pulumi-vault 6.1.0a1712222735__py3-none-any.whl → 6.1.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (184) hide show
  1. pulumi_vault/_inputs.py +0 -20
  2. pulumi_vault/ad/secret_backend.py +2 -6
  3. pulumi_vault/ad/secret_library.py +2 -4
  4. pulumi_vault/ad/secret_role.py +0 -4
  5. pulumi_vault/alicloud/auth_backend_role.py +69 -192
  6. pulumi_vault/approle/auth_backend_login.py +0 -4
  7. pulumi_vault/approle/auth_backend_role.py +63 -186
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
  9. pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
  10. pulumi_vault/audit.py +12 -20
  11. pulumi_vault/audit_request_header.py +6 -6
  12. pulumi_vault/aws/auth_backend_client.py +6 -10
  13. pulumi_vault/aws/auth_backend_config_identity.py +0 -4
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
  15. pulumi_vault/aws/auth_backend_login.py +0 -8
  16. pulumi_vault/aws/auth_backend_role.py +63 -186
  17. pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
  18. pulumi_vault/aws/auth_backend_sts_role.py +0 -4
  19. pulumi_vault/aws/secret_backend.py +63 -0
  20. pulumi_vault/aws/secret_backend_role.py +2 -4
  21. pulumi_vault/aws/secret_backend_static_role.py +2 -4
  22. pulumi_vault/azure/auth_backend_config.py +6 -10
  23. pulumi_vault/azure/auth_backend_role.py +63 -186
  24. pulumi_vault/azure/backend.py +16 -24
  25. pulumi_vault/azure/backend_role.py +14 -18
  26. pulumi_vault/azure/get_access_credentials.py +0 -4
  27. pulumi_vault/cert_auth_backend_role.py +75 -208
  28. pulumi_vault/consul/secret_backend.py +10 -18
  29. pulumi_vault/consul/secret_backend_role.py +2 -4
  30. pulumi_vault/database/_inputs.py +522 -784
  31. pulumi_vault/database/outputs.py +522 -784
  32. pulumi_vault/database/secret_backend_connection.py +2 -4
  33. pulumi_vault/database/secret_backend_role.py +4 -4
  34. pulumi_vault/database/secret_backend_static_role.py +10 -8
  35. pulumi_vault/database/secrets_mount.py +4 -4
  36. pulumi_vault/egp_policy.py +4 -8
  37. pulumi_vault/gcp/auth_backend.py +0 -36
  38. pulumi_vault/gcp/auth_backend_role.py +63 -264
  39. pulumi_vault/gcp/get_auth_backend_role.py +0 -4
  40. pulumi_vault/gcp/secret_backend.py +4 -6
  41. pulumi_vault/gcp/secret_impersonated_account.py +12 -14
  42. pulumi_vault/gcp/secret_roleset.py +4 -6
  43. pulumi_vault/gcp/secret_static_account.py +14 -16
  44. pulumi_vault/generic/endpoint.py +4 -8
  45. pulumi_vault/generic/get_secret.py +40 -4
  46. pulumi_vault/get_auth_backend.py +0 -4
  47. pulumi_vault/get_auth_backends.py +0 -8
  48. pulumi_vault/get_namespace.py +0 -12
  49. pulumi_vault/get_namespaces.py +4 -12
  50. pulumi_vault/get_nomad_access_token.py +0 -4
  51. pulumi_vault/get_policy_document.py +8 -8
  52. pulumi_vault/get_raft_autopilot_state.py +0 -4
  53. pulumi_vault/github/auth_backend.py +0 -4
  54. pulumi_vault/github/team.py +2 -6
  55. pulumi_vault/github/user.py +2 -6
  56. pulumi_vault/identity/entity.py +6 -8
  57. pulumi_vault/identity/entity_alias.py +6 -8
  58. pulumi_vault/identity/entity_policies.py +12 -12
  59. pulumi_vault/identity/get_entity.py +0 -4
  60. pulumi_vault/identity/get_group.py +0 -4
  61. pulumi_vault/identity/get_oidc_client_creds.py +2 -4
  62. pulumi_vault/identity/get_oidc_openid_config.py +10 -6
  63. pulumi_vault/identity/get_oidc_public_keys.py +10 -6
  64. pulumi_vault/identity/group.py +38 -42
  65. pulumi_vault/identity/group_alias.py +2 -4
  66. pulumi_vault/identity/group_member_entity_ids.py +12 -16
  67. pulumi_vault/identity/group_member_group_ids.py +24 -20
  68. pulumi_vault/identity/group_policies.py +4 -8
  69. pulumi_vault/identity/mfa_duo.py +4 -8
  70. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  71. pulumi_vault/identity/mfa_okta.py +4 -8
  72. pulumi_vault/identity/mfa_pingid.py +0 -4
  73. pulumi_vault/identity/mfa_totp.py +0 -4
  74. pulumi_vault/identity/oidc.py +0 -4
  75. pulumi_vault/identity/oidc_assignment.py +10 -6
  76. pulumi_vault/identity/oidc_client.py +10 -10
  77. pulumi_vault/identity/oidc_key.py +16 -12
  78. pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
  79. pulumi_vault/identity/oidc_provider.py +22 -16
  80. pulumi_vault/identity/oidc_role.py +28 -20
  81. pulumi_vault/identity/oidc_scope.py +6 -8
  82. pulumi_vault/jwt/auth_backend.py +20 -32
  83. pulumi_vault/jwt/auth_backend_role.py +63 -190
  84. pulumi_vault/kmip/secret_backend.py +10 -14
  85. pulumi_vault/kmip/secret_role.py +0 -4
  86. pulumi_vault/kmip/secret_scope.py +0 -4
  87. pulumi_vault/kubernetes/auth_backend_config.py +0 -4
  88. pulumi_vault/kubernetes/auth_backend_role.py +56 -172
  89. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  90. pulumi_vault/kubernetes/secret_backend.py +6 -8
  91. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  92. pulumi_vault/kv/get_secret.py +0 -4
  93. pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
  94. pulumi_vault/kv/get_secret_v2.py +58 -0
  95. pulumi_vault/kv/get_secrets_list.py +4 -8
  96. pulumi_vault/kv/get_secrets_list_v2.py +14 -12
  97. pulumi_vault/kv/secret.py +0 -4
  98. pulumi_vault/kv/secret_backend_v2.py +0 -4
  99. pulumi_vault/kv/secret_v2.py +2 -4
  100. pulumi_vault/ldap/auth_backend.py +66 -161
  101. pulumi_vault/ldap/auth_backend_group.py +0 -4
  102. pulumi_vault/ldap/auth_backend_user.py +0 -4
  103. pulumi_vault/ldap/secret_backend.py +4 -8
  104. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
  105. pulumi_vault/ldap/secret_backend_library_set.py +2 -4
  106. pulumi_vault/ldap/secret_backend_static_role.py +0 -4
  107. pulumi_vault/managed/_inputs.py +84 -132
  108. pulumi_vault/managed/keys.py +7 -28
  109. pulumi_vault/managed/outputs.py +84 -132
  110. pulumi_vault/mfa_duo.py +4 -6
  111. pulumi_vault/mfa_okta.py +4 -6
  112. pulumi_vault/mfa_pingid.py +4 -6
  113. pulumi_vault/mfa_totp.py +10 -12
  114. pulumi_vault/mongodbatlas/secret_backend.py +0 -4
  115. pulumi_vault/mongodbatlas/secret_role.py +2 -4
  116. pulumi_vault/mount.py +26 -42
  117. pulumi_vault/nomad_secret_backend.py +4 -8
  118. pulumi_vault/nomad_secret_role.py +0 -4
  119. pulumi_vault/okta/_inputs.py +8 -8
  120. pulumi_vault/okta/auth_backend.py +6 -10
  121. pulumi_vault/okta/auth_backend_group.py +0 -4
  122. pulumi_vault/okta/auth_backend_user.py +0 -4
  123. pulumi_vault/okta/outputs.py +8 -8
  124. pulumi_vault/outputs.py +0 -20
  125. pulumi_vault/password_policy.py +6 -8
  126. pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
  127. pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
  128. pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
  129. pulumi_vault/pkisecret/get_backend_key.py +2 -6
  130. pulumi_vault/pkisecret/get_backend_keys.py +0 -4
  131. pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
  132. pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
  133. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
  134. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
  135. pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
  136. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
  137. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
  138. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
  139. pulumi_vault/pkisecret/secret_backend_role.py +2 -4
  140. pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
  141. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
  142. pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
  143. pulumi_vault/provider.py +0 -8
  144. pulumi_vault/pulumi-plugin.json +2 -1
  145. pulumi_vault/quota_lease_count.py +6 -8
  146. pulumi_vault/quota_rate_limit.py +2 -4
  147. pulumi_vault/rabbitmq/secret_backend.py +4 -8
  148. pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
  149. pulumi_vault/raft_autopilot.py +0 -4
  150. pulumi_vault/raft_snapshot_agent_config.py +109 -304
  151. pulumi_vault/rgp_policy.py +2 -6
  152. pulumi_vault/saml/auth_backend.py +8 -12
  153. pulumi_vault/saml/auth_backend_role.py +64 -178
  154. pulumi_vault/secrets/sync_association.py +12 -10
  155. pulumi_vault/secrets/sync_aws_destination.py +6 -8
  156. pulumi_vault/secrets/sync_azure_destination.py +10 -12
  157. pulumi_vault/secrets/sync_config.py +2 -6
  158. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  159. pulumi_vault/secrets/sync_gh_destination.py +6 -8
  160. pulumi_vault/secrets/sync_github_apps.py +8 -8
  161. pulumi_vault/secrets/sync_vercel_destination.py +6 -8
  162. pulumi_vault/ssh/_inputs.py +6 -32
  163. pulumi_vault/ssh/outputs.py +6 -32
  164. pulumi_vault/ssh/secret_backend_ca.py +0 -4
  165. pulumi_vault/ssh/secret_backend_role.py +4 -4
  166. pulumi_vault/terraformcloud/secret_backend.py +0 -56
  167. pulumi_vault/terraformcloud/secret_creds.py +2 -17
  168. pulumi_vault/terraformcloud/secret_role.py +2 -69
  169. pulumi_vault/token.py +14 -18
  170. pulumi_vault/tokenauth/auth_backend_role.py +64 -180
  171. pulumi_vault/transform/alphabet.py +4 -6
  172. pulumi_vault/transform/get_decode.py +4 -4
  173. pulumi_vault/transform/get_encode.py +4 -4
  174. pulumi_vault/transform/role.py +4 -6
  175. pulumi_vault/transform/template.py +4 -4
  176. pulumi_vault/transit/get_decrypt.py +4 -20
  177. pulumi_vault/transit/get_encrypt.py +0 -14
  178. pulumi_vault/transit/secret_backend_key.py +6 -6
  179. pulumi_vault/transit/secret_cache_config.py +0 -4
  180. {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/METADATA +1 -1
  181. pulumi_vault-6.1.1.dist-info/RECORD +252 -0
  182. pulumi_vault-6.1.0a1712222735.dist-info/RECORD +0 -252
  183. {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/WHEEL +0 -0
  184. {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/top_level.txt +0 -0
@@ -117,32 +117,15 @@ class AuthBackendRoleArgs:
117
117
  for this field should be the key of the tag on the EC2 instance. `auth_type`
118
118
  must be set to `ec2` or `inferred_entity_type` must be set to `ec2_instance`
119
119
  to use this constraint.
120
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
121
- addresses which can authenticate successfully, and ties the resulting token to these blocks
122
- as well.
123
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
124
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
125
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
126
- `token_max_ttl` would otherwise allow a renewal.
127
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
128
- Its current value will be referenced at renewal time.
129
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
130
- generated tokens; otherwise it will be added to the policies set in token_policies.
131
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/aws#token_num_uses)
132
- of times a generated token may be used (within its lifetime); 0 means unlimited.
133
- :param pulumi.Input[int] token_period: If set, indicates that the
134
- token generated using this role should never expire. The token should be renewed within the
135
- duration specified by this value. At each renewal, the token's TTL will be set to the
136
- value of this field. Specified in seconds.
137
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
138
- on the auth method, this list may be supplemented by user/group/other values.
139
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
140
- Its current value will be referenced at renewal time.
141
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
142
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
143
- `service` tokens). For token store roles, there are two additional possibilities:
144
- `default-service` and `default-batch` which specify the type to return unless the client
145
- requests a different type at generation time.
120
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
121
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
122
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
123
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
124
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
125
+ :param pulumi.Input[int] token_period: Generated Token's Period
126
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
127
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
128
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
146
129
  """
147
130
  pulumi.set(__self__, "role", role)
148
131
  if allow_instance_migration is not None:
@@ -486,9 +469,7 @@ class AuthBackendRoleArgs:
486
469
  @pulumi.getter(name="tokenBoundCidrs")
487
470
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
488
471
  """
489
- List of CIDR blocks; if set, specifies blocks of IP
490
- addresses which can authenticate successfully, and ties the resulting token to these blocks
491
- as well.
472
+ Specifies the blocks of IP addresses which are allowed to use the generated token
492
473
  """
493
474
  return pulumi.get(self, "token_bound_cidrs")
494
475
 
@@ -500,10 +481,7 @@ class AuthBackendRoleArgs:
500
481
  @pulumi.getter(name="tokenExplicitMaxTtl")
501
482
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
502
483
  """
503
- If set, will encode an
504
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
505
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
506
- `token_max_ttl` would otherwise allow a renewal.
484
+ Generated Token's Explicit Maximum TTL in seconds
507
485
  """
508
486
  return pulumi.get(self, "token_explicit_max_ttl")
509
487
 
@@ -515,8 +493,7 @@ class AuthBackendRoleArgs:
515
493
  @pulumi.getter(name="tokenMaxTtl")
516
494
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
517
495
  """
518
- The maximum lifetime for generated tokens in number of seconds.
519
- Its current value will be referenced at renewal time.
496
+ The maximum lifetime of the generated token
520
497
  """
521
498
  return pulumi.get(self, "token_max_ttl")
522
499
 
@@ -528,8 +505,7 @@ class AuthBackendRoleArgs:
528
505
  @pulumi.getter(name="tokenNoDefaultPolicy")
529
506
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
530
507
  """
531
- If set, the default policy will not be set on
532
- generated tokens; otherwise it will be added to the policies set in token_policies.
508
+ If true, the 'default' policy will not automatically be added to generated tokens
533
509
  """
534
510
  return pulumi.get(self, "token_no_default_policy")
535
511
 
@@ -541,8 +517,7 @@ class AuthBackendRoleArgs:
541
517
  @pulumi.getter(name="tokenNumUses")
542
518
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
543
519
  """
544
- The [maximum number](https://www.vaultproject.io/api-docs/auth/aws#token_num_uses)
545
- of times a generated token may be used (within its lifetime); 0 means unlimited.
520
+ The maximum number of times a token may be used, a value of zero means unlimited
546
521
  """
547
522
  return pulumi.get(self, "token_num_uses")
548
523
 
@@ -554,10 +529,7 @@ class AuthBackendRoleArgs:
554
529
  @pulumi.getter(name="tokenPeriod")
555
530
  def token_period(self) -> Optional[pulumi.Input[int]]:
556
531
  """
557
- If set, indicates that the
558
- token generated using this role should never expire. The token should be renewed within the
559
- duration specified by this value. At each renewal, the token's TTL will be set to the
560
- value of this field. Specified in seconds.
532
+ Generated Token's Period
561
533
  """
562
534
  return pulumi.get(self, "token_period")
563
535
 
@@ -569,8 +541,7 @@ class AuthBackendRoleArgs:
569
541
  @pulumi.getter(name="tokenPolicies")
570
542
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
571
543
  """
572
- List of policies to encode onto generated tokens. Depending
573
- on the auth method, this list may be supplemented by user/group/other values.
544
+ Generated Token's Policies
574
545
  """
575
546
  return pulumi.get(self, "token_policies")
576
547
 
@@ -582,8 +553,7 @@ class AuthBackendRoleArgs:
582
553
  @pulumi.getter(name="tokenTtl")
583
554
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
584
555
  """
585
- The incremental lifetime for generated tokens in number of seconds.
586
- Its current value will be referenced at renewal time.
556
+ The initial ttl of the token to generate in seconds
587
557
  """
588
558
  return pulumi.get(self, "token_ttl")
589
559
 
@@ -595,11 +565,7 @@ class AuthBackendRoleArgs:
595
565
  @pulumi.getter(name="tokenType")
596
566
  def token_type(self) -> Optional[pulumi.Input[str]]:
597
567
  """
598
- The type of token that should be generated. Can be `service`,
599
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
600
- `service` tokens). For token store roles, there are two additional possibilities:
601
- `default-service` and `default-batch` which specify the type to return unless the client
602
- requests a different type at generation time.
568
+ The type of token to generate, service or batch
603
569
  """
604
570
  return pulumi.get(self, "token_type")
605
571
 
@@ -716,32 +682,15 @@ class _AuthBackendRoleState:
716
682
  for this field should be the key of the tag on the EC2 instance. `auth_type`
717
683
  must be set to `ec2` or `inferred_entity_type` must be set to `ec2_instance`
718
684
  to use this constraint.
719
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
720
- addresses which can authenticate successfully, and ties the resulting token to these blocks
721
- as well.
722
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
723
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
724
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
725
- `token_max_ttl` would otherwise allow a renewal.
726
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
727
- Its current value will be referenced at renewal time.
728
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
729
- generated tokens; otherwise it will be added to the policies set in token_policies.
730
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/aws#token_num_uses)
731
- of times a generated token may be used (within its lifetime); 0 means unlimited.
732
- :param pulumi.Input[int] token_period: If set, indicates that the
733
- token generated using this role should never expire. The token should be renewed within the
734
- duration specified by this value. At each renewal, the token's TTL will be set to the
735
- value of this field. Specified in seconds.
736
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
737
- on the auth method, this list may be supplemented by user/group/other values.
738
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
739
- Its current value will be referenced at renewal time.
740
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
741
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
742
- `service` tokens). For token store roles, there are two additional possibilities:
743
- `default-service` and `default-batch` which specify the type to return unless the client
744
- requests a different type at generation time.
685
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
686
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
687
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
688
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
689
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
690
+ :param pulumi.Input[int] token_period: Generated Token's Period
691
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
692
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
693
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
745
694
  """
746
695
  if allow_instance_migration is not None:
747
696
  pulumi.set(__self__, "allow_instance_migration", allow_instance_migration)
@@ -1100,9 +1049,7 @@ class _AuthBackendRoleState:
1100
1049
  @pulumi.getter(name="tokenBoundCidrs")
1101
1050
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
1102
1051
  """
1103
- List of CIDR blocks; if set, specifies blocks of IP
1104
- addresses which can authenticate successfully, and ties the resulting token to these blocks
1105
- as well.
1052
+ Specifies the blocks of IP addresses which are allowed to use the generated token
1106
1053
  """
1107
1054
  return pulumi.get(self, "token_bound_cidrs")
1108
1055
 
@@ -1114,10 +1061,7 @@ class _AuthBackendRoleState:
1114
1061
  @pulumi.getter(name="tokenExplicitMaxTtl")
1115
1062
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
1116
1063
  """
1117
- If set, will encode an
1118
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1119
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1120
- `token_max_ttl` would otherwise allow a renewal.
1064
+ Generated Token's Explicit Maximum TTL in seconds
1121
1065
  """
1122
1066
  return pulumi.get(self, "token_explicit_max_ttl")
1123
1067
 
@@ -1129,8 +1073,7 @@ class _AuthBackendRoleState:
1129
1073
  @pulumi.getter(name="tokenMaxTtl")
1130
1074
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
1131
1075
  """
1132
- The maximum lifetime for generated tokens in number of seconds.
1133
- Its current value will be referenced at renewal time.
1076
+ The maximum lifetime of the generated token
1134
1077
  """
1135
1078
  return pulumi.get(self, "token_max_ttl")
1136
1079
 
@@ -1142,8 +1085,7 @@ class _AuthBackendRoleState:
1142
1085
  @pulumi.getter(name="tokenNoDefaultPolicy")
1143
1086
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
1144
1087
  """
1145
- If set, the default policy will not be set on
1146
- generated tokens; otherwise it will be added to the policies set in token_policies.
1088
+ If true, the 'default' policy will not automatically be added to generated tokens
1147
1089
  """
1148
1090
  return pulumi.get(self, "token_no_default_policy")
1149
1091
 
@@ -1155,8 +1097,7 @@ class _AuthBackendRoleState:
1155
1097
  @pulumi.getter(name="tokenNumUses")
1156
1098
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
1157
1099
  """
1158
- The [maximum number](https://www.vaultproject.io/api-docs/auth/aws#token_num_uses)
1159
- of times a generated token may be used (within its lifetime); 0 means unlimited.
1100
+ The maximum number of times a token may be used, a value of zero means unlimited
1160
1101
  """
1161
1102
  return pulumi.get(self, "token_num_uses")
1162
1103
 
@@ -1168,10 +1109,7 @@ class _AuthBackendRoleState:
1168
1109
  @pulumi.getter(name="tokenPeriod")
1169
1110
  def token_period(self) -> Optional[pulumi.Input[int]]:
1170
1111
  """
1171
- If set, indicates that the
1172
- token generated using this role should never expire. The token should be renewed within the
1173
- duration specified by this value. At each renewal, the token's TTL will be set to the
1174
- value of this field. Specified in seconds.
1112
+ Generated Token's Period
1175
1113
  """
1176
1114
  return pulumi.get(self, "token_period")
1177
1115
 
@@ -1183,8 +1121,7 @@ class _AuthBackendRoleState:
1183
1121
  @pulumi.getter(name="tokenPolicies")
1184
1122
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
1185
1123
  """
1186
- List of policies to encode onto generated tokens. Depending
1187
- on the auth method, this list may be supplemented by user/group/other values.
1124
+ Generated Token's Policies
1188
1125
  """
1189
1126
  return pulumi.get(self, "token_policies")
1190
1127
 
@@ -1196,8 +1133,7 @@ class _AuthBackendRoleState:
1196
1133
  @pulumi.getter(name="tokenTtl")
1197
1134
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
1198
1135
  """
1199
- The incremental lifetime for generated tokens in number of seconds.
1200
- Its current value will be referenced at renewal time.
1136
+ The initial ttl of the token to generate in seconds
1201
1137
  """
1202
1138
  return pulumi.get(self, "token_ttl")
1203
1139
 
@@ -1209,11 +1145,7 @@ class _AuthBackendRoleState:
1209
1145
  @pulumi.getter(name="tokenType")
1210
1146
  def token_type(self) -> Optional[pulumi.Input[str]]:
1211
1147
  """
1212
- The type of token that should be generated. Can be `service`,
1213
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
1214
- `service` tokens). For token store roles, there are two additional possibilities:
1215
- `default-service` and `default-batch` which specify the type to return unless the client
1216
- requests a different type at generation time.
1148
+ The type of token to generate, service or batch
1217
1149
  """
1218
1150
  return pulumi.get(self, "token_type")
1219
1151
 
@@ -1265,7 +1197,6 @@ class AuthBackendRole(pulumi.CustomResource):
1265
1197
 
1266
1198
  ## Example Usage
1267
1199
 
1268
- <!--Start PulumiCodeChooser -->
1269
1200
  ```python
1270
1201
  import pulumi
1271
1202
  import pulumi_vault as vault
@@ -1291,7 +1222,6 @@ class AuthBackendRole(pulumi.CustomResource):
1291
1222
  "prod",
1292
1223
  ])
1293
1224
  ```
1294
- <!--End PulumiCodeChooser -->
1295
1225
 
1296
1226
  ## Import
1297
1227
 
@@ -1376,32 +1306,15 @@ class AuthBackendRole(pulumi.CustomResource):
1376
1306
  for this field should be the key of the tag on the EC2 instance. `auth_type`
1377
1307
  must be set to `ec2` or `inferred_entity_type` must be set to `ec2_instance`
1378
1308
  to use this constraint.
1379
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
1380
- addresses which can authenticate successfully, and ties the resulting token to these blocks
1381
- as well.
1382
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
1383
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1384
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1385
- `token_max_ttl` would otherwise allow a renewal.
1386
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
1387
- Its current value will be referenced at renewal time.
1388
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
1389
- generated tokens; otherwise it will be added to the policies set in token_policies.
1390
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/aws#token_num_uses)
1391
- of times a generated token may be used (within its lifetime); 0 means unlimited.
1392
- :param pulumi.Input[int] token_period: If set, indicates that the
1393
- token generated using this role should never expire. The token should be renewed within the
1394
- duration specified by this value. At each renewal, the token's TTL will be set to the
1395
- value of this field. Specified in seconds.
1396
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
1397
- on the auth method, this list may be supplemented by user/group/other values.
1398
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
1399
- Its current value will be referenced at renewal time.
1400
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
1401
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
1402
- `service` tokens). For token store roles, there are two additional possibilities:
1403
- `default-service` and `default-batch` which specify the type to return unless the client
1404
- requests a different type at generation time.
1309
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
1310
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
1311
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
1312
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
1313
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
1314
+ :param pulumi.Input[int] token_period: Generated Token's Period
1315
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
1316
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
1317
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
1405
1318
  """
1406
1319
  ...
1407
1320
  @overload
@@ -1418,7 +1331,6 @@ class AuthBackendRole(pulumi.CustomResource):
1418
1331
 
1419
1332
  ## Example Usage
1420
1333
 
1421
- <!--Start PulumiCodeChooser -->
1422
1334
  ```python
1423
1335
  import pulumi
1424
1336
  import pulumi_vault as vault
@@ -1444,7 +1356,6 @@ class AuthBackendRole(pulumi.CustomResource):
1444
1356
  "prod",
1445
1357
  ])
1446
1358
  ```
1447
- <!--End PulumiCodeChooser -->
1448
1359
 
1449
1360
  ## Import
1450
1361
 
@@ -1657,32 +1568,15 @@ class AuthBackendRole(pulumi.CustomResource):
1657
1568
  for this field should be the key of the tag on the EC2 instance. `auth_type`
1658
1569
  must be set to `ec2` or `inferred_entity_type` must be set to `ec2_instance`
1659
1570
  to use this constraint.
1660
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
1661
- addresses which can authenticate successfully, and ties the resulting token to these blocks
1662
- as well.
1663
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
1664
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1665
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1666
- `token_max_ttl` would otherwise allow a renewal.
1667
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
1668
- Its current value will be referenced at renewal time.
1669
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
1670
- generated tokens; otherwise it will be added to the policies set in token_policies.
1671
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/aws#token_num_uses)
1672
- of times a generated token may be used (within its lifetime); 0 means unlimited.
1673
- :param pulumi.Input[int] token_period: If set, indicates that the
1674
- token generated using this role should never expire. The token should be renewed within the
1675
- duration specified by this value. At each renewal, the token's TTL will be set to the
1676
- value of this field. Specified in seconds.
1677
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
1678
- on the auth method, this list may be supplemented by user/group/other values.
1679
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
1680
- Its current value will be referenced at renewal time.
1681
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
1682
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
1683
- `service` tokens). For token store roles, there are two additional possibilities:
1684
- `default-service` and `default-batch` which specify the type to return unless the client
1685
- requests a different type at generation time.
1571
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
1572
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
1573
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
1574
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
1575
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
1576
+ :param pulumi.Input[int] token_period: Generated Token's Period
1577
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
1578
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
1579
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
1686
1580
  """
1687
1581
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
1688
1582
 
@@ -1937,9 +1831,7 @@ class AuthBackendRole(pulumi.CustomResource):
1937
1831
  @pulumi.getter(name="tokenBoundCidrs")
1938
1832
  def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
1939
1833
  """
1940
- List of CIDR blocks; if set, specifies blocks of IP
1941
- addresses which can authenticate successfully, and ties the resulting token to these blocks
1942
- as well.
1834
+ Specifies the blocks of IP addresses which are allowed to use the generated token
1943
1835
  """
1944
1836
  return pulumi.get(self, "token_bound_cidrs")
1945
1837
 
@@ -1947,10 +1839,7 @@ class AuthBackendRole(pulumi.CustomResource):
1947
1839
  @pulumi.getter(name="tokenExplicitMaxTtl")
1948
1840
  def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
1949
1841
  """
1950
- If set, will encode an
1951
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1952
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1953
- `token_max_ttl` would otherwise allow a renewal.
1842
+ Generated Token's Explicit Maximum TTL in seconds
1954
1843
  """
1955
1844
  return pulumi.get(self, "token_explicit_max_ttl")
1956
1845
 
@@ -1958,8 +1847,7 @@ class AuthBackendRole(pulumi.CustomResource):
1958
1847
  @pulumi.getter(name="tokenMaxTtl")
1959
1848
  def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
1960
1849
  """
1961
- The maximum lifetime for generated tokens in number of seconds.
1962
- Its current value will be referenced at renewal time.
1850
+ The maximum lifetime of the generated token
1963
1851
  """
1964
1852
  return pulumi.get(self, "token_max_ttl")
1965
1853
 
@@ -1967,8 +1855,7 @@ class AuthBackendRole(pulumi.CustomResource):
1967
1855
  @pulumi.getter(name="tokenNoDefaultPolicy")
1968
1856
  def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
1969
1857
  """
1970
- If set, the default policy will not be set on
1971
- generated tokens; otherwise it will be added to the policies set in token_policies.
1858
+ If true, the 'default' policy will not automatically be added to generated tokens
1972
1859
  """
1973
1860
  return pulumi.get(self, "token_no_default_policy")
1974
1861
 
@@ -1976,8 +1863,7 @@ class AuthBackendRole(pulumi.CustomResource):
1976
1863
  @pulumi.getter(name="tokenNumUses")
1977
1864
  def token_num_uses(self) -> pulumi.Output[Optional[int]]:
1978
1865
  """
1979
- The [maximum number](https://www.vaultproject.io/api-docs/auth/aws#token_num_uses)
1980
- of times a generated token may be used (within its lifetime); 0 means unlimited.
1866
+ The maximum number of times a token may be used, a value of zero means unlimited
1981
1867
  """
1982
1868
  return pulumi.get(self, "token_num_uses")
1983
1869
 
@@ -1985,10 +1871,7 @@ class AuthBackendRole(pulumi.CustomResource):
1985
1871
  @pulumi.getter(name="tokenPeriod")
1986
1872
  def token_period(self) -> pulumi.Output[Optional[int]]:
1987
1873
  """
1988
- If set, indicates that the
1989
- token generated using this role should never expire. The token should be renewed within the
1990
- duration specified by this value. At each renewal, the token's TTL will be set to the
1991
- value of this field. Specified in seconds.
1874
+ Generated Token's Period
1992
1875
  """
1993
1876
  return pulumi.get(self, "token_period")
1994
1877
 
@@ -1996,8 +1879,7 @@ class AuthBackendRole(pulumi.CustomResource):
1996
1879
  @pulumi.getter(name="tokenPolicies")
1997
1880
  def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
1998
1881
  """
1999
- List of policies to encode onto generated tokens. Depending
2000
- on the auth method, this list may be supplemented by user/group/other values.
1882
+ Generated Token's Policies
2001
1883
  """
2002
1884
  return pulumi.get(self, "token_policies")
2003
1885
 
@@ -2005,8 +1887,7 @@ class AuthBackendRole(pulumi.CustomResource):
2005
1887
  @pulumi.getter(name="tokenTtl")
2006
1888
  def token_ttl(self) -> pulumi.Output[Optional[int]]:
2007
1889
  """
2008
- The incremental lifetime for generated tokens in number of seconds.
2009
- Its current value will be referenced at renewal time.
1890
+ The initial ttl of the token to generate in seconds
2010
1891
  """
2011
1892
  return pulumi.get(self, "token_ttl")
2012
1893
 
@@ -2014,11 +1895,7 @@ class AuthBackendRole(pulumi.CustomResource):
2014
1895
  @pulumi.getter(name="tokenType")
2015
1896
  def token_type(self) -> pulumi.Output[Optional[str]]:
2016
1897
  """
2017
- The type of token that should be generated. Can be `service`,
2018
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
2019
- `service` tokens). For token store roles, there are two additional possibilities:
2020
- `default-service` and `default-batch` which specify the type to return unless the client
2021
- requests a different type at generation time.
1898
+ The type of token to generate, service or batch
2022
1899
  """
2023
1900
  return pulumi.get(self, "token_type")
2024
1901
 
@@ -197,17 +197,15 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
197
197
 
198
198
  ## Example Usage
199
199
 
200
- <!--Start PulumiCodeChooser -->
201
200
  ```python
202
201
  import pulumi
203
202
  import pulumi_vault as vault
204
203
 
205
- example_auth_backend = vault.AuthBackend("exampleAuthBackend", type="aws")
206
- example_auth_backend_roletag_blacklist = vault.aws.AuthBackendRoletagBlacklist("exampleAuthBackendRoletagBlacklist",
207
- backend=example_auth_backend.path,
204
+ example = vault.AuthBackend("example", type="aws")
205
+ example_auth_backend_roletag_blacklist = vault.aws.AuthBackendRoletagBlacklist("example",
206
+ backend=example.path,
208
207
  safety_buffer=360)
209
208
  ```
210
- <!--End PulumiCodeChooser -->
211
209
 
212
210
  :param str resource_name: The name of the resource.
213
211
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -234,17 +232,15 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
234
232
 
235
233
  ## Example Usage
236
234
 
237
- <!--Start PulumiCodeChooser -->
238
235
  ```python
239
236
  import pulumi
240
237
  import pulumi_vault as vault
241
238
 
242
- example_auth_backend = vault.AuthBackend("exampleAuthBackend", type="aws")
243
- example_auth_backend_roletag_blacklist = vault.aws.AuthBackendRoletagBlacklist("exampleAuthBackendRoletagBlacklist",
244
- backend=example_auth_backend.path,
239
+ example = vault.AuthBackend("example", type="aws")
240
+ example_auth_backend_roletag_blacklist = vault.aws.AuthBackendRoletagBlacklist("example",
241
+ backend=example.path,
245
242
  safety_buffer=360)
246
243
  ```
247
- <!--End PulumiCodeChooser -->
248
244
 
249
245
  :param str resource_name: The name of the resource.
250
246
  :param AuthBackendRoletagBlacklistArgs args: The arguments to use to populate this resource's properties.
@@ -186,7 +186,6 @@ class AuthBackendStsRole(pulumi.CustomResource):
186
186
  """
187
187
  ## Example Usage
188
188
 
189
- <!--Start PulumiCodeChooser -->
190
189
  ```python
191
190
  import pulumi
192
191
  import pulumi_vault as vault
@@ -197,7 +196,6 @@ class AuthBackendStsRole(pulumi.CustomResource):
197
196
  account_id="1234567890",
198
197
  sts_role="arn:aws:iam::1234567890:role/my-role")
199
198
  ```
200
- <!--End PulumiCodeChooser -->
201
199
 
202
200
  ## Import
203
201
 
@@ -228,7 +226,6 @@ class AuthBackendStsRole(pulumi.CustomResource):
228
226
  """
229
227
  ## Example Usage
230
228
 
231
- <!--Start PulumiCodeChooser -->
232
229
  ```python
233
230
  import pulumi
234
231
  import pulumi_vault as vault
@@ -239,7 +236,6 @@ class AuthBackendStsRole(pulumi.CustomResource):
239
236
  account_id="1234567890",
240
237
  sts_role="arn:aws:iam::1234567890:role/my-role")
241
238
  ```
242
- <!--End PulumiCodeChooser -->
243
239
 
244
240
  ## Import
245
241