pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +26 -9
  5. pulumi_vault/ad/secret_backend.py +16 -142
  6. pulumi_vault/ad/secret_library.py +16 -9
  7. pulumi_vault/ad/secret_role.py +14 -9
  8. pulumi_vault/alicloud/auth_backend_role.py +76 -190
  9. pulumi_vault/approle/auth_backend_login.py +12 -7
  10. pulumi_vault/approle/auth_backend_role.py +77 -191
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
  13. pulumi_vault/audit.py +30 -21
  14. pulumi_vault/audit_request_header.py +11 -2
  15. pulumi_vault/auth_backend.py +66 -14
  16. pulumi_vault/aws/auth_backend_cert.py +18 -9
  17. pulumi_vault/aws/auth_backend_client.py +267 -22
  18. pulumi_vault/aws/auth_backend_config_identity.py +14 -9
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +77 -191
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
  24. pulumi_vault/aws/auth_backend_sts_role.py +14 -9
  25. pulumi_vault/aws/get_access_credentials.py +38 -9
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +77 -9
  28. pulumi_vault/aws/secret_backend_role.py +185 -9
  29. pulumi_vault/aws/secret_backend_static_role.py +20 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +153 -15
  32. pulumi_vault/azure/auth_backend_role.py +77 -191
  33. pulumi_vault/azure/backend.py +227 -21
  34. pulumi_vault/azure/backend_role.py +42 -37
  35. pulumi_vault/azure/get_access_credentials.py +41 -7
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -267
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +28 -19
  44. pulumi_vault/consul/secret_backend_role.py +18 -78
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +119 -112
  48. pulumi_vault/database/secret_backend_role.py +31 -22
  49. pulumi_vault/database/secret_backend_static_role.py +87 -13
  50. pulumi_vault/database/secrets_mount.py +427 -136
  51. pulumi_vault/egp_policy.py +16 -11
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +250 -33
  54. pulumi_vault/gcp/auth_backend_role.py +77 -269
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -5
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -12
  58. pulumi_vault/gcp/secret_impersonated_account.py +76 -15
  59. pulumi_vault/gcp/secret_roleset.py +31 -24
  60. pulumi_vault/gcp/secret_static_account.py +39 -32
  61. pulumi_vault/generic/endpoint.py +24 -17
  62. pulumi_vault/generic/get_secret.py +64 -8
  63. pulumi_vault/generic/secret.py +21 -16
  64. pulumi_vault/get_auth_backend.py +24 -7
  65. pulumi_vault/get_auth_backends.py +51 -9
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -11
  69. pulumi_vault/get_policy_document.py +34 -19
  70. pulumi_vault/get_raft_autopilot_state.py +29 -10
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +19 -14
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +16 -11
  75. pulumi_vault/github/user.py +16 -11
  76. pulumi_vault/identity/entity.py +20 -13
  77. pulumi_vault/identity/entity_alias.py +20 -13
  78. pulumi_vault/identity/entity_policies.py +28 -11
  79. pulumi_vault/identity/get_entity.py +42 -10
  80. pulumi_vault/identity/get_group.py +47 -9
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -7
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -9
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -10
  84. pulumi_vault/identity/group.py +58 -39
  85. pulumi_vault/identity/group_alias.py +16 -9
  86. pulumi_vault/identity/group_member_entity_ids.py +28 -66
  87. pulumi_vault/identity/group_member_group_ids.py +40 -19
  88. pulumi_vault/identity/group_policies.py +20 -7
  89. pulumi_vault/identity/mfa_duo.py +11 -6
  90. pulumi_vault/identity/mfa_login_enforcement.py +15 -6
  91. pulumi_vault/identity/mfa_okta.py +11 -6
  92. pulumi_vault/identity/mfa_pingid.py +7 -2
  93. pulumi_vault/identity/mfa_totp.py +7 -2
  94. pulumi_vault/identity/oidc.py +12 -7
  95. pulumi_vault/identity/oidc_assignment.py +24 -11
  96. pulumi_vault/identity/oidc_client.py +36 -23
  97. pulumi_vault/identity/oidc_key.py +30 -17
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
  99. pulumi_vault/identity/oidc_provider.py +36 -21
  100. pulumi_vault/identity/oidc_role.py +42 -21
  101. pulumi_vault/identity/oidc_scope.py +20 -13
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +45 -40
  105. pulumi_vault/jwt/auth_backend_role.py +133 -254
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +24 -19
  108. pulumi_vault/kmip/secret_role.py +14 -9
  109. pulumi_vault/kmip/secret_scope.py +14 -9
  110. pulumi_vault/kubernetes/auth_backend_config.py +57 -5
  111. pulumi_vault/kubernetes/auth_backend_role.py +70 -177
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -11
  115. pulumi_vault/kubernetes/secret_backend.py +316 -27
  116. pulumi_vault/kubernetes/secret_backend_role.py +137 -46
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +25 -8
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
  120. pulumi_vault/kv/get_secret_v2.py +85 -9
  121. pulumi_vault/kv/get_secrets_list.py +24 -11
  122. pulumi_vault/kv/get_secrets_list_v2.py +37 -15
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +23 -16
  125. pulumi_vault/kv/secret_backend_v2.py +20 -11
  126. pulumi_vault/kv/secret_v2.py +59 -50
  127. pulumi_vault/ldap/auth_backend.py +127 -166
  128. pulumi_vault/ldap/auth_backend_group.py +14 -9
  129. pulumi_vault/ldap/auth_backend_user.py +14 -9
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +354 -82
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +16 -9
  135. pulumi_vault/ldap/secret_backend_static_role.py +73 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +29 -57
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +18 -11
  140. pulumi_vault/mfa_okta.py +18 -11
  141. pulumi_vault/mfa_pingid.py +18 -11
  142. pulumi_vault/mfa_totp.py +24 -17
  143. pulumi_vault/mongodbatlas/secret_backend.py +20 -15
  144. pulumi_vault/mongodbatlas/secret_role.py +47 -38
  145. pulumi_vault/mount.py +391 -51
  146. pulumi_vault/namespace.py +68 -83
  147. pulumi_vault/nomad_secret_backend.py +18 -13
  148. pulumi_vault/nomad_secret_role.py +14 -9
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +485 -39
  151. pulumi_vault/okta/auth_backend_group.py +14 -9
  152. pulumi_vault/okta/auth_backend_user.py +14 -9
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +20 -13
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -9
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -8
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
  174. pulumi_vault/pkisecret/secret_backend_key.py +14 -9
  175. pulumi_vault/pkisecret/secret_backend_role.py +21 -14
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +14 -9
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +60 -6
  185. pulumi_vault/quota_rate_limit.py +56 -2
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +18 -13
  189. pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
  190. pulumi_vault/raft_autopilot.py +14 -9
  191. pulumi_vault/raft_snapshot_agent_config.py +129 -224
  192. pulumi_vault/rgp_policy.py +14 -9
  193. pulumi_vault/saml/auth_backend.py +22 -17
  194. pulumi_vault/saml/auth_backend_role.py +92 -197
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -71
  199. pulumi_vault/secrets/sync_aws_destination.py +242 -27
  200. pulumi_vault/secrets/sync_azure_destination.py +92 -31
  201. pulumi_vault/secrets/sync_config.py +9 -4
  202. pulumi_vault/secrets/sync_gcp_destination.py +158 -25
  203. pulumi_vault/secrets/sync_gh_destination.py +189 -13
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +74 -13
  206. pulumi_vault/ssh/_inputs.py +28 -28
  207. pulumi_vault/ssh/outputs.py +11 -28
  208. pulumi_vault/ssh/secret_backend_ca.py +108 -9
  209. pulumi_vault/ssh/secret_backend_role.py +85 -118
  210. pulumi_vault/terraformcloud/secret_backend.py +7 -54
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -20
  212. pulumi_vault/terraformcloud/secret_role.py +16 -74
  213. pulumi_vault/token.py +28 -23
  214. pulumi_vault/tokenauth/auth_backend_role.py +78 -199
  215. pulumi_vault/transform/alphabet.py +16 -9
  216. pulumi_vault/transform/get_decode.py +45 -17
  217. pulumi_vault/transform/get_encode.py +45 -17
  218. pulumi_vault/transform/role.py +16 -9
  219. pulumi_vault/transform/template.py +30 -21
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -21
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +27 -93
  224. pulumi_vault/transit/secret_cache_config.py +12 -7
  225. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
@@ -56,34 +61,17 @@ class AuthBackendRoleArgs:
56
61
  field.
57
62
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
58
63
  The value should not contain leading or trailing forward slashes.
59
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
64
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
60
65
  *Available only for Vault Enterprise*.
61
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
62
- addresses which can authenticate successfully, and ties the resulting token to these blocks
63
- as well.
64
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
65
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
66
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
67
- `token_max_ttl` would otherwise allow a renewal.
68
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
69
- Its current value will be referenced at renewal time.
70
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
71
- generated tokens; otherwise it will be added to the policies set in token_policies.
72
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/azure#token_num_uses)
73
- of times a generated token may be used (within its lifetime); 0 means unlimited.
74
- :param pulumi.Input[int] token_period: If set, indicates that the
75
- token generated using this role should never expire. The token should be renewed within the
76
- duration specified by this value. At each renewal, the token's TTL will be set to the
77
- value of this field. Specified in seconds.
78
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
79
- on the auth method, this list may be supplemented by user/group/other values.
80
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
81
- Its current value will be referenced at renewal time.
82
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
83
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
84
- `service` tokens). For token store roles, there are two additional possibilities:
85
- `default-service` and `default-batch` which specify the type to return unless the client
86
- requests a different type at generation time.
66
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
67
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
68
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
69
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
70
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
71
+ :param pulumi.Input[int] token_period: Generated Token's Period
72
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
73
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
74
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
87
75
  """
88
76
  pulumi.set(__self__, "role", role)
89
77
  if backend is not None:
@@ -235,7 +223,7 @@ class AuthBackendRoleArgs:
235
223
  """
236
224
  The namespace to provision the resource in.
237
225
  The value should not contain leading or trailing forward slashes.
238
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
226
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
239
227
  *Available only for Vault Enterprise*.
240
228
  """
241
229
  return pulumi.get(self, "namespace")
@@ -248,9 +236,7 @@ class AuthBackendRoleArgs:
248
236
  @pulumi.getter(name="tokenBoundCidrs")
249
237
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
250
238
  """
251
- List of CIDR blocks; if set, specifies blocks of IP
252
- addresses which can authenticate successfully, and ties the resulting token to these blocks
253
- as well.
239
+ Specifies the blocks of IP addresses which are allowed to use the generated token
254
240
  """
255
241
  return pulumi.get(self, "token_bound_cidrs")
256
242
 
@@ -262,10 +248,7 @@ class AuthBackendRoleArgs:
262
248
  @pulumi.getter(name="tokenExplicitMaxTtl")
263
249
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
264
250
  """
265
- If set, will encode an
266
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
267
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
268
- `token_max_ttl` would otherwise allow a renewal.
251
+ Generated Token's Explicit Maximum TTL in seconds
269
252
  """
270
253
  return pulumi.get(self, "token_explicit_max_ttl")
271
254
 
@@ -277,8 +260,7 @@ class AuthBackendRoleArgs:
277
260
  @pulumi.getter(name="tokenMaxTtl")
278
261
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
279
262
  """
280
- The maximum lifetime for generated tokens in number of seconds.
281
- Its current value will be referenced at renewal time.
263
+ The maximum lifetime of the generated token
282
264
  """
283
265
  return pulumi.get(self, "token_max_ttl")
284
266
 
@@ -290,8 +272,7 @@ class AuthBackendRoleArgs:
290
272
  @pulumi.getter(name="tokenNoDefaultPolicy")
291
273
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
292
274
  """
293
- If set, the default policy will not be set on
294
- generated tokens; otherwise it will be added to the policies set in token_policies.
275
+ If true, the 'default' policy will not automatically be added to generated tokens
295
276
  """
296
277
  return pulumi.get(self, "token_no_default_policy")
297
278
 
@@ -303,8 +284,7 @@ class AuthBackendRoleArgs:
303
284
  @pulumi.getter(name="tokenNumUses")
304
285
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
305
286
  """
306
- The [maximum number](https://www.vaultproject.io/api-docs/azure#token_num_uses)
307
- of times a generated token may be used (within its lifetime); 0 means unlimited.
287
+ The maximum number of times a token may be used, a value of zero means unlimited
308
288
  """
309
289
  return pulumi.get(self, "token_num_uses")
310
290
 
@@ -316,10 +296,7 @@ class AuthBackendRoleArgs:
316
296
  @pulumi.getter(name="tokenPeriod")
317
297
  def token_period(self) -> Optional[pulumi.Input[int]]:
318
298
  """
319
- If set, indicates that the
320
- token generated using this role should never expire. The token should be renewed within the
321
- duration specified by this value. At each renewal, the token's TTL will be set to the
322
- value of this field. Specified in seconds.
299
+ Generated Token's Period
323
300
  """
324
301
  return pulumi.get(self, "token_period")
325
302
 
@@ -331,8 +308,7 @@ class AuthBackendRoleArgs:
331
308
  @pulumi.getter(name="tokenPolicies")
332
309
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
333
310
  """
334
- List of policies to encode onto generated tokens. Depending
335
- on the auth method, this list may be supplemented by user/group/other values.
311
+ Generated Token's Policies
336
312
  """
337
313
  return pulumi.get(self, "token_policies")
338
314
 
@@ -344,8 +320,7 @@ class AuthBackendRoleArgs:
344
320
  @pulumi.getter(name="tokenTtl")
345
321
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
346
322
  """
347
- The incremental lifetime for generated tokens in number of seconds.
348
- Its current value will be referenced at renewal time.
323
+ The initial ttl of the token to generate in seconds
349
324
  """
350
325
  return pulumi.get(self, "token_ttl")
351
326
 
@@ -357,11 +332,7 @@ class AuthBackendRoleArgs:
357
332
  @pulumi.getter(name="tokenType")
358
333
  def token_type(self) -> Optional[pulumi.Input[str]]:
359
334
  """
360
- The type of token that should be generated. Can be `service`,
361
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
362
- `service` tokens). For token store roles, there are two additional possibilities:
363
- `default-service` and `default-batch` which specify the type to return unless the client
364
- requests a different type at generation time.
335
+ The type of token to generate, service or batch
365
336
  """
366
337
  return pulumi.get(self, "token_type")
367
338
 
@@ -414,35 +385,18 @@ class _AuthBackendRoleState:
414
385
  field.
415
386
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
416
387
  The value should not contain leading or trailing forward slashes.
417
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
388
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
418
389
  *Available only for Vault Enterprise*.
419
390
  :param pulumi.Input[str] role: The name of the role.
420
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
421
- addresses which can authenticate successfully, and ties the resulting token to these blocks
422
- as well.
423
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
424
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
425
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
426
- `token_max_ttl` would otherwise allow a renewal.
427
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
428
- Its current value will be referenced at renewal time.
429
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
430
- generated tokens; otherwise it will be added to the policies set in token_policies.
431
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/azure#token_num_uses)
432
- of times a generated token may be used (within its lifetime); 0 means unlimited.
433
- :param pulumi.Input[int] token_period: If set, indicates that the
434
- token generated using this role should never expire. The token should be renewed within the
435
- duration specified by this value. At each renewal, the token's TTL will be set to the
436
- value of this field. Specified in seconds.
437
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
438
- on the auth method, this list may be supplemented by user/group/other values.
439
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
440
- Its current value will be referenced at renewal time.
441
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
442
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
443
- `service` tokens). For token store roles, there are two additional possibilities:
444
- `default-service` and `default-batch` which specify the type to return unless the client
445
- requests a different type at generation time.
391
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
392
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
393
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
394
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
395
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
396
+ :param pulumi.Input[int] token_period: Generated Token's Period
397
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
398
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
399
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
446
400
  """
447
401
  if backend is not None:
448
402
  pulumi.set(__self__, "backend", backend)
@@ -583,7 +537,7 @@ class _AuthBackendRoleState:
583
537
  """
584
538
  The namespace to provision the resource in.
585
539
  The value should not contain leading or trailing forward slashes.
586
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
540
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
587
541
  *Available only for Vault Enterprise*.
588
542
  """
589
543
  return pulumi.get(self, "namespace")
@@ -608,9 +562,7 @@ class _AuthBackendRoleState:
608
562
  @pulumi.getter(name="tokenBoundCidrs")
609
563
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
610
564
  """
611
- List of CIDR blocks; if set, specifies blocks of IP
612
- addresses which can authenticate successfully, and ties the resulting token to these blocks
613
- as well.
565
+ Specifies the blocks of IP addresses which are allowed to use the generated token
614
566
  """
615
567
  return pulumi.get(self, "token_bound_cidrs")
616
568
 
@@ -622,10 +574,7 @@ class _AuthBackendRoleState:
622
574
  @pulumi.getter(name="tokenExplicitMaxTtl")
623
575
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
624
576
  """
625
- If set, will encode an
626
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
627
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
628
- `token_max_ttl` would otherwise allow a renewal.
577
+ Generated Token's Explicit Maximum TTL in seconds
629
578
  """
630
579
  return pulumi.get(self, "token_explicit_max_ttl")
631
580
 
@@ -637,8 +586,7 @@ class _AuthBackendRoleState:
637
586
  @pulumi.getter(name="tokenMaxTtl")
638
587
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
639
588
  """
640
- The maximum lifetime for generated tokens in number of seconds.
641
- Its current value will be referenced at renewal time.
589
+ The maximum lifetime of the generated token
642
590
  """
643
591
  return pulumi.get(self, "token_max_ttl")
644
592
 
@@ -650,8 +598,7 @@ class _AuthBackendRoleState:
650
598
  @pulumi.getter(name="tokenNoDefaultPolicy")
651
599
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
652
600
  """
653
- If set, the default policy will not be set on
654
- generated tokens; otherwise it will be added to the policies set in token_policies.
601
+ If true, the 'default' policy will not automatically be added to generated tokens
655
602
  """
656
603
  return pulumi.get(self, "token_no_default_policy")
657
604
 
@@ -663,8 +610,7 @@ class _AuthBackendRoleState:
663
610
  @pulumi.getter(name="tokenNumUses")
664
611
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
665
612
  """
666
- The [maximum number](https://www.vaultproject.io/api-docs/azure#token_num_uses)
667
- of times a generated token may be used (within its lifetime); 0 means unlimited.
613
+ The maximum number of times a token may be used, a value of zero means unlimited
668
614
  """
669
615
  return pulumi.get(self, "token_num_uses")
670
616
 
@@ -676,10 +622,7 @@ class _AuthBackendRoleState:
676
622
  @pulumi.getter(name="tokenPeriod")
677
623
  def token_period(self) -> Optional[pulumi.Input[int]]:
678
624
  """
679
- If set, indicates that the
680
- token generated using this role should never expire. The token should be renewed within the
681
- duration specified by this value. At each renewal, the token's TTL will be set to the
682
- value of this field. Specified in seconds.
625
+ Generated Token's Period
683
626
  """
684
627
  return pulumi.get(self, "token_period")
685
628
 
@@ -691,8 +634,7 @@ class _AuthBackendRoleState:
691
634
  @pulumi.getter(name="tokenPolicies")
692
635
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
693
636
  """
694
- List of policies to encode onto generated tokens. Depending
695
- on the auth method, this list may be supplemented by user/group/other values.
637
+ Generated Token's Policies
696
638
  """
697
639
  return pulumi.get(self, "token_policies")
698
640
 
@@ -704,8 +646,7 @@ class _AuthBackendRoleState:
704
646
  @pulumi.getter(name="tokenTtl")
705
647
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
706
648
  """
707
- The incremental lifetime for generated tokens in number of seconds.
708
- Its current value will be referenced at renewal time.
649
+ The initial ttl of the token to generate in seconds
709
650
  """
710
651
  return pulumi.get(self, "token_ttl")
711
652
 
@@ -717,11 +658,7 @@ class _AuthBackendRoleState:
717
658
  @pulumi.getter(name="tokenType")
718
659
  def token_type(self) -> Optional[pulumi.Input[str]]:
719
660
  """
720
- The type of token that should be generated. Can be `service`,
721
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
722
- `service` tokens). For token store roles, there are two additional possibilities:
723
- `default-service` and `default-batch` which specify the type to return unless the client
724
- requests a different type at generation time.
661
+ The type of token to generate, service or batch
725
662
  """
726
663
  return pulumi.get(self, "token_type")
727
664
 
@@ -787,7 +724,7 @@ class AuthBackendRole(pulumi.CustomResource):
787
724
  Azure auth backend roles can be imported using `auth/`, the `backend` path, `/role/`, and the `role` name e.g.
788
725
 
789
726
  ```sh
790
- $ pulumi import vault:azure/authBackendRole:AuthBackendRole example auth/azure/role/test-role
727
+ $ pulumi import vault:azure/authBackendRole:AuthBackendRole example auth/azure/role/test-role
791
728
  ```
792
729
 
793
730
  :param str resource_name: The name of the resource.
@@ -813,35 +750,18 @@ class AuthBackendRole(pulumi.CustomResource):
813
750
  field.
814
751
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
815
752
  The value should not contain leading or trailing forward slashes.
816
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
753
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
817
754
  *Available only for Vault Enterprise*.
818
755
  :param pulumi.Input[str] role: The name of the role.
819
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
820
- addresses which can authenticate successfully, and ties the resulting token to these blocks
821
- as well.
822
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
823
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
824
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
825
- `token_max_ttl` would otherwise allow a renewal.
826
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
827
- Its current value will be referenced at renewal time.
828
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
829
- generated tokens; otherwise it will be added to the policies set in token_policies.
830
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/azure#token_num_uses)
831
- of times a generated token may be used (within its lifetime); 0 means unlimited.
832
- :param pulumi.Input[int] token_period: If set, indicates that the
833
- token generated using this role should never expire. The token should be renewed within the
834
- duration specified by this value. At each renewal, the token's TTL will be set to the
835
- value of this field. Specified in seconds.
836
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
837
- on the auth method, this list may be supplemented by user/group/other values.
838
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
839
- Its current value will be referenced at renewal time.
840
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
841
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
842
- `service` tokens). For token store roles, there are two additional possibilities:
843
- `default-service` and `default-batch` which specify the type to return unless the client
844
- requests a different type at generation time.
756
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
757
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
758
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
759
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
760
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
761
+ :param pulumi.Input[int] token_period: Generated Token's Period
762
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
763
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
764
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
845
765
  """
846
766
  ...
847
767
  @overload
@@ -882,7 +802,7 @@ class AuthBackendRole(pulumi.CustomResource):
882
802
  Azure auth backend roles can be imported using `auth/`, the `backend` path, `/role/`, and the `role` name e.g.
883
803
 
884
804
  ```sh
885
- $ pulumi import vault:azure/authBackendRole:AuthBackendRole example auth/azure/role/test-role
805
+ $ pulumi import vault:azure/authBackendRole:AuthBackendRole example auth/azure/role/test-role
886
806
  ```
887
807
 
888
808
  :param str resource_name: The name of the resource.
@@ -1003,35 +923,18 @@ class AuthBackendRole(pulumi.CustomResource):
1003
923
  field.
1004
924
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
1005
925
  The value should not contain leading or trailing forward slashes.
1006
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
926
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1007
927
  *Available only for Vault Enterprise*.
1008
928
  :param pulumi.Input[str] role: The name of the role.
1009
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
1010
- addresses which can authenticate successfully, and ties the resulting token to these blocks
1011
- as well.
1012
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
1013
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1014
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1015
- `token_max_ttl` would otherwise allow a renewal.
1016
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
1017
- Its current value will be referenced at renewal time.
1018
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
1019
- generated tokens; otherwise it will be added to the policies set in token_policies.
1020
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/azure#token_num_uses)
1021
- of times a generated token may be used (within its lifetime); 0 means unlimited.
1022
- :param pulumi.Input[int] token_period: If set, indicates that the
1023
- token generated using this role should never expire. The token should be renewed within the
1024
- duration specified by this value. At each renewal, the token's TTL will be set to the
1025
- value of this field. Specified in seconds.
1026
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
1027
- on the auth method, this list may be supplemented by user/group/other values.
1028
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
1029
- Its current value will be referenced at renewal time.
1030
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
1031
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
1032
- `service` tokens). For token store roles, there are two additional possibilities:
1033
- `default-service` and `default-batch` which specify the type to return unless the client
1034
- requests a different type at generation time.
929
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
930
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
931
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
932
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
933
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
934
+ :param pulumi.Input[int] token_period: Generated Token's Period
935
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
936
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
937
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
1035
938
  """
1036
939
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
1037
940
 
@@ -1131,7 +1034,7 @@ class AuthBackendRole(pulumi.CustomResource):
1131
1034
  """
1132
1035
  The namespace to provision the resource in.
1133
1036
  The value should not contain leading or trailing forward slashes.
1134
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1037
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1135
1038
  *Available only for Vault Enterprise*.
1136
1039
  """
1137
1040
  return pulumi.get(self, "namespace")
@@ -1148,9 +1051,7 @@ class AuthBackendRole(pulumi.CustomResource):
1148
1051
  @pulumi.getter(name="tokenBoundCidrs")
1149
1052
  def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
1150
1053
  """
1151
- List of CIDR blocks; if set, specifies blocks of IP
1152
- addresses which can authenticate successfully, and ties the resulting token to these blocks
1153
- as well.
1054
+ Specifies the blocks of IP addresses which are allowed to use the generated token
1154
1055
  """
1155
1056
  return pulumi.get(self, "token_bound_cidrs")
1156
1057
 
@@ -1158,10 +1059,7 @@ class AuthBackendRole(pulumi.CustomResource):
1158
1059
  @pulumi.getter(name="tokenExplicitMaxTtl")
1159
1060
  def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
1160
1061
  """
1161
- If set, will encode an
1162
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1163
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1164
- `token_max_ttl` would otherwise allow a renewal.
1062
+ Generated Token's Explicit Maximum TTL in seconds
1165
1063
  """
1166
1064
  return pulumi.get(self, "token_explicit_max_ttl")
1167
1065
 
@@ -1169,8 +1067,7 @@ class AuthBackendRole(pulumi.CustomResource):
1169
1067
  @pulumi.getter(name="tokenMaxTtl")
1170
1068
  def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
1171
1069
  """
1172
- The maximum lifetime for generated tokens in number of seconds.
1173
- Its current value will be referenced at renewal time.
1070
+ The maximum lifetime of the generated token
1174
1071
  """
1175
1072
  return pulumi.get(self, "token_max_ttl")
1176
1073
 
@@ -1178,8 +1075,7 @@ class AuthBackendRole(pulumi.CustomResource):
1178
1075
  @pulumi.getter(name="tokenNoDefaultPolicy")
1179
1076
  def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
1180
1077
  """
1181
- If set, the default policy will not be set on
1182
- generated tokens; otherwise it will be added to the policies set in token_policies.
1078
+ If true, the 'default' policy will not automatically be added to generated tokens
1183
1079
  """
1184
1080
  return pulumi.get(self, "token_no_default_policy")
1185
1081
 
@@ -1187,8 +1083,7 @@ class AuthBackendRole(pulumi.CustomResource):
1187
1083
  @pulumi.getter(name="tokenNumUses")
1188
1084
  def token_num_uses(self) -> pulumi.Output[Optional[int]]:
1189
1085
  """
1190
- The [maximum number](https://www.vaultproject.io/api-docs/azure#token_num_uses)
1191
- of times a generated token may be used (within its lifetime); 0 means unlimited.
1086
+ The maximum number of times a token may be used, a value of zero means unlimited
1192
1087
  """
1193
1088
  return pulumi.get(self, "token_num_uses")
1194
1089
 
@@ -1196,10 +1091,7 @@ class AuthBackendRole(pulumi.CustomResource):
1196
1091
  @pulumi.getter(name="tokenPeriod")
1197
1092
  def token_period(self) -> pulumi.Output[Optional[int]]:
1198
1093
  """
1199
- If set, indicates that the
1200
- token generated using this role should never expire. The token should be renewed within the
1201
- duration specified by this value. At each renewal, the token's TTL will be set to the
1202
- value of this field. Specified in seconds.
1094
+ Generated Token's Period
1203
1095
  """
1204
1096
  return pulumi.get(self, "token_period")
1205
1097
 
@@ -1207,8 +1099,7 @@ class AuthBackendRole(pulumi.CustomResource):
1207
1099
  @pulumi.getter(name="tokenPolicies")
1208
1100
  def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
1209
1101
  """
1210
- List of policies to encode onto generated tokens. Depending
1211
- on the auth method, this list may be supplemented by user/group/other values.
1102
+ Generated Token's Policies
1212
1103
  """
1213
1104
  return pulumi.get(self, "token_policies")
1214
1105
 
@@ -1216,8 +1107,7 @@ class AuthBackendRole(pulumi.CustomResource):
1216
1107
  @pulumi.getter(name="tokenTtl")
1217
1108
  def token_ttl(self) -> pulumi.Output[Optional[int]]:
1218
1109
  """
1219
- The incremental lifetime for generated tokens in number of seconds.
1220
- Its current value will be referenced at renewal time.
1110
+ The initial ttl of the token to generate in seconds
1221
1111
  """
1222
1112
  return pulumi.get(self, "token_ttl")
1223
1113
 
@@ -1225,11 +1115,7 @@ class AuthBackendRole(pulumi.CustomResource):
1225
1115
  @pulumi.getter(name="tokenType")
1226
1116
  def token_type(self) -> pulumi.Output[Optional[str]]:
1227
1117
  """
1228
- The type of token that should be generated. Can be `service`,
1229
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
1230
- `service` tokens). For token store roles, there are two additional possibilities:
1231
- `default-service` and `default-batch` which specify the type to return unless the client
1232
- requests a different type at generation time.
1118
+ The type of token to generate, service or batch
1233
1119
  """
1234
1120
  return pulumi.get(self, "token_type")
1235
1121