pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +26 -9
  5. pulumi_vault/ad/secret_backend.py +16 -142
  6. pulumi_vault/ad/secret_library.py +16 -9
  7. pulumi_vault/ad/secret_role.py +14 -9
  8. pulumi_vault/alicloud/auth_backend_role.py +76 -190
  9. pulumi_vault/approle/auth_backend_login.py +12 -7
  10. pulumi_vault/approle/auth_backend_role.py +77 -191
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
  13. pulumi_vault/audit.py +30 -21
  14. pulumi_vault/audit_request_header.py +11 -2
  15. pulumi_vault/auth_backend.py +66 -14
  16. pulumi_vault/aws/auth_backend_cert.py +18 -9
  17. pulumi_vault/aws/auth_backend_client.py +267 -22
  18. pulumi_vault/aws/auth_backend_config_identity.py +14 -9
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +77 -191
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
  24. pulumi_vault/aws/auth_backend_sts_role.py +14 -9
  25. pulumi_vault/aws/get_access_credentials.py +38 -9
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +77 -9
  28. pulumi_vault/aws/secret_backend_role.py +185 -9
  29. pulumi_vault/aws/secret_backend_static_role.py +20 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +153 -15
  32. pulumi_vault/azure/auth_backend_role.py +77 -191
  33. pulumi_vault/azure/backend.py +227 -21
  34. pulumi_vault/azure/backend_role.py +42 -37
  35. pulumi_vault/azure/get_access_credentials.py +41 -7
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -267
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +28 -19
  44. pulumi_vault/consul/secret_backend_role.py +18 -78
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +119 -112
  48. pulumi_vault/database/secret_backend_role.py +31 -22
  49. pulumi_vault/database/secret_backend_static_role.py +87 -13
  50. pulumi_vault/database/secrets_mount.py +427 -136
  51. pulumi_vault/egp_policy.py +16 -11
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +250 -33
  54. pulumi_vault/gcp/auth_backend_role.py +77 -269
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -5
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -12
  58. pulumi_vault/gcp/secret_impersonated_account.py +76 -15
  59. pulumi_vault/gcp/secret_roleset.py +31 -24
  60. pulumi_vault/gcp/secret_static_account.py +39 -32
  61. pulumi_vault/generic/endpoint.py +24 -17
  62. pulumi_vault/generic/get_secret.py +64 -8
  63. pulumi_vault/generic/secret.py +21 -16
  64. pulumi_vault/get_auth_backend.py +24 -7
  65. pulumi_vault/get_auth_backends.py +51 -9
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -11
  69. pulumi_vault/get_policy_document.py +34 -19
  70. pulumi_vault/get_raft_autopilot_state.py +29 -10
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +19 -14
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +16 -11
  75. pulumi_vault/github/user.py +16 -11
  76. pulumi_vault/identity/entity.py +20 -13
  77. pulumi_vault/identity/entity_alias.py +20 -13
  78. pulumi_vault/identity/entity_policies.py +28 -11
  79. pulumi_vault/identity/get_entity.py +42 -10
  80. pulumi_vault/identity/get_group.py +47 -9
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -7
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -9
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -10
  84. pulumi_vault/identity/group.py +58 -39
  85. pulumi_vault/identity/group_alias.py +16 -9
  86. pulumi_vault/identity/group_member_entity_ids.py +28 -66
  87. pulumi_vault/identity/group_member_group_ids.py +40 -19
  88. pulumi_vault/identity/group_policies.py +20 -7
  89. pulumi_vault/identity/mfa_duo.py +11 -6
  90. pulumi_vault/identity/mfa_login_enforcement.py +15 -6
  91. pulumi_vault/identity/mfa_okta.py +11 -6
  92. pulumi_vault/identity/mfa_pingid.py +7 -2
  93. pulumi_vault/identity/mfa_totp.py +7 -2
  94. pulumi_vault/identity/oidc.py +12 -7
  95. pulumi_vault/identity/oidc_assignment.py +24 -11
  96. pulumi_vault/identity/oidc_client.py +36 -23
  97. pulumi_vault/identity/oidc_key.py +30 -17
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
  99. pulumi_vault/identity/oidc_provider.py +36 -21
  100. pulumi_vault/identity/oidc_role.py +42 -21
  101. pulumi_vault/identity/oidc_scope.py +20 -13
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +45 -40
  105. pulumi_vault/jwt/auth_backend_role.py +133 -254
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +24 -19
  108. pulumi_vault/kmip/secret_role.py +14 -9
  109. pulumi_vault/kmip/secret_scope.py +14 -9
  110. pulumi_vault/kubernetes/auth_backend_config.py +57 -5
  111. pulumi_vault/kubernetes/auth_backend_role.py +70 -177
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -11
  115. pulumi_vault/kubernetes/secret_backend.py +316 -27
  116. pulumi_vault/kubernetes/secret_backend_role.py +137 -46
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +25 -8
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
  120. pulumi_vault/kv/get_secret_v2.py +85 -9
  121. pulumi_vault/kv/get_secrets_list.py +24 -11
  122. pulumi_vault/kv/get_secrets_list_v2.py +37 -15
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +23 -16
  125. pulumi_vault/kv/secret_backend_v2.py +20 -11
  126. pulumi_vault/kv/secret_v2.py +59 -50
  127. pulumi_vault/ldap/auth_backend.py +127 -166
  128. pulumi_vault/ldap/auth_backend_group.py +14 -9
  129. pulumi_vault/ldap/auth_backend_user.py +14 -9
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +354 -82
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +16 -9
  135. pulumi_vault/ldap/secret_backend_static_role.py +73 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +29 -57
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +18 -11
  140. pulumi_vault/mfa_okta.py +18 -11
  141. pulumi_vault/mfa_pingid.py +18 -11
  142. pulumi_vault/mfa_totp.py +24 -17
  143. pulumi_vault/mongodbatlas/secret_backend.py +20 -15
  144. pulumi_vault/mongodbatlas/secret_role.py +47 -38
  145. pulumi_vault/mount.py +391 -51
  146. pulumi_vault/namespace.py +68 -83
  147. pulumi_vault/nomad_secret_backend.py +18 -13
  148. pulumi_vault/nomad_secret_role.py +14 -9
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +485 -39
  151. pulumi_vault/okta/auth_backend_group.py +14 -9
  152. pulumi_vault/okta/auth_backend_user.py +14 -9
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +20 -13
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -9
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -8
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
  174. pulumi_vault/pkisecret/secret_backend_key.py +14 -9
  175. pulumi_vault/pkisecret/secret_backend_role.py +21 -14
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +14 -9
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +60 -6
  185. pulumi_vault/quota_rate_limit.py +56 -2
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +18 -13
  189. pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
  190. pulumi_vault/raft_autopilot.py +14 -9
  191. pulumi_vault/raft_snapshot_agent_config.py +129 -224
  192. pulumi_vault/rgp_policy.py +14 -9
  193. pulumi_vault/saml/auth_backend.py +22 -17
  194. pulumi_vault/saml/auth_backend_role.py +92 -197
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -71
  199. pulumi_vault/secrets/sync_aws_destination.py +242 -27
  200. pulumi_vault/secrets/sync_azure_destination.py +92 -31
  201. pulumi_vault/secrets/sync_config.py +9 -4
  202. pulumi_vault/secrets/sync_gcp_destination.py +158 -25
  203. pulumi_vault/secrets/sync_gh_destination.py +189 -13
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +74 -13
  206. pulumi_vault/ssh/_inputs.py +28 -28
  207. pulumi_vault/ssh/outputs.py +11 -28
  208. pulumi_vault/ssh/secret_backend_ca.py +108 -9
  209. pulumi_vault/ssh/secret_backend_role.py +85 -118
  210. pulumi_vault/terraformcloud/secret_backend.py +7 -54
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -20
  212. pulumi_vault/terraformcloud/secret_role.py +16 -74
  213. pulumi_vault/token.py +28 -23
  214. pulumi_vault/tokenauth/auth_backend_role.py +78 -199
  215. pulumi_vault/transform/alphabet.py +16 -9
  216. pulumi_vault/transform/get_decode.py +45 -17
  217. pulumi_vault/transform/get_encode.py +45 -17
  218. pulumi_vault/transform/role.py +16 -9
  219. pulumi_vault/transform/template.py +30 -21
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -21
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +27 -93
  224. pulumi_vault/transit/secret_cache_config.py +12 -7
  225. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,15 +4,70 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
13
18
  'AuthBackendTuneArgs',
19
+ 'AuthBackendTuneArgsDict',
14
20
  ]
15
21
 
22
+ MYPY = False
23
+
24
+ if not MYPY:
25
+ class AuthBackendTuneArgsDict(TypedDict):
26
+ allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
27
+ """
28
+ List of headers to whitelist and allowing
29
+ a plugin to include them in the response.
30
+ """
31
+ audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
32
+ """
33
+ Specifies the list of keys that will
34
+ not be HMAC'd by audit devices in the request data object.
35
+ """
36
+ audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
37
+ """
38
+ Specifies the list of keys that will
39
+ not be HMAC'd by audit devices in the response data object.
40
+ """
41
+ default_lease_ttl: NotRequired[pulumi.Input[str]]
42
+ """
43
+ Specifies the default time-to-live.
44
+ If set, this overrides the global default.
45
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
46
+ """
47
+ listing_visibility: NotRequired[pulumi.Input[str]]
48
+ """
49
+ Specifies whether to show this mount in
50
+ the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
51
+ """
52
+ max_lease_ttl: NotRequired[pulumi.Input[str]]
53
+ """
54
+ Specifies the maximum time-to-live.
55
+ If set, this overrides the global default.
56
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
57
+ """
58
+ passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
59
+ """
60
+ List of headers to whitelist and
61
+ pass from the request to the backend.
62
+ """
63
+ token_type: NotRequired[pulumi.Input[str]]
64
+ """
65
+ Specifies the type of tokens that should be returned by
66
+ the mount. Valid values are "default-service", "default-batch", "service", "batch".
67
+ """
68
+ elif False:
69
+ AuthBackendTuneArgsDict: TypeAlias = Mapping[str, Any]
70
+
16
71
  @pulumi.input_type
17
72
  class AuthBackendTuneArgs:
18
73
  def __init__(__self__, *,
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
  from . import outputs
12
17
  from ._inputs import *
@@ -44,7 +49,7 @@ class AuthBackendArgs:
44
49
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
45
50
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
46
51
  The value should not contain leading or trailing forward slashes.
47
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
52
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
48
53
  *Available only for Vault Enterprise*.
49
54
  :param pulumi.Input[int] organization_id: The ID of the organization users must be part of.
50
55
  Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
@@ -168,7 +173,7 @@ class AuthBackendArgs:
168
173
  """
169
174
  The namespace to provision the resource in.
170
175
  The value should not contain leading or trailing forward slashes.
171
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
176
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
172
177
  *Available only for Vault Enterprise*.
173
178
  """
174
179
  return pulumi.get(self, "namespace")
@@ -372,7 +377,7 @@ class _AuthBackendState:
372
377
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
373
378
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
374
379
  The value should not contain leading or trailing forward slashes.
375
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
380
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
376
381
  *Available only for Vault Enterprise*.
377
382
  :param pulumi.Input[str] organization: The organization configured users must be part of.
378
383
  :param pulumi.Input[int] organization_id: The ID of the organization users must be part of.
@@ -500,7 +505,7 @@ class _AuthBackendState:
500
505
  """
501
506
  The namespace to provision the resource in.
502
507
  The value should not contain leading or trailing forward slashes.
503
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
508
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
504
509
  *Available only for Vault Enterprise*.
505
510
  """
506
511
  return pulumi.get(self, "namespace")
@@ -705,7 +710,7 @@ class AuthBackend(pulumi.CustomResource):
705
710
  token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
706
711
  token_ttl: Optional[pulumi.Input[int]] = None,
707
712
  token_type: Optional[pulumi.Input[str]] = None,
708
- tune: Optional[pulumi.Input[pulumi.InputType['AuthBackendTuneArgs']]] = None,
713
+ tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
709
714
  __props__=None):
710
715
  """
711
716
  Manages a GitHub Auth mount in a Vault server. See the [Vault
@@ -726,7 +731,7 @@ class AuthBackend(pulumi.CustomResource):
726
731
  GitHub authentication mounts can be imported using the `path`, e.g.
727
732
 
728
733
  ```sh
729
- $ pulumi import vault:github/authBackend:AuthBackend example github
734
+ $ pulumi import vault:github/authBackend:AuthBackend example github
730
735
  ```
731
736
 
732
737
  :param str resource_name: The name of the resource.
@@ -739,7 +744,7 @@ class AuthBackend(pulumi.CustomResource):
739
744
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
740
745
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
741
746
  The value should not contain leading or trailing forward slashes.
742
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
747
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
743
748
  *Available only for Vault Enterprise*.
744
749
  :param pulumi.Input[str] organization: The organization configured users must be part of.
745
750
  :param pulumi.Input[int] organization_id: The ID of the organization users must be part of.
@@ -769,7 +774,7 @@ class AuthBackend(pulumi.CustomResource):
769
774
  Its current value will be referenced at renewal time.
770
775
  :param pulumi.Input[str] token_type: Specifies the type of tokens that should be returned by
771
776
  the mount. Valid values are "default-service", "default-batch", "service", "batch".
772
- :param pulumi.Input[pulumi.InputType['AuthBackendTuneArgs']] tune: Extra configuration block. Structure is documented below.
777
+ :param pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']] tune: Extra configuration block. Structure is documented below.
773
778
 
774
779
  The `tune` block is used to tune the auth backend:
775
780
  """
@@ -798,7 +803,7 @@ class AuthBackend(pulumi.CustomResource):
798
803
  GitHub authentication mounts can be imported using the `path`, e.g.
799
804
 
800
805
  ```sh
801
- $ pulumi import vault:github/authBackend:AuthBackend example github
806
+ $ pulumi import vault:github/authBackend:AuthBackend example github
802
807
  ```
803
808
 
804
809
  :param str resource_name: The name of the resource.
@@ -832,7 +837,7 @@ class AuthBackend(pulumi.CustomResource):
832
837
  token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
833
838
  token_ttl: Optional[pulumi.Input[int]] = None,
834
839
  token_type: Optional[pulumi.Input[str]] = None,
835
- tune: Optional[pulumi.Input[pulumi.InputType['AuthBackendTuneArgs']]] = None,
840
+ tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
836
841
  __props__=None):
837
842
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
838
843
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -889,7 +894,7 @@ class AuthBackend(pulumi.CustomResource):
889
894
  token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
890
895
  token_ttl: Optional[pulumi.Input[int]] = None,
891
896
  token_type: Optional[pulumi.Input[str]] = None,
892
- tune: Optional[pulumi.Input[pulumi.InputType['AuthBackendTuneArgs']]] = None) -> 'AuthBackend':
897
+ tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None) -> 'AuthBackend':
893
898
  """
894
899
  Get an existing AuthBackend resource's state with the given name, id, and optional extra
895
900
  properties used to qualify the lookup.
@@ -906,7 +911,7 @@ class AuthBackend(pulumi.CustomResource):
906
911
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
907
912
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
908
913
  The value should not contain leading or trailing forward slashes.
909
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
914
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
910
915
  *Available only for Vault Enterprise*.
911
916
  :param pulumi.Input[str] organization: The organization configured users must be part of.
912
917
  :param pulumi.Input[int] organization_id: The ID of the organization users must be part of.
@@ -936,7 +941,7 @@ class AuthBackend(pulumi.CustomResource):
936
941
  Its current value will be referenced at renewal time.
937
942
  :param pulumi.Input[str] token_type: Specifies the type of tokens that should be returned by
938
943
  the mount. Valid values are "default-service", "default-batch", "service", "batch".
939
- :param pulumi.Input[pulumi.InputType['AuthBackendTuneArgs']] tune: Extra configuration block. Structure is documented below.
944
+ :param pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']] tune: Extra configuration block. Structure is documented below.
940
945
 
941
946
  The `tune` block is used to tune the auth backend:
942
947
  """
@@ -1005,7 +1010,7 @@ class AuthBackend(pulumi.CustomResource):
1005
1010
  """
1006
1011
  The namespace to provision the resource in.
1007
1012
  The value should not contain leading or trailing forward slashes.
1008
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1013
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1009
1014
  *Available only for Vault Enterprise*.
1010
1015
  """
1011
1016
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['TeamArgs', 'Team']
@@ -25,7 +30,7 @@ class TeamArgs:
25
30
  if not specified.
26
31
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
27
32
  The value should not contain leading or trailing forward slashes.
28
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
33
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
29
34
  *Available only for Vault Enterprise*.
30
35
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: An array of strings specifying the policies to be set on tokens
31
36
  issued using this role.
@@ -69,7 +74,7 @@ class TeamArgs:
69
74
  """
70
75
  The namespace to provision the resource in.
71
76
  The value should not contain leading or trailing forward slashes.
72
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
77
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
73
78
  *Available only for Vault Enterprise*.
74
79
  """
75
80
  return pulumi.get(self, "namespace")
@@ -105,7 +110,7 @@ class _TeamState:
105
110
  if not specified.
106
111
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
107
112
  The value should not contain leading or trailing forward slashes.
108
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
113
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
109
114
  *Available only for Vault Enterprise*.
110
115
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: An array of strings specifying the policies to be set on tokens
111
116
  issued using this role.
@@ -139,7 +144,7 @@ class _TeamState:
139
144
  """
140
145
  The namespace to provision the resource in.
141
146
  The value should not contain leading or trailing forward slashes.
142
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
147
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
143
148
  *Available only for Vault Enterprise*.
144
149
  """
145
150
  return pulumi.get(self, "namespace")
@@ -196,7 +201,7 @@ class Team(pulumi.CustomResource):
196
201
  import pulumi_vault as vault
197
202
 
198
203
  example = vault.github.AuthBackend("example", organization="myorg")
199
- tf_devs = vault.github.Team("tfDevs",
204
+ tf_devs = vault.github.Team("tf_devs",
200
205
  backend=example.id,
201
206
  team="terraform-developers",
202
207
  policies=[
@@ -210,7 +215,7 @@ class Team(pulumi.CustomResource):
210
215
  Github team mappings can be imported using the `path`, e.g.
211
216
 
212
217
  ```sh
213
- $ pulumi import vault:github/team:Team tf_devs auth/github/map/teams/terraform-developers
218
+ $ pulumi import vault:github/team:Team tf_devs auth/github/map/teams/terraform-developers
214
219
  ```
215
220
 
216
221
  :param str resource_name: The name of the resource.
@@ -219,7 +224,7 @@ class Team(pulumi.CustomResource):
219
224
  if not specified.
220
225
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
221
226
  The value should not contain leading or trailing forward slashes.
222
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
227
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
223
228
  *Available only for Vault Enterprise*.
224
229
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: An array of strings specifying the policies to be set on tokens
225
230
  issued using this role.
@@ -243,7 +248,7 @@ class Team(pulumi.CustomResource):
243
248
  import pulumi_vault as vault
244
249
 
245
250
  example = vault.github.AuthBackend("example", organization="myorg")
246
- tf_devs = vault.github.Team("tfDevs",
251
+ tf_devs = vault.github.Team("tf_devs",
247
252
  backend=example.id,
248
253
  team="terraform-developers",
249
254
  policies=[
@@ -257,7 +262,7 @@ class Team(pulumi.CustomResource):
257
262
  Github team mappings can be imported using the `path`, e.g.
258
263
 
259
264
  ```sh
260
- $ pulumi import vault:github/team:Team tf_devs auth/github/map/teams/terraform-developers
265
+ $ pulumi import vault:github/team:Team tf_devs auth/github/map/teams/terraform-developers
261
266
  ```
262
267
 
263
268
  :param str resource_name: The name of the resource.
@@ -319,7 +324,7 @@ class Team(pulumi.CustomResource):
319
324
  if not specified.
320
325
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
321
326
  The value should not contain leading or trailing forward slashes.
322
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
327
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
323
328
  *Available only for Vault Enterprise*.
324
329
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: An array of strings specifying the policies to be set on tokens
325
330
  issued using this role.
@@ -350,7 +355,7 @@ class Team(pulumi.CustomResource):
350
355
  """
351
356
  The namespace to provision the resource in.
352
357
  The value should not contain leading or trailing forward slashes.
353
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
358
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
354
359
  *Available only for Vault Enterprise*.
355
360
  """
356
361
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['UserArgs', 'User']
@@ -25,7 +30,7 @@ class UserArgs:
25
30
  if not specified.
26
31
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
27
32
  The value should not contain leading or trailing forward slashes.
28
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
33
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
29
34
  *Available only for Vault Enterprise*.
30
35
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: An array of strings specifying the policies to be set on tokens issued
31
36
  using this role.
@@ -69,7 +74,7 @@ class UserArgs:
69
74
  """
70
75
  The namespace to provision the resource in.
71
76
  The value should not contain leading or trailing forward slashes.
72
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
77
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
73
78
  *Available only for Vault Enterprise*.
74
79
  """
75
80
  return pulumi.get(self, "namespace")
@@ -105,7 +110,7 @@ class _UserState:
105
110
  if not specified.
106
111
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
107
112
  The value should not contain leading or trailing forward slashes.
108
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
113
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
109
114
  *Available only for Vault Enterprise*.
110
115
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: An array of strings specifying the policies to be set on tokens issued
111
116
  using this role.
@@ -139,7 +144,7 @@ class _UserState:
139
144
  """
140
145
  The namespace to provision the resource in.
141
146
  The value should not contain leading or trailing forward slashes.
142
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
147
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
143
148
  *Available only for Vault Enterprise*.
144
149
  """
145
150
  return pulumi.get(self, "namespace")
@@ -196,7 +201,7 @@ class User(pulumi.CustomResource):
196
201
  import pulumi_vault as vault
197
202
 
198
203
  example = vault.github.AuthBackend("example", organization="myorg")
199
- tf_user = vault.github.User("tfUser",
204
+ tf_user = vault.github.User("tf_user",
200
205
  backend=example.id,
201
206
  user="john.doe",
202
207
  policies=[
@@ -210,7 +215,7 @@ class User(pulumi.CustomResource):
210
215
  Github user mappings can be imported using the `path`, e.g.
211
216
 
212
217
  ```sh
213
- $ pulumi import vault:github/user:User tf_user auth/github/map/users/john.doe
218
+ $ pulumi import vault:github/user:User tf_user auth/github/map/users/john.doe
214
219
  ```
215
220
 
216
221
  :param str resource_name: The name of the resource.
@@ -219,7 +224,7 @@ class User(pulumi.CustomResource):
219
224
  if not specified.
220
225
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
221
226
  The value should not contain leading or trailing forward slashes.
222
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
227
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
223
228
  *Available only for Vault Enterprise*.
224
229
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: An array of strings specifying the policies to be set on tokens issued
225
230
  using this role.
@@ -243,7 +248,7 @@ class User(pulumi.CustomResource):
243
248
  import pulumi_vault as vault
244
249
 
245
250
  example = vault.github.AuthBackend("example", organization="myorg")
246
- tf_user = vault.github.User("tfUser",
251
+ tf_user = vault.github.User("tf_user",
247
252
  backend=example.id,
248
253
  user="john.doe",
249
254
  policies=[
@@ -257,7 +262,7 @@ class User(pulumi.CustomResource):
257
262
  Github user mappings can be imported using the `path`, e.g.
258
263
 
259
264
  ```sh
260
- $ pulumi import vault:github/user:User tf_user auth/github/map/users/john.doe
265
+ $ pulumi import vault:github/user:User tf_user auth/github/map/users/john.doe
261
266
  ```
262
267
 
263
268
  :param str resource_name: The name of the resource.
@@ -319,7 +324,7 @@ class User(pulumi.CustomResource):
319
324
  if not specified.
320
325
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
321
326
  The value should not contain leading or trailing forward slashes.
322
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
327
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
323
328
  *Available only for Vault Enterprise*.
324
329
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: An array of strings specifying the policies to be set on tokens issued
325
330
  using this role.
@@ -350,7 +355,7 @@ class User(pulumi.CustomResource):
350
355
  """
351
356
  The namespace to provision the resource in.
352
357
  The value should not contain leading or trailing forward slashes.
353
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
358
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
354
359
  *Available only for Vault Enterprise*.
355
360
  """
356
361
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['EntityArgs', 'Entity']
@@ -28,7 +33,7 @@ class EntityArgs:
28
33
  :param pulumi.Input[str] name: Name of the identity entity to create.
29
34
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
30
35
  The value should not contain leading or trailing forward slashes.
31
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
36
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
32
37
  *Available only for Vault Enterprise*.
33
38
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: A list of policies to apply to the entity.
34
39
  """
@@ -99,7 +104,7 @@ class EntityArgs:
99
104
  """
100
105
  The namespace to provision the resource in.
101
106
  The value should not contain leading or trailing forward slashes.
102
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
107
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
103
108
  *Available only for Vault Enterprise*.
104
109
  """
105
110
  return pulumi.get(self, "namespace")
@@ -138,7 +143,7 @@ class _EntityState:
138
143
  :param pulumi.Input[str] name: Name of the identity entity to create.
139
144
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
140
145
  The value should not contain leading or trailing forward slashes.
141
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
146
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
142
147
  *Available only for Vault Enterprise*.
143
148
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: A list of policies to apply to the entity.
144
149
  """
@@ -209,7 +214,7 @@ class _EntityState:
209
214
  """
210
215
  The namespace to provision the resource in.
211
216
  The value should not contain leading or trailing forward slashes.
212
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
217
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
213
218
  *Available only for Vault Enterprise*.
214
219
  """
215
220
  return pulumi.get(self, "namespace")
@@ -251,10 +256,11 @@ class Entity(pulumi.CustomResource):
251
256
  import pulumi_vault as vault
252
257
 
253
258
  test = vault.identity.Entity("test",
259
+ name="tester1",
260
+ policies=["test"],
254
261
  metadata={
255
262
  "foo": "bar",
256
- },
257
- policies=["test"])
263
+ })
258
264
  ```
259
265
 
260
266
  ## Import
@@ -262,7 +268,7 @@ class Entity(pulumi.CustomResource):
262
268
  Identity entity can be imported using the `id`, e.g.
263
269
 
264
270
  ```sh
265
- $ pulumi import vault:identity/entity:Entity test "ae6f8ued-0f1a-9f6b-2915-1a2be20dc053"
271
+ $ pulumi import vault:identity/entity:Entity test "ae6f8ued-0f1a-9f6b-2915-1a2be20dc053"
266
272
  ```
267
273
 
268
274
  :param str resource_name: The name of the resource.
@@ -273,7 +279,7 @@ class Entity(pulumi.CustomResource):
273
279
  :param pulumi.Input[str] name: Name of the identity entity to create.
274
280
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
275
281
  The value should not contain leading or trailing forward slashes.
276
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
282
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
277
283
  *Available only for Vault Enterprise*.
278
284
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: A list of policies to apply to the entity.
279
285
  """
@@ -291,10 +297,11 @@ class Entity(pulumi.CustomResource):
291
297
  import pulumi_vault as vault
292
298
 
293
299
  test = vault.identity.Entity("test",
300
+ name="tester1",
301
+ policies=["test"],
294
302
  metadata={
295
303
  "foo": "bar",
296
- },
297
- policies=["test"])
304
+ })
298
305
  ```
299
306
 
300
307
  ## Import
@@ -302,7 +309,7 @@ class Entity(pulumi.CustomResource):
302
309
  Identity entity can be imported using the `id`, e.g.
303
310
 
304
311
  ```sh
305
- $ pulumi import vault:identity/entity:Entity test "ae6f8ued-0f1a-9f6b-2915-1a2be20dc053"
312
+ $ pulumi import vault:identity/entity:Entity test "ae6f8ued-0f1a-9f6b-2915-1a2be20dc053"
306
313
  ```
307
314
 
308
315
  :param str resource_name: The name of the resource.
@@ -370,7 +377,7 @@ class Entity(pulumi.CustomResource):
370
377
  :param pulumi.Input[str] name: Name of the identity entity to create.
371
378
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
372
379
  The value should not contain leading or trailing forward slashes.
373
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
380
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
374
381
  *Available only for Vault Enterprise*.
375
382
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: A list of policies to apply to the entity.
376
383
  """
@@ -424,7 +431,7 @@ class Entity(pulumi.CustomResource):
424
431
  """
425
432
  The namespace to provision the resource in.
426
433
  The value should not contain leading or trailing forward slashes.
427
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
434
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
428
435
  *Available only for Vault Enterprise*.
429
436
  """
430
437
  return pulumi.get(self, "namespace")