pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,452 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from . import _utilities
16
+
17
+ __all__ = ['NamespaceArgs', 'Namespace']
18
+
19
+ @pulumi.input_type
20
+ class NamespaceArgs:
21
+ def __init__(__self__, *,
22
+ path: pulumi.Input[_builtins.str],
23
+ custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
24
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
25
+ path_fq: Optional[pulumi.Input[_builtins.str]] = None):
26
+ """
27
+ The set of arguments for constructing a Namespace resource.
28
+ :param pulumi.Input[_builtins.str] path: The path of the namespace. Must not have a trailing `/`.
29
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] custom_metadata: Custom metadata describing this namespace. Value type
30
+ is `map[string]string`. Requires Vault version 1.12+.
31
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
32
+ The value should not contain leading or trailing forward slashes.
33
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
34
+ *Available only for Vault Enterprise*.
35
+ :param pulumi.Input[_builtins.str] path_fq: The fully qualified path to the namespace. Useful when provisioning resources in a child `namespace`.
36
+ The path is relative to the provider's `namespace` argument.
37
+ """
38
+ pulumi.set(__self__, "path", path)
39
+ if custom_metadata is not None:
40
+ pulumi.set(__self__, "custom_metadata", custom_metadata)
41
+ if namespace is not None:
42
+ pulumi.set(__self__, "namespace", namespace)
43
+ if path_fq is not None:
44
+ pulumi.set(__self__, "path_fq", path_fq)
45
+
46
+ @_builtins.property
47
+ @pulumi.getter
48
+ def path(self) -> pulumi.Input[_builtins.str]:
49
+ """
50
+ The path of the namespace. Must not have a trailing `/`.
51
+ """
52
+ return pulumi.get(self, "path")
53
+
54
+ @path.setter
55
+ def path(self, value: pulumi.Input[_builtins.str]):
56
+ pulumi.set(self, "path", value)
57
+
58
+ @_builtins.property
59
+ @pulumi.getter(name="customMetadata")
60
+ def custom_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
61
+ """
62
+ Custom metadata describing this namespace. Value type
63
+ is `map[string]string`. Requires Vault version 1.12+.
64
+ """
65
+ return pulumi.get(self, "custom_metadata")
66
+
67
+ @custom_metadata.setter
68
+ def custom_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
69
+ pulumi.set(self, "custom_metadata", value)
70
+
71
+ @_builtins.property
72
+ @pulumi.getter
73
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
74
+ """
75
+ The namespace to provision the resource in.
76
+ The value should not contain leading or trailing forward slashes.
77
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
78
+ *Available only for Vault Enterprise*.
79
+ """
80
+ return pulumi.get(self, "namespace")
81
+
82
+ @namespace.setter
83
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
84
+ pulumi.set(self, "namespace", value)
85
+
86
+ @_builtins.property
87
+ @pulumi.getter(name="pathFq")
88
+ def path_fq(self) -> Optional[pulumi.Input[_builtins.str]]:
89
+ """
90
+ The fully qualified path to the namespace. Useful when provisioning resources in a child `namespace`.
91
+ The path is relative to the provider's `namespace` argument.
92
+ """
93
+ return pulumi.get(self, "path_fq")
94
+
95
+ @path_fq.setter
96
+ def path_fq(self, value: Optional[pulumi.Input[_builtins.str]]):
97
+ pulumi.set(self, "path_fq", value)
98
+
99
+
100
+ @pulumi.input_type
101
+ class _NamespaceState:
102
+ def __init__(__self__, *,
103
+ custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
104
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
105
+ namespace_id: Optional[pulumi.Input[_builtins.str]] = None,
106
+ path: Optional[pulumi.Input[_builtins.str]] = None,
107
+ path_fq: Optional[pulumi.Input[_builtins.str]] = None):
108
+ """
109
+ Input properties used for looking up and filtering Namespace resources.
110
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] custom_metadata: Custom metadata describing this namespace. Value type
111
+ is `map[string]string`. Requires Vault version 1.12+.
112
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
113
+ The value should not contain leading or trailing forward slashes.
114
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
115
+ *Available only for Vault Enterprise*.
116
+ :param pulumi.Input[_builtins.str] namespace_id: Vault server's internal ID of the namespace.
117
+ :param pulumi.Input[_builtins.str] path: The path of the namespace. Must not have a trailing `/`.
118
+ :param pulumi.Input[_builtins.str] path_fq: The fully qualified path to the namespace. Useful when provisioning resources in a child `namespace`.
119
+ The path is relative to the provider's `namespace` argument.
120
+ """
121
+ if custom_metadata is not None:
122
+ pulumi.set(__self__, "custom_metadata", custom_metadata)
123
+ if namespace is not None:
124
+ pulumi.set(__self__, "namespace", namespace)
125
+ if namespace_id is not None:
126
+ pulumi.set(__self__, "namespace_id", namespace_id)
127
+ if path is not None:
128
+ pulumi.set(__self__, "path", path)
129
+ if path_fq is not None:
130
+ pulumi.set(__self__, "path_fq", path_fq)
131
+
132
+ @_builtins.property
133
+ @pulumi.getter(name="customMetadata")
134
+ def custom_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
135
+ """
136
+ Custom metadata describing this namespace. Value type
137
+ is `map[string]string`. Requires Vault version 1.12+.
138
+ """
139
+ return pulumi.get(self, "custom_metadata")
140
+
141
+ @custom_metadata.setter
142
+ def custom_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
143
+ pulumi.set(self, "custom_metadata", value)
144
+
145
+ @_builtins.property
146
+ @pulumi.getter
147
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
148
+ """
149
+ The namespace to provision the resource in.
150
+ The value should not contain leading or trailing forward slashes.
151
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
152
+ *Available only for Vault Enterprise*.
153
+ """
154
+ return pulumi.get(self, "namespace")
155
+
156
+ @namespace.setter
157
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
158
+ pulumi.set(self, "namespace", value)
159
+
160
+ @_builtins.property
161
+ @pulumi.getter(name="namespaceId")
162
+ def namespace_id(self) -> Optional[pulumi.Input[_builtins.str]]:
163
+ """
164
+ Vault server's internal ID of the namespace.
165
+ """
166
+ return pulumi.get(self, "namespace_id")
167
+
168
+ @namespace_id.setter
169
+ def namespace_id(self, value: Optional[pulumi.Input[_builtins.str]]):
170
+ pulumi.set(self, "namespace_id", value)
171
+
172
+ @_builtins.property
173
+ @pulumi.getter
174
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
175
+ """
176
+ The path of the namespace. Must not have a trailing `/`.
177
+ """
178
+ return pulumi.get(self, "path")
179
+
180
+ @path.setter
181
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
182
+ pulumi.set(self, "path", value)
183
+
184
+ @_builtins.property
185
+ @pulumi.getter(name="pathFq")
186
+ def path_fq(self) -> Optional[pulumi.Input[_builtins.str]]:
187
+ """
188
+ The fully qualified path to the namespace. Useful when provisioning resources in a child `namespace`.
189
+ The path is relative to the provider's `namespace` argument.
190
+ """
191
+ return pulumi.get(self, "path_fq")
192
+
193
+ @path_fq.setter
194
+ def path_fq(self, value: Optional[pulumi.Input[_builtins.str]]):
195
+ pulumi.set(self, "path_fq", value)
196
+
197
+
198
+ @pulumi.type_token("vault:index/namespace:Namespace")
199
+ class Namespace(pulumi.CustomResource):
200
+ @overload
201
+ def __init__(__self__,
202
+ resource_name: str,
203
+ opts: Optional[pulumi.ResourceOptions] = None,
204
+ custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
205
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
206
+ path: Optional[pulumi.Input[_builtins.str]] = None,
207
+ path_fq: Optional[pulumi.Input[_builtins.str]] = None,
208
+ __props__=None):
209
+ """
210
+ ## Import
211
+
212
+ Namespaces can be imported using its `name` as accessor id
213
+
214
+ ```sh
215
+ $ pulumi import vault:index/namespace:Namespace example <name>
216
+ ```
217
+
218
+ If the declared resource is imported and intends to support namespaces using a provider alias, then the name is relative to the namespace path.
219
+
220
+ hcl
221
+
222
+ provider "vault" {
223
+
224
+ # Configuration options
225
+
226
+ namespace = "example"
227
+
228
+ alias = "example"
229
+
230
+ }
231
+
232
+ resource "vault_namespace" "example2" {
233
+
234
+ provider = vault.example
235
+
236
+ path = "example2"
237
+
238
+ }
239
+
240
+ ```sh
241
+ $ pulumi import vault:index/namespace:Namespace example2 example2
242
+ ```
243
+
244
+ $ terraform state show vault_namespace.example2
245
+
246
+ vault_namespace.example2:
247
+
248
+ resource "vault_namespace" "example2" {
249
+
250
+ id = "example/example2/"
251
+
252
+ namespace_id = <known after import>
253
+
254
+ path = "example2"
255
+
256
+ path_fq = "example2"
257
+
258
+ }
259
+
260
+ :param str resource_name: The name of the resource.
261
+ :param pulumi.ResourceOptions opts: Options for the resource.
262
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] custom_metadata: Custom metadata describing this namespace. Value type
263
+ is `map[string]string`. Requires Vault version 1.12+.
264
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
265
+ The value should not contain leading or trailing forward slashes.
266
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
267
+ *Available only for Vault Enterprise*.
268
+ :param pulumi.Input[_builtins.str] path: The path of the namespace. Must not have a trailing `/`.
269
+ :param pulumi.Input[_builtins.str] path_fq: The fully qualified path to the namespace. Useful when provisioning resources in a child `namespace`.
270
+ The path is relative to the provider's `namespace` argument.
271
+ """
272
+ ...
273
+ @overload
274
+ def __init__(__self__,
275
+ resource_name: str,
276
+ args: NamespaceArgs,
277
+ opts: Optional[pulumi.ResourceOptions] = None):
278
+ """
279
+ ## Import
280
+
281
+ Namespaces can be imported using its `name` as accessor id
282
+
283
+ ```sh
284
+ $ pulumi import vault:index/namespace:Namespace example <name>
285
+ ```
286
+
287
+ If the declared resource is imported and intends to support namespaces using a provider alias, then the name is relative to the namespace path.
288
+
289
+ hcl
290
+
291
+ provider "vault" {
292
+
293
+ # Configuration options
294
+
295
+ namespace = "example"
296
+
297
+ alias = "example"
298
+
299
+ }
300
+
301
+ resource "vault_namespace" "example2" {
302
+
303
+ provider = vault.example
304
+
305
+ path = "example2"
306
+
307
+ }
308
+
309
+ ```sh
310
+ $ pulumi import vault:index/namespace:Namespace example2 example2
311
+ ```
312
+
313
+ $ terraform state show vault_namespace.example2
314
+
315
+ vault_namespace.example2:
316
+
317
+ resource "vault_namespace" "example2" {
318
+
319
+ id = "example/example2/"
320
+
321
+ namespace_id = <known after import>
322
+
323
+ path = "example2"
324
+
325
+ path_fq = "example2"
326
+
327
+ }
328
+
329
+ :param str resource_name: The name of the resource.
330
+ :param NamespaceArgs args: The arguments to use to populate this resource's properties.
331
+ :param pulumi.ResourceOptions opts: Options for the resource.
332
+ """
333
+ ...
334
+ def __init__(__self__, resource_name: str, *args, **kwargs):
335
+ resource_args, opts = _utilities.get_resource_args_opts(NamespaceArgs, pulumi.ResourceOptions, *args, **kwargs)
336
+ if resource_args is not None:
337
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
338
+ else:
339
+ __self__._internal_init(resource_name, *args, **kwargs)
340
+
341
+ def _internal_init(__self__,
342
+ resource_name: str,
343
+ opts: Optional[pulumi.ResourceOptions] = None,
344
+ custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
345
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
346
+ path: Optional[pulumi.Input[_builtins.str]] = None,
347
+ path_fq: Optional[pulumi.Input[_builtins.str]] = None,
348
+ __props__=None):
349
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
350
+ if not isinstance(opts, pulumi.ResourceOptions):
351
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
352
+ if opts.id is None:
353
+ if __props__ is not None:
354
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
355
+ __props__ = NamespaceArgs.__new__(NamespaceArgs)
356
+
357
+ __props__.__dict__["custom_metadata"] = custom_metadata
358
+ __props__.__dict__["namespace"] = namespace
359
+ if path is None and not opts.urn:
360
+ raise TypeError("Missing required property 'path'")
361
+ __props__.__dict__["path"] = path
362
+ __props__.__dict__["path_fq"] = path_fq
363
+ __props__.__dict__["namespace_id"] = None
364
+ super(Namespace, __self__).__init__(
365
+ 'vault:index/namespace:Namespace',
366
+ resource_name,
367
+ __props__,
368
+ opts)
369
+
370
+ @staticmethod
371
+ def get(resource_name: str,
372
+ id: pulumi.Input[str],
373
+ opts: Optional[pulumi.ResourceOptions] = None,
374
+ custom_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
375
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
376
+ namespace_id: Optional[pulumi.Input[_builtins.str]] = None,
377
+ path: Optional[pulumi.Input[_builtins.str]] = None,
378
+ path_fq: Optional[pulumi.Input[_builtins.str]] = None) -> 'Namespace':
379
+ """
380
+ Get an existing Namespace resource's state with the given name, id, and optional extra
381
+ properties used to qualify the lookup.
382
+
383
+ :param str resource_name: The unique name of the resulting resource.
384
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
385
+ :param pulumi.ResourceOptions opts: Options for the resource.
386
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] custom_metadata: Custom metadata describing this namespace. Value type
387
+ is `map[string]string`. Requires Vault version 1.12+.
388
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
389
+ The value should not contain leading or trailing forward slashes.
390
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
391
+ *Available only for Vault Enterprise*.
392
+ :param pulumi.Input[_builtins.str] namespace_id: Vault server's internal ID of the namespace.
393
+ :param pulumi.Input[_builtins.str] path: The path of the namespace. Must not have a trailing `/`.
394
+ :param pulumi.Input[_builtins.str] path_fq: The fully qualified path to the namespace. Useful when provisioning resources in a child `namespace`.
395
+ The path is relative to the provider's `namespace` argument.
396
+ """
397
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
398
+
399
+ __props__ = _NamespaceState.__new__(_NamespaceState)
400
+
401
+ __props__.__dict__["custom_metadata"] = custom_metadata
402
+ __props__.__dict__["namespace"] = namespace
403
+ __props__.__dict__["namespace_id"] = namespace_id
404
+ __props__.__dict__["path"] = path
405
+ __props__.__dict__["path_fq"] = path_fq
406
+ return Namespace(resource_name, opts=opts, __props__=__props__)
407
+
408
+ @_builtins.property
409
+ @pulumi.getter(name="customMetadata")
410
+ def custom_metadata(self) -> pulumi.Output[Mapping[str, _builtins.str]]:
411
+ """
412
+ Custom metadata describing this namespace. Value type
413
+ is `map[string]string`. Requires Vault version 1.12+.
414
+ """
415
+ return pulumi.get(self, "custom_metadata")
416
+
417
+ @_builtins.property
418
+ @pulumi.getter
419
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
420
+ """
421
+ The namespace to provision the resource in.
422
+ The value should not contain leading or trailing forward slashes.
423
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
424
+ *Available only for Vault Enterprise*.
425
+ """
426
+ return pulumi.get(self, "namespace")
427
+
428
+ @_builtins.property
429
+ @pulumi.getter(name="namespaceId")
430
+ def namespace_id(self) -> pulumi.Output[_builtins.str]:
431
+ """
432
+ Vault server's internal ID of the namespace.
433
+ """
434
+ return pulumi.get(self, "namespace_id")
435
+
436
+ @_builtins.property
437
+ @pulumi.getter
438
+ def path(self) -> pulumi.Output[_builtins.str]:
439
+ """
440
+ The path of the namespace. Must not have a trailing `/`.
441
+ """
442
+ return pulumi.get(self, "path")
443
+
444
+ @_builtins.property
445
+ @pulumi.getter(name="pathFq")
446
+ def path_fq(self) -> pulumi.Output[_builtins.str]:
447
+ """
448
+ The fully qualified path to the namespace. Useful when provisioning resources in a child `namespace`.
449
+ The path is relative to the provider's `namespace` argument.
450
+ """
451
+ return pulumi.get(self, "path_fq")
452
+