pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +26 -9
  5. pulumi_vault/ad/secret_backend.py +16 -142
  6. pulumi_vault/ad/secret_library.py +16 -9
  7. pulumi_vault/ad/secret_role.py +14 -9
  8. pulumi_vault/alicloud/auth_backend_role.py +76 -190
  9. pulumi_vault/approle/auth_backend_login.py +12 -7
  10. pulumi_vault/approle/auth_backend_role.py +77 -191
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
  13. pulumi_vault/audit.py +30 -21
  14. pulumi_vault/audit_request_header.py +11 -2
  15. pulumi_vault/auth_backend.py +66 -14
  16. pulumi_vault/aws/auth_backend_cert.py +18 -9
  17. pulumi_vault/aws/auth_backend_client.py +267 -22
  18. pulumi_vault/aws/auth_backend_config_identity.py +14 -9
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +77 -191
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
  24. pulumi_vault/aws/auth_backend_sts_role.py +14 -9
  25. pulumi_vault/aws/get_access_credentials.py +38 -9
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +77 -9
  28. pulumi_vault/aws/secret_backend_role.py +185 -9
  29. pulumi_vault/aws/secret_backend_static_role.py +20 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +153 -15
  32. pulumi_vault/azure/auth_backend_role.py +77 -191
  33. pulumi_vault/azure/backend.py +227 -21
  34. pulumi_vault/azure/backend_role.py +42 -37
  35. pulumi_vault/azure/get_access_credentials.py +41 -7
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -267
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +28 -19
  44. pulumi_vault/consul/secret_backend_role.py +18 -78
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +119 -112
  48. pulumi_vault/database/secret_backend_role.py +31 -22
  49. pulumi_vault/database/secret_backend_static_role.py +87 -13
  50. pulumi_vault/database/secrets_mount.py +427 -136
  51. pulumi_vault/egp_policy.py +16 -11
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +250 -33
  54. pulumi_vault/gcp/auth_backend_role.py +77 -269
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -5
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -12
  58. pulumi_vault/gcp/secret_impersonated_account.py +76 -15
  59. pulumi_vault/gcp/secret_roleset.py +31 -24
  60. pulumi_vault/gcp/secret_static_account.py +39 -32
  61. pulumi_vault/generic/endpoint.py +24 -17
  62. pulumi_vault/generic/get_secret.py +64 -8
  63. pulumi_vault/generic/secret.py +21 -16
  64. pulumi_vault/get_auth_backend.py +24 -7
  65. pulumi_vault/get_auth_backends.py +51 -9
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -11
  69. pulumi_vault/get_policy_document.py +34 -19
  70. pulumi_vault/get_raft_autopilot_state.py +29 -10
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +19 -14
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +16 -11
  75. pulumi_vault/github/user.py +16 -11
  76. pulumi_vault/identity/entity.py +20 -13
  77. pulumi_vault/identity/entity_alias.py +20 -13
  78. pulumi_vault/identity/entity_policies.py +28 -11
  79. pulumi_vault/identity/get_entity.py +42 -10
  80. pulumi_vault/identity/get_group.py +47 -9
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -7
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -9
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -10
  84. pulumi_vault/identity/group.py +58 -39
  85. pulumi_vault/identity/group_alias.py +16 -9
  86. pulumi_vault/identity/group_member_entity_ids.py +28 -66
  87. pulumi_vault/identity/group_member_group_ids.py +40 -19
  88. pulumi_vault/identity/group_policies.py +20 -7
  89. pulumi_vault/identity/mfa_duo.py +11 -6
  90. pulumi_vault/identity/mfa_login_enforcement.py +15 -6
  91. pulumi_vault/identity/mfa_okta.py +11 -6
  92. pulumi_vault/identity/mfa_pingid.py +7 -2
  93. pulumi_vault/identity/mfa_totp.py +7 -2
  94. pulumi_vault/identity/oidc.py +12 -7
  95. pulumi_vault/identity/oidc_assignment.py +24 -11
  96. pulumi_vault/identity/oidc_client.py +36 -23
  97. pulumi_vault/identity/oidc_key.py +30 -17
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
  99. pulumi_vault/identity/oidc_provider.py +36 -21
  100. pulumi_vault/identity/oidc_role.py +42 -21
  101. pulumi_vault/identity/oidc_scope.py +20 -13
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +45 -40
  105. pulumi_vault/jwt/auth_backend_role.py +133 -254
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +24 -19
  108. pulumi_vault/kmip/secret_role.py +14 -9
  109. pulumi_vault/kmip/secret_scope.py +14 -9
  110. pulumi_vault/kubernetes/auth_backend_config.py +57 -5
  111. pulumi_vault/kubernetes/auth_backend_role.py +70 -177
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -11
  115. pulumi_vault/kubernetes/secret_backend.py +316 -27
  116. pulumi_vault/kubernetes/secret_backend_role.py +137 -46
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +25 -8
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
  120. pulumi_vault/kv/get_secret_v2.py +85 -9
  121. pulumi_vault/kv/get_secrets_list.py +24 -11
  122. pulumi_vault/kv/get_secrets_list_v2.py +37 -15
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +23 -16
  125. pulumi_vault/kv/secret_backend_v2.py +20 -11
  126. pulumi_vault/kv/secret_v2.py +59 -50
  127. pulumi_vault/ldap/auth_backend.py +127 -166
  128. pulumi_vault/ldap/auth_backend_group.py +14 -9
  129. pulumi_vault/ldap/auth_backend_user.py +14 -9
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +354 -82
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +16 -9
  135. pulumi_vault/ldap/secret_backend_static_role.py +73 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +29 -57
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +18 -11
  140. pulumi_vault/mfa_okta.py +18 -11
  141. pulumi_vault/mfa_pingid.py +18 -11
  142. pulumi_vault/mfa_totp.py +24 -17
  143. pulumi_vault/mongodbatlas/secret_backend.py +20 -15
  144. pulumi_vault/mongodbatlas/secret_role.py +47 -38
  145. pulumi_vault/mount.py +391 -51
  146. pulumi_vault/namespace.py +68 -83
  147. pulumi_vault/nomad_secret_backend.py +18 -13
  148. pulumi_vault/nomad_secret_role.py +14 -9
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +485 -39
  151. pulumi_vault/okta/auth_backend_group.py +14 -9
  152. pulumi_vault/okta/auth_backend_user.py +14 -9
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +20 -13
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -9
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -8
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
  174. pulumi_vault/pkisecret/secret_backend_key.py +14 -9
  175. pulumi_vault/pkisecret/secret_backend_role.py +21 -14
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +14 -9
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +60 -6
  185. pulumi_vault/quota_rate_limit.py +56 -2
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +18 -13
  189. pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
  190. pulumi_vault/raft_autopilot.py +14 -9
  191. pulumi_vault/raft_snapshot_agent_config.py +129 -224
  192. pulumi_vault/rgp_policy.py +14 -9
  193. pulumi_vault/saml/auth_backend.py +22 -17
  194. pulumi_vault/saml/auth_backend_role.py +92 -197
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -71
  199. pulumi_vault/secrets/sync_aws_destination.py +242 -27
  200. pulumi_vault/secrets/sync_azure_destination.py +92 -31
  201. pulumi_vault/secrets/sync_config.py +9 -4
  202. pulumi_vault/secrets/sync_gcp_destination.py +158 -25
  203. pulumi_vault/secrets/sync_gh_destination.py +189 -13
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +74 -13
  206. pulumi_vault/ssh/_inputs.py +28 -28
  207. pulumi_vault/ssh/outputs.py +11 -28
  208. pulumi_vault/ssh/secret_backend_ca.py +108 -9
  209. pulumi_vault/ssh/secret_backend_role.py +85 -118
  210. pulumi_vault/terraformcloud/secret_backend.py +7 -54
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -20
  212. pulumi_vault/terraformcloud/secret_role.py +16 -74
  213. pulumi_vault/token.py +28 -23
  214. pulumi_vault/tokenauth/auth_backend_role.py +78 -199
  215. pulumi_vault/transform/alphabet.py +16 -9
  216. pulumi_vault/transform/get_decode.py +45 -17
  217. pulumi_vault/transform/get_encode.py +45 -17
  218. pulumi_vault/transform/role.py +16 -9
  219. pulumi_vault/transform/template.py +30 -21
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -21
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +27 -93
  224. pulumi_vault/transit/secret_cache_config.py +12 -7
  225. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['EntityAliasArgs', 'EntityAlias']
@@ -27,7 +32,7 @@ class EntityAliasArgs:
27
32
  :param pulumi.Input[str] name: Name of the alias. Name should be the identifier of the client in the authentication source. For example, if the alias belongs to userpass backend, the name should be a valid username within userpass backend. If alias belongs to GitHub, it should be the GitHub username.
28
33
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
29
34
  The value should not contain leading or trailing forward slashes.
30
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
35
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
31
36
  *Available only for Vault Enterprise*.
32
37
  """
33
38
  pulumi.set(__self__, "canonical_id", canonical_id)
@@ -93,7 +98,7 @@ class EntityAliasArgs:
93
98
  """
94
99
  The namespace to provision the resource in.
95
100
  The value should not contain leading or trailing forward slashes.
96
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
101
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
97
102
  *Available only for Vault Enterprise*.
98
103
  """
99
104
  return pulumi.get(self, "namespace")
@@ -119,7 +124,7 @@ class _EntityAliasState:
119
124
  :param pulumi.Input[str] name: Name of the alias. Name should be the identifier of the client in the authentication source. For example, if the alias belongs to userpass backend, the name should be a valid username within userpass backend. If alias belongs to GitHub, it should be the GitHub username.
120
125
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
121
126
  The value should not contain leading or trailing forward slashes.
122
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
127
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
123
128
  *Available only for Vault Enterprise*.
124
129
  """
125
130
  if canonical_id is not None:
@@ -187,7 +192,7 @@ class _EntityAliasState:
187
192
  """
188
193
  The namespace to provision the resource in.
189
194
  The value should not contain leading or trailing forward slashes.
190
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
195
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
191
196
  *Available only for Vault Enterprise*.
192
197
  """
193
198
  return pulumi.get(self, "namespace")
@@ -216,8 +221,9 @@ class EntityAlias(pulumi.CustomResource):
216
221
  import pulumi_vault as vault
217
222
 
218
223
  test = vault.identity.EntityAlias("test",
219
- canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8",
220
- mount_accessor="token_1f2bd5")
224
+ name="user_1",
225
+ mount_accessor="token_1f2bd5",
226
+ canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8")
221
227
  ```
222
228
 
223
229
  ## Import
@@ -225,7 +231,7 @@ class EntityAlias(pulumi.CustomResource):
225
231
  Identity entity alias can be imported using the `id`, e.g.
226
232
 
227
233
  ```sh
228
- $ pulumi import vault:identity/entityAlias:EntityAlias test "3856fb4d-3c91-dcaf-2401-68f446796bfb"
234
+ $ pulumi import vault:identity/entityAlias:EntityAlias test "3856fb4d-3c91-dcaf-2401-68f446796bfb"
229
235
  ```
230
236
 
231
237
  :param str resource_name: The name of the resource.
@@ -236,7 +242,7 @@ class EntityAlias(pulumi.CustomResource):
236
242
  :param pulumi.Input[str] name: Name of the alias. Name should be the identifier of the client in the authentication source. For example, if the alias belongs to userpass backend, the name should be a valid username within userpass backend. If alias belongs to GitHub, it should be the GitHub username.
237
243
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
238
244
  The value should not contain leading or trailing forward slashes.
239
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
245
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
240
246
  *Available only for Vault Enterprise*.
241
247
  """
242
248
  ...
@@ -253,8 +259,9 @@ class EntityAlias(pulumi.CustomResource):
253
259
  import pulumi_vault as vault
254
260
 
255
261
  test = vault.identity.EntityAlias("test",
256
- canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8",
257
- mount_accessor="token_1f2bd5")
262
+ name="user_1",
263
+ mount_accessor="token_1f2bd5",
264
+ canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8")
258
265
  ```
259
266
 
260
267
  ## Import
@@ -262,7 +269,7 @@ class EntityAlias(pulumi.CustomResource):
262
269
  Identity entity alias can be imported using the `id`, e.g.
263
270
 
264
271
  ```sh
265
- $ pulumi import vault:identity/entityAlias:EntityAlias test "3856fb4d-3c91-dcaf-2401-68f446796bfb"
272
+ $ pulumi import vault:identity/entityAlias:EntityAlias test "3856fb4d-3c91-dcaf-2401-68f446796bfb"
266
273
  ```
267
274
 
268
275
  :param str resource_name: The name of the resource.
@@ -331,7 +338,7 @@ class EntityAlias(pulumi.CustomResource):
331
338
  :param pulumi.Input[str] name: Name of the alias. Name should be the identifier of the client in the authentication source. For example, if the alias belongs to userpass backend, the name should be a valid username within userpass backend. If alias belongs to GitHub, it should be the GitHub username.
332
339
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
333
340
  The value should not contain leading or trailing forward slashes.
334
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
341
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
335
342
  *Available only for Vault Enterprise*.
336
343
  """
337
344
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -383,7 +390,7 @@ class EntityAlias(pulumi.CustomResource):
383
390
  """
384
391
  The namespace to provision the resource in.
385
392
  The value should not contain leading or trailing forward slashes.
386
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
393
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
387
394
  *Available only for Vault Enterprise*.
388
395
  """
389
396
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['EntityPoliciesArgs', 'EntityPolicies']
@@ -29,7 +34,7 @@ class EntityPoliciesArgs:
29
34
  If set to `false`, this resource will simply ensure that the policies specified in the resource are present in the entity. When destroying the resource, the resource will ensure that the policies specified in the resource are removed.
30
35
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
31
36
  The value should not contain leading or trailing forward slashes.
32
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
37
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
33
38
  *Available only for Vault Enterprise*.
34
39
  """
35
40
  pulumi.set(__self__, "entity_id", entity_id)
@@ -85,7 +90,7 @@ class EntityPoliciesArgs:
85
90
  """
86
91
  The namespace to provision the resource in.
87
92
  The value should not contain leading or trailing forward slashes.
88
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
93
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
89
94
  *Available only for Vault Enterprise*.
90
95
  """
91
96
  return pulumi.get(self, "namespace")
@@ -114,7 +119,7 @@ class _EntityPoliciesState:
114
119
  If set to `false`, this resource will simply ensure that the policies specified in the resource are present in the entity. When destroying the resource, the resource will ensure that the policies specified in the resource are removed.
115
120
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
116
121
  The value should not contain leading or trailing forward slashes.
117
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
122
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
118
123
  *Available only for Vault Enterprise*.
119
124
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies to assign to the entity
120
125
  """
@@ -175,7 +180,7 @@ class _EntityPoliciesState:
175
180
  """
176
181
  The namespace to provision the resource in.
177
182
  The value should not contain leading or trailing forward slashes.
178
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
183
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
179
184
  *Available only for Vault Enterprise*.
180
185
  """
181
186
  return pulumi.get(self, "namespace")
@@ -211,13 +216,16 @@ class EntityPolicies(pulumi.CustomResource):
211
216
  Manages policies for an Identity Entity for Vault. The [Identity secrets engine](https://www.vaultproject.io/docs/secrets/identity/index.html) is the identity management solution for Vault.
212
217
 
213
218
  ## Example Usage
219
+
214
220
  ### Exclusive Policies
215
221
 
216
222
  ```python
217
223
  import pulumi
218
224
  import pulumi_vault as vault
219
225
 
220
- entity = vault.identity.Entity("entity", external_policies=True)
226
+ entity = vault.identity.Entity("entity",
227
+ name="entity",
228
+ external_policies=True)
221
229
  policies = vault.identity.EntityPolicies("policies",
222
230
  policies=[
223
231
  "default",
@@ -226,13 +234,16 @@ class EntityPolicies(pulumi.CustomResource):
226
234
  exclusive=True,
227
235
  entity_id=entity.id)
228
236
  ```
237
+
229
238
  ### Non-exclusive Policies
230
239
 
231
240
  ```python
232
241
  import pulumi
233
242
  import pulumi_vault as vault
234
243
 
235
- entity = vault.identity.Entity("entity", external_policies=True)
244
+ entity = vault.identity.Entity("entity",
245
+ name="entity",
246
+ external_policies=True)
236
247
  default = vault.identity.EntityPolicies("default",
237
248
  policies=[
238
249
  "default",
@@ -256,7 +267,7 @@ class EntityPolicies(pulumi.CustomResource):
256
267
  If set to `false`, this resource will simply ensure that the policies specified in the resource are present in the entity. When destroying the resource, the resource will ensure that the policies specified in the resource are removed.
257
268
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
258
269
  The value should not contain leading or trailing forward slashes.
259
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
270
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
260
271
  *Available only for Vault Enterprise*.
261
272
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies to assign to the entity
262
273
  """
@@ -270,13 +281,16 @@ class EntityPolicies(pulumi.CustomResource):
270
281
  Manages policies for an Identity Entity for Vault. The [Identity secrets engine](https://www.vaultproject.io/docs/secrets/identity/index.html) is the identity management solution for Vault.
271
282
 
272
283
  ## Example Usage
284
+
273
285
  ### Exclusive Policies
274
286
 
275
287
  ```python
276
288
  import pulumi
277
289
  import pulumi_vault as vault
278
290
 
279
- entity = vault.identity.Entity("entity", external_policies=True)
291
+ entity = vault.identity.Entity("entity",
292
+ name="entity",
293
+ external_policies=True)
280
294
  policies = vault.identity.EntityPolicies("policies",
281
295
  policies=[
282
296
  "default",
@@ -285,13 +299,16 @@ class EntityPolicies(pulumi.CustomResource):
285
299
  exclusive=True,
286
300
  entity_id=entity.id)
287
301
  ```
302
+
288
303
  ### Non-exclusive Policies
289
304
 
290
305
  ```python
291
306
  import pulumi
292
307
  import pulumi_vault as vault
293
308
 
294
- entity = vault.identity.Entity("entity", external_policies=True)
309
+ entity = vault.identity.Entity("entity",
310
+ name="entity",
311
+ external_policies=True)
295
312
  default = vault.identity.EntityPolicies("default",
296
313
  policies=[
297
314
  "default",
@@ -373,7 +390,7 @@ class EntityPolicies(pulumi.CustomResource):
373
390
  If set to `false`, this resource will simply ensure that the policies specified in the resource are present in the entity. When destroying the resource, the resource will ensure that the policies specified in the resource are removed.
374
391
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
375
392
  The value should not contain leading or trailing forward slashes.
376
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
393
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
377
394
  *Available only for Vault Enterprise*.
378
395
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies to assign to the entity
379
396
  """
@@ -422,7 +439,7 @@ class EntityPolicies(pulumi.CustomResource):
422
439
  """
423
440
  The namespace to provision the resource in.
424
441
  The value should not contain leading or trailing forward slashes.
425
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
442
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
426
443
  *Available only for Vault Enterprise*.
427
444
  """
428
445
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
  from . import outputs
12
17
 
@@ -189,7 +194,7 @@ class GetEntityResult:
189
194
 
190
195
  @property
191
196
  @pulumi.getter
192
- def metadata(self) -> Mapping[str, Any]:
197
+ def metadata(self) -> Mapping[str, str]:
193
198
  """
194
199
  Arbitrary metadata
195
200
  """
@@ -260,9 +265,10 @@ def get_entity(alias_id: Optional[str] = None,
260
265
 
261
266
  entity = vault.identity.get_entity(entity_name="entity_12345")
262
267
  ```
268
+
263
269
  ## Required Vault Capabilities
264
270
 
265
- Use of this resource requires the `create` capability on `/identity/lookup/entity`.
271
+ Use of this resource requires the `update` capability on `/identity/lookup/entity`.
266
272
 
267
273
 
268
274
  :param str alias_id: ID of the alias.
@@ -277,7 +283,7 @@ def get_entity(alias_id: Optional[str] = None,
277
283
  :param str entity_name: Name of the entity.
278
284
  :param str namespace: The namespace of the target resource.
279
285
  The value should not contain leading or trailing forward slashes.
280
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
286
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
281
287
  *Available only for Vault Enterprise*.
282
288
  """
283
289
  __args__ = dict()
@@ -310,16 +316,13 @@ def get_entity(alias_id: Optional[str] = None,
310
316
  namespace=pulumi.get(__ret__, 'namespace'),
311
317
  namespace_id=pulumi.get(__ret__, 'namespace_id'),
312
318
  policies=pulumi.get(__ret__, 'policies'))
313
-
314
-
315
- @_utilities.lift_output_func(get_entity)
316
319
  def get_entity_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
317
320
  alias_mount_accessor: Optional[pulumi.Input[Optional[str]]] = None,
318
321
  alias_name: Optional[pulumi.Input[Optional[str]]] = None,
319
322
  entity_id: Optional[pulumi.Input[Optional[str]]] = None,
320
323
  entity_name: Optional[pulumi.Input[Optional[str]]] = None,
321
324
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
322
- opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetEntityResult]:
325
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetEntityResult]:
323
326
  """
324
327
  ## Example Usage
325
328
 
@@ -329,9 +332,10 @@ def get_entity_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
329
332
 
330
333
  entity = vault.identity.get_entity(entity_name="entity_12345")
331
334
  ```
335
+
332
336
  ## Required Vault Capabilities
333
337
 
334
- Use of this resource requires the `create` capability on `/identity/lookup/entity`.
338
+ Use of this resource requires the `update` capability on `/identity/lookup/entity`.
335
339
 
336
340
 
337
341
  :param str alias_id: ID of the alias.
@@ -346,7 +350,35 @@ def get_entity_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
346
350
  :param str entity_name: Name of the entity.
347
351
  :param str namespace: The namespace of the target resource.
348
352
  The value should not contain leading or trailing forward slashes.
349
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
353
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
350
354
  *Available only for Vault Enterprise*.
351
355
  """
352
- ...
356
+ __args__ = dict()
357
+ __args__['aliasId'] = alias_id
358
+ __args__['aliasMountAccessor'] = alias_mount_accessor
359
+ __args__['aliasName'] = alias_name
360
+ __args__['entityId'] = entity_id
361
+ __args__['entityName'] = entity_name
362
+ __args__['namespace'] = namespace
363
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
364
+ __ret__ = pulumi.runtime.invoke_output('vault:identity/getEntity:getEntity', __args__, opts=opts, typ=GetEntityResult)
365
+ return __ret__.apply(lambda __response__: GetEntityResult(
366
+ alias_id=pulumi.get(__response__, 'alias_id'),
367
+ alias_mount_accessor=pulumi.get(__response__, 'alias_mount_accessor'),
368
+ alias_name=pulumi.get(__response__, 'alias_name'),
369
+ aliases=pulumi.get(__response__, 'aliases'),
370
+ creation_time=pulumi.get(__response__, 'creation_time'),
371
+ data_json=pulumi.get(__response__, 'data_json'),
372
+ direct_group_ids=pulumi.get(__response__, 'direct_group_ids'),
373
+ disabled=pulumi.get(__response__, 'disabled'),
374
+ entity_id=pulumi.get(__response__, 'entity_id'),
375
+ entity_name=pulumi.get(__response__, 'entity_name'),
376
+ group_ids=pulumi.get(__response__, 'group_ids'),
377
+ id=pulumi.get(__response__, 'id'),
378
+ inherited_group_ids=pulumi.get(__response__, 'inherited_group_ids'),
379
+ last_update_time=pulumi.get(__response__, 'last_update_time'),
380
+ merged_entity_ids=pulumi.get(__response__, 'merged_entity_ids'),
381
+ metadata=pulumi.get(__response__, 'metadata'),
382
+ namespace=pulumi.get(__response__, 'namespace'),
383
+ namespace_id=pulumi.get(__response__, 'namespace_id'),
384
+ policies=pulumi.get(__response__, 'policies')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -137,7 +142,7 @@ class GetGroupResult:
137
142
 
138
143
  @property
139
144
  @pulumi.getter(name="aliasMetadata")
140
- def alias_metadata(self) -> Mapping[str, Any]:
145
+ def alias_metadata(self) -> Mapping[str, str]:
141
146
  """
142
147
  Arbitrary metadata
143
148
  """
@@ -230,7 +235,7 @@ class GetGroupResult:
230
235
 
231
236
  @property
232
237
  @pulumi.getter
233
- def metadata(self) -> Mapping[str, Any]:
238
+ def metadata(self) -> Mapping[str, str]:
234
239
  """
235
240
  Arbitrary metadata
236
241
  """
@@ -331,6 +336,7 @@ def get_group(alias_id: Optional[str] = None,
331
336
 
332
337
  group = vault.identity.get_group(group_name="user")
333
338
  ```
339
+
334
340
  ## Required Vault Capabilities
335
341
 
336
342
  Use of this resource requires the `create` capability on `/identity/lookup/group`.
@@ -348,7 +354,7 @@ def get_group(alias_id: Optional[str] = None,
348
354
  :param str group_name: Name of the group.
349
355
  :param str namespace: The namespace of the target resource.
350
356
  The value should not contain leading or trailing forward slashes.
351
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
357
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
352
358
  *Available only for Vault Enterprise*.
353
359
  """
354
360
  __args__ = dict()
@@ -387,16 +393,13 @@ def get_group(alias_id: Optional[str] = None,
387
393
  parent_group_ids=pulumi.get(__ret__, 'parent_group_ids'),
388
394
  policies=pulumi.get(__ret__, 'policies'),
389
395
  type=pulumi.get(__ret__, 'type'))
390
-
391
-
392
- @_utilities.lift_output_func(get_group)
393
396
  def get_group_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
394
397
  alias_mount_accessor: Optional[pulumi.Input[Optional[str]]] = None,
395
398
  alias_name: Optional[pulumi.Input[Optional[str]]] = None,
396
399
  group_id: Optional[pulumi.Input[Optional[str]]] = None,
397
400
  group_name: Optional[pulumi.Input[Optional[str]]] = None,
398
401
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
399
- opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetGroupResult]:
402
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetGroupResult]:
400
403
  """
401
404
  ## Example Usage
402
405
 
@@ -406,6 +409,7 @@ def get_group_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
406
409
 
407
410
  group = vault.identity.get_group(group_name="user")
408
411
  ```
412
+
409
413
  ## Required Vault Capabilities
410
414
 
411
415
  Use of this resource requires the `create` capability on `/identity/lookup/group`.
@@ -423,7 +427,41 @@ def get_group_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
423
427
  :param str group_name: Name of the group.
424
428
  :param str namespace: The namespace of the target resource.
425
429
  The value should not contain leading or trailing forward slashes.
426
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
430
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
427
431
  *Available only for Vault Enterprise*.
428
432
  """
429
- ...
433
+ __args__ = dict()
434
+ __args__['aliasId'] = alias_id
435
+ __args__['aliasMountAccessor'] = alias_mount_accessor
436
+ __args__['aliasName'] = alias_name
437
+ __args__['groupId'] = group_id
438
+ __args__['groupName'] = group_name
439
+ __args__['namespace'] = namespace
440
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
441
+ __ret__ = pulumi.runtime.invoke_output('vault:identity/getGroup:getGroup', __args__, opts=opts, typ=GetGroupResult)
442
+ return __ret__.apply(lambda __response__: GetGroupResult(
443
+ alias_canonical_id=pulumi.get(__response__, 'alias_canonical_id'),
444
+ alias_creation_time=pulumi.get(__response__, 'alias_creation_time'),
445
+ alias_id=pulumi.get(__response__, 'alias_id'),
446
+ alias_last_update_time=pulumi.get(__response__, 'alias_last_update_time'),
447
+ alias_merged_from_canonical_ids=pulumi.get(__response__, 'alias_merged_from_canonical_ids'),
448
+ alias_metadata=pulumi.get(__response__, 'alias_metadata'),
449
+ alias_mount_accessor=pulumi.get(__response__, 'alias_mount_accessor'),
450
+ alias_mount_path=pulumi.get(__response__, 'alias_mount_path'),
451
+ alias_mount_type=pulumi.get(__response__, 'alias_mount_type'),
452
+ alias_name=pulumi.get(__response__, 'alias_name'),
453
+ creation_time=pulumi.get(__response__, 'creation_time'),
454
+ data_json=pulumi.get(__response__, 'data_json'),
455
+ group_id=pulumi.get(__response__, 'group_id'),
456
+ group_name=pulumi.get(__response__, 'group_name'),
457
+ id=pulumi.get(__response__, 'id'),
458
+ last_update_time=pulumi.get(__response__, 'last_update_time'),
459
+ member_entity_ids=pulumi.get(__response__, 'member_entity_ids'),
460
+ member_group_ids=pulumi.get(__response__, 'member_group_ids'),
461
+ metadata=pulumi.get(__response__, 'metadata'),
462
+ modify_index=pulumi.get(__response__, 'modify_index'),
463
+ namespace=pulumi.get(__response__, 'namespace'),
464
+ namespace_id=pulumi.get(__response__, 'namespace_id'),
465
+ parent_group_ids=pulumi.get(__response__, 'parent_group_ids'),
466
+ policies=pulumi.get(__response__, 'policies'),
467
+ type=pulumi.get(__response__, 'type')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -98,6 +103,7 @@ def get_oidc_client_creds(name: Optional[str] = None,
98
103
  import pulumi_vault as vault
99
104
 
100
105
  app = vault.identity.OidcClient("app",
106
+ name="application",
101
107
  redirect_uris=[
102
108
  "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
103
109
  "http://127.0.0.1:8251/callback",
@@ -112,7 +118,7 @@ def get_oidc_client_creds(name: Optional[str] = None,
112
118
  :param str name: The name of the OIDC Client in Vault.
113
119
  :param str namespace: The namespace of the target resource.
114
120
  The value should not contain leading or trailing forward slashes.
115
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
121
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
116
122
  *Available only for Vault Enterprise*.
117
123
  """
118
124
  __args__ = dict()
@@ -127,12 +133,9 @@ def get_oidc_client_creds(name: Optional[str] = None,
127
133
  id=pulumi.get(__ret__, 'id'),
128
134
  name=pulumi.get(__ret__, 'name'),
129
135
  namespace=pulumi.get(__ret__, 'namespace'))
130
-
131
-
132
- @_utilities.lift_output_func(get_oidc_client_creds)
133
136
  def get_oidc_client_creds_output(name: Optional[pulumi.Input[str]] = None,
134
137
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
135
- opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetOidcClientCredsResult]:
138
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetOidcClientCredsResult]:
136
139
  """
137
140
  ## Example Usage
138
141
 
@@ -141,6 +144,7 @@ def get_oidc_client_creds_output(name: Optional[pulumi.Input[str]] = None,
141
144
  import pulumi_vault as vault
142
145
 
143
146
  app = vault.identity.OidcClient("app",
147
+ name="application",
144
148
  redirect_uris=[
145
149
  "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
146
150
  "http://127.0.0.1:8251/callback",
@@ -155,7 +159,17 @@ def get_oidc_client_creds_output(name: Optional[pulumi.Input[str]] = None,
155
159
  :param str name: The name of the OIDC Client in Vault.
156
160
  :param str namespace: The namespace of the target resource.
157
161
  The value should not contain leading or trailing forward slashes.
158
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
162
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
159
163
  *Available only for Vault Enterprise*.
160
164
  """
161
- ...
165
+ __args__ = dict()
166
+ __args__['name'] = name
167
+ __args__['namespace'] = namespace
168
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
169
+ __ret__ = pulumi.runtime.invoke_output('vault:identity/getOidcClientCreds:getOidcClientCreds', __args__, opts=opts, typ=GetOidcClientCredsResult)
170
+ return __ret__.apply(lambda __response__: GetOidcClientCredsResult(
171
+ client_id=pulumi.get(__response__, 'client_id'),
172
+ client_secret=pulumi.get(__response__, 'client_secret'),
173
+ id=pulumi.get(__response__, 'id'),
174
+ name=pulumi.get(__response__, 'name'),
175
+ namespace=pulumi.get(__response__, 'namespace')))