pulumi-vault 6.2.0a1713339773__py3-none-any.whl → 6.2.0a1713905519__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -20
- pulumi_vault/ad/secret_backend.py +2 -6
- pulumi_vault/ad/secret_library.py +2 -4
- pulumi_vault/ad/secret_role.py +0 -4
- pulumi_vault/alicloud/auth_backend_role.py +69 -192
- pulumi_vault/approle/auth_backend_login.py +0 -4
- pulumi_vault/approle/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
- pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
- pulumi_vault/audit.py +12 -20
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/aws/auth_backend_client.py +6 -10
- pulumi_vault/aws/auth_backend_config_identity.py +0 -4
- pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
- pulumi_vault/aws/auth_backend_role.py +63 -186
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
- pulumi_vault/aws/auth_backend_sts_role.py +0 -4
- pulumi_vault/aws/secret_backend_role.py +2 -4
- pulumi_vault/aws/secret_backend_static_role.py +2 -4
- pulumi_vault/azure/auth_backend_config.py +6 -10
- pulumi_vault/azure/auth_backend_role.py +63 -186
- pulumi_vault/azure/backend.py +16 -24
- pulumi_vault/azure/backend_role.py +14 -18
- pulumi_vault/azure/get_access_credentials.py +0 -4
- pulumi_vault/cert_auth_backend_role.py +75 -208
- pulumi_vault/consul/secret_backend.py +10 -18
- pulumi_vault/consul/secret_backend_role.py +2 -4
- pulumi_vault/database/_inputs.py +522 -784
- pulumi_vault/database/outputs.py +522 -784
- pulumi_vault/database/secret_backend_connection.py +2 -4
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +10 -8
- pulumi_vault/database/secrets_mount.py +4 -4
- pulumi_vault/egp_policy.py +4 -8
- pulumi_vault/gcp/auth_backend.py +0 -36
- pulumi_vault/gcp/auth_backend_role.py +63 -264
- pulumi_vault/gcp/get_auth_backend_role.py +0 -4
- pulumi_vault/gcp/secret_backend.py +4 -6
- pulumi_vault/gcp/secret_impersonated_account.py +12 -14
- pulumi_vault/gcp/secret_roleset.py +4 -6
- pulumi_vault/gcp/secret_static_account.py +14 -16
- pulumi_vault/generic/endpoint.py +4 -8
- pulumi_vault/generic/get_secret.py +40 -4
- pulumi_vault/get_auth_backend.py +0 -4
- pulumi_vault/get_auth_backends.py +0 -8
- pulumi_vault/get_namespace.py +0 -12
- pulumi_vault/get_namespaces.py +4 -12
- pulumi_vault/get_nomad_access_token.py +0 -4
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +0 -4
- pulumi_vault/github/auth_backend.py +0 -4
- pulumi_vault/github/team.py +2 -6
- pulumi_vault/github/user.py +2 -6
- pulumi_vault/identity/entity.py +6 -8
- pulumi_vault/identity/entity_alias.py +6 -8
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +0 -4
- pulumi_vault/identity/get_group.py +0 -4
- pulumi_vault/identity/get_oidc_client_creds.py +2 -4
- pulumi_vault/identity/get_oidc_openid_config.py +10 -6
- pulumi_vault/identity/get_oidc_public_keys.py +10 -6
- pulumi_vault/identity/group.py +38 -42
- pulumi_vault/identity/group_alias.py +2 -4
- pulumi_vault/identity/group_member_entity_ids.py +12 -16
- pulumi_vault/identity/group_member_group_ids.py +24 -20
- pulumi_vault/identity/group_policies.py +4 -8
- pulumi_vault/identity/mfa_duo.py +4 -8
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +4 -8
- pulumi_vault/identity/mfa_pingid.py +0 -4
- pulumi_vault/identity/mfa_totp.py +0 -4
- pulumi_vault/identity/oidc.py +0 -4
- pulumi_vault/identity/oidc_assignment.py +10 -6
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +16 -12
- pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
- pulumi_vault/identity/oidc_provider.py +22 -16
- pulumi_vault/identity/oidc_role.py +28 -20
- pulumi_vault/identity/oidc_scope.py +6 -8
- pulumi_vault/jwt/auth_backend.py +20 -32
- pulumi_vault/jwt/auth_backend_role.py +63 -190
- pulumi_vault/kmip/secret_backend.py +10 -14
- pulumi_vault/kmip/secret_role.py +0 -4
- pulumi_vault/kmip/secret_scope.py +0 -4
- pulumi_vault/kubernetes/auth_backend_config.py +0 -4
- pulumi_vault/kubernetes/auth_backend_role.py +56 -172
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +6 -8
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +0 -4
- pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
- pulumi_vault/kv/get_secret_v2.py +58 -0
- pulumi_vault/kv/get_secrets_list.py +4 -8
- pulumi_vault/kv/get_secrets_list_v2.py +14 -12
- pulumi_vault/kv/secret.py +0 -4
- pulumi_vault/kv/secret_backend_v2.py +0 -4
- pulumi_vault/kv/secret_v2.py +2 -4
- pulumi_vault/ldap/auth_backend.py +66 -161
- pulumi_vault/ldap/auth_backend_group.py +0 -4
- pulumi_vault/ldap/auth_backend_user.py +0 -4
- pulumi_vault/ldap/secret_backend.py +4 -8
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
- pulumi_vault/ldap/secret_backend_library_set.py +2 -4
- pulumi_vault/ldap/secret_backend_static_role.py +0 -4
- pulumi_vault/managed/_inputs.py +84 -132
- pulumi_vault/managed/keys.py +7 -28
- pulumi_vault/managed/outputs.py +84 -132
- pulumi_vault/mfa_duo.py +4 -6
- pulumi_vault/mfa_okta.py +4 -6
- pulumi_vault/mfa_pingid.py +4 -6
- pulumi_vault/mfa_totp.py +10 -12
- pulumi_vault/mongodbatlas/secret_backend.py +0 -4
- pulumi_vault/mongodbatlas/secret_role.py +2 -4
- pulumi_vault/mount.py +26 -42
- pulumi_vault/nomad_secret_backend.py +4 -8
- pulumi_vault/nomad_secret_role.py +0 -4
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +6 -10
- pulumi_vault/okta/auth_backend_group.py +0 -4
- pulumi_vault/okta/auth_backend_user.py +0 -4
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +0 -20
- pulumi_vault/password_policy.py +6 -8
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
- pulumi_vault/pkisecret/get_backend_key.py +2 -6
- pulumi_vault/pkisecret/get_backend_keys.py +0 -4
- pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
- pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
- pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/secret_backend_role.py +2 -4
- pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
- pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
- pulumi_vault/quota_lease_count.py +6 -8
- pulumi_vault/quota_rate_limit.py +2 -4
- pulumi_vault/rabbitmq/secret_backend.py +4 -8
- pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
- pulumi_vault/raft_autopilot.py +0 -4
- pulumi_vault/raft_snapshot_agent_config.py +109 -304
- pulumi_vault/rgp_policy.py +2 -6
- pulumi_vault/saml/auth_backend.py +8 -12
- pulumi_vault/saml/auth_backend_role.py +64 -178
- pulumi_vault/secrets/sync_association.py +12 -10
- pulumi_vault/secrets/sync_aws_destination.py +6 -8
- pulumi_vault/secrets/sync_azure_destination.py +10 -12
- pulumi_vault/secrets/sync_config.py +2 -6
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +6 -8
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +6 -8
- pulumi_vault/ssh/_inputs.py +6 -32
- pulumi_vault/ssh/outputs.py +6 -32
- pulumi_vault/ssh/secret_backend_ca.py +0 -4
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +0 -4
- pulumi_vault/terraformcloud/secret_creds.py +2 -4
- pulumi_vault/terraformcloud/secret_role.py +2 -4
- pulumi_vault/token.py +14 -18
- pulumi_vault/tokenauth/auth_backend_role.py +64 -180
- pulumi_vault/transform/alphabet.py +4 -6
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +4 -6
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +4 -20
- pulumi_vault/transit/get_encrypt.py +0 -14
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +0 -4
- {pulumi_vault-6.2.0a1713339773.dist-info → pulumi_vault-6.2.0a1713905519.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1713905519.dist-info/RECORD +252 -0
- pulumi_vault-6.2.0a1713339773.dist-info/RECORD +0 -252
- {pulumi_vault-6.2.0a1713339773.dist-info → pulumi_vault-6.2.0a1713905519.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.2.0a1713339773.dist-info → pulumi_vault-6.2.0a1713905519.dist-info}/top_level.txt +0 -0
@@ -78,27 +78,14 @@ class AuthBackendArgs:
|
|
78
78
|
:param pulumi.Input[bool] starttls: Control use of TLS when conecting to LDAP
|
79
79
|
:param pulumi.Input[str] tls_max_version: Maximum acceptable version of TLS
|
80
80
|
:param pulumi.Input[str] tls_min_version: Minimum acceptable version of TLS
|
81
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
82
|
-
|
83
|
-
|
84
|
-
:param pulumi.Input[
|
85
|
-
|
86
|
-
|
87
|
-
|
88
|
-
:param pulumi.Input[int]
|
89
|
-
Its current value will be referenced at renewal time.
|
90
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
91
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
92
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/ldap#token_num_uses)
|
93
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
94
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
95
|
-
token generated using this role should never expire. The token should be renewed within the
|
96
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
97
|
-
value of this field. Specified in seconds.
|
98
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
99
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
100
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
101
|
-
Its current value will be referenced at renewal time.
|
81
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
82
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
83
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
84
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
85
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
86
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
87
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
88
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
102
89
|
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
103
90
|
:param pulumi.Input[str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
|
104
91
|
:param pulumi.Input[bool] use_token_groups: Use the Active Directory tokenGroups constructed attribute of the user to find the group memberships
|
@@ -448,9 +435,7 @@ class AuthBackendArgs:
|
|
448
435
|
@pulumi.getter(name="tokenBoundCidrs")
|
449
436
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
450
437
|
"""
|
451
|
-
|
452
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
453
|
-
as well.
|
438
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
454
439
|
"""
|
455
440
|
return pulumi.get(self, "token_bound_cidrs")
|
456
441
|
|
@@ -462,10 +447,7 @@ class AuthBackendArgs:
|
|
462
447
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
463
448
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
464
449
|
"""
|
465
|
-
|
466
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
467
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
468
|
-
`token_max_ttl` would otherwise allow a renewal.
|
450
|
+
Generated Token's Explicit Maximum TTL in seconds
|
469
451
|
"""
|
470
452
|
return pulumi.get(self, "token_explicit_max_ttl")
|
471
453
|
|
@@ -477,8 +459,7 @@ class AuthBackendArgs:
|
|
477
459
|
@pulumi.getter(name="tokenMaxTtl")
|
478
460
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
479
461
|
"""
|
480
|
-
The maximum lifetime
|
481
|
-
Its current value will be referenced at renewal time.
|
462
|
+
The maximum lifetime of the generated token
|
482
463
|
"""
|
483
464
|
return pulumi.get(self, "token_max_ttl")
|
484
465
|
|
@@ -490,8 +471,7 @@ class AuthBackendArgs:
|
|
490
471
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
491
472
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
492
473
|
"""
|
493
|
-
If
|
494
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
474
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
495
475
|
"""
|
496
476
|
return pulumi.get(self, "token_no_default_policy")
|
497
477
|
|
@@ -503,8 +483,7 @@ class AuthBackendArgs:
|
|
503
483
|
@pulumi.getter(name="tokenNumUses")
|
504
484
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
505
485
|
"""
|
506
|
-
The
|
507
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
486
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
508
487
|
"""
|
509
488
|
return pulumi.get(self, "token_num_uses")
|
510
489
|
|
@@ -516,10 +495,7 @@ class AuthBackendArgs:
|
|
516
495
|
@pulumi.getter(name="tokenPeriod")
|
517
496
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
518
497
|
"""
|
519
|
-
|
520
|
-
token generated using this role should never expire. The token should be renewed within the
|
521
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
522
|
-
value of this field. Specified in seconds.
|
498
|
+
Generated Token's Period
|
523
499
|
"""
|
524
500
|
return pulumi.get(self, "token_period")
|
525
501
|
|
@@ -531,8 +507,7 @@ class AuthBackendArgs:
|
|
531
507
|
@pulumi.getter(name="tokenPolicies")
|
532
508
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
533
509
|
"""
|
534
|
-
|
535
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
510
|
+
Generated Token's Policies
|
536
511
|
"""
|
537
512
|
return pulumi.get(self, "token_policies")
|
538
513
|
|
@@ -544,8 +519,7 @@ class AuthBackendArgs:
|
|
544
519
|
@pulumi.getter(name="tokenTtl")
|
545
520
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
546
521
|
"""
|
547
|
-
The
|
548
|
-
Its current value will be referenced at renewal time.
|
522
|
+
The initial ttl of the token to generate in seconds
|
549
523
|
"""
|
550
524
|
return pulumi.get(self, "token_ttl")
|
551
525
|
|
@@ -706,27 +680,14 @@ class _AuthBackendState:
|
|
706
680
|
:param pulumi.Input[bool] starttls: Control use of TLS when conecting to LDAP
|
707
681
|
:param pulumi.Input[str] tls_max_version: Maximum acceptable version of TLS
|
708
682
|
:param pulumi.Input[str] tls_min_version: Minimum acceptable version of TLS
|
709
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
710
|
-
|
711
|
-
|
712
|
-
:param pulumi.Input[
|
713
|
-
|
714
|
-
|
715
|
-
|
716
|
-
:param pulumi.Input[int]
|
717
|
-
Its current value will be referenced at renewal time.
|
718
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
719
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
720
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/ldap#token_num_uses)
|
721
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
722
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
723
|
-
token generated using this role should never expire. The token should be renewed within the
|
724
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
725
|
-
value of this field. Specified in seconds.
|
726
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
727
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
728
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
729
|
-
Its current value will be referenced at renewal time.
|
683
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
684
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
685
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
686
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
687
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
688
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
689
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
690
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
730
691
|
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
731
692
|
:param pulumi.Input[str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
|
732
693
|
:param pulumi.Input[str] url: The URL of the LDAP server
|
@@ -1080,9 +1041,7 @@ class _AuthBackendState:
|
|
1080
1041
|
@pulumi.getter(name="tokenBoundCidrs")
|
1081
1042
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
1082
1043
|
"""
|
1083
|
-
|
1084
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
1085
|
-
as well.
|
1044
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
1086
1045
|
"""
|
1087
1046
|
return pulumi.get(self, "token_bound_cidrs")
|
1088
1047
|
|
@@ -1094,10 +1053,7 @@ class _AuthBackendState:
|
|
1094
1053
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
1095
1054
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
1096
1055
|
"""
|
1097
|
-
|
1098
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
1099
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1100
|
-
`token_max_ttl` would otherwise allow a renewal.
|
1056
|
+
Generated Token's Explicit Maximum TTL in seconds
|
1101
1057
|
"""
|
1102
1058
|
return pulumi.get(self, "token_explicit_max_ttl")
|
1103
1059
|
|
@@ -1109,8 +1065,7 @@ class _AuthBackendState:
|
|
1109
1065
|
@pulumi.getter(name="tokenMaxTtl")
|
1110
1066
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
1111
1067
|
"""
|
1112
|
-
The maximum lifetime
|
1113
|
-
Its current value will be referenced at renewal time.
|
1068
|
+
The maximum lifetime of the generated token
|
1114
1069
|
"""
|
1115
1070
|
return pulumi.get(self, "token_max_ttl")
|
1116
1071
|
|
@@ -1122,8 +1077,7 @@ class _AuthBackendState:
|
|
1122
1077
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
1123
1078
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
1124
1079
|
"""
|
1125
|
-
If
|
1126
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1080
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
1127
1081
|
"""
|
1128
1082
|
return pulumi.get(self, "token_no_default_policy")
|
1129
1083
|
|
@@ -1135,8 +1089,7 @@ class _AuthBackendState:
|
|
1135
1089
|
@pulumi.getter(name="tokenNumUses")
|
1136
1090
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
1137
1091
|
"""
|
1138
|
-
The
|
1139
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1092
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
1140
1093
|
"""
|
1141
1094
|
return pulumi.get(self, "token_num_uses")
|
1142
1095
|
|
@@ -1148,10 +1101,7 @@ class _AuthBackendState:
|
|
1148
1101
|
@pulumi.getter(name="tokenPeriod")
|
1149
1102
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
1150
1103
|
"""
|
1151
|
-
|
1152
|
-
token generated using this role should never expire. The token should be renewed within the
|
1153
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1154
|
-
value of this field. Specified in seconds.
|
1104
|
+
Generated Token's Period
|
1155
1105
|
"""
|
1156
1106
|
return pulumi.get(self, "token_period")
|
1157
1107
|
|
@@ -1163,8 +1113,7 @@ class _AuthBackendState:
|
|
1163
1113
|
@pulumi.getter(name="tokenPolicies")
|
1164
1114
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
1165
1115
|
"""
|
1166
|
-
|
1167
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
1116
|
+
Generated Token's Policies
|
1168
1117
|
"""
|
1169
1118
|
return pulumi.get(self, "token_policies")
|
1170
1119
|
|
@@ -1176,8 +1125,7 @@ class _AuthBackendState:
|
|
1176
1125
|
@pulumi.getter(name="tokenTtl")
|
1177
1126
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
1178
1127
|
"""
|
1179
|
-
The
|
1180
|
-
Its current value will be referenced at renewal time.
|
1128
|
+
The initial ttl of the token to generate in seconds
|
1181
1129
|
"""
|
1182
1130
|
return pulumi.get(self, "token_ttl")
|
1183
1131
|
|
@@ -1330,22 +1278,20 @@ class AuthBackend(pulumi.CustomResource):
|
|
1330
1278
|
|
1331
1279
|
## Example Usage
|
1332
1280
|
|
1333
|
-
<!--Start PulumiCodeChooser -->
|
1334
1281
|
```python
|
1335
1282
|
import pulumi
|
1336
1283
|
import pulumi_vault as vault
|
1337
1284
|
|
1338
1285
|
ldap = vault.ldap.AuthBackend("ldap",
|
1339
|
-
discoverdn=False,
|
1340
|
-
groupdn="OU=Groups,DC=example,DC=org",
|
1341
|
-
groupfilter="(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}}))",
|
1342
1286
|
path="ldap",
|
1343
|
-
upndomain="EXAMPLE.ORG",
|
1344
1287
|
url="ldaps://dc-01.example.org",
|
1288
|
+
userdn="OU=Users,OU=Accounts,DC=example,DC=org",
|
1345
1289
|
userattr="sAMAccountName",
|
1346
|
-
|
1290
|
+
upndomain="EXAMPLE.ORG",
|
1291
|
+
discoverdn=False,
|
1292
|
+
groupdn="OU=Groups,DC=example,DC=org",
|
1293
|
+
groupfilter="(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}}))")
|
1347
1294
|
```
|
1348
|
-
<!--End PulumiCodeChooser -->
|
1349
1295
|
|
1350
1296
|
## Import
|
1351
1297
|
|
@@ -1381,27 +1327,14 @@ class AuthBackend(pulumi.CustomResource):
|
|
1381
1327
|
:param pulumi.Input[bool] starttls: Control use of TLS when conecting to LDAP
|
1382
1328
|
:param pulumi.Input[str] tls_max_version: Maximum acceptable version of TLS
|
1383
1329
|
:param pulumi.Input[str] tls_min_version: Minimum acceptable version of TLS
|
1384
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
1385
|
-
|
1386
|
-
|
1387
|
-
:param pulumi.Input[
|
1388
|
-
|
1389
|
-
|
1390
|
-
|
1391
|
-
:param pulumi.Input[int]
|
1392
|
-
Its current value will be referenced at renewal time.
|
1393
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
1394
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1395
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/ldap#token_num_uses)
|
1396
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1397
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
1398
|
-
token generated using this role should never expire. The token should be renewed within the
|
1399
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1400
|
-
value of this field. Specified in seconds.
|
1401
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
1402
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
1403
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
1404
|
-
Its current value will be referenced at renewal time.
|
1330
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
1331
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
1332
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
1333
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
1334
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
1335
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
1336
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
1337
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
1405
1338
|
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
1406
1339
|
:param pulumi.Input[str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
|
1407
1340
|
:param pulumi.Input[str] url: The URL of the LDAP server
|
@@ -1422,22 +1355,20 @@ class AuthBackend(pulumi.CustomResource):
|
|
1422
1355
|
|
1423
1356
|
## Example Usage
|
1424
1357
|
|
1425
|
-
<!--Start PulumiCodeChooser -->
|
1426
1358
|
```python
|
1427
1359
|
import pulumi
|
1428
1360
|
import pulumi_vault as vault
|
1429
1361
|
|
1430
1362
|
ldap = vault.ldap.AuthBackend("ldap",
|
1431
|
-
discoverdn=False,
|
1432
|
-
groupdn="OU=Groups,DC=example,DC=org",
|
1433
|
-
groupfilter="(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}}))",
|
1434
1363
|
path="ldap",
|
1435
|
-
upndomain="EXAMPLE.ORG",
|
1436
1364
|
url="ldaps://dc-01.example.org",
|
1365
|
+
userdn="OU=Users,OU=Accounts,DC=example,DC=org",
|
1437
1366
|
userattr="sAMAccountName",
|
1438
|
-
|
1367
|
+
upndomain="EXAMPLE.ORG",
|
1368
|
+
discoverdn=False,
|
1369
|
+
groupdn="OU=Groups,DC=example,DC=org",
|
1370
|
+
groupfilter="(&(objectClass=group)(member:1.2.840.113556.1.4.1941:={{.UserDN}}))")
|
1439
1371
|
```
|
1440
|
-
<!--End PulumiCodeChooser -->
|
1441
1372
|
|
1442
1373
|
## Import
|
1443
1374
|
|
@@ -1630,27 +1561,14 @@ class AuthBackend(pulumi.CustomResource):
|
|
1630
1561
|
:param pulumi.Input[bool] starttls: Control use of TLS when conecting to LDAP
|
1631
1562
|
:param pulumi.Input[str] tls_max_version: Maximum acceptable version of TLS
|
1632
1563
|
:param pulumi.Input[str] tls_min_version: Minimum acceptable version of TLS
|
1633
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
1634
|
-
|
1635
|
-
|
1636
|
-
:param pulumi.Input[
|
1637
|
-
|
1638
|
-
|
1639
|
-
|
1640
|
-
:param pulumi.Input[int]
|
1641
|
-
Its current value will be referenced at renewal time.
|
1642
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
1643
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1644
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/ldap#token_num_uses)
|
1645
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1646
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
1647
|
-
token generated using this role should never expire. The token should be renewed within the
|
1648
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1649
|
-
value of this field. Specified in seconds.
|
1650
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
1651
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
1652
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
1653
|
-
Its current value will be referenced at renewal time.
|
1564
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
1565
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
1566
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
1567
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
1568
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
1569
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
1570
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
1571
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
1654
1572
|
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
1655
1573
|
:param pulumi.Input[str] upndomain: The `userPrincipalDomain` used to construct the UPN string for the authenticating user.
|
1656
1574
|
:param pulumi.Input[str] url: The URL of the LDAP server
|
@@ -1883,9 +1801,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1883
1801
|
@pulumi.getter(name="tokenBoundCidrs")
|
1884
1802
|
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1885
1803
|
"""
|
1886
|
-
|
1887
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
1888
|
-
as well.
|
1804
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
1889
1805
|
"""
|
1890
1806
|
return pulumi.get(self, "token_bound_cidrs")
|
1891
1807
|
|
@@ -1893,10 +1809,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1893
1809
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
1894
1810
|
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1895
1811
|
"""
|
1896
|
-
|
1897
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
1898
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1899
|
-
`token_max_ttl` would otherwise allow a renewal.
|
1812
|
+
Generated Token's Explicit Maximum TTL in seconds
|
1900
1813
|
"""
|
1901
1814
|
return pulumi.get(self, "token_explicit_max_ttl")
|
1902
1815
|
|
@@ -1904,8 +1817,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1904
1817
|
@pulumi.getter(name="tokenMaxTtl")
|
1905
1818
|
def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1906
1819
|
"""
|
1907
|
-
The maximum lifetime
|
1908
|
-
Its current value will be referenced at renewal time.
|
1820
|
+
The maximum lifetime of the generated token
|
1909
1821
|
"""
|
1910
1822
|
return pulumi.get(self, "token_max_ttl")
|
1911
1823
|
|
@@ -1913,8 +1825,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1913
1825
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
1914
1826
|
def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
|
1915
1827
|
"""
|
1916
|
-
If
|
1917
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1828
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
1918
1829
|
"""
|
1919
1830
|
return pulumi.get(self, "token_no_default_policy")
|
1920
1831
|
|
@@ -1922,8 +1833,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1922
1833
|
@pulumi.getter(name="tokenNumUses")
|
1923
1834
|
def token_num_uses(self) -> pulumi.Output[Optional[int]]:
|
1924
1835
|
"""
|
1925
|
-
The
|
1926
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1836
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
1927
1837
|
"""
|
1928
1838
|
return pulumi.get(self, "token_num_uses")
|
1929
1839
|
|
@@ -1931,10 +1841,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1931
1841
|
@pulumi.getter(name="tokenPeriod")
|
1932
1842
|
def token_period(self) -> pulumi.Output[Optional[int]]:
|
1933
1843
|
"""
|
1934
|
-
|
1935
|
-
token generated using this role should never expire. The token should be renewed within the
|
1936
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1937
|
-
value of this field. Specified in seconds.
|
1844
|
+
Generated Token's Period
|
1938
1845
|
"""
|
1939
1846
|
return pulumi.get(self, "token_period")
|
1940
1847
|
|
@@ -1942,8 +1849,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1942
1849
|
@pulumi.getter(name="tokenPolicies")
|
1943
1850
|
def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1944
1851
|
"""
|
1945
|
-
|
1946
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
1852
|
+
Generated Token's Policies
|
1947
1853
|
"""
|
1948
1854
|
return pulumi.get(self, "token_policies")
|
1949
1855
|
|
@@ -1951,8 +1857,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1951
1857
|
@pulumi.getter(name="tokenTtl")
|
1952
1858
|
def token_ttl(self) -> pulumi.Output[Optional[int]]:
|
1953
1859
|
"""
|
1954
|
-
The
|
1955
|
-
Its current value will be referenced at renewal time.
|
1860
|
+
The initial ttl of the token to generate in seconds
|
1956
1861
|
"""
|
1957
1862
|
return pulumi.get(self, "token_ttl")
|
1958
1863
|
|
@@ -189,7 +189,6 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
189
189
|
|
190
190
|
## Example Usage
|
191
191
|
|
192
|
-
<!--Start PulumiCodeChooser -->
|
193
192
|
```python
|
194
193
|
import pulumi
|
195
194
|
import pulumi_vault as vault
|
@@ -208,7 +207,6 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
208
207
|
policies=["dba"],
|
209
208
|
backend=ldap.path)
|
210
209
|
```
|
211
|
-
<!--End PulumiCodeChooser -->
|
212
210
|
|
213
211
|
## Import
|
214
212
|
|
@@ -241,7 +239,6 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
241
239
|
|
242
240
|
## Example Usage
|
243
241
|
|
244
|
-
<!--Start PulumiCodeChooser -->
|
245
242
|
```python
|
246
243
|
import pulumi
|
247
244
|
import pulumi_vault as vault
|
@@ -260,7 +257,6 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
260
257
|
policies=["dba"],
|
261
258
|
backend=ldap.path)
|
262
259
|
```
|
263
|
-
<!--End PulumiCodeChooser -->
|
264
260
|
|
265
261
|
## Import
|
266
262
|
|
@@ -222,7 +222,6 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
222
222
|
|
223
223
|
## Example Usage
|
224
224
|
|
225
|
-
<!--Start PulumiCodeChooser -->
|
226
225
|
```python
|
227
226
|
import pulumi
|
228
227
|
import pulumi_vault as vault
|
@@ -244,7 +243,6 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
244
243
|
],
|
245
244
|
backend=ldap.path)
|
246
245
|
```
|
247
|
-
<!--End PulumiCodeChooser -->
|
248
246
|
|
249
247
|
## Import
|
250
248
|
|
@@ -278,7 +276,6 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
278
276
|
|
279
277
|
## Example Usage
|
280
278
|
|
281
|
-
<!--Start PulumiCodeChooser -->
|
282
279
|
```python
|
283
280
|
import pulumi
|
284
281
|
import pulumi_vault as vault
|
@@ -300,7 +297,6 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
300
297
|
],
|
301
298
|
backend=ldap.path)
|
302
299
|
```
|
303
|
-
<!--End PulumiCodeChooser -->
|
304
300
|
|
305
301
|
## Import
|
306
302
|
|
@@ -1051,20 +1051,18 @@ class SecretBackend(pulumi.CustomResource):
|
|
1051
1051
|
"""
|
1052
1052
|
## Example Usage
|
1053
1053
|
|
1054
|
-
<!--Start PulumiCodeChooser -->
|
1055
1054
|
```python
|
1056
1055
|
import pulumi
|
1057
1056
|
import pulumi_vault as vault
|
1058
1057
|
|
1059
1058
|
config = vault.ldap.SecretBackend("config",
|
1059
|
+
path="my-custom-ldap",
|
1060
1060
|
binddn="CN=Administrator,CN=Users,DC=corp,DC=example,DC=net",
|
1061
1061
|
bindpass="SuperSecretPassw0rd",
|
1062
|
-
insecure_tls=True,
|
1063
|
-
path="my-custom-ldap",
|
1064
1062
|
url="ldaps://localhost",
|
1063
|
+
insecure_tls=True,
|
1065
1064
|
userdn="CN=Users,DC=corp,DC=example,DC=net")
|
1066
1065
|
```
|
1067
|
-
<!--End PulumiCodeChooser -->
|
1068
1066
|
|
1069
1067
|
## Import
|
1070
1068
|
|
@@ -1126,20 +1124,18 @@ class SecretBackend(pulumi.CustomResource):
|
|
1126
1124
|
"""
|
1127
1125
|
## Example Usage
|
1128
1126
|
|
1129
|
-
<!--Start PulumiCodeChooser -->
|
1130
1127
|
```python
|
1131
1128
|
import pulumi
|
1132
1129
|
import pulumi_vault as vault
|
1133
1130
|
|
1134
1131
|
config = vault.ldap.SecretBackend("config",
|
1132
|
+
path="my-custom-ldap",
|
1135
1133
|
binddn="CN=Administrator,CN=Users,DC=corp,DC=example,DC=net",
|
1136
1134
|
bindpass="SuperSecretPassw0rd",
|
1137
|
-
insecure_tls=True,
|
1138
|
-
path="my-custom-ldap",
|
1139
1135
|
url="ldaps://localhost",
|
1136
|
+
insecure_tls=True,
|
1140
1137
|
userdn="CN=Users,DC=corp,DC=example,DC=net")
|
1141
1138
|
```
|
1142
|
-
<!--End PulumiCodeChooser -->
|
1143
1139
|
|
1144
1140
|
## Import
|
1145
1141
|
|
@@ -422,7 +422,6 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
|
|
422
422
|
"""
|
423
423
|
## Example Usage
|
424
424
|
|
425
|
-
<!--Start PulumiCodeChooser -->
|
426
425
|
```python
|
427
426
|
import pulumi
|
428
427
|
import pulumi_vault as vault
|
@@ -451,7 +450,6 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
|
|
451
450
|
changetype: delete
|
452
451
|
\"\"\")
|
453
452
|
```
|
454
|
-
<!--End PulumiCodeChooser -->
|
455
453
|
|
456
454
|
## Import
|
457
455
|
|
@@ -506,7 +504,6 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
|
|
506
504
|
"""
|
507
505
|
## Example Usage
|
508
506
|
|
509
|
-
<!--Start PulumiCodeChooser -->
|
510
507
|
```python
|
511
508
|
import pulumi
|
512
509
|
import pulumi_vault as vault
|
@@ -535,7 +532,6 @@ class SecretBackendDynamicRole(pulumi.CustomResource):
|
|
535
532
|
changetype: delete
|
536
533
|
\"\"\")
|
537
534
|
```
|
538
|
-
<!--End PulumiCodeChooser -->
|
539
535
|
|
540
536
|
## Import
|
541
537
|
|
@@ -298,7 +298,6 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
298
298
|
"""
|
299
299
|
## Example Usage
|
300
300
|
|
301
|
-
<!--Start PulumiCodeChooser -->
|
302
301
|
```python
|
303
302
|
import pulumi
|
304
303
|
import pulumi_vault as vault
|
@@ -312,6 +311,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
312
311
|
userdn="CN=Users,DC=corp,DC=example,DC=net")
|
313
312
|
qa = vault.ldap.SecretBackendLibrarySet("qa",
|
314
313
|
mount=config.path,
|
314
|
+
name="qa",
|
315
315
|
service_account_names=[
|
316
316
|
"Bob",
|
317
317
|
"Mary",
|
@@ -320,7 +320,6 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
320
320
|
disable_check_in_enforcement=True,
|
321
321
|
max_ttl=120)
|
322
322
|
```
|
323
|
-
<!--End PulumiCodeChooser -->
|
324
323
|
|
325
324
|
## Import
|
326
325
|
|
@@ -357,7 +356,6 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
357
356
|
"""
|
358
357
|
## Example Usage
|
359
358
|
|
360
|
-
<!--Start PulumiCodeChooser -->
|
361
359
|
```python
|
362
360
|
import pulumi
|
363
361
|
import pulumi_vault as vault
|
@@ -371,6 +369,7 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
371
369
|
userdn="CN=Users,DC=corp,DC=example,DC=net")
|
372
370
|
qa = vault.ldap.SecretBackendLibrarySet("qa",
|
373
371
|
mount=config.path,
|
372
|
+
name="qa",
|
374
373
|
service_account_names=[
|
375
374
|
"Bob",
|
376
375
|
"Mary",
|
@@ -379,7 +378,6 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
|
|
379
378
|
disable_check_in_enforcement=True,
|
380
379
|
max_ttl=120)
|
381
380
|
```
|
382
|
-
<!--End PulumiCodeChooser -->
|
383
381
|
|
384
382
|
## Import
|
385
383
|
|