pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736850018__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +22 -7
  5. pulumi_vault/ad/secret_backend.py +14 -144
  6. pulumi_vault/ad/secret_library.py +14 -11
  7. pulumi_vault/ad/secret_role.py +12 -11
  8. pulumi_vault/alicloud/auth_backend_role.py +74 -192
  9. pulumi_vault/approle/auth_backend_login.py +12 -11
  10. pulumi_vault/approle/auth_backend_role.py +75 -193
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
  13. pulumi_vault/audit.py +24 -27
  14. pulumi_vault/audit_request_header.py +11 -6
  15. pulumi_vault/auth_backend.py +64 -12
  16. pulumi_vault/aws/auth_backend_cert.py +12 -7
  17. pulumi_vault/aws/auth_backend_client.py +265 -24
  18. pulumi_vault/aws/auth_backend_config_identity.py +12 -11
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +75 -193
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
  24. pulumi_vault/aws/auth_backend_sts_role.py +12 -11
  25. pulumi_vault/aws/get_access_credentials.py +34 -7
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +75 -7
  28. pulumi_vault/aws/secret_backend_role.py +183 -11
  29. pulumi_vault/aws/secret_backend_static_role.py +14 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +151 -17
  32. pulumi_vault/azure/auth_backend_role.py +75 -193
  33. pulumi_vault/azure/backend.py +223 -29
  34. pulumi_vault/azure/backend_role.py +42 -41
  35. pulumi_vault/azure/get_access_credentials.py +39 -11
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -271
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +22 -25
  44. pulumi_vault/consul/secret_backend_role.py +14 -80
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +117 -114
  48. pulumi_vault/database/secret_backend_role.py +29 -24
  49. pulumi_vault/database/secret_backend_static_role.py +85 -15
  50. pulumi_vault/database/secrets_mount.py +425 -138
  51. pulumi_vault/egp_policy.py +16 -15
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +248 -35
  54. pulumi_vault/gcp/auth_backend_role.py +75 -271
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -9
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -16
  58. pulumi_vault/gcp/secret_impersonated_account.py +74 -17
  59. pulumi_vault/gcp/secret_roleset.py +29 -26
  60. pulumi_vault/gcp/secret_static_account.py +37 -34
  61. pulumi_vault/generic/endpoint.py +22 -21
  62. pulumi_vault/generic/get_secret.py +68 -12
  63. pulumi_vault/generic/secret.py +19 -14
  64. pulumi_vault/get_auth_backend.py +24 -11
  65. pulumi_vault/get_auth_backends.py +33 -11
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -15
  69. pulumi_vault/get_policy_document.py +34 -23
  70. pulumi_vault/get_raft_autopilot_state.py +29 -14
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +17 -16
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +14 -13
  75. pulumi_vault/github/user.py +14 -13
  76. pulumi_vault/identity/entity.py +18 -15
  77. pulumi_vault/identity/entity_alias.py +18 -15
  78. pulumi_vault/identity/entity_policies.py +24 -19
  79. pulumi_vault/identity/get_entity.py +40 -14
  80. pulumi_vault/identity/get_group.py +45 -13
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -11
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -13
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -14
  84. pulumi_vault/identity/group.py +50 -49
  85. pulumi_vault/identity/group_alias.py +14 -11
  86. pulumi_vault/identity/group_member_entity_ids.py +24 -74
  87. pulumi_vault/identity/group_member_group_ids.py +36 -27
  88. pulumi_vault/identity/group_policies.py +16 -15
  89. pulumi_vault/identity/mfa_duo.py +9 -8
  90. pulumi_vault/identity/mfa_login_enforcement.py +13 -8
  91. pulumi_vault/identity/mfa_okta.py +9 -8
  92. pulumi_vault/identity/mfa_pingid.py +5 -4
  93. pulumi_vault/identity/mfa_totp.py +5 -4
  94. pulumi_vault/identity/oidc.py +12 -11
  95. pulumi_vault/identity/oidc_assignment.py +22 -13
  96. pulumi_vault/identity/oidc_client.py +34 -25
  97. pulumi_vault/identity/oidc_key.py +28 -19
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
  99. pulumi_vault/identity/oidc_provider.py +34 -23
  100. pulumi_vault/identity/oidc_role.py +40 -27
  101. pulumi_vault/identity/oidc_scope.py +18 -15
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +39 -46
  105. pulumi_vault/jwt/auth_backend_role.py +131 -260
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +22 -21
  108. pulumi_vault/kmip/secret_role.py +12 -11
  109. pulumi_vault/kmip/secret_scope.py +12 -11
  110. pulumi_vault/kubernetes/auth_backend_config.py +55 -7
  111. pulumi_vault/kubernetes/auth_backend_role.py +68 -179
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -15
  115. pulumi_vault/kubernetes/secret_backend.py +314 -29
  116. pulumi_vault/kubernetes/secret_backend_role.py +135 -56
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +23 -12
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
  120. pulumi_vault/kv/get_secret_v2.py +89 -9
  121. pulumi_vault/kv/get_secrets_list.py +22 -15
  122. pulumi_vault/kv/get_secrets_list_v2.py +35 -19
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +19 -18
  125. pulumi_vault/kv/secret_backend_v2.py +12 -11
  126. pulumi_vault/kv/secret_v2.py +55 -52
  127. pulumi_vault/ldap/auth_backend.py +125 -168
  128. pulumi_vault/ldap/auth_backend_group.py +12 -11
  129. pulumi_vault/ldap/auth_backend_user.py +12 -11
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +352 -84
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +14 -11
  135. pulumi_vault/ldap/secret_backend_static_role.py +67 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +27 -43
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +16 -13
  140. pulumi_vault/mfa_okta.py +16 -13
  141. pulumi_vault/mfa_pingid.py +16 -13
  142. pulumi_vault/mfa_totp.py +22 -19
  143. pulumi_vault/mongodbatlas/secret_backend.py +18 -17
  144. pulumi_vault/mongodbatlas/secret_role.py +41 -38
  145. pulumi_vault/mount.py +389 -65
  146. pulumi_vault/namespace.py +26 -21
  147. pulumi_vault/nomad_secret_backend.py +16 -15
  148. pulumi_vault/nomad_secret_role.py +12 -11
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +483 -41
  151. pulumi_vault/okta/auth_backend_group.py +12 -11
  152. pulumi_vault/okta/auth_backend_user.py +12 -11
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +18 -15
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -13
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -12
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
  174. pulumi_vault/pkisecret/secret_backend_key.py +12 -7
  175. pulumi_vault/pkisecret/secret_backend_role.py +19 -16
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +12 -7
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +58 -8
  185. pulumi_vault/quota_rate_limit.py +54 -4
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +16 -15
  189. pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
  190. pulumi_vault/raft_autopilot.py +12 -11
  191. pulumi_vault/raft_snapshot_agent_config.py +121 -311
  192. pulumi_vault/rgp_policy.py +14 -13
  193. pulumi_vault/saml/auth_backend.py +20 -19
  194. pulumi_vault/saml/auth_backend_role.py +90 -199
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -75
  199. pulumi_vault/secrets/sync_aws_destination.py +240 -29
  200. pulumi_vault/secrets/sync_azure_destination.py +90 -33
  201. pulumi_vault/secrets/sync_config.py +7 -6
  202. pulumi_vault/secrets/sync_gcp_destination.py +156 -27
  203. pulumi_vault/secrets/sync_gh_destination.py +187 -15
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +72 -15
  206. pulumi_vault/ssh/_inputs.py +28 -32
  207. pulumi_vault/ssh/outputs.py +11 -32
  208. pulumi_vault/ssh/secret_backend_ca.py +106 -11
  209. pulumi_vault/ssh/secret_backend_role.py +83 -120
  210. pulumi_vault/terraformcloud/secret_backend.py +5 -56
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -24
  212. pulumi_vault/terraformcloud/secret_role.py +14 -76
  213. pulumi_vault/token.py +26 -25
  214. pulumi_vault/tokenauth/auth_backend_role.py +76 -201
  215. pulumi_vault/transform/alphabet.py +16 -13
  216. pulumi_vault/transform/get_decode.py +45 -21
  217. pulumi_vault/transform/get_encode.py +45 -21
  218. pulumi_vault/transform/role.py +16 -13
  219. pulumi_vault/transform/template.py +30 -25
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -25
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +25 -97
  224. pulumi_vault/transit/secret_cache_config.py +12 -11
  225. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736850018.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736850018.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
@@ -40,32 +45,15 @@ class AuthBackendRoleArgs:
40
45
  The value should not contain leading or trailing forward slashes.
41
46
  The `namespace` is always relative to the provider's configured namespace.
42
47
  *Available only for Vault Enterprise*.
43
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
44
- addresses which can authenticate successfully, and ties the resulting token to these blocks
45
- as well.
46
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
47
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
48
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
49
- `token_max_ttl` would otherwise allow a renewal.
50
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
51
- Its current value will be referenced at renewal time.
52
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
53
- generated tokens; otherwise it will be added to the policies set in token_policies.
54
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
55
- of times a generated token may be used (within its lifetime); 0 means unlimited.
56
- :param pulumi.Input[int] token_period: If set, indicates that the
57
- token generated using this role should never expire. The token should be renewed within the
58
- duration specified by this value. At each renewal, the token's TTL will be set to the
59
- value of this field. Specified in seconds.
60
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
61
- on the auth method, this list may be supplemented by user/group/other values.
62
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
63
- Its current value will be referenced at renewal time.
64
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
65
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
66
- `service` tokens). For token store roles, there are two additional possibilities:
67
- `default-service` and `default-batch` which specify the type to return unless the client
68
- requests a different type at generation time.
48
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
49
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
50
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
51
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
52
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
53
+ :param pulumi.Input[int] token_period: Generated Token's Period
54
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
55
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
56
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
69
57
  """
70
58
  pulumi.set(__self__, "arn", arn)
71
59
  pulumi.set(__self__, "role", role)
@@ -151,9 +139,7 @@ class AuthBackendRoleArgs:
151
139
  @pulumi.getter(name="tokenBoundCidrs")
152
140
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
153
141
  """
154
- List of CIDR blocks; if set, specifies blocks of IP
155
- addresses which can authenticate successfully, and ties the resulting token to these blocks
156
- as well.
142
+ Specifies the blocks of IP addresses which are allowed to use the generated token
157
143
  """
158
144
  return pulumi.get(self, "token_bound_cidrs")
159
145
 
@@ -165,10 +151,7 @@ class AuthBackendRoleArgs:
165
151
  @pulumi.getter(name="tokenExplicitMaxTtl")
166
152
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
167
153
  """
168
- If set, will encode an
169
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
170
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
171
- `token_max_ttl` would otherwise allow a renewal.
154
+ Generated Token's Explicit Maximum TTL in seconds
172
155
  """
173
156
  return pulumi.get(self, "token_explicit_max_ttl")
174
157
 
@@ -180,8 +163,7 @@ class AuthBackendRoleArgs:
180
163
  @pulumi.getter(name="tokenMaxTtl")
181
164
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
182
165
  """
183
- The maximum lifetime for generated tokens in number of seconds.
184
- Its current value will be referenced at renewal time.
166
+ The maximum lifetime of the generated token
185
167
  """
186
168
  return pulumi.get(self, "token_max_ttl")
187
169
 
@@ -193,8 +175,7 @@ class AuthBackendRoleArgs:
193
175
  @pulumi.getter(name="tokenNoDefaultPolicy")
194
176
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
195
177
  """
196
- If set, the default policy will not be set on
197
- generated tokens; otherwise it will be added to the policies set in token_policies.
178
+ If true, the 'default' policy will not automatically be added to generated tokens
198
179
  """
199
180
  return pulumi.get(self, "token_no_default_policy")
200
181
 
@@ -206,8 +187,7 @@ class AuthBackendRoleArgs:
206
187
  @pulumi.getter(name="tokenNumUses")
207
188
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
208
189
  """
209
- The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
210
- of times a generated token may be used (within its lifetime); 0 means unlimited.
190
+ The maximum number of times a token may be used, a value of zero means unlimited
211
191
  """
212
192
  return pulumi.get(self, "token_num_uses")
213
193
 
@@ -219,10 +199,7 @@ class AuthBackendRoleArgs:
219
199
  @pulumi.getter(name="tokenPeriod")
220
200
  def token_period(self) -> Optional[pulumi.Input[int]]:
221
201
  """
222
- If set, indicates that the
223
- token generated using this role should never expire. The token should be renewed within the
224
- duration specified by this value. At each renewal, the token's TTL will be set to the
225
- value of this field. Specified in seconds.
202
+ Generated Token's Period
226
203
  """
227
204
  return pulumi.get(self, "token_period")
228
205
 
@@ -234,8 +211,7 @@ class AuthBackendRoleArgs:
234
211
  @pulumi.getter(name="tokenPolicies")
235
212
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
236
213
  """
237
- List of policies to encode onto generated tokens. Depending
238
- on the auth method, this list may be supplemented by user/group/other values.
214
+ Generated Token's Policies
239
215
  """
240
216
  return pulumi.get(self, "token_policies")
241
217
 
@@ -247,8 +223,7 @@ class AuthBackendRoleArgs:
247
223
  @pulumi.getter(name="tokenTtl")
248
224
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
249
225
  """
250
- The incremental lifetime for generated tokens in number of seconds.
251
- Its current value will be referenced at renewal time.
226
+ The initial ttl of the token to generate in seconds
252
227
  """
253
228
  return pulumi.get(self, "token_ttl")
254
229
 
@@ -260,11 +235,7 @@ class AuthBackendRoleArgs:
260
235
  @pulumi.getter(name="tokenType")
261
236
  def token_type(self) -> Optional[pulumi.Input[str]]:
262
237
  """
263
- The type of token that should be generated. Can be `service`,
264
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
265
- `service` tokens). For token store roles, there are two additional possibilities:
266
- `default-service` and `default-batch` which specify the type to return unless the client
267
- requests a different type at generation time.
238
+ The type of token to generate, service or batch
268
239
  """
269
240
  return pulumi.get(self, "token_type")
270
241
 
@@ -302,32 +273,15 @@ class _AuthBackendRoleState:
302
273
  *Available only for Vault Enterprise*.
303
274
  :param pulumi.Input[str] role: Name of the role. Must correspond with the name of
304
275
  the role reflected in the arn.
305
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
306
- addresses which can authenticate successfully, and ties the resulting token to these blocks
307
- as well.
308
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
309
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
310
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
311
- `token_max_ttl` would otherwise allow a renewal.
312
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
313
- Its current value will be referenced at renewal time.
314
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
315
- generated tokens; otherwise it will be added to the policies set in token_policies.
316
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
317
- of times a generated token may be used (within its lifetime); 0 means unlimited.
318
- :param pulumi.Input[int] token_period: If set, indicates that the
319
- token generated using this role should never expire. The token should be renewed within the
320
- duration specified by this value. At each renewal, the token's TTL will be set to the
321
- value of this field. Specified in seconds.
322
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
323
- on the auth method, this list may be supplemented by user/group/other values.
324
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
325
- Its current value will be referenced at renewal time.
326
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
327
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
328
- `service` tokens). For token store roles, there are two additional possibilities:
329
- `default-service` and `default-batch` which specify the type to return unless the client
330
- requests a different type at generation time.
276
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
277
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
278
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
279
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
280
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
281
+ :param pulumi.Input[int] token_period: Generated Token's Period
282
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
283
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
284
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
331
285
  """
332
286
  if arn is not None:
333
287
  pulumi.set(__self__, "arn", arn)
@@ -415,9 +369,7 @@ class _AuthBackendRoleState:
415
369
  @pulumi.getter(name="tokenBoundCidrs")
416
370
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
417
371
  """
418
- List of CIDR blocks; if set, specifies blocks of IP
419
- addresses which can authenticate successfully, and ties the resulting token to these blocks
420
- as well.
372
+ Specifies the blocks of IP addresses which are allowed to use the generated token
421
373
  """
422
374
  return pulumi.get(self, "token_bound_cidrs")
423
375
 
@@ -429,10 +381,7 @@ class _AuthBackendRoleState:
429
381
  @pulumi.getter(name="tokenExplicitMaxTtl")
430
382
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
431
383
  """
432
- If set, will encode an
433
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
434
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
435
- `token_max_ttl` would otherwise allow a renewal.
384
+ Generated Token's Explicit Maximum TTL in seconds
436
385
  """
437
386
  return pulumi.get(self, "token_explicit_max_ttl")
438
387
 
@@ -444,8 +393,7 @@ class _AuthBackendRoleState:
444
393
  @pulumi.getter(name="tokenMaxTtl")
445
394
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
446
395
  """
447
- The maximum lifetime for generated tokens in number of seconds.
448
- Its current value will be referenced at renewal time.
396
+ The maximum lifetime of the generated token
449
397
  """
450
398
  return pulumi.get(self, "token_max_ttl")
451
399
 
@@ -457,8 +405,7 @@ class _AuthBackendRoleState:
457
405
  @pulumi.getter(name="tokenNoDefaultPolicy")
458
406
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
459
407
  """
460
- If set, the default policy will not be set on
461
- generated tokens; otherwise it will be added to the policies set in token_policies.
408
+ If true, the 'default' policy will not automatically be added to generated tokens
462
409
  """
463
410
  return pulumi.get(self, "token_no_default_policy")
464
411
 
@@ -470,8 +417,7 @@ class _AuthBackendRoleState:
470
417
  @pulumi.getter(name="tokenNumUses")
471
418
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
472
419
  """
473
- The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
474
- of times a generated token may be used (within its lifetime); 0 means unlimited.
420
+ The maximum number of times a token may be used, a value of zero means unlimited
475
421
  """
476
422
  return pulumi.get(self, "token_num_uses")
477
423
 
@@ -483,10 +429,7 @@ class _AuthBackendRoleState:
483
429
  @pulumi.getter(name="tokenPeriod")
484
430
  def token_period(self) -> Optional[pulumi.Input[int]]:
485
431
  """
486
- If set, indicates that the
487
- token generated using this role should never expire. The token should be renewed within the
488
- duration specified by this value. At each renewal, the token's TTL will be set to the
489
- value of this field. Specified in seconds.
432
+ Generated Token's Period
490
433
  """
491
434
  return pulumi.get(self, "token_period")
492
435
 
@@ -498,8 +441,7 @@ class _AuthBackendRoleState:
498
441
  @pulumi.getter(name="tokenPolicies")
499
442
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
500
443
  """
501
- List of policies to encode onto generated tokens. Depending
502
- on the auth method, this list may be supplemented by user/group/other values.
444
+ Generated Token's Policies
503
445
  """
504
446
  return pulumi.get(self, "token_policies")
505
447
 
@@ -511,8 +453,7 @@ class _AuthBackendRoleState:
511
453
  @pulumi.getter(name="tokenTtl")
512
454
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
513
455
  """
514
- The incremental lifetime for generated tokens in number of seconds.
515
- Its current value will be referenced at renewal time.
456
+ The initial ttl of the token to generate in seconds
516
457
  """
517
458
  return pulumi.get(self, "token_ttl")
518
459
 
@@ -524,11 +465,7 @@ class _AuthBackendRoleState:
524
465
  @pulumi.getter(name="tokenType")
525
466
  def token_type(self) -> Optional[pulumi.Input[str]]:
526
467
  """
527
- The type of token that should be generated. Can be `service`,
528
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
529
- `service` tokens). For token store roles, there are two additional possibilities:
530
- `default-service` and `default-batch` which specify the type to return unless the client
531
- requests a different type at generation time.
468
+ The type of token to generate, service or batch
532
469
  """
533
470
  return pulumi.get(self, "token_type")
534
471
 
@@ -561,20 +498,18 @@ class AuthBackendRole(pulumi.CustomResource):
561
498
 
562
499
  ## Example Usage
563
500
 
564
- <!--Start PulumiCodeChooser -->
565
501
  ```python
566
502
  import pulumi
567
503
  import pulumi_vault as vault
568
504
 
569
- alicloud_auth_backend = vault.AuthBackend("alicloudAuthBackend",
505
+ alicloud = vault.AuthBackend("alicloud",
570
506
  type="alicloud",
571
507
  path="alicloud")
572
- alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("alicloudAuthBackendRole",
573
- backend=alicloud_auth_backend.path,
508
+ alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("alicloud",
509
+ backend=alicloud.path,
574
510
  role="example",
575
511
  arn="acs:ram:123456:tf:role/foobar")
576
512
  ```
577
- <!--End PulumiCodeChooser -->
578
513
 
579
514
  ## Import
580
515
 
@@ -597,32 +532,15 @@ class AuthBackendRole(pulumi.CustomResource):
597
532
  *Available only for Vault Enterprise*.
598
533
  :param pulumi.Input[str] role: Name of the role. Must correspond with the name of
599
534
  the role reflected in the arn.
600
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
601
- addresses which can authenticate successfully, and ties the resulting token to these blocks
602
- as well.
603
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
604
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
605
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
606
- `token_max_ttl` would otherwise allow a renewal.
607
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
608
- Its current value will be referenced at renewal time.
609
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
610
- generated tokens; otherwise it will be added to the policies set in token_policies.
611
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
612
- of times a generated token may be used (within its lifetime); 0 means unlimited.
613
- :param pulumi.Input[int] token_period: If set, indicates that the
614
- token generated using this role should never expire. The token should be renewed within the
615
- duration specified by this value. At each renewal, the token's TTL will be set to the
616
- value of this field. Specified in seconds.
617
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
618
- on the auth method, this list may be supplemented by user/group/other values.
619
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
620
- Its current value will be referenced at renewal time.
621
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
622
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
623
- `service` tokens). For token store roles, there are two additional possibilities:
624
- `default-service` and `default-batch` which specify the type to return unless the client
625
- requests a different type at generation time.
535
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
536
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
537
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
538
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
539
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
540
+ :param pulumi.Input[int] token_period: Generated Token's Period
541
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
542
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
543
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
626
544
  """
627
545
  ...
628
546
  @overload
@@ -635,20 +553,18 @@ class AuthBackendRole(pulumi.CustomResource):
635
553
 
636
554
  ## Example Usage
637
555
 
638
- <!--Start PulumiCodeChooser -->
639
556
  ```python
640
557
  import pulumi
641
558
  import pulumi_vault as vault
642
559
 
643
- alicloud_auth_backend = vault.AuthBackend("alicloudAuthBackend",
560
+ alicloud = vault.AuthBackend("alicloud",
644
561
  type="alicloud",
645
562
  path="alicloud")
646
- alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("alicloudAuthBackendRole",
647
- backend=alicloud_auth_backend.path,
563
+ alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("alicloud",
564
+ backend=alicloud.path,
648
565
  role="example",
649
566
  arn="acs:ram:123456:tf:role/foobar")
650
567
  ```
651
- <!--End PulumiCodeChooser -->
652
568
 
653
569
  ## Import
654
570
 
@@ -753,32 +669,15 @@ class AuthBackendRole(pulumi.CustomResource):
753
669
  *Available only for Vault Enterprise*.
754
670
  :param pulumi.Input[str] role: Name of the role. Must correspond with the name of
755
671
  the role reflected in the arn.
756
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
757
- addresses which can authenticate successfully, and ties the resulting token to these blocks
758
- as well.
759
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
760
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
761
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
762
- `token_max_ttl` would otherwise allow a renewal.
763
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
764
- Its current value will be referenced at renewal time.
765
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
766
- generated tokens; otherwise it will be added to the policies set in token_policies.
767
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
768
- of times a generated token may be used (within its lifetime); 0 means unlimited.
769
- :param pulumi.Input[int] token_period: If set, indicates that the
770
- token generated using this role should never expire. The token should be renewed within the
771
- duration specified by this value. At each renewal, the token's TTL will be set to the
772
- value of this field. Specified in seconds.
773
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
774
- on the auth method, this list may be supplemented by user/group/other values.
775
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
776
- Its current value will be referenced at renewal time.
777
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
778
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
779
- `service` tokens). For token store roles, there are two additional possibilities:
780
- `default-service` and `default-batch` which specify the type to return unless the client
781
- requests a different type at generation time.
672
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
673
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
674
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
675
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
676
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
677
+ :param pulumi.Input[int] token_period: Generated Token's Period
678
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
679
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
680
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
782
681
  """
783
682
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
784
683
 
@@ -842,9 +741,7 @@ class AuthBackendRole(pulumi.CustomResource):
842
741
  @pulumi.getter(name="tokenBoundCidrs")
843
742
  def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
844
743
  """
845
- List of CIDR blocks; if set, specifies blocks of IP
846
- addresses which can authenticate successfully, and ties the resulting token to these blocks
847
- as well.
744
+ Specifies the blocks of IP addresses which are allowed to use the generated token
848
745
  """
849
746
  return pulumi.get(self, "token_bound_cidrs")
850
747
 
@@ -852,10 +749,7 @@ class AuthBackendRole(pulumi.CustomResource):
852
749
  @pulumi.getter(name="tokenExplicitMaxTtl")
853
750
  def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
854
751
  """
855
- If set, will encode an
856
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
857
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
858
- `token_max_ttl` would otherwise allow a renewal.
752
+ Generated Token's Explicit Maximum TTL in seconds
859
753
  """
860
754
  return pulumi.get(self, "token_explicit_max_ttl")
861
755
 
@@ -863,8 +757,7 @@ class AuthBackendRole(pulumi.CustomResource):
863
757
  @pulumi.getter(name="tokenMaxTtl")
864
758
  def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
865
759
  """
866
- The maximum lifetime for generated tokens in number of seconds.
867
- Its current value will be referenced at renewal time.
760
+ The maximum lifetime of the generated token
868
761
  """
869
762
  return pulumi.get(self, "token_max_ttl")
870
763
 
@@ -872,8 +765,7 @@ class AuthBackendRole(pulumi.CustomResource):
872
765
  @pulumi.getter(name="tokenNoDefaultPolicy")
873
766
  def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
874
767
  """
875
- If set, the default policy will not be set on
876
- generated tokens; otherwise it will be added to the policies set in token_policies.
768
+ If true, the 'default' policy will not automatically be added to generated tokens
877
769
  """
878
770
  return pulumi.get(self, "token_no_default_policy")
879
771
 
@@ -881,8 +773,7 @@ class AuthBackendRole(pulumi.CustomResource):
881
773
  @pulumi.getter(name="tokenNumUses")
882
774
  def token_num_uses(self) -> pulumi.Output[Optional[int]]:
883
775
  """
884
- The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
885
- of times a generated token may be used (within its lifetime); 0 means unlimited.
776
+ The maximum number of times a token may be used, a value of zero means unlimited
886
777
  """
887
778
  return pulumi.get(self, "token_num_uses")
888
779
 
@@ -890,10 +781,7 @@ class AuthBackendRole(pulumi.CustomResource):
890
781
  @pulumi.getter(name="tokenPeriod")
891
782
  def token_period(self) -> pulumi.Output[Optional[int]]:
892
783
  """
893
- If set, indicates that the
894
- token generated using this role should never expire. The token should be renewed within the
895
- duration specified by this value. At each renewal, the token's TTL will be set to the
896
- value of this field. Specified in seconds.
784
+ Generated Token's Period
897
785
  """
898
786
  return pulumi.get(self, "token_period")
899
787
 
@@ -901,8 +789,7 @@ class AuthBackendRole(pulumi.CustomResource):
901
789
  @pulumi.getter(name="tokenPolicies")
902
790
  def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
903
791
  """
904
- List of policies to encode onto generated tokens. Depending
905
- on the auth method, this list may be supplemented by user/group/other values.
792
+ Generated Token's Policies
906
793
  """
907
794
  return pulumi.get(self, "token_policies")
908
795
 
@@ -910,8 +797,7 @@ class AuthBackendRole(pulumi.CustomResource):
910
797
  @pulumi.getter(name="tokenTtl")
911
798
  def token_ttl(self) -> pulumi.Output[Optional[int]]:
912
799
  """
913
- The incremental lifetime for generated tokens in number of seconds.
914
- Its current value will be referenced at renewal time.
800
+ The initial ttl of the token to generate in seconds
915
801
  """
916
802
  return pulumi.get(self, "token_ttl")
917
803
 
@@ -919,11 +805,7 @@ class AuthBackendRole(pulumi.CustomResource):
919
805
  @pulumi.getter(name="tokenType")
920
806
  def token_type(self) -> pulumi.Output[Optional[str]]:
921
807
  """
922
- The type of token that should be generated. Can be `service`,
923
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
924
- `service` tokens). For token store roles, there are two additional possibilities:
925
- `default-service` and `default-batch` which specify the type to return unless the client
926
- requests a different type at generation time.
808
+ The type of token to generate, service or batch
927
809
  """
928
810
  return pulumi.get(self, "token_type")
929
811
 
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['AuthBackendLoginArgs', 'AuthBackendLogin']
@@ -24,7 +29,7 @@ class AuthBackendLoginArgs:
24
29
  :param pulumi.Input[str] backend: The unique path of the Vault backend to log in with.
25
30
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
26
31
  The value should not contain leading or trailing forward slashes.
27
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
32
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
28
33
  *Available only for Vault Enterprise*.
29
34
  :param pulumi.Input[str] secret_id: The secret ID of the role to log in with. Required
30
35
  unless `bind_secret_id` is set to false on the role.
@@ -67,7 +72,7 @@ class AuthBackendLoginArgs:
67
72
  """
68
73
  The namespace to provision the resource in.
69
74
  The value should not contain leading or trailing forward slashes.
70
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
75
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
71
76
  *Available only for Vault Enterprise*.
72
77
  """
73
78
  return pulumi.get(self, "namespace")
@@ -114,7 +119,7 @@ class _AuthBackendLoginState:
114
119
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: The metadata associated with the token.
115
120
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
116
121
  The value should not contain leading or trailing forward slashes.
117
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
122
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
118
123
  *Available only for Vault Enterprise*.
119
124
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: A list of policies applied to the token.
120
125
  :param pulumi.Input[bool] renewable: Whether the token is renewable or not.
@@ -223,7 +228,7 @@ class _AuthBackendLoginState:
223
228
  """
224
229
  The namespace to provision the resource in.
225
230
  The value should not contain leading or trailing forward slashes.
226
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
231
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
227
232
  *Available only for Vault Enterprise*.
228
233
  """
229
234
  return pulumi.get(self, "namespace")
@@ -299,7 +304,6 @@ class AuthBackendLogin(pulumi.CustomResource):
299
304
 
300
305
  ## Example Usage
301
306
 
302
- <!--Start PulumiCodeChooser -->
303
307
  ```python
304
308
  import pulumi
305
309
  import pulumi_vault as vault
@@ -321,14 +325,13 @@ class AuthBackendLogin(pulumi.CustomResource):
321
325
  role_id=example.role_id,
322
326
  secret_id=id.secret_id)
323
327
  ```
324
- <!--End PulumiCodeChooser -->
325
328
 
326
329
  :param str resource_name: The name of the resource.
327
330
  :param pulumi.ResourceOptions opts: Options for the resource.
328
331
  :param pulumi.Input[str] backend: The unique path of the Vault backend to log in with.
329
332
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
330
333
  The value should not contain leading or trailing forward slashes.
331
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
334
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
332
335
  *Available only for Vault Enterprise*.
333
336
  :param pulumi.Input[str] role_id: The ID of the role to log in with.
334
337
  :param pulumi.Input[str] secret_id: The secret ID of the role to log in with. Required
@@ -347,7 +350,6 @@ class AuthBackendLogin(pulumi.CustomResource):
347
350
 
348
351
  ## Example Usage
349
352
 
350
- <!--Start PulumiCodeChooser -->
351
353
  ```python
352
354
  import pulumi
353
355
  import pulumi_vault as vault
@@ -369,7 +371,6 @@ class AuthBackendLogin(pulumi.CustomResource):
369
371
  role_id=example.role_id,
370
372
  secret_id=id.secret_id)
371
373
  ```
372
- <!--End PulumiCodeChooser -->
373
374
 
374
375
  :param str resource_name: The name of the resource.
375
376
  :param AuthBackendLoginArgs args: The arguments to use to populate this resource's properties.
@@ -450,7 +451,7 @@ class AuthBackendLogin(pulumi.CustomResource):
450
451
  :param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: The metadata associated with the token.
451
452
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
452
453
  The value should not contain leading or trailing forward slashes.
453
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
454
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
454
455
  *Available only for Vault Enterprise*.
455
456
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: A list of policies applied to the token.
456
457
  :param pulumi.Input[bool] renewable: Whether the token is renewable or not.
@@ -529,7 +530,7 @@ class AuthBackendLogin(pulumi.CustomResource):
529
530
  """
530
531
  The namespace to provision the resource in.
531
532
  The value should not contain leading or trailing forward slashes.
532
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
533
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
533
534
  *Available only for Vault Enterprise*.
534
535
  """
535
536
  return pulumi.get(self, "namespace")