pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +26 -9
  5. pulumi_vault/ad/secret_backend.py +16 -142
  6. pulumi_vault/ad/secret_library.py +16 -9
  7. pulumi_vault/ad/secret_role.py +14 -9
  8. pulumi_vault/alicloud/auth_backend_role.py +76 -190
  9. pulumi_vault/approle/auth_backend_login.py +12 -7
  10. pulumi_vault/approle/auth_backend_role.py +77 -191
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
  13. pulumi_vault/audit.py +30 -21
  14. pulumi_vault/audit_request_header.py +11 -2
  15. pulumi_vault/auth_backend.py +66 -14
  16. pulumi_vault/aws/auth_backend_cert.py +18 -9
  17. pulumi_vault/aws/auth_backend_client.py +267 -22
  18. pulumi_vault/aws/auth_backend_config_identity.py +14 -9
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +77 -191
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
  24. pulumi_vault/aws/auth_backend_sts_role.py +14 -9
  25. pulumi_vault/aws/get_access_credentials.py +38 -9
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +77 -9
  28. pulumi_vault/aws/secret_backend_role.py +185 -9
  29. pulumi_vault/aws/secret_backend_static_role.py +20 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +153 -15
  32. pulumi_vault/azure/auth_backend_role.py +77 -191
  33. pulumi_vault/azure/backend.py +227 -21
  34. pulumi_vault/azure/backend_role.py +42 -37
  35. pulumi_vault/azure/get_access_credentials.py +41 -7
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -267
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +28 -19
  44. pulumi_vault/consul/secret_backend_role.py +18 -78
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +119 -112
  48. pulumi_vault/database/secret_backend_role.py +31 -22
  49. pulumi_vault/database/secret_backend_static_role.py +87 -13
  50. pulumi_vault/database/secrets_mount.py +427 -136
  51. pulumi_vault/egp_policy.py +16 -11
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +250 -33
  54. pulumi_vault/gcp/auth_backend_role.py +77 -269
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -5
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -12
  58. pulumi_vault/gcp/secret_impersonated_account.py +76 -15
  59. pulumi_vault/gcp/secret_roleset.py +31 -24
  60. pulumi_vault/gcp/secret_static_account.py +39 -32
  61. pulumi_vault/generic/endpoint.py +24 -17
  62. pulumi_vault/generic/get_secret.py +64 -8
  63. pulumi_vault/generic/secret.py +21 -16
  64. pulumi_vault/get_auth_backend.py +24 -7
  65. pulumi_vault/get_auth_backends.py +51 -9
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -11
  69. pulumi_vault/get_policy_document.py +34 -19
  70. pulumi_vault/get_raft_autopilot_state.py +29 -10
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +19 -14
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +16 -11
  75. pulumi_vault/github/user.py +16 -11
  76. pulumi_vault/identity/entity.py +20 -13
  77. pulumi_vault/identity/entity_alias.py +20 -13
  78. pulumi_vault/identity/entity_policies.py +28 -11
  79. pulumi_vault/identity/get_entity.py +42 -10
  80. pulumi_vault/identity/get_group.py +47 -9
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -7
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -9
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -10
  84. pulumi_vault/identity/group.py +58 -39
  85. pulumi_vault/identity/group_alias.py +16 -9
  86. pulumi_vault/identity/group_member_entity_ids.py +28 -66
  87. pulumi_vault/identity/group_member_group_ids.py +40 -19
  88. pulumi_vault/identity/group_policies.py +20 -7
  89. pulumi_vault/identity/mfa_duo.py +11 -6
  90. pulumi_vault/identity/mfa_login_enforcement.py +15 -6
  91. pulumi_vault/identity/mfa_okta.py +11 -6
  92. pulumi_vault/identity/mfa_pingid.py +7 -2
  93. pulumi_vault/identity/mfa_totp.py +7 -2
  94. pulumi_vault/identity/oidc.py +12 -7
  95. pulumi_vault/identity/oidc_assignment.py +24 -11
  96. pulumi_vault/identity/oidc_client.py +36 -23
  97. pulumi_vault/identity/oidc_key.py +30 -17
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
  99. pulumi_vault/identity/oidc_provider.py +36 -21
  100. pulumi_vault/identity/oidc_role.py +42 -21
  101. pulumi_vault/identity/oidc_scope.py +20 -13
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +45 -40
  105. pulumi_vault/jwt/auth_backend_role.py +133 -254
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +24 -19
  108. pulumi_vault/kmip/secret_role.py +14 -9
  109. pulumi_vault/kmip/secret_scope.py +14 -9
  110. pulumi_vault/kubernetes/auth_backend_config.py +57 -5
  111. pulumi_vault/kubernetes/auth_backend_role.py +70 -177
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -11
  115. pulumi_vault/kubernetes/secret_backend.py +316 -27
  116. pulumi_vault/kubernetes/secret_backend_role.py +137 -46
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +25 -8
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
  120. pulumi_vault/kv/get_secret_v2.py +85 -9
  121. pulumi_vault/kv/get_secrets_list.py +24 -11
  122. pulumi_vault/kv/get_secrets_list_v2.py +37 -15
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +23 -16
  125. pulumi_vault/kv/secret_backend_v2.py +20 -11
  126. pulumi_vault/kv/secret_v2.py +59 -50
  127. pulumi_vault/ldap/auth_backend.py +127 -166
  128. pulumi_vault/ldap/auth_backend_group.py +14 -9
  129. pulumi_vault/ldap/auth_backend_user.py +14 -9
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +354 -82
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +16 -9
  135. pulumi_vault/ldap/secret_backend_static_role.py +73 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +29 -57
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +18 -11
  140. pulumi_vault/mfa_okta.py +18 -11
  141. pulumi_vault/mfa_pingid.py +18 -11
  142. pulumi_vault/mfa_totp.py +24 -17
  143. pulumi_vault/mongodbatlas/secret_backend.py +20 -15
  144. pulumi_vault/mongodbatlas/secret_role.py +47 -38
  145. pulumi_vault/mount.py +391 -51
  146. pulumi_vault/namespace.py +68 -83
  147. pulumi_vault/nomad_secret_backend.py +18 -13
  148. pulumi_vault/nomad_secret_role.py +14 -9
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +485 -39
  151. pulumi_vault/okta/auth_backend_group.py +14 -9
  152. pulumi_vault/okta/auth_backend_user.py +14 -9
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +20 -13
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -9
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -8
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
  174. pulumi_vault/pkisecret/secret_backend_key.py +14 -9
  175. pulumi_vault/pkisecret/secret_backend_role.py +21 -14
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +14 -9
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +60 -6
  185. pulumi_vault/quota_rate_limit.py +56 -2
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +18 -13
  189. pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
  190. pulumi_vault/raft_autopilot.py +14 -9
  191. pulumi_vault/raft_snapshot_agent_config.py +129 -224
  192. pulumi_vault/rgp_policy.py +14 -9
  193. pulumi_vault/saml/auth_backend.py +22 -17
  194. pulumi_vault/saml/auth_backend_role.py +92 -197
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -71
  199. pulumi_vault/secrets/sync_aws_destination.py +242 -27
  200. pulumi_vault/secrets/sync_azure_destination.py +92 -31
  201. pulumi_vault/secrets/sync_config.py +9 -4
  202. pulumi_vault/secrets/sync_gcp_destination.py +158 -25
  203. pulumi_vault/secrets/sync_gh_destination.py +189 -13
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +74 -13
  206. pulumi_vault/ssh/_inputs.py +28 -28
  207. pulumi_vault/ssh/outputs.py +11 -28
  208. pulumi_vault/ssh/secret_backend_ca.py +108 -9
  209. pulumi_vault/ssh/secret_backend_role.py +85 -118
  210. pulumi_vault/terraformcloud/secret_backend.py +7 -54
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -20
  212. pulumi_vault/terraformcloud/secret_role.py +16 -74
  213. pulumi_vault/token.py +28 -23
  214. pulumi_vault/tokenauth/auth_backend_role.py +78 -199
  215. pulumi_vault/transform/alphabet.py +16 -9
  216. pulumi_vault/transform/get_decode.py +45 -17
  217. pulumi_vault/transform/get_encode.py +45 -17
  218. pulumi_vault/transform/role.py +16 -9
  219. pulumi_vault/transform/template.py +30 -21
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -21
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +27 -93
  224. pulumi_vault/transit/secret_cache_config.py +12 -7
  225. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
@@ -40,32 +45,15 @@ class AuthBackendRoleArgs:
40
45
  The value should not contain leading or trailing forward slashes.
41
46
  The `namespace` is always relative to the provider's configured namespace.
42
47
  *Available only for Vault Enterprise*.
43
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
44
- addresses which can authenticate successfully, and ties the resulting token to these blocks
45
- as well.
46
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
47
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
48
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
49
- `token_max_ttl` would otherwise allow a renewal.
50
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
51
- Its current value will be referenced at renewal time.
52
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
53
- generated tokens; otherwise it will be added to the policies set in token_policies.
54
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
55
- of times a generated token may be used (within its lifetime); 0 means unlimited.
56
- :param pulumi.Input[int] token_period: If set, indicates that the
57
- token generated using this role should never expire. The token should be renewed within the
58
- duration specified by this value. At each renewal, the token's TTL will be set to the
59
- value of this field. Specified in seconds.
60
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
61
- on the auth method, this list may be supplemented by user/group/other values.
62
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
63
- Its current value will be referenced at renewal time.
64
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
65
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
66
- `service` tokens). For token store roles, there are two additional possibilities:
67
- `default-service` and `default-batch` which specify the type to return unless the client
68
- requests a different type at generation time.
48
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
49
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
50
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
51
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
52
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
53
+ :param pulumi.Input[int] token_period: Generated Token's Period
54
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
55
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
56
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
69
57
  """
70
58
  pulumi.set(__self__, "arn", arn)
71
59
  pulumi.set(__self__, "role", role)
@@ -151,9 +139,7 @@ class AuthBackendRoleArgs:
151
139
  @pulumi.getter(name="tokenBoundCidrs")
152
140
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
153
141
  """
154
- List of CIDR blocks; if set, specifies blocks of IP
155
- addresses which can authenticate successfully, and ties the resulting token to these blocks
156
- as well.
142
+ Specifies the blocks of IP addresses which are allowed to use the generated token
157
143
  """
158
144
  return pulumi.get(self, "token_bound_cidrs")
159
145
 
@@ -165,10 +151,7 @@ class AuthBackendRoleArgs:
165
151
  @pulumi.getter(name="tokenExplicitMaxTtl")
166
152
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
167
153
  """
168
- If set, will encode an
169
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
170
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
171
- `token_max_ttl` would otherwise allow a renewal.
154
+ Generated Token's Explicit Maximum TTL in seconds
172
155
  """
173
156
  return pulumi.get(self, "token_explicit_max_ttl")
174
157
 
@@ -180,8 +163,7 @@ class AuthBackendRoleArgs:
180
163
  @pulumi.getter(name="tokenMaxTtl")
181
164
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
182
165
  """
183
- The maximum lifetime for generated tokens in number of seconds.
184
- Its current value will be referenced at renewal time.
166
+ The maximum lifetime of the generated token
185
167
  """
186
168
  return pulumi.get(self, "token_max_ttl")
187
169
 
@@ -193,8 +175,7 @@ class AuthBackendRoleArgs:
193
175
  @pulumi.getter(name="tokenNoDefaultPolicy")
194
176
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
195
177
  """
196
- If set, the default policy will not be set on
197
- generated tokens; otherwise it will be added to the policies set in token_policies.
178
+ If true, the 'default' policy will not automatically be added to generated tokens
198
179
  """
199
180
  return pulumi.get(self, "token_no_default_policy")
200
181
 
@@ -206,8 +187,7 @@ class AuthBackendRoleArgs:
206
187
  @pulumi.getter(name="tokenNumUses")
207
188
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
208
189
  """
209
- The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
210
- of times a generated token may be used (within its lifetime); 0 means unlimited.
190
+ The maximum number of times a token may be used, a value of zero means unlimited
211
191
  """
212
192
  return pulumi.get(self, "token_num_uses")
213
193
 
@@ -219,10 +199,7 @@ class AuthBackendRoleArgs:
219
199
  @pulumi.getter(name="tokenPeriod")
220
200
  def token_period(self) -> Optional[pulumi.Input[int]]:
221
201
  """
222
- If set, indicates that the
223
- token generated using this role should never expire. The token should be renewed within the
224
- duration specified by this value. At each renewal, the token's TTL will be set to the
225
- value of this field. Specified in seconds.
202
+ Generated Token's Period
226
203
  """
227
204
  return pulumi.get(self, "token_period")
228
205
 
@@ -234,8 +211,7 @@ class AuthBackendRoleArgs:
234
211
  @pulumi.getter(name="tokenPolicies")
235
212
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
236
213
  """
237
- List of policies to encode onto generated tokens. Depending
238
- on the auth method, this list may be supplemented by user/group/other values.
214
+ Generated Token's Policies
239
215
  """
240
216
  return pulumi.get(self, "token_policies")
241
217
 
@@ -247,8 +223,7 @@ class AuthBackendRoleArgs:
247
223
  @pulumi.getter(name="tokenTtl")
248
224
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
249
225
  """
250
- The incremental lifetime for generated tokens in number of seconds.
251
- Its current value will be referenced at renewal time.
226
+ The initial ttl of the token to generate in seconds
252
227
  """
253
228
  return pulumi.get(self, "token_ttl")
254
229
 
@@ -260,11 +235,7 @@ class AuthBackendRoleArgs:
260
235
  @pulumi.getter(name="tokenType")
261
236
  def token_type(self) -> Optional[pulumi.Input[str]]:
262
237
  """
263
- The type of token that should be generated. Can be `service`,
264
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
265
- `service` tokens). For token store roles, there are two additional possibilities:
266
- `default-service` and `default-batch` which specify the type to return unless the client
267
- requests a different type at generation time.
238
+ The type of token to generate, service or batch
268
239
  """
269
240
  return pulumi.get(self, "token_type")
270
241
 
@@ -302,32 +273,15 @@ class _AuthBackendRoleState:
302
273
  *Available only for Vault Enterprise*.
303
274
  :param pulumi.Input[str] role: Name of the role. Must correspond with the name of
304
275
  the role reflected in the arn.
305
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
306
- addresses which can authenticate successfully, and ties the resulting token to these blocks
307
- as well.
308
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
309
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
310
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
311
- `token_max_ttl` would otherwise allow a renewal.
312
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
313
- Its current value will be referenced at renewal time.
314
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
315
- generated tokens; otherwise it will be added to the policies set in token_policies.
316
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
317
- of times a generated token may be used (within its lifetime); 0 means unlimited.
318
- :param pulumi.Input[int] token_period: If set, indicates that the
319
- token generated using this role should never expire. The token should be renewed within the
320
- duration specified by this value. At each renewal, the token's TTL will be set to the
321
- value of this field. Specified in seconds.
322
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
323
- on the auth method, this list may be supplemented by user/group/other values.
324
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
325
- Its current value will be referenced at renewal time.
326
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
327
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
328
- `service` tokens). For token store roles, there are two additional possibilities:
329
- `default-service` and `default-batch` which specify the type to return unless the client
330
- requests a different type at generation time.
276
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
277
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
278
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
279
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
280
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
281
+ :param pulumi.Input[int] token_period: Generated Token's Period
282
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
283
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
284
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
331
285
  """
332
286
  if arn is not None:
333
287
  pulumi.set(__self__, "arn", arn)
@@ -415,9 +369,7 @@ class _AuthBackendRoleState:
415
369
  @pulumi.getter(name="tokenBoundCidrs")
416
370
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
417
371
  """
418
- List of CIDR blocks; if set, specifies blocks of IP
419
- addresses which can authenticate successfully, and ties the resulting token to these blocks
420
- as well.
372
+ Specifies the blocks of IP addresses which are allowed to use the generated token
421
373
  """
422
374
  return pulumi.get(self, "token_bound_cidrs")
423
375
 
@@ -429,10 +381,7 @@ class _AuthBackendRoleState:
429
381
  @pulumi.getter(name="tokenExplicitMaxTtl")
430
382
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
431
383
  """
432
- If set, will encode an
433
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
434
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
435
- `token_max_ttl` would otherwise allow a renewal.
384
+ Generated Token's Explicit Maximum TTL in seconds
436
385
  """
437
386
  return pulumi.get(self, "token_explicit_max_ttl")
438
387
 
@@ -444,8 +393,7 @@ class _AuthBackendRoleState:
444
393
  @pulumi.getter(name="tokenMaxTtl")
445
394
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
446
395
  """
447
- The maximum lifetime for generated tokens in number of seconds.
448
- Its current value will be referenced at renewal time.
396
+ The maximum lifetime of the generated token
449
397
  """
450
398
  return pulumi.get(self, "token_max_ttl")
451
399
 
@@ -457,8 +405,7 @@ class _AuthBackendRoleState:
457
405
  @pulumi.getter(name="tokenNoDefaultPolicy")
458
406
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
459
407
  """
460
- If set, the default policy will not be set on
461
- generated tokens; otherwise it will be added to the policies set in token_policies.
408
+ If true, the 'default' policy will not automatically be added to generated tokens
462
409
  """
463
410
  return pulumi.get(self, "token_no_default_policy")
464
411
 
@@ -470,8 +417,7 @@ class _AuthBackendRoleState:
470
417
  @pulumi.getter(name="tokenNumUses")
471
418
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
472
419
  """
473
- The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
474
- of times a generated token may be used (within its lifetime); 0 means unlimited.
420
+ The maximum number of times a token may be used, a value of zero means unlimited
475
421
  """
476
422
  return pulumi.get(self, "token_num_uses")
477
423
 
@@ -483,10 +429,7 @@ class _AuthBackendRoleState:
483
429
  @pulumi.getter(name="tokenPeriod")
484
430
  def token_period(self) -> Optional[pulumi.Input[int]]:
485
431
  """
486
- If set, indicates that the
487
- token generated using this role should never expire. The token should be renewed within the
488
- duration specified by this value. At each renewal, the token's TTL will be set to the
489
- value of this field. Specified in seconds.
432
+ Generated Token's Period
490
433
  """
491
434
  return pulumi.get(self, "token_period")
492
435
 
@@ -498,8 +441,7 @@ class _AuthBackendRoleState:
498
441
  @pulumi.getter(name="tokenPolicies")
499
442
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
500
443
  """
501
- List of policies to encode onto generated tokens. Depending
502
- on the auth method, this list may be supplemented by user/group/other values.
444
+ Generated Token's Policies
503
445
  """
504
446
  return pulumi.get(self, "token_policies")
505
447
 
@@ -511,8 +453,7 @@ class _AuthBackendRoleState:
511
453
  @pulumi.getter(name="tokenTtl")
512
454
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
513
455
  """
514
- The incremental lifetime for generated tokens in number of seconds.
515
- Its current value will be referenced at renewal time.
456
+ The initial ttl of the token to generate in seconds
516
457
  """
517
458
  return pulumi.get(self, "token_ttl")
518
459
 
@@ -524,11 +465,7 @@ class _AuthBackendRoleState:
524
465
  @pulumi.getter(name="tokenType")
525
466
  def token_type(self) -> Optional[pulumi.Input[str]]:
526
467
  """
527
- The type of token that should be generated. Can be `service`,
528
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
529
- `service` tokens). For token store roles, there are two additional possibilities:
530
- `default-service` and `default-batch` which specify the type to return unless the client
531
- requests a different type at generation time.
468
+ The type of token to generate, service or batch
532
469
  """
533
470
  return pulumi.get(self, "token_type")
534
471
 
@@ -565,11 +502,11 @@ class AuthBackendRole(pulumi.CustomResource):
565
502
  import pulumi
566
503
  import pulumi_vault as vault
567
504
 
568
- alicloud_auth_backend = vault.AuthBackend("alicloudAuthBackend",
505
+ alicloud = vault.AuthBackend("alicloud",
569
506
  type="alicloud",
570
507
  path="alicloud")
571
- alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("alicloudAuthBackendRole",
572
- backend=alicloud_auth_backend.path,
508
+ alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("alicloud",
509
+ backend=alicloud.path,
573
510
  role="example",
574
511
  arn="acs:ram:123456:tf:role/foobar")
575
512
  ```
@@ -579,7 +516,7 @@ class AuthBackendRole(pulumi.CustomResource):
579
516
  Alicloud authentication roles can be imported using the `path`, e.g.
580
517
 
581
518
  ```sh
582
- $ pulumi import vault:alicloud/authBackendRole:AuthBackendRole my_role auth/alicloud/role/my_role
519
+ $ pulumi import vault:alicloud/authBackendRole:AuthBackendRole my_role auth/alicloud/role/my_role
583
520
  ```
584
521
 
585
522
  :param str resource_name: The name of the resource.
@@ -595,32 +532,15 @@ class AuthBackendRole(pulumi.CustomResource):
595
532
  *Available only for Vault Enterprise*.
596
533
  :param pulumi.Input[str] role: Name of the role. Must correspond with the name of
597
534
  the role reflected in the arn.
598
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
599
- addresses which can authenticate successfully, and ties the resulting token to these blocks
600
- as well.
601
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
602
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
603
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
604
- `token_max_ttl` would otherwise allow a renewal.
605
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
606
- Its current value will be referenced at renewal time.
607
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
608
- generated tokens; otherwise it will be added to the policies set in token_policies.
609
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
610
- of times a generated token may be used (within its lifetime); 0 means unlimited.
611
- :param pulumi.Input[int] token_period: If set, indicates that the
612
- token generated using this role should never expire. The token should be renewed within the
613
- duration specified by this value. At each renewal, the token's TTL will be set to the
614
- value of this field. Specified in seconds.
615
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
616
- on the auth method, this list may be supplemented by user/group/other values.
617
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
618
- Its current value will be referenced at renewal time.
619
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
620
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
621
- `service` tokens). For token store roles, there are two additional possibilities:
622
- `default-service` and `default-batch` which specify the type to return unless the client
623
- requests a different type at generation time.
535
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
536
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
537
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
538
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
539
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
540
+ :param pulumi.Input[int] token_period: Generated Token's Period
541
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
542
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
543
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
624
544
  """
625
545
  ...
626
546
  @overload
@@ -637,11 +557,11 @@ class AuthBackendRole(pulumi.CustomResource):
637
557
  import pulumi
638
558
  import pulumi_vault as vault
639
559
 
640
- alicloud_auth_backend = vault.AuthBackend("alicloudAuthBackend",
560
+ alicloud = vault.AuthBackend("alicloud",
641
561
  type="alicloud",
642
562
  path="alicloud")
643
- alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("alicloudAuthBackendRole",
644
- backend=alicloud_auth_backend.path,
563
+ alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("alicloud",
564
+ backend=alicloud.path,
645
565
  role="example",
646
566
  arn="acs:ram:123456:tf:role/foobar")
647
567
  ```
@@ -651,7 +571,7 @@ class AuthBackendRole(pulumi.CustomResource):
651
571
  Alicloud authentication roles can be imported using the `path`, e.g.
652
572
 
653
573
  ```sh
654
- $ pulumi import vault:alicloud/authBackendRole:AuthBackendRole my_role auth/alicloud/role/my_role
574
+ $ pulumi import vault:alicloud/authBackendRole:AuthBackendRole my_role auth/alicloud/role/my_role
655
575
  ```
656
576
 
657
577
  :param str resource_name: The name of the resource.
@@ -749,32 +669,15 @@ class AuthBackendRole(pulumi.CustomResource):
749
669
  *Available only for Vault Enterprise*.
750
670
  :param pulumi.Input[str] role: Name of the role. Must correspond with the name of
751
671
  the role reflected in the arn.
752
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
753
- addresses which can authenticate successfully, and ties the resulting token to these blocks
754
- as well.
755
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
756
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
757
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
758
- `token_max_ttl` would otherwise allow a renewal.
759
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
760
- Its current value will be referenced at renewal time.
761
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
762
- generated tokens; otherwise it will be added to the policies set in token_policies.
763
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
764
- of times a generated token may be used (within its lifetime); 0 means unlimited.
765
- :param pulumi.Input[int] token_period: If set, indicates that the
766
- token generated using this role should never expire. The token should be renewed within the
767
- duration specified by this value. At each renewal, the token's TTL will be set to the
768
- value of this field. Specified in seconds.
769
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
770
- on the auth method, this list may be supplemented by user/group/other values.
771
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
772
- Its current value will be referenced at renewal time.
773
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
774
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
775
- `service` tokens). For token store roles, there are two additional possibilities:
776
- `default-service` and `default-batch` which specify the type to return unless the client
777
- requests a different type at generation time.
672
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
673
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
674
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
675
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
676
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
677
+ :param pulumi.Input[int] token_period: Generated Token's Period
678
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
679
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
680
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
778
681
  """
779
682
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
780
683
 
@@ -838,9 +741,7 @@ class AuthBackendRole(pulumi.CustomResource):
838
741
  @pulumi.getter(name="tokenBoundCidrs")
839
742
  def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
840
743
  """
841
- List of CIDR blocks; if set, specifies blocks of IP
842
- addresses which can authenticate successfully, and ties the resulting token to these blocks
843
- as well.
744
+ Specifies the blocks of IP addresses which are allowed to use the generated token
844
745
  """
845
746
  return pulumi.get(self, "token_bound_cidrs")
846
747
 
@@ -848,10 +749,7 @@ class AuthBackendRole(pulumi.CustomResource):
848
749
  @pulumi.getter(name="tokenExplicitMaxTtl")
849
750
  def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
850
751
  """
851
- If set, will encode an
852
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
853
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
854
- `token_max_ttl` would otherwise allow a renewal.
752
+ Generated Token's Explicit Maximum TTL in seconds
855
753
  """
856
754
  return pulumi.get(self, "token_explicit_max_ttl")
857
755
 
@@ -859,8 +757,7 @@ class AuthBackendRole(pulumi.CustomResource):
859
757
  @pulumi.getter(name="tokenMaxTtl")
860
758
  def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
861
759
  """
862
- The maximum lifetime for generated tokens in number of seconds.
863
- Its current value will be referenced at renewal time.
760
+ The maximum lifetime of the generated token
864
761
  """
865
762
  return pulumi.get(self, "token_max_ttl")
866
763
 
@@ -868,8 +765,7 @@ class AuthBackendRole(pulumi.CustomResource):
868
765
  @pulumi.getter(name="tokenNoDefaultPolicy")
869
766
  def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
870
767
  """
871
- If set, the default policy will not be set on
872
- generated tokens; otherwise it will be added to the policies set in token_policies.
768
+ If true, the 'default' policy will not automatically be added to generated tokens
873
769
  """
874
770
  return pulumi.get(self, "token_no_default_policy")
875
771
 
@@ -877,8 +773,7 @@ class AuthBackendRole(pulumi.CustomResource):
877
773
  @pulumi.getter(name="tokenNumUses")
878
774
  def token_num_uses(self) -> pulumi.Output[Optional[int]]:
879
775
  """
880
- The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
881
- of times a generated token may be used (within its lifetime); 0 means unlimited.
776
+ The maximum number of times a token may be used, a value of zero means unlimited
882
777
  """
883
778
  return pulumi.get(self, "token_num_uses")
884
779
 
@@ -886,10 +781,7 @@ class AuthBackendRole(pulumi.CustomResource):
886
781
  @pulumi.getter(name="tokenPeriod")
887
782
  def token_period(self) -> pulumi.Output[Optional[int]]:
888
783
  """
889
- If set, indicates that the
890
- token generated using this role should never expire. The token should be renewed within the
891
- duration specified by this value. At each renewal, the token's TTL will be set to the
892
- value of this field. Specified in seconds.
784
+ Generated Token's Period
893
785
  """
894
786
  return pulumi.get(self, "token_period")
895
787
 
@@ -897,8 +789,7 @@ class AuthBackendRole(pulumi.CustomResource):
897
789
  @pulumi.getter(name="tokenPolicies")
898
790
  def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
899
791
  """
900
- List of policies to encode onto generated tokens. Depending
901
- on the auth method, this list may be supplemented by user/group/other values.
792
+ Generated Token's Policies
902
793
  """
903
794
  return pulumi.get(self, "token_policies")
904
795
 
@@ -906,8 +797,7 @@ class AuthBackendRole(pulumi.CustomResource):
906
797
  @pulumi.getter(name="tokenTtl")
907
798
  def token_ttl(self) -> pulumi.Output[Optional[int]]:
908
799
  """
909
- The incremental lifetime for generated tokens in number of seconds.
910
- Its current value will be referenced at renewal time.
800
+ The initial ttl of the token to generate in seconds
911
801
  """
912
802
  return pulumi.get(self, "token_ttl")
913
803
 
@@ -915,11 +805,7 @@ class AuthBackendRole(pulumi.CustomResource):
915
805
  @pulumi.getter(name="tokenType")
916
806
  def token_type(self) -> pulumi.Output[Optional[str]]:
917
807
  """
918
- The type of token that should be generated. Can be `service`,
919
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
920
- `service` tokens). For token store roles, there are two additional possibilities:
921
- `default-service` and `default-batch` which specify the type to return unless the client
922
- requests a different type at generation time.
808
+ The type of token to generate, service or batch
923
809
  """
924
810
  return pulumi.get(self, "token_type")
925
811
 
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['AuthBackendLoginArgs', 'AuthBackendLogin']
@@ -24,7 +29,7 @@ class AuthBackendLoginArgs:
24
29
  :param pulumi.Input[str] backend: The unique path of the Vault backend to log in with.
25
30
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
26
31
  The value should not contain leading or trailing forward slashes.
27
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
32
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
28
33
  *Available only for Vault Enterprise*.
29
34
  :param pulumi.Input[str] secret_id: The secret ID of the role to log in with. Required
30
35
  unless `bind_secret_id` is set to false on the role.
@@ -67,7 +72,7 @@ class AuthBackendLoginArgs:
67
72
  """
68
73
  The namespace to provision the resource in.
69
74
  The value should not contain leading or trailing forward slashes.
70
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
75
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
71
76
  *Available only for Vault Enterprise*.
72
77
  """
73
78
  return pulumi.get(self, "namespace")
@@ -114,7 +119,7 @@ class _AuthBackendLoginState:
114
119
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: The metadata associated with the token.
115
120
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
116
121
  The value should not contain leading or trailing forward slashes.
117
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
122
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
118
123
  *Available only for Vault Enterprise*.
119
124
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: A list of policies applied to the token.
120
125
  :param pulumi.Input[bool] renewable: Whether the token is renewable or not.
@@ -223,7 +228,7 @@ class _AuthBackendLoginState:
223
228
  """
224
229
  The namespace to provision the resource in.
225
230
  The value should not contain leading or trailing forward slashes.
226
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
231
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
227
232
  *Available only for Vault Enterprise*.
228
233
  """
229
234
  return pulumi.get(self, "namespace")
@@ -326,7 +331,7 @@ class AuthBackendLogin(pulumi.CustomResource):
326
331
  :param pulumi.Input[str] backend: The unique path of the Vault backend to log in with.
327
332
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
328
333
  The value should not contain leading or trailing forward slashes.
329
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
334
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
330
335
  *Available only for Vault Enterprise*.
331
336
  :param pulumi.Input[str] role_id: The ID of the role to log in with.
332
337
  :param pulumi.Input[str] secret_id: The secret ID of the role to log in with. Required
@@ -446,7 +451,7 @@ class AuthBackendLogin(pulumi.CustomResource):
446
451
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: The metadata associated with the token.
447
452
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
448
453
  The value should not contain leading or trailing forward slashes.
449
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
454
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
450
455
  *Available only for Vault Enterprise*.
451
456
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: A list of policies applied to the token.
452
457
  :param pulumi.Input[bool] renewable: Whether the token is renewable or not.
@@ -525,7 +530,7 @@ class AuthBackendLogin(pulumi.CustomResource):
525
530
  """
526
531
  The namespace to provision the resource in.
527
532
  The value should not contain leading or trailing forward slashes.
528
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
533
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
529
534
  *Available only for Vault Enterprise*.
530
535
  """
531
536
  return pulumi.get(self, "namespace")