pulumi-vault 6.2.0a1713561465__py3-none-any.whl → 6.2.0a1714114277__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -20
- pulumi_vault/ad/secret_backend.py +0 -4
- pulumi_vault/ad/secret_library.py +0 -4
- pulumi_vault/ad/secret_role.py +0 -4
- pulumi_vault/alicloud/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_login.py +0 -4
- pulumi_vault/approle/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
- pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
- pulumi_vault/audit.py +0 -8
- pulumi_vault/audit_request_header.py +0 -4
- pulumi_vault/aws/auth_backend_client.py +0 -4
- pulumi_vault/aws/auth_backend_config_identity.py +0 -4
- pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -4
- pulumi_vault/aws/auth_backend_role.py +63 -186
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -4
- pulumi_vault/aws/auth_backend_sts_role.py +0 -4
- pulumi_vault/aws/secret_backend_role.py +0 -4
- pulumi_vault/aws/secret_backend_static_role.py +0 -4
- pulumi_vault/azure/auth_backend_config.py +0 -4
- pulumi_vault/azure/auth_backend_role.py +63 -186
- pulumi_vault/azure/backend.py +0 -8
- pulumi_vault/azure/backend_role.py +0 -4
- pulumi_vault/azure/get_access_credentials.py +0 -4
- pulumi_vault/cert_auth_backend_role.py +63 -200
- pulumi_vault/consul/secret_backend.py +0 -8
- pulumi_vault/consul/secret_backend_role.py +0 -4
- pulumi_vault/database/_inputs.py +522 -784
- pulumi_vault/database/outputs.py +522 -784
- pulumi_vault/database/secret_backend_connection.py +0 -4
- pulumi_vault/database/secret_backend_role.py +0 -4
- pulumi_vault/database/secret_backend_static_role.py +0 -4
- pulumi_vault/database/secrets_mount.py +0 -4
- pulumi_vault/egp_policy.py +0 -4
- pulumi_vault/gcp/auth_backend_role.py +63 -264
- pulumi_vault/gcp/get_auth_backend_role.py +0 -4
- pulumi_vault/gcp/secret_backend.py +0 -4
- pulumi_vault/gcp/secret_impersonated_account.py +0 -4
- pulumi_vault/gcp/secret_roleset.py +0 -4
- pulumi_vault/gcp/secret_static_account.py +0 -4
- pulumi_vault/generic/endpoint.py +0 -4
- pulumi_vault/generic/get_secret.py +0 -8
- pulumi_vault/get_auth_backend.py +0 -4
- pulumi_vault/get_auth_backends.py +0 -8
- pulumi_vault/get_namespace.py +0 -12
- pulumi_vault/get_namespaces.py +0 -8
- pulumi_vault/get_nomad_access_token.py +0 -4
- pulumi_vault/get_policy_document.py +0 -4
- pulumi_vault/get_raft_autopilot_state.py +0 -4
- pulumi_vault/github/auth_backend.py +0 -4
- pulumi_vault/github/team.py +0 -4
- pulumi_vault/github/user.py +0 -4
- pulumi_vault/identity/entity.py +0 -4
- pulumi_vault/identity/entity_alias.py +0 -4
- pulumi_vault/identity/entity_policies.py +0 -8
- pulumi_vault/identity/get_entity.py +0 -4
- pulumi_vault/identity/get_group.py +0 -4
- pulumi_vault/identity/get_oidc_client_creds.py +0 -4
- pulumi_vault/identity/get_oidc_openid_config.py +0 -4
- pulumi_vault/identity/get_oidc_public_keys.py +0 -4
- pulumi_vault/identity/group.py +0 -12
- pulumi_vault/identity/group_alias.py +0 -4
- pulumi_vault/identity/group_member_entity_ids.py +0 -8
- pulumi_vault/identity/group_member_group_ids.py +0 -8
- pulumi_vault/identity/group_policies.py +0 -8
- pulumi_vault/identity/mfa_duo.py +0 -4
- pulumi_vault/identity/mfa_login_enforcement.py +0 -4
- pulumi_vault/identity/mfa_okta.py +0 -4
- pulumi_vault/identity/mfa_pingid.py +0 -4
- pulumi_vault/identity/mfa_totp.py +0 -4
- pulumi_vault/identity/oidc.py +0 -4
- pulumi_vault/identity/oidc_assignment.py +0 -4
- pulumi_vault/identity/oidc_client.py +0 -4
- pulumi_vault/identity/oidc_key.py +0 -4
- pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -4
- pulumi_vault/identity/oidc_provider.py +0 -4
- pulumi_vault/identity/oidc_role.py +0 -8
- pulumi_vault/identity/oidc_scope.py +0 -4
- pulumi_vault/jwt/auth_backend.py +0 -12
- pulumi_vault/jwt/auth_backend_role.py +63 -190
- pulumi_vault/kmip/secret_backend.py +0 -4
- pulumi_vault/kmip/secret_role.py +0 -4
- pulumi_vault/kmip/secret_scope.py +0 -4
- pulumi_vault/kubernetes/auth_backend_config.py +0 -4
- pulumi_vault/kubernetes/auth_backend_role.py +56 -172
- pulumi_vault/kubernetes/get_service_account_token.py +0 -4
- pulumi_vault/kubernetes/secret_backend.py +0 -4
- pulumi_vault/kubernetes/secret_backend_role.py +0 -12
- pulumi_vault/kv/get_secret.py +0 -4
- pulumi_vault/kv/get_secret_subkeys_v2.py +0 -4
- pulumi_vault/kv/get_secret_v2.py +0 -4
- pulumi_vault/kv/get_secrets_list.py +0 -4
- pulumi_vault/kv/get_secrets_list_v2.py +0 -4
- pulumi_vault/kv/secret.py +0 -4
- pulumi_vault/kv/secret_backend_v2.py +0 -4
- pulumi_vault/kv/secret_v2.py +0 -4
- pulumi_vault/ldap/auth_backend.py +56 -151
- pulumi_vault/ldap/auth_backend_group.py +0 -4
- pulumi_vault/ldap/auth_backend_user.py +0 -4
- pulumi_vault/ldap/secret_backend.py +0 -4
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
- pulumi_vault/ldap/secret_backend_library_set.py +0 -4
- pulumi_vault/ldap/secret_backend_static_role.py +0 -4
- pulumi_vault/managed/_inputs.py +84 -132
- pulumi_vault/managed/keys.py +7 -28
- pulumi_vault/managed/outputs.py +84 -132
- pulumi_vault/mfa_duo.py +0 -4
- pulumi_vault/mfa_okta.py +0 -4
- pulumi_vault/mfa_pingid.py +0 -4
- pulumi_vault/mfa_totp.py +0 -4
- pulumi_vault/mongodbatlas/secret_backend.py +0 -4
- pulumi_vault/mongodbatlas/secret_role.py +0 -4
- pulumi_vault/mount.py +0 -16
- pulumi_vault/nomad_secret_backend.py +0 -4
- pulumi_vault/nomad_secret_role.py +0 -4
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +0 -4
- pulumi_vault/okta/auth_backend_group.py +0 -4
- pulumi_vault/okta/auth_backend_user.py +0 -4
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +0 -20
- pulumi_vault/password_policy.py +0 -4
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
- pulumi_vault/pkisecret/get_backend_key.py +0 -4
- pulumi_vault/pkisecret/get_backend_keys.py +0 -4
- pulumi_vault/pkisecret/secret_backend_cert.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
- pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -4
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/secret_backend_role.py +0 -4
- pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -4
- pulumi_vault/pkisecret/secret_backend_sign.py +0 -4
- pulumi_vault/quota_lease_count.py +0 -4
- pulumi_vault/quota_rate_limit.py +0 -4
- pulumi_vault/rabbitmq/secret_backend.py +0 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +0 -4
- pulumi_vault/raft_autopilot.py +0 -4
- pulumi_vault/raft_snapshot_agent_config.py +91 -292
- pulumi_vault/rgp_policy.py +0 -4
- pulumi_vault/saml/auth_backend.py +0 -4
- pulumi_vault/saml/auth_backend_role.py +56 -172
- pulumi_vault/secrets/sync_association.py +0 -4
- pulumi_vault/secrets/sync_aws_destination.py +0 -4
- pulumi_vault/secrets/sync_azure_destination.py +0 -4
- pulumi_vault/secrets/sync_config.py +0 -4
- pulumi_vault/secrets/sync_gcp_destination.py +0 -4
- pulumi_vault/secrets/sync_gh_destination.py +0 -4
- pulumi_vault/secrets/sync_github_apps.py +0 -4
- pulumi_vault/secrets/sync_vercel_destination.py +0 -4
- pulumi_vault/ssh/_inputs.py +6 -20
- pulumi_vault/ssh/outputs.py +6 -20
- pulumi_vault/ssh/secret_backend_ca.py +0 -4
- pulumi_vault/ssh/secret_backend_role.py +0 -4
- pulumi_vault/terraformcloud/secret_backend.py +0 -4
- pulumi_vault/terraformcloud/secret_creds.py +0 -4
- pulumi_vault/terraformcloud/secret_role.py +0 -4
- pulumi_vault/token.py +0 -4
- pulumi_vault/tokenauth/auth_backend_role.py +56 -172
- pulumi_vault/transform/alphabet.py +0 -4
- pulumi_vault/transform/get_decode.py +0 -4
- pulumi_vault/transform/get_encode.py +0 -4
- pulumi_vault/transform/role.py +0 -4
- pulumi_vault/transform/template.py +0 -4
- pulumi_vault/transit/get_decrypt.py +0 -16
- pulumi_vault/transit/get_encrypt.py +0 -14
- pulumi_vault/transit/secret_backend_key.py +0 -4
- pulumi_vault/transit/secret_cache_config.py +0 -4
- {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1714114277.dist-info/RECORD +252 -0
- pulumi_vault-6.2.0a1713561465.dist-info/RECORD +0 -252
- {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/top_level.txt +0 -0
pulumi_vault/identity/oidc.py
CHANGED
@@ -133,14 +133,12 @@ class Oidc(pulumi.CustomResource):
|
|
133
133
|
|
134
134
|
## Example Usage
|
135
135
|
|
136
|
-
<!--Start PulumiCodeChooser -->
|
137
136
|
```python
|
138
137
|
import pulumi
|
139
138
|
import pulumi_vault as vault
|
140
139
|
|
141
140
|
server = vault.identity.Oidc("server", issuer="https://www.acme.com")
|
142
141
|
```
|
143
|
-
<!--End PulumiCodeChooser -->
|
144
142
|
|
145
143
|
:param str resource_name: The name of the resource.
|
146
144
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -169,14 +167,12 @@ class Oidc(pulumi.CustomResource):
|
|
169
167
|
|
170
168
|
## Example Usage
|
171
169
|
|
172
|
-
<!--Start PulumiCodeChooser -->
|
173
170
|
```python
|
174
171
|
import pulumi
|
175
172
|
import pulumi_vault as vault
|
176
173
|
|
177
174
|
server = vault.identity.Oidc("server", issuer="https://www.acme.com")
|
178
175
|
```
|
179
|
-
<!--End PulumiCodeChooser -->
|
180
176
|
|
181
177
|
:param str resource_name: The name of the resource.
|
182
178
|
:param OidcArgs args: The arguments to use to populate this resource's properties.
|
@@ -183,7 +183,6 @@ class OidcAssignment(pulumi.CustomResource):
|
|
183
183
|
|
184
184
|
## Example Usage
|
185
185
|
|
186
|
-
<!--Start PulumiCodeChooser -->
|
187
186
|
```python
|
188
187
|
import pulumi
|
189
188
|
import pulumi_vault as vault
|
@@ -203,7 +202,6 @@ class OidcAssignment(pulumi.CustomResource):
|
|
203
202
|
entity_ids=[test.id],
|
204
203
|
group_ids=[internal.id])
|
205
204
|
```
|
206
|
-
<!--End PulumiCodeChooser -->
|
207
205
|
|
208
206
|
## Import
|
209
207
|
|
@@ -235,7 +233,6 @@ class OidcAssignment(pulumi.CustomResource):
|
|
235
233
|
|
236
234
|
## Example Usage
|
237
235
|
|
238
|
-
<!--Start PulumiCodeChooser -->
|
239
236
|
```python
|
240
237
|
import pulumi
|
241
238
|
import pulumi_vault as vault
|
@@ -255,7 +252,6 @@ class OidcAssignment(pulumi.CustomResource):
|
|
255
252
|
entity_ids=[test.id],
|
256
253
|
group_ids=[internal.id])
|
257
254
|
```
|
258
|
-
<!--End PulumiCodeChooser -->
|
259
255
|
|
260
256
|
## Import
|
261
257
|
|
@@ -373,7 +373,6 @@ class OidcClient(pulumi.CustomResource):
|
|
373
373
|
|
374
374
|
## Example Usage
|
375
375
|
|
376
|
-
<!--Start PulumiCodeChooser -->
|
377
376
|
```python
|
378
377
|
import pulumi
|
379
378
|
import pulumi_vault as vault
|
@@ -393,7 +392,6 @@ class OidcClient(pulumi.CustomResource):
|
|
393
392
|
id_token_ttl=2400,
|
394
393
|
access_token_ttl=7200)
|
395
394
|
```
|
396
|
-
<!--End PulumiCodeChooser -->
|
397
395
|
|
398
396
|
## Import
|
399
397
|
|
@@ -435,7 +433,6 @@ class OidcClient(pulumi.CustomResource):
|
|
435
433
|
|
436
434
|
## Example Usage
|
437
435
|
|
438
|
-
<!--Start PulumiCodeChooser -->
|
439
436
|
```python
|
440
437
|
import pulumi
|
441
438
|
import pulumi_vault as vault
|
@@ -455,7 +452,6 @@ class OidcClient(pulumi.CustomResource):
|
|
455
452
|
id_token_ttl=2400,
|
456
453
|
access_token_ttl=7200)
|
457
454
|
```
|
458
|
-
<!--End PulumiCodeChooser -->
|
459
455
|
|
460
456
|
## Import
|
461
457
|
|
@@ -258,7 +258,6 @@ class OidcKey(pulumi.CustomResource):
|
|
258
258
|
"""
|
259
259
|
## Example Usage
|
260
260
|
|
261
|
-
<!--Start PulumiCodeChooser -->
|
262
261
|
```python
|
263
262
|
import pulumi
|
264
263
|
import pulumi_vault as vault
|
@@ -273,7 +272,6 @@ class OidcKey(pulumi.CustomResource):
|
|
273
272
|
key_name=key.name,
|
274
273
|
allowed_client_id=role.client_id)
|
275
274
|
```
|
276
|
-
<!--End PulumiCodeChooser -->
|
277
275
|
|
278
276
|
## Import
|
279
277
|
|
@@ -307,7 +305,6 @@ class OidcKey(pulumi.CustomResource):
|
|
307
305
|
"""
|
308
306
|
## Example Usage
|
309
307
|
|
310
|
-
<!--Start PulumiCodeChooser -->
|
311
308
|
```python
|
312
309
|
import pulumi
|
313
310
|
import pulumi_vault as vault
|
@@ -322,7 +319,6 @@ class OidcKey(pulumi.CustomResource):
|
|
322
319
|
key_name=key.name,
|
323
320
|
allowed_client_id=role.client_id)
|
324
321
|
```
|
325
|
-
<!--End PulumiCodeChooser -->
|
326
322
|
|
327
323
|
## Import
|
328
324
|
|
@@ -145,7 +145,6 @@ class OidcKeyAllowedClientID(pulumi.CustomResource):
|
|
145
145
|
"""
|
146
146
|
## Example Usage
|
147
147
|
|
148
|
-
<!--Start PulumiCodeChooser -->
|
149
148
|
```python
|
150
149
|
import pulumi
|
151
150
|
import pulumi_vault as vault
|
@@ -160,7 +159,6 @@ class OidcKeyAllowedClientID(pulumi.CustomResource):
|
|
160
159
|
key_name=key.name,
|
161
160
|
allowed_client_id=role.client_id)
|
162
161
|
```
|
163
|
-
<!--End PulumiCodeChooser -->
|
164
162
|
|
165
163
|
:param str resource_name: The name of the resource.
|
166
164
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -180,7 +178,6 @@ class OidcKeyAllowedClientID(pulumi.CustomResource):
|
|
180
178
|
"""
|
181
179
|
## Example Usage
|
182
180
|
|
183
|
-
<!--Start PulumiCodeChooser -->
|
184
181
|
```python
|
185
182
|
import pulumi
|
186
183
|
import pulumi_vault as vault
|
@@ -195,7 +192,6 @@ class OidcKeyAllowedClientID(pulumi.CustomResource):
|
|
195
192
|
key_name=key.name,
|
196
193
|
allowed_client_id=role.client_id)
|
197
194
|
```
|
198
|
-
<!--End PulumiCodeChooser -->
|
199
195
|
|
200
196
|
:param str resource_name: The name of the resource.
|
201
197
|
:param OidcKeyAllowedClientIDArgs args: The arguments to use to populate this resource's properties.
|
@@ -273,7 +273,6 @@ class OidcProvider(pulumi.CustomResource):
|
|
273
273
|
|
274
274
|
## Example Usage
|
275
275
|
|
276
|
-
<!--Start PulumiCodeChooser -->
|
277
276
|
```python
|
278
277
|
import pulumi
|
279
278
|
import json
|
@@ -312,7 +311,6 @@ class OidcProvider(pulumi.CustomResource):
|
|
312
311
|
allowed_client_ids=[test_oidc_client.client_id],
|
313
312
|
scopes_supporteds=[test_oidc_scope.name])
|
314
313
|
```
|
315
|
-
<!--End PulumiCodeChooser -->
|
316
314
|
|
317
315
|
## Import
|
318
316
|
|
@@ -347,7 +345,6 @@ class OidcProvider(pulumi.CustomResource):
|
|
347
345
|
|
348
346
|
## Example Usage
|
349
347
|
|
350
|
-
<!--Start PulumiCodeChooser -->
|
351
348
|
```python
|
352
349
|
import pulumi
|
353
350
|
import json
|
@@ -386,7 +383,6 @@ class OidcProvider(pulumi.CustomResource):
|
|
386
383
|
allowed_client_ids=[test_oidc_client.client_id],
|
387
384
|
scopes_supporteds=[test_oidc_scope.name])
|
388
385
|
```
|
389
|
-
<!--End PulumiCodeChooser -->
|
390
386
|
|
391
387
|
## Import
|
392
388
|
|
@@ -270,7 +270,6 @@ class OidcRole(pulumi.CustomResource):
|
|
270
270
|
exist before the role can be used to issue tokens. You must also configure the key with the
|
271
271
|
role's Client ID to allow the role to use the key.
|
272
272
|
|
273
|
-
<!--Start PulumiCodeChooser -->
|
274
273
|
```python
|
275
274
|
import pulumi
|
276
275
|
import pulumi_vault as vault
|
@@ -288,13 +287,11 @@ class OidcRole(pulumi.CustomResource):
|
|
288
287
|
algorithm="RS256",
|
289
288
|
allowed_client_ids=[role.client_id])
|
290
289
|
```
|
291
|
-
<!--End PulumiCodeChooser -->
|
292
290
|
|
293
291
|
If you want to create the key first before creating the role, you can use a separate
|
294
292
|
resource to configure the allowed Client ID on
|
295
293
|
the key.
|
296
294
|
|
297
|
-
<!--Start PulumiCodeChooser -->
|
298
295
|
```python
|
299
296
|
import pulumi
|
300
297
|
import pulumi_vault as vault
|
@@ -309,7 +306,6 @@ class OidcRole(pulumi.CustomResource):
|
|
309
306
|
key_name=key.name,
|
310
307
|
allowed_client_id=role.client_id)
|
311
308
|
```
|
312
|
-
<!--End PulumiCodeChooser -->
|
313
309
|
|
314
310
|
## Import
|
315
311
|
|
@@ -350,7 +346,6 @@ class OidcRole(pulumi.CustomResource):
|
|
350
346
|
exist before the role can be used to issue tokens. You must also configure the key with the
|
351
347
|
role's Client ID to allow the role to use the key.
|
352
348
|
|
353
|
-
<!--Start PulumiCodeChooser -->
|
354
349
|
```python
|
355
350
|
import pulumi
|
356
351
|
import pulumi_vault as vault
|
@@ -368,13 +363,11 @@ class OidcRole(pulumi.CustomResource):
|
|
368
363
|
algorithm="RS256",
|
369
364
|
allowed_client_ids=[role.client_id])
|
370
365
|
```
|
371
|
-
<!--End PulumiCodeChooser -->
|
372
366
|
|
373
367
|
If you want to create the key first before creating the role, you can use a separate
|
374
368
|
resource to configure the allowed Client ID on
|
375
369
|
the key.
|
376
370
|
|
377
|
-
<!--Start PulumiCodeChooser -->
|
378
371
|
```python
|
379
372
|
import pulumi
|
380
373
|
import pulumi_vault as vault
|
@@ -389,7 +382,6 @@ class OidcRole(pulumi.CustomResource):
|
|
389
382
|
key_name=key.name,
|
390
383
|
allowed_client_id=role.client_id)
|
391
384
|
```
|
392
|
-
<!--End PulumiCodeChooser -->
|
393
385
|
|
394
386
|
## Import
|
395
387
|
|
@@ -183,7 +183,6 @@ class OidcScope(pulumi.CustomResource):
|
|
183
183
|
|
184
184
|
## Example Usage
|
185
185
|
|
186
|
-
<!--Start PulumiCodeChooser -->
|
187
186
|
```python
|
188
187
|
import pulumi
|
189
188
|
import pulumi_vault as vault
|
@@ -193,7 +192,6 @@ class OidcScope(pulumi.CustomResource):
|
|
193
192
|
template="{\\"groups\\":{{identity.entity.groups.names}}}",
|
194
193
|
description="Vault OIDC Groups Scope")
|
195
194
|
```
|
196
|
-
<!--End PulumiCodeChooser -->
|
197
195
|
|
198
196
|
## Import
|
199
197
|
|
@@ -225,7 +223,6 @@ class OidcScope(pulumi.CustomResource):
|
|
225
223
|
|
226
224
|
## Example Usage
|
227
225
|
|
228
|
-
<!--Start PulumiCodeChooser -->
|
229
226
|
```python
|
230
227
|
import pulumi
|
231
228
|
import pulumi_vault as vault
|
@@ -235,7 +232,6 @@ class OidcScope(pulumi.CustomResource):
|
|
235
232
|
template="{\\"groups\\":{{identity.entity.groups.names}}}",
|
236
233
|
description="Vault OIDC Groups Scope")
|
237
234
|
```
|
238
|
-
<!--End PulumiCodeChooser -->
|
239
235
|
|
240
236
|
## Import
|
241
237
|
|
pulumi_vault/jwt/auth_backend.py
CHANGED
@@ -776,7 +776,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
776
776
|
|
777
777
|
Manage JWT auth backend:
|
778
778
|
|
779
|
-
<!--Start PulumiCodeChooser -->
|
780
779
|
```python
|
781
780
|
import pulumi
|
782
781
|
import pulumi_vault as vault
|
@@ -787,11 +786,9 @@ class AuthBackend(pulumi.CustomResource):
|
|
787
786
|
oidc_discovery_url="https://myco.auth0.com/",
|
788
787
|
bound_issuer="https://myco.auth0.com/")
|
789
788
|
```
|
790
|
-
<!--End PulumiCodeChooser -->
|
791
789
|
|
792
790
|
Manage OIDC auth backend:
|
793
791
|
|
794
|
-
<!--Start PulumiCodeChooser -->
|
795
792
|
```python
|
796
793
|
import pulumi
|
797
794
|
import pulumi_vault as vault
|
@@ -808,11 +805,9 @@ class AuthBackend(pulumi.CustomResource):
|
|
808
805
|
listing_visibility="unauth",
|
809
806
|
))
|
810
807
|
```
|
811
|
-
<!--End PulumiCodeChooser -->
|
812
808
|
|
813
809
|
Configuring the auth backend with a `provider_config:
|
814
810
|
|
815
|
-
<!--Start PulumiCodeChooser -->
|
816
811
|
```python
|
817
812
|
import pulumi
|
818
813
|
import pulumi_vault as vault
|
@@ -829,7 +824,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
829
824
|
"groups_recurse_max_depth": "1",
|
830
825
|
})
|
831
826
|
```
|
832
|
-
<!--End PulumiCodeChooser -->
|
833
827
|
|
834
828
|
## Import
|
835
829
|
|
@@ -889,7 +883,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
889
883
|
|
890
884
|
Manage JWT auth backend:
|
891
885
|
|
892
|
-
<!--Start PulumiCodeChooser -->
|
893
886
|
```python
|
894
887
|
import pulumi
|
895
888
|
import pulumi_vault as vault
|
@@ -900,11 +893,9 @@ class AuthBackend(pulumi.CustomResource):
|
|
900
893
|
oidc_discovery_url="https://myco.auth0.com/",
|
901
894
|
bound_issuer="https://myco.auth0.com/")
|
902
895
|
```
|
903
|
-
<!--End PulumiCodeChooser -->
|
904
896
|
|
905
897
|
Manage OIDC auth backend:
|
906
898
|
|
907
|
-
<!--Start PulumiCodeChooser -->
|
908
899
|
```python
|
909
900
|
import pulumi
|
910
901
|
import pulumi_vault as vault
|
@@ -921,11 +912,9 @@ class AuthBackend(pulumi.CustomResource):
|
|
921
912
|
listing_visibility="unauth",
|
922
913
|
))
|
923
914
|
```
|
924
|
-
<!--End PulumiCodeChooser -->
|
925
915
|
|
926
916
|
Configuring the auth backend with a `provider_config:
|
927
917
|
|
928
|
-
<!--Start PulumiCodeChooser -->
|
929
918
|
```python
|
930
919
|
import pulumi
|
931
920
|
import pulumi_vault as vault
|
@@ -942,7 +931,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
942
931
|
"groups_recurse_max_depth": "1",
|
943
932
|
})
|
944
933
|
```
|
945
|
-
<!--End PulumiCodeChooser -->
|
946
934
|
|
947
935
|
## Import
|
948
936
|
|