pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +26 -9
  5. pulumi_vault/ad/secret_backend.py +16 -142
  6. pulumi_vault/ad/secret_library.py +16 -9
  7. pulumi_vault/ad/secret_role.py +14 -9
  8. pulumi_vault/alicloud/auth_backend_role.py +76 -190
  9. pulumi_vault/approle/auth_backend_login.py +12 -7
  10. pulumi_vault/approle/auth_backend_role.py +77 -191
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
  13. pulumi_vault/audit.py +30 -21
  14. pulumi_vault/audit_request_header.py +11 -2
  15. pulumi_vault/auth_backend.py +66 -14
  16. pulumi_vault/aws/auth_backend_cert.py +18 -9
  17. pulumi_vault/aws/auth_backend_client.py +267 -22
  18. pulumi_vault/aws/auth_backend_config_identity.py +14 -9
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +77 -191
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
  24. pulumi_vault/aws/auth_backend_sts_role.py +14 -9
  25. pulumi_vault/aws/get_access_credentials.py +38 -9
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +77 -9
  28. pulumi_vault/aws/secret_backend_role.py +185 -9
  29. pulumi_vault/aws/secret_backend_static_role.py +20 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +153 -15
  32. pulumi_vault/azure/auth_backend_role.py +77 -191
  33. pulumi_vault/azure/backend.py +227 -21
  34. pulumi_vault/azure/backend_role.py +42 -37
  35. pulumi_vault/azure/get_access_credentials.py +41 -7
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -267
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +28 -19
  44. pulumi_vault/consul/secret_backend_role.py +18 -78
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +119 -112
  48. pulumi_vault/database/secret_backend_role.py +31 -22
  49. pulumi_vault/database/secret_backend_static_role.py +87 -13
  50. pulumi_vault/database/secrets_mount.py +427 -136
  51. pulumi_vault/egp_policy.py +16 -11
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +250 -33
  54. pulumi_vault/gcp/auth_backend_role.py +77 -269
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -5
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -12
  58. pulumi_vault/gcp/secret_impersonated_account.py +76 -15
  59. pulumi_vault/gcp/secret_roleset.py +31 -24
  60. pulumi_vault/gcp/secret_static_account.py +39 -32
  61. pulumi_vault/generic/endpoint.py +24 -17
  62. pulumi_vault/generic/get_secret.py +64 -8
  63. pulumi_vault/generic/secret.py +21 -16
  64. pulumi_vault/get_auth_backend.py +24 -7
  65. pulumi_vault/get_auth_backends.py +51 -9
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -11
  69. pulumi_vault/get_policy_document.py +34 -19
  70. pulumi_vault/get_raft_autopilot_state.py +29 -10
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +19 -14
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +16 -11
  75. pulumi_vault/github/user.py +16 -11
  76. pulumi_vault/identity/entity.py +20 -13
  77. pulumi_vault/identity/entity_alias.py +20 -13
  78. pulumi_vault/identity/entity_policies.py +28 -11
  79. pulumi_vault/identity/get_entity.py +42 -10
  80. pulumi_vault/identity/get_group.py +47 -9
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -7
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -9
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -10
  84. pulumi_vault/identity/group.py +58 -39
  85. pulumi_vault/identity/group_alias.py +16 -9
  86. pulumi_vault/identity/group_member_entity_ids.py +28 -66
  87. pulumi_vault/identity/group_member_group_ids.py +40 -19
  88. pulumi_vault/identity/group_policies.py +20 -7
  89. pulumi_vault/identity/mfa_duo.py +11 -6
  90. pulumi_vault/identity/mfa_login_enforcement.py +15 -6
  91. pulumi_vault/identity/mfa_okta.py +11 -6
  92. pulumi_vault/identity/mfa_pingid.py +7 -2
  93. pulumi_vault/identity/mfa_totp.py +7 -2
  94. pulumi_vault/identity/oidc.py +12 -7
  95. pulumi_vault/identity/oidc_assignment.py +24 -11
  96. pulumi_vault/identity/oidc_client.py +36 -23
  97. pulumi_vault/identity/oidc_key.py +30 -17
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
  99. pulumi_vault/identity/oidc_provider.py +36 -21
  100. pulumi_vault/identity/oidc_role.py +42 -21
  101. pulumi_vault/identity/oidc_scope.py +20 -13
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +45 -40
  105. pulumi_vault/jwt/auth_backend_role.py +133 -254
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +24 -19
  108. pulumi_vault/kmip/secret_role.py +14 -9
  109. pulumi_vault/kmip/secret_scope.py +14 -9
  110. pulumi_vault/kubernetes/auth_backend_config.py +57 -5
  111. pulumi_vault/kubernetes/auth_backend_role.py +70 -177
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -11
  115. pulumi_vault/kubernetes/secret_backend.py +316 -27
  116. pulumi_vault/kubernetes/secret_backend_role.py +137 -46
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +25 -8
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
  120. pulumi_vault/kv/get_secret_v2.py +85 -9
  121. pulumi_vault/kv/get_secrets_list.py +24 -11
  122. pulumi_vault/kv/get_secrets_list_v2.py +37 -15
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +23 -16
  125. pulumi_vault/kv/secret_backend_v2.py +20 -11
  126. pulumi_vault/kv/secret_v2.py +59 -50
  127. pulumi_vault/ldap/auth_backend.py +127 -166
  128. pulumi_vault/ldap/auth_backend_group.py +14 -9
  129. pulumi_vault/ldap/auth_backend_user.py +14 -9
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +354 -82
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +16 -9
  135. pulumi_vault/ldap/secret_backend_static_role.py +73 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +29 -57
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +18 -11
  140. pulumi_vault/mfa_okta.py +18 -11
  141. pulumi_vault/mfa_pingid.py +18 -11
  142. pulumi_vault/mfa_totp.py +24 -17
  143. pulumi_vault/mongodbatlas/secret_backend.py +20 -15
  144. pulumi_vault/mongodbatlas/secret_role.py +47 -38
  145. pulumi_vault/mount.py +391 -51
  146. pulumi_vault/namespace.py +68 -83
  147. pulumi_vault/nomad_secret_backend.py +18 -13
  148. pulumi_vault/nomad_secret_role.py +14 -9
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +485 -39
  151. pulumi_vault/okta/auth_backend_group.py +14 -9
  152. pulumi_vault/okta/auth_backend_user.py +14 -9
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +20 -13
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -9
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -8
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
  174. pulumi_vault/pkisecret/secret_backend_key.py +14 -9
  175. pulumi_vault/pkisecret/secret_backend_role.py +21 -14
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +14 -9
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +60 -6
  185. pulumi_vault/quota_rate_limit.py +56 -2
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +18 -13
  189. pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
  190. pulumi_vault/raft_autopilot.py +14 -9
  191. pulumi_vault/raft_snapshot_agent_config.py +129 -224
  192. pulumi_vault/rgp_policy.py +14 -9
  193. pulumi_vault/saml/auth_backend.py +22 -17
  194. pulumi_vault/saml/auth_backend_role.py +92 -197
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -71
  199. pulumi_vault/secrets/sync_aws_destination.py +242 -27
  200. pulumi_vault/secrets/sync_azure_destination.py +92 -31
  201. pulumi_vault/secrets/sync_config.py +9 -4
  202. pulumi_vault/secrets/sync_gcp_destination.py +158 -25
  203. pulumi_vault/secrets/sync_gh_destination.py +189 -13
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +74 -13
  206. pulumi_vault/ssh/_inputs.py +28 -28
  207. pulumi_vault/ssh/outputs.py +11 -28
  208. pulumi_vault/ssh/secret_backend_ca.py +108 -9
  209. pulumi_vault/ssh/secret_backend_role.py +85 -118
  210. pulumi_vault/terraformcloud/secret_backend.py +7 -54
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -20
  212. pulumi_vault/terraformcloud/secret_role.py +16 -74
  213. pulumi_vault/token.py +28 -23
  214. pulumi_vault/tokenauth/auth_backend_role.py +78 -199
  215. pulumi_vault/transform/alphabet.py +16 -9
  216. pulumi_vault/transform/get_decode.py +45 -17
  217. pulumi_vault/transform/get_encode.py +45 -17
  218. pulumi_vault/transform/role.py +16 -9
  219. pulumi_vault/transform/template.py +30 -21
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -21
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +27 -93
  224. pulumi_vault/transit/secret_cache_config.py +12 -7
  225. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['MfaLoginEnforcementArgs', 'MfaLoginEnforcement']
@@ -320,12 +325,14 @@ class MfaLoginEnforcement(pulumi.CustomResource):
320
325
  import pulumi
321
326
  import pulumi_vault as vault
322
327
 
323
- example_mfa_duo = vault.identity.MfaDuo("exampleMfaDuo",
328
+ example = vault.identity.MfaDuo("example",
324
329
  secret_key="secret-key",
325
330
  integration_key="int-key",
326
331
  api_hostname="foo.baz",
327
332
  push_info="push-info")
328
- example_mfa_login_enforcement = vault.identity.MfaLoginEnforcement("exampleMfaLoginEnforcement", mfa_method_ids=[example_mfa_duo.method_id])
333
+ example_mfa_login_enforcement = vault.identity.MfaLoginEnforcement("example",
334
+ name="default",
335
+ mfa_method_ids=[example.method_id])
329
336
  ```
330
337
 
331
338
  ## Import
@@ -333,7 +340,7 @@ class MfaLoginEnforcement(pulumi.CustomResource):
333
340
  Resource can be imported using its `name` field, e.g.
334
341
 
335
342
  ```sh
336
- $ pulumi import vault:identity/mfaLoginEnforcement:MfaLoginEnforcement example default
343
+ $ pulumi import vault:identity/mfaLoginEnforcement:MfaLoginEnforcement example default
337
344
  ```
338
345
 
339
346
  :param str resource_name: The name of the resource.
@@ -361,12 +368,14 @@ class MfaLoginEnforcement(pulumi.CustomResource):
361
368
  import pulumi
362
369
  import pulumi_vault as vault
363
370
 
364
- example_mfa_duo = vault.identity.MfaDuo("exampleMfaDuo",
371
+ example = vault.identity.MfaDuo("example",
365
372
  secret_key="secret-key",
366
373
  integration_key="int-key",
367
374
  api_hostname="foo.baz",
368
375
  push_info="push-info")
369
- example_mfa_login_enforcement = vault.identity.MfaLoginEnforcement("exampleMfaLoginEnforcement", mfa_method_ids=[example_mfa_duo.method_id])
376
+ example_mfa_login_enforcement = vault.identity.MfaLoginEnforcement("example",
377
+ name="default",
378
+ mfa_method_ids=[example.method_id])
370
379
  ```
371
380
 
372
381
  ## Import
@@ -374,7 +383,7 @@ class MfaLoginEnforcement(pulumi.CustomResource):
374
383
  Resource can be imported using its `name` field, e.g.
375
384
 
376
385
  ```sh
377
- $ pulumi import vault:identity/mfaLoginEnforcement:MfaLoginEnforcement example default
386
+ $ pulumi import vault:identity/mfaLoginEnforcement:MfaLoginEnforcement example default
378
387
  ```
379
388
 
380
389
  :param str resource_name: The name of the resource.
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['MfaOktaArgs', 'MfaOkta']
@@ -351,9 +356,9 @@ class MfaOkta(pulumi.CustomResource):
351
356
  import pulumi_vault as vault
352
357
 
353
358
  example = vault.identity.MfaOkta("example",
359
+ org_name="org1",
354
360
  api_token="token1",
355
- base_url="qux.baz.com",
356
- org_name="org1")
361
+ base_url="qux.baz.com")
357
362
  ```
358
363
 
359
364
  ## Import
@@ -361,7 +366,7 @@ class MfaOkta(pulumi.CustomResource):
361
366
  Resource can be imported using its `uuid` field, e.g.
362
367
 
363
368
  ```sh
364
- $ pulumi import vault:identity/mfaOkta:MfaOkta example 0d89c36a-4ff5-4d70-8749-bb6a5598aeec
369
+ $ pulumi import vault:identity/mfaOkta:MfaOkta example 0d89c36a-4ff5-4d70-8749-bb6a5598aeec
365
370
  ```
366
371
 
367
372
  :param str resource_name: The name of the resource.
@@ -389,9 +394,9 @@ class MfaOkta(pulumi.CustomResource):
389
394
  import pulumi_vault as vault
390
395
 
391
396
  example = vault.identity.MfaOkta("example",
397
+ org_name="org1",
392
398
  api_token="token1",
393
- base_url="qux.baz.com",
394
- org_name="org1")
399
+ base_url="qux.baz.com")
395
400
  ```
396
401
 
397
402
  ## Import
@@ -399,7 +404,7 @@ class MfaOkta(pulumi.CustomResource):
399
404
  Resource can be imported using its `uuid` field, e.g.
400
405
 
401
406
  ```sh
402
- $ pulumi import vault:identity/mfaOkta:MfaOkta example 0d89c36a-4ff5-4d70-8749-bb6a5598aeec
407
+ $ pulumi import vault:identity/mfaOkta:MfaOkta example 0d89c36a-4ff5-4d70-8749-bb6a5598aeec
403
408
  ```
404
409
 
405
410
  :param str resource_name: The name of the resource.
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['MfaPingidArgs', 'MfaPingid']
@@ -340,7 +345,7 @@ class MfaPingid(pulumi.CustomResource):
340
345
  Resource can be imported using its `uuid` field, e.g.
341
346
 
342
347
  ```sh
343
- $ pulumi import vault:identity/mfaPingid:MfaPingid example 0d89c36a-4ff5-4d70-8749-bb6a5598aeec
348
+ $ pulumi import vault:identity/mfaPingid:MfaPingid example 0d89c36a-4ff5-4d70-8749-bb6a5598aeec
344
349
  ```
345
350
 
346
351
  :param str resource_name: The name of the resource.
@@ -372,7 +377,7 @@ class MfaPingid(pulumi.CustomResource):
372
377
  Resource can be imported using its `uuid` field, e.g.
373
378
 
374
379
  ```sh
375
- $ pulumi import vault:identity/mfaPingid:MfaPingid example 0d89c36a-4ff5-4d70-8749-bb6a5598aeec
380
+ $ pulumi import vault:identity/mfaPingid:MfaPingid example 0d89c36a-4ff5-4d70-8749-bb6a5598aeec
376
381
  ```
377
382
 
378
383
  :param str resource_name: The name of the resource.
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['MfaTotpArgs', 'MfaTotp']
@@ -458,7 +463,7 @@ class MfaTotp(pulumi.CustomResource):
458
463
  Resource can be imported using its `uuid` field, e.g.
459
464
 
460
465
  ```sh
461
- $ pulumi import vault:identity/mfaTotp:MfaTotp example 0d89c36a-4ff5-4d70-8749-bb6a5598aeec
466
+ $ pulumi import vault:identity/mfaTotp:MfaTotp example 0d89c36a-4ff5-4d70-8749-bb6a5598aeec
462
467
  ```
463
468
 
464
469
  :param str resource_name: The name of the resource.
@@ -496,7 +501,7 @@ class MfaTotp(pulumi.CustomResource):
496
501
  Resource can be imported using its `uuid` field, e.g.
497
502
 
498
503
  ```sh
499
- $ pulumi import vault:identity/mfaTotp:MfaTotp example 0d89c36a-4ff5-4d70-8749-bb6a5598aeec
504
+ $ pulumi import vault:identity/mfaTotp:MfaTotp example 0d89c36a-4ff5-4d70-8749-bb6a5598aeec
500
505
  ```
501
506
 
502
507
  :param str resource_name: The name of the resource.
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['OidcArgs', 'Oidc']
@@ -24,7 +29,7 @@ class OidcArgs:
24
29
  components.
25
30
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
26
31
  The value should not contain leading or trailing forward slashes.
27
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
32
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
28
33
  *Available only for Vault Enterprise*.
29
34
  """
30
35
  if issuer is not None:
@@ -53,7 +58,7 @@ class OidcArgs:
53
58
  """
54
59
  The namespace to provision the resource in.
55
60
  The value should not contain leading or trailing forward slashes.
56
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
61
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
57
62
  *Available only for Vault Enterprise*.
58
63
  """
59
64
  return pulumi.get(self, "namespace")
@@ -76,7 +81,7 @@ class _OidcState:
76
81
  components.
77
82
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
78
83
  The value should not contain leading or trailing forward slashes.
79
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
84
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
80
85
  *Available only for Vault Enterprise*.
81
86
  """
82
87
  if issuer is not None:
@@ -105,7 +110,7 @@ class _OidcState:
105
110
  """
106
111
  The namespace to provision the resource in.
107
112
  The value should not contain leading or trailing forward slashes.
108
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
113
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
109
114
  *Available only for Vault Enterprise*.
110
115
  """
111
116
  return pulumi.get(self, "namespace")
@@ -148,7 +153,7 @@ class Oidc(pulumi.CustomResource):
148
153
  components.
149
154
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
150
155
  The value should not contain leading or trailing forward slashes.
151
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
156
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
152
157
  *Available only for Vault Enterprise*.
153
158
  """
154
159
  ...
@@ -227,7 +232,7 @@ class Oidc(pulumi.CustomResource):
227
232
  components.
228
233
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
229
234
  The value should not contain leading or trailing forward slashes.
230
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
235
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
231
236
  *Available only for Vault Enterprise*.
232
237
  """
233
238
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -255,7 +260,7 @@ class Oidc(pulumi.CustomResource):
255
260
  """
256
261
  The namespace to provision the resource in.
257
262
  The value should not contain leading or trailing forward slashes.
258
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
263
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
259
264
  *Available only for Vault Enterprise*.
260
265
  """
261
266
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['OidcAssignmentArgs', 'OidcAssignment']
@@ -25,7 +30,7 @@ class OidcAssignmentArgs:
25
30
  :param pulumi.Input[str] name: The name of the assignment.
26
31
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
27
32
  The value should not contain leading or trailing forward slashes.
28
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
33
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
29
34
  *Available only for Vault Enterprise*.
30
35
  """
31
36
  if entity_ids is not None:
@@ -79,7 +84,7 @@ class OidcAssignmentArgs:
79
84
  """
80
85
  The namespace to provision the resource in.
81
86
  The value should not contain leading or trailing forward slashes.
82
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
87
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
83
88
  *Available only for Vault Enterprise*.
84
89
  """
85
90
  return pulumi.get(self, "namespace")
@@ -103,7 +108,7 @@ class _OidcAssignmentState:
103
108
  :param pulumi.Input[str] name: The name of the assignment.
104
109
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
105
110
  The value should not contain leading or trailing forward slashes.
106
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
111
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
107
112
  *Available only for Vault Enterprise*.
108
113
  """
109
114
  if entity_ids is not None:
@@ -157,7 +162,7 @@ class _OidcAssignmentState:
157
162
  """
158
163
  The namespace to provision the resource in.
159
164
  The value should not contain leading or trailing forward slashes.
160
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
165
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
161
166
  *Available only for Vault Enterprise*.
162
167
  """
163
168
  return pulumi.get(self, "namespace")
@@ -188,13 +193,17 @@ class OidcAssignment(pulumi.CustomResource):
188
193
  import pulumi_vault as vault
189
194
 
190
195
  internal = vault.identity.Group("internal",
196
+ name="internal",
191
197
  type="internal",
192
198
  policies=[
193
199
  "dev",
194
200
  "test",
195
201
  ])
196
- test = vault.identity.Entity("test", policies=["test"])
202
+ test = vault.identity.Entity("test",
203
+ name="test",
204
+ policies=["test"])
197
205
  default = vault.identity.OidcAssignment("default",
206
+ name="assignment",
198
207
  entity_ids=[test.id],
199
208
  group_ids=[internal.id])
200
209
  ```
@@ -204,7 +213,7 @@ class OidcAssignment(pulumi.CustomResource):
204
213
  OIDC Assignments can be imported using the `name`, e.g.
205
214
 
206
215
  ```sh
207
- $ pulumi import vault:identity/oidcAssignment:OidcAssignment default assignment
216
+ $ pulumi import vault:identity/oidcAssignment:OidcAssignment default assignment
208
217
  ```
209
218
 
210
219
  :param str resource_name: The name of the resource.
@@ -214,7 +223,7 @@ class OidcAssignment(pulumi.CustomResource):
214
223
  :param pulumi.Input[str] name: The name of the assignment.
215
224
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
216
225
  The value should not contain leading or trailing forward slashes.
217
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
226
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
218
227
  *Available only for Vault Enterprise*.
219
228
  """
220
229
  ...
@@ -234,13 +243,17 @@ class OidcAssignment(pulumi.CustomResource):
234
243
  import pulumi_vault as vault
235
244
 
236
245
  internal = vault.identity.Group("internal",
246
+ name="internal",
237
247
  type="internal",
238
248
  policies=[
239
249
  "dev",
240
250
  "test",
241
251
  ])
242
- test = vault.identity.Entity("test", policies=["test"])
252
+ test = vault.identity.Entity("test",
253
+ name="test",
254
+ policies=["test"])
243
255
  default = vault.identity.OidcAssignment("default",
256
+ name="assignment",
244
257
  entity_ids=[test.id],
245
258
  group_ids=[internal.id])
246
259
  ```
@@ -250,7 +263,7 @@ class OidcAssignment(pulumi.CustomResource):
250
263
  OIDC Assignments can be imported using the `name`, e.g.
251
264
 
252
265
  ```sh
253
- $ pulumi import vault:identity/oidcAssignment:OidcAssignment default assignment
266
+ $ pulumi import vault:identity/oidcAssignment:OidcAssignment default assignment
254
267
  ```
255
268
 
256
269
  :param str resource_name: The name of the resource.
@@ -311,7 +324,7 @@ class OidcAssignment(pulumi.CustomResource):
311
324
  :param pulumi.Input[str] name: The name of the assignment.
312
325
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
313
326
  The value should not contain leading or trailing forward slashes.
314
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
327
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
315
328
  *Available only for Vault Enterprise*.
316
329
  """
317
330
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -354,7 +367,7 @@ class OidcAssignment(pulumi.CustomResource):
354
367
  """
355
368
  The namespace to provision the resource in.
356
369
  The value should not contain leading or trailing forward slashes.
357
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
370
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
358
371
  *Available only for Vault Enterprise*.
359
372
  """
360
373
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['OidcClientArgs', 'OidcClient']
@@ -36,7 +41,7 @@ class OidcClientArgs:
36
41
  :param pulumi.Input[str] name: The name of the client.
37
42
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
38
43
  The value should not contain leading or trailing forward slashes.
39
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
44
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
40
45
  *Available only for Vault Enterprise*.
41
46
  :param pulumi.Input[Sequence[pulumi.Input[str]]] redirect_uris: Redirection URI values used by the client.
42
47
  One of these values must exactly match the `redirect_uri` parameter value
@@ -141,7 +146,7 @@ class OidcClientArgs:
141
146
  """
142
147
  The namespace to provision the resource in.
143
148
  The value should not contain leading or trailing forward slashes.
144
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
149
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
145
150
  *Available only for Vault Enterprise*.
146
151
  """
147
152
  return pulumi.get(self, "namespace")
@@ -182,8 +187,9 @@ class _OidcClientState:
182
187
  Input properties used for looking up and filtering OidcClient resources.
183
188
  :param pulumi.Input[int] access_token_ttl: The time-to-live for access tokens obtained by the client.
184
189
  :param pulumi.Input[Sequence[pulumi.Input[str]]] assignments: A list of assignment resources associated with the client.
185
- :param pulumi.Input[str] client_id: The Client ID from Vault.
186
- :param pulumi.Input[str] client_secret: The Client Secret from Vault.
190
+ :param pulumi.Input[str] client_id: The Client ID returned by Vault.
191
+ :param pulumi.Input[str] client_secret: The Client Secret Key returned by Vault.
192
+ For public OpenID Clients `client_secret` is set to an empty string `""`
187
193
  :param pulumi.Input[str] client_type: The client type based on its ability to maintain confidentiality of credentials.
188
194
  The following client types are supported: `confidential`, `public`. Defaults to `confidential`.
189
195
  :param pulumi.Input[int] id_token_ttl: The time-to-live for ID tokens obtained by the client.
@@ -194,7 +200,7 @@ class _OidcClientState:
194
200
  :param pulumi.Input[str] name: The name of the client.
195
201
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
196
202
  The value should not contain leading or trailing forward slashes.
197
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
203
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
198
204
  *Available only for Vault Enterprise*.
199
205
  :param pulumi.Input[Sequence[pulumi.Input[str]]] redirect_uris: Redirection URI values used by the client.
200
206
  One of these values must exactly match the `redirect_uri` parameter value
@@ -249,7 +255,7 @@ class _OidcClientState:
249
255
  @pulumi.getter(name="clientId")
250
256
  def client_id(self) -> Optional[pulumi.Input[str]]:
251
257
  """
252
- The Client ID from Vault.
258
+ The Client ID returned by Vault.
253
259
  """
254
260
  return pulumi.get(self, "client_id")
255
261
 
@@ -261,7 +267,8 @@ class _OidcClientState:
261
267
  @pulumi.getter(name="clientSecret")
262
268
  def client_secret(self) -> Optional[pulumi.Input[str]]:
263
269
  """
264
- The Client Secret from Vault.
270
+ The Client Secret Key returned by Vault.
271
+ For public OpenID Clients `client_secret` is set to an empty string `""`
265
272
  """
266
273
  return pulumi.get(self, "client_secret")
267
274
 
@@ -327,7 +334,7 @@ class _OidcClientState:
327
334
  """
328
335
  The namespace to provision the resource in.
329
336
  The value should not contain leading or trailing forward slashes.
330
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
337
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
331
338
  *Available only for Vault Enterprise*.
332
339
  """
333
340
  return pulumi.get(self, "namespace")
@@ -375,16 +382,18 @@ class OidcClient(pulumi.CustomResource):
375
382
  import pulumi
376
383
  import pulumi_vault as vault
377
384
 
378
- test_oidc_assignment = vault.identity.OidcAssignment("testOidcAssignment",
385
+ test = vault.identity.OidcAssignment("test",
386
+ name="my-assignment",
379
387
  entity_ids=["ascbascas-2231a-sdfaa"],
380
388
  group_ids=["sajkdsad-32414-sfsada"])
381
- test_oidc_client = vault.identity.OidcClient("testOidcClient",
389
+ test_oidc_client = vault.identity.OidcClient("test",
390
+ name="my-app",
382
391
  redirect_uris=[
383
392
  "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
384
393
  "http://127.0.0.1:8251/callback",
385
394
  "http://127.0.0.1:8080/callback",
386
395
  ],
387
- assignments=[test_oidc_assignment.name],
396
+ assignments=[test.name],
388
397
  id_token_ttl=2400,
389
398
  access_token_ttl=7200)
390
399
  ```
@@ -394,7 +403,7 @@ class OidcClient(pulumi.CustomResource):
394
403
  OIDC Clients can be imported using the `name`, e.g.
395
404
 
396
405
  ```sh
397
- $ pulumi import vault:identity/oidcClient:OidcClient test my-app
406
+ $ pulumi import vault:identity/oidcClient:OidcClient test my-app
398
407
  ```
399
408
 
400
409
  :param str resource_name: The name of the resource.
@@ -411,7 +420,7 @@ class OidcClient(pulumi.CustomResource):
411
420
  :param pulumi.Input[str] name: The name of the client.
412
421
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
413
422
  The value should not contain leading or trailing forward slashes.
414
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
423
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
415
424
  *Available only for Vault Enterprise*.
416
425
  :param pulumi.Input[Sequence[pulumi.Input[str]]] redirect_uris: Redirection URI values used by the client.
417
426
  One of these values must exactly match the `redirect_uri` parameter value
@@ -433,16 +442,18 @@ class OidcClient(pulumi.CustomResource):
433
442
  import pulumi
434
443
  import pulumi_vault as vault
435
444
 
436
- test_oidc_assignment = vault.identity.OidcAssignment("testOidcAssignment",
445
+ test = vault.identity.OidcAssignment("test",
446
+ name="my-assignment",
437
447
  entity_ids=["ascbascas-2231a-sdfaa"],
438
448
  group_ids=["sajkdsad-32414-sfsada"])
439
- test_oidc_client = vault.identity.OidcClient("testOidcClient",
449
+ test_oidc_client = vault.identity.OidcClient("test",
450
+ name="my-app",
440
451
  redirect_uris=[
441
452
  "http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
442
453
  "http://127.0.0.1:8251/callback",
443
454
  "http://127.0.0.1:8080/callback",
444
455
  ],
445
- assignments=[test_oidc_assignment.name],
456
+ assignments=[test.name],
446
457
  id_token_ttl=2400,
447
458
  access_token_ttl=7200)
448
459
  ```
@@ -452,7 +463,7 @@ class OidcClient(pulumi.CustomResource):
452
463
  OIDC Clients can be imported using the `name`, e.g.
453
464
 
454
465
  ```sh
455
- $ pulumi import vault:identity/oidcClient:OidcClient test my-app
466
+ $ pulumi import vault:identity/oidcClient:OidcClient test my-app
456
467
  ```
457
468
 
458
469
  :param str resource_name: The name of the resource.
@@ -528,8 +539,9 @@ class OidcClient(pulumi.CustomResource):
528
539
  :param pulumi.ResourceOptions opts: Options for the resource.
529
540
  :param pulumi.Input[int] access_token_ttl: The time-to-live for access tokens obtained by the client.
530
541
  :param pulumi.Input[Sequence[pulumi.Input[str]]] assignments: A list of assignment resources associated with the client.
531
- :param pulumi.Input[str] client_id: The Client ID from Vault.
532
- :param pulumi.Input[str] client_secret: The Client Secret from Vault.
542
+ :param pulumi.Input[str] client_id: The Client ID returned by Vault.
543
+ :param pulumi.Input[str] client_secret: The Client Secret Key returned by Vault.
544
+ For public OpenID Clients `client_secret` is set to an empty string `""`
533
545
  :param pulumi.Input[str] client_type: The client type based on its ability to maintain confidentiality of credentials.
534
546
  The following client types are supported: `confidential`, `public`. Defaults to `confidential`.
535
547
  :param pulumi.Input[int] id_token_ttl: The time-to-live for ID tokens obtained by the client.
@@ -540,7 +552,7 @@ class OidcClient(pulumi.CustomResource):
540
552
  :param pulumi.Input[str] name: The name of the client.
541
553
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
542
554
  The value should not contain leading or trailing forward slashes.
543
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
555
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
544
556
  *Available only for Vault Enterprise*.
545
557
  :param pulumi.Input[Sequence[pulumi.Input[str]]] redirect_uris: Redirection URI values used by the client.
546
558
  One of these values must exactly match the `redirect_uri` parameter value
@@ -582,7 +594,7 @@ class OidcClient(pulumi.CustomResource):
582
594
  @pulumi.getter(name="clientId")
583
595
  def client_id(self) -> pulumi.Output[str]:
584
596
  """
585
- The Client ID from Vault.
597
+ The Client ID returned by Vault.
586
598
  """
587
599
  return pulumi.get(self, "client_id")
588
600
 
@@ -590,7 +602,8 @@ class OidcClient(pulumi.CustomResource):
590
602
  @pulumi.getter(name="clientSecret")
591
603
  def client_secret(self) -> pulumi.Output[str]:
592
604
  """
593
- The Client Secret from Vault.
605
+ The Client Secret Key returned by Vault.
606
+ For public OpenID Clients `client_secret` is set to an empty string `""`
594
607
  """
595
608
  return pulumi.get(self, "client_secret")
596
609
 
@@ -636,7 +649,7 @@ class OidcClient(pulumi.CustomResource):
636
649
  """
637
650
  The namespace to provision the resource in.
638
651
  The value should not contain leading or trailing forward slashes.
639
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
652
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
640
653
  *Available only for Vault Enterprise*.
641
654
  """
642
655
  return pulumi.get(self, "namespace")