pulumi-vault 6.1.0a1712233015__py3-none-any.whl → 6.1.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (184) hide show
  1. pulumi_vault/_inputs.py +0 -20
  2. pulumi_vault/ad/secret_backend.py +2 -6
  3. pulumi_vault/ad/secret_library.py +2 -4
  4. pulumi_vault/ad/secret_role.py +0 -4
  5. pulumi_vault/alicloud/auth_backend_role.py +69 -192
  6. pulumi_vault/approle/auth_backend_login.py +0 -4
  7. pulumi_vault/approle/auth_backend_role.py +63 -186
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
  9. pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
  10. pulumi_vault/audit.py +12 -20
  11. pulumi_vault/audit_request_header.py +6 -6
  12. pulumi_vault/aws/auth_backend_client.py +6 -10
  13. pulumi_vault/aws/auth_backend_config_identity.py +0 -4
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
  15. pulumi_vault/aws/auth_backend_login.py +0 -8
  16. pulumi_vault/aws/auth_backend_role.py +63 -186
  17. pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
  18. pulumi_vault/aws/auth_backend_sts_role.py +0 -4
  19. pulumi_vault/aws/secret_backend.py +63 -0
  20. pulumi_vault/aws/secret_backend_role.py +2 -4
  21. pulumi_vault/aws/secret_backend_static_role.py +2 -4
  22. pulumi_vault/azure/auth_backend_config.py +6 -10
  23. pulumi_vault/azure/auth_backend_role.py +63 -186
  24. pulumi_vault/azure/backend.py +16 -24
  25. pulumi_vault/azure/backend_role.py +14 -18
  26. pulumi_vault/azure/get_access_credentials.py +0 -4
  27. pulumi_vault/cert_auth_backend_role.py +75 -208
  28. pulumi_vault/consul/secret_backend.py +10 -18
  29. pulumi_vault/consul/secret_backend_role.py +2 -4
  30. pulumi_vault/database/_inputs.py +522 -784
  31. pulumi_vault/database/outputs.py +522 -784
  32. pulumi_vault/database/secret_backend_connection.py +2 -4
  33. pulumi_vault/database/secret_backend_role.py +4 -4
  34. pulumi_vault/database/secret_backend_static_role.py +10 -8
  35. pulumi_vault/database/secrets_mount.py +4 -4
  36. pulumi_vault/egp_policy.py +4 -8
  37. pulumi_vault/gcp/auth_backend.py +0 -36
  38. pulumi_vault/gcp/auth_backend_role.py +63 -264
  39. pulumi_vault/gcp/get_auth_backend_role.py +0 -4
  40. pulumi_vault/gcp/secret_backend.py +4 -6
  41. pulumi_vault/gcp/secret_impersonated_account.py +12 -14
  42. pulumi_vault/gcp/secret_roleset.py +4 -6
  43. pulumi_vault/gcp/secret_static_account.py +14 -16
  44. pulumi_vault/generic/endpoint.py +4 -8
  45. pulumi_vault/generic/get_secret.py +40 -4
  46. pulumi_vault/get_auth_backend.py +0 -4
  47. pulumi_vault/get_auth_backends.py +0 -8
  48. pulumi_vault/get_namespace.py +0 -12
  49. pulumi_vault/get_namespaces.py +4 -12
  50. pulumi_vault/get_nomad_access_token.py +0 -4
  51. pulumi_vault/get_policy_document.py +8 -8
  52. pulumi_vault/get_raft_autopilot_state.py +0 -4
  53. pulumi_vault/github/auth_backend.py +0 -4
  54. pulumi_vault/github/team.py +2 -6
  55. pulumi_vault/github/user.py +2 -6
  56. pulumi_vault/identity/entity.py +6 -8
  57. pulumi_vault/identity/entity_alias.py +6 -8
  58. pulumi_vault/identity/entity_policies.py +12 -12
  59. pulumi_vault/identity/get_entity.py +0 -4
  60. pulumi_vault/identity/get_group.py +0 -4
  61. pulumi_vault/identity/get_oidc_client_creds.py +2 -4
  62. pulumi_vault/identity/get_oidc_openid_config.py +10 -6
  63. pulumi_vault/identity/get_oidc_public_keys.py +10 -6
  64. pulumi_vault/identity/group.py +38 -42
  65. pulumi_vault/identity/group_alias.py +2 -4
  66. pulumi_vault/identity/group_member_entity_ids.py +12 -16
  67. pulumi_vault/identity/group_member_group_ids.py +24 -20
  68. pulumi_vault/identity/group_policies.py +4 -8
  69. pulumi_vault/identity/mfa_duo.py +4 -8
  70. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  71. pulumi_vault/identity/mfa_okta.py +4 -8
  72. pulumi_vault/identity/mfa_pingid.py +0 -4
  73. pulumi_vault/identity/mfa_totp.py +0 -4
  74. pulumi_vault/identity/oidc.py +0 -4
  75. pulumi_vault/identity/oidc_assignment.py +10 -6
  76. pulumi_vault/identity/oidc_client.py +10 -10
  77. pulumi_vault/identity/oidc_key.py +16 -12
  78. pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
  79. pulumi_vault/identity/oidc_provider.py +22 -16
  80. pulumi_vault/identity/oidc_role.py +28 -20
  81. pulumi_vault/identity/oidc_scope.py +6 -8
  82. pulumi_vault/jwt/auth_backend.py +20 -32
  83. pulumi_vault/jwt/auth_backend_role.py +63 -190
  84. pulumi_vault/kmip/secret_backend.py +10 -14
  85. pulumi_vault/kmip/secret_role.py +0 -4
  86. pulumi_vault/kmip/secret_scope.py +0 -4
  87. pulumi_vault/kubernetes/auth_backend_config.py +0 -4
  88. pulumi_vault/kubernetes/auth_backend_role.py +56 -172
  89. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  90. pulumi_vault/kubernetes/secret_backend.py +6 -8
  91. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  92. pulumi_vault/kv/get_secret.py +0 -4
  93. pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
  94. pulumi_vault/kv/get_secret_v2.py +58 -0
  95. pulumi_vault/kv/get_secrets_list.py +4 -8
  96. pulumi_vault/kv/get_secrets_list_v2.py +14 -12
  97. pulumi_vault/kv/secret.py +0 -4
  98. pulumi_vault/kv/secret_backend_v2.py +0 -4
  99. pulumi_vault/kv/secret_v2.py +2 -4
  100. pulumi_vault/ldap/auth_backend.py +66 -161
  101. pulumi_vault/ldap/auth_backend_group.py +0 -4
  102. pulumi_vault/ldap/auth_backend_user.py +0 -4
  103. pulumi_vault/ldap/secret_backend.py +4 -8
  104. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
  105. pulumi_vault/ldap/secret_backend_library_set.py +2 -4
  106. pulumi_vault/ldap/secret_backend_static_role.py +0 -4
  107. pulumi_vault/managed/_inputs.py +84 -132
  108. pulumi_vault/managed/keys.py +7 -28
  109. pulumi_vault/managed/outputs.py +84 -132
  110. pulumi_vault/mfa_duo.py +4 -6
  111. pulumi_vault/mfa_okta.py +4 -6
  112. pulumi_vault/mfa_pingid.py +4 -6
  113. pulumi_vault/mfa_totp.py +10 -12
  114. pulumi_vault/mongodbatlas/secret_backend.py +0 -4
  115. pulumi_vault/mongodbatlas/secret_role.py +2 -4
  116. pulumi_vault/mount.py +26 -42
  117. pulumi_vault/nomad_secret_backend.py +4 -8
  118. pulumi_vault/nomad_secret_role.py +0 -4
  119. pulumi_vault/okta/_inputs.py +8 -8
  120. pulumi_vault/okta/auth_backend.py +6 -10
  121. pulumi_vault/okta/auth_backend_group.py +0 -4
  122. pulumi_vault/okta/auth_backend_user.py +0 -4
  123. pulumi_vault/okta/outputs.py +8 -8
  124. pulumi_vault/outputs.py +0 -20
  125. pulumi_vault/password_policy.py +6 -8
  126. pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
  127. pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
  128. pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
  129. pulumi_vault/pkisecret/get_backend_key.py +2 -6
  130. pulumi_vault/pkisecret/get_backend_keys.py +0 -4
  131. pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
  132. pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
  133. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
  134. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
  135. pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
  136. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
  137. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
  138. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
  139. pulumi_vault/pkisecret/secret_backend_role.py +2 -4
  140. pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
  141. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
  142. pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
  143. pulumi_vault/provider.py +0 -8
  144. pulumi_vault/pulumi-plugin.json +2 -1
  145. pulumi_vault/quota_lease_count.py +6 -8
  146. pulumi_vault/quota_rate_limit.py +2 -4
  147. pulumi_vault/rabbitmq/secret_backend.py +4 -8
  148. pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
  149. pulumi_vault/raft_autopilot.py +0 -4
  150. pulumi_vault/raft_snapshot_agent_config.py +109 -304
  151. pulumi_vault/rgp_policy.py +2 -6
  152. pulumi_vault/saml/auth_backend.py +8 -12
  153. pulumi_vault/saml/auth_backend_role.py +64 -178
  154. pulumi_vault/secrets/sync_association.py +12 -10
  155. pulumi_vault/secrets/sync_aws_destination.py +6 -8
  156. pulumi_vault/secrets/sync_azure_destination.py +10 -12
  157. pulumi_vault/secrets/sync_config.py +2 -6
  158. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  159. pulumi_vault/secrets/sync_gh_destination.py +6 -8
  160. pulumi_vault/secrets/sync_github_apps.py +8 -8
  161. pulumi_vault/secrets/sync_vercel_destination.py +6 -8
  162. pulumi_vault/ssh/_inputs.py +6 -32
  163. pulumi_vault/ssh/outputs.py +6 -32
  164. pulumi_vault/ssh/secret_backend_ca.py +0 -4
  165. pulumi_vault/ssh/secret_backend_role.py +4 -4
  166. pulumi_vault/terraformcloud/secret_backend.py +0 -56
  167. pulumi_vault/terraformcloud/secret_creds.py +2 -17
  168. pulumi_vault/terraformcloud/secret_role.py +2 -69
  169. pulumi_vault/token.py +14 -18
  170. pulumi_vault/tokenauth/auth_backend_role.py +64 -180
  171. pulumi_vault/transform/alphabet.py +4 -6
  172. pulumi_vault/transform/get_decode.py +4 -4
  173. pulumi_vault/transform/get_encode.py +4 -4
  174. pulumi_vault/transform/role.py +4 -6
  175. pulumi_vault/transform/template.py +4 -4
  176. pulumi_vault/transit/get_decrypt.py +4 -20
  177. pulumi_vault/transit/get_encrypt.py +0 -14
  178. pulumi_vault/transit/secret_backend_key.py +6 -6
  179. pulumi_vault/transit/secret_cache_config.py +0 -4
  180. {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1.dist-info}/METADATA +1 -1
  181. pulumi_vault-6.1.1.dist-info/RECORD +252 -0
  182. pulumi_vault-6.1.0a1712233015.dist-info/RECORD +0 -252
  183. {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1.dist-info}/WHEEL +0 -0
  184. {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1.dist-info}/top_level.txt +0 -0
@@ -40,32 +40,15 @@ class AuthBackendRoleArgs:
40
40
  The value should not contain leading or trailing forward slashes.
41
41
  The `namespace` is always relative to the provider's configured namespace.
42
42
  *Available only for Vault Enterprise*.
43
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
44
- addresses which can authenticate successfully, and ties the resulting token to these blocks
45
- as well.
46
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
47
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
48
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
49
- `token_max_ttl` would otherwise allow a renewal.
50
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
51
- Its current value will be referenced at renewal time.
52
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
53
- generated tokens; otherwise it will be added to the policies set in token_policies.
54
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
55
- of times a generated token may be used (within its lifetime); 0 means unlimited.
56
- :param pulumi.Input[int] token_period: If set, indicates that the
57
- token generated using this role should never expire. The token should be renewed within the
58
- duration specified by this value. At each renewal, the token's TTL will be set to the
59
- value of this field. Specified in seconds.
60
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
61
- on the auth method, this list may be supplemented by user/group/other values.
62
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
63
- Its current value will be referenced at renewal time.
64
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
65
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
66
- `service` tokens). For token store roles, there are two additional possibilities:
67
- `default-service` and `default-batch` which specify the type to return unless the client
68
- requests a different type at generation time.
43
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
44
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
45
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
46
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
47
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
48
+ :param pulumi.Input[int] token_period: Generated Token's Period
49
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
50
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
51
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
69
52
  """
70
53
  pulumi.set(__self__, "arn", arn)
71
54
  pulumi.set(__self__, "role", role)
@@ -151,9 +134,7 @@ class AuthBackendRoleArgs:
151
134
  @pulumi.getter(name="tokenBoundCidrs")
152
135
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
153
136
  """
154
- List of CIDR blocks; if set, specifies blocks of IP
155
- addresses which can authenticate successfully, and ties the resulting token to these blocks
156
- as well.
137
+ Specifies the blocks of IP addresses which are allowed to use the generated token
157
138
  """
158
139
  return pulumi.get(self, "token_bound_cidrs")
159
140
 
@@ -165,10 +146,7 @@ class AuthBackendRoleArgs:
165
146
  @pulumi.getter(name="tokenExplicitMaxTtl")
166
147
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
167
148
  """
168
- If set, will encode an
169
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
170
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
171
- `token_max_ttl` would otherwise allow a renewal.
149
+ Generated Token's Explicit Maximum TTL in seconds
172
150
  """
173
151
  return pulumi.get(self, "token_explicit_max_ttl")
174
152
 
@@ -180,8 +158,7 @@ class AuthBackendRoleArgs:
180
158
  @pulumi.getter(name="tokenMaxTtl")
181
159
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
182
160
  """
183
- The maximum lifetime for generated tokens in number of seconds.
184
- Its current value will be referenced at renewal time.
161
+ The maximum lifetime of the generated token
185
162
  """
186
163
  return pulumi.get(self, "token_max_ttl")
187
164
 
@@ -193,8 +170,7 @@ class AuthBackendRoleArgs:
193
170
  @pulumi.getter(name="tokenNoDefaultPolicy")
194
171
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
195
172
  """
196
- If set, the default policy will not be set on
197
- generated tokens; otherwise it will be added to the policies set in token_policies.
173
+ If true, the 'default' policy will not automatically be added to generated tokens
198
174
  """
199
175
  return pulumi.get(self, "token_no_default_policy")
200
176
 
@@ -206,8 +182,7 @@ class AuthBackendRoleArgs:
206
182
  @pulumi.getter(name="tokenNumUses")
207
183
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
208
184
  """
209
- The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
210
- of times a generated token may be used (within its lifetime); 0 means unlimited.
185
+ The maximum number of times a token may be used, a value of zero means unlimited
211
186
  """
212
187
  return pulumi.get(self, "token_num_uses")
213
188
 
@@ -219,10 +194,7 @@ class AuthBackendRoleArgs:
219
194
  @pulumi.getter(name="tokenPeriod")
220
195
  def token_period(self) -> Optional[pulumi.Input[int]]:
221
196
  """
222
- If set, indicates that the
223
- token generated using this role should never expire. The token should be renewed within the
224
- duration specified by this value. At each renewal, the token's TTL will be set to the
225
- value of this field. Specified in seconds.
197
+ Generated Token's Period
226
198
  """
227
199
  return pulumi.get(self, "token_period")
228
200
 
@@ -234,8 +206,7 @@ class AuthBackendRoleArgs:
234
206
  @pulumi.getter(name="tokenPolicies")
235
207
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
236
208
  """
237
- List of policies to encode onto generated tokens. Depending
238
- on the auth method, this list may be supplemented by user/group/other values.
209
+ Generated Token's Policies
239
210
  """
240
211
  return pulumi.get(self, "token_policies")
241
212
 
@@ -247,8 +218,7 @@ class AuthBackendRoleArgs:
247
218
  @pulumi.getter(name="tokenTtl")
248
219
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
249
220
  """
250
- The incremental lifetime for generated tokens in number of seconds.
251
- Its current value will be referenced at renewal time.
221
+ The initial ttl of the token to generate in seconds
252
222
  """
253
223
  return pulumi.get(self, "token_ttl")
254
224
 
@@ -260,11 +230,7 @@ class AuthBackendRoleArgs:
260
230
  @pulumi.getter(name="tokenType")
261
231
  def token_type(self) -> Optional[pulumi.Input[str]]:
262
232
  """
263
- The type of token that should be generated. Can be `service`,
264
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
265
- `service` tokens). For token store roles, there are two additional possibilities:
266
- `default-service` and `default-batch` which specify the type to return unless the client
267
- requests a different type at generation time.
233
+ The type of token to generate, service or batch
268
234
  """
269
235
  return pulumi.get(self, "token_type")
270
236
 
@@ -302,32 +268,15 @@ class _AuthBackendRoleState:
302
268
  *Available only for Vault Enterprise*.
303
269
  :param pulumi.Input[str] role: Name of the role. Must correspond with the name of
304
270
  the role reflected in the arn.
305
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
306
- addresses which can authenticate successfully, and ties the resulting token to these blocks
307
- as well.
308
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
309
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
310
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
311
- `token_max_ttl` would otherwise allow a renewal.
312
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
313
- Its current value will be referenced at renewal time.
314
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
315
- generated tokens; otherwise it will be added to the policies set in token_policies.
316
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
317
- of times a generated token may be used (within its lifetime); 0 means unlimited.
318
- :param pulumi.Input[int] token_period: If set, indicates that the
319
- token generated using this role should never expire. The token should be renewed within the
320
- duration specified by this value. At each renewal, the token's TTL will be set to the
321
- value of this field. Specified in seconds.
322
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
323
- on the auth method, this list may be supplemented by user/group/other values.
324
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
325
- Its current value will be referenced at renewal time.
326
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
327
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
328
- `service` tokens). For token store roles, there are two additional possibilities:
329
- `default-service` and `default-batch` which specify the type to return unless the client
330
- requests a different type at generation time.
271
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
272
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
273
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
274
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
275
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
276
+ :param pulumi.Input[int] token_period: Generated Token's Period
277
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
278
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
279
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
331
280
  """
332
281
  if arn is not None:
333
282
  pulumi.set(__self__, "arn", arn)
@@ -415,9 +364,7 @@ class _AuthBackendRoleState:
415
364
  @pulumi.getter(name="tokenBoundCidrs")
416
365
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
417
366
  """
418
- List of CIDR blocks; if set, specifies blocks of IP
419
- addresses which can authenticate successfully, and ties the resulting token to these blocks
420
- as well.
367
+ Specifies the blocks of IP addresses which are allowed to use the generated token
421
368
  """
422
369
  return pulumi.get(self, "token_bound_cidrs")
423
370
 
@@ -429,10 +376,7 @@ class _AuthBackendRoleState:
429
376
  @pulumi.getter(name="tokenExplicitMaxTtl")
430
377
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
431
378
  """
432
- If set, will encode an
433
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
434
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
435
- `token_max_ttl` would otherwise allow a renewal.
379
+ Generated Token's Explicit Maximum TTL in seconds
436
380
  """
437
381
  return pulumi.get(self, "token_explicit_max_ttl")
438
382
 
@@ -444,8 +388,7 @@ class _AuthBackendRoleState:
444
388
  @pulumi.getter(name="tokenMaxTtl")
445
389
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
446
390
  """
447
- The maximum lifetime for generated tokens in number of seconds.
448
- Its current value will be referenced at renewal time.
391
+ The maximum lifetime of the generated token
449
392
  """
450
393
  return pulumi.get(self, "token_max_ttl")
451
394
 
@@ -457,8 +400,7 @@ class _AuthBackendRoleState:
457
400
  @pulumi.getter(name="tokenNoDefaultPolicy")
458
401
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
459
402
  """
460
- If set, the default policy will not be set on
461
- generated tokens; otherwise it will be added to the policies set in token_policies.
403
+ If true, the 'default' policy will not automatically be added to generated tokens
462
404
  """
463
405
  return pulumi.get(self, "token_no_default_policy")
464
406
 
@@ -470,8 +412,7 @@ class _AuthBackendRoleState:
470
412
  @pulumi.getter(name="tokenNumUses")
471
413
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
472
414
  """
473
- The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
474
- of times a generated token may be used (within its lifetime); 0 means unlimited.
415
+ The maximum number of times a token may be used, a value of zero means unlimited
475
416
  """
476
417
  return pulumi.get(self, "token_num_uses")
477
418
 
@@ -483,10 +424,7 @@ class _AuthBackendRoleState:
483
424
  @pulumi.getter(name="tokenPeriod")
484
425
  def token_period(self) -> Optional[pulumi.Input[int]]:
485
426
  """
486
- If set, indicates that the
487
- token generated using this role should never expire. The token should be renewed within the
488
- duration specified by this value. At each renewal, the token's TTL will be set to the
489
- value of this field. Specified in seconds.
427
+ Generated Token's Period
490
428
  """
491
429
  return pulumi.get(self, "token_period")
492
430
 
@@ -498,8 +436,7 @@ class _AuthBackendRoleState:
498
436
  @pulumi.getter(name="tokenPolicies")
499
437
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
500
438
  """
501
- List of policies to encode onto generated tokens. Depending
502
- on the auth method, this list may be supplemented by user/group/other values.
439
+ Generated Token's Policies
503
440
  """
504
441
  return pulumi.get(self, "token_policies")
505
442
 
@@ -511,8 +448,7 @@ class _AuthBackendRoleState:
511
448
  @pulumi.getter(name="tokenTtl")
512
449
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
513
450
  """
514
- The incremental lifetime for generated tokens in number of seconds.
515
- Its current value will be referenced at renewal time.
451
+ The initial ttl of the token to generate in seconds
516
452
  """
517
453
  return pulumi.get(self, "token_ttl")
518
454
 
@@ -524,11 +460,7 @@ class _AuthBackendRoleState:
524
460
  @pulumi.getter(name="tokenType")
525
461
  def token_type(self) -> Optional[pulumi.Input[str]]:
526
462
  """
527
- The type of token that should be generated. Can be `service`,
528
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
529
- `service` tokens). For token store roles, there are two additional possibilities:
530
- `default-service` and `default-batch` which specify the type to return unless the client
531
- requests a different type at generation time.
463
+ The type of token to generate, service or batch
532
464
  """
533
465
  return pulumi.get(self, "token_type")
534
466
 
@@ -561,20 +493,18 @@ class AuthBackendRole(pulumi.CustomResource):
561
493
 
562
494
  ## Example Usage
563
495
 
564
- <!--Start PulumiCodeChooser -->
565
496
  ```python
566
497
  import pulumi
567
498
  import pulumi_vault as vault
568
499
 
569
- alicloud_auth_backend = vault.AuthBackend("alicloudAuthBackend",
500
+ alicloud = vault.AuthBackend("alicloud",
570
501
  type="alicloud",
571
502
  path="alicloud")
572
- alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("alicloudAuthBackendRole",
573
- backend=alicloud_auth_backend.path,
503
+ alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("alicloud",
504
+ backend=alicloud.path,
574
505
  role="example",
575
506
  arn="acs:ram:123456:tf:role/foobar")
576
507
  ```
577
- <!--End PulumiCodeChooser -->
578
508
 
579
509
  ## Import
580
510
 
@@ -597,32 +527,15 @@ class AuthBackendRole(pulumi.CustomResource):
597
527
  *Available only for Vault Enterprise*.
598
528
  :param pulumi.Input[str] role: Name of the role. Must correspond with the name of
599
529
  the role reflected in the arn.
600
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
601
- addresses which can authenticate successfully, and ties the resulting token to these blocks
602
- as well.
603
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
604
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
605
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
606
- `token_max_ttl` would otherwise allow a renewal.
607
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
608
- Its current value will be referenced at renewal time.
609
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
610
- generated tokens; otherwise it will be added to the policies set in token_policies.
611
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
612
- of times a generated token may be used (within its lifetime); 0 means unlimited.
613
- :param pulumi.Input[int] token_period: If set, indicates that the
614
- token generated using this role should never expire. The token should be renewed within the
615
- duration specified by this value. At each renewal, the token's TTL will be set to the
616
- value of this field. Specified in seconds.
617
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
618
- on the auth method, this list may be supplemented by user/group/other values.
619
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
620
- Its current value will be referenced at renewal time.
621
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
622
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
623
- `service` tokens). For token store roles, there are two additional possibilities:
624
- `default-service` and `default-batch` which specify the type to return unless the client
625
- requests a different type at generation time.
530
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
531
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
532
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
533
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
534
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
535
+ :param pulumi.Input[int] token_period: Generated Token's Period
536
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
537
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
538
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
626
539
  """
627
540
  ...
628
541
  @overload
@@ -635,20 +548,18 @@ class AuthBackendRole(pulumi.CustomResource):
635
548
 
636
549
  ## Example Usage
637
550
 
638
- <!--Start PulumiCodeChooser -->
639
551
  ```python
640
552
  import pulumi
641
553
  import pulumi_vault as vault
642
554
 
643
- alicloud_auth_backend = vault.AuthBackend("alicloudAuthBackend",
555
+ alicloud = vault.AuthBackend("alicloud",
644
556
  type="alicloud",
645
557
  path="alicloud")
646
- alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("alicloudAuthBackendRole",
647
- backend=alicloud_auth_backend.path,
558
+ alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("alicloud",
559
+ backend=alicloud.path,
648
560
  role="example",
649
561
  arn="acs:ram:123456:tf:role/foobar")
650
562
  ```
651
- <!--End PulumiCodeChooser -->
652
563
 
653
564
  ## Import
654
565
 
@@ -753,32 +664,15 @@ class AuthBackendRole(pulumi.CustomResource):
753
664
  *Available only for Vault Enterprise*.
754
665
  :param pulumi.Input[str] role: Name of the role. Must correspond with the name of
755
666
  the role reflected in the arn.
756
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
757
- addresses which can authenticate successfully, and ties the resulting token to these blocks
758
- as well.
759
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
760
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
761
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
762
- `token_max_ttl` would otherwise allow a renewal.
763
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
764
- Its current value will be referenced at renewal time.
765
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
766
- generated tokens; otherwise it will be added to the policies set in token_policies.
767
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
768
- of times a generated token may be used (within its lifetime); 0 means unlimited.
769
- :param pulumi.Input[int] token_period: If set, indicates that the
770
- token generated using this role should never expire. The token should be renewed within the
771
- duration specified by this value. At each renewal, the token's TTL will be set to the
772
- value of this field. Specified in seconds.
773
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
774
- on the auth method, this list may be supplemented by user/group/other values.
775
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
776
- Its current value will be referenced at renewal time.
777
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
778
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
779
- `service` tokens). For token store roles, there are two additional possibilities:
780
- `default-service` and `default-batch` which specify the type to return unless the client
781
- requests a different type at generation time.
667
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
668
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
669
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
670
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
671
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
672
+ :param pulumi.Input[int] token_period: Generated Token's Period
673
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
674
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
675
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
782
676
  """
783
677
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
784
678
 
@@ -842,9 +736,7 @@ class AuthBackendRole(pulumi.CustomResource):
842
736
  @pulumi.getter(name="tokenBoundCidrs")
843
737
  def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
844
738
  """
845
- List of CIDR blocks; if set, specifies blocks of IP
846
- addresses which can authenticate successfully, and ties the resulting token to these blocks
847
- as well.
739
+ Specifies the blocks of IP addresses which are allowed to use the generated token
848
740
  """
849
741
  return pulumi.get(self, "token_bound_cidrs")
850
742
 
@@ -852,10 +744,7 @@ class AuthBackendRole(pulumi.CustomResource):
852
744
  @pulumi.getter(name="tokenExplicitMaxTtl")
853
745
  def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
854
746
  """
855
- If set, will encode an
856
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
857
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
858
- `token_max_ttl` would otherwise allow a renewal.
747
+ Generated Token's Explicit Maximum TTL in seconds
859
748
  """
860
749
  return pulumi.get(self, "token_explicit_max_ttl")
861
750
 
@@ -863,8 +752,7 @@ class AuthBackendRole(pulumi.CustomResource):
863
752
  @pulumi.getter(name="tokenMaxTtl")
864
753
  def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
865
754
  """
866
- The maximum lifetime for generated tokens in number of seconds.
867
- Its current value will be referenced at renewal time.
755
+ The maximum lifetime of the generated token
868
756
  """
869
757
  return pulumi.get(self, "token_max_ttl")
870
758
 
@@ -872,8 +760,7 @@ class AuthBackendRole(pulumi.CustomResource):
872
760
  @pulumi.getter(name="tokenNoDefaultPolicy")
873
761
  def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
874
762
  """
875
- If set, the default policy will not be set on
876
- generated tokens; otherwise it will be added to the policies set in token_policies.
763
+ If true, the 'default' policy will not automatically be added to generated tokens
877
764
  """
878
765
  return pulumi.get(self, "token_no_default_policy")
879
766
 
@@ -881,8 +768,7 @@ class AuthBackendRole(pulumi.CustomResource):
881
768
  @pulumi.getter(name="tokenNumUses")
882
769
  def token_num_uses(self) -> pulumi.Output[Optional[int]]:
883
770
  """
884
- The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
885
- of times a generated token may be used (within its lifetime); 0 means unlimited.
771
+ The maximum number of times a token may be used, a value of zero means unlimited
886
772
  """
887
773
  return pulumi.get(self, "token_num_uses")
888
774
 
@@ -890,10 +776,7 @@ class AuthBackendRole(pulumi.CustomResource):
890
776
  @pulumi.getter(name="tokenPeriod")
891
777
  def token_period(self) -> pulumi.Output[Optional[int]]:
892
778
  """
893
- If set, indicates that the
894
- token generated using this role should never expire. The token should be renewed within the
895
- duration specified by this value. At each renewal, the token's TTL will be set to the
896
- value of this field. Specified in seconds.
779
+ Generated Token's Period
897
780
  """
898
781
  return pulumi.get(self, "token_period")
899
782
 
@@ -901,8 +784,7 @@ class AuthBackendRole(pulumi.CustomResource):
901
784
  @pulumi.getter(name="tokenPolicies")
902
785
  def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
903
786
  """
904
- List of policies to encode onto generated tokens. Depending
905
- on the auth method, this list may be supplemented by user/group/other values.
787
+ Generated Token's Policies
906
788
  """
907
789
  return pulumi.get(self, "token_policies")
908
790
 
@@ -910,8 +792,7 @@ class AuthBackendRole(pulumi.CustomResource):
910
792
  @pulumi.getter(name="tokenTtl")
911
793
  def token_ttl(self) -> pulumi.Output[Optional[int]]:
912
794
  """
913
- The incremental lifetime for generated tokens in number of seconds.
914
- Its current value will be referenced at renewal time.
795
+ The initial ttl of the token to generate in seconds
915
796
  """
916
797
  return pulumi.get(self, "token_ttl")
917
798
 
@@ -919,11 +800,7 @@ class AuthBackendRole(pulumi.CustomResource):
919
800
  @pulumi.getter(name="tokenType")
920
801
  def token_type(self) -> pulumi.Output[Optional[str]]:
921
802
  """
922
- The type of token that should be generated. Can be `service`,
923
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
924
- `service` tokens). For token store roles, there are two additional possibilities:
925
- `default-service` and `default-batch` which specify the type to return unless the client
926
- requests a different type at generation time.
803
+ The type of token to generate, service or batch
927
804
  """
928
805
  return pulumi.get(self, "token_type")
929
806
 
@@ -299,7 +299,6 @@ class AuthBackendLogin(pulumi.CustomResource):
299
299
 
300
300
  ## Example Usage
301
301
 
302
- <!--Start PulumiCodeChooser -->
303
302
  ```python
304
303
  import pulumi
305
304
  import pulumi_vault as vault
@@ -321,7 +320,6 @@ class AuthBackendLogin(pulumi.CustomResource):
321
320
  role_id=example.role_id,
322
321
  secret_id=id.secret_id)
323
322
  ```
324
- <!--End PulumiCodeChooser -->
325
323
 
326
324
  :param str resource_name: The name of the resource.
327
325
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -347,7 +345,6 @@ class AuthBackendLogin(pulumi.CustomResource):
347
345
 
348
346
  ## Example Usage
349
347
 
350
- <!--Start PulumiCodeChooser -->
351
348
  ```python
352
349
  import pulumi
353
350
  import pulumi_vault as vault
@@ -369,7 +366,6 @@ class AuthBackendLogin(pulumi.CustomResource):
369
366
  role_id=example.role_id,
370
367
  secret_id=id.secret_id)
371
368
  ```
372
- <!--End PulumiCodeChooser -->
373
369
 
374
370
  :param str resource_name: The name of the resource.
375
371
  :param AuthBackendLoginArgs args: The arguments to use to populate this resource's properties.