pulumi-vault 6.1.0a1712233015__py3-none-any.whl → 6.1.1a1717550614__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (184) hide show
  1. pulumi_vault/_inputs.py +0 -20
  2. pulumi_vault/ad/secret_backend.py +2 -6
  3. pulumi_vault/ad/secret_library.py +2 -4
  4. pulumi_vault/ad/secret_role.py +0 -4
  5. pulumi_vault/alicloud/auth_backend_role.py +69 -192
  6. pulumi_vault/approle/auth_backend_login.py +0 -4
  7. pulumi_vault/approle/auth_backend_role.py +63 -186
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
  9. pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
  10. pulumi_vault/audit.py +12 -20
  11. pulumi_vault/audit_request_header.py +6 -6
  12. pulumi_vault/aws/auth_backend_client.py +6 -10
  13. pulumi_vault/aws/auth_backend_config_identity.py +0 -4
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
  15. pulumi_vault/aws/auth_backend_login.py +0 -8
  16. pulumi_vault/aws/auth_backend_role.py +63 -186
  17. pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
  18. pulumi_vault/aws/auth_backend_sts_role.py +0 -4
  19. pulumi_vault/aws/secret_backend.py +63 -0
  20. pulumi_vault/aws/secret_backend_role.py +2 -4
  21. pulumi_vault/aws/secret_backend_static_role.py +2 -4
  22. pulumi_vault/azure/auth_backend_config.py +6 -10
  23. pulumi_vault/azure/auth_backend_role.py +63 -186
  24. pulumi_vault/azure/backend.py +16 -24
  25. pulumi_vault/azure/backend_role.py +14 -18
  26. pulumi_vault/azure/get_access_credentials.py +0 -4
  27. pulumi_vault/cert_auth_backend_role.py +75 -208
  28. pulumi_vault/consul/secret_backend.py +10 -18
  29. pulumi_vault/consul/secret_backend_role.py +2 -4
  30. pulumi_vault/database/_inputs.py +522 -784
  31. pulumi_vault/database/outputs.py +522 -784
  32. pulumi_vault/database/secret_backend_connection.py +2 -4
  33. pulumi_vault/database/secret_backend_role.py +4 -4
  34. pulumi_vault/database/secret_backend_static_role.py +10 -8
  35. pulumi_vault/database/secrets_mount.py +4 -4
  36. pulumi_vault/egp_policy.py +4 -8
  37. pulumi_vault/gcp/auth_backend.py +0 -36
  38. pulumi_vault/gcp/auth_backend_role.py +63 -264
  39. pulumi_vault/gcp/get_auth_backend_role.py +0 -4
  40. pulumi_vault/gcp/secret_backend.py +4 -6
  41. pulumi_vault/gcp/secret_impersonated_account.py +12 -14
  42. pulumi_vault/gcp/secret_roleset.py +4 -6
  43. pulumi_vault/gcp/secret_static_account.py +14 -16
  44. pulumi_vault/generic/endpoint.py +4 -8
  45. pulumi_vault/generic/get_secret.py +40 -4
  46. pulumi_vault/get_auth_backend.py +0 -4
  47. pulumi_vault/get_auth_backends.py +0 -8
  48. pulumi_vault/get_namespace.py +0 -12
  49. pulumi_vault/get_namespaces.py +4 -12
  50. pulumi_vault/get_nomad_access_token.py +0 -4
  51. pulumi_vault/get_policy_document.py +8 -8
  52. pulumi_vault/get_raft_autopilot_state.py +0 -4
  53. pulumi_vault/github/auth_backend.py +0 -4
  54. pulumi_vault/github/team.py +2 -6
  55. pulumi_vault/github/user.py +2 -6
  56. pulumi_vault/identity/entity.py +6 -8
  57. pulumi_vault/identity/entity_alias.py +6 -8
  58. pulumi_vault/identity/entity_policies.py +12 -12
  59. pulumi_vault/identity/get_entity.py +0 -4
  60. pulumi_vault/identity/get_group.py +0 -4
  61. pulumi_vault/identity/get_oidc_client_creds.py +2 -4
  62. pulumi_vault/identity/get_oidc_openid_config.py +10 -6
  63. pulumi_vault/identity/get_oidc_public_keys.py +10 -6
  64. pulumi_vault/identity/group.py +38 -42
  65. pulumi_vault/identity/group_alias.py +2 -4
  66. pulumi_vault/identity/group_member_entity_ids.py +12 -16
  67. pulumi_vault/identity/group_member_group_ids.py +24 -20
  68. pulumi_vault/identity/group_policies.py +4 -8
  69. pulumi_vault/identity/mfa_duo.py +4 -8
  70. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  71. pulumi_vault/identity/mfa_okta.py +4 -8
  72. pulumi_vault/identity/mfa_pingid.py +0 -4
  73. pulumi_vault/identity/mfa_totp.py +0 -4
  74. pulumi_vault/identity/oidc.py +0 -4
  75. pulumi_vault/identity/oidc_assignment.py +10 -6
  76. pulumi_vault/identity/oidc_client.py +10 -10
  77. pulumi_vault/identity/oidc_key.py +16 -12
  78. pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
  79. pulumi_vault/identity/oidc_provider.py +22 -16
  80. pulumi_vault/identity/oidc_role.py +28 -20
  81. pulumi_vault/identity/oidc_scope.py +6 -8
  82. pulumi_vault/jwt/auth_backend.py +20 -32
  83. pulumi_vault/jwt/auth_backend_role.py +63 -190
  84. pulumi_vault/kmip/secret_backend.py +10 -14
  85. pulumi_vault/kmip/secret_role.py +0 -4
  86. pulumi_vault/kmip/secret_scope.py +0 -4
  87. pulumi_vault/kubernetes/auth_backend_config.py +0 -4
  88. pulumi_vault/kubernetes/auth_backend_role.py +56 -172
  89. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  90. pulumi_vault/kubernetes/secret_backend.py +6 -8
  91. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  92. pulumi_vault/kv/get_secret.py +0 -4
  93. pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
  94. pulumi_vault/kv/get_secret_v2.py +58 -0
  95. pulumi_vault/kv/get_secrets_list.py +4 -8
  96. pulumi_vault/kv/get_secrets_list_v2.py +14 -12
  97. pulumi_vault/kv/secret.py +0 -4
  98. pulumi_vault/kv/secret_backend_v2.py +0 -4
  99. pulumi_vault/kv/secret_v2.py +2 -4
  100. pulumi_vault/ldap/auth_backend.py +66 -161
  101. pulumi_vault/ldap/auth_backend_group.py +0 -4
  102. pulumi_vault/ldap/auth_backend_user.py +0 -4
  103. pulumi_vault/ldap/secret_backend.py +4 -8
  104. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
  105. pulumi_vault/ldap/secret_backend_library_set.py +2 -4
  106. pulumi_vault/ldap/secret_backend_static_role.py +0 -4
  107. pulumi_vault/managed/_inputs.py +84 -132
  108. pulumi_vault/managed/keys.py +7 -28
  109. pulumi_vault/managed/outputs.py +84 -132
  110. pulumi_vault/mfa_duo.py +4 -6
  111. pulumi_vault/mfa_okta.py +4 -6
  112. pulumi_vault/mfa_pingid.py +4 -6
  113. pulumi_vault/mfa_totp.py +10 -12
  114. pulumi_vault/mongodbatlas/secret_backend.py +0 -4
  115. pulumi_vault/mongodbatlas/secret_role.py +2 -4
  116. pulumi_vault/mount.py +26 -42
  117. pulumi_vault/nomad_secret_backend.py +4 -8
  118. pulumi_vault/nomad_secret_role.py +0 -4
  119. pulumi_vault/okta/_inputs.py +8 -8
  120. pulumi_vault/okta/auth_backend.py +6 -10
  121. pulumi_vault/okta/auth_backend_group.py +0 -4
  122. pulumi_vault/okta/auth_backend_user.py +0 -4
  123. pulumi_vault/okta/outputs.py +8 -8
  124. pulumi_vault/outputs.py +0 -20
  125. pulumi_vault/password_policy.py +6 -8
  126. pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
  127. pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
  128. pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
  129. pulumi_vault/pkisecret/get_backend_key.py +2 -6
  130. pulumi_vault/pkisecret/get_backend_keys.py +0 -4
  131. pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
  132. pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
  133. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
  134. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
  135. pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
  136. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
  137. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
  138. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
  139. pulumi_vault/pkisecret/secret_backend_role.py +2 -4
  140. pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
  141. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
  142. pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
  143. pulumi_vault/provider.py +0 -8
  144. pulumi_vault/pulumi-plugin.json +2 -1
  145. pulumi_vault/quota_lease_count.py +6 -8
  146. pulumi_vault/quota_rate_limit.py +2 -4
  147. pulumi_vault/rabbitmq/secret_backend.py +4 -8
  148. pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
  149. pulumi_vault/raft_autopilot.py +0 -4
  150. pulumi_vault/raft_snapshot_agent_config.py +109 -304
  151. pulumi_vault/rgp_policy.py +2 -6
  152. pulumi_vault/saml/auth_backend.py +8 -12
  153. pulumi_vault/saml/auth_backend_role.py +64 -178
  154. pulumi_vault/secrets/sync_association.py +12 -10
  155. pulumi_vault/secrets/sync_aws_destination.py +6 -8
  156. pulumi_vault/secrets/sync_azure_destination.py +10 -12
  157. pulumi_vault/secrets/sync_config.py +2 -6
  158. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  159. pulumi_vault/secrets/sync_gh_destination.py +6 -8
  160. pulumi_vault/secrets/sync_github_apps.py +8 -8
  161. pulumi_vault/secrets/sync_vercel_destination.py +6 -8
  162. pulumi_vault/ssh/_inputs.py +6 -32
  163. pulumi_vault/ssh/outputs.py +6 -32
  164. pulumi_vault/ssh/secret_backend_ca.py +0 -4
  165. pulumi_vault/ssh/secret_backend_role.py +4 -4
  166. pulumi_vault/terraformcloud/secret_backend.py +0 -56
  167. pulumi_vault/terraformcloud/secret_creds.py +2 -17
  168. pulumi_vault/terraformcloud/secret_role.py +2 -69
  169. pulumi_vault/token.py +14 -18
  170. pulumi_vault/tokenauth/auth_backend_role.py +64 -180
  171. pulumi_vault/transform/alphabet.py +4 -6
  172. pulumi_vault/transform/get_decode.py +4 -4
  173. pulumi_vault/transform/get_encode.py +4 -4
  174. pulumi_vault/transform/role.py +4 -6
  175. pulumi_vault/transform/template.py +4 -4
  176. pulumi_vault/transit/get_decrypt.py +4 -20
  177. pulumi_vault/transit/get_encrypt.py +0 -14
  178. pulumi_vault/transit/secret_backend_key.py +6 -6
  179. pulumi_vault/transit/secret_cache_config.py +0 -4
  180. {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1a1717550614.dist-info}/METADATA +1 -1
  181. pulumi_vault-6.1.1a1717550614.dist-info/RECORD +252 -0
  182. pulumi_vault-6.1.0a1712233015.dist-info/RECORD +0 -252
  183. {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1a1717550614.dist-info}/WHEEL +0 -0
  184. {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1a1717550614.dist-info}/top_level.txt +0 -0
@@ -78,27 +78,14 @@ class AuthBackendArgs:
78
78
  :param pulumi.Input[bool] starttls: Control use of TLS when conecting to LDAP
79
79
  :param pulumi.Input[str] tls_max_version: Maximum acceptable version of TLS
80
80
  :param pulumi.Input[str] tls_min_version: Minimum acceptable version of TLS
81
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
82
- addresses which can authenticate successfully, and ties the resulting token to these blocks
83
- as well.
84
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
85
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
86
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
87
- `token_max_ttl` would otherwise allow a renewal.
88
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
89
- Its current value will be referenced at renewal time.
90
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
91
- generated tokens; otherwise it will be added to the policies set in token_policies.
92
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/ldap#token_num_uses)
93
- of times a generated token may be used (within its lifetime); 0 means unlimited.
94
- :param pulumi.Input[int] token_period: If set, indicates that the
95
- token generated using this role should never expire. The token should be renewed within the
96
- duration specified by this value. At each renewal, the token's TTL will be set to the
97
- value of this field. Specified in seconds.
98
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
99
- on the auth method, this list may be supplemented by user/group/other values.
100
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
101
- Its current value will be referenced at renewal time.
81
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
82
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
83
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
84
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
85
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
86
+ :param pulumi.Input[int] token_period: Generated Token's Period
87
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
88
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
102
89
  :param pulumi.Input[str] token_type: The type of token to generate, service or batch
103
90
  :param pulumi.Input[str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
104
91
  :param pulumi.Input[bool] use_token_groups: Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
@@ -448,9 +435,7 @@ class AuthBackendArgs:
448
435
  @pulumi.getter(name="tokenBoundCidrs")
449
436
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
450
437
  """
451
- List of CIDR blocks; if set, specifies blocks of IP
452
- addresses which can authenticate successfully, and ties the resulting token to these blocks
453
- as well.
438
+ Specifies the blocks of IP addresses which are allowed to use the generated token
454
439
  """
455
440
  return pulumi.get(self, "token_bound_cidrs")
456
441
 
@@ -462,10 +447,7 @@ class AuthBackendArgs:
462
447
  @pulumi.getter(name="tokenExplicitMaxTtl")
463
448
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
464
449
  """
465
- If set, will encode an
466
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
467
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
468
- `token_max_ttl` would otherwise allow a renewal.
450
+ Generated Token's Explicit Maximum TTL in seconds
469
451
  """
470
452
  return pulumi.get(self, "token_explicit_max_ttl")
471
453
 
@@ -477,8 +459,7 @@ class AuthBackendArgs:
477
459
  @pulumi.getter(name="tokenMaxTtl")
478
460
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
479
461
  """
480
- The maximum lifetime for generated tokens in number of seconds.
481
- Its current value will be referenced at renewal time.
462
+ The maximum lifetime of the generated token
482
463
  """
483
464
  return pulumi.get(self, "token_max_ttl")
484
465
 
@@ -490,8 +471,7 @@ class AuthBackendArgs:
490
471
  @pulumi.getter(name="tokenNoDefaultPolicy")
491
472
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
492
473
  """
493
- If set, the default policy will not be set on
494
- generated tokens; otherwise it will be added to the policies set in token_policies.
474
+ If true, the 'default' policy will not automatically be added to generated tokens
495
475
  """
496
476
  return pulumi.get(self, "token_no_default_policy")
497
477
 
@@ -503,8 +483,7 @@ class AuthBackendArgs:
503
483
  @pulumi.getter(name="tokenNumUses")
504
484
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
505
485
  """
506
- The [maximum number](https://www.vaultproject.io/api-docs/ldap#token_num_uses)
507
- of times a generated token may be used (within its lifetime); 0 means unlimited.
486
+ The maximum number of times a token may be used, a value of zero means unlimited
508
487
  """
509
488
  return pulumi.get(self, "token_num_uses")
510
489
 
@@ -516,10 +495,7 @@ class AuthBackendArgs:
516
495
  @pulumi.getter(name="tokenPeriod")
517
496
  def token_period(self) -> Optional[pulumi.Input[int]]:
518
497
  """
519
- If set, indicates that the
520
- token generated using this role should never expire. The token should be renewed within the
521
- duration specified by this value. At each renewal, the token's TTL will be set to the
522
- value of this field. Specified in seconds.
498
+ Generated Token's Period
523
499
  """
524
500
  return pulumi.get(self, "token_period")
525
501
 
@@ -531,8 +507,7 @@ class AuthBackendArgs:
531
507
  @pulumi.getter(name="tokenPolicies")
532
508
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
533
509
  """
534
- List of policies to encode onto generated tokens. Depending
535
- on the auth method, this list may be supplemented by user/group/other values.
510
+ Generated Token's Policies
536
511
  """
537
512
  return pulumi.get(self, "token_policies")
538
513
 
@@ -544,8 +519,7 @@ class AuthBackendArgs:
544
519
  @pulumi.getter(name="tokenTtl")
545
520
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
546
521
  """
547
- The incremental lifetime for generated tokens in number of seconds.
548
- Its current value will be referenced at renewal time.
522
+ The initial ttl of the token to generate in seconds
549
523
  """
550
524
  return pulumi.get(self, "token_ttl")
551
525
 
@@ -706,27 +680,14 @@ class _AuthBackendState:
706
680
  :param pulumi.Input[bool] starttls: Control use of TLS when conecting to LDAP
707
681
  :param pulumi.Input[str] tls_max_version: Maximum acceptable version of TLS
708
682
  :param pulumi.Input[str] tls_min_version: Minimum acceptable version of TLS
709
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
710
- addresses which can authenticate successfully, and ties the resulting token to these blocks
711
- as well.
712
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
713
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
714
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
715
- `token_max_ttl` would otherwise allow a renewal.
716
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
717
- Its current value will be referenced at renewal time.
718
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
719
- generated tokens; otherwise it will be added to the policies set in token_policies.
720
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/ldap#token_num_uses)
721
- of times a generated token may be used (within its lifetime); 0 means unlimited.
722
- :param pulumi.Input[int] token_period: If set, indicates that the
723
- token generated using this role should never expire. The token should be renewed within the
724
- duration specified by this value. At each renewal, the token's TTL will be set to the
725
- value of this field. Specified in seconds.
726
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
727
- on the auth method, this list may be supplemented by user/group/other values.
728
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
729
- Its current value will be referenced at renewal time.
683
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
684
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
685
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
686
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
687
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
688
+ :param pulumi.Input[int] token_period: Generated Token's Period
689
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
690
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
730
691
  :param pulumi.Input[str] token_type: The type of token to generate, service or batch
731
692
  :param pulumi.Input[str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
732
693
  :param pulumi.Input[str] url: The URL of the LDAP server
@@ -1080,9 +1041,7 @@ class _AuthBackendState:
1080
1041
  @pulumi.getter(name="tokenBoundCidrs")
1081
1042
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
1082
1043
  """
1083
- List of CIDR blocks; if set, specifies blocks of IP
1084
- addresses which can authenticate successfully, and ties the resulting token to these blocks
1085
- as well.
1044
+ Specifies the blocks of IP addresses which are allowed to use the generated token
1086
1045
  """
1087
1046
  return pulumi.get(self, "token_bound_cidrs")
1088
1047
 
@@ -1094,10 +1053,7 @@ class _AuthBackendState:
1094
1053
  @pulumi.getter(name="tokenExplicitMaxTtl")
1095
1054
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
1096
1055
  """
1097
- If set, will encode an
1098
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1099
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1100
- `token_max_ttl` would otherwise allow a renewal.
1056
+ Generated Token's Explicit Maximum TTL in seconds
1101
1057
  """
1102
1058
  return pulumi.get(self, "token_explicit_max_ttl")
1103
1059
 
@@ -1109,8 +1065,7 @@ class _AuthBackendState:
1109
1065
  @pulumi.getter(name="tokenMaxTtl")
1110
1066
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
1111
1067
  """
1112
- The maximum lifetime for generated tokens in number of seconds.
1113
- Its current value will be referenced at renewal time.
1068
+ The maximum lifetime of the generated token
1114
1069
  """
1115
1070
  return pulumi.get(self, "token_max_ttl")
1116
1071
 
@@ -1122,8 +1077,7 @@ class _AuthBackendState:
1122
1077
  @pulumi.getter(name="tokenNoDefaultPolicy")
1123
1078
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
1124
1079
  """
1125
- If set, the default policy will not be set on
1126
- generated tokens; otherwise it will be added to the policies set in token_policies.
1080
+ If true, the 'default' policy will not automatically be added to generated tokens
1127
1081
  """
1128
1082
  return pulumi.get(self, "token_no_default_policy")
1129
1083
 
@@ -1135,8 +1089,7 @@ class _AuthBackendState:
1135
1089
  @pulumi.getter(name="tokenNumUses")
1136
1090
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
1137
1091
  """
1138
- The [maximum number](https://www.vaultproject.io/api-docs/ldap#token_num_uses)
1139
- of times a generated token may be used (within its lifetime); 0 means unlimited.
1092
+ The maximum number of times a token may be used, a value of zero means unlimited
1140
1093
  """
1141
1094
  return pulumi.get(self, "token_num_uses")
1142
1095
 
@@ -1148,10 +1101,7 @@ class _AuthBackendState:
1148
1101
  @pulumi.getter(name="tokenPeriod")
1149
1102
  def token_period(self) -> Optional[pulumi.Input[int]]:
1150
1103
  """
1151
- If set, indicates that the
1152
- token generated using this role should never expire. The token should be renewed within the
1153
- duration specified by this value. At each renewal, the token's TTL will be set to the
1154
- value of this field. Specified in seconds.
1104
+ Generated Token's Period
1155
1105
  """
1156
1106
  return pulumi.get(self, "token_period")
1157
1107
 
@@ -1163,8 +1113,7 @@ class _AuthBackendState:
1163
1113
  @pulumi.getter(name="tokenPolicies")
1164
1114
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
1165
1115
  """
1166
- List of policies to encode onto generated tokens. Depending
1167
- on the auth method, this list may be supplemented by user/group/other values.
1116
+ Generated Token's Policies
1168
1117
  """
1169
1118
  return pulumi.get(self, "token_policies")
1170
1119
 
@@ -1176,8 +1125,7 @@ class _AuthBackendState:
1176
1125
  @pulumi.getter(name="tokenTtl")
1177
1126
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
1178
1127
  """
1179
- The incremental lifetime for generated tokens in number of seconds.
1180
- Its current value will be referenced at renewal time.
1128
+ The initial ttl of the token to generate in seconds
1181
1129
  """
1182
1130
  return pulumi.get(self, "token_ttl")
1183
1131
 
@@ -1330,22 +1278,20 @@ class AuthBackend(pulumi.CustomResource):
1330
1278
 
1331
1279
  ## Example Usage
1332
1280
 
1333
- <!--Start PulumiCodeChooser -->
1334
1281
  ```python
1335
1282
  import pulumi
1336
1283
  import pulumi_vault as vault
1337
1284
 
1338
1285
  ldap = vault.ldap.AuthBackend("ldap",
1339
- discoverdn=False,
1340
- groupdn="OU=Groups,DC=example,DC=org",
1341
- groupfilter="(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}}))",
1342
1286
  path="ldap",
1343
- upndomain="EXAMPLE.ORG",
1344
1287
  url="ldaps://dc-01.example.org",
1288
+ userdn="OU=Users,OU=Accounts,DC=example,DC=org",
1345
1289
  userattr="sAMAccountName",
1346
- userdn="OU=Users,OU=Accounts,DC=example,DC=org")
1290
+ upndomain="EXAMPLE.ORG",
1291
+ discoverdn=False,
1292
+ groupdn="OU=Groups,DC=example,DC=org",
1293
+ groupfilter="(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}}))")
1347
1294
  ```
1348
- <!--End PulumiCodeChooser -->
1349
1295
 
1350
1296
  ## Import
1351
1297
 
@@ -1381,27 +1327,14 @@ class AuthBackend(pulumi.CustomResource):
1381
1327
  :param pulumi.Input[bool] starttls: Control use of TLS when conecting to LDAP
1382
1328
  :param pulumi.Input[str] tls_max_version: Maximum acceptable version of TLS
1383
1329
  :param pulumi.Input[str] tls_min_version: Minimum acceptable version of TLS
1384
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
1385
- addresses which can authenticate successfully, and ties the resulting token to these blocks
1386
- as well.
1387
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
1388
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1389
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1390
- `token_max_ttl` would otherwise allow a renewal.
1391
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
1392
- Its current value will be referenced at renewal time.
1393
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
1394
- generated tokens; otherwise it will be added to the policies set in token_policies.
1395
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/ldap#token_num_uses)
1396
- of times a generated token may be used (within its lifetime); 0 means unlimited.
1397
- :param pulumi.Input[int] token_period: If set, indicates that the
1398
- token generated using this role should never expire. The token should be renewed within the
1399
- duration specified by this value. At each renewal, the token's TTL will be set to the
1400
- value of this field. Specified in seconds.
1401
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
1402
- on the auth method, this list may be supplemented by user/group/other values.
1403
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
1404
- Its current value will be referenced at renewal time.
1330
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
1331
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
1332
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
1333
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
1334
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
1335
+ :param pulumi.Input[int] token_period: Generated Token's Period
1336
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
1337
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
1405
1338
  :param pulumi.Input[str] token_type: The type of token to generate, service or batch
1406
1339
  :param pulumi.Input[str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
1407
1340
  :param pulumi.Input[str] url: The URL of the LDAP server
@@ -1422,22 +1355,20 @@ class AuthBackend(pulumi.CustomResource):
1422
1355
 
1423
1356
  ## Example Usage
1424
1357
 
1425
- <!--Start PulumiCodeChooser -->
1426
1358
  ```python
1427
1359
  import pulumi
1428
1360
  import pulumi_vault as vault
1429
1361
 
1430
1362
  ldap = vault.ldap.AuthBackend("ldap",
1431
- discoverdn=False,
1432
- groupdn="OU=Groups,DC=example,DC=org",
1433
- groupfilter="(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}}))",
1434
1363
  path="ldap",
1435
- upndomain="EXAMPLE.ORG",
1436
1364
  url="ldaps://dc-01.example.org",
1365
+ userdn="OU=Users,OU=Accounts,DC=example,DC=org",
1437
1366
  userattr="sAMAccountName",
1438
- userdn="OU=Users,OU=Accounts,DC=example,DC=org")
1367
+ upndomain="EXAMPLE.ORG",
1368
+ discoverdn=False,
1369
+ groupdn="OU=Groups,DC=example,DC=org",
1370
+ groupfilter="(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}}))")
1439
1371
  ```
1440
- <!--End PulumiCodeChooser -->
1441
1372
 
1442
1373
  ## Import
1443
1374
 
@@ -1630,27 +1561,14 @@ class AuthBackend(pulumi.CustomResource):
1630
1561
  :param pulumi.Input[bool] starttls: Control use of TLS when conecting to LDAP
1631
1562
  :param pulumi.Input[str] tls_max_version: Maximum acceptable version of TLS
1632
1563
  :param pulumi.Input[str] tls_min_version: Minimum acceptable version of TLS
1633
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
1634
- addresses which can authenticate successfully, and ties the resulting token to these blocks
1635
- as well.
1636
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
1637
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1638
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1639
- `token_max_ttl` would otherwise allow a renewal.
1640
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
1641
- Its current value will be referenced at renewal time.
1642
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
1643
- generated tokens; otherwise it will be added to the policies set in token_policies.
1644
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/ldap#token_num_uses)
1645
- of times a generated token may be used (within its lifetime); 0 means unlimited.
1646
- :param pulumi.Input[int] token_period: If set, indicates that the
1647
- token generated using this role should never expire. The token should be renewed within the
1648
- duration specified by this value. At each renewal, the token's TTL will be set to the
1649
- value of this field. Specified in seconds.
1650
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
1651
- on the auth method, this list may be supplemented by user/group/other values.
1652
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
1653
- Its current value will be referenced at renewal time.
1564
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
1565
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
1566
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
1567
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
1568
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
1569
+ :param pulumi.Input[int] token_period: Generated Token's Period
1570
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
1571
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
1654
1572
  :param pulumi.Input[str] token_type: The type of token to generate, service or batch
1655
1573
  :param pulumi.Input[str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
1656
1574
  :param pulumi.Input[str] url: The URL of the LDAP server
@@ -1883,9 +1801,7 @@ class AuthBackend(pulumi.CustomResource):
1883
1801
  @pulumi.getter(name="tokenBoundCidrs")
1884
1802
  def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
1885
1803
  """
1886
- List of CIDR blocks; if set, specifies blocks of IP
1887
- addresses which can authenticate successfully, and ties the resulting token to these blocks
1888
- as well.
1804
+ Specifies the blocks of IP addresses which are allowed to use the generated token
1889
1805
  """
1890
1806
  return pulumi.get(self, "token_bound_cidrs")
1891
1807
 
@@ -1893,10 +1809,7 @@ class AuthBackend(pulumi.CustomResource):
1893
1809
  @pulumi.getter(name="tokenExplicitMaxTtl")
1894
1810
  def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
1895
1811
  """
1896
- If set, will encode an
1897
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1898
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1899
- `token_max_ttl` would otherwise allow a renewal.
1812
+ Generated Token's Explicit Maximum TTL in seconds
1900
1813
  """
1901
1814
  return pulumi.get(self, "token_explicit_max_ttl")
1902
1815
 
@@ -1904,8 +1817,7 @@ class AuthBackend(pulumi.CustomResource):
1904
1817
  @pulumi.getter(name="tokenMaxTtl")
1905
1818
  def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
1906
1819
  """
1907
- The maximum lifetime for generated tokens in number of seconds.
1908
- Its current value will be referenced at renewal time.
1820
+ The maximum lifetime of the generated token
1909
1821
  """
1910
1822
  return pulumi.get(self, "token_max_ttl")
1911
1823
 
@@ -1913,8 +1825,7 @@ class AuthBackend(pulumi.CustomResource):
1913
1825
  @pulumi.getter(name="tokenNoDefaultPolicy")
1914
1826
  def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
1915
1827
  """
1916
- If set, the default policy will not be set on
1917
- generated tokens; otherwise it will be added to the policies set in token_policies.
1828
+ If true, the 'default' policy will not automatically be added to generated tokens
1918
1829
  """
1919
1830
  return pulumi.get(self, "token_no_default_policy")
1920
1831
 
@@ -1922,8 +1833,7 @@ class AuthBackend(pulumi.CustomResource):
1922
1833
  @pulumi.getter(name="tokenNumUses")
1923
1834
  def token_num_uses(self) -> pulumi.Output[Optional[int]]:
1924
1835
  """
1925
- The [maximum number](https://www.vaultproject.io/api-docs/ldap#token_num_uses)
1926
- of times a generated token may be used (within its lifetime); 0 means unlimited.
1836
+ The maximum number of times a token may be used, a value of zero means unlimited
1927
1837
  """
1928
1838
  return pulumi.get(self, "token_num_uses")
1929
1839
 
@@ -1931,10 +1841,7 @@ class AuthBackend(pulumi.CustomResource):
1931
1841
  @pulumi.getter(name="tokenPeriod")
1932
1842
  def token_period(self) -> pulumi.Output[Optional[int]]:
1933
1843
  """
1934
- If set, indicates that the
1935
- token generated using this role should never expire. The token should be renewed within the
1936
- duration specified by this value. At each renewal, the token's TTL will be set to the
1937
- value of this field. Specified in seconds.
1844
+ Generated Token's Period
1938
1845
  """
1939
1846
  return pulumi.get(self, "token_period")
1940
1847
 
@@ -1942,8 +1849,7 @@ class AuthBackend(pulumi.CustomResource):
1942
1849
  @pulumi.getter(name="tokenPolicies")
1943
1850
  def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
1944
1851
  """
1945
- List of policies to encode onto generated tokens. Depending
1946
- on the auth method, this list may be supplemented by user/group/other values.
1852
+ Generated Token's Policies
1947
1853
  """
1948
1854
  return pulumi.get(self, "token_policies")
1949
1855
 
@@ -1951,8 +1857,7 @@ class AuthBackend(pulumi.CustomResource):
1951
1857
  @pulumi.getter(name="tokenTtl")
1952
1858
  def token_ttl(self) -> pulumi.Output[Optional[int]]:
1953
1859
  """
1954
- The incremental lifetime for generated tokens in number of seconds.
1955
- Its current value will be referenced at renewal time.
1860
+ The initial ttl of the token to generate in seconds
1956
1861
  """
1957
1862
  return pulumi.get(self, "token_ttl")
1958
1863
 
@@ -189,7 +189,6 @@ class AuthBackendGroup(pulumi.CustomResource):
189
189
 
190
190
  ## Example Usage
191
191
 
192
- <!--Start PulumiCodeChooser -->
193
192
  ```python
194
193
  import pulumi
195
194
  import pulumi_vault as vault
@@ -208,7 +207,6 @@ class AuthBackendGroup(pulumi.CustomResource):
208
207
  policies=["dba"],
209
208
  backend=ldap.path)
210
209
  ```
211
- <!--End PulumiCodeChooser -->
212
210
 
213
211
  ## Import
214
212
 
@@ -241,7 +239,6 @@ class AuthBackendGroup(pulumi.CustomResource):
241
239
 
242
240
  ## Example Usage
243
241
 
244
- <!--Start PulumiCodeChooser -->
245
242
  ```python
246
243
  import pulumi
247
244
  import pulumi_vault as vault
@@ -260,7 +257,6 @@ class AuthBackendGroup(pulumi.CustomResource):
260
257
  policies=["dba"],
261
258
  backend=ldap.path)
262
259
  ```
263
- <!--End PulumiCodeChooser -->
264
260
 
265
261
  ## Import
266
262
 
@@ -222,7 +222,6 @@ class AuthBackendUser(pulumi.CustomResource):
222
222
 
223
223
  ## Example Usage
224
224
 
225
- <!--Start PulumiCodeChooser -->
226
225
  ```python
227
226
  import pulumi
228
227
  import pulumi_vault as vault
@@ -244,7 +243,6 @@ class AuthBackendUser(pulumi.CustomResource):
244
243
  ],
245
244
  backend=ldap.path)
246
245
  ```
247
- <!--End PulumiCodeChooser -->
248
246
 
249
247
  ## Import
250
248
 
@@ -278,7 +276,6 @@ class AuthBackendUser(pulumi.CustomResource):
278
276
 
279
277
  ## Example Usage
280
278
 
281
- <!--Start PulumiCodeChooser -->
282
279
  ```python
283
280
  import pulumi
284
281
  import pulumi_vault as vault
@@ -300,7 +297,6 @@ class AuthBackendUser(pulumi.CustomResource):
300
297
  ],
301
298
  backend=ldap.path)
302
299
  ```
303
- <!--End PulumiCodeChooser -->
304
300
 
305
301
  ## Import
306
302
 
@@ -1051,20 +1051,18 @@ class SecretBackend(pulumi.CustomResource):
1051
1051
  """
1052
1052
  ## Example Usage
1053
1053
 
1054
- <!--Start PulumiCodeChooser -->
1055
1054
  ```python
1056
1055
  import pulumi
1057
1056
  import pulumi_vault as vault
1058
1057
 
1059
1058
  config = vault.ldap.SecretBackend("config",
1059
+ path="my-custom-ldap",
1060
1060
  binddn="CN=Administrator,CN=Users,DC=corp,DC=example,DC=net",
1061
1061
  bindpass="SuperSecretPassw0rd",
1062
- insecure_tls=True,
1063
- path="my-custom-ldap",
1064
1062
  url="ldaps://localhost",
1063
+ insecure_tls=True,
1065
1064
  userdn="CN=Users,DC=corp,DC=example,DC=net")
1066
1065
  ```
1067
- <!--End PulumiCodeChooser -->
1068
1066
 
1069
1067
  ## Import
1070
1068
 
@@ -1126,20 +1124,18 @@ class SecretBackend(pulumi.CustomResource):
1126
1124
  """
1127
1125
  ## Example Usage
1128
1126
 
1129
- <!--Start PulumiCodeChooser -->
1130
1127
  ```python
1131
1128
  import pulumi
1132
1129
  import pulumi_vault as vault
1133
1130
 
1134
1131
  config = vault.ldap.SecretBackend("config",
1132
+ path="my-custom-ldap",
1135
1133
  binddn="CN=Administrator,CN=Users,DC=corp,DC=example,DC=net",
1136
1134
  bindpass="SuperSecretPassw0rd",
1137
- insecure_tls=True,
1138
- path="my-custom-ldap",
1139
1135
  url="ldaps://localhost",
1136
+ insecure_tls=True,
1140
1137
  userdn="CN=Users,DC=corp,DC=example,DC=net")
1141
1138
  ```
1142
- <!--End PulumiCodeChooser -->
1143
1139
 
1144
1140
  ## Import
1145
1141
 
@@ -422,7 +422,6 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
422
422
  """
423
423
  ## Example Usage
424
424
 
425
- <!--Start PulumiCodeChooser -->
426
425
  ```python
427
426
  import pulumi
428
427
  import pulumi_vault as vault
@@ -451,7 +450,6 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
451
450
  changetype: delete
452
451
  \"\"\")
453
452
  ```
454
- <!--End PulumiCodeChooser -->
455
453
 
456
454
  ## Import
457
455
 
@@ -506,7 +504,6 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
506
504
  """
507
505
  ## Example Usage
508
506
 
509
- <!--Start PulumiCodeChooser -->
510
507
  ```python
511
508
  import pulumi
512
509
  import pulumi_vault as vault
@@ -535,7 +532,6 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
535
532
  changetype: delete
536
533
  \"\"\")
537
534
  ```
538
- <!--End PulumiCodeChooser -->
539
535
 
540
536
  ## Import
541
537
 
@@ -298,7 +298,6 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
298
298
  """
299
299
  ## Example Usage
300
300
 
301
- <!--Start PulumiCodeChooser -->
302
301
  ```python
303
302
  import pulumi
304
303
  import pulumi_vault as vault
@@ -312,6 +311,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
312
311
  userdn="CN=Users,DC=corp,DC=example,DC=net")
313
312
  qa = vault.ldap.SecretBackendLibrarySet("qa",
314
313
  mount=config.path,
314
+ name="qa",
315
315
  service_account_names=[
316
316
  "Bob",
317
317
  "Mary",
@@ -320,7 +320,6 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
320
320
  disable_check_in_enforcement=True,
321
321
  max_ttl=120)
322
322
  ```
323
- <!--End PulumiCodeChooser -->
324
323
 
325
324
  ## Import
326
325
 
@@ -357,7 +356,6 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
357
356
  """
358
357
  ## Example Usage
359
358
 
360
- <!--Start PulumiCodeChooser -->
361
359
  ```python
362
360
  import pulumi
363
361
  import pulumi_vault as vault
@@ -371,6 +369,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
371
369
  userdn="CN=Users,DC=corp,DC=example,DC=net")
372
370
  qa = vault.ldap.SecretBackendLibrarySet("qa",
373
371
  mount=config.path,
372
+ name="qa",
374
373
  service_account_names=[
375
374
  "Bob",
376
375
  "Mary",
@@ -379,7 +378,6 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
379
378
  disable_check_in_enforcement=True,
380
379
  max_ttl=120)
381
380
  ```
382
- <!--End PulumiCodeChooser -->
383
381
 
384
382
  ## Import
385
383