pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +26 -9
- pulumi_vault/ad/secret_backend.py +16 -142
- pulumi_vault/ad/secret_library.py +16 -9
- pulumi_vault/ad/secret_role.py +14 -9
- pulumi_vault/alicloud/auth_backend_role.py +76 -190
- pulumi_vault/approle/auth_backend_login.py +12 -7
- pulumi_vault/approle/auth_backend_role.py +77 -191
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
- pulumi_vault/audit.py +30 -21
- pulumi_vault/audit_request_header.py +11 -2
- pulumi_vault/auth_backend.py +66 -14
- pulumi_vault/aws/auth_backend_cert.py +18 -9
- pulumi_vault/aws/auth_backend_client.py +267 -22
- pulumi_vault/aws/auth_backend_config_identity.py +14 -9
- pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +77 -191
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
- pulumi_vault/aws/auth_backend_sts_role.py +14 -9
- pulumi_vault/aws/get_access_credentials.py +38 -9
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +77 -9
- pulumi_vault/aws/secret_backend_role.py +185 -9
- pulumi_vault/aws/secret_backend_static_role.py +20 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +153 -15
- pulumi_vault/azure/auth_backend_role.py +77 -191
- pulumi_vault/azure/backend.py +227 -21
- pulumi_vault/azure/backend_role.py +42 -37
- pulumi_vault/azure/get_access_credentials.py +41 -7
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -267
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +28 -19
- pulumi_vault/consul/secret_backend_role.py +18 -78
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +119 -112
- pulumi_vault/database/secret_backend_role.py +31 -22
- pulumi_vault/database/secret_backend_static_role.py +87 -13
- pulumi_vault/database/secrets_mount.py +427 -136
- pulumi_vault/egp_policy.py +16 -11
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +250 -33
- pulumi_vault/gcp/auth_backend_role.py +77 -269
- pulumi_vault/gcp/get_auth_backend_role.py +43 -5
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -12
- pulumi_vault/gcp/secret_impersonated_account.py +76 -15
- pulumi_vault/gcp/secret_roleset.py +31 -24
- pulumi_vault/gcp/secret_static_account.py +39 -32
- pulumi_vault/generic/endpoint.py +24 -17
- pulumi_vault/generic/get_secret.py +64 -8
- pulumi_vault/generic/secret.py +21 -16
- pulumi_vault/get_auth_backend.py +24 -7
- pulumi_vault/get_auth_backends.py +51 -9
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -11
- pulumi_vault/get_policy_document.py +34 -19
- pulumi_vault/get_raft_autopilot_state.py +29 -10
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +19 -14
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +16 -11
- pulumi_vault/github/user.py +16 -11
- pulumi_vault/identity/entity.py +20 -13
- pulumi_vault/identity/entity_alias.py +20 -13
- pulumi_vault/identity/entity_policies.py +28 -11
- pulumi_vault/identity/get_entity.py +42 -10
- pulumi_vault/identity/get_group.py +47 -9
- pulumi_vault/identity/get_oidc_client_creds.py +21 -7
- pulumi_vault/identity/get_oidc_openid_config.py +39 -9
- pulumi_vault/identity/get_oidc_public_keys.py +29 -10
- pulumi_vault/identity/group.py +58 -39
- pulumi_vault/identity/group_alias.py +16 -9
- pulumi_vault/identity/group_member_entity_ids.py +28 -66
- pulumi_vault/identity/group_member_group_ids.py +40 -19
- pulumi_vault/identity/group_policies.py +20 -7
- pulumi_vault/identity/mfa_duo.py +11 -6
- pulumi_vault/identity/mfa_login_enforcement.py +15 -6
- pulumi_vault/identity/mfa_okta.py +11 -6
- pulumi_vault/identity/mfa_pingid.py +7 -2
- pulumi_vault/identity/mfa_totp.py +7 -2
- pulumi_vault/identity/oidc.py +12 -7
- pulumi_vault/identity/oidc_assignment.py +24 -11
- pulumi_vault/identity/oidc_client.py +36 -23
- pulumi_vault/identity/oidc_key.py +30 -17
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
- pulumi_vault/identity/oidc_provider.py +36 -21
- pulumi_vault/identity/oidc_role.py +42 -21
- pulumi_vault/identity/oidc_scope.py +20 -13
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +45 -40
- pulumi_vault/jwt/auth_backend_role.py +133 -254
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +24 -19
- pulumi_vault/kmip/secret_role.py +14 -9
- pulumi_vault/kmip/secret_scope.py +14 -9
- pulumi_vault/kubernetes/auth_backend_config.py +57 -5
- pulumi_vault/kubernetes/auth_backend_role.py +70 -177
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -11
- pulumi_vault/kubernetes/secret_backend.py +316 -27
- pulumi_vault/kubernetes/secret_backend_role.py +137 -46
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +25 -8
- pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
- pulumi_vault/kv/get_secret_v2.py +85 -9
- pulumi_vault/kv/get_secrets_list.py +24 -11
- pulumi_vault/kv/get_secrets_list_v2.py +37 -15
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +23 -16
- pulumi_vault/kv/secret_backend_v2.py +20 -11
- pulumi_vault/kv/secret_v2.py +59 -50
- pulumi_vault/ldap/auth_backend.py +127 -166
- pulumi_vault/ldap/auth_backend_group.py +14 -9
- pulumi_vault/ldap/auth_backend_user.py +14 -9
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +354 -82
- pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
- pulumi_vault/ldap/secret_backend_library_set.py +16 -9
- pulumi_vault/ldap/secret_backend_static_role.py +73 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +29 -57
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +18 -11
- pulumi_vault/mfa_okta.py +18 -11
- pulumi_vault/mfa_pingid.py +18 -11
- pulumi_vault/mfa_totp.py +24 -17
- pulumi_vault/mongodbatlas/secret_backend.py +20 -15
- pulumi_vault/mongodbatlas/secret_role.py +47 -38
- pulumi_vault/mount.py +391 -51
- pulumi_vault/namespace.py +68 -83
- pulumi_vault/nomad_secret_backend.py +18 -13
- pulumi_vault/nomad_secret_role.py +14 -9
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +485 -39
- pulumi_vault/okta/auth_backend_group.py +14 -9
- pulumi_vault/okta/auth_backend_user.py +14 -9
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +20 -13
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
- pulumi_vault/pkisecret/get_backend_key.py +24 -9
- pulumi_vault/pkisecret/get_backend_keys.py +21 -8
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
- pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
- pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
- pulumi_vault/pkisecret/secret_backend_key.py +14 -9
- pulumi_vault/pkisecret/secret_backend_role.py +21 -14
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +14 -9
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +60 -6
- pulumi_vault/quota_rate_limit.py +56 -2
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +18 -13
- pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
- pulumi_vault/raft_autopilot.py +14 -9
- pulumi_vault/raft_snapshot_agent_config.py +129 -224
- pulumi_vault/rgp_policy.py +14 -9
- pulumi_vault/saml/auth_backend.py +22 -17
- pulumi_vault/saml/auth_backend_role.py +92 -197
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -71
- pulumi_vault/secrets/sync_aws_destination.py +242 -27
- pulumi_vault/secrets/sync_azure_destination.py +92 -31
- pulumi_vault/secrets/sync_config.py +9 -4
- pulumi_vault/secrets/sync_gcp_destination.py +158 -25
- pulumi_vault/secrets/sync_gh_destination.py +189 -13
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +74 -13
- pulumi_vault/ssh/_inputs.py +28 -28
- pulumi_vault/ssh/outputs.py +11 -28
- pulumi_vault/ssh/secret_backend_ca.py +108 -9
- pulumi_vault/ssh/secret_backend_role.py +85 -118
- pulumi_vault/terraformcloud/secret_backend.py +7 -54
- pulumi_vault/terraformcloud/secret_creds.py +14 -20
- pulumi_vault/terraformcloud/secret_role.py +16 -74
- pulumi_vault/token.py +28 -23
- pulumi_vault/tokenauth/auth_backend_role.py +78 -199
- pulumi_vault/transform/alphabet.py +16 -9
- pulumi_vault/transform/get_decode.py +45 -17
- pulumi_vault/transform/get_encode.py +45 -17
- pulumi_vault/transform/role.py +16 -9
- pulumi_vault/transform/template.py +30 -21
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -21
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +27 -93
- pulumi_vault/transit/secret_cache_config.py +12 -7
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['MfaLoginEnforcementArgs', 'MfaLoginEnforcement']
|
@@ -320,12 +325,14 @@ class MfaLoginEnforcement(pulumi.CustomResource):
|
|
320
325
|
import pulumi
|
321
326
|
import pulumi_vault as vault
|
322
327
|
|
323
|
-
|
328
|
+
example = vault.identity.MfaDuo("example",
|
324
329
|
secret_key="secret-key",
|
325
330
|
integration_key="int-key",
|
326
331
|
api_hostname="foo.baz",
|
327
332
|
push_info="push-info")
|
328
|
-
example_mfa_login_enforcement = vault.identity.MfaLoginEnforcement("
|
333
|
+
example_mfa_login_enforcement = vault.identity.MfaLoginEnforcement("example",
|
334
|
+
name="default",
|
335
|
+
mfa_method_ids=[example.method_id])
|
329
336
|
```
|
330
337
|
|
331
338
|
## Import
|
@@ -333,7 +340,7 @@ class MfaLoginEnforcement(pulumi.CustomResource):
|
|
333
340
|
Resource can be imported using its `name` field, e.g.
|
334
341
|
|
335
342
|
```sh
|
336
|
-
|
343
|
+
$ pulumi import vault:identity/mfaLoginEnforcement:MfaLoginEnforcement example default
|
337
344
|
```
|
338
345
|
|
339
346
|
:param str resource_name: The name of the resource.
|
@@ -361,12 +368,14 @@ class MfaLoginEnforcement(pulumi.CustomResource):
|
|
361
368
|
import pulumi
|
362
369
|
import pulumi_vault as vault
|
363
370
|
|
364
|
-
|
371
|
+
example = vault.identity.MfaDuo("example",
|
365
372
|
secret_key="secret-key",
|
366
373
|
integration_key="int-key",
|
367
374
|
api_hostname="foo.baz",
|
368
375
|
push_info="push-info")
|
369
|
-
example_mfa_login_enforcement = vault.identity.MfaLoginEnforcement("
|
376
|
+
example_mfa_login_enforcement = vault.identity.MfaLoginEnforcement("example",
|
377
|
+
name="default",
|
378
|
+
mfa_method_ids=[example.method_id])
|
370
379
|
```
|
371
380
|
|
372
381
|
## Import
|
@@ -374,7 +383,7 @@ class MfaLoginEnforcement(pulumi.CustomResource):
|
|
374
383
|
Resource can be imported using its `name` field, e.g.
|
375
384
|
|
376
385
|
```sh
|
377
|
-
|
386
|
+
$ pulumi import vault:identity/mfaLoginEnforcement:MfaLoginEnforcement example default
|
378
387
|
```
|
379
388
|
|
380
389
|
:param str resource_name: The name of the resource.
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['MfaOktaArgs', 'MfaOkta']
|
@@ -351,9 +356,9 @@ class MfaOkta(pulumi.CustomResource):
|
|
351
356
|
import pulumi_vault as vault
|
352
357
|
|
353
358
|
example = vault.identity.MfaOkta("example",
|
359
|
+
org_name="org1",
|
354
360
|
api_token="token1",
|
355
|
-
base_url="qux.baz.com"
|
356
|
-
org_name="org1")
|
361
|
+
base_url="qux.baz.com")
|
357
362
|
```
|
358
363
|
|
359
364
|
## Import
|
@@ -361,7 +366,7 @@ class MfaOkta(pulumi.CustomResource):
|
|
361
366
|
Resource can be imported using its `uuid` field, e.g.
|
362
367
|
|
363
368
|
```sh
|
364
|
-
|
369
|
+
$ pulumi import vault:identity/mfaOkta:MfaOkta example 0d89c36a-4ff5-4d70-8749-bb6a5598aeec
|
365
370
|
```
|
366
371
|
|
367
372
|
:param str resource_name: The name of the resource.
|
@@ -389,9 +394,9 @@ class MfaOkta(pulumi.CustomResource):
|
|
389
394
|
import pulumi_vault as vault
|
390
395
|
|
391
396
|
example = vault.identity.MfaOkta("example",
|
397
|
+
org_name="org1",
|
392
398
|
api_token="token1",
|
393
|
-
base_url="qux.baz.com"
|
394
|
-
org_name="org1")
|
399
|
+
base_url="qux.baz.com")
|
395
400
|
```
|
396
401
|
|
397
402
|
## Import
|
@@ -399,7 +404,7 @@ class MfaOkta(pulumi.CustomResource):
|
|
399
404
|
Resource can be imported using its `uuid` field, e.g.
|
400
405
|
|
401
406
|
```sh
|
402
|
-
|
407
|
+
$ pulumi import vault:identity/mfaOkta:MfaOkta example 0d89c36a-4ff5-4d70-8749-bb6a5598aeec
|
403
408
|
```
|
404
409
|
|
405
410
|
:param str resource_name: The name of the resource.
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['MfaPingidArgs', 'MfaPingid']
|
@@ -340,7 +345,7 @@ class MfaPingid(pulumi.CustomResource):
|
|
340
345
|
Resource can be imported using its `uuid` field, e.g.
|
341
346
|
|
342
347
|
```sh
|
343
|
-
|
348
|
+
$ pulumi import vault:identity/mfaPingid:MfaPingid example 0d89c36a-4ff5-4d70-8749-bb6a5598aeec
|
344
349
|
```
|
345
350
|
|
346
351
|
:param str resource_name: The name of the resource.
|
@@ -372,7 +377,7 @@ class MfaPingid(pulumi.CustomResource):
|
|
372
377
|
Resource can be imported using its `uuid` field, e.g.
|
373
378
|
|
374
379
|
```sh
|
375
|
-
|
380
|
+
$ pulumi import vault:identity/mfaPingid:MfaPingid example 0d89c36a-4ff5-4d70-8749-bb6a5598aeec
|
376
381
|
```
|
377
382
|
|
378
383
|
:param str resource_name: The name of the resource.
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['MfaTotpArgs', 'MfaTotp']
|
@@ -458,7 +463,7 @@ class MfaTotp(pulumi.CustomResource):
|
|
458
463
|
Resource can be imported using its `uuid` field, e.g.
|
459
464
|
|
460
465
|
```sh
|
461
|
-
|
466
|
+
$ pulumi import vault:identity/mfaTotp:MfaTotp example 0d89c36a-4ff5-4d70-8749-bb6a5598aeec
|
462
467
|
```
|
463
468
|
|
464
469
|
:param str resource_name: The name of the resource.
|
@@ -496,7 +501,7 @@ class MfaTotp(pulumi.CustomResource):
|
|
496
501
|
Resource can be imported using its `uuid` field, e.g.
|
497
502
|
|
498
503
|
```sh
|
499
|
-
|
504
|
+
$ pulumi import vault:identity/mfaTotp:MfaTotp example 0d89c36a-4ff5-4d70-8749-bb6a5598aeec
|
500
505
|
```
|
501
506
|
|
502
507
|
:param str resource_name: The name of the resource.
|
pulumi_vault/identity/oidc.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['OidcArgs', 'Oidc']
|
@@ -24,7 +29,7 @@ class OidcArgs:
|
|
24
29
|
components.
|
25
30
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
26
31
|
The value should not contain leading or trailing forward slashes.
|
27
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
32
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
28
33
|
*Available only for Vault Enterprise*.
|
29
34
|
"""
|
30
35
|
if issuer is not None:
|
@@ -53,7 +58,7 @@ class OidcArgs:
|
|
53
58
|
"""
|
54
59
|
The namespace to provision the resource in.
|
55
60
|
The value should not contain leading or trailing forward slashes.
|
56
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
61
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
57
62
|
*Available only for Vault Enterprise*.
|
58
63
|
"""
|
59
64
|
return pulumi.get(self, "namespace")
|
@@ -76,7 +81,7 @@ class _OidcState:
|
|
76
81
|
components.
|
77
82
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
78
83
|
The value should not contain leading or trailing forward slashes.
|
79
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
84
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
80
85
|
*Available only for Vault Enterprise*.
|
81
86
|
"""
|
82
87
|
if issuer is not None:
|
@@ -105,7 +110,7 @@ class _OidcState:
|
|
105
110
|
"""
|
106
111
|
The namespace to provision the resource in.
|
107
112
|
The value should not contain leading or trailing forward slashes.
|
108
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
113
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
109
114
|
*Available only for Vault Enterprise*.
|
110
115
|
"""
|
111
116
|
return pulumi.get(self, "namespace")
|
@@ -148,7 +153,7 @@ class Oidc(pulumi.CustomResource):
|
|
148
153
|
components.
|
149
154
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
150
155
|
The value should not contain leading or trailing forward slashes.
|
151
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
156
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
152
157
|
*Available only for Vault Enterprise*.
|
153
158
|
"""
|
154
159
|
...
|
@@ -227,7 +232,7 @@ class Oidc(pulumi.CustomResource):
|
|
227
232
|
components.
|
228
233
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
229
234
|
The value should not contain leading or trailing forward slashes.
|
230
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
235
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
231
236
|
*Available only for Vault Enterprise*.
|
232
237
|
"""
|
233
238
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -255,7 +260,7 @@ class Oidc(pulumi.CustomResource):
|
|
255
260
|
"""
|
256
261
|
The namespace to provision the resource in.
|
257
262
|
The value should not contain leading or trailing forward slashes.
|
258
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
263
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
259
264
|
*Available only for Vault Enterprise*.
|
260
265
|
"""
|
261
266
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['OidcAssignmentArgs', 'OidcAssignment']
|
@@ -25,7 +30,7 @@ class OidcAssignmentArgs:
|
|
25
30
|
:param pulumi.Input[str] name: The name of the assignment.
|
26
31
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
27
32
|
The value should not contain leading or trailing forward slashes.
|
28
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
33
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
29
34
|
*Available only for Vault Enterprise*.
|
30
35
|
"""
|
31
36
|
if entity_ids is not None:
|
@@ -79,7 +84,7 @@ class OidcAssignmentArgs:
|
|
79
84
|
"""
|
80
85
|
The namespace to provision the resource in.
|
81
86
|
The value should not contain leading or trailing forward slashes.
|
82
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
87
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
83
88
|
*Available only for Vault Enterprise*.
|
84
89
|
"""
|
85
90
|
return pulumi.get(self, "namespace")
|
@@ -103,7 +108,7 @@ class _OidcAssignmentState:
|
|
103
108
|
:param pulumi.Input[str] name: The name of the assignment.
|
104
109
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
105
110
|
The value should not contain leading or trailing forward slashes.
|
106
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
111
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
107
112
|
*Available only for Vault Enterprise*.
|
108
113
|
"""
|
109
114
|
if entity_ids is not None:
|
@@ -157,7 +162,7 @@ class _OidcAssignmentState:
|
|
157
162
|
"""
|
158
163
|
The namespace to provision the resource in.
|
159
164
|
The value should not contain leading or trailing forward slashes.
|
160
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
165
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
161
166
|
*Available only for Vault Enterprise*.
|
162
167
|
"""
|
163
168
|
return pulumi.get(self, "namespace")
|
@@ -188,13 +193,17 @@ class OidcAssignment(pulumi.CustomResource):
|
|
188
193
|
import pulumi_vault as vault
|
189
194
|
|
190
195
|
internal = vault.identity.Group("internal",
|
196
|
+
name="internal",
|
191
197
|
type="internal",
|
192
198
|
policies=[
|
193
199
|
"dev",
|
194
200
|
"test",
|
195
201
|
])
|
196
|
-
test = vault.identity.Entity("test",
|
202
|
+
test = vault.identity.Entity("test",
|
203
|
+
name="test",
|
204
|
+
policies=["test"])
|
197
205
|
default = vault.identity.OidcAssignment("default",
|
206
|
+
name="assignment",
|
198
207
|
entity_ids=[test.id],
|
199
208
|
group_ids=[internal.id])
|
200
209
|
```
|
@@ -204,7 +213,7 @@ class OidcAssignment(pulumi.CustomResource):
|
|
204
213
|
OIDC Assignments can be imported using the `name`, e.g.
|
205
214
|
|
206
215
|
```sh
|
207
|
-
|
216
|
+
$ pulumi import vault:identity/oidcAssignment:OidcAssignment default assignment
|
208
217
|
```
|
209
218
|
|
210
219
|
:param str resource_name: The name of the resource.
|
@@ -214,7 +223,7 @@ class OidcAssignment(pulumi.CustomResource):
|
|
214
223
|
:param pulumi.Input[str] name: The name of the assignment.
|
215
224
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
216
225
|
The value should not contain leading or trailing forward slashes.
|
217
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
226
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
218
227
|
*Available only for Vault Enterprise*.
|
219
228
|
"""
|
220
229
|
...
|
@@ -234,13 +243,17 @@ class OidcAssignment(pulumi.CustomResource):
|
|
234
243
|
import pulumi_vault as vault
|
235
244
|
|
236
245
|
internal = vault.identity.Group("internal",
|
246
|
+
name="internal",
|
237
247
|
type="internal",
|
238
248
|
policies=[
|
239
249
|
"dev",
|
240
250
|
"test",
|
241
251
|
])
|
242
|
-
test = vault.identity.Entity("test",
|
252
|
+
test = vault.identity.Entity("test",
|
253
|
+
name="test",
|
254
|
+
policies=["test"])
|
243
255
|
default = vault.identity.OidcAssignment("default",
|
256
|
+
name="assignment",
|
244
257
|
entity_ids=[test.id],
|
245
258
|
group_ids=[internal.id])
|
246
259
|
```
|
@@ -250,7 +263,7 @@ class OidcAssignment(pulumi.CustomResource):
|
|
250
263
|
OIDC Assignments can be imported using the `name`, e.g.
|
251
264
|
|
252
265
|
```sh
|
253
|
-
|
266
|
+
$ pulumi import vault:identity/oidcAssignment:OidcAssignment default assignment
|
254
267
|
```
|
255
268
|
|
256
269
|
:param str resource_name: The name of the resource.
|
@@ -311,7 +324,7 @@ class OidcAssignment(pulumi.CustomResource):
|
|
311
324
|
:param pulumi.Input[str] name: The name of the assignment.
|
312
325
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
313
326
|
The value should not contain leading or trailing forward slashes.
|
314
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
327
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
315
328
|
*Available only for Vault Enterprise*.
|
316
329
|
"""
|
317
330
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -354,7 +367,7 @@ class OidcAssignment(pulumi.CustomResource):
|
|
354
367
|
"""
|
355
368
|
The namespace to provision the resource in.
|
356
369
|
The value should not contain leading or trailing forward slashes.
|
357
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
370
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
358
371
|
*Available only for Vault Enterprise*.
|
359
372
|
"""
|
360
373
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['OidcClientArgs', 'OidcClient']
|
@@ -36,7 +41,7 @@ class OidcClientArgs:
|
|
36
41
|
:param pulumi.Input[str] name: The name of the client.
|
37
42
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
38
43
|
The value should not contain leading or trailing forward slashes.
|
39
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
44
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
40
45
|
*Available only for Vault Enterprise*.
|
41
46
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] redirect_uris: Redirection URI values used by the client.
|
42
47
|
One of these values must exactly match the `redirect_uri` parameter value
|
@@ -141,7 +146,7 @@ class OidcClientArgs:
|
|
141
146
|
"""
|
142
147
|
The namespace to provision the resource in.
|
143
148
|
The value should not contain leading or trailing forward slashes.
|
144
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
149
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
145
150
|
*Available only for Vault Enterprise*.
|
146
151
|
"""
|
147
152
|
return pulumi.get(self, "namespace")
|
@@ -182,8 +187,9 @@ class _OidcClientState:
|
|
182
187
|
Input properties used for looking up and filtering OidcClient resources.
|
183
188
|
:param pulumi.Input[int] access_token_ttl: The time-to-live for access tokens obtained by the client.
|
184
189
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] assignments: A list of assignment resources associated with the client.
|
185
|
-
:param pulumi.Input[str] client_id: The Client ID
|
186
|
-
:param pulumi.Input[str] client_secret: The Client Secret
|
190
|
+
:param pulumi.Input[str] client_id: The Client ID returned by Vault.
|
191
|
+
:param pulumi.Input[str] client_secret: The Client Secret Key returned by Vault.
|
192
|
+
For public OpenID Clients `client_secret` is set to an empty string `""`
|
187
193
|
:param pulumi.Input[str] client_type: The client type based on its ability to maintain confidentiality of credentials.
|
188
194
|
The following client types are supported: `confidential`, `public`. Defaults to `confidential`.
|
189
195
|
:param pulumi.Input[int] id_token_ttl: The time-to-live for ID tokens obtained by the client.
|
@@ -194,7 +200,7 @@ class _OidcClientState:
|
|
194
200
|
:param pulumi.Input[str] name: The name of the client.
|
195
201
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
196
202
|
The value should not contain leading or trailing forward slashes.
|
197
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
203
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
198
204
|
*Available only for Vault Enterprise*.
|
199
205
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] redirect_uris: Redirection URI values used by the client.
|
200
206
|
One of these values must exactly match the `redirect_uri` parameter value
|
@@ -249,7 +255,7 @@ class _OidcClientState:
|
|
249
255
|
@pulumi.getter(name="clientId")
|
250
256
|
def client_id(self) -> Optional[pulumi.Input[str]]:
|
251
257
|
"""
|
252
|
-
The Client ID
|
258
|
+
The Client ID returned by Vault.
|
253
259
|
"""
|
254
260
|
return pulumi.get(self, "client_id")
|
255
261
|
|
@@ -261,7 +267,8 @@ class _OidcClientState:
|
|
261
267
|
@pulumi.getter(name="clientSecret")
|
262
268
|
def client_secret(self) -> Optional[pulumi.Input[str]]:
|
263
269
|
"""
|
264
|
-
The Client Secret
|
270
|
+
The Client Secret Key returned by Vault.
|
271
|
+
For public OpenID Clients `client_secret` is set to an empty string `""`
|
265
272
|
"""
|
266
273
|
return pulumi.get(self, "client_secret")
|
267
274
|
|
@@ -327,7 +334,7 @@ class _OidcClientState:
|
|
327
334
|
"""
|
328
335
|
The namespace to provision the resource in.
|
329
336
|
The value should not contain leading or trailing forward slashes.
|
330
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
337
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
331
338
|
*Available only for Vault Enterprise*.
|
332
339
|
"""
|
333
340
|
return pulumi.get(self, "namespace")
|
@@ -375,16 +382,18 @@ class OidcClient(pulumi.CustomResource):
|
|
375
382
|
import pulumi
|
376
383
|
import pulumi_vault as vault
|
377
384
|
|
378
|
-
|
385
|
+
test = vault.identity.OidcAssignment("test",
|
386
|
+
name="my-assignment",
|
379
387
|
entity_ids=["ascbascas-2231a-sdfaa"],
|
380
388
|
group_ids=["sajkdsad-32414-sfsada"])
|
381
|
-
test_oidc_client = vault.identity.OidcClient("
|
389
|
+
test_oidc_client = vault.identity.OidcClient("test",
|
390
|
+
name="my-app",
|
382
391
|
redirect_uris=[
|
383
392
|
"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
384
393
|
"http://127.0.0.1:8251/callback",
|
385
394
|
"http://127.0.0.1:8080/callback",
|
386
395
|
],
|
387
|
-
assignments=[
|
396
|
+
assignments=[test.name],
|
388
397
|
id_token_ttl=2400,
|
389
398
|
access_token_ttl=7200)
|
390
399
|
```
|
@@ -394,7 +403,7 @@ class OidcClient(pulumi.CustomResource):
|
|
394
403
|
OIDC Clients can be imported using the `name`, e.g.
|
395
404
|
|
396
405
|
```sh
|
397
|
-
|
406
|
+
$ pulumi import vault:identity/oidcClient:OidcClient test my-app
|
398
407
|
```
|
399
408
|
|
400
409
|
:param str resource_name: The name of the resource.
|
@@ -411,7 +420,7 @@ class OidcClient(pulumi.CustomResource):
|
|
411
420
|
:param pulumi.Input[str] name: The name of the client.
|
412
421
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
413
422
|
The value should not contain leading or trailing forward slashes.
|
414
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
423
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
415
424
|
*Available only for Vault Enterprise*.
|
416
425
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] redirect_uris: Redirection URI values used by the client.
|
417
426
|
One of these values must exactly match the `redirect_uri` parameter value
|
@@ -433,16 +442,18 @@ class OidcClient(pulumi.CustomResource):
|
|
433
442
|
import pulumi
|
434
443
|
import pulumi_vault as vault
|
435
444
|
|
436
|
-
|
445
|
+
test = vault.identity.OidcAssignment("test",
|
446
|
+
name="my-assignment",
|
437
447
|
entity_ids=["ascbascas-2231a-sdfaa"],
|
438
448
|
group_ids=["sajkdsad-32414-sfsada"])
|
439
|
-
test_oidc_client = vault.identity.OidcClient("
|
449
|
+
test_oidc_client = vault.identity.OidcClient("test",
|
450
|
+
name="my-app",
|
440
451
|
redirect_uris=[
|
441
452
|
"http://127.0.0.1:9200/v1/auth-methods/oidc:authenticate:callback",
|
442
453
|
"http://127.0.0.1:8251/callback",
|
443
454
|
"http://127.0.0.1:8080/callback",
|
444
455
|
],
|
445
|
-
assignments=[
|
456
|
+
assignments=[test.name],
|
446
457
|
id_token_ttl=2400,
|
447
458
|
access_token_ttl=7200)
|
448
459
|
```
|
@@ -452,7 +463,7 @@ class OidcClient(pulumi.CustomResource):
|
|
452
463
|
OIDC Clients can be imported using the `name`, e.g.
|
453
464
|
|
454
465
|
```sh
|
455
|
-
|
466
|
+
$ pulumi import vault:identity/oidcClient:OidcClient test my-app
|
456
467
|
```
|
457
468
|
|
458
469
|
:param str resource_name: The name of the resource.
|
@@ -528,8 +539,9 @@ class OidcClient(pulumi.CustomResource):
|
|
528
539
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
529
540
|
:param pulumi.Input[int] access_token_ttl: The time-to-live for access tokens obtained by the client.
|
530
541
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] assignments: A list of assignment resources associated with the client.
|
531
|
-
:param pulumi.Input[str] client_id: The Client ID
|
532
|
-
:param pulumi.Input[str] client_secret: The Client Secret
|
542
|
+
:param pulumi.Input[str] client_id: The Client ID returned by Vault.
|
543
|
+
:param pulumi.Input[str] client_secret: The Client Secret Key returned by Vault.
|
544
|
+
For public OpenID Clients `client_secret` is set to an empty string `""`
|
533
545
|
:param pulumi.Input[str] client_type: The client type based on its ability to maintain confidentiality of credentials.
|
534
546
|
The following client types are supported: `confidential`, `public`. Defaults to `confidential`.
|
535
547
|
:param pulumi.Input[int] id_token_ttl: The time-to-live for ID tokens obtained by the client.
|
@@ -540,7 +552,7 @@ class OidcClient(pulumi.CustomResource):
|
|
540
552
|
:param pulumi.Input[str] name: The name of the client.
|
541
553
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
542
554
|
The value should not contain leading or trailing forward slashes.
|
543
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
555
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
544
556
|
*Available only for Vault Enterprise*.
|
545
557
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] redirect_uris: Redirection URI values used by the client.
|
546
558
|
One of these values must exactly match the `redirect_uri` parameter value
|
@@ -582,7 +594,7 @@ class OidcClient(pulumi.CustomResource):
|
|
582
594
|
@pulumi.getter(name="clientId")
|
583
595
|
def client_id(self) -> pulumi.Output[str]:
|
584
596
|
"""
|
585
|
-
The Client ID
|
597
|
+
The Client ID returned by Vault.
|
586
598
|
"""
|
587
599
|
return pulumi.get(self, "client_id")
|
588
600
|
|
@@ -590,7 +602,8 @@ class OidcClient(pulumi.CustomResource):
|
|
590
602
|
@pulumi.getter(name="clientSecret")
|
591
603
|
def client_secret(self) -> pulumi.Output[str]:
|
592
604
|
"""
|
593
|
-
The Client Secret
|
605
|
+
The Client Secret Key returned by Vault.
|
606
|
+
For public OpenID Clients `client_secret` is set to an empty string `""`
|
594
607
|
"""
|
595
608
|
return pulumi.get(self, "client_secret")
|
596
609
|
|
@@ -636,7 +649,7 @@ class OidcClient(pulumi.CustomResource):
|
|
636
649
|
"""
|
637
650
|
The namespace to provision the resource in.
|
638
651
|
The value should not contain leading or trailing forward slashes.
|
639
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
652
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
640
653
|
*Available only for Vault Enterprise*.
|
641
654
|
"""
|
642
655
|
return pulumi.get(self, "namespace")
|