pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736850018__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +22 -7
- pulumi_vault/ad/secret_backend.py +14 -144
- pulumi_vault/ad/secret_library.py +14 -11
- pulumi_vault/ad/secret_role.py +12 -11
- pulumi_vault/alicloud/auth_backend_role.py +74 -192
- pulumi_vault/approle/auth_backend_login.py +12 -11
- pulumi_vault/approle/auth_backend_role.py +75 -193
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
- pulumi_vault/audit.py +24 -27
- pulumi_vault/audit_request_header.py +11 -6
- pulumi_vault/auth_backend.py +64 -12
- pulumi_vault/aws/auth_backend_cert.py +12 -7
- pulumi_vault/aws/auth_backend_client.py +265 -24
- pulumi_vault/aws/auth_backend_config_identity.py +12 -11
- pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +75 -193
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
- pulumi_vault/aws/auth_backend_sts_role.py +12 -11
- pulumi_vault/aws/get_access_credentials.py +34 -7
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +75 -7
- pulumi_vault/aws/secret_backend_role.py +183 -11
- pulumi_vault/aws/secret_backend_static_role.py +14 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +151 -17
- pulumi_vault/azure/auth_backend_role.py +75 -193
- pulumi_vault/azure/backend.py +223 -29
- pulumi_vault/azure/backend_role.py +42 -41
- pulumi_vault/azure/get_access_credentials.py +39 -11
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -271
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +22 -25
- pulumi_vault/consul/secret_backend_role.py +14 -80
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +117 -114
- pulumi_vault/database/secret_backend_role.py +29 -24
- pulumi_vault/database/secret_backend_static_role.py +85 -15
- pulumi_vault/database/secrets_mount.py +425 -138
- pulumi_vault/egp_policy.py +16 -15
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +248 -35
- pulumi_vault/gcp/auth_backend_role.py +75 -271
- pulumi_vault/gcp/get_auth_backend_role.py +43 -9
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -16
- pulumi_vault/gcp/secret_impersonated_account.py +74 -17
- pulumi_vault/gcp/secret_roleset.py +29 -26
- pulumi_vault/gcp/secret_static_account.py +37 -34
- pulumi_vault/generic/endpoint.py +22 -21
- pulumi_vault/generic/get_secret.py +68 -12
- pulumi_vault/generic/secret.py +19 -14
- pulumi_vault/get_auth_backend.py +24 -11
- pulumi_vault/get_auth_backends.py +33 -11
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -15
- pulumi_vault/get_policy_document.py +34 -23
- pulumi_vault/get_raft_autopilot_state.py +29 -14
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +17 -16
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +14 -13
- pulumi_vault/github/user.py +14 -13
- pulumi_vault/identity/entity.py +18 -15
- pulumi_vault/identity/entity_alias.py +18 -15
- pulumi_vault/identity/entity_policies.py +24 -19
- pulumi_vault/identity/get_entity.py +40 -14
- pulumi_vault/identity/get_group.py +45 -13
- pulumi_vault/identity/get_oidc_client_creds.py +21 -11
- pulumi_vault/identity/get_oidc_openid_config.py +39 -13
- pulumi_vault/identity/get_oidc_public_keys.py +29 -14
- pulumi_vault/identity/group.py +50 -49
- pulumi_vault/identity/group_alias.py +14 -11
- pulumi_vault/identity/group_member_entity_ids.py +24 -74
- pulumi_vault/identity/group_member_group_ids.py +36 -27
- pulumi_vault/identity/group_policies.py +16 -15
- pulumi_vault/identity/mfa_duo.py +9 -8
- pulumi_vault/identity/mfa_login_enforcement.py +13 -8
- pulumi_vault/identity/mfa_okta.py +9 -8
- pulumi_vault/identity/mfa_pingid.py +5 -4
- pulumi_vault/identity/mfa_totp.py +5 -4
- pulumi_vault/identity/oidc.py +12 -11
- pulumi_vault/identity/oidc_assignment.py +22 -13
- pulumi_vault/identity/oidc_client.py +34 -25
- pulumi_vault/identity/oidc_key.py +28 -19
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
- pulumi_vault/identity/oidc_provider.py +34 -23
- pulumi_vault/identity/oidc_role.py +40 -27
- pulumi_vault/identity/oidc_scope.py +18 -15
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +39 -46
- pulumi_vault/jwt/auth_backend_role.py +131 -260
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +22 -21
- pulumi_vault/kmip/secret_role.py +12 -11
- pulumi_vault/kmip/secret_scope.py +12 -11
- pulumi_vault/kubernetes/auth_backend_config.py +55 -7
- pulumi_vault/kubernetes/auth_backend_role.py +68 -179
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -15
- pulumi_vault/kubernetes/secret_backend.py +314 -29
- pulumi_vault/kubernetes/secret_backend_role.py +135 -56
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +23 -12
- pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
- pulumi_vault/kv/get_secret_v2.py +89 -9
- pulumi_vault/kv/get_secrets_list.py +22 -15
- pulumi_vault/kv/get_secrets_list_v2.py +35 -19
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +19 -18
- pulumi_vault/kv/secret_backend_v2.py +12 -11
- pulumi_vault/kv/secret_v2.py +55 -52
- pulumi_vault/ldap/auth_backend.py +125 -168
- pulumi_vault/ldap/auth_backend_group.py +12 -11
- pulumi_vault/ldap/auth_backend_user.py +12 -11
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +352 -84
- pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
- pulumi_vault/ldap/secret_backend_library_set.py +14 -11
- pulumi_vault/ldap/secret_backend_static_role.py +67 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +27 -43
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +16 -13
- pulumi_vault/mfa_okta.py +16 -13
- pulumi_vault/mfa_pingid.py +16 -13
- pulumi_vault/mfa_totp.py +22 -19
- pulumi_vault/mongodbatlas/secret_backend.py +18 -17
- pulumi_vault/mongodbatlas/secret_role.py +41 -38
- pulumi_vault/mount.py +389 -65
- pulumi_vault/namespace.py +26 -21
- pulumi_vault/nomad_secret_backend.py +16 -15
- pulumi_vault/nomad_secret_role.py +12 -11
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +483 -41
- pulumi_vault/okta/auth_backend_group.py +12 -11
- pulumi_vault/okta/auth_backend_user.py +12 -11
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +18 -15
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
- pulumi_vault/pkisecret/get_backend_key.py +24 -13
- pulumi_vault/pkisecret/get_backend_keys.py +21 -12
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
- pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
- pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
- pulumi_vault/pkisecret/secret_backend_key.py +12 -7
- pulumi_vault/pkisecret/secret_backend_role.py +19 -16
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +12 -7
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +58 -8
- pulumi_vault/quota_rate_limit.py +54 -4
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +16 -15
- pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
- pulumi_vault/raft_autopilot.py +12 -11
- pulumi_vault/raft_snapshot_agent_config.py +121 -311
- pulumi_vault/rgp_policy.py +14 -13
- pulumi_vault/saml/auth_backend.py +20 -19
- pulumi_vault/saml/auth_backend_role.py +90 -199
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -75
- pulumi_vault/secrets/sync_aws_destination.py +240 -29
- pulumi_vault/secrets/sync_azure_destination.py +90 -33
- pulumi_vault/secrets/sync_config.py +7 -6
- pulumi_vault/secrets/sync_gcp_destination.py +156 -27
- pulumi_vault/secrets/sync_gh_destination.py +187 -15
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +72 -15
- pulumi_vault/ssh/_inputs.py +28 -32
- pulumi_vault/ssh/outputs.py +11 -32
- pulumi_vault/ssh/secret_backend_ca.py +106 -11
- pulumi_vault/ssh/secret_backend_role.py +83 -120
- pulumi_vault/terraformcloud/secret_backend.py +5 -56
- pulumi_vault/terraformcloud/secret_creds.py +14 -24
- pulumi_vault/terraformcloud/secret_role.py +14 -76
- pulumi_vault/token.py +26 -25
- pulumi_vault/tokenauth/auth_backend_role.py +76 -201
- pulumi_vault/transform/alphabet.py +16 -13
- pulumi_vault/transform/get_decode.py +45 -21
- pulumi_vault/transform/get_encode.py +45 -21
- pulumi_vault/transform/role.py +16 -13
- pulumi_vault/transform/template.py +30 -25
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -25
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +25 -97
- pulumi_vault/transit/secret_cache_config.py +12 -11
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736850018.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['GroupPoliciesArgs', 'GroupPolicies']
|
@@ -29,7 +34,7 @@ class GroupPoliciesArgs:
|
|
29
34
|
If set to `false`, this resource will simply ensure that the policies specified in the resource are present in the group. When destroying the resource, the resource will ensure that the policies specified in the resource are removed.
|
30
35
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
31
36
|
The value should not contain leading or trailing forward slashes.
|
32
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
37
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
33
38
|
*Available only for Vault Enterprise*.
|
34
39
|
"""
|
35
40
|
pulumi.set(__self__, "group_id", group_id)
|
@@ -85,7 +90,7 @@ class GroupPoliciesArgs:
|
|
85
90
|
"""
|
86
91
|
The namespace to provision the resource in.
|
87
92
|
The value should not contain leading or trailing forward slashes.
|
88
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
93
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
89
94
|
*Available only for Vault Enterprise*.
|
90
95
|
"""
|
91
96
|
return pulumi.get(self, "namespace")
|
@@ -114,7 +119,7 @@ class _GroupPoliciesState:
|
|
114
119
|
:param pulumi.Input[str] group_name: The name of the group that are assigned the policies.
|
115
120
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
116
121
|
The value should not contain leading or trailing forward slashes.
|
117
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
122
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
118
123
|
*Available only for Vault Enterprise*.
|
119
124
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies to assign to the group
|
120
125
|
"""
|
@@ -175,7 +180,7 @@ class _GroupPoliciesState:
|
|
175
180
|
"""
|
176
181
|
The namespace to provision the resource in.
|
177
182
|
The value should not contain leading or trailing forward slashes.
|
178
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
183
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
179
184
|
*Available only for Vault Enterprise*.
|
180
185
|
"""
|
181
186
|
return pulumi.get(self, "namespace")
|
@@ -214,12 +219,12 @@ class GroupPolicies(pulumi.CustomResource):
|
|
214
219
|
|
215
220
|
### Exclusive Policies
|
216
221
|
|
217
|
-
<!--Start PulumiCodeChooser -->
|
218
222
|
```python
|
219
223
|
import pulumi
|
220
224
|
import pulumi_vault as vault
|
221
225
|
|
222
226
|
internal = vault.identity.Group("internal",
|
227
|
+
name="internal",
|
223
228
|
type="internal",
|
224
229
|
external_policies=True,
|
225
230
|
metadata={
|
@@ -233,16 +238,15 @@ class GroupPolicies(pulumi.CustomResource):
|
|
233
238
|
exclusive=True,
|
234
239
|
group_id=internal.id)
|
235
240
|
```
|
236
|
-
<!--End PulumiCodeChooser -->
|
237
241
|
|
238
242
|
### Non-exclusive Policies
|
239
243
|
|
240
|
-
<!--Start PulumiCodeChooser -->
|
241
244
|
```python
|
242
245
|
import pulumi
|
243
246
|
import pulumi_vault as vault
|
244
247
|
|
245
248
|
internal = vault.identity.Group("internal",
|
249
|
+
name="internal",
|
246
250
|
type="internal",
|
247
251
|
external_policies=True,
|
248
252
|
metadata={
|
@@ -260,7 +264,6 @@ class GroupPolicies(pulumi.CustomResource):
|
|
260
264
|
exclusive=False,
|
261
265
|
group_id=internal.id)
|
262
266
|
```
|
263
|
-
<!--End PulumiCodeChooser -->
|
264
267
|
|
265
268
|
:param str resource_name: The name of the resource.
|
266
269
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -272,7 +275,7 @@ class GroupPolicies(pulumi.CustomResource):
|
|
272
275
|
:param pulumi.Input[str] group_id: Group ID to assign policies to.
|
273
276
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
274
277
|
The value should not contain leading or trailing forward slashes.
|
275
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
278
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
276
279
|
*Available only for Vault Enterprise*.
|
277
280
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies to assign to the group
|
278
281
|
"""
|
@@ -289,12 +292,12 @@ class GroupPolicies(pulumi.CustomResource):
|
|
289
292
|
|
290
293
|
### Exclusive Policies
|
291
294
|
|
292
|
-
<!--Start PulumiCodeChooser -->
|
293
295
|
```python
|
294
296
|
import pulumi
|
295
297
|
import pulumi_vault as vault
|
296
298
|
|
297
299
|
internal = vault.identity.Group("internal",
|
300
|
+
name="internal",
|
298
301
|
type="internal",
|
299
302
|
external_policies=True,
|
300
303
|
metadata={
|
@@ -308,16 +311,15 @@ class GroupPolicies(pulumi.CustomResource):
|
|
308
311
|
exclusive=True,
|
309
312
|
group_id=internal.id)
|
310
313
|
```
|
311
|
-
<!--End PulumiCodeChooser -->
|
312
314
|
|
313
315
|
### Non-exclusive Policies
|
314
316
|
|
315
|
-
<!--Start PulumiCodeChooser -->
|
316
317
|
```python
|
317
318
|
import pulumi
|
318
319
|
import pulumi_vault as vault
|
319
320
|
|
320
321
|
internal = vault.identity.Group("internal",
|
322
|
+
name="internal",
|
321
323
|
type="internal",
|
322
324
|
external_policies=True,
|
323
325
|
metadata={
|
@@ -335,7 +337,6 @@ class GroupPolicies(pulumi.CustomResource):
|
|
335
337
|
exclusive=False,
|
336
338
|
group_id=internal.id)
|
337
339
|
```
|
338
|
-
<!--End PulumiCodeChooser -->
|
339
340
|
|
340
341
|
:param str resource_name: The name of the resource.
|
341
342
|
:param GroupPoliciesArgs args: The arguments to use to populate this resource's properties.
|
@@ -405,7 +406,7 @@ class GroupPolicies(pulumi.CustomResource):
|
|
405
406
|
:param pulumi.Input[str] group_name: The name of the group that are assigned the policies.
|
406
407
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
407
408
|
The value should not contain leading or trailing forward slashes.
|
408
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
409
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
409
410
|
*Available only for Vault Enterprise*.
|
410
411
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] policies: List of policies to assign to the group
|
411
412
|
"""
|
@@ -454,7 +455,7 @@ class GroupPolicies(pulumi.CustomResource):
|
|
454
455
|
"""
|
455
456
|
The namespace to provision the resource in.
|
456
457
|
The value should not contain leading or trailing forward slashes.
|
457
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
458
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
458
459
|
*Available only for Vault Enterprise*.
|
459
460
|
"""
|
460
461
|
return pulumi.get(self, "namespace")
|
pulumi_vault/identity/mfa_duo.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['MfaDuoArgs', 'MfaDuo']
|
@@ -378,17 +383,15 @@ class MfaDuo(pulumi.CustomResource):
|
|
378
383
|
|
379
384
|
## Example Usage
|
380
385
|
|
381
|
-
<!--Start PulumiCodeChooser -->
|
382
386
|
```python
|
383
387
|
import pulumi
|
384
388
|
import pulumi_vault as vault
|
385
389
|
|
386
390
|
example = vault.identity.MfaDuo("example",
|
387
391
|
api_hostname="api-xxxxxxxx.duosecurity.com",
|
388
|
-
|
389
|
-
|
392
|
+
secret_key="secret-key",
|
393
|
+
integration_key="secret-int-key")
|
390
394
|
```
|
391
|
-
<!--End PulumiCodeChooser -->
|
392
395
|
|
393
396
|
## Import
|
394
397
|
|
@@ -419,17 +422,15 @@ class MfaDuo(pulumi.CustomResource):
|
|
419
422
|
|
420
423
|
## Example Usage
|
421
424
|
|
422
|
-
<!--Start PulumiCodeChooser -->
|
423
425
|
```python
|
424
426
|
import pulumi
|
425
427
|
import pulumi_vault as vault
|
426
428
|
|
427
429
|
example = vault.identity.MfaDuo("example",
|
428
430
|
api_hostname="api-xxxxxxxx.duosecurity.com",
|
429
|
-
|
430
|
-
|
431
|
+
secret_key="secret-key",
|
432
|
+
integration_key="secret-int-key")
|
431
433
|
```
|
432
|
-
<!--End PulumiCodeChooser -->
|
433
434
|
|
434
435
|
## Import
|
435
436
|
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['MfaLoginEnforcementArgs', 'MfaLoginEnforcement']
|
@@ -316,19 +321,19 @@ class MfaLoginEnforcement(pulumi.CustomResource):
|
|
316
321
|
|
317
322
|
## Example Usage
|
318
323
|
|
319
|
-
<!--Start PulumiCodeChooser -->
|
320
324
|
```python
|
321
325
|
import pulumi
|
322
326
|
import pulumi_vault as vault
|
323
327
|
|
324
|
-
|
328
|
+
example = vault.identity.MfaDuo("example",
|
325
329
|
secret_key="secret-key",
|
326
330
|
integration_key="int-key",
|
327
331
|
api_hostname="foo.baz",
|
328
332
|
push_info="push-info")
|
329
|
-
example_mfa_login_enforcement = vault.identity.MfaLoginEnforcement("
|
333
|
+
example_mfa_login_enforcement = vault.identity.MfaLoginEnforcement("example",
|
334
|
+
name="default",
|
335
|
+
mfa_method_ids=[example.method_id])
|
330
336
|
```
|
331
|
-
<!--End PulumiCodeChooser -->
|
332
337
|
|
333
338
|
## Import
|
334
339
|
|
@@ -359,19 +364,19 @@ class MfaLoginEnforcement(pulumi.CustomResource):
|
|
359
364
|
|
360
365
|
## Example Usage
|
361
366
|
|
362
|
-
<!--Start PulumiCodeChooser -->
|
363
367
|
```python
|
364
368
|
import pulumi
|
365
369
|
import pulumi_vault as vault
|
366
370
|
|
367
|
-
|
371
|
+
example = vault.identity.MfaDuo("example",
|
368
372
|
secret_key="secret-key",
|
369
373
|
integration_key="int-key",
|
370
374
|
api_hostname="foo.baz",
|
371
375
|
push_info="push-info")
|
372
|
-
example_mfa_login_enforcement = vault.identity.MfaLoginEnforcement("
|
376
|
+
example_mfa_login_enforcement = vault.identity.MfaLoginEnforcement("example",
|
377
|
+
name="default",
|
378
|
+
mfa_method_ids=[example.method_id])
|
373
379
|
```
|
374
|
-
<!--End PulumiCodeChooser -->
|
375
380
|
|
376
381
|
## Import
|
377
382
|
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['MfaOktaArgs', 'MfaOkta']
|
@@ -346,17 +351,15 @@ class MfaOkta(pulumi.CustomResource):
|
|
346
351
|
|
347
352
|
## Example Usage
|
348
353
|
|
349
|
-
<!--Start PulumiCodeChooser -->
|
350
354
|
```python
|
351
355
|
import pulumi
|
352
356
|
import pulumi_vault as vault
|
353
357
|
|
354
358
|
example = vault.identity.MfaOkta("example",
|
359
|
+
org_name="org1",
|
355
360
|
api_token="token1",
|
356
|
-
base_url="qux.baz.com"
|
357
|
-
org_name="org1")
|
361
|
+
base_url="qux.baz.com")
|
358
362
|
```
|
359
|
-
<!--End PulumiCodeChooser -->
|
360
363
|
|
361
364
|
## Import
|
362
365
|
|
@@ -386,17 +389,15 @@ class MfaOkta(pulumi.CustomResource):
|
|
386
389
|
|
387
390
|
## Example Usage
|
388
391
|
|
389
|
-
<!--Start PulumiCodeChooser -->
|
390
392
|
```python
|
391
393
|
import pulumi
|
392
394
|
import pulumi_vault as vault
|
393
395
|
|
394
396
|
example = vault.identity.MfaOkta("example",
|
397
|
+
org_name="org1",
|
395
398
|
api_token="token1",
|
396
|
-
base_url="qux.baz.com"
|
397
|
-
org_name="org1")
|
399
|
+
base_url="qux.baz.com")
|
398
400
|
```
|
399
|
-
<!--End PulumiCodeChooser -->
|
400
401
|
|
401
402
|
## Import
|
402
403
|
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['MfaPingidArgs', 'MfaPingid']
|
@@ -328,14 +333,12 @@ class MfaPingid(pulumi.CustomResource):
|
|
328
333
|
|
329
334
|
## Example Usage
|
330
335
|
|
331
|
-
<!--Start PulumiCodeChooser -->
|
332
336
|
```python
|
333
337
|
import pulumi
|
334
338
|
import pulumi_vault as vault
|
335
339
|
|
336
340
|
example = vault.identity.MfaPingid("example", settings_file_base64="CnVzZV9iYXNlNjR[...]HBtCg==")
|
337
341
|
```
|
338
|
-
<!--End PulumiCodeChooser -->
|
339
342
|
|
340
343
|
## Import
|
341
344
|
|
@@ -362,14 +365,12 @@ class MfaPingid(pulumi.CustomResource):
|
|
362
365
|
|
363
366
|
## Example Usage
|
364
367
|
|
365
|
-
<!--Start PulumiCodeChooser -->
|
366
368
|
```python
|
367
369
|
import pulumi
|
368
370
|
import pulumi_vault as vault
|
369
371
|
|
370
372
|
example = vault.identity.MfaPingid("example", settings_file_base64="CnVzZV9iYXNlNjR[...]HBtCg==")
|
371
373
|
```
|
372
|
-
<!--End PulumiCodeChooser -->
|
373
374
|
|
374
375
|
## Import
|
375
376
|
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['MfaTotpArgs', 'MfaTotp']
|
@@ -446,14 +451,12 @@ class MfaTotp(pulumi.CustomResource):
|
|
446
451
|
|
447
452
|
## Example Usage
|
448
453
|
|
449
|
-
<!--Start PulumiCodeChooser -->
|
450
454
|
```python
|
451
455
|
import pulumi
|
452
456
|
import pulumi_vault as vault
|
453
457
|
|
454
458
|
example = vault.identity.MfaTotp("example", issuer="issuer1")
|
455
459
|
```
|
456
|
-
<!--End PulumiCodeChooser -->
|
457
460
|
|
458
461
|
## Import
|
459
462
|
|
@@ -486,14 +489,12 @@ class MfaTotp(pulumi.CustomResource):
|
|
486
489
|
|
487
490
|
## Example Usage
|
488
491
|
|
489
|
-
<!--Start PulumiCodeChooser -->
|
490
492
|
```python
|
491
493
|
import pulumi
|
492
494
|
import pulumi_vault as vault
|
493
495
|
|
494
496
|
example = vault.identity.MfaTotp("example", issuer="issuer1")
|
495
497
|
```
|
496
|
-
<!--End PulumiCodeChooser -->
|
497
498
|
|
498
499
|
## Import
|
499
500
|
|
pulumi_vault/identity/oidc.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['OidcArgs', 'Oidc']
|
@@ -24,7 +29,7 @@ class OidcArgs:
|
|
24
29
|
components.
|
25
30
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
26
31
|
The value should not contain leading or trailing forward slashes.
|
27
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
32
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
28
33
|
*Available only for Vault Enterprise*.
|
29
34
|
"""
|
30
35
|
if issuer is not None:
|
@@ -53,7 +58,7 @@ class OidcArgs:
|
|
53
58
|
"""
|
54
59
|
The namespace to provision the resource in.
|
55
60
|
The value should not contain leading or trailing forward slashes.
|
56
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
61
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
57
62
|
*Available only for Vault Enterprise*.
|
58
63
|
"""
|
59
64
|
return pulumi.get(self, "namespace")
|
@@ -76,7 +81,7 @@ class _OidcState:
|
|
76
81
|
components.
|
77
82
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
78
83
|
The value should not contain leading or trailing forward slashes.
|
79
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
84
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
80
85
|
*Available only for Vault Enterprise*.
|
81
86
|
"""
|
82
87
|
if issuer is not None:
|
@@ -105,7 +110,7 @@ class _OidcState:
|
|
105
110
|
"""
|
106
111
|
The namespace to provision the resource in.
|
107
112
|
The value should not contain leading or trailing forward slashes.
|
108
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
113
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
109
114
|
*Available only for Vault Enterprise*.
|
110
115
|
"""
|
111
116
|
return pulumi.get(self, "namespace")
|
@@ -133,14 +138,12 @@ class Oidc(pulumi.CustomResource):
|
|
133
138
|
|
134
139
|
## Example Usage
|
135
140
|
|
136
|
-
<!--Start PulumiCodeChooser -->
|
137
141
|
```python
|
138
142
|
import pulumi
|
139
143
|
import pulumi_vault as vault
|
140
144
|
|
141
145
|
server = vault.identity.Oidc("server", issuer="https://www.acme.com")
|
142
146
|
```
|
143
|
-
<!--End PulumiCodeChooser -->
|
144
147
|
|
145
148
|
:param str resource_name: The name of the resource.
|
146
149
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -150,7 +153,7 @@ class Oidc(pulumi.CustomResource):
|
|
150
153
|
components.
|
151
154
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
152
155
|
The value should not contain leading or trailing forward slashes.
|
153
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
156
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
154
157
|
*Available only for Vault Enterprise*.
|
155
158
|
"""
|
156
159
|
...
|
@@ -169,14 +172,12 @@ class Oidc(pulumi.CustomResource):
|
|
169
172
|
|
170
173
|
## Example Usage
|
171
174
|
|
172
|
-
<!--Start PulumiCodeChooser -->
|
173
175
|
```python
|
174
176
|
import pulumi
|
175
177
|
import pulumi_vault as vault
|
176
178
|
|
177
179
|
server = vault.identity.Oidc("server", issuer="https://www.acme.com")
|
178
180
|
```
|
179
|
-
<!--End PulumiCodeChooser -->
|
180
181
|
|
181
182
|
:param str resource_name: The name of the resource.
|
182
183
|
:param OidcArgs args: The arguments to use to populate this resource's properties.
|
@@ -231,7 +232,7 @@ class Oidc(pulumi.CustomResource):
|
|
231
232
|
components.
|
232
233
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
233
234
|
The value should not contain leading or trailing forward slashes.
|
234
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
235
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
235
236
|
*Available only for Vault Enterprise*.
|
236
237
|
"""
|
237
238
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -259,7 +260,7 @@ class Oidc(pulumi.CustomResource):
|
|
259
260
|
"""
|
260
261
|
The namespace to provision the resource in.
|
261
262
|
The value should not contain leading or trailing forward slashes.
|
262
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
263
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
263
264
|
*Available only for Vault Enterprise*.
|
264
265
|
"""
|
265
266
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['OidcAssignmentArgs', 'OidcAssignment']
|
@@ -25,7 +30,7 @@ class OidcAssignmentArgs:
|
|
25
30
|
:param pulumi.Input[str] name: The name of the assignment.
|
26
31
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
27
32
|
The value should not contain leading or trailing forward slashes.
|
28
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
33
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
29
34
|
*Available only for Vault Enterprise*.
|
30
35
|
"""
|
31
36
|
if entity_ids is not None:
|
@@ -79,7 +84,7 @@ class OidcAssignmentArgs:
|
|
79
84
|
"""
|
80
85
|
The namespace to provision the resource in.
|
81
86
|
The value should not contain leading or trailing forward slashes.
|
82
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
87
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
83
88
|
*Available only for Vault Enterprise*.
|
84
89
|
"""
|
85
90
|
return pulumi.get(self, "namespace")
|
@@ -103,7 +108,7 @@ class _OidcAssignmentState:
|
|
103
108
|
:param pulumi.Input[str] name: The name of the assignment.
|
104
109
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
105
110
|
The value should not contain leading or trailing forward slashes.
|
106
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
111
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
107
112
|
*Available only for Vault Enterprise*.
|
108
113
|
"""
|
109
114
|
if entity_ids is not None:
|
@@ -157,7 +162,7 @@ class _OidcAssignmentState:
|
|
157
162
|
"""
|
158
163
|
The namespace to provision the resource in.
|
159
164
|
The value should not contain leading or trailing forward slashes.
|
160
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
165
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
161
166
|
*Available only for Vault Enterprise*.
|
162
167
|
"""
|
163
168
|
return pulumi.get(self, "namespace")
|
@@ -183,23 +188,25 @@ class OidcAssignment(pulumi.CustomResource):
|
|
183
188
|
|
184
189
|
## Example Usage
|
185
190
|
|
186
|
-
<!--Start PulumiCodeChooser -->
|
187
191
|
```python
|
188
192
|
import pulumi
|
189
193
|
import pulumi_vault as vault
|
190
194
|
|
191
195
|
internal = vault.identity.Group("internal",
|
196
|
+
name="internal",
|
192
197
|
type="internal",
|
193
198
|
policies=[
|
194
199
|
"dev",
|
195
200
|
"test",
|
196
201
|
])
|
197
|
-
test = vault.identity.Entity("test",
|
202
|
+
test = vault.identity.Entity("test",
|
203
|
+
name="test",
|
204
|
+
policies=["test"])
|
198
205
|
default = vault.identity.OidcAssignment("default",
|
206
|
+
name="assignment",
|
199
207
|
entity_ids=[test.id],
|
200
208
|
group_ids=[internal.id])
|
201
209
|
```
|
202
|
-
<!--End PulumiCodeChooser -->
|
203
210
|
|
204
211
|
## Import
|
205
212
|
|
@@ -216,7 +223,7 @@ class OidcAssignment(pulumi.CustomResource):
|
|
216
223
|
:param pulumi.Input[str] name: The name of the assignment.
|
217
224
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
218
225
|
The value should not contain leading or trailing forward slashes.
|
219
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
226
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
220
227
|
*Available only for Vault Enterprise*.
|
221
228
|
"""
|
222
229
|
...
|
@@ -231,23 +238,25 @@ class OidcAssignment(pulumi.CustomResource):
|
|
231
238
|
|
232
239
|
## Example Usage
|
233
240
|
|
234
|
-
<!--Start PulumiCodeChooser -->
|
235
241
|
```python
|
236
242
|
import pulumi
|
237
243
|
import pulumi_vault as vault
|
238
244
|
|
239
245
|
internal = vault.identity.Group("internal",
|
246
|
+
name="internal",
|
240
247
|
type="internal",
|
241
248
|
policies=[
|
242
249
|
"dev",
|
243
250
|
"test",
|
244
251
|
])
|
245
|
-
test = vault.identity.Entity("test",
|
252
|
+
test = vault.identity.Entity("test",
|
253
|
+
name="test",
|
254
|
+
policies=["test"])
|
246
255
|
default = vault.identity.OidcAssignment("default",
|
256
|
+
name="assignment",
|
247
257
|
entity_ids=[test.id],
|
248
258
|
group_ids=[internal.id])
|
249
259
|
```
|
250
|
-
<!--End PulumiCodeChooser -->
|
251
260
|
|
252
261
|
## Import
|
253
262
|
|
@@ -315,7 +324,7 @@ class OidcAssignment(pulumi.CustomResource):
|
|
315
324
|
:param pulumi.Input[str] name: The name of the assignment.
|
316
325
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
317
326
|
The value should not contain leading or trailing forward slashes.
|
318
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
327
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
319
328
|
*Available only for Vault Enterprise*.
|
320
329
|
"""
|
321
330
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -358,7 +367,7 @@ class OidcAssignment(pulumi.CustomResource):
|
|
358
367
|
"""
|
359
368
|
The namespace to provision the resource in.
|
360
369
|
The value should not contain leading or trailing forward slashes.
|
361
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
370
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
362
371
|
*Available only for Vault Enterprise*.
|
363
372
|
"""
|
364
373
|
return pulumi.get(self, "namespace")
|