pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736850018__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +22 -7
- pulumi_vault/ad/secret_backend.py +14 -144
- pulumi_vault/ad/secret_library.py +14 -11
- pulumi_vault/ad/secret_role.py +12 -11
- pulumi_vault/alicloud/auth_backend_role.py +74 -192
- pulumi_vault/approle/auth_backend_login.py +12 -11
- pulumi_vault/approle/auth_backend_role.py +75 -193
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
- pulumi_vault/audit.py +24 -27
- pulumi_vault/audit_request_header.py +11 -6
- pulumi_vault/auth_backend.py +64 -12
- pulumi_vault/aws/auth_backend_cert.py +12 -7
- pulumi_vault/aws/auth_backend_client.py +265 -24
- pulumi_vault/aws/auth_backend_config_identity.py +12 -11
- pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +75 -193
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
- pulumi_vault/aws/auth_backend_sts_role.py +12 -11
- pulumi_vault/aws/get_access_credentials.py +34 -7
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +75 -7
- pulumi_vault/aws/secret_backend_role.py +183 -11
- pulumi_vault/aws/secret_backend_static_role.py +14 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +151 -17
- pulumi_vault/azure/auth_backend_role.py +75 -193
- pulumi_vault/azure/backend.py +223 -29
- pulumi_vault/azure/backend_role.py +42 -41
- pulumi_vault/azure/get_access_credentials.py +39 -11
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -271
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +22 -25
- pulumi_vault/consul/secret_backend_role.py +14 -80
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +117 -114
- pulumi_vault/database/secret_backend_role.py +29 -24
- pulumi_vault/database/secret_backend_static_role.py +85 -15
- pulumi_vault/database/secrets_mount.py +425 -138
- pulumi_vault/egp_policy.py +16 -15
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +248 -35
- pulumi_vault/gcp/auth_backend_role.py +75 -271
- pulumi_vault/gcp/get_auth_backend_role.py +43 -9
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -16
- pulumi_vault/gcp/secret_impersonated_account.py +74 -17
- pulumi_vault/gcp/secret_roleset.py +29 -26
- pulumi_vault/gcp/secret_static_account.py +37 -34
- pulumi_vault/generic/endpoint.py +22 -21
- pulumi_vault/generic/get_secret.py +68 -12
- pulumi_vault/generic/secret.py +19 -14
- pulumi_vault/get_auth_backend.py +24 -11
- pulumi_vault/get_auth_backends.py +33 -11
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -15
- pulumi_vault/get_policy_document.py +34 -23
- pulumi_vault/get_raft_autopilot_state.py +29 -14
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +17 -16
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +14 -13
- pulumi_vault/github/user.py +14 -13
- pulumi_vault/identity/entity.py +18 -15
- pulumi_vault/identity/entity_alias.py +18 -15
- pulumi_vault/identity/entity_policies.py +24 -19
- pulumi_vault/identity/get_entity.py +40 -14
- pulumi_vault/identity/get_group.py +45 -13
- pulumi_vault/identity/get_oidc_client_creds.py +21 -11
- pulumi_vault/identity/get_oidc_openid_config.py +39 -13
- pulumi_vault/identity/get_oidc_public_keys.py +29 -14
- pulumi_vault/identity/group.py +50 -49
- pulumi_vault/identity/group_alias.py +14 -11
- pulumi_vault/identity/group_member_entity_ids.py +24 -74
- pulumi_vault/identity/group_member_group_ids.py +36 -27
- pulumi_vault/identity/group_policies.py +16 -15
- pulumi_vault/identity/mfa_duo.py +9 -8
- pulumi_vault/identity/mfa_login_enforcement.py +13 -8
- pulumi_vault/identity/mfa_okta.py +9 -8
- pulumi_vault/identity/mfa_pingid.py +5 -4
- pulumi_vault/identity/mfa_totp.py +5 -4
- pulumi_vault/identity/oidc.py +12 -11
- pulumi_vault/identity/oidc_assignment.py +22 -13
- pulumi_vault/identity/oidc_client.py +34 -25
- pulumi_vault/identity/oidc_key.py +28 -19
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
- pulumi_vault/identity/oidc_provider.py +34 -23
- pulumi_vault/identity/oidc_role.py +40 -27
- pulumi_vault/identity/oidc_scope.py +18 -15
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +39 -46
- pulumi_vault/jwt/auth_backend_role.py +131 -260
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +22 -21
- pulumi_vault/kmip/secret_role.py +12 -11
- pulumi_vault/kmip/secret_scope.py +12 -11
- pulumi_vault/kubernetes/auth_backend_config.py +55 -7
- pulumi_vault/kubernetes/auth_backend_role.py +68 -179
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -15
- pulumi_vault/kubernetes/secret_backend.py +314 -29
- pulumi_vault/kubernetes/secret_backend_role.py +135 -56
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +23 -12
- pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
- pulumi_vault/kv/get_secret_v2.py +89 -9
- pulumi_vault/kv/get_secrets_list.py +22 -15
- pulumi_vault/kv/get_secrets_list_v2.py +35 -19
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +19 -18
- pulumi_vault/kv/secret_backend_v2.py +12 -11
- pulumi_vault/kv/secret_v2.py +55 -52
- pulumi_vault/ldap/auth_backend.py +125 -168
- pulumi_vault/ldap/auth_backend_group.py +12 -11
- pulumi_vault/ldap/auth_backend_user.py +12 -11
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +352 -84
- pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
- pulumi_vault/ldap/secret_backend_library_set.py +14 -11
- pulumi_vault/ldap/secret_backend_static_role.py +67 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +27 -43
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +16 -13
- pulumi_vault/mfa_okta.py +16 -13
- pulumi_vault/mfa_pingid.py +16 -13
- pulumi_vault/mfa_totp.py +22 -19
- pulumi_vault/mongodbatlas/secret_backend.py +18 -17
- pulumi_vault/mongodbatlas/secret_role.py +41 -38
- pulumi_vault/mount.py +389 -65
- pulumi_vault/namespace.py +26 -21
- pulumi_vault/nomad_secret_backend.py +16 -15
- pulumi_vault/nomad_secret_role.py +12 -11
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +483 -41
- pulumi_vault/okta/auth_backend_group.py +12 -11
- pulumi_vault/okta/auth_backend_user.py +12 -11
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +18 -15
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
- pulumi_vault/pkisecret/get_backend_key.py +24 -13
- pulumi_vault/pkisecret/get_backend_keys.py +21 -12
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
- pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
- pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
- pulumi_vault/pkisecret/secret_backend_key.py +12 -7
- pulumi_vault/pkisecret/secret_backend_role.py +19 -16
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +12 -7
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +58 -8
- pulumi_vault/quota_rate_limit.py +54 -4
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +16 -15
- pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
- pulumi_vault/raft_autopilot.py +12 -11
- pulumi_vault/raft_snapshot_agent_config.py +121 -311
- pulumi_vault/rgp_policy.py +14 -13
- pulumi_vault/saml/auth_backend.py +20 -19
- pulumi_vault/saml/auth_backend_role.py +90 -199
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -75
- pulumi_vault/secrets/sync_aws_destination.py +240 -29
- pulumi_vault/secrets/sync_azure_destination.py +90 -33
- pulumi_vault/secrets/sync_config.py +7 -6
- pulumi_vault/secrets/sync_gcp_destination.py +156 -27
- pulumi_vault/secrets/sync_gh_destination.py +187 -15
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +72 -15
- pulumi_vault/ssh/_inputs.py +28 -32
- pulumi_vault/ssh/outputs.py +11 -32
- pulumi_vault/ssh/secret_backend_ca.py +106 -11
- pulumi_vault/ssh/secret_backend_role.py +83 -120
- pulumi_vault/terraformcloud/secret_backend.py +5 -56
- pulumi_vault/terraformcloud/secret_creds.py +14 -24
- pulumi_vault/terraformcloud/secret_role.py +14 -76
- pulumi_vault/token.py +26 -25
- pulumi_vault/tokenauth/auth_backend_role.py +76 -201
- pulumi_vault/transform/alphabet.py +16 -13
- pulumi_vault/transform/get_decode.py +45 -21
- pulumi_vault/transform/get_encode.py +45 -21
- pulumi_vault/transform/role.py +16 -13
- pulumi_vault/transform/template.py +30 -25
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -25
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +25 -97
- pulumi_vault/transit/secret_cache_config.py +12 -11
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736850018.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/top_level.txt +0 -0
pulumi_vault/rgp_policy.py
CHANGED
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from . import _utilities
|
11
16
|
|
12
17
|
__all__ = ['RgpPolicyArgs', 'RgpPolicy']
|
@@ -25,7 +30,7 @@ class RgpPolicyArgs:
|
|
25
30
|
:param pulumi.Input[str] name: The name of the policy
|
26
31
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
27
32
|
The value should not contain leading or trailing forward slashes.
|
28
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
33
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
29
34
|
*Available only for Vault Enterprise*.
|
30
35
|
"""
|
31
36
|
pulumi.set(__self__, "enforcement_level", enforcement_level)
|
@@ -77,7 +82,7 @@ class RgpPolicyArgs:
|
|
77
82
|
"""
|
78
83
|
The namespace to provision the resource in.
|
79
84
|
The value should not contain leading or trailing forward slashes.
|
80
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
85
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
81
86
|
*Available only for Vault Enterprise*.
|
82
87
|
"""
|
83
88
|
return pulumi.get(self, "namespace")
|
@@ -100,7 +105,7 @@ class _RgpPolicyState:
|
|
100
105
|
:param pulumi.Input[str] name: The name of the policy
|
101
106
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
102
107
|
The value should not contain leading or trailing forward slashes.
|
103
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
108
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
104
109
|
*Available only for Vault Enterprise*.
|
105
110
|
:param pulumi.Input[str] policy: String containing a Sentinel policy
|
106
111
|
"""
|
@@ -143,7 +148,7 @@ class _RgpPolicyState:
|
|
143
148
|
"""
|
144
149
|
The namespace to provision the resource in.
|
145
150
|
The value should not contain leading or trailing forward slashes.
|
146
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
151
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
147
152
|
*Available only for Vault Enterprise*.
|
148
153
|
"""
|
149
154
|
return pulumi.get(self, "namespace")
|
@@ -182,20 +187,18 @@ class RgpPolicy(pulumi.CustomResource):
|
|
182
187
|
|
183
188
|
## Example Usage
|
184
189
|
|
185
|
-
<!--Start PulumiCodeChooser -->
|
186
190
|
```python
|
187
191
|
import pulumi
|
188
192
|
import pulumi_vault as vault
|
189
193
|
|
190
194
|
allow_all = vault.RgpPolicy("allow-all",
|
195
|
+
name="allow-all",
|
191
196
|
enforcement_level="soft-mandatory",
|
192
197
|
policy=\"\"\"main = rule {
|
193
198
|
true
|
194
199
|
}
|
195
|
-
|
196
200
|
\"\"\")
|
197
201
|
```
|
198
|
-
<!--End PulumiCodeChooser -->
|
199
202
|
|
200
203
|
:param str resource_name: The name of the resource.
|
201
204
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -203,7 +206,7 @@ class RgpPolicy(pulumi.CustomResource):
|
|
203
206
|
:param pulumi.Input[str] name: The name of the policy
|
204
207
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
205
208
|
The value should not contain leading or trailing forward slashes.
|
206
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
209
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
207
210
|
*Available only for Vault Enterprise*.
|
208
211
|
:param pulumi.Input[str] policy: String containing a Sentinel policy
|
209
212
|
"""
|
@@ -220,20 +223,18 @@ class RgpPolicy(pulumi.CustomResource):
|
|
220
223
|
|
221
224
|
## Example Usage
|
222
225
|
|
223
|
-
<!--Start PulumiCodeChooser -->
|
224
226
|
```python
|
225
227
|
import pulumi
|
226
228
|
import pulumi_vault as vault
|
227
229
|
|
228
230
|
allow_all = vault.RgpPolicy("allow-all",
|
231
|
+
name="allow-all",
|
229
232
|
enforcement_level="soft-mandatory",
|
230
233
|
policy=\"\"\"main = rule {
|
231
234
|
true
|
232
235
|
}
|
233
|
-
|
234
236
|
\"\"\")
|
235
237
|
```
|
236
|
-
<!--End PulumiCodeChooser -->
|
237
238
|
|
238
239
|
:param str resource_name: The name of the resource.
|
239
240
|
:param RgpPolicyArgs args: The arguments to use to populate this resource's properties.
|
@@ -296,7 +297,7 @@ class RgpPolicy(pulumi.CustomResource):
|
|
296
297
|
:param pulumi.Input[str] name: The name of the policy
|
297
298
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
298
299
|
The value should not contain leading or trailing forward slashes.
|
299
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
300
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
300
301
|
*Available only for Vault Enterprise*.
|
301
302
|
:param pulumi.Input[str] policy: String containing a Sentinel policy
|
302
303
|
"""
|
@@ -332,7 +333,7 @@ class RgpPolicy(pulumi.CustomResource):
|
|
332
333
|
"""
|
333
334
|
The namespace to provision the resource in.
|
334
335
|
The value should not contain leading or trailing forward slashes.
|
335
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
336
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
336
337
|
*Available only for Vault Enterprise*.
|
337
338
|
"""
|
338
339
|
return pulumi.get(self, "namespace")
|
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['AuthBackendArgs', 'AuthBackend']
|
@@ -42,7 +47,7 @@ class AuthBackendArgs:
|
|
42
47
|
`idp_metadata_url`.
|
43
48
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
44
49
|
The value should not contain leading or trailing forward slashes.
|
45
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
50
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
46
51
|
*Available only for Vault Enterprise*.
|
47
52
|
:param pulumi.Input[str] path: Path where the auth backend will be mounted. Defaults to `auth/saml`
|
48
53
|
if not specified.
|
@@ -178,7 +183,7 @@ class AuthBackendArgs:
|
|
178
183
|
"""
|
179
184
|
The namespace to provision the resource in.
|
180
185
|
The value should not contain leading or trailing forward slashes.
|
181
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
186
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
182
187
|
*Available only for Vault Enterprise*.
|
183
188
|
"""
|
184
189
|
return pulumi.get(self, "namespace")
|
@@ -246,7 +251,7 @@ class _AuthBackendState:
|
|
246
251
|
`idp_metadata_url`.
|
247
252
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
248
253
|
The value should not contain leading or trailing forward slashes.
|
249
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
254
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
250
255
|
*Available only for Vault Enterprise*.
|
251
256
|
:param pulumi.Input[str] path: Path where the auth backend will be mounted. Defaults to `auth/saml`
|
252
257
|
if not specified.
|
@@ -384,7 +389,7 @@ class _AuthBackendState:
|
|
384
389
|
"""
|
385
390
|
The namespace to provision the resource in.
|
386
391
|
The value should not contain leading or trailing forward slashes.
|
387
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
392
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
388
393
|
*Available only for Vault Enterprise*.
|
389
394
|
"""
|
390
395
|
return pulumi.get(self, "namespace")
|
@@ -445,19 +450,17 @@ class AuthBackend(pulumi.CustomResource):
|
|
445
450
|
|
446
451
|
## Example Usage
|
447
452
|
|
448
|
-
<!--Start PulumiCodeChooser -->
|
449
453
|
```python
|
450
454
|
import pulumi
|
451
455
|
import pulumi_vault as vault
|
452
456
|
|
453
457
|
test = vault.saml.AuthBackend("test",
|
454
|
-
|
455
|
-
default_role="admin",
|
456
|
-
entity_id="https://my.vault/v1/auth/saml",
|
458
|
+
path="saml",
|
457
459
|
idp_metadata_url="https://company.okta.com/app/abc123eb9xnIfzlaf697/sso/saml/metadata",
|
458
|
-
|
460
|
+
entity_id="https://my.vault/v1/auth/saml",
|
461
|
+
acs_urls=["https://my.vault.primary/v1/auth/saml/callback"],
|
462
|
+
default_role="admin")
|
459
463
|
```
|
460
|
-
<!--End PulumiCodeChooser -->
|
461
464
|
|
462
465
|
## Import
|
463
466
|
|
@@ -484,7 +487,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
484
487
|
`idp_metadata_url`.
|
485
488
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
486
489
|
The value should not contain leading or trailing forward slashes.
|
487
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
490
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
488
491
|
*Available only for Vault Enterprise*.
|
489
492
|
:param pulumi.Input[str] path: Path where the auth backend will be mounted. Defaults to `auth/saml`
|
490
493
|
if not specified.
|
@@ -505,19 +508,17 @@ class AuthBackend(pulumi.CustomResource):
|
|
505
508
|
|
506
509
|
## Example Usage
|
507
510
|
|
508
|
-
<!--Start PulumiCodeChooser -->
|
509
511
|
```python
|
510
512
|
import pulumi
|
511
513
|
import pulumi_vault as vault
|
512
514
|
|
513
515
|
test = vault.saml.AuthBackend("test",
|
514
|
-
|
515
|
-
default_role="admin",
|
516
|
-
entity_id="https://my.vault/v1/auth/saml",
|
516
|
+
path="saml",
|
517
517
|
idp_metadata_url="https://company.okta.com/app/abc123eb9xnIfzlaf697/sso/saml/metadata",
|
518
|
-
|
518
|
+
entity_id="https://my.vault/v1/auth/saml",
|
519
|
+
acs_urls=["https://my.vault.primary/v1/auth/saml/callback"],
|
520
|
+
default_role="admin")
|
519
521
|
```
|
520
|
-
<!--End PulumiCodeChooser -->
|
521
522
|
|
522
523
|
## Import
|
523
524
|
|
@@ -620,7 +621,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
620
621
|
`idp_metadata_url`.
|
621
622
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
622
623
|
The value should not contain leading or trailing forward slashes.
|
623
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
624
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
624
625
|
*Available only for Vault Enterprise*.
|
625
626
|
:param pulumi.Input[str] path: Path where the auth backend will be mounted. Defaults to `auth/saml`
|
626
627
|
if not specified.
|
@@ -720,7 +721,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
720
721
|
"""
|
721
722
|
The namespace to provision the resource in.
|
722
723
|
The value should not contain leading or trailing forward slashes.
|
723
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
724
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
724
725
|
*Available only for Vault Enterprise*.
|
725
726
|
"""
|
726
727
|
return pulumi.get(self, "namespace")
|