pulumi-vault 6.1.0a1712222735__py3-none-any.whl → 6.1.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -20
- pulumi_vault/ad/secret_backend.py +2 -6
- pulumi_vault/ad/secret_library.py +2 -4
- pulumi_vault/ad/secret_role.py +0 -4
- pulumi_vault/alicloud/auth_backend_role.py +69 -192
- pulumi_vault/approle/auth_backend_login.py +0 -4
- pulumi_vault/approle/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
- pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
- pulumi_vault/audit.py +12 -20
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/aws/auth_backend_client.py +6 -10
- pulumi_vault/aws/auth_backend_config_identity.py +0 -4
- pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
- pulumi_vault/aws/auth_backend_login.py +0 -8
- pulumi_vault/aws/auth_backend_role.py +63 -186
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
- pulumi_vault/aws/auth_backend_sts_role.py +0 -4
- pulumi_vault/aws/secret_backend.py +63 -0
- pulumi_vault/aws/secret_backend_role.py +2 -4
- pulumi_vault/aws/secret_backend_static_role.py +2 -4
- pulumi_vault/azure/auth_backend_config.py +6 -10
- pulumi_vault/azure/auth_backend_role.py +63 -186
- pulumi_vault/azure/backend.py +16 -24
- pulumi_vault/azure/backend_role.py +14 -18
- pulumi_vault/azure/get_access_credentials.py +0 -4
- pulumi_vault/cert_auth_backend_role.py +75 -208
- pulumi_vault/consul/secret_backend.py +10 -18
- pulumi_vault/consul/secret_backend_role.py +2 -4
- pulumi_vault/database/_inputs.py +522 -784
- pulumi_vault/database/outputs.py +522 -784
- pulumi_vault/database/secret_backend_connection.py +2 -4
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +10 -8
- pulumi_vault/database/secrets_mount.py +4 -4
- pulumi_vault/egp_policy.py +4 -8
- pulumi_vault/gcp/auth_backend.py +0 -36
- pulumi_vault/gcp/auth_backend_role.py +63 -264
- pulumi_vault/gcp/get_auth_backend_role.py +0 -4
- pulumi_vault/gcp/secret_backend.py +4 -6
- pulumi_vault/gcp/secret_impersonated_account.py +12 -14
- pulumi_vault/gcp/secret_roleset.py +4 -6
- pulumi_vault/gcp/secret_static_account.py +14 -16
- pulumi_vault/generic/endpoint.py +4 -8
- pulumi_vault/generic/get_secret.py +40 -4
- pulumi_vault/get_auth_backend.py +0 -4
- pulumi_vault/get_auth_backends.py +0 -8
- pulumi_vault/get_namespace.py +0 -12
- pulumi_vault/get_namespaces.py +4 -12
- pulumi_vault/get_nomad_access_token.py +0 -4
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +0 -4
- pulumi_vault/github/auth_backend.py +0 -4
- pulumi_vault/github/team.py +2 -6
- pulumi_vault/github/user.py +2 -6
- pulumi_vault/identity/entity.py +6 -8
- pulumi_vault/identity/entity_alias.py +6 -8
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +0 -4
- pulumi_vault/identity/get_group.py +0 -4
- pulumi_vault/identity/get_oidc_client_creds.py +2 -4
- pulumi_vault/identity/get_oidc_openid_config.py +10 -6
- pulumi_vault/identity/get_oidc_public_keys.py +10 -6
- pulumi_vault/identity/group.py +38 -42
- pulumi_vault/identity/group_alias.py +2 -4
- pulumi_vault/identity/group_member_entity_ids.py +12 -16
- pulumi_vault/identity/group_member_group_ids.py +24 -20
- pulumi_vault/identity/group_policies.py +4 -8
- pulumi_vault/identity/mfa_duo.py +4 -8
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +4 -8
- pulumi_vault/identity/mfa_pingid.py +0 -4
- pulumi_vault/identity/mfa_totp.py +0 -4
- pulumi_vault/identity/oidc.py +0 -4
- pulumi_vault/identity/oidc_assignment.py +10 -6
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +16 -12
- pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
- pulumi_vault/identity/oidc_provider.py +22 -16
- pulumi_vault/identity/oidc_role.py +28 -20
- pulumi_vault/identity/oidc_scope.py +6 -8
- pulumi_vault/jwt/auth_backend.py +20 -32
- pulumi_vault/jwt/auth_backend_role.py +63 -190
- pulumi_vault/kmip/secret_backend.py +10 -14
- pulumi_vault/kmip/secret_role.py +0 -4
- pulumi_vault/kmip/secret_scope.py +0 -4
- pulumi_vault/kubernetes/auth_backend_config.py +0 -4
- pulumi_vault/kubernetes/auth_backend_role.py +56 -172
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +6 -8
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +0 -4
- pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
- pulumi_vault/kv/get_secret_v2.py +58 -0
- pulumi_vault/kv/get_secrets_list.py +4 -8
- pulumi_vault/kv/get_secrets_list_v2.py +14 -12
- pulumi_vault/kv/secret.py +0 -4
- pulumi_vault/kv/secret_backend_v2.py +0 -4
- pulumi_vault/kv/secret_v2.py +2 -4
- pulumi_vault/ldap/auth_backend.py +66 -161
- pulumi_vault/ldap/auth_backend_group.py +0 -4
- pulumi_vault/ldap/auth_backend_user.py +0 -4
- pulumi_vault/ldap/secret_backend.py +4 -8
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
- pulumi_vault/ldap/secret_backend_library_set.py +2 -4
- pulumi_vault/ldap/secret_backend_static_role.py +0 -4
- pulumi_vault/managed/_inputs.py +84 -132
- pulumi_vault/managed/keys.py +7 -28
- pulumi_vault/managed/outputs.py +84 -132
- pulumi_vault/mfa_duo.py +4 -6
- pulumi_vault/mfa_okta.py +4 -6
- pulumi_vault/mfa_pingid.py +4 -6
- pulumi_vault/mfa_totp.py +10 -12
- pulumi_vault/mongodbatlas/secret_backend.py +0 -4
- pulumi_vault/mongodbatlas/secret_role.py +2 -4
- pulumi_vault/mount.py +26 -42
- pulumi_vault/nomad_secret_backend.py +4 -8
- pulumi_vault/nomad_secret_role.py +0 -4
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +6 -10
- pulumi_vault/okta/auth_backend_group.py +0 -4
- pulumi_vault/okta/auth_backend_user.py +0 -4
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +0 -20
- pulumi_vault/password_policy.py +6 -8
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
- pulumi_vault/pkisecret/get_backend_key.py +2 -6
- pulumi_vault/pkisecret/get_backend_keys.py +0 -4
- pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
- pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
- pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/secret_backend_role.py +2 -4
- pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
- pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
- pulumi_vault/provider.py +0 -8
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +6 -8
- pulumi_vault/quota_rate_limit.py +2 -4
- pulumi_vault/rabbitmq/secret_backend.py +4 -8
- pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
- pulumi_vault/raft_autopilot.py +0 -4
- pulumi_vault/raft_snapshot_agent_config.py +109 -304
- pulumi_vault/rgp_policy.py +2 -6
- pulumi_vault/saml/auth_backend.py +8 -12
- pulumi_vault/saml/auth_backend_role.py +64 -178
- pulumi_vault/secrets/sync_association.py +12 -10
- pulumi_vault/secrets/sync_aws_destination.py +6 -8
- pulumi_vault/secrets/sync_azure_destination.py +10 -12
- pulumi_vault/secrets/sync_config.py +2 -6
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +6 -8
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +6 -8
- pulumi_vault/ssh/_inputs.py +6 -32
- pulumi_vault/ssh/outputs.py +6 -32
- pulumi_vault/ssh/secret_backend_ca.py +0 -4
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +0 -56
- pulumi_vault/terraformcloud/secret_creds.py +2 -17
- pulumi_vault/terraformcloud/secret_role.py +2 -69
- pulumi_vault/token.py +14 -18
- pulumi_vault/tokenauth/auth_backend_role.py +64 -180
- pulumi_vault/transform/alphabet.py +4 -6
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +4 -6
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +4 -20
- pulumi_vault/transit/get_encrypt.py +0 -14
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +0 -4
- {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/METADATA +1 -1
- pulumi_vault-6.1.1.dist-info/RECORD +252 -0
- pulumi_vault-6.1.0a1712222735.dist-info/RECORD +0 -252
- {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/top_level.txt +0 -0
@@ -55,6 +55,15 @@ class SecretBackendArgs:
|
|
55
55
|
not begin or end with a `/`. Defaults to `aws`.
|
56
56
|
:param pulumi.Input[str] region: The AWS region to make API calls against. Defaults to us-east-1.
|
57
57
|
:param pulumi.Input[str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
|
58
|
+
|
59
|
+
```
|
60
|
+
{{ if (eq .Type "STS") }}
|
61
|
+
{{ printf "vault-%s-%s" (unix_time) (random 20) | truncate 32 }}
|
62
|
+
{{ else }}
|
63
|
+
{{ printf "vault-%s-%s-%s" (printf "%s-%s" (.DisplayName) (.PolicyName) | truncate 42) (unix_time) (random 20) | truncate 64 }}
|
64
|
+
{{ end }}
|
65
|
+
|
66
|
+
```
|
58
67
|
:param pulumi.Input[str] secret_key: The AWS Secret Access Key to use when generating new credentials.
|
59
68
|
:param pulumi.Input[str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
|
60
69
|
:param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
|
@@ -263,6 +272,15 @@ class SecretBackendArgs:
|
|
263
272
|
def role_arn(self) -> Optional[pulumi.Input[str]]:
|
264
273
|
"""
|
265
274
|
Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
|
275
|
+
|
276
|
+
```
|
277
|
+
{{ if (eq .Type "STS") }}
|
278
|
+
{{ printf "vault-%s-%s" (unix_time) (random 20) | truncate 32 }}
|
279
|
+
{{ else }}
|
280
|
+
{{ printf "vault-%s-%s-%s" (printf "%s-%s" (.DisplayName) (.PolicyName) | truncate 42) (unix_time) (random 20) | truncate 64 }}
|
281
|
+
{{ end }}
|
282
|
+
|
283
|
+
```
|
266
284
|
"""
|
267
285
|
return pulumi.get(self, "role_arn")
|
268
286
|
|
@@ -351,6 +369,15 @@ class _SecretBackendState:
|
|
351
369
|
not begin or end with a `/`. Defaults to `aws`.
|
352
370
|
:param pulumi.Input[str] region: The AWS region to make API calls against. Defaults to us-east-1.
|
353
371
|
:param pulumi.Input[str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
|
372
|
+
|
373
|
+
```
|
374
|
+
{{ if (eq .Type "STS") }}
|
375
|
+
{{ printf "vault-%s-%s" (unix_time) (random 20) | truncate 32 }}
|
376
|
+
{{ else }}
|
377
|
+
{{ printf "vault-%s-%s-%s" (printf "%s-%s" (.DisplayName) (.PolicyName) | truncate 42) (unix_time) (random 20) | truncate 64 }}
|
378
|
+
{{ end }}
|
379
|
+
|
380
|
+
```
|
354
381
|
:param pulumi.Input[str] secret_key: The AWS Secret Access Key to use when generating new credentials.
|
355
382
|
:param pulumi.Input[str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
|
356
383
|
:param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
|
@@ -559,6 +586,15 @@ class _SecretBackendState:
|
|
559
586
|
def role_arn(self) -> Optional[pulumi.Input[str]]:
|
560
587
|
"""
|
561
588
|
Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
|
589
|
+
|
590
|
+
```
|
591
|
+
{{ if (eq .Type "STS") }}
|
592
|
+
{{ printf "vault-%s-%s" (unix_time) (random 20) | truncate 32 }}
|
593
|
+
{{ else }}
|
594
|
+
{{ printf "vault-%s-%s-%s" (printf "%s-%s" (.DisplayName) (.PolicyName) | truncate 42) (unix_time) (random 20) | truncate 64 }}
|
595
|
+
{{ end }}
|
596
|
+
|
597
|
+
```
|
562
598
|
"""
|
563
599
|
return pulumi.get(self, "role_arn")
|
564
600
|
|
@@ -659,6 +695,15 @@ class SecretBackend(pulumi.CustomResource):
|
|
659
695
|
not begin or end with a `/`. Defaults to `aws`.
|
660
696
|
:param pulumi.Input[str] region: The AWS region to make API calls against. Defaults to us-east-1.
|
661
697
|
:param pulumi.Input[str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
|
698
|
+
|
699
|
+
```
|
700
|
+
{{ if (eq .Type "STS") }}
|
701
|
+
{{ printf "vault-%s-%s" (unix_time) (random 20) | truncate 32 }}
|
702
|
+
{{ else }}
|
703
|
+
{{ printf "vault-%s-%s-%s" (printf "%s-%s" (.DisplayName) (.PolicyName) | truncate 42) (unix_time) (random 20) | truncate 64 }}
|
704
|
+
{{ end }}
|
705
|
+
|
706
|
+
```
|
662
707
|
:param pulumi.Input[str] secret_key: The AWS Secret Access Key to use when generating new credentials.
|
663
708
|
:param pulumi.Input[str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
|
664
709
|
:param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
|
@@ -794,6 +839,15 @@ class SecretBackend(pulumi.CustomResource):
|
|
794
839
|
not begin or end with a `/`. Defaults to `aws`.
|
795
840
|
:param pulumi.Input[str] region: The AWS region to make API calls against. Defaults to us-east-1.
|
796
841
|
:param pulumi.Input[str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
|
842
|
+
|
843
|
+
```
|
844
|
+
{{ if (eq .Type "STS") }}
|
845
|
+
{{ printf "vault-%s-%s" (unix_time) (random 20) | truncate 32 }}
|
846
|
+
{{ else }}
|
847
|
+
{{ printf "vault-%s-%s-%s" (printf "%s-%s" (.DisplayName) (.PolicyName) | truncate 42) (unix_time) (random 20) | truncate 64 }}
|
848
|
+
{{ end }}
|
849
|
+
|
850
|
+
```
|
797
851
|
:param pulumi.Input[str] secret_key: The AWS Secret Access Key to use when generating new credentials.
|
798
852
|
:param pulumi.Input[str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
|
799
853
|
:param pulumi.Input[str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
|
@@ -938,6 +992,15 @@ class SecretBackend(pulumi.CustomResource):
|
|
938
992
|
def role_arn(self) -> pulumi.Output[Optional[str]]:
|
939
993
|
"""
|
940
994
|
Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
|
995
|
+
|
996
|
+
```
|
997
|
+
{{ if (eq .Type "STS") }}
|
998
|
+
{{ printf "vault-%s-%s" (unix_time) (random 20) | truncate 32 }}
|
999
|
+
{{ else }}
|
1000
|
+
{{ printf "vault-%s-%s-%s" (printf "%s-%s" (.DisplayName) (.PolicyName) | truncate 42) (unix_time) (random 20) | truncate 64 }}
|
1001
|
+
{{ end }}
|
1002
|
+
|
1003
|
+
```
|
941
1004
|
"""
|
942
1005
|
return pulumi.get(self, "role_arn")
|
943
1006
|
|
@@ -566,7 +566,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
566
566
|
"""
|
567
567
|
## Example Usage
|
568
568
|
|
569
|
-
<!--Start PulumiCodeChooser -->
|
570
569
|
```python
|
571
570
|
import pulumi
|
572
571
|
import pulumi_vault as vault
|
@@ -576,6 +575,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
576
575
|
secret_key="AWS secret key")
|
577
576
|
role = vault.aws.SecretBackendRole("role",
|
578
577
|
backend=aws.path,
|
578
|
+
name="deploy",
|
579
579
|
credential_type="iam_user",
|
580
580
|
policy_document=\"\"\"{
|
581
581
|
"Version": "2012-10-17",
|
@@ -589,7 +589,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
589
589
|
}
|
590
590
|
\"\"\")
|
591
591
|
```
|
592
|
-
<!--End PulumiCodeChooser -->
|
593
592
|
|
594
593
|
## Import
|
595
594
|
|
@@ -657,7 +656,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
657
656
|
"""
|
658
657
|
## Example Usage
|
659
658
|
|
660
|
-
<!--Start PulumiCodeChooser -->
|
661
659
|
```python
|
662
660
|
import pulumi
|
663
661
|
import pulumi_vault as vault
|
@@ -667,6 +665,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
667
665
|
secret_key="AWS secret key")
|
668
666
|
role = vault.aws.SecretBackendRole("role",
|
669
667
|
backend=aws.path,
|
668
|
+
name="deploy",
|
670
669
|
credential_type="iam_user",
|
671
670
|
policy_document=\"\"\"{
|
672
671
|
"Version": "2012-10-17",
|
@@ -680,7 +679,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
680
679
|
}
|
681
680
|
\"\"\")
|
682
681
|
```
|
683
|
-
<!--End PulumiCodeChooser -->
|
684
682
|
|
685
683
|
## Import
|
686
684
|
|
@@ -219,7 +219,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
219
219
|
"""
|
220
220
|
## Example Usage
|
221
221
|
|
222
|
-
<!--Start PulumiCodeChooser -->
|
223
222
|
```python
|
224
223
|
import pulumi
|
225
224
|
import pulumi_vault as vault
|
@@ -229,10 +228,10 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
229
228
|
description="Obtain AWS credentials.")
|
230
229
|
role = vault.aws.SecretBackendStaticRole("role",
|
231
230
|
backend=aws.path,
|
231
|
+
name="test",
|
232
232
|
username="my-test-user",
|
233
233
|
rotation_period=3600)
|
234
234
|
```
|
235
|
-
<!--End PulumiCodeChooser -->
|
236
235
|
|
237
236
|
## Import
|
238
237
|
|
@@ -265,7 +264,6 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
265
264
|
"""
|
266
265
|
## Example Usage
|
267
266
|
|
268
|
-
<!--Start PulumiCodeChooser -->
|
269
267
|
```python
|
270
268
|
import pulumi
|
271
269
|
import pulumi_vault as vault
|
@@ -275,10 +273,10 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
275
273
|
description="Obtain AWS credentials.")
|
276
274
|
role = vault.aws.SecretBackendStaticRole("role",
|
277
275
|
backend=aws.path,
|
276
|
+
name="test",
|
278
277
|
username="my-test-user",
|
279
278
|
rotation_period=3600)
|
280
279
|
```
|
281
|
-
<!--End PulumiCodeChooser -->
|
282
280
|
|
283
281
|
## Import
|
284
282
|
|
@@ -305,20 +305,18 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
305
305
|
"""
|
306
306
|
## Example Usage
|
307
307
|
|
308
|
-
<!--Start PulumiCodeChooser -->
|
309
308
|
```python
|
310
309
|
import pulumi
|
311
310
|
import pulumi_vault as vault
|
312
311
|
|
313
|
-
|
314
|
-
example_auth_backend_config = vault.azure.AuthBackendConfig("
|
315
|
-
backend=
|
312
|
+
example = vault.AuthBackend("example", type="azure")
|
313
|
+
example_auth_backend_config = vault.azure.AuthBackendConfig("example",
|
314
|
+
backend=example.path,
|
316
315
|
tenant_id="11111111-2222-3333-4444-555555555555",
|
317
316
|
client_id="11111111-2222-3333-4444-555555555555",
|
318
317
|
client_secret="01234567890123456789",
|
319
318
|
resource="https://vault.hashicorp.com")
|
320
319
|
```
|
321
|
-
<!--End PulumiCodeChooser -->
|
322
320
|
|
323
321
|
## Import
|
324
322
|
|
@@ -357,20 +355,18 @@ class AuthBackendConfig(pulumi.CustomResource):
|
|
357
355
|
"""
|
358
356
|
## Example Usage
|
359
357
|
|
360
|
-
<!--Start PulumiCodeChooser -->
|
361
358
|
```python
|
362
359
|
import pulumi
|
363
360
|
import pulumi_vault as vault
|
364
361
|
|
365
|
-
|
366
|
-
example_auth_backend_config = vault.azure.AuthBackendConfig("
|
367
|
-
backend=
|
362
|
+
example = vault.AuthBackend("example", type="azure")
|
363
|
+
example_auth_backend_config = vault.azure.AuthBackendConfig("example",
|
364
|
+
backend=example.path,
|
368
365
|
tenant_id="11111111-2222-3333-4444-555555555555",
|
369
366
|
client_id="11111111-2222-3333-4444-555555555555",
|
370
367
|
client_secret="01234567890123456789",
|
371
368
|
resource="https://vault.hashicorp.com")
|
372
369
|
```
|
373
|
-
<!--End PulumiCodeChooser -->
|
374
370
|
|
375
371
|
## Import
|
376
372
|
|