pulumi-vault 6.1.0a1712222735__py3-none-any.whl → 6.1.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (184) hide show
  1. pulumi_vault/_inputs.py +0 -20
  2. pulumi_vault/ad/secret_backend.py +2 -6
  3. pulumi_vault/ad/secret_library.py +2 -4
  4. pulumi_vault/ad/secret_role.py +0 -4
  5. pulumi_vault/alicloud/auth_backend_role.py +69 -192
  6. pulumi_vault/approle/auth_backend_login.py +0 -4
  7. pulumi_vault/approle/auth_backend_role.py +63 -186
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
  9. pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
  10. pulumi_vault/audit.py +12 -20
  11. pulumi_vault/audit_request_header.py +6 -6
  12. pulumi_vault/aws/auth_backend_client.py +6 -10
  13. pulumi_vault/aws/auth_backend_config_identity.py +0 -4
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
  15. pulumi_vault/aws/auth_backend_login.py +0 -8
  16. pulumi_vault/aws/auth_backend_role.py +63 -186
  17. pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
  18. pulumi_vault/aws/auth_backend_sts_role.py +0 -4
  19. pulumi_vault/aws/secret_backend.py +63 -0
  20. pulumi_vault/aws/secret_backend_role.py +2 -4
  21. pulumi_vault/aws/secret_backend_static_role.py +2 -4
  22. pulumi_vault/azure/auth_backend_config.py +6 -10
  23. pulumi_vault/azure/auth_backend_role.py +63 -186
  24. pulumi_vault/azure/backend.py +16 -24
  25. pulumi_vault/azure/backend_role.py +14 -18
  26. pulumi_vault/azure/get_access_credentials.py +0 -4
  27. pulumi_vault/cert_auth_backend_role.py +75 -208
  28. pulumi_vault/consul/secret_backend.py +10 -18
  29. pulumi_vault/consul/secret_backend_role.py +2 -4
  30. pulumi_vault/database/_inputs.py +522 -784
  31. pulumi_vault/database/outputs.py +522 -784
  32. pulumi_vault/database/secret_backend_connection.py +2 -4
  33. pulumi_vault/database/secret_backend_role.py +4 -4
  34. pulumi_vault/database/secret_backend_static_role.py +10 -8
  35. pulumi_vault/database/secrets_mount.py +4 -4
  36. pulumi_vault/egp_policy.py +4 -8
  37. pulumi_vault/gcp/auth_backend.py +0 -36
  38. pulumi_vault/gcp/auth_backend_role.py +63 -264
  39. pulumi_vault/gcp/get_auth_backend_role.py +0 -4
  40. pulumi_vault/gcp/secret_backend.py +4 -6
  41. pulumi_vault/gcp/secret_impersonated_account.py +12 -14
  42. pulumi_vault/gcp/secret_roleset.py +4 -6
  43. pulumi_vault/gcp/secret_static_account.py +14 -16
  44. pulumi_vault/generic/endpoint.py +4 -8
  45. pulumi_vault/generic/get_secret.py +40 -4
  46. pulumi_vault/get_auth_backend.py +0 -4
  47. pulumi_vault/get_auth_backends.py +0 -8
  48. pulumi_vault/get_namespace.py +0 -12
  49. pulumi_vault/get_namespaces.py +4 -12
  50. pulumi_vault/get_nomad_access_token.py +0 -4
  51. pulumi_vault/get_policy_document.py +8 -8
  52. pulumi_vault/get_raft_autopilot_state.py +0 -4
  53. pulumi_vault/github/auth_backend.py +0 -4
  54. pulumi_vault/github/team.py +2 -6
  55. pulumi_vault/github/user.py +2 -6
  56. pulumi_vault/identity/entity.py +6 -8
  57. pulumi_vault/identity/entity_alias.py +6 -8
  58. pulumi_vault/identity/entity_policies.py +12 -12
  59. pulumi_vault/identity/get_entity.py +0 -4
  60. pulumi_vault/identity/get_group.py +0 -4
  61. pulumi_vault/identity/get_oidc_client_creds.py +2 -4
  62. pulumi_vault/identity/get_oidc_openid_config.py +10 -6
  63. pulumi_vault/identity/get_oidc_public_keys.py +10 -6
  64. pulumi_vault/identity/group.py +38 -42
  65. pulumi_vault/identity/group_alias.py +2 -4
  66. pulumi_vault/identity/group_member_entity_ids.py +12 -16
  67. pulumi_vault/identity/group_member_group_ids.py +24 -20
  68. pulumi_vault/identity/group_policies.py +4 -8
  69. pulumi_vault/identity/mfa_duo.py +4 -8
  70. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  71. pulumi_vault/identity/mfa_okta.py +4 -8
  72. pulumi_vault/identity/mfa_pingid.py +0 -4
  73. pulumi_vault/identity/mfa_totp.py +0 -4
  74. pulumi_vault/identity/oidc.py +0 -4
  75. pulumi_vault/identity/oidc_assignment.py +10 -6
  76. pulumi_vault/identity/oidc_client.py +10 -10
  77. pulumi_vault/identity/oidc_key.py +16 -12
  78. pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
  79. pulumi_vault/identity/oidc_provider.py +22 -16
  80. pulumi_vault/identity/oidc_role.py +28 -20
  81. pulumi_vault/identity/oidc_scope.py +6 -8
  82. pulumi_vault/jwt/auth_backend.py +20 -32
  83. pulumi_vault/jwt/auth_backend_role.py +63 -190
  84. pulumi_vault/kmip/secret_backend.py +10 -14
  85. pulumi_vault/kmip/secret_role.py +0 -4
  86. pulumi_vault/kmip/secret_scope.py +0 -4
  87. pulumi_vault/kubernetes/auth_backend_config.py +0 -4
  88. pulumi_vault/kubernetes/auth_backend_role.py +56 -172
  89. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  90. pulumi_vault/kubernetes/secret_backend.py +6 -8
  91. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  92. pulumi_vault/kv/get_secret.py +0 -4
  93. pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
  94. pulumi_vault/kv/get_secret_v2.py +58 -0
  95. pulumi_vault/kv/get_secrets_list.py +4 -8
  96. pulumi_vault/kv/get_secrets_list_v2.py +14 -12
  97. pulumi_vault/kv/secret.py +0 -4
  98. pulumi_vault/kv/secret_backend_v2.py +0 -4
  99. pulumi_vault/kv/secret_v2.py +2 -4
  100. pulumi_vault/ldap/auth_backend.py +66 -161
  101. pulumi_vault/ldap/auth_backend_group.py +0 -4
  102. pulumi_vault/ldap/auth_backend_user.py +0 -4
  103. pulumi_vault/ldap/secret_backend.py +4 -8
  104. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
  105. pulumi_vault/ldap/secret_backend_library_set.py +2 -4
  106. pulumi_vault/ldap/secret_backend_static_role.py +0 -4
  107. pulumi_vault/managed/_inputs.py +84 -132
  108. pulumi_vault/managed/keys.py +7 -28
  109. pulumi_vault/managed/outputs.py +84 -132
  110. pulumi_vault/mfa_duo.py +4 -6
  111. pulumi_vault/mfa_okta.py +4 -6
  112. pulumi_vault/mfa_pingid.py +4 -6
  113. pulumi_vault/mfa_totp.py +10 -12
  114. pulumi_vault/mongodbatlas/secret_backend.py +0 -4
  115. pulumi_vault/mongodbatlas/secret_role.py +2 -4
  116. pulumi_vault/mount.py +26 -42
  117. pulumi_vault/nomad_secret_backend.py +4 -8
  118. pulumi_vault/nomad_secret_role.py +0 -4
  119. pulumi_vault/okta/_inputs.py +8 -8
  120. pulumi_vault/okta/auth_backend.py +6 -10
  121. pulumi_vault/okta/auth_backend_group.py +0 -4
  122. pulumi_vault/okta/auth_backend_user.py +0 -4
  123. pulumi_vault/okta/outputs.py +8 -8
  124. pulumi_vault/outputs.py +0 -20
  125. pulumi_vault/password_policy.py +6 -8
  126. pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
  127. pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
  128. pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
  129. pulumi_vault/pkisecret/get_backend_key.py +2 -6
  130. pulumi_vault/pkisecret/get_backend_keys.py +0 -4
  131. pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
  132. pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
  133. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
  134. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
  135. pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
  136. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
  137. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
  138. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
  139. pulumi_vault/pkisecret/secret_backend_role.py +2 -4
  140. pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
  141. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
  142. pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
  143. pulumi_vault/provider.py +0 -8
  144. pulumi_vault/pulumi-plugin.json +2 -1
  145. pulumi_vault/quota_lease_count.py +6 -8
  146. pulumi_vault/quota_rate_limit.py +2 -4
  147. pulumi_vault/rabbitmq/secret_backend.py +4 -8
  148. pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
  149. pulumi_vault/raft_autopilot.py +0 -4
  150. pulumi_vault/raft_snapshot_agent_config.py +109 -304
  151. pulumi_vault/rgp_policy.py +2 -6
  152. pulumi_vault/saml/auth_backend.py +8 -12
  153. pulumi_vault/saml/auth_backend_role.py +64 -178
  154. pulumi_vault/secrets/sync_association.py +12 -10
  155. pulumi_vault/secrets/sync_aws_destination.py +6 -8
  156. pulumi_vault/secrets/sync_azure_destination.py +10 -12
  157. pulumi_vault/secrets/sync_config.py +2 -6
  158. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  159. pulumi_vault/secrets/sync_gh_destination.py +6 -8
  160. pulumi_vault/secrets/sync_github_apps.py +8 -8
  161. pulumi_vault/secrets/sync_vercel_destination.py +6 -8
  162. pulumi_vault/ssh/_inputs.py +6 -32
  163. pulumi_vault/ssh/outputs.py +6 -32
  164. pulumi_vault/ssh/secret_backend_ca.py +0 -4
  165. pulumi_vault/ssh/secret_backend_role.py +4 -4
  166. pulumi_vault/terraformcloud/secret_backend.py +0 -56
  167. pulumi_vault/terraformcloud/secret_creds.py +2 -17
  168. pulumi_vault/terraformcloud/secret_role.py +2 -69
  169. pulumi_vault/token.py +14 -18
  170. pulumi_vault/tokenauth/auth_backend_role.py +64 -180
  171. pulumi_vault/transform/alphabet.py +4 -6
  172. pulumi_vault/transform/get_decode.py +4 -4
  173. pulumi_vault/transform/get_encode.py +4 -4
  174. pulumi_vault/transform/role.py +4 -6
  175. pulumi_vault/transform/template.py +4 -4
  176. pulumi_vault/transit/get_decrypt.py +4 -20
  177. pulumi_vault/transit/get_encrypt.py +0 -14
  178. pulumi_vault/transit/secret_backend_key.py +6 -6
  179. pulumi_vault/transit/secret_cache_config.py +0 -4
  180. {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/METADATA +1 -1
  181. pulumi_vault-6.1.1.dist-info/RECORD +252 -0
  182. pulumi_vault-6.1.0a1712222735.dist-info/RECORD +0 -252
  183. {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/WHEEL +0 -0
  184. {pulumi_vault-6.1.0a1712222735.dist-info → pulumi_vault-6.1.1.dist-info}/top_level.txt +0 -0
@@ -75,34 +75,15 @@ class CertAuthBackendRoleArgs:
75
75
  Requires Vault version 1.13+.
76
76
  :param pulumi.Input[Sequence[pulumi.Input[str]]] required_extensions: TLS extensions required on
77
77
  client certificates
78
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
79
- addresses which can authenticate successfully, and ties the resulting token to these blocks
80
- as well.
81
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
82
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
83
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
84
- `token_max_ttl` would otherwise allow a renewal.
85
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
86
- Its current value will be referenced at renewal time.
87
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
88
- generated tokens; otherwise it will be added to the policies set in token_policies.
89
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/cert#token_num_uses)
90
- of times a generated token may be used (within its lifetime); 0 means unlimited.
91
- :param pulumi.Input[int] token_period: If set, indicates that the
92
- token generated using this role should never expire. The token should be renewed within the
93
- duration specified by this value. At each renewal, the token's TTL will be set to the
94
- value of this field. Specified in seconds.
95
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
96
- on the auth method, this list may be supplemented by user/group/other values.
97
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
98
- Its current value will be referenced at renewal time.
99
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
100
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
101
- `service` tokens). For token store roles, there are two additional possibilities:
102
- `default-service` and `default-batch` which specify the type to return unless the client
103
- requests a different type at generation time.
104
-
105
- For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
78
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
79
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
80
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
81
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
82
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
83
+ :param pulumi.Input[int] token_period: Generated Token's Period
84
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
85
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
86
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
106
87
  """
107
88
  pulumi.set(__self__, "certificate", certificate)
108
89
  if allowed_common_names is not None:
@@ -380,9 +361,7 @@ class CertAuthBackendRoleArgs:
380
361
  @pulumi.getter(name="tokenBoundCidrs")
381
362
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
382
363
  """
383
- List of CIDR blocks; if set, specifies blocks of IP
384
- addresses which can authenticate successfully, and ties the resulting token to these blocks
385
- as well.
364
+ Specifies the blocks of IP addresses which are allowed to use the generated token
386
365
  """
387
366
  return pulumi.get(self, "token_bound_cidrs")
388
367
 
@@ -394,10 +373,7 @@ class CertAuthBackendRoleArgs:
394
373
  @pulumi.getter(name="tokenExplicitMaxTtl")
395
374
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
396
375
  """
397
- If set, will encode an
398
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
399
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
400
- `token_max_ttl` would otherwise allow a renewal.
376
+ Generated Token's Explicit Maximum TTL in seconds
401
377
  """
402
378
  return pulumi.get(self, "token_explicit_max_ttl")
403
379
 
@@ -409,8 +385,7 @@ class CertAuthBackendRoleArgs:
409
385
  @pulumi.getter(name="tokenMaxTtl")
410
386
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
411
387
  """
412
- The maximum lifetime for generated tokens in number of seconds.
413
- Its current value will be referenced at renewal time.
388
+ The maximum lifetime of the generated token
414
389
  """
415
390
  return pulumi.get(self, "token_max_ttl")
416
391
 
@@ -422,8 +397,7 @@ class CertAuthBackendRoleArgs:
422
397
  @pulumi.getter(name="tokenNoDefaultPolicy")
423
398
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
424
399
  """
425
- If set, the default policy will not be set on
426
- generated tokens; otherwise it will be added to the policies set in token_policies.
400
+ If true, the 'default' policy will not automatically be added to generated tokens
427
401
  """
428
402
  return pulumi.get(self, "token_no_default_policy")
429
403
 
@@ -435,8 +409,7 @@ class CertAuthBackendRoleArgs:
435
409
  @pulumi.getter(name="tokenNumUses")
436
410
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
437
411
  """
438
- The [maximum number](https://www.vaultproject.io/api-docs/auth/cert#token_num_uses)
439
- of times a generated token may be used (within its lifetime); 0 means unlimited.
412
+ The maximum number of times a token may be used, a value of zero means unlimited
440
413
  """
441
414
  return pulumi.get(self, "token_num_uses")
442
415
 
@@ -448,10 +421,7 @@ class CertAuthBackendRoleArgs:
448
421
  @pulumi.getter(name="tokenPeriod")
449
422
  def token_period(self) -> Optional[pulumi.Input[int]]:
450
423
  """
451
- If set, indicates that the
452
- token generated using this role should never expire. The token should be renewed within the
453
- duration specified by this value. At each renewal, the token's TTL will be set to the
454
- value of this field. Specified in seconds.
424
+ Generated Token's Period
455
425
  """
456
426
  return pulumi.get(self, "token_period")
457
427
 
@@ -463,8 +433,7 @@ class CertAuthBackendRoleArgs:
463
433
  @pulumi.getter(name="tokenPolicies")
464
434
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
465
435
  """
466
- List of policies to encode onto generated tokens. Depending
467
- on the auth method, this list may be supplemented by user/group/other values.
436
+ Generated Token's Policies
468
437
  """
469
438
  return pulumi.get(self, "token_policies")
470
439
 
@@ -476,8 +445,7 @@ class CertAuthBackendRoleArgs:
476
445
  @pulumi.getter(name="tokenTtl")
477
446
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
478
447
  """
479
- The incremental lifetime for generated tokens in number of seconds.
480
- Its current value will be referenced at renewal time.
448
+ The initial ttl of the token to generate in seconds
481
449
  """
482
450
  return pulumi.get(self, "token_ttl")
483
451
 
@@ -489,13 +457,7 @@ class CertAuthBackendRoleArgs:
489
457
  @pulumi.getter(name="tokenType")
490
458
  def token_type(self) -> Optional[pulumi.Input[str]]:
491
459
  """
492
- The type of token that should be generated. Can be `service`,
493
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
494
- `service` tokens). For token store roles, there are two additional possibilities:
495
- `default-service` and `default-batch` which specify the type to return unless the client
496
- requests a different type at generation time.
497
-
498
- For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
460
+ The type of token to generate, service or batch
499
461
  """
500
462
  return pulumi.get(self, "token_type")
501
463
 
@@ -568,34 +530,15 @@ class _CertAuthBackendRoleState:
568
530
  Requires Vault version 1.13+.
569
531
  :param pulumi.Input[Sequence[pulumi.Input[str]]] required_extensions: TLS extensions required on
570
532
  client certificates
571
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
572
- addresses which can authenticate successfully, and ties the resulting token to these blocks
573
- as well.
574
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
575
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
576
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
577
- `token_max_ttl` would otherwise allow a renewal.
578
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
579
- Its current value will be referenced at renewal time.
580
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
581
- generated tokens; otherwise it will be added to the policies set in token_policies.
582
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/cert#token_num_uses)
583
- of times a generated token may be used (within its lifetime); 0 means unlimited.
584
- :param pulumi.Input[int] token_period: If set, indicates that the
585
- token generated using this role should never expire. The token should be renewed within the
586
- duration specified by this value. At each renewal, the token's TTL will be set to the
587
- value of this field. Specified in seconds.
588
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
589
- on the auth method, this list may be supplemented by user/group/other values.
590
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
591
- Its current value will be referenced at renewal time.
592
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
593
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
594
- `service` tokens). For token store roles, there are two additional possibilities:
595
- `default-service` and `default-batch` which specify the type to return unless the client
596
- requests a different type at generation time.
597
-
598
- For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
533
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
534
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
535
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
536
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
537
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
538
+ :param pulumi.Input[int] token_period: Generated Token's Period
539
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
540
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
541
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
599
542
  """
600
543
  if allowed_common_names is not None:
601
544
  pulumi.set(__self__, "allowed_common_names", allowed_common_names)
@@ -874,9 +817,7 @@ class _CertAuthBackendRoleState:
874
817
  @pulumi.getter(name="tokenBoundCidrs")
875
818
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
876
819
  """
877
- List of CIDR blocks; if set, specifies blocks of IP
878
- addresses which can authenticate successfully, and ties the resulting token to these blocks
879
- as well.
820
+ Specifies the blocks of IP addresses which are allowed to use the generated token
880
821
  """
881
822
  return pulumi.get(self, "token_bound_cidrs")
882
823
 
@@ -888,10 +829,7 @@ class _CertAuthBackendRoleState:
888
829
  @pulumi.getter(name="tokenExplicitMaxTtl")
889
830
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
890
831
  """
891
- If set, will encode an
892
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
893
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
894
- `token_max_ttl` would otherwise allow a renewal.
832
+ Generated Token's Explicit Maximum TTL in seconds
895
833
  """
896
834
  return pulumi.get(self, "token_explicit_max_ttl")
897
835
 
@@ -903,8 +841,7 @@ class _CertAuthBackendRoleState:
903
841
  @pulumi.getter(name="tokenMaxTtl")
904
842
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
905
843
  """
906
- The maximum lifetime for generated tokens in number of seconds.
907
- Its current value will be referenced at renewal time.
844
+ The maximum lifetime of the generated token
908
845
  """
909
846
  return pulumi.get(self, "token_max_ttl")
910
847
 
@@ -916,8 +853,7 @@ class _CertAuthBackendRoleState:
916
853
  @pulumi.getter(name="tokenNoDefaultPolicy")
917
854
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
918
855
  """
919
- If set, the default policy will not be set on
920
- generated tokens; otherwise it will be added to the policies set in token_policies.
856
+ If true, the 'default' policy will not automatically be added to generated tokens
921
857
  """
922
858
  return pulumi.get(self, "token_no_default_policy")
923
859
 
@@ -929,8 +865,7 @@ class _CertAuthBackendRoleState:
929
865
  @pulumi.getter(name="tokenNumUses")
930
866
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
931
867
  """
932
- The [maximum number](https://www.vaultproject.io/api-docs/auth/cert#token_num_uses)
933
- of times a generated token may be used (within its lifetime); 0 means unlimited.
868
+ The maximum number of times a token may be used, a value of zero means unlimited
934
869
  """
935
870
  return pulumi.get(self, "token_num_uses")
936
871
 
@@ -942,10 +877,7 @@ class _CertAuthBackendRoleState:
942
877
  @pulumi.getter(name="tokenPeriod")
943
878
  def token_period(self) -> Optional[pulumi.Input[int]]:
944
879
  """
945
- If set, indicates that the
946
- token generated using this role should never expire. The token should be renewed within the
947
- duration specified by this value. At each renewal, the token's TTL will be set to the
948
- value of this field. Specified in seconds.
880
+ Generated Token's Period
949
881
  """
950
882
  return pulumi.get(self, "token_period")
951
883
 
@@ -957,8 +889,7 @@ class _CertAuthBackendRoleState:
957
889
  @pulumi.getter(name="tokenPolicies")
958
890
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
959
891
  """
960
- List of policies to encode onto generated tokens. Depending
961
- on the auth method, this list may be supplemented by user/group/other values.
892
+ Generated Token's Policies
962
893
  """
963
894
  return pulumi.get(self, "token_policies")
964
895
 
@@ -970,8 +901,7 @@ class _CertAuthBackendRoleState:
970
901
  @pulumi.getter(name="tokenTtl")
971
902
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
972
903
  """
973
- The incremental lifetime for generated tokens in number of seconds.
974
- Its current value will be referenced at renewal time.
904
+ The initial ttl of the token to generate in seconds
975
905
  """
976
906
  return pulumi.get(self, "token_ttl")
977
907
 
@@ -983,13 +913,7 @@ class _CertAuthBackendRoleState:
983
913
  @pulumi.getter(name="tokenType")
984
914
  def token_type(self) -> Optional[pulumi.Input[str]]:
985
915
  """
986
- The type of token that should be generated. Can be `service`,
987
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
988
- `service` tokens). For token store roles, there are two additional possibilities:
989
- `default-service` and `default-batch` which specify the type to return unless the client
990
- requests a different type at generation time.
991
-
992
- For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
916
+ The type of token to generate, service or batch
993
917
  """
994
918
  return pulumi.get(self, "token_type")
995
919
 
@@ -1035,17 +959,18 @@ class CertAuthBackendRole(pulumi.CustomResource):
1035
959
 
1036
960
  ## Example Usage
1037
961
 
1038
- <!--Start PulumiCodeChooser -->
1039
962
  ```python
1040
963
  import pulumi
964
+ import pulumi_std as std
1041
965
  import pulumi_vault as vault
1042
966
 
1043
- cert_auth_backend = vault.AuthBackend("certAuthBackend",
967
+ cert = vault.AuthBackend("cert",
1044
968
  path="cert",
1045
969
  type="cert")
1046
- cert_cert_auth_backend_role = vault.CertAuthBackendRole("certCertAuthBackendRole",
1047
- certificate=(lambda path: open(path).read())("/path/to/certs/ca-cert.pem"),
1048
- backend=cert_auth_backend.path,
970
+ cert_cert_auth_backend_role = vault.CertAuthBackendRole("cert",
971
+ name="foo",
972
+ certificate=std.file(input="/path/to/certs/ca-cert.pem").result,
973
+ backend=cert.path,
1049
974
  allowed_names=[
1050
975
  "foo.example.org",
1051
976
  "baz.example.org",
@@ -1054,7 +979,6 @@ class CertAuthBackendRole(pulumi.CustomResource):
1054
979
  token_max_ttl=600,
1055
980
  token_policies=["foo"])
1056
981
  ```
1057
- <!--End PulumiCodeChooser -->
1058
982
 
1059
983
  :param str resource_name: The name of the resource.
1060
984
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -1091,34 +1015,15 @@ class CertAuthBackendRole(pulumi.CustomResource):
1091
1015
  Requires Vault version 1.13+.
1092
1016
  :param pulumi.Input[Sequence[pulumi.Input[str]]] required_extensions: TLS extensions required on
1093
1017
  client certificates
1094
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
1095
- addresses which can authenticate successfully, and ties the resulting token to these blocks
1096
- as well.
1097
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
1098
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1099
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1100
- `token_max_ttl` would otherwise allow a renewal.
1101
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
1102
- Its current value will be referenced at renewal time.
1103
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
1104
- generated tokens; otherwise it will be added to the policies set in token_policies.
1105
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/cert#token_num_uses)
1106
- of times a generated token may be used (within its lifetime); 0 means unlimited.
1107
- :param pulumi.Input[int] token_period: If set, indicates that the
1108
- token generated using this role should never expire. The token should be renewed within the
1109
- duration specified by this value. At each renewal, the token's TTL will be set to the
1110
- value of this field. Specified in seconds.
1111
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
1112
- on the auth method, this list may be supplemented by user/group/other values.
1113
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
1114
- Its current value will be referenced at renewal time.
1115
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
1116
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
1117
- `service` tokens). For token store roles, there are two additional possibilities:
1118
- `default-service` and `default-batch` which specify the type to return unless the client
1119
- requests a different type at generation time.
1120
-
1121
- For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
1018
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
1019
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
1020
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
1021
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
1022
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
1023
+ :param pulumi.Input[int] token_period: Generated Token's Period
1024
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
1025
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
1026
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
1122
1027
  """
1123
1028
  ...
1124
1029
  @overload
@@ -1131,17 +1036,18 @@ class CertAuthBackendRole(pulumi.CustomResource):
1131
1036
 
1132
1037
  ## Example Usage
1133
1038
 
1134
- <!--Start PulumiCodeChooser -->
1135
1039
  ```python
1136
1040
  import pulumi
1041
+ import pulumi_std as std
1137
1042
  import pulumi_vault as vault
1138
1043
 
1139
- cert_auth_backend = vault.AuthBackend("certAuthBackend",
1044
+ cert = vault.AuthBackend("cert",
1140
1045
  path="cert",
1141
1046
  type="cert")
1142
- cert_cert_auth_backend_role = vault.CertAuthBackendRole("certCertAuthBackendRole",
1143
- certificate=(lambda path: open(path).read())("/path/to/certs/ca-cert.pem"),
1144
- backend=cert_auth_backend.path,
1047
+ cert_cert_auth_backend_role = vault.CertAuthBackendRole("cert",
1048
+ name="foo",
1049
+ certificate=std.file(input="/path/to/certs/ca-cert.pem").result,
1050
+ backend=cert.path,
1145
1051
  allowed_names=[
1146
1052
  "foo.example.org",
1147
1053
  "baz.example.org",
@@ -1150,7 +1056,6 @@ class CertAuthBackendRole(pulumi.CustomResource):
1150
1056
  token_max_ttl=600,
1151
1057
  token_policies=["foo"])
1152
1058
  ```
1153
- <!--End PulumiCodeChooser -->
1154
1059
 
1155
1060
  :param str resource_name: The name of the resource.
1156
1061
  :param CertAuthBackendRoleArgs args: The arguments to use to populate this resource's properties.
@@ -1306,34 +1211,15 @@ class CertAuthBackendRole(pulumi.CustomResource):
1306
1211
  Requires Vault version 1.13+.
1307
1212
  :param pulumi.Input[Sequence[pulumi.Input[str]]] required_extensions: TLS extensions required on
1308
1213
  client certificates
1309
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
1310
- addresses which can authenticate successfully, and ties the resulting token to these blocks
1311
- as well.
1312
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
1313
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1314
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1315
- `token_max_ttl` would otherwise allow a renewal.
1316
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
1317
- Its current value will be referenced at renewal time.
1318
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
1319
- generated tokens; otherwise it will be added to the policies set in token_policies.
1320
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/cert#token_num_uses)
1321
- of times a generated token may be used (within its lifetime); 0 means unlimited.
1322
- :param pulumi.Input[int] token_period: If set, indicates that the
1323
- token generated using this role should never expire. The token should be renewed within the
1324
- duration specified by this value. At each renewal, the token's TTL will be set to the
1325
- value of this field. Specified in seconds.
1326
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
1327
- on the auth method, this list may be supplemented by user/group/other values.
1328
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
1329
- Its current value will be referenced at renewal time.
1330
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
1331
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
1332
- `service` tokens). For token store roles, there are two additional possibilities:
1333
- `default-service` and `default-batch` which specify the type to return unless the client
1334
- requests a different type at generation time.
1335
-
1336
- For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
1214
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
1215
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
1216
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
1217
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
1218
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
1219
+ :param pulumi.Input[int] token_period: Generated Token's Period
1220
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
1221
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
1222
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
1337
1223
  """
1338
1224
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
1339
1225
 
@@ -1523,9 +1409,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
1523
1409
  @pulumi.getter(name="tokenBoundCidrs")
1524
1410
  def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
1525
1411
  """
1526
- List of CIDR blocks; if set, specifies blocks of IP
1527
- addresses which can authenticate successfully, and ties the resulting token to these blocks
1528
- as well.
1412
+ Specifies the blocks of IP addresses which are allowed to use the generated token
1529
1413
  """
1530
1414
  return pulumi.get(self, "token_bound_cidrs")
1531
1415
 
@@ -1533,10 +1417,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
1533
1417
  @pulumi.getter(name="tokenExplicitMaxTtl")
1534
1418
  def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
1535
1419
  """
1536
- If set, will encode an
1537
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1538
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1539
- `token_max_ttl` would otherwise allow a renewal.
1420
+ Generated Token's Explicit Maximum TTL in seconds
1540
1421
  """
1541
1422
  return pulumi.get(self, "token_explicit_max_ttl")
1542
1423
 
@@ -1544,8 +1425,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
1544
1425
  @pulumi.getter(name="tokenMaxTtl")
1545
1426
  def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
1546
1427
  """
1547
- The maximum lifetime for generated tokens in number of seconds.
1548
- Its current value will be referenced at renewal time.
1428
+ The maximum lifetime of the generated token
1549
1429
  """
1550
1430
  return pulumi.get(self, "token_max_ttl")
1551
1431
 
@@ -1553,8 +1433,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
1553
1433
  @pulumi.getter(name="tokenNoDefaultPolicy")
1554
1434
  def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
1555
1435
  """
1556
- If set, the default policy will not be set on
1557
- generated tokens; otherwise it will be added to the policies set in token_policies.
1436
+ If true, the 'default' policy will not automatically be added to generated tokens
1558
1437
  """
1559
1438
  return pulumi.get(self, "token_no_default_policy")
1560
1439
 
@@ -1562,8 +1441,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
1562
1441
  @pulumi.getter(name="tokenNumUses")
1563
1442
  def token_num_uses(self) -> pulumi.Output[Optional[int]]:
1564
1443
  """
1565
- The [maximum number](https://www.vaultproject.io/api-docs/auth/cert#token_num_uses)
1566
- of times a generated token may be used (within its lifetime); 0 means unlimited.
1444
+ The maximum number of times a token may be used, a value of zero means unlimited
1567
1445
  """
1568
1446
  return pulumi.get(self, "token_num_uses")
1569
1447
 
@@ -1571,10 +1449,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
1571
1449
  @pulumi.getter(name="tokenPeriod")
1572
1450
  def token_period(self) -> pulumi.Output[Optional[int]]:
1573
1451
  """
1574
- If set, indicates that the
1575
- token generated using this role should never expire. The token should be renewed within the
1576
- duration specified by this value. At each renewal, the token's TTL will be set to the
1577
- value of this field. Specified in seconds.
1452
+ Generated Token's Period
1578
1453
  """
1579
1454
  return pulumi.get(self, "token_period")
1580
1455
 
@@ -1582,8 +1457,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
1582
1457
  @pulumi.getter(name="tokenPolicies")
1583
1458
  def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
1584
1459
  """
1585
- List of policies to encode onto generated tokens. Depending
1586
- on the auth method, this list may be supplemented by user/group/other values.
1460
+ Generated Token's Policies
1587
1461
  """
1588
1462
  return pulumi.get(self, "token_policies")
1589
1463
 
@@ -1591,8 +1465,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
1591
1465
  @pulumi.getter(name="tokenTtl")
1592
1466
  def token_ttl(self) -> pulumi.Output[Optional[int]]:
1593
1467
  """
1594
- The incremental lifetime for generated tokens in number of seconds.
1595
- Its current value will be referenced at renewal time.
1468
+ The initial ttl of the token to generate in seconds
1596
1469
  """
1597
1470
  return pulumi.get(self, "token_ttl")
1598
1471
 
@@ -1600,13 +1473,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
1600
1473
  @pulumi.getter(name="tokenType")
1601
1474
  def token_type(self) -> pulumi.Output[Optional[str]]:
1602
1475
  """
1603
- The type of token that should be generated. Can be `service`,
1604
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
1605
- `service` tokens). For token store roles, there are two additional possibilities:
1606
- `default-service` and `default-batch` which specify the type to return unless the client
1607
- requests a different type at generation time.
1608
-
1609
- For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
1476
+ The type of token to generate, service or batch
1610
1477
  """
1611
1478
  return pulumi.get(self, "token_type")
1612
1479
 
@@ -530,32 +530,28 @@ class SecretBackend(pulumi.CustomResource):
530
530
  ## Example Usage
531
531
 
532
532
  ### Creating a standard backend resource:
533
- <!--Start PulumiCodeChooser -->
534
533
  ```python
535
534
  import pulumi
536
535
  import pulumi_vault as vault
537
536
 
538
537
  test = vault.consul.SecretBackend("test",
539
- address="127.0.0.1:8500",
540
- description="Manages the Consul backend",
541
538
  path="consul",
539
+ description="Manages the Consul backend",
540
+ address="127.0.0.1:8500",
542
541
  token="4240861b-ce3d-8530-115a-521ff070dd29")
543
542
  ```
544
- <!--End PulumiCodeChooser -->
545
543
 
546
544
  ### Creating a backend resource to bootstrap a new Consul instance:
547
- <!--Start PulumiCodeChooser -->
548
545
  ```python
549
546
  import pulumi
550
547
  import pulumi_vault as vault
551
548
 
552
549
  test = vault.consul.SecretBackend("test",
553
- address="127.0.0.1:8500",
554
- bootstrap=True,
550
+ path="consul",
555
551
  description="Bootstrap the Consul backend",
556
- path="consul")
552
+ address="127.0.0.1:8500",
553
+ bootstrap=True)
557
554
  ```
558
- <!--End PulumiCodeChooser -->
559
555
 
560
556
  ## Import
561
557
 
@@ -600,32 +596,28 @@ class SecretBackend(pulumi.CustomResource):
600
596
  ## Example Usage
601
597
 
602
598
  ### Creating a standard backend resource:
603
- <!--Start PulumiCodeChooser -->
604
599
  ```python
605
600
  import pulumi
606
601
  import pulumi_vault as vault
607
602
 
608
603
  test = vault.consul.SecretBackend("test",
609
- address="127.0.0.1:8500",
610
- description="Manages the Consul backend",
611
604
  path="consul",
605
+ description="Manages the Consul backend",
606
+ address="127.0.0.1:8500",
612
607
  token="4240861b-ce3d-8530-115a-521ff070dd29")
613
608
  ```
614
- <!--End PulumiCodeChooser -->
615
609
 
616
610
  ### Creating a backend resource to bootstrap a new Consul instance:
617
- <!--Start PulumiCodeChooser -->
618
611
  ```python
619
612
  import pulumi
620
613
  import pulumi_vault as vault
621
614
 
622
615
  test = vault.consul.SecretBackend("test",
623
- address="127.0.0.1:8500",
624
- bootstrap=True,
616
+ path="consul",
625
617
  description="Bootstrap the Consul backend",
626
- path="consul")
618
+ address="127.0.0.1:8500",
619
+ bootstrap=True)
627
620
  ```
628
- <!--End PulumiCodeChooser -->
629
621
 
630
622
  ## Import
631
623