pulumi-vault 6.1.1a1717550614__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (183) hide show
  1. pulumi_vault/_inputs.py +20 -0
  2. pulumi_vault/ad/secret_backend.py +6 -2
  3. pulumi_vault/ad/secret_library.py +4 -2
  4. pulumi_vault/ad/secret_role.py +4 -0
  5. pulumi_vault/alicloud/auth_backend_role.py +192 -69
  6. pulumi_vault/approle/auth_backend_login.py +4 -0
  7. pulumi_vault/approle/auth_backend_role.py +186 -63
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  9. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  10. pulumi_vault/audit.py +20 -12
  11. pulumi_vault/audit_request_header.py +6 -6
  12. pulumi_vault/aws/auth_backend_client.py +10 -6
  13. pulumi_vault/aws/auth_backend_config_identity.py +4 -0
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
  15. pulumi_vault/aws/auth_backend_login.py +8 -0
  16. pulumi_vault/aws/auth_backend_role.py +186 -63
  17. pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
  18. pulumi_vault/aws/auth_backend_sts_role.py +4 -0
  19. pulumi_vault/aws/secret_backend_role.py +4 -2
  20. pulumi_vault/aws/secret_backend_static_role.py +4 -2
  21. pulumi_vault/azure/auth_backend_config.py +10 -6
  22. pulumi_vault/azure/auth_backend_role.py +186 -63
  23. pulumi_vault/azure/backend.py +24 -16
  24. pulumi_vault/azure/backend_role.py +18 -14
  25. pulumi_vault/azure/get_access_credentials.py +4 -0
  26. pulumi_vault/cert_auth_backend_role.py +208 -75
  27. pulumi_vault/consul/secret_backend.py +18 -10
  28. pulumi_vault/consul/secret_backend_role.py +4 -2
  29. pulumi_vault/database/_inputs.py +784 -522
  30. pulumi_vault/database/outputs.py +784 -522
  31. pulumi_vault/database/secret_backend_connection.py +4 -2
  32. pulumi_vault/database/secret_backend_role.py +4 -4
  33. pulumi_vault/database/secret_backend_static_role.py +8 -10
  34. pulumi_vault/database/secrets_mount.py +4 -4
  35. pulumi_vault/egp_policy.py +8 -4
  36. pulumi_vault/gcp/auth_backend.py +36 -0
  37. pulumi_vault/gcp/auth_backend_role.py +264 -63
  38. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  39. pulumi_vault/gcp/secret_backend.py +6 -4
  40. pulumi_vault/gcp/secret_impersonated_account.py +14 -12
  41. pulumi_vault/gcp/secret_roleset.py +6 -4
  42. pulumi_vault/gcp/secret_static_account.py +16 -14
  43. pulumi_vault/generic/endpoint.py +8 -4
  44. pulumi_vault/generic/get_secret.py +4 -40
  45. pulumi_vault/get_auth_backend.py +4 -0
  46. pulumi_vault/get_auth_backends.py +8 -0
  47. pulumi_vault/get_namespace.py +12 -0
  48. pulumi_vault/get_namespaces.py +12 -4
  49. pulumi_vault/get_nomad_access_token.py +4 -0
  50. pulumi_vault/get_policy_document.py +8 -8
  51. pulumi_vault/get_raft_autopilot_state.py +4 -0
  52. pulumi_vault/github/auth_backend.py +4 -0
  53. pulumi_vault/github/team.py +6 -2
  54. pulumi_vault/github/user.py +6 -2
  55. pulumi_vault/identity/entity.py +8 -6
  56. pulumi_vault/identity/entity_alias.py +8 -6
  57. pulumi_vault/identity/entity_policies.py +12 -12
  58. pulumi_vault/identity/get_entity.py +4 -0
  59. pulumi_vault/identity/get_group.py +4 -0
  60. pulumi_vault/identity/get_oidc_client_creds.py +4 -2
  61. pulumi_vault/identity/get_oidc_openid_config.py +6 -10
  62. pulumi_vault/identity/get_oidc_public_keys.py +6 -10
  63. pulumi_vault/identity/group.py +42 -38
  64. pulumi_vault/identity/group_alias.py +4 -2
  65. pulumi_vault/identity/group_member_entity_ids.py +16 -12
  66. pulumi_vault/identity/group_member_group_ids.py +20 -24
  67. pulumi_vault/identity/group_policies.py +8 -4
  68. pulumi_vault/identity/mfa_duo.py +8 -4
  69. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  70. pulumi_vault/identity/mfa_okta.py +8 -4
  71. pulumi_vault/identity/mfa_pingid.py +4 -0
  72. pulumi_vault/identity/mfa_totp.py +4 -0
  73. pulumi_vault/identity/oidc.py +4 -0
  74. pulumi_vault/identity/oidc_assignment.py +6 -10
  75. pulumi_vault/identity/oidc_client.py +10 -10
  76. pulumi_vault/identity/oidc_key.py +12 -16
  77. pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
  78. pulumi_vault/identity/oidc_provider.py +16 -22
  79. pulumi_vault/identity/oidc_role.py +20 -28
  80. pulumi_vault/identity/oidc_scope.py +8 -6
  81. pulumi_vault/jwt/auth_backend.py +32 -20
  82. pulumi_vault/jwt/auth_backend_role.py +190 -63
  83. pulumi_vault/kmip/secret_backend.py +14 -10
  84. pulumi_vault/kmip/secret_role.py +4 -0
  85. pulumi_vault/kmip/secret_scope.py +4 -0
  86. pulumi_vault/kubernetes/auth_backend_config.py +4 -0
  87. pulumi_vault/kubernetes/auth_backend_role.py +172 -56
  88. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  89. pulumi_vault/kubernetes/secret_backend.py +8 -6
  90. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  91. pulumi_vault/kv/get_secret.py +4 -0
  92. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
  93. pulumi_vault/kv/get_secret_v2.py +0 -58
  94. pulumi_vault/kv/get_secrets_list.py +8 -4
  95. pulumi_vault/kv/get_secrets_list_v2.py +12 -14
  96. pulumi_vault/kv/secret.py +4 -0
  97. pulumi_vault/kv/secret_backend_v2.py +4 -0
  98. pulumi_vault/kv/secret_v2.py +4 -2
  99. pulumi_vault/ldap/auth_backend.py +161 -66
  100. pulumi_vault/ldap/auth_backend_group.py +4 -0
  101. pulumi_vault/ldap/auth_backend_user.py +4 -0
  102. pulumi_vault/ldap/secret_backend.py +8 -4
  103. pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
  104. pulumi_vault/ldap/secret_backend_library_set.py +4 -2
  105. pulumi_vault/ldap/secret_backend_static_role.py +4 -0
  106. pulumi_vault/managed/_inputs.py +132 -84
  107. pulumi_vault/managed/keys.py +28 -7
  108. pulumi_vault/managed/outputs.py +132 -84
  109. pulumi_vault/mfa_duo.py +6 -4
  110. pulumi_vault/mfa_okta.py +6 -4
  111. pulumi_vault/mfa_pingid.py +6 -4
  112. pulumi_vault/mfa_totp.py +12 -10
  113. pulumi_vault/mongodbatlas/secret_backend.py +4 -0
  114. pulumi_vault/mongodbatlas/secret_role.py +4 -2
  115. pulumi_vault/mount.py +42 -26
  116. pulumi_vault/nomad_secret_backend.py +8 -4
  117. pulumi_vault/nomad_secret_role.py +4 -0
  118. pulumi_vault/okta/_inputs.py +8 -8
  119. pulumi_vault/okta/auth_backend.py +10 -6
  120. pulumi_vault/okta/auth_backend_group.py +4 -0
  121. pulumi_vault/okta/auth_backend_user.py +4 -0
  122. pulumi_vault/okta/outputs.py +8 -8
  123. pulumi_vault/outputs.py +20 -0
  124. pulumi_vault/password_policy.py +8 -6
  125. pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
  126. pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
  127. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  128. pulumi_vault/pkisecret/get_backend_key.py +6 -2
  129. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  130. pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
  131. pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
  132. pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
  133. pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
  134. pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
  135. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
  136. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
  137. pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
  138. pulumi_vault/pkisecret/secret_backend_role.py +4 -2
  139. pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
  140. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
  141. pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
  142. pulumi_vault/provider.py +8 -0
  143. pulumi_vault/pulumi-plugin.json +1 -2
  144. pulumi_vault/quota_lease_count.py +8 -6
  145. pulumi_vault/quota_rate_limit.py +4 -2
  146. pulumi_vault/rabbitmq/secret_backend.py +8 -4
  147. pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
  148. pulumi_vault/raft_autopilot.py +4 -0
  149. pulumi_vault/raft_snapshot_agent_config.py +304 -109
  150. pulumi_vault/rgp_policy.py +6 -2
  151. pulumi_vault/saml/auth_backend.py +12 -8
  152. pulumi_vault/saml/auth_backend_role.py +178 -64
  153. pulumi_vault/secrets/sync_association.py +10 -12
  154. pulumi_vault/secrets/sync_aws_destination.py +8 -6
  155. pulumi_vault/secrets/sync_azure_destination.py +12 -10
  156. pulumi_vault/secrets/sync_config.py +6 -2
  157. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  158. pulumi_vault/secrets/sync_gh_destination.py +8 -6
  159. pulumi_vault/secrets/sync_github_apps.py +8 -8
  160. pulumi_vault/secrets/sync_vercel_destination.py +8 -6
  161. pulumi_vault/ssh/_inputs.py +32 -6
  162. pulumi_vault/ssh/outputs.py +32 -6
  163. pulumi_vault/ssh/secret_backend_ca.py +4 -0
  164. pulumi_vault/ssh/secret_backend_role.py +4 -4
  165. pulumi_vault/terraformcloud/secret_backend.py +56 -0
  166. pulumi_vault/terraformcloud/secret_creds.py +17 -2
  167. pulumi_vault/terraformcloud/secret_role.py +69 -2
  168. pulumi_vault/token.py +18 -14
  169. pulumi_vault/tokenauth/auth_backend_role.py +180 -64
  170. pulumi_vault/transform/alphabet.py +6 -4
  171. pulumi_vault/transform/get_decode.py +4 -4
  172. pulumi_vault/transform/get_encode.py +4 -4
  173. pulumi_vault/transform/role.py +6 -4
  174. pulumi_vault/transform/template.py +4 -4
  175. pulumi_vault/transit/get_decrypt.py +20 -4
  176. pulumi_vault/transit/get_encrypt.py +14 -0
  177. pulumi_vault/transit/secret_backend_key.py +6 -6
  178. pulumi_vault/transit/secret_cache_config.py +4 -0
  179. {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
  180. pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
  181. pulumi_vault-6.1.1a1717550614.dist-info/RECORD +0 -252
  182. {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +0 -0
  183. {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -78,14 +78,27 @@ class AuthBackendArgs:
78
78
  :param pulumi.Input[bool] starttls: Control use of TLS when conecting to LDAP
79
79
  :param pulumi.Input[str] tls_max_version: Maximum acceptable version of TLS
80
80
  :param pulumi.Input[str] tls_min_version: Minimum acceptable version of TLS
81
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
82
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
83
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
84
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
85
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
86
- :param pulumi.Input[int] token_period: Generated Token's Period
87
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
88
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
81
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
82
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
83
+ as well.
84
+ :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
85
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
86
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
87
+ `token_max_ttl` would otherwise allow a renewal.
88
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
89
+ Its current value will be referenced at renewal time.
90
+ :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
91
+ generated tokens; otherwise it will be added to the policies set in token_policies.
92
+ :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/ldap#token_num_uses)
93
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
94
+ :param pulumi.Input[int] token_period: If set, indicates that the
95
+ token generated using this role should never expire. The token should be renewed within the
96
+ duration specified by this value. At each renewal, the token's TTL will be set to the
97
+ value of this field. Specified in seconds.
98
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
99
+ on the auth method, this list may be supplemented by user/group/other values.
100
+ :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
101
+ Its current value will be referenced at renewal time.
89
102
  :param pulumi.Input[str] token_type: The type of token to generate, service or batch
90
103
  :param pulumi.Input[str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
91
104
  :param pulumi.Input[bool] use_token_groups: Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
@@ -435,7 +448,9 @@ class AuthBackendArgs:
435
448
  @pulumi.getter(name="tokenBoundCidrs")
436
449
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
437
450
  """
438
- Specifies the blocks of IP addresses which are allowed to use the generated token
451
+ List of CIDR blocks; if set, specifies blocks of IP
452
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
453
+ as well.
439
454
  """
440
455
  return pulumi.get(self, "token_bound_cidrs")
441
456
 
@@ -447,7 +462,10 @@ class AuthBackendArgs:
447
462
  @pulumi.getter(name="tokenExplicitMaxTtl")
448
463
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
449
464
  """
450
- Generated Token's Explicit Maximum TTL in seconds
465
+ If set, will encode an
466
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
467
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
468
+ `token_max_ttl` would otherwise allow a renewal.
451
469
  """
452
470
  return pulumi.get(self, "token_explicit_max_ttl")
453
471
 
@@ -459,7 +477,8 @@ class AuthBackendArgs:
459
477
  @pulumi.getter(name="tokenMaxTtl")
460
478
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
461
479
  """
462
- The maximum lifetime of the generated token
480
+ The maximum lifetime for generated tokens in number of seconds.
481
+ Its current value will be referenced at renewal time.
463
482
  """
464
483
  return pulumi.get(self, "token_max_ttl")
465
484
 
@@ -471,7 +490,8 @@ class AuthBackendArgs:
471
490
  @pulumi.getter(name="tokenNoDefaultPolicy")
472
491
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
473
492
  """
474
- If true, the 'default' policy will not automatically be added to generated tokens
493
+ If set, the default policy will not be set on
494
+ generated tokens; otherwise it will be added to the policies set in token_policies.
475
495
  """
476
496
  return pulumi.get(self, "token_no_default_policy")
477
497
 
@@ -483,7 +503,8 @@ class AuthBackendArgs:
483
503
  @pulumi.getter(name="tokenNumUses")
484
504
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
485
505
  """
486
- The maximum number of times a token may be used, a value of zero means unlimited
506
+ The [maximum number](https://www.vaultproject.io/api-docs/ldap#token_num_uses)
507
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
487
508
  """
488
509
  return pulumi.get(self, "token_num_uses")
489
510
 
@@ -495,7 +516,10 @@ class AuthBackendArgs:
495
516
  @pulumi.getter(name="tokenPeriod")
496
517
  def token_period(self) -> Optional[pulumi.Input[int]]:
497
518
  """
498
- Generated Token's Period
519
+ If set, indicates that the
520
+ token generated using this role should never expire. The token should be renewed within the
521
+ duration specified by this value. At each renewal, the token's TTL will be set to the
522
+ value of this field. Specified in seconds.
499
523
  """
500
524
  return pulumi.get(self, "token_period")
501
525
 
@@ -507,7 +531,8 @@ class AuthBackendArgs:
507
531
  @pulumi.getter(name="tokenPolicies")
508
532
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
509
533
  """
510
- Generated Token's Policies
534
+ List of policies to encode onto generated tokens. Depending
535
+ on the auth method, this list may be supplemented by user/group/other values.
511
536
  """
512
537
  return pulumi.get(self, "token_policies")
513
538
 
@@ -519,7 +544,8 @@ class AuthBackendArgs:
519
544
  @pulumi.getter(name="tokenTtl")
520
545
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
521
546
  """
522
- The initial ttl of the token to generate in seconds
547
+ The incremental lifetime for generated tokens in number of seconds.
548
+ Its current value will be referenced at renewal time.
523
549
  """
524
550
  return pulumi.get(self, "token_ttl")
525
551
 
@@ -680,14 +706,27 @@ class _AuthBackendState:
680
706
  :param pulumi.Input[bool] starttls: Control use of TLS when conecting to LDAP
681
707
  :param pulumi.Input[str] tls_max_version: Maximum acceptable version of TLS
682
708
  :param pulumi.Input[str] tls_min_version: Minimum acceptable version of TLS
683
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
684
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
685
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
686
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
687
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
688
- :param pulumi.Input[int] token_period: Generated Token's Period
689
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
690
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
709
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
710
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
711
+ as well.
712
+ :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
713
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
714
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
715
+ `token_max_ttl` would otherwise allow a renewal.
716
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
717
+ Its current value will be referenced at renewal time.
718
+ :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
719
+ generated tokens; otherwise it will be added to the policies set in token_policies.
720
+ :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/ldap#token_num_uses)
721
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
722
+ :param pulumi.Input[int] token_period: If set, indicates that the
723
+ token generated using this role should never expire. The token should be renewed within the
724
+ duration specified by this value. At each renewal, the token's TTL will be set to the
725
+ value of this field. Specified in seconds.
726
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
727
+ on the auth method, this list may be supplemented by user/group/other values.
728
+ :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
729
+ Its current value will be referenced at renewal time.
691
730
  :param pulumi.Input[str] token_type: The type of token to generate, service or batch
692
731
  :param pulumi.Input[str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
693
732
  :param pulumi.Input[str] url: The URL of the LDAP server
@@ -1041,7 +1080,9 @@ class _AuthBackendState:
1041
1080
  @pulumi.getter(name="tokenBoundCidrs")
1042
1081
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
1043
1082
  """
1044
- Specifies the blocks of IP addresses which are allowed to use the generated token
1083
+ List of CIDR blocks; if set, specifies blocks of IP
1084
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
1085
+ as well.
1045
1086
  """
1046
1087
  return pulumi.get(self, "token_bound_cidrs")
1047
1088
 
@@ -1053,7 +1094,10 @@ class _AuthBackendState:
1053
1094
  @pulumi.getter(name="tokenExplicitMaxTtl")
1054
1095
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
1055
1096
  """
1056
- Generated Token's Explicit Maximum TTL in seconds
1097
+ If set, will encode an
1098
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1099
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1100
+ `token_max_ttl` would otherwise allow a renewal.
1057
1101
  """
1058
1102
  return pulumi.get(self, "token_explicit_max_ttl")
1059
1103
 
@@ -1065,7 +1109,8 @@ class _AuthBackendState:
1065
1109
  @pulumi.getter(name="tokenMaxTtl")
1066
1110
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
1067
1111
  """
1068
- The maximum lifetime of the generated token
1112
+ The maximum lifetime for generated tokens in number of seconds.
1113
+ Its current value will be referenced at renewal time.
1069
1114
  """
1070
1115
  return pulumi.get(self, "token_max_ttl")
1071
1116
 
@@ -1077,7 +1122,8 @@ class _AuthBackendState:
1077
1122
  @pulumi.getter(name="tokenNoDefaultPolicy")
1078
1123
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
1079
1124
  """
1080
- If true, the 'default' policy will not automatically be added to generated tokens
1125
+ If set, the default policy will not be set on
1126
+ generated tokens; otherwise it will be added to the policies set in token_policies.
1081
1127
  """
1082
1128
  return pulumi.get(self, "token_no_default_policy")
1083
1129
 
@@ -1089,7 +1135,8 @@ class _AuthBackendState:
1089
1135
  @pulumi.getter(name="tokenNumUses")
1090
1136
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
1091
1137
  """
1092
- The maximum number of times a token may be used, a value of zero means unlimited
1138
+ The [maximum number](https://www.vaultproject.io/api-docs/ldap#token_num_uses)
1139
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
1093
1140
  """
1094
1141
  return pulumi.get(self, "token_num_uses")
1095
1142
 
@@ -1101,7 +1148,10 @@ class _AuthBackendState:
1101
1148
  @pulumi.getter(name="tokenPeriod")
1102
1149
  def token_period(self) -> Optional[pulumi.Input[int]]:
1103
1150
  """
1104
- Generated Token's Period
1151
+ If set, indicates that the
1152
+ token generated using this role should never expire. The token should be renewed within the
1153
+ duration specified by this value. At each renewal, the token's TTL will be set to the
1154
+ value of this field. Specified in seconds.
1105
1155
  """
1106
1156
  return pulumi.get(self, "token_period")
1107
1157
 
@@ -1113,7 +1163,8 @@ class _AuthBackendState:
1113
1163
  @pulumi.getter(name="tokenPolicies")
1114
1164
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
1115
1165
  """
1116
- Generated Token's Policies
1166
+ List of policies to encode onto generated tokens. Depending
1167
+ on the auth method, this list may be supplemented by user/group/other values.
1117
1168
  """
1118
1169
  return pulumi.get(self, "token_policies")
1119
1170
 
@@ -1125,7 +1176,8 @@ class _AuthBackendState:
1125
1176
  @pulumi.getter(name="tokenTtl")
1126
1177
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
1127
1178
  """
1128
- The initial ttl of the token to generate in seconds
1179
+ The incremental lifetime for generated tokens in number of seconds.
1180
+ Its current value will be referenced at renewal time.
1129
1181
  """
1130
1182
  return pulumi.get(self, "token_ttl")
1131
1183
 
@@ -1278,20 +1330,22 @@ class AuthBackend(pulumi.CustomResource):
1278
1330
 
1279
1331
  ## Example Usage
1280
1332
 
1333
+ <!--Start PulumiCodeChooser -->
1281
1334
  ```python
1282
1335
  import pulumi
1283
1336
  import pulumi_vault as vault
1284
1337
 
1285
1338
  ldap = vault.ldap.AuthBackend("ldap",
1339
+ discoverdn=False,
1340
+ groupdn="OU=Groups,DC=example,DC=org",
1341
+ groupfilter="(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}}))",
1286
1342
  path="ldap",
1343
+ upndomain="EXAMPLE.ORG",
1287
1344
  url="ldaps://dc-01.example.org",
1288
- userdn="OU=Users,OU=Accounts,DC=example,DC=org",
1289
1345
  userattr="sAMAccountName",
1290
- upndomain="EXAMPLE.ORG",
1291
- discoverdn=False,
1292
- groupdn="OU=Groups,DC=example,DC=org",
1293
- groupfilter="(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}}))")
1346
+ userdn="OU=Users,OU=Accounts,DC=example,DC=org")
1294
1347
  ```
1348
+ <!--End PulumiCodeChooser -->
1295
1349
 
1296
1350
  ## Import
1297
1351
 
@@ -1327,14 +1381,27 @@ class AuthBackend(pulumi.CustomResource):
1327
1381
  :param pulumi.Input[bool] starttls: Control use of TLS when conecting to LDAP
1328
1382
  :param pulumi.Input[str] tls_max_version: Maximum acceptable version of TLS
1329
1383
  :param pulumi.Input[str] tls_min_version: Minimum acceptable version of TLS
1330
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
1331
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
1332
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
1333
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
1334
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
1335
- :param pulumi.Input[int] token_period: Generated Token's Period
1336
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
1337
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
1384
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
1385
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
1386
+ as well.
1387
+ :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
1388
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1389
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1390
+ `token_max_ttl` would otherwise allow a renewal.
1391
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
1392
+ Its current value will be referenced at renewal time.
1393
+ :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
1394
+ generated tokens; otherwise it will be added to the policies set in token_policies.
1395
+ :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/ldap#token_num_uses)
1396
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
1397
+ :param pulumi.Input[int] token_period: If set, indicates that the
1398
+ token generated using this role should never expire. The token should be renewed within the
1399
+ duration specified by this value. At each renewal, the token's TTL will be set to the
1400
+ value of this field. Specified in seconds.
1401
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
1402
+ on the auth method, this list may be supplemented by user/group/other values.
1403
+ :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
1404
+ Its current value will be referenced at renewal time.
1338
1405
  :param pulumi.Input[str] token_type: The type of token to generate, service or batch
1339
1406
  :param pulumi.Input[str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
1340
1407
  :param pulumi.Input[str] url: The URL of the LDAP server
@@ -1355,20 +1422,22 @@ class AuthBackend(pulumi.CustomResource):
1355
1422
 
1356
1423
  ## Example Usage
1357
1424
 
1425
+ <!--Start PulumiCodeChooser -->
1358
1426
  ```python
1359
1427
  import pulumi
1360
1428
  import pulumi_vault as vault
1361
1429
 
1362
1430
  ldap = vault.ldap.AuthBackend("ldap",
1431
+ discoverdn=False,
1432
+ groupdn="OU=Groups,DC=example,DC=org",
1433
+ groupfilter="(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}}))",
1363
1434
  path="ldap",
1435
+ upndomain="EXAMPLE.ORG",
1364
1436
  url="ldaps://dc-01.example.org",
1365
- userdn="OU=Users,OU=Accounts,DC=example,DC=org",
1366
1437
  userattr="sAMAccountName",
1367
- upndomain="EXAMPLE.ORG",
1368
- discoverdn=False,
1369
- groupdn="OU=Groups,DC=example,DC=org",
1370
- groupfilter="(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}}))")
1438
+ userdn="OU=Users,OU=Accounts,DC=example,DC=org")
1371
1439
  ```
1440
+ <!--End PulumiCodeChooser -->
1372
1441
 
1373
1442
  ## Import
1374
1443
 
@@ -1561,14 +1630,27 @@ class AuthBackend(pulumi.CustomResource):
1561
1630
  :param pulumi.Input[bool] starttls: Control use of TLS when conecting to LDAP
1562
1631
  :param pulumi.Input[str] tls_max_version: Maximum acceptable version of TLS
1563
1632
  :param pulumi.Input[str] tls_min_version: Minimum acceptable version of TLS
1564
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
1565
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
1566
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
1567
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
1568
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
1569
- :param pulumi.Input[int] token_period: Generated Token's Period
1570
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
1571
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
1633
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
1634
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
1635
+ as well.
1636
+ :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
1637
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1638
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1639
+ `token_max_ttl` would otherwise allow a renewal.
1640
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
1641
+ Its current value will be referenced at renewal time.
1642
+ :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
1643
+ generated tokens; otherwise it will be added to the policies set in token_policies.
1644
+ :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/ldap#token_num_uses)
1645
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
1646
+ :param pulumi.Input[int] token_period: If set, indicates that the
1647
+ token generated using this role should never expire. The token should be renewed within the
1648
+ duration specified by this value. At each renewal, the token's TTL will be set to the
1649
+ value of this field. Specified in seconds.
1650
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
1651
+ on the auth method, this list may be supplemented by user/group/other values.
1652
+ :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
1653
+ Its current value will be referenced at renewal time.
1572
1654
  :param pulumi.Input[str] token_type: The type of token to generate, service or batch
1573
1655
  :param pulumi.Input[str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
1574
1656
  :param pulumi.Input[str] url: The URL of the LDAP server
@@ -1801,7 +1883,9 @@ class AuthBackend(pulumi.CustomResource):
1801
1883
  @pulumi.getter(name="tokenBoundCidrs")
1802
1884
  def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
1803
1885
  """
1804
- Specifies the blocks of IP addresses which are allowed to use the generated token
1886
+ List of CIDR blocks; if set, specifies blocks of IP
1887
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
1888
+ as well.
1805
1889
  """
1806
1890
  return pulumi.get(self, "token_bound_cidrs")
1807
1891
 
@@ -1809,7 +1893,10 @@ class AuthBackend(pulumi.CustomResource):
1809
1893
  @pulumi.getter(name="tokenExplicitMaxTtl")
1810
1894
  def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
1811
1895
  """
1812
- Generated Token's Explicit Maximum TTL in seconds
1896
+ If set, will encode an
1897
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1898
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1899
+ `token_max_ttl` would otherwise allow a renewal.
1813
1900
  """
1814
1901
  return pulumi.get(self, "token_explicit_max_ttl")
1815
1902
 
@@ -1817,7 +1904,8 @@ class AuthBackend(pulumi.CustomResource):
1817
1904
  @pulumi.getter(name="tokenMaxTtl")
1818
1905
  def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
1819
1906
  """
1820
- The maximum lifetime of the generated token
1907
+ The maximum lifetime for generated tokens in number of seconds.
1908
+ Its current value will be referenced at renewal time.
1821
1909
  """
1822
1910
  return pulumi.get(self, "token_max_ttl")
1823
1911
 
@@ -1825,7 +1913,8 @@ class AuthBackend(pulumi.CustomResource):
1825
1913
  @pulumi.getter(name="tokenNoDefaultPolicy")
1826
1914
  def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
1827
1915
  """
1828
- If true, the 'default' policy will not automatically be added to generated tokens
1916
+ If set, the default policy will not be set on
1917
+ generated tokens; otherwise it will be added to the policies set in token_policies.
1829
1918
  """
1830
1919
  return pulumi.get(self, "token_no_default_policy")
1831
1920
 
@@ -1833,7 +1922,8 @@ class AuthBackend(pulumi.CustomResource):
1833
1922
  @pulumi.getter(name="tokenNumUses")
1834
1923
  def token_num_uses(self) -> pulumi.Output[Optional[int]]:
1835
1924
  """
1836
- The maximum number of times a token may be used, a value of zero means unlimited
1925
+ The [maximum number](https://www.vaultproject.io/api-docs/ldap#token_num_uses)
1926
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
1837
1927
  """
1838
1928
  return pulumi.get(self, "token_num_uses")
1839
1929
 
@@ -1841,7 +1931,10 @@ class AuthBackend(pulumi.CustomResource):
1841
1931
  @pulumi.getter(name="tokenPeriod")
1842
1932
  def token_period(self) -> pulumi.Output[Optional[int]]:
1843
1933
  """
1844
- Generated Token's Period
1934
+ If set, indicates that the
1935
+ token generated using this role should never expire. The token should be renewed within the
1936
+ duration specified by this value. At each renewal, the token's TTL will be set to the
1937
+ value of this field. Specified in seconds.
1845
1938
  """
1846
1939
  return pulumi.get(self, "token_period")
1847
1940
 
@@ -1849,7 +1942,8 @@ class AuthBackend(pulumi.CustomResource):
1849
1942
  @pulumi.getter(name="tokenPolicies")
1850
1943
  def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
1851
1944
  """
1852
- Generated Token's Policies
1945
+ List of policies to encode onto generated tokens. Depending
1946
+ on the auth method, this list may be supplemented by user/group/other values.
1853
1947
  """
1854
1948
  return pulumi.get(self, "token_policies")
1855
1949
 
@@ -1857,7 +1951,8 @@ class AuthBackend(pulumi.CustomResource):
1857
1951
  @pulumi.getter(name="tokenTtl")
1858
1952
  def token_ttl(self) -> pulumi.Output[Optional[int]]:
1859
1953
  """
1860
- The initial ttl of the token to generate in seconds
1954
+ The incremental lifetime for generated tokens in number of seconds.
1955
+ Its current value will be referenced at renewal time.
1861
1956
  """
1862
1957
  return pulumi.get(self, "token_ttl")
1863
1958
 
@@ -189,6 +189,7 @@ class AuthBackendGroup(pulumi.CustomResource):
189
189
 
190
190
  ## Example Usage
191
191
 
192
+ <!--Start PulumiCodeChooser -->
192
193
  ```python
193
194
  import pulumi
194
195
  import pulumi_vault as vault
@@ -207,6 +208,7 @@ class AuthBackendGroup(pulumi.CustomResource):
207
208
  policies=["dba"],
208
209
  backend=ldap.path)
209
210
  ```
211
+ <!--End PulumiCodeChooser -->
210
212
 
211
213
  ## Import
212
214
 
@@ -239,6 +241,7 @@ class AuthBackendGroup(pulumi.CustomResource):
239
241
 
240
242
  ## Example Usage
241
243
 
244
+ <!--Start PulumiCodeChooser -->
242
245
  ```python
243
246
  import pulumi
244
247
  import pulumi_vault as vault
@@ -257,6 +260,7 @@ class AuthBackendGroup(pulumi.CustomResource):
257
260
  policies=["dba"],
258
261
  backend=ldap.path)
259
262
  ```
263
+ <!--End PulumiCodeChooser -->
260
264
 
261
265
  ## Import
262
266
 
@@ -222,6 +222,7 @@ class AuthBackendUser(pulumi.CustomResource):
222
222
 
223
223
  ## Example Usage
224
224
 
225
+ <!--Start PulumiCodeChooser -->
225
226
  ```python
226
227
  import pulumi
227
228
  import pulumi_vault as vault
@@ -243,6 +244,7 @@ class AuthBackendUser(pulumi.CustomResource):
243
244
  ],
244
245
  backend=ldap.path)
245
246
  ```
247
+ <!--End PulumiCodeChooser -->
246
248
 
247
249
  ## Import
248
250
 
@@ -276,6 +278,7 @@ class AuthBackendUser(pulumi.CustomResource):
276
278
 
277
279
  ## Example Usage
278
280
 
281
+ <!--Start PulumiCodeChooser -->
279
282
  ```python
280
283
  import pulumi
281
284
  import pulumi_vault as vault
@@ -297,6 +300,7 @@ class AuthBackendUser(pulumi.CustomResource):
297
300
  ],
298
301
  backend=ldap.path)
299
302
  ```
303
+ <!--End PulumiCodeChooser -->
300
304
 
301
305
  ## Import
302
306
 
@@ -1051,18 +1051,20 @@ class SecretBackend(pulumi.CustomResource):
1051
1051
  """
1052
1052
  ## Example Usage
1053
1053
 
1054
+ <!--Start PulumiCodeChooser -->
1054
1055
  ```python
1055
1056
  import pulumi
1056
1057
  import pulumi_vault as vault
1057
1058
 
1058
1059
  config = vault.ldap.SecretBackend("config",
1059
- path="my-custom-ldap",
1060
1060
  binddn="CN=Administrator,CN=Users,DC=corp,DC=example,DC=net",
1061
1061
  bindpass="SuperSecretPassw0rd",
1062
- url="ldaps://localhost",
1063
1062
  insecure_tls=True,
1063
+ path="my-custom-ldap",
1064
+ url="ldaps://localhost",
1064
1065
  userdn="CN=Users,DC=corp,DC=example,DC=net")
1065
1066
  ```
1067
+ <!--End PulumiCodeChooser -->
1066
1068
 
1067
1069
  ## Import
1068
1070
 
@@ -1124,18 +1126,20 @@ class SecretBackend(pulumi.CustomResource):
1124
1126
  """
1125
1127
  ## Example Usage
1126
1128
 
1129
+ <!--Start PulumiCodeChooser -->
1127
1130
  ```python
1128
1131
  import pulumi
1129
1132
  import pulumi_vault as vault
1130
1133
 
1131
1134
  config = vault.ldap.SecretBackend("config",
1132
- path="my-custom-ldap",
1133
1135
  binddn="CN=Administrator,CN=Users,DC=corp,DC=example,DC=net",
1134
1136
  bindpass="SuperSecretPassw0rd",
1135
- url="ldaps://localhost",
1136
1137
  insecure_tls=True,
1138
+ path="my-custom-ldap",
1139
+ url="ldaps://localhost",
1137
1140
  userdn="CN=Users,DC=corp,DC=example,DC=net")
1138
1141
  ```
1142
+ <!--End PulumiCodeChooser -->
1139
1143
 
1140
1144
  ## Import
1141
1145
 
@@ -422,6 +422,7 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
422
422
  """
423
423
  ## Example Usage
424
424
 
425
+ <!--Start PulumiCodeChooser -->
425
426
  ```python
426
427
  import pulumi
427
428
  import pulumi_vault as vault
@@ -450,6 +451,7 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
450
451
  changetype: delete
451
452
  \"\"\")
452
453
  ```
454
+ <!--End PulumiCodeChooser -->
453
455
 
454
456
  ## Import
455
457
 
@@ -504,6 +506,7 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
504
506
  """
505
507
  ## Example Usage
506
508
 
509
+ <!--Start PulumiCodeChooser -->
507
510
  ```python
508
511
  import pulumi
509
512
  import pulumi_vault as vault
@@ -532,6 +535,7 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
532
535
  changetype: delete
533
536
  \"\"\")
534
537
  ```
538
+ <!--End PulumiCodeChooser -->
535
539
 
536
540
  ## Import
537
541
 
@@ -298,6 +298,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
298
298
  """
299
299
  ## Example Usage
300
300
 
301
+ <!--Start PulumiCodeChooser -->
301
302
  ```python
302
303
  import pulumi
303
304
  import pulumi_vault as vault
@@ -311,7 +312,6 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
311
312
  userdn="CN=Users,DC=corp,DC=example,DC=net")
312
313
  qa = vault.ldap.SecretBackendLibrarySet("qa",
313
314
  mount=config.path,
314
- name="qa",
315
315
  service_account_names=[
316
316
  "Bob",
317
317
  "Mary",
@@ -320,6 +320,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
320
320
  disable_check_in_enforcement=True,
321
321
  max_ttl=120)
322
322
  ```
323
+ <!--End PulumiCodeChooser -->
323
324
 
324
325
  ## Import
325
326
 
@@ -356,6 +357,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
356
357
  """
357
358
  ## Example Usage
358
359
 
360
+ <!--Start PulumiCodeChooser -->
359
361
  ```python
360
362
  import pulumi
361
363
  import pulumi_vault as vault
@@ -369,7 +371,6 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
369
371
  userdn="CN=Users,DC=corp,DC=example,DC=net")
370
372
  qa = vault.ldap.SecretBackendLibrarySet("qa",
371
373
  mount=config.path,
372
- name="qa",
373
374
  service_account_names=[
374
375
  "Bob",
375
376
  "Mary",
@@ -378,6 +379,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
378
379
  disable_check_in_enforcement=True,
379
380
  max_ttl=120)
380
381
  ```
382
+ <!--End PulumiCodeChooser -->
381
383
 
382
384
  ## Import
383
385