pulumi-vault 6.1.0a1712222735__py3-none-any.whl → 6.1.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (184) hide show
  1. pulumi_vault/_inputs.py +0 -20
  2. pulumi_vault/ad/secret_backend.py +2 -6
  3. pulumi_vault/ad/secret_library.py +2 -4
  4. pulumi_vault/ad/secret_role.py +0 -4
  5. pulumi_vault/alicloud/auth_backend_role.py +69 -192
  6. pulumi_vault/approle/auth_backend_login.py +0 -4
  7. pulumi_vault/approle/auth_backend_role.py +63 -186
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
  9. pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
  10. pulumi_vault/audit.py +12 -20
  11. pulumi_vault/audit_request_header.py +6 -6
  12. pulumi_vault/aws/auth_backend_client.py +6 -10
  13. pulumi_vault/aws/auth_backend_config_identity.py +0 -4
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
  15. pulumi_vault/aws/auth_backend_login.py +0 -8
  16. pulumi_vault/aws/auth_backend_role.py +63 -186
  17. pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
  18. pulumi_vault/aws/auth_backend_sts_role.py +0 -4
  19. pulumi_vault/aws/secret_backend.py +63 -0
  20. pulumi_vault/aws/secret_backend_role.py +2 -4
  21. pulumi_vault/aws/secret_backend_static_role.py +2 -4
  22. pulumi_vault/azure/auth_backend_config.py +6 -10
  23. pulumi_vault/azure/auth_backend_role.py +63 -186
  24. pulumi_vault/azure/backend.py +16 -24
  25. pulumi_vault/azure/backend_role.py +14 -18
  26. pulumi_vault/azure/get_access_credentials.py +0 -4
  27. pulumi_vault/cert_auth_backend_role.py +75 -208
  28. pulumi_vault/consul/secret_backend.py +10 -18
  29. pulumi_vault/consul/secret_backend_role.py +2 -4
  30. pulumi_vault/database/_inputs.py +522 -784
  31. pulumi_vault/database/outputs.py +522 -784
  32. pulumi_vault/database/secret_backend_connection.py +2 -4
  33. pulumi_vault/database/secret_backend_role.py +4 -4
  34. pulumi_vault/database/secret_backend_static_role.py +10 -8
  35. pulumi_vault/database/secrets_mount.py +4 -4
  36. pulumi_vault/egp_policy.py +4 -8
  37. pulumi_vault/gcp/auth_backend.py +0 -36
  38. pulumi_vault/gcp/auth_backend_role.py +63 -264
  39. pulumi_vault/gcp/get_auth_backend_role.py +0 -4
  40. pulumi_vault/gcp/secret_backend.py +4 -6
  41. pulumi_vault/gcp/secret_impersonated_account.py +12 -14
  42. pulumi_vault/gcp/secret_roleset.py +4 -6
  43. pulumi_vault/gcp/secret_static_account.py +14 -16
  44. pulumi_vault/generic/endpoint.py +4 -8
  45. pulumi_vault/generic/get_secret.py +40 -4
  46. pulumi_vault/get_auth_backend.py +0 -4
  47. pulumi_vault/get_auth_backends.py +0 -8
  48. pulumi_vault/get_namespace.py +0 -12
  49. pulumi_vault/get_namespaces.py +4 -12
  50. pulumi_vault/get_nomad_access_token.py +0 -4
  51. pulumi_vault/get_policy_document.py +8 -8
  52. pulumi_vault/get_raft_autopilot_state.py +0 -4
  53. pulumi_vault/github/auth_backend.py +0 -4
  54. pulumi_vault/github/team.py +2 -6
  55. pulumi_vault/github/user.py +2 -6
  56. pulumi_vault/identity/entity.py +6 -8
  57. pulumi_vault/identity/entity_alias.py +6 -8
  58. pulumi_vault/identity/entity_policies.py +12 -12
  59. pulumi_vault/identity/get_entity.py +0 -4
  60. pulumi_vault/identity/get_group.py +0 -4
  61. pulumi_vault/identity/get_oidc_client_creds.py +2 -4
  62. pulumi_vault/identity/get_oidc_openid_config.py +10 -6
  63. pulumi_vault/identity/get_oidc_public_keys.py +10 -6
  64. pulumi_vault/identity/group.py +38 -42
  65. pulumi_vault/identity/group_alias.py +2 -4
  66. pulumi_vault/identity/group_member_entity_ids.py +12 -16
  67. pulumi_vault/identity/group_member_group_ids.py +24 -20
  68. pulumi_vault/identity/group_policies.py +4 -8
  69. pulumi_vault/identity/mfa_duo.py +4 -8
  70. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  71. pulumi_vault/identity/mfa_okta.py +4 -8
  72. pulumi_vault/identity/mfa_pingid.py +0 -4
  73. pulumi_vault/identity/mfa_totp.py +0 -4
  74. pulumi_vault/identity/oidc.py +0 -4
  75. pulumi_vault/identity/oidc_assignment.py +10 -6
  76. pulumi_vault/identity/oidc_client.py +10 -10
  77. pulumi_vault/identity/oidc_key.py +16 -12
  78. pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
  79. pulumi_vault/identity/oidc_provider.py +22 -16
  80. pulumi_vault/identity/oidc_role.py +28 -20
  81. pulumi_vault/identity/oidc_scope.py +6 -8
  82. pulumi_vault/jwt/auth_backend.py +20 -32
  83. pulumi_vault/jwt/auth_backend_role.py +63 -190
  84. pulumi_vault/kmip/secret_backend.py +10 -14
  85. pulumi_vault/kmip/secret_role.py +0 -4
  86. pulumi_vault/kmip/secret_scope.py +0 -4
  87. pulumi_vault/kubernetes/auth_backend_config.py +0 -4
  88. pulumi_vault/kubernetes/auth_backend_role.py +56 -172
  89. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  90. pulumi_vault/kubernetes/secret_backend.py +6 -8
  91. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  92. pulumi_vault/kv/get_secret.py +0 -4
  93. pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
  94. pulumi_vault/kv/get_secret_v2.py +58 -0
  95. pulumi_vault/kv/get_secrets_list.py +4 -8
  96. pulumi_vault/kv/get_secrets_list_v2.py +14 -12
  97. pulumi_vault/kv/secret.py +0 -4
  98. pulumi_vault/kv/secret_backend_v2.py +0 -4
  99. pulumi_vault/kv/secret_v2.py +2 -4
  100. pulumi_vault/ldap/auth_backend.py +66 -161
  101. pulumi_vault/ldap/auth_backend_group.py +0 -4
  102. pulumi_vault/ldap/auth_backend_user.py +0 -4
  103. pulumi_vault/ldap/secret_backend.py +4 -8
  104. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
  105. pulumi_vault/ldap/secret_backend_library_set.py +2 -4
  106. pulumi_vault/ldap/secret_backend_static_role.py +0 -4
  107. pulumi_vault/managed/_inputs.py +84 -132
  108. pulumi_vault/managed/keys.py +7 -28
  109. pulumi_vault/managed/outputs.py +84 -132
  110. pulumi_vault/mfa_duo.py +4 -6
  111. pulumi_vault/mfa_okta.py +4 -6
  112. pulumi_vault/mfa_pingid.py +4 -6
  113. pulumi_vault/mfa_totp.py +10 -12
  114. pulumi_vault/mongodbatlas/secret_backend.py +0 -4
  115. pulumi_vault/mongodbatlas/secret_role.py +2 -4
  116. pulumi_vault/mount.py +26 -42
  117. pulumi_vault/nomad_secret_backend.py +4 -8
  118. pulumi_vault/nomad_secret_role.py +0 -4
  119. pulumi_vault/okta/_inputs.py +8 -8
  120. pulumi_vault/okta/auth_backend.py +6 -10
  121. pulumi_vault/okta/auth_backend_group.py +0 -4
  122. pulumi_vault/okta/auth_backend_user.py +0 -4
  123. pulumi_vault/okta/outputs.py +8 -8
  124. pulumi_vault/outputs.py +0 -20
  125. pulumi_vault/password_policy.py +6 -8
  126. pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
  127. pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
  128. pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
  129. pulumi_vault/pkisecret/get_backend_key.py +2 -6
  130. pulumi_vault/pkisecret/get_backend_keys.py +0 -4
  131. pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
  132. pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
  133. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
  134. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
  135. pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
  136. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
  137. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
  138. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
  139. pulumi_vault/pkisecret/secret_backend_role.py +2 -4
  140. pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
  141. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
  142. pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
  143. pulumi_vault/provider.py +0 -8
  144. pulumi_vault/pulumi-plugin.json +2 -1
  145. pulumi_vault/quota_lease_count.py +6 -8
  146. pulumi_vault/quota_rate_limit.py +2 -4
  147. pulumi_vault/rabbitmq/secret_backend.py +4 -8
  148. pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
  149. pulumi_vault/raft_autopilot.py +0 -4
  150. pulumi_vault/raft_snapshot_agent_config.py +109 -304
  151. pulumi_vault/rgp_policy.py +2 -6
  152. pulumi_vault/saml/auth_backend.py +8 -12
  153. pulumi_vault/saml/auth_backend_role.py +64 -178
  154. pulumi_vault/secrets/sync_association.py +12 -10
  155. pulumi_vault/secrets/sync_aws_destination.py +6 -8
  156. pulumi_vault/secrets/sync_azure_destination.py +10 -12
  157. pulumi_vault/secrets/sync_config.py +2 -6
  158. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  159. pulumi_vault/secrets/sync_gh_destination.py +6 -8
  160. pulumi_vault/secrets/sync_github_apps.py +8 -8
  161. pulumi_vault/secrets/sync_vercel_destination.py +6 -8
  162. pulumi_vault/ssh/_inputs.py +6 -32
  163. pulumi_vault/ssh/outputs.py +6 -32
  164. pulumi_vault/ssh/secret_backend_ca.py +0 -4
  165. pulumi_vault/ssh/secret_backend_role.py +4 -4
  166. pulumi_vault/terraformcloud/secret_backend.py +0 -56
  167. pulumi_vault/terraformcloud/secret_creds.py +2 -17
  168. pulumi_vault/terraformcloud/secret_role.py +2 -69
  169. pulumi_vault/token.py +14 -18
  170. pulumi_vault/tokenauth/auth_backend_role.py +64 -180
  171. pulumi_vault/transform/alphabet.py +4 -6
  172. pulumi_vault/transform/get_decode.py +4 -4
  173. pulumi_vault/transform/get_encode.py +4 -4
  174. pulumi_vault/transform/role.py +4 -6
  175. pulumi_vault/transform/template.py +4 -4
  176. pulumi_vault/transit/get_decrypt.py +4 -20
  177. pulumi_vault/transit/get_encrypt.py +0 -14
  178. pulumi_vault/transit/secret_backend_key.py +6 -6
  179. pulumi_vault/transit/secret_cache_config.py +0 -4
  180. {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/METADATA +1 -1
  181. pulumi_vault-6.1.1.dist-info/RECORD +252 -0
  182. pulumi_vault-6.1.0a1712222735.dist-info/RECORD +0 -252
  183. {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/WHEEL +0 -0
  184. {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/top_level.txt +0 -0
@@ -58,32 +58,15 @@ class AuthBackendRoleArgs:
58
58
  The value should not contain leading or trailing forward slashes.
59
59
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
60
60
  *Available only for Vault Enterprise*.
61
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
62
- addresses which can authenticate successfully, and ties the resulting token to these blocks
63
- as well.
64
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
65
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
66
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
67
- `token_max_ttl` would otherwise allow a renewal.
68
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
69
- Its current value will be referenced at renewal time.
70
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
71
- generated tokens; otherwise it will be added to the policies set in token_policies.
72
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/azure#token_num_uses)
73
- of times a generated token may be used (within its lifetime); 0 means unlimited.
74
- :param pulumi.Input[int] token_period: If set, indicates that the
75
- token generated using this role should never expire. The token should be renewed within the
76
- duration specified by this value. At each renewal, the token's TTL will be set to the
77
- value of this field. Specified in seconds.
78
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
79
- on the auth method, this list may be supplemented by user/group/other values.
80
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
81
- Its current value will be referenced at renewal time.
82
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
83
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
84
- `service` tokens). For token store roles, there are two additional possibilities:
85
- `default-service` and `default-batch` which specify the type to return unless the client
86
- requests a different type at generation time.
61
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
62
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
63
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
64
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
65
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
66
+ :param pulumi.Input[int] token_period: Generated Token's Period
67
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
68
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
69
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
87
70
  """
88
71
  pulumi.set(__self__, "role", role)
89
72
  if backend is not None:
@@ -248,9 +231,7 @@ class AuthBackendRoleArgs:
248
231
  @pulumi.getter(name="tokenBoundCidrs")
249
232
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
250
233
  """
251
- List of CIDR blocks; if set, specifies blocks of IP
252
- addresses which can authenticate successfully, and ties the resulting token to these blocks
253
- as well.
234
+ Specifies the blocks of IP addresses which are allowed to use the generated token
254
235
  """
255
236
  return pulumi.get(self, "token_bound_cidrs")
256
237
 
@@ -262,10 +243,7 @@ class AuthBackendRoleArgs:
262
243
  @pulumi.getter(name="tokenExplicitMaxTtl")
263
244
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
264
245
  """
265
- If set, will encode an
266
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
267
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
268
- `token_max_ttl` would otherwise allow a renewal.
246
+ Generated Token's Explicit Maximum TTL in seconds
269
247
  """
270
248
  return pulumi.get(self, "token_explicit_max_ttl")
271
249
 
@@ -277,8 +255,7 @@ class AuthBackendRoleArgs:
277
255
  @pulumi.getter(name="tokenMaxTtl")
278
256
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
279
257
  """
280
- The maximum lifetime for generated tokens in number of seconds.
281
- Its current value will be referenced at renewal time.
258
+ The maximum lifetime of the generated token
282
259
  """
283
260
  return pulumi.get(self, "token_max_ttl")
284
261
 
@@ -290,8 +267,7 @@ class AuthBackendRoleArgs:
290
267
  @pulumi.getter(name="tokenNoDefaultPolicy")
291
268
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
292
269
  """
293
- If set, the default policy will not be set on
294
- generated tokens; otherwise it will be added to the policies set in token_policies.
270
+ If true, the 'default' policy will not automatically be added to generated tokens
295
271
  """
296
272
  return pulumi.get(self, "token_no_default_policy")
297
273
 
@@ -303,8 +279,7 @@ class AuthBackendRoleArgs:
303
279
  @pulumi.getter(name="tokenNumUses")
304
280
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
305
281
  """
306
- The [maximum number](https://www.vaultproject.io/api-docs/azure#token_num_uses)
307
- of times a generated token may be used (within its lifetime); 0 means unlimited.
282
+ The maximum number of times a token may be used, a value of zero means unlimited
308
283
  """
309
284
  return pulumi.get(self, "token_num_uses")
310
285
 
@@ -316,10 +291,7 @@ class AuthBackendRoleArgs:
316
291
  @pulumi.getter(name="tokenPeriod")
317
292
  def token_period(self) -> Optional[pulumi.Input[int]]:
318
293
  """
319
- If set, indicates that the
320
- token generated using this role should never expire. The token should be renewed within the
321
- duration specified by this value. At each renewal, the token's TTL will be set to the
322
- value of this field. Specified in seconds.
294
+ Generated Token's Period
323
295
  """
324
296
  return pulumi.get(self, "token_period")
325
297
 
@@ -331,8 +303,7 @@ class AuthBackendRoleArgs:
331
303
  @pulumi.getter(name="tokenPolicies")
332
304
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
333
305
  """
334
- List of policies to encode onto generated tokens. Depending
335
- on the auth method, this list may be supplemented by user/group/other values.
306
+ Generated Token's Policies
336
307
  """
337
308
  return pulumi.get(self, "token_policies")
338
309
 
@@ -344,8 +315,7 @@ class AuthBackendRoleArgs:
344
315
  @pulumi.getter(name="tokenTtl")
345
316
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
346
317
  """
347
- The incremental lifetime for generated tokens in number of seconds.
348
- Its current value will be referenced at renewal time.
318
+ The initial ttl of the token to generate in seconds
349
319
  """
350
320
  return pulumi.get(self, "token_ttl")
351
321
 
@@ -357,11 +327,7 @@ class AuthBackendRoleArgs:
357
327
  @pulumi.getter(name="tokenType")
358
328
  def token_type(self) -> Optional[pulumi.Input[str]]:
359
329
  """
360
- The type of token that should be generated. Can be `service`,
361
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
362
- `service` tokens). For token store roles, there are two additional possibilities:
363
- `default-service` and `default-batch` which specify the type to return unless the client
364
- requests a different type at generation time.
330
+ The type of token to generate, service or batch
365
331
  """
366
332
  return pulumi.get(self, "token_type")
367
333
 
@@ -417,32 +383,15 @@ class _AuthBackendRoleState:
417
383
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
418
384
  *Available only for Vault Enterprise*.
419
385
  :param pulumi.Input[str] role: The name of the role.
420
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
421
- addresses which can authenticate successfully, and ties the resulting token to these blocks
422
- as well.
423
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
424
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
425
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
426
- `token_max_ttl` would otherwise allow a renewal.
427
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
428
- Its current value will be referenced at renewal time.
429
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
430
- generated tokens; otherwise it will be added to the policies set in token_policies.
431
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/azure#token_num_uses)
432
- of times a generated token may be used (within its lifetime); 0 means unlimited.
433
- :param pulumi.Input[int] token_period: If set, indicates that the
434
- token generated using this role should never expire. The token should be renewed within the
435
- duration specified by this value. At each renewal, the token's TTL will be set to the
436
- value of this field. Specified in seconds.
437
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
438
- on the auth method, this list may be supplemented by user/group/other values.
439
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
440
- Its current value will be referenced at renewal time.
441
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
442
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
443
- `service` tokens). For token store roles, there are two additional possibilities:
444
- `default-service` and `default-batch` which specify the type to return unless the client
445
- requests a different type at generation time.
386
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
387
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
388
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
389
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
390
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
391
+ :param pulumi.Input[int] token_period: Generated Token's Period
392
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
393
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
394
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
446
395
  """
447
396
  if backend is not None:
448
397
  pulumi.set(__self__, "backend", backend)
@@ -608,9 +557,7 @@ class _AuthBackendRoleState:
608
557
  @pulumi.getter(name="tokenBoundCidrs")
609
558
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
610
559
  """
611
- List of CIDR blocks; if set, specifies blocks of IP
612
- addresses which can authenticate successfully, and ties the resulting token to these blocks
613
- as well.
560
+ Specifies the blocks of IP addresses which are allowed to use the generated token
614
561
  """
615
562
  return pulumi.get(self, "token_bound_cidrs")
616
563
 
@@ -622,10 +569,7 @@ class _AuthBackendRoleState:
622
569
  @pulumi.getter(name="tokenExplicitMaxTtl")
623
570
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
624
571
  """
625
- If set, will encode an
626
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
627
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
628
- `token_max_ttl` would otherwise allow a renewal.
572
+ Generated Token's Explicit Maximum TTL in seconds
629
573
  """
630
574
  return pulumi.get(self, "token_explicit_max_ttl")
631
575
 
@@ -637,8 +581,7 @@ class _AuthBackendRoleState:
637
581
  @pulumi.getter(name="tokenMaxTtl")
638
582
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
639
583
  """
640
- The maximum lifetime for generated tokens in number of seconds.
641
- Its current value will be referenced at renewal time.
584
+ The maximum lifetime of the generated token
642
585
  """
643
586
  return pulumi.get(self, "token_max_ttl")
644
587
 
@@ -650,8 +593,7 @@ class _AuthBackendRoleState:
650
593
  @pulumi.getter(name="tokenNoDefaultPolicy")
651
594
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
652
595
  """
653
- If set, the default policy will not be set on
654
- generated tokens; otherwise it will be added to the policies set in token_policies.
596
+ If true, the 'default' policy will not automatically be added to generated tokens
655
597
  """
656
598
  return pulumi.get(self, "token_no_default_policy")
657
599
 
@@ -663,8 +605,7 @@ class _AuthBackendRoleState:
663
605
  @pulumi.getter(name="tokenNumUses")
664
606
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
665
607
  """
666
- The [maximum number](https://www.vaultproject.io/api-docs/azure#token_num_uses)
667
- of times a generated token may be used (within its lifetime); 0 means unlimited.
608
+ The maximum number of times a token may be used, a value of zero means unlimited
668
609
  """
669
610
  return pulumi.get(self, "token_num_uses")
670
611
 
@@ -676,10 +617,7 @@ class _AuthBackendRoleState:
676
617
  @pulumi.getter(name="tokenPeriod")
677
618
  def token_period(self) -> Optional[pulumi.Input[int]]:
678
619
  """
679
- If set, indicates that the
680
- token generated using this role should never expire. The token should be renewed within the
681
- duration specified by this value. At each renewal, the token's TTL will be set to the
682
- value of this field. Specified in seconds.
620
+ Generated Token's Period
683
621
  """
684
622
  return pulumi.get(self, "token_period")
685
623
 
@@ -691,8 +629,7 @@ class _AuthBackendRoleState:
691
629
  @pulumi.getter(name="tokenPolicies")
692
630
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
693
631
  """
694
- List of policies to encode onto generated tokens. Depending
695
- on the auth method, this list may be supplemented by user/group/other values.
632
+ Generated Token's Policies
696
633
  """
697
634
  return pulumi.get(self, "token_policies")
698
635
 
@@ -704,8 +641,7 @@ class _AuthBackendRoleState:
704
641
  @pulumi.getter(name="tokenTtl")
705
642
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
706
643
  """
707
- The incremental lifetime for generated tokens in number of seconds.
708
- Its current value will be referenced at renewal time.
644
+ The initial ttl of the token to generate in seconds
709
645
  """
710
646
  return pulumi.get(self, "token_ttl")
711
647
 
@@ -717,11 +653,7 @@ class _AuthBackendRoleState:
717
653
  @pulumi.getter(name="tokenType")
718
654
  def token_type(self) -> Optional[pulumi.Input[str]]:
719
655
  """
720
- The type of token that should be generated. Can be `service`,
721
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
722
- `service` tokens). For token store roles, there are two additional possibilities:
723
- `default-service` and `default-batch` which specify the type to return unless the client
724
- requests a different type at generation time.
656
+ The type of token to generate, service or batch
725
657
  """
726
658
  return pulumi.get(self, "token_type")
727
659
 
@@ -763,7 +695,6 @@ class AuthBackendRole(pulumi.CustomResource):
763
695
 
764
696
  ## Example Usage
765
697
 
766
- <!--Start PulumiCodeChooser -->
767
698
  ```python
768
699
  import pulumi
769
700
  import pulumi_vault as vault
@@ -782,7 +713,6 @@ class AuthBackendRole(pulumi.CustomResource):
782
713
  "prod",
783
714
  ])
784
715
  ```
785
- <!--End PulumiCodeChooser -->
786
716
 
787
717
  ## Import
788
718
 
@@ -818,32 +748,15 @@ class AuthBackendRole(pulumi.CustomResource):
818
748
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
819
749
  *Available only for Vault Enterprise*.
820
750
  :param pulumi.Input[str] role: The name of the role.
821
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
822
- addresses which can authenticate successfully, and ties the resulting token to these blocks
823
- as well.
824
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
825
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
826
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
827
- `token_max_ttl` would otherwise allow a renewal.
828
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
829
- Its current value will be referenced at renewal time.
830
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
831
- generated tokens; otherwise it will be added to the policies set in token_policies.
832
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/azure#token_num_uses)
833
- of times a generated token may be used (within its lifetime); 0 means unlimited.
834
- :param pulumi.Input[int] token_period: If set, indicates that the
835
- token generated using this role should never expire. The token should be renewed within the
836
- duration specified by this value. At each renewal, the token's TTL will be set to the
837
- value of this field. Specified in seconds.
838
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
839
- on the auth method, this list may be supplemented by user/group/other values.
840
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
841
- Its current value will be referenced at renewal time.
842
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
843
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
844
- `service` tokens). For token store roles, there are two additional possibilities:
845
- `default-service` and `default-batch` which specify the type to return unless the client
846
- requests a different type at generation time.
751
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
752
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
753
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
754
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
755
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
756
+ :param pulumi.Input[int] token_period: Generated Token's Period
757
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
758
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
759
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
847
760
  """
848
761
  ...
849
762
  @overload
@@ -860,7 +773,6 @@ class AuthBackendRole(pulumi.CustomResource):
860
773
 
861
774
  ## Example Usage
862
775
 
863
- <!--Start PulumiCodeChooser -->
864
776
  ```python
865
777
  import pulumi
866
778
  import pulumi_vault as vault
@@ -879,7 +791,6 @@ class AuthBackendRole(pulumi.CustomResource):
879
791
  "prod",
880
792
  ])
881
793
  ```
882
- <!--End PulumiCodeChooser -->
883
794
 
884
795
  ## Import
885
796
 
@@ -1010,32 +921,15 @@ class AuthBackendRole(pulumi.CustomResource):
1010
921
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1011
922
  *Available only for Vault Enterprise*.
1012
923
  :param pulumi.Input[str] role: The name of the role.
1013
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
1014
- addresses which can authenticate successfully, and ties the resulting token to these blocks
1015
- as well.
1016
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
1017
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1018
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1019
- `token_max_ttl` would otherwise allow a renewal.
1020
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
1021
- Its current value will be referenced at renewal time.
1022
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
1023
- generated tokens; otherwise it will be added to the policies set in token_policies.
1024
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/azure#token_num_uses)
1025
- of times a generated token may be used (within its lifetime); 0 means unlimited.
1026
- :param pulumi.Input[int] token_period: If set, indicates that the
1027
- token generated using this role should never expire. The token should be renewed within the
1028
- duration specified by this value. At each renewal, the token's TTL will be set to the
1029
- value of this field. Specified in seconds.
1030
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
1031
- on the auth method, this list may be supplemented by user/group/other values.
1032
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
1033
- Its current value will be referenced at renewal time.
1034
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
1035
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
1036
- `service` tokens). For token store roles, there are two additional possibilities:
1037
- `default-service` and `default-batch` which specify the type to return unless the client
1038
- requests a different type at generation time.
924
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
925
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
926
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
927
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
928
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
929
+ :param pulumi.Input[int] token_period: Generated Token's Period
930
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
931
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
932
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
1039
933
  """
1040
934
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
1041
935
 
@@ -1152,9 +1046,7 @@ class AuthBackendRole(pulumi.CustomResource):
1152
1046
  @pulumi.getter(name="tokenBoundCidrs")
1153
1047
  def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
1154
1048
  """
1155
- List of CIDR blocks; if set, specifies blocks of IP
1156
- addresses which can authenticate successfully, and ties the resulting token to these blocks
1157
- as well.
1049
+ Specifies the blocks of IP addresses which are allowed to use the generated token
1158
1050
  """
1159
1051
  return pulumi.get(self, "token_bound_cidrs")
1160
1052
 
@@ -1162,10 +1054,7 @@ class AuthBackendRole(pulumi.CustomResource):
1162
1054
  @pulumi.getter(name="tokenExplicitMaxTtl")
1163
1055
  def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
1164
1056
  """
1165
- If set, will encode an
1166
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1167
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1168
- `token_max_ttl` would otherwise allow a renewal.
1057
+ Generated Token's Explicit Maximum TTL in seconds
1169
1058
  """
1170
1059
  return pulumi.get(self, "token_explicit_max_ttl")
1171
1060
 
@@ -1173,8 +1062,7 @@ class AuthBackendRole(pulumi.CustomResource):
1173
1062
  @pulumi.getter(name="tokenMaxTtl")
1174
1063
  def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
1175
1064
  """
1176
- The maximum lifetime for generated tokens in number of seconds.
1177
- Its current value will be referenced at renewal time.
1065
+ The maximum lifetime of the generated token
1178
1066
  """
1179
1067
  return pulumi.get(self, "token_max_ttl")
1180
1068
 
@@ -1182,8 +1070,7 @@ class AuthBackendRole(pulumi.CustomResource):
1182
1070
  @pulumi.getter(name="tokenNoDefaultPolicy")
1183
1071
  def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
1184
1072
  """
1185
- If set, the default policy will not be set on
1186
- generated tokens; otherwise it will be added to the policies set in token_policies.
1073
+ If true, the 'default' policy will not automatically be added to generated tokens
1187
1074
  """
1188
1075
  return pulumi.get(self, "token_no_default_policy")
1189
1076
 
@@ -1191,8 +1078,7 @@ class AuthBackendRole(pulumi.CustomResource):
1191
1078
  @pulumi.getter(name="tokenNumUses")
1192
1079
  def token_num_uses(self) -> pulumi.Output[Optional[int]]:
1193
1080
  """
1194
- The [maximum number](https://www.vaultproject.io/api-docs/azure#token_num_uses)
1195
- of times a generated token may be used (within its lifetime); 0 means unlimited.
1081
+ The maximum number of times a token may be used, a value of zero means unlimited
1196
1082
  """
1197
1083
  return pulumi.get(self, "token_num_uses")
1198
1084
 
@@ -1200,10 +1086,7 @@ class AuthBackendRole(pulumi.CustomResource):
1200
1086
  @pulumi.getter(name="tokenPeriod")
1201
1087
  def token_period(self) -> pulumi.Output[Optional[int]]:
1202
1088
  """
1203
- If set, indicates that the
1204
- token generated using this role should never expire. The token should be renewed within the
1205
- duration specified by this value. At each renewal, the token's TTL will be set to the
1206
- value of this field. Specified in seconds.
1089
+ Generated Token's Period
1207
1090
  """
1208
1091
  return pulumi.get(self, "token_period")
1209
1092
 
@@ -1211,8 +1094,7 @@ class AuthBackendRole(pulumi.CustomResource):
1211
1094
  @pulumi.getter(name="tokenPolicies")
1212
1095
  def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
1213
1096
  """
1214
- List of policies to encode onto generated tokens. Depending
1215
- on the auth method, this list may be supplemented by user/group/other values.
1097
+ Generated Token's Policies
1216
1098
  """
1217
1099
  return pulumi.get(self, "token_policies")
1218
1100
 
@@ -1220,8 +1102,7 @@ class AuthBackendRole(pulumi.CustomResource):
1220
1102
  @pulumi.getter(name="tokenTtl")
1221
1103
  def token_ttl(self) -> pulumi.Output[Optional[int]]:
1222
1104
  """
1223
- The incremental lifetime for generated tokens in number of seconds.
1224
- Its current value will be referenced at renewal time.
1105
+ The initial ttl of the token to generate in seconds
1225
1106
  """
1226
1107
  return pulumi.get(self, "token_ttl")
1227
1108
 
@@ -1229,11 +1110,7 @@ class AuthBackendRole(pulumi.CustomResource):
1229
1110
  @pulumi.getter(name="tokenType")
1230
1111
  def token_type(self) -> pulumi.Output[Optional[str]]:
1231
1112
  """
1232
- The type of token that should be generated. Can be `service`,
1233
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
1234
- `service` tokens). For token store roles, there are two additional possibilities:
1235
- `default-service` and `default-batch` which specify the type to return unless the client
1236
- requests a different type at generation time.
1113
+ The type of token to generate, service or batch
1237
1114
  """
1238
1115
  return pulumi.get(self, "token_type")
1239
1116
 
@@ -382,37 +382,33 @@ class Backend(pulumi.CustomResource):
382
382
 
383
383
  ### *Vault-1.9 And Above*
384
384
 
385
- <!--Start PulumiCodeChooser -->
386
385
  ```python
387
386
  import pulumi
388
387
  import pulumi_vault as vault
389
388
 
390
389
  azure = vault.azure.Backend("azure",
391
- client_id="11111111-2222-3333-4444-333333333333",
392
- client_secret="12345678901234567890",
393
- environment="AzurePublicCloud",
390
+ use_microsoft_graph_api=True,
394
391
  subscription_id="11111111-2222-3333-4444-111111111111",
395
392
  tenant_id="11111111-2222-3333-4444-222222222222",
396
- use_microsoft_graph_api=True)
393
+ client_id="11111111-2222-3333-4444-333333333333",
394
+ client_secret="12345678901234567890",
395
+ environment="AzurePublicCloud")
397
396
  ```
398
- <!--End PulumiCodeChooser -->
399
397
 
400
398
  ### *Vault-1.8 And Below*
401
399
 
402
- <!--Start PulumiCodeChooser -->
403
400
  ```python
404
401
  import pulumi
405
402
  import pulumi_vault as vault
406
403
 
407
404
  azure = vault.azure.Backend("azure",
408
- client_id="11111111-2222-3333-4444-333333333333",
409
- client_secret="12345678901234567890",
410
- environment="AzurePublicCloud",
405
+ use_microsoft_graph_api=False,
411
406
  subscription_id="11111111-2222-3333-4444-111111111111",
412
407
  tenant_id="11111111-2222-3333-4444-222222222222",
413
- use_microsoft_graph_api=False)
408
+ client_id="11111111-2222-3333-4444-333333333333",
409
+ client_secret="12345678901234567890",
410
+ environment="AzurePublicCloud")
414
411
  ```
415
- <!--End PulumiCodeChooser -->
416
412
 
417
413
  :param str resource_name: The name of the resource.
418
414
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -442,37 +438,33 @@ class Backend(pulumi.CustomResource):
442
438
 
443
439
  ### *Vault-1.9 And Above*
444
440
 
445
- <!--Start PulumiCodeChooser -->
446
441
  ```python
447
442
  import pulumi
448
443
  import pulumi_vault as vault
449
444
 
450
445
  azure = vault.azure.Backend("azure",
451
- client_id="11111111-2222-3333-4444-333333333333",
452
- client_secret="12345678901234567890",
453
- environment="AzurePublicCloud",
446
+ use_microsoft_graph_api=True,
454
447
  subscription_id="11111111-2222-3333-4444-111111111111",
455
448
  tenant_id="11111111-2222-3333-4444-222222222222",
456
- use_microsoft_graph_api=True)
449
+ client_id="11111111-2222-3333-4444-333333333333",
450
+ client_secret="12345678901234567890",
451
+ environment="AzurePublicCloud")
457
452
  ```
458
- <!--End PulumiCodeChooser -->
459
453
 
460
454
  ### *Vault-1.8 And Below*
461
455
 
462
- <!--Start PulumiCodeChooser -->
463
456
  ```python
464
457
  import pulumi
465
458
  import pulumi_vault as vault
466
459
 
467
460
  azure = vault.azure.Backend("azure",
468
- client_id="11111111-2222-3333-4444-333333333333",
469
- client_secret="12345678901234567890",
470
- environment="AzurePublicCloud",
461
+ use_microsoft_graph_api=False,
471
462
  subscription_id="11111111-2222-3333-4444-111111111111",
472
463
  tenant_id="11111111-2222-3333-4444-222222222222",
473
- use_microsoft_graph_api=False)
464
+ client_id="11111111-2222-3333-4444-333333333333",
465
+ client_secret="12345678901234567890",
466
+ environment="AzurePublicCloud")
474
467
  ```
475
- <!--End PulumiCodeChooser -->
476
468
 
477
469
  :param str resource_name: The name of the resource.
478
470
  :param BackendArgs args: The arguments to use to populate this resource's properties.