pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +22 -7
  5. pulumi_vault/ad/secret_backend.py +14 -144
  6. pulumi_vault/ad/secret_library.py +14 -11
  7. pulumi_vault/ad/secret_role.py +12 -11
  8. pulumi_vault/alicloud/auth_backend_role.py +74 -192
  9. pulumi_vault/approle/auth_backend_login.py +12 -11
  10. pulumi_vault/approle/auth_backend_role.py +75 -193
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
  13. pulumi_vault/audit.py +24 -27
  14. pulumi_vault/audit_request_header.py +11 -6
  15. pulumi_vault/auth_backend.py +64 -12
  16. pulumi_vault/aws/auth_backend_cert.py +12 -7
  17. pulumi_vault/aws/auth_backend_client.py +265 -24
  18. pulumi_vault/aws/auth_backend_config_identity.py +12 -11
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +75 -193
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
  24. pulumi_vault/aws/auth_backend_sts_role.py +12 -11
  25. pulumi_vault/aws/get_access_credentials.py +34 -7
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +75 -7
  28. pulumi_vault/aws/secret_backend_role.py +183 -11
  29. pulumi_vault/aws/secret_backend_static_role.py +14 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +151 -17
  32. pulumi_vault/azure/auth_backend_role.py +75 -193
  33. pulumi_vault/azure/backend.py +223 -29
  34. pulumi_vault/azure/backend_role.py +42 -41
  35. pulumi_vault/azure/get_access_credentials.py +39 -11
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -271
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +22 -25
  44. pulumi_vault/consul/secret_backend_role.py +14 -80
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +117 -114
  48. pulumi_vault/database/secret_backend_role.py +29 -24
  49. pulumi_vault/database/secret_backend_static_role.py +85 -15
  50. pulumi_vault/database/secrets_mount.py +425 -138
  51. pulumi_vault/egp_policy.py +16 -15
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +248 -35
  54. pulumi_vault/gcp/auth_backend_role.py +75 -271
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -9
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -16
  58. pulumi_vault/gcp/secret_impersonated_account.py +74 -17
  59. pulumi_vault/gcp/secret_roleset.py +29 -26
  60. pulumi_vault/gcp/secret_static_account.py +37 -34
  61. pulumi_vault/generic/endpoint.py +22 -21
  62. pulumi_vault/generic/get_secret.py +68 -12
  63. pulumi_vault/generic/secret.py +19 -14
  64. pulumi_vault/get_auth_backend.py +24 -11
  65. pulumi_vault/get_auth_backends.py +33 -11
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -15
  69. pulumi_vault/get_policy_document.py +34 -23
  70. pulumi_vault/get_raft_autopilot_state.py +29 -14
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +17 -16
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +14 -13
  75. pulumi_vault/github/user.py +14 -13
  76. pulumi_vault/identity/entity.py +18 -15
  77. pulumi_vault/identity/entity_alias.py +18 -15
  78. pulumi_vault/identity/entity_policies.py +24 -19
  79. pulumi_vault/identity/get_entity.py +40 -14
  80. pulumi_vault/identity/get_group.py +45 -13
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -11
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -13
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -14
  84. pulumi_vault/identity/group.py +50 -49
  85. pulumi_vault/identity/group_alias.py +14 -11
  86. pulumi_vault/identity/group_member_entity_ids.py +24 -74
  87. pulumi_vault/identity/group_member_group_ids.py +36 -27
  88. pulumi_vault/identity/group_policies.py +16 -15
  89. pulumi_vault/identity/mfa_duo.py +9 -8
  90. pulumi_vault/identity/mfa_login_enforcement.py +13 -8
  91. pulumi_vault/identity/mfa_okta.py +9 -8
  92. pulumi_vault/identity/mfa_pingid.py +5 -4
  93. pulumi_vault/identity/mfa_totp.py +5 -4
  94. pulumi_vault/identity/oidc.py +12 -11
  95. pulumi_vault/identity/oidc_assignment.py +22 -13
  96. pulumi_vault/identity/oidc_client.py +34 -25
  97. pulumi_vault/identity/oidc_key.py +28 -19
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
  99. pulumi_vault/identity/oidc_provider.py +34 -23
  100. pulumi_vault/identity/oidc_role.py +40 -27
  101. pulumi_vault/identity/oidc_scope.py +18 -15
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +39 -46
  105. pulumi_vault/jwt/auth_backend_role.py +131 -260
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +22 -21
  108. pulumi_vault/kmip/secret_role.py +12 -11
  109. pulumi_vault/kmip/secret_scope.py +12 -11
  110. pulumi_vault/kubernetes/auth_backend_config.py +55 -7
  111. pulumi_vault/kubernetes/auth_backend_role.py +68 -179
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -15
  115. pulumi_vault/kubernetes/secret_backend.py +314 -29
  116. pulumi_vault/kubernetes/secret_backend_role.py +135 -56
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +23 -12
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
  120. pulumi_vault/kv/get_secret_v2.py +89 -9
  121. pulumi_vault/kv/get_secrets_list.py +22 -15
  122. pulumi_vault/kv/get_secrets_list_v2.py +35 -19
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +19 -18
  125. pulumi_vault/kv/secret_backend_v2.py +12 -11
  126. pulumi_vault/kv/secret_v2.py +55 -52
  127. pulumi_vault/ldap/auth_backend.py +125 -168
  128. pulumi_vault/ldap/auth_backend_group.py +12 -11
  129. pulumi_vault/ldap/auth_backend_user.py +12 -11
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +352 -84
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +14 -11
  135. pulumi_vault/ldap/secret_backend_static_role.py +67 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +27 -43
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +16 -13
  140. pulumi_vault/mfa_okta.py +16 -13
  141. pulumi_vault/mfa_pingid.py +16 -13
  142. pulumi_vault/mfa_totp.py +22 -19
  143. pulumi_vault/mongodbatlas/secret_backend.py +18 -17
  144. pulumi_vault/mongodbatlas/secret_role.py +41 -38
  145. pulumi_vault/mount.py +389 -65
  146. pulumi_vault/namespace.py +26 -21
  147. pulumi_vault/nomad_secret_backend.py +16 -15
  148. pulumi_vault/nomad_secret_role.py +12 -11
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +483 -41
  151. pulumi_vault/okta/auth_backend_group.py +12 -11
  152. pulumi_vault/okta/auth_backend_user.py +12 -11
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +18 -15
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -13
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -12
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
  174. pulumi_vault/pkisecret/secret_backend_key.py +12 -7
  175. pulumi_vault/pkisecret/secret_backend_role.py +19 -16
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +12 -7
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +58 -8
  185. pulumi_vault/quota_rate_limit.py +54 -4
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +16 -15
  189. pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
  190. pulumi_vault/raft_autopilot.py +12 -11
  191. pulumi_vault/raft_snapshot_agent_config.py +121 -311
  192. pulumi_vault/rgp_policy.py +14 -13
  193. pulumi_vault/saml/auth_backend.py +20 -19
  194. pulumi_vault/saml/auth_backend_role.py +90 -199
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -75
  199. pulumi_vault/secrets/sync_aws_destination.py +240 -29
  200. pulumi_vault/secrets/sync_azure_destination.py +90 -33
  201. pulumi_vault/secrets/sync_config.py +7 -6
  202. pulumi_vault/secrets/sync_gcp_destination.py +156 -27
  203. pulumi_vault/secrets/sync_gh_destination.py +187 -15
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +72 -15
  206. pulumi_vault/ssh/_inputs.py +28 -32
  207. pulumi_vault/ssh/outputs.py +11 -32
  208. pulumi_vault/ssh/secret_backend_ca.py +106 -11
  209. pulumi_vault/ssh/secret_backend_role.py +83 -120
  210. pulumi_vault/terraformcloud/secret_backend.py +5 -56
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -24
  212. pulumi_vault/terraformcloud/secret_role.py +14 -76
  213. pulumi_vault/token.py +26 -25
  214. pulumi_vault/tokenauth/auth_backend_role.py +76 -201
  215. pulumi_vault/transform/alphabet.py +16 -13
  216. pulumi_vault/transform/get_decode.py +45 -21
  217. pulumi_vault/transform/get_encode.py +45 -21
  218. pulumi_vault/transform/role.py +16 -13
  219. pulumi_vault/transform/template.py +30 -25
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -25
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +25 -97
  224. pulumi_vault/transit/secret_cache_config.py +12 -11
  225. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['EntityArgs', 'Entity']
@@ -28,7 +33,7 @@ class EntityArgs:
28
33
  :param pulumi.Input[str] name: Name of the identity entity to create.
29
34
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
30
35
  The value should not contain leading or trailing forward slashes.
31
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
36
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
32
37
  *Available only for Vault Enterprise*.
33
38
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: A list of policies to apply to the entity.
34
39
  """
@@ -99,7 +104,7 @@ class EntityArgs:
99
104
  """
100
105
  The namespace to provision the resource in.
101
106
  The value should not contain leading or trailing forward slashes.
102
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
107
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
103
108
  *Available only for Vault Enterprise*.
104
109
  """
105
110
  return pulumi.get(self, "namespace")
@@ -138,7 +143,7 @@ class _EntityState:
138
143
  :param pulumi.Input[str] name: Name of the identity entity to create.
139
144
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
140
145
  The value should not contain leading or trailing forward slashes.
141
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
146
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
142
147
  *Available only for Vault Enterprise*.
143
148
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: A list of policies to apply to the entity.
144
149
  """
@@ -209,7 +214,7 @@ class _EntityState:
209
214
  """
210
215
  The namespace to provision the resource in.
211
216
  The value should not contain leading or trailing forward slashes.
212
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
217
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
213
218
  *Available only for Vault Enterprise*.
214
219
  """
215
220
  return pulumi.get(self, "namespace")
@@ -246,18 +251,17 @@ class Entity(pulumi.CustomResource):
246
251
  """
247
252
  ## Example Usage
248
253
 
249
- <!--Start PulumiCodeChooser -->
250
254
  ```python
251
255
  import pulumi
252
256
  import pulumi_vault as vault
253
257
 
254
258
  test = vault.identity.Entity("test",
259
+ name="tester1",
260
+ policies=["test"],
255
261
  metadata={
256
262
  "foo": "bar",
257
- },
258
- policies=["test"])
263
+ })
259
264
  ```
260
- <!--End PulumiCodeChooser -->
261
265
 
262
266
  ## Import
263
267
 
@@ -275,7 +279,7 @@ class Entity(pulumi.CustomResource):
275
279
  :param pulumi.Input[str] name: Name of the identity entity to create.
276
280
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
277
281
  The value should not contain leading or trailing forward slashes.
278
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
282
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
279
283
  *Available only for Vault Enterprise*.
280
284
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: A list of policies to apply to the entity.
281
285
  """
@@ -288,18 +292,17 @@ class Entity(pulumi.CustomResource):
288
292
  """
289
293
  ## Example Usage
290
294
 
291
- <!--Start PulumiCodeChooser -->
292
295
  ```python
293
296
  import pulumi
294
297
  import pulumi_vault as vault
295
298
 
296
299
  test = vault.identity.Entity("test",
300
+ name="tester1",
301
+ policies=["test"],
297
302
  metadata={
298
303
  "foo": "bar",
299
- },
300
- policies=["test"])
304
+ })
301
305
  ```
302
- <!--End PulumiCodeChooser -->
303
306
 
304
307
  ## Import
305
308
 
@@ -374,7 +377,7 @@ class Entity(pulumi.CustomResource):
374
377
  :param pulumi.Input[str] name: Name of the identity entity to create.
375
378
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
376
379
  The value should not contain leading or trailing forward slashes.
377
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
380
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
378
381
  *Available only for Vault Enterprise*.
379
382
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: A list of policies to apply to the entity.
380
383
  """
@@ -428,7 +431,7 @@ class Entity(pulumi.CustomResource):
428
431
  """
429
432
  The namespace to provision the resource in.
430
433
  The value should not contain leading or trailing forward slashes.
431
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
434
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
432
435
  *Available only for Vault Enterprise*.
433
436
  """
434
437
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['EntityAliasArgs', 'EntityAlias']
@@ -27,7 +32,7 @@ class EntityAliasArgs:
27
32
  :param pulumi.Input[str] name: Name of the alias. Name should be the identifier of the client in the authentication source. For example, if the alias belongs to userpass backend, the name should be a valid username within userpass backend. If alias belongs to GitHub, it should be the GitHub username.
28
33
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
29
34
  The value should not contain leading or trailing forward slashes.
30
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
35
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
31
36
  *Available only for Vault Enterprise*.
32
37
  """
33
38
  pulumi.set(__self__, "canonical_id", canonical_id)
@@ -93,7 +98,7 @@ class EntityAliasArgs:
93
98
  """
94
99
  The namespace to provision the resource in.
95
100
  The value should not contain leading or trailing forward slashes.
96
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
101
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
97
102
  *Available only for Vault Enterprise*.
98
103
  """
99
104
  return pulumi.get(self, "namespace")
@@ -119,7 +124,7 @@ class _EntityAliasState:
119
124
  :param pulumi.Input[str] name: Name of the alias. Name should be the identifier of the client in the authentication source. For example, if the alias belongs to userpass backend, the name should be a valid username within userpass backend. If alias belongs to GitHub, it should be the GitHub username.
120
125
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
121
126
  The value should not contain leading or trailing forward slashes.
122
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
127
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
123
128
  *Available only for Vault Enterprise*.
124
129
  """
125
130
  if canonical_id is not None:
@@ -187,7 +192,7 @@ class _EntityAliasState:
187
192
  """
188
193
  The namespace to provision the resource in.
189
194
  The value should not contain leading or trailing forward slashes.
190
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
195
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
191
196
  *Available only for Vault Enterprise*.
192
197
  """
193
198
  return pulumi.get(self, "namespace")
@@ -211,16 +216,15 @@ class EntityAlias(pulumi.CustomResource):
211
216
  """
212
217
  ## Example Usage
213
218
 
214
- <!--Start PulumiCodeChooser -->
215
219
  ```python
216
220
  import pulumi
217
221
  import pulumi_vault as vault
218
222
 
219
223
  test = vault.identity.EntityAlias("test",
220
- canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8",
221
- mount_accessor="token_1f2bd5")
224
+ name="user_1",
225
+ mount_accessor="token_1f2bd5",
226
+ canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8")
222
227
  ```
223
- <!--End PulumiCodeChooser -->
224
228
 
225
229
  ## Import
226
230
 
@@ -238,7 +242,7 @@ class EntityAlias(pulumi.CustomResource):
238
242
  :param pulumi.Input[str] name: Name of the alias. Name should be the identifier of the client in the authentication source. For example, if the alias belongs to userpass backend, the name should be a valid username within userpass backend. If alias belongs to GitHub, it should be the GitHub username.
239
243
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
240
244
  The value should not contain leading or trailing forward slashes.
241
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
245
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
242
246
  *Available only for Vault Enterprise*.
243
247
  """
244
248
  ...
@@ -250,16 +254,15 @@ class EntityAlias(pulumi.CustomResource):
250
254
  """
251
255
  ## Example Usage
252
256
 
253
- <!--Start PulumiCodeChooser -->
254
257
  ```python
255
258
  import pulumi
256
259
  import pulumi_vault as vault
257
260
 
258
261
  test = vault.identity.EntityAlias("test",
259
- canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8",
260
- mount_accessor="token_1f2bd5")
262
+ name="user_1",
263
+ mount_accessor="token_1f2bd5",
264
+ canonical_id="49877D63-07AD-4B85-BDA8-B61626C477E8")
261
265
  ```
262
- <!--End PulumiCodeChooser -->
263
266
 
264
267
  ## Import
265
268
 
@@ -335,7 +338,7 @@ class EntityAlias(pulumi.CustomResource):
335
338
  :param pulumi.Input[str] name: Name of the alias. Name should be the identifier of the client in the authentication source. For example, if the alias belongs to userpass backend, the name should be a valid username within userpass backend. If alias belongs to GitHub, it should be the GitHub username.
336
339
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
337
340
  The value should not contain leading or trailing forward slashes.
338
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
341
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
339
342
  *Available only for Vault Enterprise*.
340
343
  """
341
344
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -387,7 +390,7 @@ class EntityAlias(pulumi.CustomResource):
387
390
  """
388
391
  The namespace to provision the resource in.
389
392
  The value should not contain leading or trailing forward slashes.
390
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
393
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
391
394
  *Available only for Vault Enterprise*.
392
395
  """
393
396
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['EntityPoliciesArgs', 'EntityPolicies']
@@ -29,7 +34,7 @@ class EntityPoliciesArgs:
29
34
  If set to `false`, this resource will simply ensure that the policies specified in the resource are present in the entity. When destroying the resource, the resource will ensure that the policies specified in the resource are removed.
30
35
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
31
36
  The value should not contain leading or trailing forward slashes.
32
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
37
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
33
38
  *Available only for Vault Enterprise*.
34
39
  """
35
40
  pulumi.set(__self__, "entity_id", entity_id)
@@ -85,7 +90,7 @@ class EntityPoliciesArgs:
85
90
  """
86
91
  The namespace to provision the resource in.
87
92
  The value should not contain leading or trailing forward slashes.
88
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
93
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
89
94
  *Available only for Vault Enterprise*.
90
95
  """
91
96
  return pulumi.get(self, "namespace")
@@ -114,7 +119,7 @@ class _EntityPoliciesState:
114
119
  If set to `false`, this resource will simply ensure that the policies specified in the resource are present in the entity. When destroying the resource, the resource will ensure that the policies specified in the resource are removed.
115
120
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
116
121
  The value should not contain leading or trailing forward slashes.
117
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
122
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
118
123
  *Available only for Vault Enterprise*.
119
124
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies to assign to the entity
120
125
  """
@@ -175,7 +180,7 @@ class _EntityPoliciesState:
175
180
  """
176
181
  The namespace to provision the resource in.
177
182
  The value should not contain leading or trailing forward slashes.
178
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
183
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
179
184
  *Available only for Vault Enterprise*.
180
185
  """
181
186
  return pulumi.get(self, "namespace")
@@ -214,12 +219,13 @@ class EntityPolicies(pulumi.CustomResource):
214
219
 
215
220
  ### Exclusive Policies
216
221
 
217
- <!--Start PulumiCodeChooser -->
218
222
  ```python
219
223
  import pulumi
220
224
  import pulumi_vault as vault
221
225
 
222
- entity = vault.identity.Entity("entity", external_policies=True)
226
+ entity = vault.identity.Entity("entity",
227
+ name="entity",
228
+ external_policies=True)
223
229
  policies = vault.identity.EntityPolicies("policies",
224
230
  policies=[
225
231
  "default",
@@ -228,16 +234,16 @@ class EntityPolicies(pulumi.CustomResource):
228
234
  exclusive=True,
229
235
  entity_id=entity.id)
230
236
  ```
231
- <!--End PulumiCodeChooser -->
232
237
 
233
238
  ### Non-exclusive Policies
234
239
 
235
- <!--Start PulumiCodeChooser -->
236
240
  ```python
237
241
  import pulumi
238
242
  import pulumi_vault as vault
239
243
 
240
- entity = vault.identity.Entity("entity", external_policies=True)
244
+ entity = vault.identity.Entity("entity",
245
+ name="entity",
246
+ external_policies=True)
241
247
  default = vault.identity.EntityPolicies("default",
242
248
  policies=[
243
249
  "default",
@@ -250,7 +256,6 @@ class EntityPolicies(pulumi.CustomResource):
250
256
  exclusive=False,
251
257
  entity_id=entity.id)
252
258
  ```
253
- <!--End PulumiCodeChooser -->
254
259
 
255
260
  :param str resource_name: The name of the resource.
256
261
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -262,7 +267,7 @@ class EntityPolicies(pulumi.CustomResource):
262
267
  If set to `false`, this resource will simply ensure that the policies specified in the resource are present in the entity. When destroying the resource, the resource will ensure that the policies specified in the resource are removed.
263
268
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
264
269
  The value should not contain leading or trailing forward slashes.
265
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
270
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
266
271
  *Available only for Vault Enterprise*.
267
272
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies to assign to the entity
268
273
  """
@@ -279,12 +284,13 @@ class EntityPolicies(pulumi.CustomResource):
279
284
 
280
285
  ### Exclusive Policies
281
286
 
282
- <!--Start PulumiCodeChooser -->
283
287
  ```python
284
288
  import pulumi
285
289
  import pulumi_vault as vault
286
290
 
287
- entity = vault.identity.Entity("entity", external_policies=True)
291
+ entity = vault.identity.Entity("entity",
292
+ name="entity",
293
+ external_policies=True)
288
294
  policies = vault.identity.EntityPolicies("policies",
289
295
  policies=[
290
296
  "default",
@@ -293,16 +299,16 @@ class EntityPolicies(pulumi.CustomResource):
293
299
  exclusive=True,
294
300
  entity_id=entity.id)
295
301
  ```
296
- <!--End PulumiCodeChooser -->
297
302
 
298
303
  ### Non-exclusive Policies
299
304
 
300
- <!--Start PulumiCodeChooser -->
301
305
  ```python
302
306
  import pulumi
303
307
  import pulumi_vault as vault
304
308
 
305
- entity = vault.identity.Entity("entity", external_policies=True)
309
+ entity = vault.identity.Entity("entity",
310
+ name="entity",
311
+ external_policies=True)
306
312
  default = vault.identity.EntityPolicies("default",
307
313
  policies=[
308
314
  "default",
@@ -315,7 +321,6 @@ class EntityPolicies(pulumi.CustomResource):
315
321
  exclusive=False,
316
322
  entity_id=entity.id)
317
323
  ```
318
- <!--End PulumiCodeChooser -->
319
324
 
320
325
  :param str resource_name: The name of the resource.
321
326
  :param EntityPoliciesArgs args: The arguments to use to populate this resource's properties.
@@ -385,7 +390,7 @@ class EntityPolicies(pulumi.CustomResource):
385
390
  If set to `false`, this resource will simply ensure that the policies specified in the resource are present in the entity. When destroying the resource, the resource will ensure that the policies specified in the resource are removed.
386
391
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
387
392
  The value should not contain leading or trailing forward slashes.
388
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
393
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
389
394
  *Available only for Vault Enterprise*.
390
395
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies to assign to the entity
391
396
  """
@@ -434,7 +439,7 @@ class EntityPolicies(pulumi.CustomResource):
434
439
  """
435
440
  The namespace to provision the resource in.
436
441
  The value should not contain leading or trailing forward slashes.
437
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
442
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
438
443
  *Available only for Vault Enterprise*.
439
444
  """
440
445
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
  from . import outputs
12
17
 
@@ -189,7 +194,7 @@ class GetEntityResult:
189
194
 
190
195
  @property
191
196
  @pulumi.getter
192
- def metadata(self) -> Mapping[str, Any]:
197
+ def metadata(self) -> Mapping[str, str]:
193
198
  """
194
199
  Arbitrary metadata
195
200
  """
@@ -254,18 +259,16 @@ def get_entity(alias_id: Optional[str] = None,
254
259
  """
255
260
  ## Example Usage
256
261
 
257
- <!--Start PulumiCodeChooser -->
258
262
  ```python
259
263
  import pulumi
260
264
  import pulumi_vault as vault
261
265
 
262
266
  entity = vault.identity.get_entity(entity_name="entity_12345")
263
267
  ```
264
- <!--End PulumiCodeChooser -->
265
268
 
266
269
  ## Required Vault Capabilities
267
270
 
268
- Use of this resource requires the `create` capability on `/identity/lookup/entity`.
271
+ Use of this resource requires the `update` capability on `/identity/lookup/entity`.
269
272
 
270
273
 
271
274
  :param str alias_id: ID of the alias.
@@ -280,7 +283,7 @@ def get_entity(alias_id: Optional[str] = None,
280
283
  :param str entity_name: Name of the entity.
281
284
  :param str namespace: The namespace of the target resource.
282
285
  The value should not contain leading or trailing forward slashes.
283
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
286
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
284
287
  *Available only for Vault Enterprise*.
285
288
  """
286
289
  __args__ = dict()
@@ -313,31 +316,26 @@ def get_entity(alias_id: Optional[str] = None,
313
316
  namespace=pulumi.get(__ret__, 'namespace'),
314
317
  namespace_id=pulumi.get(__ret__, 'namespace_id'),
315
318
  policies=pulumi.get(__ret__, 'policies'))
316
-
317
-
318
- @_utilities.lift_output_func(get_entity)
319
319
  def get_entity_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
320
320
  alias_mount_accessor: Optional[pulumi.Input[Optional[str]]] = None,
321
321
  alias_name: Optional[pulumi.Input[Optional[str]]] = None,
322
322
  entity_id: Optional[pulumi.Input[Optional[str]]] = None,
323
323
  entity_name: Optional[pulumi.Input[Optional[str]]] = None,
324
324
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
325
- opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetEntityResult]:
325
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetEntityResult]:
326
326
  """
327
327
  ## Example Usage
328
328
 
329
- <!--Start PulumiCodeChooser -->
330
329
  ```python
331
330
  import pulumi
332
331
  import pulumi_vault as vault
333
332
 
334
333
  entity = vault.identity.get_entity(entity_name="entity_12345")
335
334
  ```
336
- <!--End PulumiCodeChooser -->
337
335
 
338
336
  ## Required Vault Capabilities
339
337
 
340
- Use of this resource requires the `create` capability on `/identity/lookup/entity`.
338
+ Use of this resource requires the `update` capability on `/identity/lookup/entity`.
341
339
 
342
340
 
343
341
  :param str alias_id: ID of the alias.
@@ -352,7 +350,35 @@ def get_entity_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
352
350
  :param str entity_name: Name of the entity.
353
351
  :param str namespace: The namespace of the target resource.
354
352
  The value should not contain leading or trailing forward slashes.
355
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
353
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
356
354
  *Available only for Vault Enterprise*.
357
355
  """
358
- ...
356
+ __args__ = dict()
357
+ __args__['aliasId'] = alias_id
358
+ __args__['aliasMountAccessor'] = alias_mount_accessor
359
+ __args__['aliasName'] = alias_name
360
+ __args__['entityId'] = entity_id
361
+ __args__['entityName'] = entity_name
362
+ __args__['namespace'] = namespace
363
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
364
+ __ret__ = pulumi.runtime.invoke_output('vault:identity/getEntity:getEntity', __args__, opts=opts, typ=GetEntityResult)
365
+ return __ret__.apply(lambda __response__: GetEntityResult(
366
+ alias_id=pulumi.get(__response__, 'alias_id'),
367
+ alias_mount_accessor=pulumi.get(__response__, 'alias_mount_accessor'),
368
+ alias_name=pulumi.get(__response__, 'alias_name'),
369
+ aliases=pulumi.get(__response__, 'aliases'),
370
+ creation_time=pulumi.get(__response__, 'creation_time'),
371
+ data_json=pulumi.get(__response__, 'data_json'),
372
+ direct_group_ids=pulumi.get(__response__, 'direct_group_ids'),
373
+ disabled=pulumi.get(__response__, 'disabled'),
374
+ entity_id=pulumi.get(__response__, 'entity_id'),
375
+ entity_name=pulumi.get(__response__, 'entity_name'),
376
+ group_ids=pulumi.get(__response__, 'group_ids'),
377
+ id=pulumi.get(__response__, 'id'),
378
+ inherited_group_ids=pulumi.get(__response__, 'inherited_group_ids'),
379
+ last_update_time=pulumi.get(__response__, 'last_update_time'),
380
+ merged_entity_ids=pulumi.get(__response__, 'merged_entity_ids'),
381
+ metadata=pulumi.get(__response__, 'metadata'),
382
+ namespace=pulumi.get(__response__, 'namespace'),
383
+ namespace_id=pulumi.get(__response__, 'namespace_id'),
384
+ policies=pulumi.get(__response__, 'policies')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -137,7 +142,7 @@ class GetGroupResult:
137
142
 
138
143
  @property
139
144
  @pulumi.getter(name="aliasMetadata")
140
- def alias_metadata(self) -> Mapping[str, Any]:
145
+ def alias_metadata(self) -> Mapping[str, str]:
141
146
  """
142
147
  Arbitrary metadata
143
148
  """
@@ -230,7 +235,7 @@ class GetGroupResult:
230
235
 
231
236
  @property
232
237
  @pulumi.getter
233
- def metadata(self) -> Mapping[str, Any]:
238
+ def metadata(self) -> Mapping[str, str]:
234
239
  """
235
240
  Arbitrary metadata
236
241
  """
@@ -325,14 +330,12 @@ def get_group(alias_id: Optional[str] = None,
325
330
  """
326
331
  ## Example Usage
327
332
 
328
- <!--Start PulumiCodeChooser -->
329
333
  ```python
330
334
  import pulumi
331
335
  import pulumi_vault as vault
332
336
 
333
337
  group = vault.identity.get_group(group_name="user")
334
338
  ```
335
- <!--End PulumiCodeChooser -->
336
339
 
337
340
  ## Required Vault Capabilities
338
341
 
@@ -351,7 +354,7 @@ def get_group(alias_id: Optional[str] = None,
351
354
  :param str group_name: Name of the group.
352
355
  :param str namespace: The namespace of the target resource.
353
356
  The value should not contain leading or trailing forward slashes.
354
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
357
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
355
358
  *Available only for Vault Enterprise*.
356
359
  """
357
360
  __args__ = dict()
@@ -390,27 +393,22 @@ def get_group(alias_id: Optional[str] = None,
390
393
  parent_group_ids=pulumi.get(__ret__, 'parent_group_ids'),
391
394
  policies=pulumi.get(__ret__, 'policies'),
392
395
  type=pulumi.get(__ret__, 'type'))
393
-
394
-
395
- @_utilities.lift_output_func(get_group)
396
396
  def get_group_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
397
397
  alias_mount_accessor: Optional[pulumi.Input[Optional[str]]] = None,
398
398
  alias_name: Optional[pulumi.Input[Optional[str]]] = None,
399
399
  group_id: Optional[pulumi.Input[Optional[str]]] = None,
400
400
  group_name: Optional[pulumi.Input[Optional[str]]] = None,
401
401
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
402
- opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetGroupResult]:
402
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetGroupResult]:
403
403
  """
404
404
  ## Example Usage
405
405
 
406
- <!--Start PulumiCodeChooser -->
407
406
  ```python
408
407
  import pulumi
409
408
  import pulumi_vault as vault
410
409
 
411
410
  group = vault.identity.get_group(group_name="user")
412
411
  ```
413
- <!--End PulumiCodeChooser -->
414
412
 
415
413
  ## Required Vault Capabilities
416
414
 
@@ -429,7 +427,41 @@ def get_group_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
429
427
  :param str group_name: Name of the group.
430
428
  :param str namespace: The namespace of the target resource.
431
429
  The value should not contain leading or trailing forward slashes.
432
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
430
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
433
431
  *Available only for Vault Enterprise*.
434
432
  """
435
- ...
433
+ __args__ = dict()
434
+ __args__['aliasId'] = alias_id
435
+ __args__['aliasMountAccessor'] = alias_mount_accessor
436
+ __args__['aliasName'] = alias_name
437
+ __args__['groupId'] = group_id
438
+ __args__['groupName'] = group_name
439
+ __args__['namespace'] = namespace
440
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
441
+ __ret__ = pulumi.runtime.invoke_output('vault:identity/getGroup:getGroup', __args__, opts=opts, typ=GetGroupResult)
442
+ return __ret__.apply(lambda __response__: GetGroupResult(
443
+ alias_canonical_id=pulumi.get(__response__, 'alias_canonical_id'),
444
+ alias_creation_time=pulumi.get(__response__, 'alias_creation_time'),
445
+ alias_id=pulumi.get(__response__, 'alias_id'),
446
+ alias_last_update_time=pulumi.get(__response__, 'alias_last_update_time'),
447
+ alias_merged_from_canonical_ids=pulumi.get(__response__, 'alias_merged_from_canonical_ids'),
448
+ alias_metadata=pulumi.get(__response__, 'alias_metadata'),
449
+ alias_mount_accessor=pulumi.get(__response__, 'alias_mount_accessor'),
450
+ alias_mount_path=pulumi.get(__response__, 'alias_mount_path'),
451
+ alias_mount_type=pulumi.get(__response__, 'alias_mount_type'),
452
+ alias_name=pulumi.get(__response__, 'alias_name'),
453
+ creation_time=pulumi.get(__response__, 'creation_time'),
454
+ data_json=pulumi.get(__response__, 'data_json'),
455
+ group_id=pulumi.get(__response__, 'group_id'),
456
+ group_name=pulumi.get(__response__, 'group_name'),
457
+ id=pulumi.get(__response__, 'id'),
458
+ last_update_time=pulumi.get(__response__, 'last_update_time'),
459
+ member_entity_ids=pulumi.get(__response__, 'member_entity_ids'),
460
+ member_group_ids=pulumi.get(__response__, 'member_group_ids'),
461
+ metadata=pulumi.get(__response__, 'metadata'),
462
+ modify_index=pulumi.get(__response__, 'modify_index'),
463
+ namespace=pulumi.get(__response__, 'namespace'),
464
+ namespace_id=pulumi.get(__response__, 'namespace_id'),
465
+ parent_group_ids=pulumi.get(__response__, 'parent_group_ids'),
466
+ policies=pulumi.get(__response__, 'policies'),
467
+ type=pulumi.get(__response__, 'type')))