pulumi-vault 6.1.1a1717550614__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +20 -0
- pulumi_vault/ad/secret_backend.py +6 -2
- pulumi_vault/ad/secret_library.py +4 -2
- pulumi_vault/ad/secret_role.py +4 -0
- pulumi_vault/alicloud/auth_backend_role.py +192 -69
- pulumi_vault/approle/auth_backend_login.py +4 -0
- pulumi_vault/approle/auth_backend_role.py +186 -63
- pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
- pulumi_vault/audit.py +20 -12
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/aws/auth_backend_client.py +10 -6
- pulumi_vault/aws/auth_backend_config_identity.py +4 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
- pulumi_vault/aws/auth_backend_login.py +8 -0
- pulumi_vault/aws/auth_backend_role.py +186 -63
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
- pulumi_vault/aws/auth_backend_sts_role.py +4 -0
- pulumi_vault/aws/secret_backend_role.py +4 -2
- pulumi_vault/aws/secret_backend_static_role.py +4 -2
- pulumi_vault/azure/auth_backend_config.py +10 -6
- pulumi_vault/azure/auth_backend_role.py +186 -63
- pulumi_vault/azure/backend.py +24 -16
- pulumi_vault/azure/backend_role.py +18 -14
- pulumi_vault/azure/get_access_credentials.py +4 -0
- pulumi_vault/cert_auth_backend_role.py +208 -75
- pulumi_vault/consul/secret_backend.py +18 -10
- pulumi_vault/consul/secret_backend_role.py +4 -2
- pulumi_vault/database/_inputs.py +784 -522
- pulumi_vault/database/outputs.py +784 -522
- pulumi_vault/database/secret_backend_connection.py +4 -2
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +8 -10
- pulumi_vault/database/secrets_mount.py +4 -4
- pulumi_vault/egp_policy.py +8 -4
- pulumi_vault/gcp/auth_backend.py +36 -0
- pulumi_vault/gcp/auth_backend_role.py +264 -63
- pulumi_vault/gcp/get_auth_backend_role.py +4 -0
- pulumi_vault/gcp/secret_backend.py +6 -4
- pulumi_vault/gcp/secret_impersonated_account.py +14 -12
- pulumi_vault/gcp/secret_roleset.py +6 -4
- pulumi_vault/gcp/secret_static_account.py +16 -14
- pulumi_vault/generic/endpoint.py +8 -4
- pulumi_vault/generic/get_secret.py +4 -40
- pulumi_vault/get_auth_backend.py +4 -0
- pulumi_vault/get_auth_backends.py +8 -0
- pulumi_vault/get_namespace.py +12 -0
- pulumi_vault/get_namespaces.py +12 -4
- pulumi_vault/get_nomad_access_token.py +4 -0
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +4 -0
- pulumi_vault/github/auth_backend.py +4 -0
- pulumi_vault/github/team.py +6 -2
- pulumi_vault/github/user.py +6 -2
- pulumi_vault/identity/entity.py +8 -6
- pulumi_vault/identity/entity_alias.py +8 -6
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +4 -0
- pulumi_vault/identity/get_group.py +4 -0
- pulumi_vault/identity/get_oidc_client_creds.py +4 -2
- pulumi_vault/identity/get_oidc_openid_config.py +6 -10
- pulumi_vault/identity/get_oidc_public_keys.py +6 -10
- pulumi_vault/identity/group.py +42 -38
- pulumi_vault/identity/group_alias.py +4 -2
- pulumi_vault/identity/group_member_entity_ids.py +16 -12
- pulumi_vault/identity/group_member_group_ids.py +20 -24
- pulumi_vault/identity/group_policies.py +8 -4
- pulumi_vault/identity/mfa_duo.py +8 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +8 -4
- pulumi_vault/identity/mfa_pingid.py +4 -0
- pulumi_vault/identity/mfa_totp.py +4 -0
- pulumi_vault/identity/oidc.py +4 -0
- pulumi_vault/identity/oidc_assignment.py +6 -10
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +12 -16
- pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
- pulumi_vault/identity/oidc_provider.py +16 -22
- pulumi_vault/identity/oidc_role.py +20 -28
- pulumi_vault/identity/oidc_scope.py +8 -6
- pulumi_vault/jwt/auth_backend.py +32 -20
- pulumi_vault/jwt/auth_backend_role.py +190 -63
- pulumi_vault/kmip/secret_backend.py +14 -10
- pulumi_vault/kmip/secret_role.py +4 -0
- pulumi_vault/kmip/secret_scope.py +4 -0
- pulumi_vault/kubernetes/auth_backend_config.py +4 -0
- pulumi_vault/kubernetes/auth_backend_role.py +172 -56
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +8 -6
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +4 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
- pulumi_vault/kv/get_secret_v2.py +0 -58
- pulumi_vault/kv/get_secrets_list.py +8 -4
- pulumi_vault/kv/get_secrets_list_v2.py +12 -14
- pulumi_vault/kv/secret.py +4 -0
- pulumi_vault/kv/secret_backend_v2.py +4 -0
- pulumi_vault/kv/secret_v2.py +4 -2
- pulumi_vault/ldap/auth_backend.py +161 -66
- pulumi_vault/ldap/auth_backend_group.py +4 -0
- pulumi_vault/ldap/auth_backend_user.py +4 -0
- pulumi_vault/ldap/secret_backend.py +8 -4
- pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
- pulumi_vault/ldap/secret_backend_library_set.py +4 -2
- pulumi_vault/ldap/secret_backend_static_role.py +4 -0
- pulumi_vault/managed/_inputs.py +132 -84
- pulumi_vault/managed/keys.py +28 -7
- pulumi_vault/managed/outputs.py +132 -84
- pulumi_vault/mfa_duo.py +6 -4
- pulumi_vault/mfa_okta.py +6 -4
- pulumi_vault/mfa_pingid.py +6 -4
- pulumi_vault/mfa_totp.py +12 -10
- pulumi_vault/mongodbatlas/secret_backend.py +4 -0
- pulumi_vault/mongodbatlas/secret_role.py +4 -2
- pulumi_vault/mount.py +42 -26
- pulumi_vault/nomad_secret_backend.py +8 -4
- pulumi_vault/nomad_secret_role.py +4 -0
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +10 -6
- pulumi_vault/okta/auth_backend_group.py +4 -0
- pulumi_vault/okta/auth_backend_user.py +4 -0
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +20 -0
- pulumi_vault/password_policy.py +8 -6
- pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
- pulumi_vault/pkisecret/get_backend_key.py +6 -2
- pulumi_vault/pkisecret/get_backend_keys.py +4 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
- pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
- pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
- pulumi_vault/pkisecret/secret_backend_role.py +4 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
- pulumi_vault/provider.py +8 -0
- pulumi_vault/pulumi-plugin.json +1 -2
- pulumi_vault/quota_lease_count.py +8 -6
- pulumi_vault/quota_rate_limit.py +4 -2
- pulumi_vault/rabbitmq/secret_backend.py +8 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
- pulumi_vault/raft_autopilot.py +4 -0
- pulumi_vault/raft_snapshot_agent_config.py +304 -109
- pulumi_vault/rgp_policy.py +6 -2
- pulumi_vault/saml/auth_backend.py +12 -8
- pulumi_vault/saml/auth_backend_role.py +178 -64
- pulumi_vault/secrets/sync_association.py +10 -12
- pulumi_vault/secrets/sync_aws_destination.py +8 -6
- pulumi_vault/secrets/sync_azure_destination.py +12 -10
- pulumi_vault/secrets/sync_config.py +6 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +8 -6
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +8 -6
- pulumi_vault/ssh/_inputs.py +32 -6
- pulumi_vault/ssh/outputs.py +32 -6
- pulumi_vault/ssh/secret_backend_ca.py +4 -0
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +56 -0
- pulumi_vault/terraformcloud/secret_creds.py +17 -2
- pulumi_vault/terraformcloud/secret_role.py +69 -2
- pulumi_vault/token.py +18 -14
- pulumi_vault/tokenauth/auth_backend_role.py +180 -64
- pulumi_vault/transform/alphabet.py +6 -4
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +6 -4
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +20 -4
- pulumi_vault/transit/get_encrypt.py +14 -0
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +4 -0
- {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
- pulumi_vault-6.1.1a1717550614.dist-info/RECORD +0 -252
- {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -78,14 +78,27 @@ class AuthBackendArgs:
|
|
78
78
|
:param pulumi.Input[bool] starttls: Control use of TLS when conecting to LDAP
|
79
79
|
:param pulumi.Input[str] tls_max_version: Maximum acceptable version of TLS
|
80
80
|
:param pulumi.Input[str] tls_min_version: Minimum acceptable version of TLS
|
81
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
82
|
-
|
83
|
-
|
84
|
-
:param pulumi.Input[
|
85
|
-
|
86
|
-
|
87
|
-
|
88
|
-
:param pulumi.Input[int]
|
81
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
82
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
83
|
+
as well.
|
84
|
+
:param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
|
85
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
86
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
87
|
+
`token_max_ttl` would otherwise allow a renewal.
|
88
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
89
|
+
Its current value will be referenced at renewal time.
|
90
|
+
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
91
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
92
|
+
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/ldap#token_num_uses)
|
93
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
94
|
+
:param pulumi.Input[int] token_period: If set, indicates that the
|
95
|
+
token generated using this role should never expire. The token should be renewed within the
|
96
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
97
|
+
value of this field. Specified in seconds.
|
98
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
99
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
100
|
+
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
101
|
+
Its current value will be referenced at renewal time.
|
89
102
|
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
90
103
|
:param pulumi.Input[str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
|
91
104
|
:param pulumi.Input[bool] use_token_groups: Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
|
@@ -435,7 +448,9 @@ class AuthBackendArgs:
|
|
435
448
|
@pulumi.getter(name="tokenBoundCidrs")
|
436
449
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
437
450
|
"""
|
438
|
-
|
451
|
+
List of CIDR blocks; if set, specifies blocks of IP
|
452
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
453
|
+
as well.
|
439
454
|
"""
|
440
455
|
return pulumi.get(self, "token_bound_cidrs")
|
441
456
|
|
@@ -447,7 +462,10 @@ class AuthBackendArgs:
|
|
447
462
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
448
463
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
449
464
|
"""
|
450
|
-
|
465
|
+
If set, will encode an
|
466
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
467
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
468
|
+
`token_max_ttl` would otherwise allow a renewal.
|
451
469
|
"""
|
452
470
|
return pulumi.get(self, "token_explicit_max_ttl")
|
453
471
|
|
@@ -459,7 +477,8 @@ class AuthBackendArgs:
|
|
459
477
|
@pulumi.getter(name="tokenMaxTtl")
|
460
478
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
461
479
|
"""
|
462
|
-
The maximum lifetime
|
480
|
+
The maximum lifetime for generated tokens in number of seconds.
|
481
|
+
Its current value will be referenced at renewal time.
|
463
482
|
"""
|
464
483
|
return pulumi.get(self, "token_max_ttl")
|
465
484
|
|
@@ -471,7 +490,8 @@ class AuthBackendArgs:
|
|
471
490
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
472
491
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
473
492
|
"""
|
474
|
-
If
|
493
|
+
If set, the default policy will not be set on
|
494
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
475
495
|
"""
|
476
496
|
return pulumi.get(self, "token_no_default_policy")
|
477
497
|
|
@@ -483,7 +503,8 @@ class AuthBackendArgs:
|
|
483
503
|
@pulumi.getter(name="tokenNumUses")
|
484
504
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
485
505
|
"""
|
486
|
-
The maximum number
|
506
|
+
The [maximum number](https://www.vaultproject.io/api-docs/ldap#token_num_uses)
|
507
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
487
508
|
"""
|
488
509
|
return pulumi.get(self, "token_num_uses")
|
489
510
|
|
@@ -495,7 +516,10 @@ class AuthBackendArgs:
|
|
495
516
|
@pulumi.getter(name="tokenPeriod")
|
496
517
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
497
518
|
"""
|
498
|
-
|
519
|
+
If set, indicates that the
|
520
|
+
token generated using this role should never expire. The token should be renewed within the
|
521
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
522
|
+
value of this field. Specified in seconds.
|
499
523
|
"""
|
500
524
|
return pulumi.get(self, "token_period")
|
501
525
|
|
@@ -507,7 +531,8 @@ class AuthBackendArgs:
|
|
507
531
|
@pulumi.getter(name="tokenPolicies")
|
508
532
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
509
533
|
"""
|
510
|
-
|
534
|
+
List of policies to encode onto generated tokens. Depending
|
535
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
511
536
|
"""
|
512
537
|
return pulumi.get(self, "token_policies")
|
513
538
|
|
@@ -519,7 +544,8 @@ class AuthBackendArgs:
|
|
519
544
|
@pulumi.getter(name="tokenTtl")
|
520
545
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
521
546
|
"""
|
522
|
-
The
|
547
|
+
The incremental lifetime for generated tokens in number of seconds.
|
548
|
+
Its current value will be referenced at renewal time.
|
523
549
|
"""
|
524
550
|
return pulumi.get(self, "token_ttl")
|
525
551
|
|
@@ -680,14 +706,27 @@ class _AuthBackendState:
|
|
680
706
|
:param pulumi.Input[bool] starttls: Control use of TLS when conecting to LDAP
|
681
707
|
:param pulumi.Input[str] tls_max_version: Maximum acceptable version of TLS
|
682
708
|
:param pulumi.Input[str] tls_min_version: Minimum acceptable version of TLS
|
683
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
684
|
-
|
685
|
-
|
686
|
-
:param pulumi.Input[
|
687
|
-
|
688
|
-
|
689
|
-
|
690
|
-
:param pulumi.Input[int]
|
709
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
710
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
711
|
+
as well.
|
712
|
+
:param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
|
713
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
714
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
715
|
+
`token_max_ttl` would otherwise allow a renewal.
|
716
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
717
|
+
Its current value will be referenced at renewal time.
|
718
|
+
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
719
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
720
|
+
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/ldap#token_num_uses)
|
721
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
722
|
+
:param pulumi.Input[int] token_period: If set, indicates that the
|
723
|
+
token generated using this role should never expire. The token should be renewed within the
|
724
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
725
|
+
value of this field. Specified in seconds.
|
726
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
727
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
728
|
+
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
729
|
+
Its current value will be referenced at renewal time.
|
691
730
|
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
692
731
|
:param pulumi.Input[str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
|
693
732
|
:param pulumi.Input[str] url: The URL of the LDAP server
|
@@ -1041,7 +1080,9 @@ class _AuthBackendState:
|
|
1041
1080
|
@pulumi.getter(name="tokenBoundCidrs")
|
1042
1081
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
1043
1082
|
"""
|
1044
|
-
|
1083
|
+
List of CIDR blocks; if set, specifies blocks of IP
|
1084
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
1085
|
+
as well.
|
1045
1086
|
"""
|
1046
1087
|
return pulumi.get(self, "token_bound_cidrs")
|
1047
1088
|
|
@@ -1053,7 +1094,10 @@ class _AuthBackendState:
|
|
1053
1094
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
1054
1095
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
1055
1096
|
"""
|
1056
|
-
|
1097
|
+
If set, will encode an
|
1098
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
1099
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1100
|
+
`token_max_ttl` would otherwise allow a renewal.
|
1057
1101
|
"""
|
1058
1102
|
return pulumi.get(self, "token_explicit_max_ttl")
|
1059
1103
|
|
@@ -1065,7 +1109,8 @@ class _AuthBackendState:
|
|
1065
1109
|
@pulumi.getter(name="tokenMaxTtl")
|
1066
1110
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
1067
1111
|
"""
|
1068
|
-
The maximum lifetime
|
1112
|
+
The maximum lifetime for generated tokens in number of seconds.
|
1113
|
+
Its current value will be referenced at renewal time.
|
1069
1114
|
"""
|
1070
1115
|
return pulumi.get(self, "token_max_ttl")
|
1071
1116
|
|
@@ -1077,7 +1122,8 @@ class _AuthBackendState:
|
|
1077
1122
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
1078
1123
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
1079
1124
|
"""
|
1080
|
-
If
|
1125
|
+
If set, the default policy will not be set on
|
1126
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1081
1127
|
"""
|
1082
1128
|
return pulumi.get(self, "token_no_default_policy")
|
1083
1129
|
|
@@ -1089,7 +1135,8 @@ class _AuthBackendState:
|
|
1089
1135
|
@pulumi.getter(name="tokenNumUses")
|
1090
1136
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
1091
1137
|
"""
|
1092
|
-
The maximum number
|
1138
|
+
The [maximum number](https://www.vaultproject.io/api-docs/ldap#token_num_uses)
|
1139
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1093
1140
|
"""
|
1094
1141
|
return pulumi.get(self, "token_num_uses")
|
1095
1142
|
|
@@ -1101,7 +1148,10 @@ class _AuthBackendState:
|
|
1101
1148
|
@pulumi.getter(name="tokenPeriod")
|
1102
1149
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
1103
1150
|
"""
|
1104
|
-
|
1151
|
+
If set, indicates that the
|
1152
|
+
token generated using this role should never expire. The token should be renewed within the
|
1153
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1154
|
+
value of this field. Specified in seconds.
|
1105
1155
|
"""
|
1106
1156
|
return pulumi.get(self, "token_period")
|
1107
1157
|
|
@@ -1113,7 +1163,8 @@ class _AuthBackendState:
|
|
1113
1163
|
@pulumi.getter(name="tokenPolicies")
|
1114
1164
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
1115
1165
|
"""
|
1116
|
-
|
1166
|
+
List of policies to encode onto generated tokens. Depending
|
1167
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
1117
1168
|
"""
|
1118
1169
|
return pulumi.get(self, "token_policies")
|
1119
1170
|
|
@@ -1125,7 +1176,8 @@ class _AuthBackendState:
|
|
1125
1176
|
@pulumi.getter(name="tokenTtl")
|
1126
1177
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
1127
1178
|
"""
|
1128
|
-
The
|
1179
|
+
The incremental lifetime for generated tokens in number of seconds.
|
1180
|
+
Its current value will be referenced at renewal time.
|
1129
1181
|
"""
|
1130
1182
|
return pulumi.get(self, "token_ttl")
|
1131
1183
|
|
@@ -1278,20 +1330,22 @@ class AuthBackend(pulumi.CustomResource):
|
|
1278
1330
|
|
1279
1331
|
## Example Usage
|
1280
1332
|
|
1333
|
+
<!--Start PulumiCodeChooser -->
|
1281
1334
|
```python
|
1282
1335
|
import pulumi
|
1283
1336
|
import pulumi_vault as vault
|
1284
1337
|
|
1285
1338
|
ldap = vault.ldap.AuthBackend("ldap",
|
1339
|
+
discoverdn=False,
|
1340
|
+
groupdn="OU=Groups,DC=example,DC=org",
|
1341
|
+
groupfilter="(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}}))",
|
1286
1342
|
path="ldap",
|
1343
|
+
upndomain="EXAMPLE.ORG",
|
1287
1344
|
url="ldaps://dc-01.example.org",
|
1288
|
-
userdn="OU=Users,OU=Accounts,DC=example,DC=org",
|
1289
1345
|
userattr="sAMAccountName",
|
1290
|
-
|
1291
|
-
discoverdn=False,
|
1292
|
-
groupdn="OU=Groups,DC=example,DC=org",
|
1293
|
-
groupfilter="(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}}))")
|
1346
|
+
userdn="OU=Users,OU=Accounts,DC=example,DC=org")
|
1294
1347
|
```
|
1348
|
+
<!--End PulumiCodeChooser -->
|
1295
1349
|
|
1296
1350
|
## Import
|
1297
1351
|
|
@@ -1327,14 +1381,27 @@ class AuthBackend(pulumi.CustomResource):
|
|
1327
1381
|
:param pulumi.Input[bool] starttls: Control use of TLS when conecting to LDAP
|
1328
1382
|
:param pulumi.Input[str] tls_max_version: Maximum acceptable version of TLS
|
1329
1383
|
:param pulumi.Input[str] tls_min_version: Minimum acceptable version of TLS
|
1330
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
1331
|
-
|
1332
|
-
|
1333
|
-
:param pulumi.Input[
|
1334
|
-
|
1335
|
-
|
1336
|
-
|
1337
|
-
:param pulumi.Input[int]
|
1384
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
1385
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
1386
|
+
as well.
|
1387
|
+
:param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
|
1388
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
1389
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1390
|
+
`token_max_ttl` would otherwise allow a renewal.
|
1391
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
1392
|
+
Its current value will be referenced at renewal time.
|
1393
|
+
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
1394
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1395
|
+
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/ldap#token_num_uses)
|
1396
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1397
|
+
:param pulumi.Input[int] token_period: If set, indicates that the
|
1398
|
+
token generated using this role should never expire. The token should be renewed within the
|
1399
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1400
|
+
value of this field. Specified in seconds.
|
1401
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
1402
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
1403
|
+
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
1404
|
+
Its current value will be referenced at renewal time.
|
1338
1405
|
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
1339
1406
|
:param pulumi.Input[str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
|
1340
1407
|
:param pulumi.Input[str] url: The URL of the LDAP server
|
@@ -1355,20 +1422,22 @@ class AuthBackend(pulumi.CustomResource):
|
|
1355
1422
|
|
1356
1423
|
## Example Usage
|
1357
1424
|
|
1425
|
+
<!--Start PulumiCodeChooser -->
|
1358
1426
|
```python
|
1359
1427
|
import pulumi
|
1360
1428
|
import pulumi_vault as vault
|
1361
1429
|
|
1362
1430
|
ldap = vault.ldap.AuthBackend("ldap",
|
1431
|
+
discoverdn=False,
|
1432
|
+
groupdn="OU=Groups,DC=example,DC=org",
|
1433
|
+
groupfilter="(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}}))",
|
1363
1434
|
path="ldap",
|
1435
|
+
upndomain="EXAMPLE.ORG",
|
1364
1436
|
url="ldaps://dc-01.example.org",
|
1365
|
-
userdn="OU=Users,OU=Accounts,DC=example,DC=org",
|
1366
1437
|
userattr="sAMAccountName",
|
1367
|
-
|
1368
|
-
discoverdn=False,
|
1369
|
-
groupdn="OU=Groups,DC=example,DC=org",
|
1370
|
-
groupfilter="(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}}))")
|
1438
|
+
userdn="OU=Users,OU=Accounts,DC=example,DC=org")
|
1371
1439
|
```
|
1440
|
+
<!--End PulumiCodeChooser -->
|
1372
1441
|
|
1373
1442
|
## Import
|
1374
1443
|
|
@@ -1561,14 +1630,27 @@ class AuthBackend(pulumi.CustomResource):
|
|
1561
1630
|
:param pulumi.Input[bool] starttls: Control use of TLS when conecting to LDAP
|
1562
1631
|
:param pulumi.Input[str] tls_max_version: Maximum acceptable version of TLS
|
1563
1632
|
:param pulumi.Input[str] tls_min_version: Minimum acceptable version of TLS
|
1564
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
1565
|
-
|
1566
|
-
|
1567
|
-
:param pulumi.Input[
|
1568
|
-
|
1569
|
-
|
1570
|
-
|
1571
|
-
:param pulumi.Input[int]
|
1633
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
1634
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
1635
|
+
as well.
|
1636
|
+
:param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
|
1637
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
1638
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1639
|
+
`token_max_ttl` would otherwise allow a renewal.
|
1640
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
1641
|
+
Its current value will be referenced at renewal time.
|
1642
|
+
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
1643
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1644
|
+
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/ldap#token_num_uses)
|
1645
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1646
|
+
:param pulumi.Input[int] token_period: If set, indicates that the
|
1647
|
+
token generated using this role should never expire. The token should be renewed within the
|
1648
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1649
|
+
value of this field. Specified in seconds.
|
1650
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
1651
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
1652
|
+
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
1653
|
+
Its current value will be referenced at renewal time.
|
1572
1654
|
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
1573
1655
|
:param pulumi.Input[str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
|
1574
1656
|
:param pulumi.Input[str] url: The URL of the LDAP server
|
@@ -1801,7 +1883,9 @@ class AuthBackend(pulumi.CustomResource):
|
|
1801
1883
|
@pulumi.getter(name="tokenBoundCidrs")
|
1802
1884
|
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1803
1885
|
"""
|
1804
|
-
|
1886
|
+
List of CIDR blocks; if set, specifies blocks of IP
|
1887
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
1888
|
+
as well.
|
1805
1889
|
"""
|
1806
1890
|
return pulumi.get(self, "token_bound_cidrs")
|
1807
1891
|
|
@@ -1809,7 +1893,10 @@ class AuthBackend(pulumi.CustomResource):
|
|
1809
1893
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
1810
1894
|
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1811
1895
|
"""
|
1812
|
-
|
1896
|
+
If set, will encode an
|
1897
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
1898
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1899
|
+
`token_max_ttl` would otherwise allow a renewal.
|
1813
1900
|
"""
|
1814
1901
|
return pulumi.get(self, "token_explicit_max_ttl")
|
1815
1902
|
|
@@ -1817,7 +1904,8 @@ class AuthBackend(pulumi.CustomResource):
|
|
1817
1904
|
@pulumi.getter(name="tokenMaxTtl")
|
1818
1905
|
def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1819
1906
|
"""
|
1820
|
-
The maximum lifetime
|
1907
|
+
The maximum lifetime for generated tokens in number of seconds.
|
1908
|
+
Its current value will be referenced at renewal time.
|
1821
1909
|
"""
|
1822
1910
|
return pulumi.get(self, "token_max_ttl")
|
1823
1911
|
|
@@ -1825,7 +1913,8 @@ class AuthBackend(pulumi.CustomResource):
|
|
1825
1913
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
1826
1914
|
def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
|
1827
1915
|
"""
|
1828
|
-
If
|
1916
|
+
If set, the default policy will not be set on
|
1917
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1829
1918
|
"""
|
1830
1919
|
return pulumi.get(self, "token_no_default_policy")
|
1831
1920
|
|
@@ -1833,7 +1922,8 @@ class AuthBackend(pulumi.CustomResource):
|
|
1833
1922
|
@pulumi.getter(name="tokenNumUses")
|
1834
1923
|
def token_num_uses(self) -> pulumi.Output[Optional[int]]:
|
1835
1924
|
"""
|
1836
|
-
The maximum number
|
1925
|
+
The [maximum number](https://www.vaultproject.io/api-docs/ldap#token_num_uses)
|
1926
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1837
1927
|
"""
|
1838
1928
|
return pulumi.get(self, "token_num_uses")
|
1839
1929
|
|
@@ -1841,7 +1931,10 @@ class AuthBackend(pulumi.CustomResource):
|
|
1841
1931
|
@pulumi.getter(name="tokenPeriod")
|
1842
1932
|
def token_period(self) -> pulumi.Output[Optional[int]]:
|
1843
1933
|
"""
|
1844
|
-
|
1934
|
+
If set, indicates that the
|
1935
|
+
token generated using this role should never expire. The token should be renewed within the
|
1936
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1937
|
+
value of this field. Specified in seconds.
|
1845
1938
|
"""
|
1846
1939
|
return pulumi.get(self, "token_period")
|
1847
1940
|
|
@@ -1849,7 +1942,8 @@ class AuthBackend(pulumi.CustomResource):
|
|
1849
1942
|
@pulumi.getter(name="tokenPolicies")
|
1850
1943
|
def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1851
1944
|
"""
|
1852
|
-
|
1945
|
+
List of policies to encode onto generated tokens. Depending
|
1946
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
1853
1947
|
"""
|
1854
1948
|
return pulumi.get(self, "token_policies")
|
1855
1949
|
|
@@ -1857,7 +1951,8 @@ class AuthBackend(pulumi.CustomResource):
|
|
1857
1951
|
@pulumi.getter(name="tokenTtl")
|
1858
1952
|
def token_ttl(self) -> pulumi.Output[Optional[int]]:
|
1859
1953
|
"""
|
1860
|
-
The
|
1954
|
+
The incremental lifetime for generated tokens in number of seconds.
|
1955
|
+
Its current value will be referenced at renewal time.
|
1861
1956
|
"""
|
1862
1957
|
return pulumi.get(self, "token_ttl")
|
1863
1958
|
|
@@ -189,6 +189,7 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
189
189
|
|
190
190
|
## Example Usage
|
191
191
|
|
192
|
+
<!--Start PulumiCodeChooser -->
|
192
193
|
```python
|
193
194
|
import pulumi
|
194
195
|
import pulumi_vault as vault
|
@@ -207,6 +208,7 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
207
208
|
policies=["dba"],
|
208
209
|
backend=ldap.path)
|
209
210
|
```
|
211
|
+
<!--End PulumiCodeChooser -->
|
210
212
|
|
211
213
|
## Import
|
212
214
|
|
@@ -239,6 +241,7 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
239
241
|
|
240
242
|
## Example Usage
|
241
243
|
|
244
|
+
<!--Start PulumiCodeChooser -->
|
242
245
|
```python
|
243
246
|
import pulumi
|
244
247
|
import pulumi_vault as vault
|
@@ -257,6 +260,7 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
257
260
|
policies=["dba"],
|
258
261
|
backend=ldap.path)
|
259
262
|
```
|
263
|
+
<!--End PulumiCodeChooser -->
|
260
264
|
|
261
265
|
## Import
|
262
266
|
|
@@ -222,6 +222,7 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
222
222
|
|
223
223
|
## Example Usage
|
224
224
|
|
225
|
+
<!--Start PulumiCodeChooser -->
|
225
226
|
```python
|
226
227
|
import pulumi
|
227
228
|
import pulumi_vault as vault
|
@@ -243,6 +244,7 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
243
244
|
],
|
244
245
|
backend=ldap.path)
|
245
246
|
```
|
247
|
+
<!--End PulumiCodeChooser -->
|
246
248
|
|
247
249
|
## Import
|
248
250
|
|
@@ -276,6 +278,7 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
276
278
|
|
277
279
|
## Example Usage
|
278
280
|
|
281
|
+
<!--Start PulumiCodeChooser -->
|
279
282
|
```python
|
280
283
|
import pulumi
|
281
284
|
import pulumi_vault as vault
|
@@ -297,6 +300,7 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
297
300
|
],
|
298
301
|
backend=ldap.path)
|
299
302
|
```
|
303
|
+
<!--End PulumiCodeChooser -->
|
300
304
|
|
301
305
|
## Import
|
302
306
|
|
@@ -1051,18 +1051,20 @@ class SecretBackend(pulumi.CustomResource):
|
|
1051
1051
|
"""
|
1052
1052
|
## Example Usage
|
1053
1053
|
|
1054
|
+
<!--Start PulumiCodeChooser -->
|
1054
1055
|
```python
|
1055
1056
|
import pulumi
|
1056
1057
|
import pulumi_vault as vault
|
1057
1058
|
|
1058
1059
|
config = vault.ldap.SecretBackend("config",
|
1059
|
-
path="my-custom-ldap",
|
1060
1060
|
binddn="CN=Administrator,CN=Users,DC=corp,DC=example,DC=net",
|
1061
1061
|
bindpass="SuperSecretPassw0rd",
|
1062
|
-
url="ldaps://localhost",
|
1063
1062
|
insecure_tls=True,
|
1063
|
+
path="my-custom-ldap",
|
1064
|
+
url="ldaps://localhost",
|
1064
1065
|
userdn="CN=Users,DC=corp,DC=example,DC=net")
|
1065
1066
|
```
|
1067
|
+
<!--End PulumiCodeChooser -->
|
1066
1068
|
|
1067
1069
|
## Import
|
1068
1070
|
|
@@ -1124,18 +1126,20 @@ class SecretBackend(pulumi.CustomResource):
|
|
1124
1126
|
"""
|
1125
1127
|
## Example Usage
|
1126
1128
|
|
1129
|
+
<!--Start PulumiCodeChooser -->
|
1127
1130
|
```python
|
1128
1131
|
import pulumi
|
1129
1132
|
import pulumi_vault as vault
|
1130
1133
|
|
1131
1134
|
config = vault.ldap.SecretBackend("config",
|
1132
|
-
path="my-custom-ldap",
|
1133
1135
|
binddn="CN=Administrator,CN=Users,DC=corp,DC=example,DC=net",
|
1134
1136
|
bindpass="SuperSecretPassw0rd",
|
1135
|
-
url="ldaps://localhost",
|
1136
1137
|
insecure_tls=True,
|
1138
|
+
path="my-custom-ldap",
|
1139
|
+
url="ldaps://localhost",
|
1137
1140
|
userdn="CN=Users,DC=corp,DC=example,DC=net")
|
1138
1141
|
```
|
1142
|
+
<!--End PulumiCodeChooser -->
|
1139
1143
|
|
1140
1144
|
## Import
|
1141
1145
|
|
@@ -422,6 +422,7 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
|
|
422
422
|
"""
|
423
423
|
## Example Usage
|
424
424
|
|
425
|
+
<!--Start PulumiCodeChooser -->
|
425
426
|
```python
|
426
427
|
import pulumi
|
427
428
|
import pulumi_vault as vault
|
@@ -450,6 +451,7 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
|
|
450
451
|
changetype: delete
|
451
452
|
\"\"\")
|
452
453
|
```
|
454
|
+
<!--End PulumiCodeChooser -->
|
453
455
|
|
454
456
|
## Import
|
455
457
|
|
@@ -504,6 +506,7 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
|
|
504
506
|
"""
|
505
507
|
## Example Usage
|
506
508
|
|
509
|
+
<!--Start PulumiCodeChooser -->
|
507
510
|
```python
|
508
511
|
import pulumi
|
509
512
|
import pulumi_vault as vault
|
@@ -532,6 +535,7 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
|
|
532
535
|
changetype: delete
|
533
536
|
\"\"\")
|
534
537
|
```
|
538
|
+
<!--End PulumiCodeChooser -->
|
535
539
|
|
536
540
|
## Import
|
537
541
|
|
@@ -298,6 +298,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
298
298
|
"""
|
299
299
|
## Example Usage
|
300
300
|
|
301
|
+
<!--Start PulumiCodeChooser -->
|
301
302
|
```python
|
302
303
|
import pulumi
|
303
304
|
import pulumi_vault as vault
|
@@ -311,7 +312,6 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
311
312
|
userdn="CN=Users,DC=corp,DC=example,DC=net")
|
312
313
|
qa = vault.ldap.SecretBackendLibrarySet("qa",
|
313
314
|
mount=config.path,
|
314
|
-
name="qa",
|
315
315
|
service_account_names=[
|
316
316
|
"Bob",
|
317
317
|
"Mary",
|
@@ -320,6 +320,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
320
320
|
disable_check_in_enforcement=True,
|
321
321
|
max_ttl=120)
|
322
322
|
```
|
323
|
+
<!--End PulumiCodeChooser -->
|
323
324
|
|
324
325
|
## Import
|
325
326
|
|
@@ -356,6 +357,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
356
357
|
"""
|
357
358
|
## Example Usage
|
358
359
|
|
360
|
+
<!--Start PulumiCodeChooser -->
|
359
361
|
```python
|
360
362
|
import pulumi
|
361
363
|
import pulumi_vault as vault
|
@@ -369,7 +371,6 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
369
371
|
userdn="CN=Users,DC=corp,DC=example,DC=net")
|
370
372
|
qa = vault.ldap.SecretBackendLibrarySet("qa",
|
371
373
|
mount=config.path,
|
372
|
-
name="qa",
|
373
374
|
service_account_names=[
|
374
375
|
"Bob",
|
375
376
|
"Mary",
|
@@ -378,6 +379,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
378
379
|
disable_check_in_enforcement=True,
|
379
380
|
max_ttl=120)
|
380
381
|
```
|
382
|
+
<!--End PulumiCodeChooser -->
|
381
383
|
|
382
384
|
## Import
|
383
385
|
|