pulumi-vault 6.1.0a1712222735__py3-none-any.whl → 6.1.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (184) hide show
  1. pulumi_vault/_inputs.py +0 -20
  2. pulumi_vault/ad/secret_backend.py +2 -6
  3. pulumi_vault/ad/secret_library.py +2 -4
  4. pulumi_vault/ad/secret_role.py +0 -4
  5. pulumi_vault/alicloud/auth_backend_role.py +69 -192
  6. pulumi_vault/approle/auth_backend_login.py +0 -4
  7. pulumi_vault/approle/auth_backend_role.py +63 -186
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
  9. pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
  10. pulumi_vault/audit.py +12 -20
  11. pulumi_vault/audit_request_header.py +6 -6
  12. pulumi_vault/aws/auth_backend_client.py +6 -10
  13. pulumi_vault/aws/auth_backend_config_identity.py +0 -4
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
  15. pulumi_vault/aws/auth_backend_login.py +0 -8
  16. pulumi_vault/aws/auth_backend_role.py +63 -186
  17. pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
  18. pulumi_vault/aws/auth_backend_sts_role.py +0 -4
  19. pulumi_vault/aws/secret_backend.py +63 -0
  20. pulumi_vault/aws/secret_backend_role.py +2 -4
  21. pulumi_vault/aws/secret_backend_static_role.py +2 -4
  22. pulumi_vault/azure/auth_backend_config.py +6 -10
  23. pulumi_vault/azure/auth_backend_role.py +63 -186
  24. pulumi_vault/azure/backend.py +16 -24
  25. pulumi_vault/azure/backend_role.py +14 -18
  26. pulumi_vault/azure/get_access_credentials.py +0 -4
  27. pulumi_vault/cert_auth_backend_role.py +75 -208
  28. pulumi_vault/consul/secret_backend.py +10 -18
  29. pulumi_vault/consul/secret_backend_role.py +2 -4
  30. pulumi_vault/database/_inputs.py +522 -784
  31. pulumi_vault/database/outputs.py +522 -784
  32. pulumi_vault/database/secret_backend_connection.py +2 -4
  33. pulumi_vault/database/secret_backend_role.py +4 -4
  34. pulumi_vault/database/secret_backend_static_role.py +10 -8
  35. pulumi_vault/database/secrets_mount.py +4 -4
  36. pulumi_vault/egp_policy.py +4 -8
  37. pulumi_vault/gcp/auth_backend.py +0 -36
  38. pulumi_vault/gcp/auth_backend_role.py +63 -264
  39. pulumi_vault/gcp/get_auth_backend_role.py +0 -4
  40. pulumi_vault/gcp/secret_backend.py +4 -6
  41. pulumi_vault/gcp/secret_impersonated_account.py +12 -14
  42. pulumi_vault/gcp/secret_roleset.py +4 -6
  43. pulumi_vault/gcp/secret_static_account.py +14 -16
  44. pulumi_vault/generic/endpoint.py +4 -8
  45. pulumi_vault/generic/get_secret.py +40 -4
  46. pulumi_vault/get_auth_backend.py +0 -4
  47. pulumi_vault/get_auth_backends.py +0 -8
  48. pulumi_vault/get_namespace.py +0 -12
  49. pulumi_vault/get_namespaces.py +4 -12
  50. pulumi_vault/get_nomad_access_token.py +0 -4
  51. pulumi_vault/get_policy_document.py +8 -8
  52. pulumi_vault/get_raft_autopilot_state.py +0 -4
  53. pulumi_vault/github/auth_backend.py +0 -4
  54. pulumi_vault/github/team.py +2 -6
  55. pulumi_vault/github/user.py +2 -6
  56. pulumi_vault/identity/entity.py +6 -8
  57. pulumi_vault/identity/entity_alias.py +6 -8
  58. pulumi_vault/identity/entity_policies.py +12 -12
  59. pulumi_vault/identity/get_entity.py +0 -4
  60. pulumi_vault/identity/get_group.py +0 -4
  61. pulumi_vault/identity/get_oidc_client_creds.py +2 -4
  62. pulumi_vault/identity/get_oidc_openid_config.py +10 -6
  63. pulumi_vault/identity/get_oidc_public_keys.py +10 -6
  64. pulumi_vault/identity/group.py +38 -42
  65. pulumi_vault/identity/group_alias.py +2 -4
  66. pulumi_vault/identity/group_member_entity_ids.py +12 -16
  67. pulumi_vault/identity/group_member_group_ids.py +24 -20
  68. pulumi_vault/identity/group_policies.py +4 -8
  69. pulumi_vault/identity/mfa_duo.py +4 -8
  70. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  71. pulumi_vault/identity/mfa_okta.py +4 -8
  72. pulumi_vault/identity/mfa_pingid.py +0 -4
  73. pulumi_vault/identity/mfa_totp.py +0 -4
  74. pulumi_vault/identity/oidc.py +0 -4
  75. pulumi_vault/identity/oidc_assignment.py +10 -6
  76. pulumi_vault/identity/oidc_client.py +10 -10
  77. pulumi_vault/identity/oidc_key.py +16 -12
  78. pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
  79. pulumi_vault/identity/oidc_provider.py +22 -16
  80. pulumi_vault/identity/oidc_role.py +28 -20
  81. pulumi_vault/identity/oidc_scope.py +6 -8
  82. pulumi_vault/jwt/auth_backend.py +20 -32
  83. pulumi_vault/jwt/auth_backend_role.py +63 -190
  84. pulumi_vault/kmip/secret_backend.py +10 -14
  85. pulumi_vault/kmip/secret_role.py +0 -4
  86. pulumi_vault/kmip/secret_scope.py +0 -4
  87. pulumi_vault/kubernetes/auth_backend_config.py +0 -4
  88. pulumi_vault/kubernetes/auth_backend_role.py +56 -172
  89. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  90. pulumi_vault/kubernetes/secret_backend.py +6 -8
  91. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  92. pulumi_vault/kv/get_secret.py +0 -4
  93. pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
  94. pulumi_vault/kv/get_secret_v2.py +58 -0
  95. pulumi_vault/kv/get_secrets_list.py +4 -8
  96. pulumi_vault/kv/get_secrets_list_v2.py +14 -12
  97. pulumi_vault/kv/secret.py +0 -4
  98. pulumi_vault/kv/secret_backend_v2.py +0 -4
  99. pulumi_vault/kv/secret_v2.py +2 -4
  100. pulumi_vault/ldap/auth_backend.py +66 -161
  101. pulumi_vault/ldap/auth_backend_group.py +0 -4
  102. pulumi_vault/ldap/auth_backend_user.py +0 -4
  103. pulumi_vault/ldap/secret_backend.py +4 -8
  104. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
  105. pulumi_vault/ldap/secret_backend_library_set.py +2 -4
  106. pulumi_vault/ldap/secret_backend_static_role.py +0 -4
  107. pulumi_vault/managed/_inputs.py +84 -132
  108. pulumi_vault/managed/keys.py +7 -28
  109. pulumi_vault/managed/outputs.py +84 -132
  110. pulumi_vault/mfa_duo.py +4 -6
  111. pulumi_vault/mfa_okta.py +4 -6
  112. pulumi_vault/mfa_pingid.py +4 -6
  113. pulumi_vault/mfa_totp.py +10 -12
  114. pulumi_vault/mongodbatlas/secret_backend.py +0 -4
  115. pulumi_vault/mongodbatlas/secret_role.py +2 -4
  116. pulumi_vault/mount.py +26 -42
  117. pulumi_vault/nomad_secret_backend.py +4 -8
  118. pulumi_vault/nomad_secret_role.py +0 -4
  119. pulumi_vault/okta/_inputs.py +8 -8
  120. pulumi_vault/okta/auth_backend.py +6 -10
  121. pulumi_vault/okta/auth_backend_group.py +0 -4
  122. pulumi_vault/okta/auth_backend_user.py +0 -4
  123. pulumi_vault/okta/outputs.py +8 -8
  124. pulumi_vault/outputs.py +0 -20
  125. pulumi_vault/password_policy.py +6 -8
  126. pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
  127. pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
  128. pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
  129. pulumi_vault/pkisecret/get_backend_key.py +2 -6
  130. pulumi_vault/pkisecret/get_backend_keys.py +0 -4
  131. pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
  132. pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
  133. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
  134. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
  135. pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
  136. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
  137. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
  138. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
  139. pulumi_vault/pkisecret/secret_backend_role.py +2 -4
  140. pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
  141. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
  142. pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
  143. pulumi_vault/provider.py +0 -8
  144. pulumi_vault/pulumi-plugin.json +2 -1
  145. pulumi_vault/quota_lease_count.py +6 -8
  146. pulumi_vault/quota_rate_limit.py +2 -4
  147. pulumi_vault/rabbitmq/secret_backend.py +4 -8
  148. pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
  149. pulumi_vault/raft_autopilot.py +0 -4
  150. pulumi_vault/raft_snapshot_agent_config.py +109 -304
  151. pulumi_vault/rgp_policy.py +2 -6
  152. pulumi_vault/saml/auth_backend.py +8 -12
  153. pulumi_vault/saml/auth_backend_role.py +64 -178
  154. pulumi_vault/secrets/sync_association.py +12 -10
  155. pulumi_vault/secrets/sync_aws_destination.py +6 -8
  156. pulumi_vault/secrets/sync_azure_destination.py +10 -12
  157. pulumi_vault/secrets/sync_config.py +2 -6
  158. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  159. pulumi_vault/secrets/sync_gh_destination.py +6 -8
  160. pulumi_vault/secrets/sync_github_apps.py +8 -8
  161. pulumi_vault/secrets/sync_vercel_destination.py +6 -8
  162. pulumi_vault/ssh/_inputs.py +6 -32
  163. pulumi_vault/ssh/outputs.py +6 -32
  164. pulumi_vault/ssh/secret_backend_ca.py +0 -4
  165. pulumi_vault/ssh/secret_backend_role.py +4 -4
  166. pulumi_vault/terraformcloud/secret_backend.py +0 -56
  167. pulumi_vault/terraformcloud/secret_creds.py +2 -17
  168. pulumi_vault/terraformcloud/secret_role.py +2 -69
  169. pulumi_vault/token.py +14 -18
  170. pulumi_vault/tokenauth/auth_backend_role.py +64 -180
  171. pulumi_vault/transform/alphabet.py +4 -6
  172. pulumi_vault/transform/get_decode.py +4 -4
  173. pulumi_vault/transform/get_encode.py +4 -4
  174. pulumi_vault/transform/role.py +4 -6
  175. pulumi_vault/transform/template.py +4 -4
  176. pulumi_vault/transit/get_decrypt.py +4 -20
  177. pulumi_vault/transit/get_encrypt.py +0 -14
  178. pulumi_vault/transit/secret_backend_key.py +6 -6
  179. pulumi_vault/transit/secret_cache_config.py +0 -4
  180. {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/METADATA +1 -1
  181. pulumi_vault-6.1.1.dist-info/RECORD +252 -0
  182. pulumi_vault-6.1.0a1712222735.dist-info/RECORD +0 -252
  183. {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/WHEEL +0 -0
  184. {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/top_level.txt +0 -0
@@ -55,6 +55,15 @@ class SecretBackendArgs:
55
55
  not begin or end with a `/`. Defaults to `aws`.
56
56
  :param pulumi.Input[str] region: The AWS region to make API calls against. Defaults to us-east-1.
57
57
  :param pulumi.Input[str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
58
+
59
+ ```
60
+ {{ if (eq .Type "STS") }}
61
+ {{ printf "vault-%s-%s" (unix_time) (random 20) | truncate 32 }}
62
+ {{ else }}
63
+ {{ printf "vault-%s-%s-%s" (printf "%s-%s" (.DisplayName) (.PolicyName) | truncate 42) (unix_time) (random 20) | truncate 64 }}
64
+ {{ end }}
65
+
66
+ ```
58
67
  :param pulumi.Input[str] secret_key: The AWS Secret Access Key to use when generating new credentials.
59
68
  :param pulumi.Input[str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
60
69
  :param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
@@ -263,6 +272,15 @@ class SecretBackendArgs:
263
272
  def role_arn(self) -> Optional[pulumi.Input[str]]:
264
273
  """
265
274
  Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
275
+
276
+ ```
277
+ {{ if (eq .Type "STS") }}
278
+ {{ printf "vault-%s-%s" (unix_time) (random 20) | truncate 32 }}
279
+ {{ else }}
280
+ {{ printf "vault-%s-%s-%s" (printf "%s-%s" (.DisplayName) (.PolicyName) | truncate 42) (unix_time) (random 20) | truncate 64 }}
281
+ {{ end }}
282
+
283
+ ```
266
284
  """
267
285
  return pulumi.get(self, "role_arn")
268
286
 
@@ -351,6 +369,15 @@ class _SecretBackendState:
351
369
  not begin or end with a `/`. Defaults to `aws`.
352
370
  :param pulumi.Input[str] region: The AWS region to make API calls against. Defaults to us-east-1.
353
371
  :param pulumi.Input[str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
372
+
373
+ ```
374
+ {{ if (eq .Type "STS") }}
375
+ {{ printf "vault-%s-%s" (unix_time) (random 20) | truncate 32 }}
376
+ {{ else }}
377
+ {{ printf "vault-%s-%s-%s" (printf "%s-%s" (.DisplayName) (.PolicyName) | truncate 42) (unix_time) (random 20) | truncate 64 }}
378
+ {{ end }}
379
+
380
+ ```
354
381
  :param pulumi.Input[str] secret_key: The AWS Secret Access Key to use when generating new credentials.
355
382
  :param pulumi.Input[str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
356
383
  :param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
@@ -559,6 +586,15 @@ class _SecretBackendState:
559
586
  def role_arn(self) -> Optional[pulumi.Input[str]]:
560
587
  """
561
588
  Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
589
+
590
+ ```
591
+ {{ if (eq .Type "STS") }}
592
+ {{ printf "vault-%s-%s" (unix_time) (random 20) | truncate 32 }}
593
+ {{ else }}
594
+ {{ printf "vault-%s-%s-%s" (printf "%s-%s" (.DisplayName) (.PolicyName) | truncate 42) (unix_time) (random 20) | truncate 64 }}
595
+ {{ end }}
596
+
597
+ ```
562
598
  """
563
599
  return pulumi.get(self, "role_arn")
564
600
 
@@ -659,6 +695,15 @@ class SecretBackend(pulumi.CustomResource):
659
695
  not begin or end with a `/`. Defaults to `aws`.
660
696
  :param pulumi.Input[str] region: The AWS region to make API calls against. Defaults to us-east-1.
661
697
  :param pulumi.Input[str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
698
+
699
+ ```
700
+ {{ if (eq .Type "STS") }}
701
+ {{ printf "vault-%s-%s" (unix_time) (random 20) | truncate 32 }}
702
+ {{ else }}
703
+ {{ printf "vault-%s-%s-%s" (printf "%s-%s" (.DisplayName) (.PolicyName) | truncate 42) (unix_time) (random 20) | truncate 64 }}
704
+ {{ end }}
705
+
706
+ ```
662
707
  :param pulumi.Input[str] secret_key: The AWS Secret Access Key to use when generating new credentials.
663
708
  :param pulumi.Input[str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
664
709
  :param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
@@ -794,6 +839,15 @@ class SecretBackend(pulumi.CustomResource):
794
839
  not begin or end with a `/`. Defaults to `aws`.
795
840
  :param pulumi.Input[str] region: The AWS region to make API calls against. Defaults to us-east-1.
796
841
  :param pulumi.Input[str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
842
+
843
+ ```
844
+ {{ if (eq .Type "STS") }}
845
+ {{ printf "vault-%s-%s" (unix_time) (random 20) | truncate 32 }}
846
+ {{ else }}
847
+ {{ printf "vault-%s-%s-%s" (printf "%s-%s" (.DisplayName) (.PolicyName) | truncate 42) (unix_time) (random 20) | truncate 64 }}
848
+ {{ end }}
849
+
850
+ ```
797
851
  :param pulumi.Input[str] secret_key: The AWS Secret Access Key to use when generating new credentials.
798
852
  :param pulumi.Input[str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
799
853
  :param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
@@ -938,6 +992,15 @@ class SecretBackend(pulumi.CustomResource):
938
992
  def role_arn(self) -> pulumi.Output[Optional[str]]:
939
993
  """
940
994
  Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
995
+
996
+ ```
997
+ {{ if (eq .Type "STS") }}
998
+ {{ printf "vault-%s-%s" (unix_time) (random 20) | truncate 32 }}
999
+ {{ else }}
1000
+ {{ printf "vault-%s-%s-%s" (printf "%s-%s" (.DisplayName) (.PolicyName) | truncate 42) (unix_time) (random 20) | truncate 64 }}
1001
+ {{ end }}
1002
+
1003
+ ```
941
1004
  """
942
1005
  return pulumi.get(self, "role_arn")
943
1006
 
@@ -566,7 +566,6 @@ class SecretBackendRole(pulumi.CustomResource):
566
566
  """
567
567
  ## Example Usage
568
568
 
569
- <!--Start PulumiCodeChooser -->
570
569
  ```python
571
570
  import pulumi
572
571
  import pulumi_vault as vault
@@ -576,6 +575,7 @@ class SecretBackendRole(pulumi.CustomResource):
576
575
  secret_key="AWS secret key")
577
576
  role = vault.aws.SecretBackendRole("role",
578
577
  backend=aws.path,
578
+ name="deploy",
579
579
  credential_type="iam_user",
580
580
  policy_document=\"\"\"{
581
581
  "Version": "2012-10-17",
@@ -589,7 +589,6 @@ class SecretBackendRole(pulumi.CustomResource):
589
589
  }
590
590
  \"\"\")
591
591
  ```
592
- <!--End PulumiCodeChooser -->
593
592
 
594
593
  ## Import
595
594
 
@@ -657,7 +656,6 @@ class SecretBackendRole(pulumi.CustomResource):
657
656
  """
658
657
  ## Example Usage
659
658
 
660
- <!--Start PulumiCodeChooser -->
661
659
  ```python
662
660
  import pulumi
663
661
  import pulumi_vault as vault
@@ -667,6 +665,7 @@ class SecretBackendRole(pulumi.CustomResource):
667
665
  secret_key="AWS secret key")
668
666
  role = vault.aws.SecretBackendRole("role",
669
667
  backend=aws.path,
668
+ name="deploy",
670
669
  credential_type="iam_user",
671
670
  policy_document=\"\"\"{
672
671
  "Version": "2012-10-17",
@@ -680,7 +679,6 @@ class SecretBackendRole(pulumi.CustomResource):
680
679
  }
681
680
  \"\"\")
682
681
  ```
683
- <!--End PulumiCodeChooser -->
684
682
 
685
683
  ## Import
686
684
 
@@ -219,7 +219,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
219
219
  """
220
220
  ## Example Usage
221
221
 
222
- <!--Start PulumiCodeChooser -->
223
222
  ```python
224
223
  import pulumi
225
224
  import pulumi_vault as vault
@@ -229,10 +228,10 @@ class SecretBackendStaticRole(pulumi.CustomResource):
229
228
  description="Obtain AWS credentials.")
230
229
  role = vault.aws.SecretBackendStaticRole("role",
231
230
  backend=aws.path,
231
+ name="test",
232
232
  username="my-test-user",
233
233
  rotation_period=3600)
234
234
  ```
235
- <!--End PulumiCodeChooser -->
236
235
 
237
236
  ## Import
238
237
 
@@ -265,7 +264,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
265
264
  """
266
265
  ## Example Usage
267
266
 
268
- <!--Start PulumiCodeChooser -->
269
267
  ```python
270
268
  import pulumi
271
269
  import pulumi_vault as vault
@@ -275,10 +273,10 @@ class SecretBackendStaticRole(pulumi.CustomResource):
275
273
  description="Obtain AWS credentials.")
276
274
  role = vault.aws.SecretBackendStaticRole("role",
277
275
  backend=aws.path,
276
+ name="test",
278
277
  username="my-test-user",
279
278
  rotation_period=3600)
280
279
  ```
281
- <!--End PulumiCodeChooser -->
282
280
 
283
281
  ## Import
284
282
 
@@ -305,20 +305,18 @@ class AuthBackendConfig(pulumi.CustomResource):
305
305
  """
306
306
  ## Example Usage
307
307
 
308
- <!--Start PulumiCodeChooser -->
309
308
  ```python
310
309
  import pulumi
311
310
  import pulumi_vault as vault
312
311
 
313
- example_auth_backend = vault.AuthBackend("exampleAuthBackend", type="azure")
314
- example_auth_backend_config = vault.azure.AuthBackendConfig("exampleAuthBackendConfig",
315
- backend=example_auth_backend.path,
312
+ example = vault.AuthBackend("example", type="azure")
313
+ example_auth_backend_config = vault.azure.AuthBackendConfig("example",
314
+ backend=example.path,
316
315
  tenant_id="11111111-2222-3333-4444-555555555555",
317
316
  client_id="11111111-2222-3333-4444-555555555555",
318
317
  client_secret="01234567890123456789",
319
318
  resource="https://vault.hashicorp.com")
320
319
  ```
321
- <!--End PulumiCodeChooser -->
322
320
 
323
321
  ## Import
324
322
 
@@ -357,20 +355,18 @@ class AuthBackendConfig(pulumi.CustomResource):
357
355
  """
358
356
  ## Example Usage
359
357
 
360
- <!--Start PulumiCodeChooser -->
361
358
  ```python
362
359
  import pulumi
363
360
  import pulumi_vault as vault
364
361
 
365
- example_auth_backend = vault.AuthBackend("exampleAuthBackend", type="azure")
366
- example_auth_backend_config = vault.azure.AuthBackendConfig("exampleAuthBackendConfig",
367
- backend=example_auth_backend.path,
362
+ example = vault.AuthBackend("example", type="azure")
363
+ example_auth_backend_config = vault.azure.AuthBackendConfig("example",
364
+ backend=example.path,
368
365
  tenant_id="11111111-2222-3333-4444-555555555555",
369
366
  client_id="11111111-2222-3333-4444-555555555555",
370
367
  client_secret="01234567890123456789",
371
368
  resource="https://vault.hashicorp.com")
372
369
  ```
373
- <!--End PulumiCodeChooser -->
374
370
 
375
371
  ## Import
376
372