diff --git a/awx/main/credential_plugins/hashivault.py b/awx/main/credential_plugins/hashivault.py index 7e262912a4..8c7a74c8e8 100644 --- a/awx/main/credential_plugins/hashivault.py +++ b/awx/main/credential_plugins/hashivault.py @@ -40,6 +40,12 @@ base_inputs = { 'multiline': False, 'secret': True, 'help_text': _('The Secret ID for AppRole Authentication') + }, { + 'id': 'namespace', + 'label': _('Namespace name (Vault Enterprise only)'), + 'type': 'string', + 'multiline': False, + 'help_text': _('Name of the namespace to use when authenticate and retrieve secrets') }, { 'id': 'default_auth_path', 'label': _('Path to Approle Auth'), @@ -137,6 +143,9 @@ def approle_auth(**kwargs): # AppRole Login request_kwargs['json'] = {'role_id': role_id, 'secret_id': secret_id} sess = requests.Session() + # Namespace support + if kwargs.get('namespace'): + sess.headers['X-Vault-Namespace'] = kwargs['namespace'] request_url = '/'.join([url, 'auth', auth_path, 'login']).rstrip('/') with CertFiles(cacert) as cert: request_kwargs['verify'] = cert @@ -164,6 +173,8 @@ def kv_backend(**kwargs): sess.headers['Authorization'] = 'Bearer {}'.format(token) # Compatibility header for older installs of Hashicorp Vault sess.headers['X-Vault-Token'] = token + if kwargs.get('namespace'): + sess.headers['X-Vault-Namespace'] = kwargs['namespace'] if api_version == 'v2': if kwargs.get('secret_version'): @@ -222,6 +233,8 @@ def ssh_backend(**kwargs): sess = requests.Session() sess.headers['Authorization'] = 'Bearer {}'.format(token) + if kwargs.get('namespace'): + sess.headers['X-Vault-Namespace'] = kwargs['namespace'] # Compatability header for older installs of Hashicorp Vault sess.headers['X-Vault-Token'] = token # https://www.vaultproject.io/api/secret/ssh/index.html#sign-ssh-key