python-terrascript/terrascript/data/hashicorp/vault.py

93 lines
1.7 KiB
Python

# terrascript/data/hashicorp/vault.py
# Automatically generated by tools/makecode.py (24-Sep-2021 15:30:04 UTC)
import terrascript
class vault_ad_access_credentials(terrascript.Data):
pass
class vault_approle_auth_backend_role_id(terrascript.Data):
pass
class vault_auth_backend(terrascript.Data):
pass
class vault_aws_access_credentials(terrascript.Data):
pass
class vault_azure_access_credentials(terrascript.Data):
pass
class vault_gcp_auth_backend_role(terrascript.Data):
pass
class vault_generic_secret(terrascript.Data):
pass
class vault_identity_entity(terrascript.Data):
pass
class vault_identity_group(terrascript.Data):
pass
class vault_kubernetes_auth_backend_config(terrascript.Data):
pass
class vault_kubernetes_auth_backend_role(terrascript.Data):
pass
class vault_nomad_access_token(terrascript.Data):
pass
class vault_policy_document(terrascript.Data):
pass
class vault_transform_decode(terrascript.Data):
pass
class vault_transform_encode(terrascript.Data):
pass
class vault_transit_decrypt(terrascript.Data):
pass
class vault_transit_encrypt(terrascript.Data):
pass
__all__ = [
"vault_ad_access_credentials",
"vault_approle_auth_backend_role_id",
"vault_auth_backend",
"vault_aws_access_credentials",
"vault_azure_access_credentials",
"vault_gcp_auth_backend_role",
"vault_generic_secret",
"vault_identity_entity",
"vault_identity_group",
"vault_kubernetes_auth_backend_config",
"vault_kubernetes_auth_backend_role",
"vault_nomad_access_token",
"vault_policy_document",
"vault_transform_decode",
"vault_transform_encode",
"vault_transit_decrypt",
"vault_transit_encrypt",
]