy import *
34
+ from .provider import *
35
+ from .quota_lease_count import *
36
+ from .quota_rate_limit import *
37
+ from .raft_autopilot import *
38
+ from .raft_snapshot_agent_config import *
39
+ from .rgp_policy import *
40
+ from .scep_auth_backend_role import *
41
+ from .token import *
42
+ from ._inputs import *
43
+ from . import outputs
44
+
45
+ # Make subpackages available:
46
+ if typing.TYPE_CHECKING:
47
+ import pulumi_vault.ad as __ad
48
+ ad = __ad
49
+ import pulumi_vault.alicloud as __alicloud
50
+ alicloud = __alicloud
51
+ import pulumi_vault.approle as __approle
52
+ approle = __approle
53
+ import pulumi_vault.aws as __aws
54
+ aws = __aws
55
+ import pulumi_vault.azure as __azure
56
+ azure = __azure
57
+ import pulumi_vault.config as __config
58
+ config = __config
59
+ import pulumi_vault.consul as __consul
60
+ consul = __consul
61
+ import pulumi_vault.database as __database
62
+ database = __database
63
+ import pulumi_vault.gcp as __gcp
64
+ gcp = __gcp
65
+ import pulumi_vault.generic as __generic
66
+ generic = __generic
67
+ import pulumi_vault.github as __github
68
+ github = __github
69
+ import pulumi_vault.identity as __identity
70
+ identity = __identity
71
+ import pulumi_vault.jwt as __jwt
72
+ jwt = __jwt
73
+ import pulumi_vault.kmip as __kmip
74
+ kmip = __kmip
75
+ import pulumi_vault.kubernetes as __kubernetes
76
+ kubernetes = __kubernetes
77
+ import pulumi_vault.kv as __kv
78
+ kv = __kv
79
+ import pulumi_vault.ldap as __ldap
80
+ ldap = __ldap
81
+ import pulumi_vault.managed as __managed
82
+ managed = __managed
83
+ import pulumi_vault.mongodbatlas as __mongodbatlas
84
+ mongodbatlas = __mongodbatlas
85
+ import pulumi_vault.okta as __okta
86
+ okta = __okta
87
+ import pulumi_vault.pkisecret as __pkisecret
88
+ pkisecret = __pkisecret
89
+ import pulumi_vault.rabbitmq as __rabbitmq
90
+ rabbitmq = __rabbitmq
91
+ import pulumi_vault.saml as __saml
92
+ saml = __saml
93
+ import pulumi_vault.secrets as __secrets
94
+ secrets = __secrets
95
+ import pulumi_vault.ssh as __ssh
96
+ ssh = __ssh
97
+ import pulumi_vault.terraformcloud as __terraformcloud
98
+ terraformcloud = __terraformcloud
99
+ import pulumi_vault.tokenauth as __tokenauth
100
+ tokenauth = __tokenauth
101
+ import pulumi_vault.transform as __transform
102
+ transform = __transform
103
+ import pulumi_vault.transit as __transit
104
+ transit = __transit
105
+ else:
106
+ ad = _utilities.lazy_import('pulumi_vault.ad')
107
+ alicloud = _utilities.lazy_import('pulumi_vault.alicloud')
108
+ approle = _utilities.lazy_import('pulumi_vault.approle')
109
+ aws = _utilities.lazy_import('pulumi_vault.aws')
110
+ azure = _utilities.lazy_import('pulumi_vault.azure')
111
+ config = _utilities.lazy_import('pulumi_vault.config')
112
+ consul = _utilities.lazy_import('pulumi_vault.consul')
113
+ database = _utilities.lazy_import('pulumi_vault.database')
114
+ gcp = _utilities.lazy_import('pulumi_vault.gcp')
115
+ generic = _utilities.lazy_import('pulumi_vault.generic')
116
+ github = _utilities.lazy_import('pulumi_vault.github')
117
+ identity = _utilities.lazy_import('pulumi_vault.identity')
118
+ jwt = _utilities.lazy_import('pulumi_vault.jwt')
119
+ kmip = _utilities.lazy_import('pulumi_vault.kmip')
120
+ kubernetes = _utilities.lazy_import('pulumi_vault.kubernetes')
121
+ kv = _utilities.lazy_import('pulumi_vault.kv')
122
+ ldap = _utilities.lazy_import('pulumi_vault.ldap')
123
+ managed = _utilities.lazy_import('pulumi_vault.managed')
124
+ mongodbatlas = _utilities.lazy_import('pulumi_vault.mongodbatlas')
125
+ okta = _utilities.lazy_import('pulumi_vault.okta')
126
+ pkisecret = _utilities.lazy_import('pulumi_vault.pkisecret')
127
+ rabbitmq = _utilities.lazy_import('pulumi_vault.rabbitmq')
128
+ saml = _utilities.lazy_import('pulumi_vault.saml')
129
+ secrets = _utilities.lazy_import('pulumi_vault.secrets')
130
+ ssh = _utilities.lazy_import('pulumi_vault.ssh')
131
+ terraformcloud = _utilities.lazy_import('pulumi_vault.terraformcloud')
132
+ tokenauth = _utilities.lazy_import('pulumi_vault.tokenauth')
133
+ transform = _utilities.lazy_import('pulumi_vault.transform')
134
+ transit = _utilities.lazy_import('pulumi_vault.transit')
135
+
136
+ _utilities.register(
137
+ resource_modules="""
138
+ [
139
+ {
140
+ "pkg": "vault",
141
+ "mod": "ad/secretBackend",
142
+ "fqn": "pulumi_vault.ad",
143
+ "classes": {
144
+ "vault:ad/secretBackend:SecretBackend": "SecretBackend"
145
+ }
146
+ },
147
+ {
148
+ "pkg": "vault",
149
+ "mod": "ad/secretLibrary",
150
+ "fqn": "pulumi_vault.ad",
151
+ "classes": {
152
+ "vault:ad/secretLibrary:SecretLibrary": "SecretLibrary"
153
+ }
154
+ },
155
+ {
156
+ "pkg": "vault",
157
+ "mod": "ad/secretRole",
158
+ "fqn": "pulumi_vault.ad",
159
+ "classes": {
160
+ "vault:ad/secretRole:SecretRole": "SecretRole"
161
+ }
162
+ },
163
+ {
164
+ "pkg": "vault",
165
+ "mod": "alicloud/authBackendRole",
166
+ "fqn": "pulumi_vault.alicloud",
167
+ "classes": {
168
+ "vault:alicloud/authBackendRole:AuthBackendRole": "AuthBackendRole"
169
+ }
170
+ },
171
+ {
172
+ "pkg": "vault",
173
+ "mod": "appRole/authBackendLogin",
174
+ "fqn": "pulumi_vault.approle",
175
+ "classes": {
176
+ "vault:appRole/authBackendLogin:AuthBackendLogin": "AuthBackendLogin"
177
+ }
178
+ },
179
+ {
180
+ "pkg": "vault",
181
+ "mod": "appRole/authBackendRole",
182
+ "fqn": "pulumi_vault.approle",
183
+ "classes": {
184
+ "vault:appRole/authBackendRole:AuthBackendRole": "AuthBackendRole"
185
+ }
186
+ },
187
+ {
188
+ "pkg": "vault",
189
+ "mod": "appRole/authBackendRoleSecretId",
190
+ "fqn": "pulumi_vault.approle",
191
+ "classes": {
192
+ "vault:appRole/authBackendRoleSecretId:AuthBackendRoleSecretId": "AuthBackendRoleSecretId"
193
+ }
194
+ },
195
+ {
196
+ "pkg": "vault",
197
+ "mod": "aws/authBackendCert",
198
+ "fqn": "pulumi_vault.aws",
199
+ "classes": {
200
+ "vault:aws/authBackendCert:AuthBackendCert": "AuthBackendCert"
201
+ }
202
+ },
203
+ {
204
+ "pkg": "vault",
205
+ "mod": "aws/authBackendClient",
206
+ "fqn": "pulumi_vault.aws",
207
+ "classes": {
208
+ "vault:aws/authBackendClient:AuthBackendClient": "AuthBackendClient"
209
+ }
210
+ },
211
+ {
212
+ "pkg": "vault",
213
+ "mod": "aws/authBackendConfigIdentity",
214
+ "fqn": "pulumi_vault.aws",
215
+ "classes": {
216
+ "vault:aws/authBackendConfigIdentity:AuthBackendConfigIdentity": "AuthBackendConfigIdentity"
217
+ }
218
+ },
219
+ {
220
+ "pkg": "vault",
221
+ "mod": "aws/authBackendIdentityWhitelist",
222
+ "fqn": "pulumi_vault.aws",
223
+ "classes": {
224
+ "vault:aws/authBackendIdentityWhitelist:AuthBackendIdentityWhitelist": "AuthBackendIdentityWhitelist"
225
+ }
226
+ },
227
+ {
228
+ "pkg": "vault",
229
+ "mod": "aws/authBackendLogin",
230
+ "fqn": "pulumi_vault.aws",
231
+ "classes": {
232
+ "vault:aws/authBackendLogin:AuthBackendLogin": "AuthBackendLogin"
233
+ }
234
+ },
235
+ {
236
+ "pkg": "vault",
237
+ "mod": "aws/authBackendRole",
238
+ "fqn": "pulumi_vault.aws",
239
+ "classes": {
240
+ "vault:aws/authBackendRole:AuthBackendRole": "AuthBackendRole"
241
+ }
242
+ },
243
+ {
244
+ "pkg": "vault",
245
+ "mod": "aws/authBackendRoleTag",
246
+ "fqn": "pulumi_vault.aws",
247
+ "classes": {
248
+ "vault:aws/authBackendRoleTag:AuthBackendRoleTag": "AuthBackendRoleTag"
249
+ }
250
+ },
251
+ {
252
+ "pkg": "vault",
253
+ "mod": "aws/authBackendRoletagBlacklist",
254
+ "fqn": "pulumi_vault.aws",
255
+ "classes": {
256
+ "vault:aws/authBackendRoletagBlacklist:AuthBackendRoletagBlacklist": "AuthBackendRoletagBlacklist"
257
+ }
258
+ },
259
+ {
260
+ "pkg": "vault",
261
+ "mod": "aws/authBackendStsRole",
262
+ "fqn": "pulumi_vault.aws",
263
+ "classes": {
264
+ "vault:aws/authBackendStsRole:AuthBackendStsRole": "AuthBackendStsRole"
265
+ }
266
+ },
267
+ {
268
+ "pkg": "vault",
269
+ "mod": "aws/secretBackend",
270
+ "fqn": "pulumi_vault.aws",
271
+ "classes": {
272
+ "vault:aws/secretBackend:SecretBackend": "SecretBackend"
273
+ }
274
+ },
275
+ {
276
+ "pkg": "vault",
277
+ "mod": "aws/secretBackendRole",
278
+ "fqn": "pulumi_vault.aws",
279
+ "classes": {
280
+ "vault:aws/secretBackendRole:SecretBackendRole": "SecretBackendRole"
281
+ }
282
+ },
283
+ {
284
+ "pkg": "vault",
285
+ "mod": "aws/secretBackendStaticRole",
286
+ "fqn": "pulumi_vault.aws",
287
+ "classes": {
288
+ "vault:aws/secretBackendStaticRole:SecretBackendStaticRole": "SecretBackendStaticRole"
289
+ }
290
+ },
291
+ {
292
+ "pkg": "vault",
293
+ "mod": "azure/authBackendConfig",
294
+ "fqn": "pulumi_vault.azure",
295
+ "classes": {
296
+ "vault:azure/authBackendConfig:AuthBackendConfig": "AuthBackendConfig"
297
+ }
298
+ },
299
+ {
300
+ "pkg": "vault",
301
+ "mod": "azure/authBackendRole",
302
+ "fqn": "pulumi_vault.azure",
303
+ "classes": {
304
+ "vault:azure/authBackendRole:AuthBackendRole": "AuthBackendRole"
305
+ }
306
+ },
307
+ {
308
+ "pkg": "vault",
309
+ "mod": "azure/backend",
310
+ "fqn": "pulumi_vault.azure",
311
+ "classes": {
312
+ "vault:azure/backend:Backend": "Backend"
313
+ }
314
+ },
315
+ {
316
+ "pkg": "vault",
317
+ "mod": "azure/backendRole",
318
+ "fqn": "pulumi_vault.azure",
319
+ "classes": {
320
+ "vault:azure/backendRole:BackendRole": "BackendRole"
321
+ }
322
+ },
323
+ {
324
+ "pkg": "vault",
325
+ "mod": "config/uiCustomMessage",
326
+ "fqn": "pulumi_vault.config",
327
+ "classes": {
328
+ "vault:config/uiCustomMessage:UiCustomMessage": "UiCustomMessage"
329
+ }
330
+ },
331
+ {
332
+ "pkg": "vault",
333
+ "mod": "consul/secretBackend",
334
+ "fqn": "pulumi_vault.consul",
335
+ "classes": {
336
+ "vault:consul/secretBackend:SecretBackend": "SecretBackend"
337
+ }
338
+ },
339
+ {
340
+ "pkg": "vault",
341
+ "mod": "consul/secretBackendRole",
342
+ "fqn": "pulumi_vault.consul",
343
+ "classes": {
344
+ "vault:consul/secretBackendRole:SecretBackendRole": "SecretBackendRole"
345
+ }
346
+ },
347
+ {
348
+ "pkg": "vault",
349
+ "mod": "database/secretBackendConnection",
350
+ "fqn": "pulumi_vault.database",
351
+ "classes": {
352
+ "vault:database/secretBackendConnection:SecretBackendConnection": "SecretBackendConnection"
353
+ }
354
+ },
355
+ {
356
+ "pkg": "vault",
357
+ "mod": "database/secretBackendRole",
358
+ "fqn": "pulumi_vault.database",
359
+ "classes": {
360
+ "vault:database/secretBackendRole:SecretBackendRole": "SecretBackendRole"
361
+ }
362
+ },
363
+ {
364
+ "pkg": "vault",
365
+ "mod": "database/secretBackendStaticRole",
366
+ "fqn": "pulumi_vault.database",
367
+ "classes": {
368
+ "vault:database/secretBackendStaticRole:SecretBackendStaticRole": "SecretBackendStaticRole"
369
+ }
370
+ },
371
+ {
372
+ "pkg": "vault",
373
+ "mod": "database/secretsMount",
374
+ "fqn": "pulumi_vault.database",
375
+ "classes": {
376
+ "vault:database/secretsMount:SecretsMount": "SecretsMount"
377
+ }
378
+ },
379
+ {
380
+ "pkg": "vault",
381
+ "mod": "gcp/authBackend",
382
+ "fqn": "pulumi_vault.gcp",
383
+ "classes": {
384
+ "vault:gcp/authBackend:AuthBackend": "AuthBackend"
385
+ }
386
+ },
387
+ {
388
+ "pkg": "vault",
389
+ "mod": "gcp/authBackendRole",
390
+ "fqn": "pulumi_vault.gcp",
391
+ "classes": {
392
+ "vault:gcp/authBackendRole:AuthBackendRole": "AuthBackendRole"
393
+ }
394
+ },
395
+ {
396
+ "pkg": "vault",
397
+ "mod": "gcp/secretBackend",
398
+ "fqn": "pulumi_vault.gcp",
399
+ "classes": {
400
+ "vault:gcp/secretBackend:SecretBackend": "SecretBackend"
401
+ }
402
+ },
403
+ {
404
+ "pkg": "vault",
405
+ "mod": "gcp/secretImpersonatedAccount",
406
+ "fqn": "pulumi_vault.gcp",
407
+ "classes": {
408
+ "vault:gcp/secretImpersonatedAccount:SecretImpersonatedAccount": "SecretImpersonatedAccount"
409
+ }
410
+ },
411
+ {
412
+ "pkg": "vault",
413
+ "mod": "gcp/secretRoleset",
414
+ "fqn": "pulumi_vault.gcp",
415
+ "classes": {
416
+ "vault:gcp/secretRoleset:SecretRoleset": "SecretRoleset"
417
+ }
418
+ },
419
+ {
420
+ "pkg": "vault",
421
+ "mod": "gcp/secretStaticAccount",
422
+ "fqn": "pulumi_vault.gcp",
423
+ "classes": {
424
+ "vault:gcp/secretStaticAccount:SecretStaticAccount": "SecretStaticAccount"
425
+ }
426
+ },
427
+ {
428
+ "pkg": "vault",
429
+ "mod": "generic/endpoint",
430
+ "fqn": "pulumi_vault.generic",
431
+ "classes": {
432
+ "vault:generic/endpoint:Endpoint": "Endpoint"
433
+ }
434
+ },
435
+ {
436
+ "pkg": "vault",
437
+ "mod": "generic/secret",
438
+ "fqn": "pulumi_vault.generic",
439
+ "classes": {
440
+ "vault:generic/secret:Secret": "Secret"
441
+ }
442
+ },
443
+ {
444
+ "pkg": "vault",
445
+ "mod": "github/authBackend",
446
+ "fqn": "pulumi_vault.github",
447
+ "classes": {
448
+ "vault:github/authBackend:AuthBackend": "AuthBackend"
449
+ }
450
+ },
451
+ {
452
+ "pkg": "vault",
453
+ "mod": "github/team",
454
+ "fqn": "pulumi_vault.github",
455
+ "classes": {
456
+ "vault:github/team:Team": "Team"
457
+ }
458
+ },
459
+ {
460
+ "pkg": "vault",
461
+ "mod": "github/user",
462
+ "fqn": "pulumi_vault.github",
463
+ "classes": {
464
+ "vault:github/user:User": "User"
465
+ }
466
+ },
467
+ {
468
+ "pkg": "vault",
469
+ "mod": "identity/entity",
470
+ "fqn": "pulumi_vault.identity",
471
+ "classes": {
472
+ "vault:identity/entity:Entity": "Entity"
473
+ }
474
+ },
475
+ {
476
+ "pkg": "vault",
477
+ "mod": "identity/entityAlias",
478
+ "fqn": "pulumi_vault.identity",
479
+ "classes": {
480
+ "vault:identity/entityAlias:EntityAlias": "EntityAlias"
481
+ }
482
+ },
483
+ {
484
+ "pkg": "vault",
485
+ "mod": "identity/entityPolicies",
486
+ "fqn": "pulumi_vault.identity",
487
+ "classes": {
488
+ "vault:identity/entityPolicies:EntityPolicies": "EntityPolicies"
489
+ }
490
+ },
491
+ {
492
+ "pkg": "vault",
493
+ "mod": "identity/group",
494
+ "fqn": "pulumi_vault.identity",
495
+ "classes": {
496
+ "vault:identity/group:Group": "Group"
497
+ }
498
+ },
499
+ {
500
+ "pkg": "vault",
501
+ "mod": "identity/groupAlias",
502
+ "fqn": "pulumi_vault.identity",
503
+ "classes": {
504
+ "vault:identity/groupAlias:GroupAlias": "GroupAlias"
505
+ }
506
+ },
507
+ {
508
+ "pkg": "vault",
509
+ "mod": "identity/groupMemberEntityIds",
510
+ "fqn": "pulumi_vault.identity",
511
+ "classes": {
512
+ "vault:identity/groupMemberEntityIds:GroupMemberEntityIds": "GroupMemberEntityIds"
513
+ }
514
+ },
515
+ {
516
+ "pkg": "vault",
517
+ "mod": "identity/groupMemberGroupIds",
518
+ "fqn": "pulumi_vault.identity",
519
+ "classes": {
520
+ "vault:identity/groupMemberGroupIds:GroupMemberGroupIds": "GroupMemberGroupIds"
521
+ }
522
+ },
523
+ {
524
+ "pkg": "vault",
525
+ "mod": "identity/groupPolicies",
526
+ "fqn": "pulumi_vault.identity",
527
+ "classes": {
528
+ "vault:identity/groupPolicies:GroupPolicies": "GroupPolicies"
529
+ }
530
+ },
531
+ {
532
+ "pkg": "vault",
533
+ "mod": "identity/mfaDuo",
534
+ "fqn": "pulumi_vault.identity",
535
+ "classes": {
536
+ "vault:identity/mfaDuo:MfaDuo": "MfaDuo"
537
+ }
538
+ },
539
+ {
540
+ "pkg": "vault",
541
+ "mod": "identity/mfaLoginEnforcement",
542
+ "fqn": "pulumi_vault.identity",
543
+ "classes": {
544
+ "vault:identity/mfaLoginEnforcement:MfaLoginEnforcement": "MfaLoginEnforcement"
545
+ }
546
+ },
547
+ {
548
+ "pkg": "vault",
549
+ "mod": "identity/mfaOkta",
550
+ "fqn": "pulumi_vault.identity",
551
+ "classes": {
552
+ "vault:identity/mfaOkta:MfaOkta": "MfaOkta"
553
+ }
554
+ },
555
+ {
556
+ "pkg": "vault",
557
+ "mod": "identity/mfaPingid",
558
+ "fqn": "pulumi_vault.identity",
559
+ "classes": {
560
+ "vault:identity/mfaPingid:MfaPingid": "MfaPingid"
561
+ }
562
+ },
563
+ {
564
+ "pkg": "vault",
565
+ "mod": "identity/mfaTotp",
566
+ "fqn": "pulumi_vault.identity",
567
+ "classes": {
568
+ "vault:identity/mfaTotp:MfaTotp": "MfaTotp"
569
+ }
570
+ },
571
+ {
572
+ "pkg": "vault",
573
+ "mod": "identity/oidc",
574
+ "fqn": "pulumi_vault.identity",
575
+ "classes": {
576
+ "vault:identity/oidc:Oidc": "Oidc"
577
+ }
578
+ },
579
+ {
580
+ "pkg": "vault",
581
+ "mod": "identity/oidcAssignment",
582
+ "fqn": "pulumi_vault.identity",
583
+ "classes": {
584
+ "vault:identity/oidcAssignment:OidcAssignment": "OidcAssignment"
585
+ }
586
+ },
587
+ {
588
+ "pkg": "vault",
589
+ "mod": "identity/oidcClient",
590
+ "fqn": "pulumi_vault.identity",
591
+ "classes": {
592
+ "vault:identity/oidcClient:OidcClient": "OidcClient"
593
+ }
594
+ },
595
+ {
596
+ "pkg": "vault",
597
+ "mod": "identity/oidcKey",
598
+ "fqn": "pulumi_vault.identity",
599
+ "classes": {
600
+ "vault:identity/oidcKey:OidcKey": "OidcKey"
601
+ }
602
+ },
603
+ {
604
+ "pkg": "vault",
605
+ "mod": "identity/oidcKeyAllowedClientID",
606
+ "fqn": "pulumi_vault.identity",
607
+ "classes": {
608
+ "vault:identity/oidcKeyAllowedClientID:OidcKeyAllowedClientID": "OidcKeyAllowedClientID"
609
+ }
610
+ },
611
+ {
612
+ "pkg": "vault",
613
+ "mod": "identity/oidcProvider",
614
+ "fqn": "pulumi_vault.identity",
615
+ "classes": {
616
+ "vault:identity/oidcProvider:OidcProvider": "OidcProvider"
617
+ }
618
+ },
619
+ {
620
+ "pkg": "vault",
621
+ "mod": "identity/oidcRole",
622
+ "fqn": "pulumi_vault.identity",
623
+ "classes": {
624
+ "vault:identity/oidcRole:OidcRole": "OidcRole"
625
+ }
626
+ },
627
+ {
628
+ "pkg": "vault",
629
+ "mod": "identity/oidcScope",
630
+ "fqn": "pulumi_vault.identity",
631
+ "classes": {
632
+ "vault:identity/oidcScope:OidcScope": "OidcScope"
633
+ }
634
+ },
635
+ {
636
+ "pkg": "vault",
637
+ "mod": "index/audit",
638
+ "fqn": "pulumi_vault",
639
+ "classes": {
640
+ "vault:index/audit:Audit": "Audit"
641
+ }
642
+ },
643
+ {
644
+ "pkg": "vault",
645
+ "mod": "index/auditRequestHeader",
646
+ "fqn": "pulumi_vault",
647
+ "classes": {
648
+ "vault:index/auditRequestHeader:AuditRequestHeader": "AuditRequestHeader"
649
+ }
650
+ },
651
+ {
652
+ "pkg": "vault",
653
+ "mod": "index/authBackend",
654
+ "fqn": "pulumi_vault",
655
+ "classes": {
656
+ "vault:index/authBackend:AuthBackend": "AuthBackend"
657
+ }
658
+ },
659
+ {
660
+ "pkg": "vault",
661
+ "mod": "index/certAuthBackendRole",
662
+ "fqn": "pulumi_vault",
663
+ "classes": {
664
+ "vault:index/certAuthBackendRole:CertAuthBackendRole": "CertAuthBackendRole"
665
+ }
666
+ },
667
+ {
668
+ "pkg": "vault",
669
+ "mod": "index/egpPolicy",
670
+ "fqn": "pulumi_vault",
671
+ "classes": {
672
+ "vault:index/egpPolicy:EgpPolicy": "EgpPolicy"
673
+ }
674
+ },
675
+ {
676
+ "pkg": "vault",
677
+ "mod": "index/mfaDuo",
678
+ "fqn": "pulumi_vault",
679
+ "classes": {
680
+ "vault:index/mfaDuo:MfaDuo": "MfaDuo"
681
+ }
682
+ },
683
+ {
684
+ "pkg": "vault",
685
+ "mod": "index/mfaOkta",
686
+ "fqn": "pulumi_vault",
687
+ "classes": {
688
+ "vault:index/mfaOkta:MfaOkta": "MfaOkta"
689
+ }
690
+ },
691
+ {
692
+ "pkg": "vault",
693
+ "mod": "index/mfaPingid",
694
+ "fqn": "pulumi_vault",
695
+ "classes": {
696
+ "vault:index/mfaPingid:MfaPingid": "MfaPingid"
697
+ }
698
+ },
699
+ {
700
+ "pkg": "vault",
701
+ "mod": "index/mfaTotp",
702
+ "fqn": "pulumi_vault",
703
+ "classes": {
704
+ "vault:index/mfaTotp:MfaTotp": "MfaTotp"
705
+ }
706
+ },
707
+ {
708
+ "pkg": "vault",
709
+ "mod": "index/mount",
710
+ "fqn": "pulumi_vault",
711
+ "classes": {
712
+ "vault:index/mount:Mount": "Mount"
713
+ }
714
+ },
715
+ {
716
+ "pkg": "vault",
717
+ "mod": "index/namespace",
718
+ "fqn": "pulumi_vault",
719
+ "classes": {
720
+ "vault:index/namespace:Namespace": "Namespace"
721
+ }
722
+ },
723
+ {
724
+ "pkg": "vault",
725
+ "mod": "index/nomadSecretBackend",
726
+ "fqn": "pulumi_vault",
727
+ "classes": {
728
+ "vault:index/nomadSecretBackend:NomadSecretBackend": "NomadSecretBackend"
729
+ }
730
+ },
731
+ {
732
+ "pkg": "vault",
733
+ "mod": "index/nomadSecretRole",
734
+ "fqn": "pulumi_vault",
735
+ "classes": {
736
+ "vault:index/nomadSecretRole:NomadSecretRole": "NomadSecretRole"
737
+ }
738
+ },
739
+ {
740
+ "pkg": "vault",
741
+ "mod": "index/ociAuthBackend",
742
+ "fqn": "pulumi_vault",
743
+ "classes": {
744
+ "vault:index/ociAuthBackend:OciAuthBackend": "OciAuthBackend"
745
+ }
746
+ },
747
+ {
748
+ "pkg": "vault",
749
+ "mod": "index/ociAuthBackendRole",
750
+ "fqn": "pulumi_vault",
751
+ "classes": {
752
+ "vault:index/ociAuthBackendRole:OciAuthBackendRole": "OciAuthBackendRole"
753
+ }
754
+ },
755
+ {
756
+ "pkg": "vault",
757
+ "mod": "index/plugin",
758
+ "fqn": "pulumi_vault",
759
+ "classes": {
760
+ "vault:index/plugin:Plugin": "Plugin"
761
+ }
762
+ },
763
+ {
764
+ "pkg": "vault",
765
+ "mod": "index/pluginPinnedVersion",
766
+ "fqn": "pulumi_vault",
767
+ "classes": {
768
+ "vault:index/pluginPinnedVersion:PluginPinnedVersion": "PluginPinnedVersion"
769
+ }
770
+ },
771
+ {
772
+ "pkg": "vault",
773
+ "mod": "index/policy",
774
+ "fqn": "pulumi_vault",
775
+ "classes": {
776
+ "vault:index/policy:Policy": "Policy"
777
+ }
778
+ },
779
+ {
780
+ "pkg": "vault",
781
+ "mod": "index/quotaLeaseCount",
782
+ "fqn": "pulumi_vault",
783
+ "classes": {
784
+ "vault:index/quotaLeaseCount:QuotaLeaseCount": "QuotaLeaseCount"
785
+ }
786
+ },
787
+ {
788
+ "pkg": "vault",
789
+ "mod": "index/quotaRateLimit",
790
+ "fqn": "pulumi_vault",
791
+ "classes": {
792
+ "vault:index/quotaRateLimit:QuotaRateLimit": "QuotaRateLimit"
793
+ }
794
+ },
795
+ {
796
+ "pkg": "vault",
797
+ "mod": "index/raftAutopilot",
798
+ "fqn": "pulumi_vault",
799
+ "classes": {
800
+ "vault:index/raftAutopilot:RaftAutopilot": "RaftAutopilot"
801
+ }
802
+ },
803
+ {
804
+ "pkg": "vault",
805
+ "mod": "index/raftSnapshotAgentConfig",
806
+ "fqn": "pulumi_vault",
807
+ "classes": {
808
+ "vault:index/raftSnapshotAgentConfig:RaftSnapshotAgentConfig": "RaftSnapshotAgentConfig"
809
+ }
810
+ },
811
+ {
812
+ "pkg": "vault",
813
+ "mod": "index/rgpPolicy",
814
+ "fqn": "pulumi_vault",
815
+ "classes": {
816
+ "vault:index/rgpPolicy:RgpPolicy": "RgpPolicy"
817
+ }
818
+ },
819
+ {
820
+ "pkg": "vault",
821
+ "mod": "index/scepAuthBackendRole",
822
+ "fqn": "pulumi_vault",
823
+ "classes": {
824
+ "vault:index/scepAuthBackendRole:ScepAuthBackendRole": "ScepAuthBackendRole"
825
+ }
826
+ },
827
+ {
828
+ "pkg": "vault",
829
+ "mod": "index/token",
830
+ "fqn": "pulumi_vault",
831
+ "classes": {
832
+ "vault:index/token:Token": "Token"
833
+ }
834
+ },
835
+ {
836
+ "pkg": "vault",
837
+ "mod": "jwt/authBackend",
838
+ "fqn": "pulumi_vault.jwt",
839
+ "classes": {
840
+ "vault:jwt/authBackend:AuthBackend": "AuthBackend"
841
+ }
842
+ },
843
+ {
844
+ "pkg": "vault",
845
+ "mod": "jwt/authBackendRole",
846
+ "fqn": "pulumi_vault.jwt",
847
+ "classes": {
848
+ "vault:jwt/authBackendRole:AuthBackendRole": "AuthBackendRole"
849
+ }
850
+ },
851
+ {
852
+ "pkg": "vault",
853
+ "mod": "kmip/secretBackend",
854
+ "fqn": "pulumi_vault.kmip",
855
+ "classes": {
856
+ "vault:kmip/secretBackend:SecretBackend": "SecretBackend"
857
+ }
858
+ },
859
+ {
860
+ "pkg": "vault",
861
+ "mod": "kmip/secretRole",
862
+ "fqn": "pulumi_vault.kmip",
863
+ "classes": {
864
+ "vault:kmip/secretRole:SecretRole": "SecretRole"
865
+ }
866
+ },
867
+ {
868
+ "pkg": "vault",
869
+ "mod": "kmip/secretScope",
870
+ "fqn": "pulumi_vault.kmip",
871
+ "classes": {
872
+ "vault:kmip/secretScope:SecretScope": "SecretScope"
873
+ }
874
+ },
875
+ {
876
+ "pkg": "vault",
877
+ "mod": "kubernetes/authBackendConfig",
878
+ "fqn": "pulumi_vault.kubernetes",
879
+ "classes": {
880
+ "vault:kubernetes/authBackendConfig:AuthBackendConfig": "AuthBackendConfig"
881
+ }
882
+ },
883
+ {
884
+ "pkg": "vault",
885
+ "mod": "kubernetes/authBackendRole",
886
+ "fqn": "pulumi_vault.kubernetes",
887
+ "classes": {
888
+ "vault:kubernetes/authBackendRole:AuthBackendRole": "AuthBackendRole"
889
+ }
890
+ },
891
+ {
892
+ "pkg": "vault",
893
+ "mod": "kubernetes/secretBackend",
894
+ "fqn": "pulumi_vault.kubernetes",
895
+ "classes": {
896
+ "vault:kubernetes/secretBackend:SecretBackend": "SecretBackend"
897
+ }
898
+ },
899
+ {
900
+ "pkg": "vault",
901
+ "mod": "kubernetes/secretBackendRole",
902
+ "fqn": "pulumi_vault.kubernetes",
903
+ "classes": {
904
+ "vault:kubernetes/secretBackendRole:SecretBackendRole": "SecretBackendRole"
905
+ }
906
+ },
907
+ {
908
+ "pkg": "vault",
909
+ "mod": "kv/secret",
910
+ "fqn": "pulumi_vault.kv",
911
+ "classes": {
912
+ "vault:kv/secret:Secret": "Secret"
913
+ }
914
+ },
915
+ {
916
+ "pkg": "vault",
917
+ "mod": "kv/secretBackendV2",
918
+ "fqn": "pulumi_vault.kv",
919
+ "classes": {
920
+ "vault:kv/secretBackendV2:SecretBackendV2": "SecretBackendV2"
921
+ }
922
+ },
923
+ {
924
+ "pkg": "vault",
925
+ "mod": "kv/secretV2",
926
+ "fqn": "pulumi_vault.kv",
927
+ "classes": {
928
+ "vault:kv/secretV2:SecretV2": "SecretV2"
929
+ }
930
+ },
931
+ {
932
+ "pkg": "vault",
933
+ "mod": "ldap/authBackend",
934
+ "fqn": "pulumi_vault.ldap",
935
+ "classes": {
936
+ "vault:ldap/authBackend:AuthBackend": "AuthBackend"
937
+ }
938
+ },
939
+ {
940
+ "pkg": "vault",
941
+ "mod": "ldap/authBackendGroup",
942
+ "fqn": "pulumi_vault.ldap",
943
+ "classes": {
944
+ "vault:ldap/authBackendGroup:AuthBackendGroup": "AuthBackendGroup"
945
+ }
946
+ },
947
+ {
948
+ "pkg": "vault",
949
+ "mod": "ldap/authBackendUser",
950
+ "fqn": "pulumi_vault.ldap",
951
+ "classes": {
952
+ "vault:ldap/authBackendUser:AuthBackendUser": "AuthBackendUser"
953
+ }
954
+ },
955
+ {
956
+ "pkg": "vault",
957
+ "mod": "ldap/secretBackend",
958
+ "fqn": "pulumi_vault.ldap",
959
+ "classes": {
960
+ "vault:ldap/secretBackend:SecretBackend": "SecretBackend"
961
+ }
962
+ },
963
+ {
964
+ "pkg": "vault",
965
+ "mod": "ldap/secretBackendDynamicRole",
966
+ "fqn": "pulumi_vault.ldap",
967
+ "classes": {
968
+ "vault:ldap/secretBackendDynamicRole:SecretBackendDynamicRole": "SecretBackendDynamicRole"
969
+ }
970
+ },
971
+ {
972
+ "pkg": "vault",
973
+ "mod": "ldap/secretBackendLibrarySet",
974
+ "fqn": "pulumi_vault.ldap",
975
+ "classes": {
976
+ "vault:ldap/secretBackendLibrarySet:SecretBackendLibrarySet": "SecretBackendLibrarySet"
977
+ }
978
+ },
979
+ {
980
+ "pkg": "vault",
981
+ "mod": "ldap/secretBackendStaticRole",
982
+ "fqn": "pulumi_vault.ldap",
983
+ "classes": {
984
+ "vault:ldap/secretBackendStaticRole:SecretBackendStaticRole": "SecretBackendStaticRole"
985
+ }
986
+ },
987
+ {
988
+ "pkg": "vault",
989
+ "mod": "managed/keys",
990
+ "fqn": "pulumi_vault.managed",
991
+ "classes": {
992
+ "vault:managed/keys:Keys": "Keys"
993
+ }
994
+ },
995
+ {
996
+ "pkg": "vault",
997
+ "mod": "mongodbatlas/secretBackend",
998
+ "fqn": "pulumi_vault.mongodbatlas",
999
+ "classes": {
1000
+ "vault:mongodbatlas/secretBackend:SecretBackend": "SecretBackend"
1001
+ }
1002
+ },
1003
+ {
1004
+ "pkg": "vault",
1005
+ "mod": "mongodbatlas/secretRole",
1006
+ "fqn": "pulumi_vault.mongodbatlas",
1007
+ "classes": {
1008
+ "vault:mongodbatlas/secretRole:SecretRole": "SecretRole"
1009
+ }
1010
+ },
1011
+ {
1012
+ "pkg": "vault",
1013
+ "mod": "okta/authBackend",
1014
+ "fqn": "pulumi_vault.okta",
1015
+ "classes": {
1016
+ "vault:okta/authBackend:AuthBackend": "AuthBackend"
1017
+ }
1018
+ },
1019
+ {
1020
+ "pkg": "vault",
1021
+ "mod": "okta/authBackendGroup",
1022
+ "fqn": "pulumi_vault.okta",
1023
+ "classes": {
1024
+ "vault:okta/authBackendGroup:AuthBackendGroup": "AuthBackendGroup"
1025
+ }
1026
+ },
1027
+ {
1028
+ "pkg": "vault",
1029
+ "mod": "okta/authBackendUser",
1030
+ "fqn": "pulumi_vault.okta",
1031
+ "classes": {
1032
+ "vault:okta/authBackendUser:AuthBackendUser": "AuthBackendUser"
1033
+ }
1034
+ },
1035
+ {
1036
+ "pkg": "vault",
1037
+ "mod": "pkiSecret/backendAcmeEab",
1038
+ "fqn": "pulumi_vault.pkisecret",
1039
+ "classes": {
1040
+ "vault:pkiSecret/backendAcmeEab:BackendAcmeEab": "BackendAcmeEab"
1041
+ }
1042
+ },
1043
+ {
1044
+ "pkg": "vault",
1045
+ "mod": "pkiSecret/backendConfigAcme",
1046
+ "fqn": "pulumi_vault.pkisecret",
1047
+ "classes": {
1048
+ "vault:pkiSecret/backendConfigAcme:BackendConfigAcme": "BackendConfigAcme"
1049
+ }
1050
+ },
1051
+ {
1052
+ "pkg": "vault",
1053
+ "mod": "pkiSecret/backendConfigAutoTidy",
1054
+ "fqn": "pulumi_vault.pkisecret",
1055
+ "classes": {
1056
+ "vault:pkiSecret/backendConfigAutoTidy:BackendConfigAutoTidy": "BackendConfigAutoTidy"
1057
+ }
1058
+ },
1059
+ {
1060
+ "pkg": "vault",
1061
+ "mod": "pkiSecret/backendConfigCluster",
1062
+ "fqn": "pulumi_vault.pkisecret",
1063
+ "classes": {
1064
+ "vault:pkiSecret/backendConfigCluster:BackendConfigCluster": "BackendConfigCluster"
1065
+ }
1066
+ },
1067
+ {
1068
+ "pkg": "vault",
1069
+ "mod": "pkiSecret/backendConfigCmpv2",
1070
+ "fqn": "pulumi_vault.pkisecret",
1071
+ "classes": {
1072
+ "vault:pkiSecret/backendConfigCmpv2:BackendConfigCmpv2": "BackendConfigCmpv2"
1073
+ }
1074
+ },
1075
+ {
1076
+ "pkg": "vault",
1077
+ "mod": "pkiSecret/backendConfigEst",
1078
+ "fqn": "pulumi_vault.pkisecret",
1079
+ "classes": {
1080
+ "vault:pkiSecret/backendConfigEst:BackendConfigEst": "BackendConfigEst"
1081
+ }
1082
+ },
1083
+ {
1084
+ "pkg": "vault",
1085
+ "mod": "pkiSecret/backendConfigScep",
1086
+ "fqn": "pulumi_vault.pkisecret",
1087
+ "classes": {
1088
+ "vault:pkiSecret/backendConfigScep:BackendConfigScep": "BackendConfigScep"
1089
+ }
1090
+ },
1091
+ {
1092
+ "pkg": "vault",
1093
+ "mod": "pkiSecret/secretBackendCert",
1094
+ "fqn": "pulumi_vault.pkisecret",
1095
+ "classes": {
1096
+ "vault:pkiSecret/secretBackendCert:SecretBackendCert": "SecretBackendCert"
1097
+ }
1098
+ },
1099
+ {
1100
+ "pkg": "vault",
1101
+ "mod": "pkiSecret/secretBackendConfigCa",
1102
+ "fqn": "pulumi_vault.pkisecret",
1103
+ "classes": {
1104
+ "vault:pkiSecret/secretBackendConfigCa:SecretBackendConfigCa": "SecretBackendConfigCa"
1105
+ }
1106
+ },
1107
+ {
1108
+ "pkg": "vault",
1109
+ "mod": "pkiSecret/secretBackendConfigIssuers",
1110
+ "fqn": "pulumi_vault.pkisecret",
1111
+ "classes": {
1112
+ "vault:pkiSecret/secretBackendConfigIssuers:SecretBackendConfigIssuers": "SecretBackendConfigIssuers"
1113
+ }
1114
+ },
1115
+ {
1116
+ "pkg": "vault",
1117
+ "mod": "pkiSecret/secretBackendConfigUrls",
1118
+ "fqn": "pulumi_vault.pkisecret",
1119
+ "classes": {
1120
+ "vault:pkiSecret/secretBackendConfigUrls:SecretBackendConfigUrls": "SecretBackendConfigUrls"
1121
+ }
1122
+ },
1123
+ {
1124
+ "pkg": "vault",
1125
+ "mod": "pkiSecret/secretBackendCrlConfig",
1126
+ "fqn": "pulumi_vault.pkisecret",
1127
+ "classes": {
1128
+ "vault:pkiSecret/secretBackendCrlConfig:SecretBackendCrlConfig": "SecretBackendCrlConfig"
1129
+ }
1130
+ },
1131
+ {
1132
+ "pkg": "vault",
1133
+ "mod": "pkiSecret/secretBackendIntermediateCertRequest",
1134
+ "fqn": "pulumi_vault.pkisecret",
1135
+ "classes": {
1136
+ "vault:pkiSecret/secretBackendIntermediateCertRequest:SecretBackendIntermediateCertRequest": "SecretBackendIntermediateCertRequest"
1137
+ }
1138
+ },
1139
+ {
1140
+ "pkg": "vault",
1141
+ "mod": "pkiSecret/secretBackendIntermediateSetSigned",
1142
+ "fqn": "pulumi_vault.pkisecret",
1143
+ "classes": {
1144
+ "vault:pkiSecret/secretBackendIntermediateSetSigned:SecretBackendIntermediateSetSigned": "SecretBackendIntermediateSetSigned"
1145
+ }
1146
+ },
1147
+ {
1148
+ "pkg": "vault",
1149
+ "mod": "pkiSecret/secretBackendIssuer",
1150
+ "fqn": "pulumi_vault.pkisecret",
1151
+ "classes": {
1152
+ "vault:pkiSecret/secretBackendIssuer:SecretBackendIssuer": "SecretBackendIssuer"
1153
+ }
1154
+ },
1155
+ {
1156
+ "pkg": "vault",
1157
+ "mod": "pkiSecret/secretBackendKey",
1158
+ "fqn": "pulumi_vault.pkisecret",
1159
+ "classes": {
1160
+ "vault:pkiSecret/secretBackendKey:SecretBackendKey": "SecretBackendKey"
1161
+ }
1162
+ },
1163
+ {
1164
+ "pkg": "vault",
1165
+ "mod": "pkiSecret/secretBackendRole",
1166
+ "fqn": "pulumi_vault.pkisecret",
1167
+ "classes": {
1168
+ "vault:pkiSecret/secretBackendRole:SecretBackendRole": "SecretBackendRole"
1169
+ }
1170
+ },
1171
+ {
1172
+ "pkg": "vault",
1173
+ "mod": "pkiSecret/secretBackendRootCert",
1174
+ "fqn": "pulumi_vault.pkisecret",
1175
+ "classes": {
1176
+ "vault:pkiSecret/secretBackendRootCert:SecretBackendRootCert": "SecretBackendRootCert"
1177
+ }
1178
+ },
1179
+ {
1180
+ "pkg": "vault",
1181
+ "mod": "pkiSecret/secretBackendRootSignIntermediate",
1182
+ "fqn": "pulumi_vault.pkisecret",
1183
+ "classes": {
1184
+ "vault:pkiSecret/secretBackendRootSignIntermediate:SecretBackendRootSignIntermediate": "SecretBackendRootSignIntermediate"
1185
+ }
1186
+ },
1187
+ {
1188
+ "pkg": "vault",
1189
+ "mod": "pkiSecret/secretBackendSign",
1190
+ "fqn": "pulumi_vault.pkisecret",
1191
+ "classes": {
1192
+ "vault:pkiSecret/secretBackendSign:SecretBackendSign": "SecretBackendSign"
1193
+ }
1194
+ },
1195
+ {
1196
+ "pkg": "vault",
1197
+ "mod": "rabbitMq/secretBackend",
1198
+ "fqn": "pulumi_vault.rabbitmq",
1199
+ "classes": {
1200
+ "vault:rabbitMq/secretBackend:SecretBackend": "SecretBackend"
1201
+ }
1202
+ },
1203
+ {
1204
+ "pkg": "vault",
1205
+ "mod": "rabbitMq/secretBackendRole",
1206
+ "fqn": "pulumi_vault.rabbitmq",
1207
+ "classes": {
1208
+ "vault:rabbitMq/secretBackendRole:SecretBackendRole": "SecretBackendRole"
1209
+ }
1210
+ },
1211
+ {
1212
+ "pkg": "vault",
1213
+ "mod": "saml/authBackend",
1214
+ "fqn": "pulumi_vault.saml",
1215
+ "classes": {
1216
+ "vault:saml/authBackend:AuthBackend": "AuthBackend"
1217
+ }
1218
+ },
1219
+ {
1220
+ "pkg": "vault",
1221
+ "mod": "saml/authBackendRole",
1222
+ "fqn": "pulumi_vault.saml",
1223
+ "classes": {
1224
+ "vault:saml/authBackendRole:AuthBackendRole": "AuthBackendRole"
1225
+ }
1226
+ },
1227
+ {
1228
+ "pkg": "vault",
1229
+ "mod": "secrets/syncAssociation",
1230
+ "fqn": "pulumi_vault.secrets",
1231
+ "classes": {
1232
+ "vault:secrets/syncAssociation:SyncAssociation": "SyncAssociation"
1233
+ }
1234
+ },
1235
+ {
1236
+ "pkg": "vault",
1237
+ "mod": "secrets/syncAwsDestination",
1238
+ "fqn": "pulumi_vault.secrets",
1239
+ "classes": {
1240
+ "vault:secrets/syncAwsDestination:SyncAwsDestination": "SyncAwsDestination"
1241
+ }
1242
+ },
1243
+ {
1244
+ "pkg": "vault",
1245
+ "mod": "secrets/syncAzureDestination",
1246
+ "fqn": "pulumi_vault.secrets",
1247
+ "classes": {
1248
+ "vault:secrets/syncAzureDestination:SyncAzureDestination": "SyncAzureDestination"
1249
+ }
1250
+ },
1251
+ {
1252
+ "pkg": "vault",
1253
+ "mod": "secrets/syncConfig",
1254
+ "fqn": "pulumi_vault.secrets",
1255
+ "classes": {
1256
+ "vault:secrets/syncConfig:SyncConfig": "SyncConfig"
1257
+ }
1258
+ },
1259
+ {
1260
+ "pkg": "vault",
1261
+ "mod": "secrets/syncGcpDestination",
1262
+ "fqn": "pulumi_vault.secrets",
1263
+ "classes": {
1264
+ "vault:secrets/syncGcpDestination:SyncGcpDestination": "SyncGcpDestination"
1265
+ }
1266
+ },
1267
+ {
1268
+ "pkg": "vault",
1269
+ "mod": "secrets/syncGhDestination",
1270
+ "fqn": "pulumi_vault.secrets",
1271
+ "classes": {
1272
+ "vault:secrets/syncGhDestination:SyncGhDestination": "SyncGhDestination"
1273
+ }
1274
+ },
1275
+ {
1276
+ "pkg": "vault",
1277
+ "mod": "secrets/syncGithubApps",
1278
+ "fqn": "pulumi_vault.secrets",
1279
+ "classes": {
1280
+ "vault:secrets/syncGithubApps:SyncGithubApps": "SyncGithubApps"
1281
+ }
1282
+ },
1283
+ {
1284
+ "pkg": "vault",
1285
+ "mod": "secrets/syncVercelDestination",
1286
+ "fqn": "pulumi_vault.secrets",
1287
+ "classes": {
1288
+ "vault:secrets/syncVercelDestination:SyncVercelDestination": "SyncVercelDestination"
1289
+ }
1290
+ },
1291
+ {
1292
+ "pkg": "vault",
1293
+ "mod": "ssh/secretBackendCa",
1294
+ "fqn": "pulumi_vault.ssh",
1295
+ "classes": {
1296
+ "vault:ssh/secretBackendCa:SecretBackendCa": "SecretBackendCa"
1297
+ }
1298
+ },
1299
+ {
1300
+ "pkg": "vault",
1301
+ "mod": "ssh/secretBackendRole",
1302
+ "fqn": "pulumi_vault.ssh",
1303
+ "classes": {
1304
+ "vault:ssh/secretBackendRole:SecretBackendRole": "SecretBackendRole"
1305
+ }
1306
+ },
1307
+ {
1308
+ "pkg": "vault",
1309
+ "mod": "terraformcloud/secretBackend",
1310
+ "fqn": "pulumi_vault.terraformcloud",
1311
+ "classes": {
1312
+ "vault:terraformcloud/secretBackend:SecretBackend": "SecretBackend"
1313
+ }
1314
+ },
1315
+ {
1316
+ "pkg": "vault",
1317
+ "mod": "terraformcloud/secretCreds",
1318
+ "fqn": "pulumi_vault.terraformcloud",
1319
+ "classes": {
1320
+ "vault:terraformcloud/secretCreds:SecretCreds": "SecretCreds"
1321
+ }
1322
+ },
1323
+ {
1324
+ "pkg": "vault",
1325
+ "mod": "terraformcloud/secretRole",
1326
+ "fqn": "pulumi_vault.terraformcloud",
1327
+ "classes": {
1328
+ "vault:terraformcloud/secretRole:SecretRole": "SecretRole"
1329
+ }
1330
+ },
1331
+ {
1332
+ "pkg": "vault",
1333
+ "mod": "tokenauth/authBackendRole",
1334
+ "fqn": "pulumi_vault.tokenauth",
1335
+ "classes": {
1336
+ "vault:tokenauth/authBackendRole:AuthBackendRole": "AuthBackendRole"
1337
+ }
1338
+ },
1339
+ {
1340
+ "pkg": "vault",
1341
+ "mod": "transform/alphabet",
1342
+ "fqn": "pulumi_vault.transform",
1343
+ "classes": {
1344
+ "vault:transform/alphabet:Alphabet": "Alphabet"
1345
+ }
1346
+ },
1347
+ {
1348
+ "pkg": "vault",
1349
+ "mod": "transform/role",
1350
+ "fqn": "pulumi_vault.transform",
1351
+ "classes": {
1352
+ "vault:transform/role:Role": "Role"
1353
+ }
1354
+ },
1355
+ {
1356
+ "pkg": "vault",
1357
+ "mod": "transform/template",
1358
+ "fqn": "pulumi_vault.transform",
1359
+ "classes": {
1360
+ "vault:transform/template:Template": "Template"
1361
+ }
1362
+ },
1363
+ {
1364
+ "pkg": "vault",
1365
+ "mod": "transform/transformation",
1366
+ "fqn": "pulumi_vault.transform",
1367
+ "classes": {
1368
+ "vault:transform/transformation:Transformation": "Transformation"
1369
+ }
1370
+ },
1371
+ {
1372
+ "pkg": "vault",
1373
+ "mod": "transit/secretBackendKey",
1374
+ "fqn": "pulumi_vault.transit",
1375
+ "classes": {
1376
+ "vault:transit/secretBackendKey:SecretBackendKey": "SecretBackendKey"
1377
+ }
1378
+ },
1379
+ {
1380
+ "pkg": "vault",
1381
+ "mod": "transit/secretCacheConfig",
1382
+ "fqn": "pulumi_vault.transit",
1383
+ "classes": {
1384
+ "vault:transit/secretCacheConfig:SecretCacheConfig": "SecretCacheConfig"
1385
+ }
1386
+ }
1387
+ ]
1388
+ """,
1389
+ resource_packages="""
1390
+ [
1391
+ {
1392
+ "pkg": "vault",
1393
+ "token": "pulumi:providers:vault",
1394
+ "fqn": "pulumi_vault",
1395
+ "class": "Provider"
1396
+ }
1397
+ ]
1398
+ """
1399
+ )