pulumi-vault 6.1.0a1712233015__py3-none-any.whl → 6.1.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -20
- pulumi_vault/ad/secret_backend.py +2 -6
- pulumi_vault/ad/secret_library.py +2 -4
- pulumi_vault/ad/secret_role.py +0 -4
- pulumi_vault/alicloud/auth_backend_role.py +69 -192
- pulumi_vault/approle/auth_backend_login.py +0 -4
- pulumi_vault/approle/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
- pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
- pulumi_vault/audit.py +12 -20
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/aws/auth_backend_client.py +6 -10
- pulumi_vault/aws/auth_backend_config_identity.py +0 -4
- pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
- pulumi_vault/aws/auth_backend_login.py +0 -8
- pulumi_vault/aws/auth_backend_role.py +63 -186
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
- pulumi_vault/aws/auth_backend_sts_role.py +0 -4
- pulumi_vault/aws/secret_backend.py +63 -0
- pulumi_vault/aws/secret_backend_role.py +2 -4
- pulumi_vault/aws/secret_backend_static_role.py +2 -4
- pulumi_vault/azure/auth_backend_config.py +6 -10
- pulumi_vault/azure/auth_backend_role.py +63 -186
- pulumi_vault/azure/backend.py +16 -24
- pulumi_vault/azure/backend_role.py +14 -18
- pulumi_vault/azure/get_access_credentials.py +0 -4
- pulumi_vault/cert_auth_backend_role.py +75 -208
- pulumi_vault/consul/secret_backend.py +10 -18
- pulumi_vault/consul/secret_backend_role.py +2 -4
- pulumi_vault/database/_inputs.py +522 -784
- pulumi_vault/database/outputs.py +522 -784
- pulumi_vault/database/secret_backend_connection.py +2 -4
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +10 -8
- pulumi_vault/database/secrets_mount.py +4 -4
- pulumi_vault/egp_policy.py +4 -8
- pulumi_vault/gcp/auth_backend.py +0 -36
- pulumi_vault/gcp/auth_backend_role.py +63 -264
- pulumi_vault/gcp/get_auth_backend_role.py +0 -4
- pulumi_vault/gcp/secret_backend.py +4 -6
- pulumi_vault/gcp/secret_impersonated_account.py +12 -14
- pulumi_vault/gcp/secret_roleset.py +4 -6
- pulumi_vault/gcp/secret_static_account.py +14 -16
- pulumi_vault/generic/endpoint.py +4 -8
- pulumi_vault/generic/get_secret.py +40 -4
- pulumi_vault/get_auth_backend.py +0 -4
- pulumi_vault/get_auth_backends.py +0 -8
- pulumi_vault/get_namespace.py +0 -12
- pulumi_vault/get_namespaces.py +4 -12
- pulumi_vault/get_nomad_access_token.py +0 -4
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +0 -4
- pulumi_vault/github/auth_backend.py +0 -4
- pulumi_vault/github/team.py +2 -6
- pulumi_vault/github/user.py +2 -6
- pulumi_vault/identity/entity.py +6 -8
- pulumi_vault/identity/entity_alias.py +6 -8
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +0 -4
- pulumi_vault/identity/get_group.py +0 -4
- pulumi_vault/identity/get_oidc_client_creds.py +2 -4
- pulumi_vault/identity/get_oidc_openid_config.py +10 -6
- pulumi_vault/identity/get_oidc_public_keys.py +10 -6
- pulumi_vault/identity/group.py +38 -42
- pulumi_vault/identity/group_alias.py +2 -4
- pulumi_vault/identity/group_member_entity_ids.py +12 -16
- pulumi_vault/identity/group_member_group_ids.py +24 -20
- pulumi_vault/identity/group_policies.py +4 -8
- pulumi_vault/identity/mfa_duo.py +4 -8
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +4 -8
- pulumi_vault/identity/mfa_pingid.py +0 -4
- pulumi_vault/identity/mfa_totp.py +0 -4
- pulumi_vault/identity/oidc.py +0 -4
- pulumi_vault/identity/oidc_assignment.py +10 -6
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +16 -12
- pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
- pulumi_vault/identity/oidc_provider.py +22 -16
- pulumi_vault/identity/oidc_role.py +28 -20
- pulumi_vault/identity/oidc_scope.py +6 -8
- pulumi_vault/jwt/auth_backend.py +20 -32
- pulumi_vault/jwt/auth_backend_role.py +63 -190
- pulumi_vault/kmip/secret_backend.py +10 -14
- pulumi_vault/kmip/secret_role.py +0 -4
- pulumi_vault/kmip/secret_scope.py +0 -4
- pulumi_vault/kubernetes/auth_backend_config.py +0 -4
- pulumi_vault/kubernetes/auth_backend_role.py +56 -172
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +6 -8
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +0 -4
- pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
- pulumi_vault/kv/get_secret_v2.py +58 -0
- pulumi_vault/kv/get_secrets_list.py +4 -8
- pulumi_vault/kv/get_secrets_list_v2.py +14 -12
- pulumi_vault/kv/secret.py +0 -4
- pulumi_vault/kv/secret_backend_v2.py +0 -4
- pulumi_vault/kv/secret_v2.py +2 -4
- pulumi_vault/ldap/auth_backend.py +66 -161
- pulumi_vault/ldap/auth_backend_group.py +0 -4
- pulumi_vault/ldap/auth_backend_user.py +0 -4
- pulumi_vault/ldap/secret_backend.py +4 -8
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
- pulumi_vault/ldap/secret_backend_library_set.py +2 -4
- pulumi_vault/ldap/secret_backend_static_role.py +0 -4
- pulumi_vault/managed/_inputs.py +84 -132
- pulumi_vault/managed/keys.py +7 -28
- pulumi_vault/managed/outputs.py +84 -132
- pulumi_vault/mfa_duo.py +4 -6
- pulumi_vault/mfa_okta.py +4 -6
- pulumi_vault/mfa_pingid.py +4 -6
- pulumi_vault/mfa_totp.py +10 -12
- pulumi_vault/mongodbatlas/secret_backend.py +0 -4
- pulumi_vault/mongodbatlas/secret_role.py +2 -4
- pulumi_vault/mount.py +26 -42
- pulumi_vault/nomad_secret_backend.py +4 -8
- pulumi_vault/nomad_secret_role.py +0 -4
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +6 -10
- pulumi_vault/okta/auth_backend_group.py +0 -4
- pulumi_vault/okta/auth_backend_user.py +0 -4
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +0 -20
- pulumi_vault/password_policy.py +6 -8
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
- pulumi_vault/pkisecret/get_backend_key.py +2 -6
- pulumi_vault/pkisecret/get_backend_keys.py +0 -4
- pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
- pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
- pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/secret_backend_role.py +2 -4
- pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
- pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
- pulumi_vault/provider.py +0 -8
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +6 -8
- pulumi_vault/quota_rate_limit.py +2 -4
- pulumi_vault/rabbitmq/secret_backend.py +4 -8
- pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
- pulumi_vault/raft_autopilot.py +0 -4
- pulumi_vault/raft_snapshot_agent_config.py +109 -304
- pulumi_vault/rgp_policy.py +2 -6
- pulumi_vault/saml/auth_backend.py +8 -12
- pulumi_vault/saml/auth_backend_role.py +64 -178
- pulumi_vault/secrets/sync_association.py +12 -10
- pulumi_vault/secrets/sync_aws_destination.py +6 -8
- pulumi_vault/secrets/sync_azure_destination.py +10 -12
- pulumi_vault/secrets/sync_config.py +2 -6
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +6 -8
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +6 -8
- pulumi_vault/ssh/_inputs.py +6 -32
- pulumi_vault/ssh/outputs.py +6 -32
- pulumi_vault/ssh/secret_backend_ca.py +0 -4
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +0 -56
- pulumi_vault/terraformcloud/secret_creds.py +2 -17
- pulumi_vault/terraformcloud/secret_role.py +2 -69
- pulumi_vault/token.py +14 -18
- pulumi_vault/tokenauth/auth_backend_role.py +64 -180
- pulumi_vault/transform/alphabet.py +4 -6
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +4 -6
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +4 -20
- pulumi_vault/transit/get_encrypt.py +0 -14
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +0 -4
- {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1.dist-info}/METADATA +1 -1
- pulumi_vault-6.1.1.dist-info/RECORD +252 -0
- pulumi_vault-6.1.0a1712233015.dist-info/RECORD +0 -252
- {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1.dist-info}/top_level.txt +0 -0
@@ -89,32 +89,15 @@ class AuthBackendRoleArgs:
|
|
89
89
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] oidc_scopes: If set, a list of OIDC scopes to be used with an OIDC role.
|
90
90
|
The standard scope "openid" is automatically included and need not be specified.
|
91
91
|
:param pulumi.Input[str] role_type: Type of role, either "oidc" (default) or "jwt".
|
92
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
93
|
-
|
94
|
-
|
95
|
-
:param pulumi.Input[
|
96
|
-
|
97
|
-
|
98
|
-
|
99
|
-
:param pulumi.Input[int]
|
100
|
-
|
101
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
102
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
103
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/jwt#token_num_uses)
|
104
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
105
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
106
|
-
token generated using this role should never expire. The token should be renewed within the
|
107
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
108
|
-
value of this field. Specified in seconds.
|
109
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
110
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
111
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
112
|
-
Its current value will be referenced at renewal time.
|
113
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
114
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
115
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
116
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
117
|
-
requests a different type at generation time.
|
92
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
93
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
94
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
95
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
96
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
97
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
98
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
99
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
100
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
118
101
|
:param pulumi.Input[bool] user_claim_json_pointer: Specifies if the `user_claim` value uses
|
119
102
|
[JSON pointer](https://www.vaultproject.io/docs/auth/jwt#claim-specifications-and-json-pointer)
|
120
103
|
syntax for referencing claims. By default, the `user_claim` value will not use JSON pointer.
|
@@ -426,9 +409,7 @@ class AuthBackendRoleArgs:
|
|
426
409
|
@pulumi.getter(name="tokenBoundCidrs")
|
427
410
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
428
411
|
"""
|
429
|
-
|
430
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
431
|
-
as well.
|
412
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
432
413
|
"""
|
433
414
|
return pulumi.get(self, "token_bound_cidrs")
|
434
415
|
|
@@ -440,10 +421,7 @@ class AuthBackendRoleArgs:
|
|
440
421
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
441
422
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
442
423
|
"""
|
443
|
-
|
444
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
445
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
446
|
-
`token_max_ttl` would otherwise allow a renewal.
|
424
|
+
Generated Token's Explicit Maximum TTL in seconds
|
447
425
|
"""
|
448
426
|
return pulumi.get(self, "token_explicit_max_ttl")
|
449
427
|
|
@@ -455,8 +433,7 @@ class AuthBackendRoleArgs:
|
|
455
433
|
@pulumi.getter(name="tokenMaxTtl")
|
456
434
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
457
435
|
"""
|
458
|
-
The maximum lifetime
|
459
|
-
Its current value will be referenced at renewal time.
|
436
|
+
The maximum lifetime of the generated token
|
460
437
|
"""
|
461
438
|
return pulumi.get(self, "token_max_ttl")
|
462
439
|
|
@@ -468,8 +445,7 @@ class AuthBackendRoleArgs:
|
|
468
445
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
469
446
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
470
447
|
"""
|
471
|
-
If
|
472
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
448
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
473
449
|
"""
|
474
450
|
return pulumi.get(self, "token_no_default_policy")
|
475
451
|
|
@@ -481,8 +457,7 @@ class AuthBackendRoleArgs:
|
|
481
457
|
@pulumi.getter(name="tokenNumUses")
|
482
458
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
483
459
|
"""
|
484
|
-
The
|
485
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
460
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
486
461
|
"""
|
487
462
|
return pulumi.get(self, "token_num_uses")
|
488
463
|
|
@@ -494,10 +469,7 @@ class AuthBackendRoleArgs:
|
|
494
469
|
@pulumi.getter(name="tokenPeriod")
|
495
470
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
496
471
|
"""
|
497
|
-
|
498
|
-
token generated using this role should never expire. The token should be renewed within the
|
499
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
500
|
-
value of this field. Specified in seconds.
|
472
|
+
Generated Token's Period
|
501
473
|
"""
|
502
474
|
return pulumi.get(self, "token_period")
|
503
475
|
|
@@ -509,8 +481,7 @@ class AuthBackendRoleArgs:
|
|
509
481
|
@pulumi.getter(name="tokenPolicies")
|
510
482
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
511
483
|
"""
|
512
|
-
|
513
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
484
|
+
Generated Token's Policies
|
514
485
|
"""
|
515
486
|
return pulumi.get(self, "token_policies")
|
516
487
|
|
@@ -522,8 +493,7 @@ class AuthBackendRoleArgs:
|
|
522
493
|
@pulumi.getter(name="tokenTtl")
|
523
494
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
524
495
|
"""
|
525
|
-
The
|
526
|
-
Its current value will be referenced at renewal time.
|
496
|
+
The initial ttl of the token to generate in seconds
|
527
497
|
"""
|
528
498
|
return pulumi.get(self, "token_ttl")
|
529
499
|
|
@@ -535,11 +505,7 @@ class AuthBackendRoleArgs:
|
|
535
505
|
@pulumi.getter(name="tokenType")
|
536
506
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
537
507
|
"""
|
538
|
-
The type of token
|
539
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
540
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
541
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
542
|
-
requests a different type at generation time.
|
508
|
+
The type of token to generate, service or batch
|
543
509
|
"""
|
544
510
|
return pulumi.get(self, "token_type")
|
545
511
|
|
@@ -652,32 +618,15 @@ class _AuthBackendRoleState:
|
|
652
618
|
The standard scope "openid" is automatically included and need not be specified.
|
653
619
|
:param pulumi.Input[str] role_name: The name of the role.
|
654
620
|
:param pulumi.Input[str] role_type: Type of role, either "oidc" (default) or "jwt".
|
655
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
656
|
-
|
657
|
-
|
658
|
-
:param pulumi.Input[
|
659
|
-
|
660
|
-
|
661
|
-
|
662
|
-
:param pulumi.Input[int]
|
663
|
-
|
664
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
665
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
666
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/jwt#token_num_uses)
|
667
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
668
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
669
|
-
token generated using this role should never expire. The token should be renewed within the
|
670
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
671
|
-
value of this field. Specified in seconds.
|
672
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
673
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
674
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
675
|
-
Its current value will be referenced at renewal time.
|
676
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
677
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
678
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
679
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
680
|
-
requests a different type at generation time.
|
621
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
622
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
623
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
624
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
625
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
626
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
627
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
628
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
629
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
681
630
|
:param pulumi.Input[str] user_claim: The claim to use to uniquely identify
|
682
631
|
the user; this will be used as the name for the Identity entity alias created
|
683
632
|
due to a successful login.
|
@@ -980,9 +929,7 @@ class _AuthBackendRoleState:
|
|
980
929
|
@pulumi.getter(name="tokenBoundCidrs")
|
981
930
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
982
931
|
"""
|
983
|
-
|
984
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
985
|
-
as well.
|
932
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
986
933
|
"""
|
987
934
|
return pulumi.get(self, "token_bound_cidrs")
|
988
935
|
|
@@ -994,10 +941,7 @@ class _AuthBackendRoleState:
|
|
994
941
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
995
942
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
996
943
|
"""
|
997
|
-
|
998
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
999
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1000
|
-
`token_max_ttl` would otherwise allow a renewal.
|
944
|
+
Generated Token's Explicit Maximum TTL in seconds
|
1001
945
|
"""
|
1002
946
|
return pulumi.get(self, "token_explicit_max_ttl")
|
1003
947
|
|
@@ -1009,8 +953,7 @@ class _AuthBackendRoleState:
|
|
1009
953
|
@pulumi.getter(name="tokenMaxTtl")
|
1010
954
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
1011
955
|
"""
|
1012
|
-
The maximum lifetime
|
1013
|
-
Its current value will be referenced at renewal time.
|
956
|
+
The maximum lifetime of the generated token
|
1014
957
|
"""
|
1015
958
|
return pulumi.get(self, "token_max_ttl")
|
1016
959
|
|
@@ -1022,8 +965,7 @@ class _AuthBackendRoleState:
|
|
1022
965
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
1023
966
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
1024
967
|
"""
|
1025
|
-
If
|
1026
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
968
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
1027
969
|
"""
|
1028
970
|
return pulumi.get(self, "token_no_default_policy")
|
1029
971
|
|
@@ -1035,8 +977,7 @@ class _AuthBackendRoleState:
|
|
1035
977
|
@pulumi.getter(name="tokenNumUses")
|
1036
978
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
1037
979
|
"""
|
1038
|
-
The
|
1039
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
980
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
1040
981
|
"""
|
1041
982
|
return pulumi.get(self, "token_num_uses")
|
1042
983
|
|
@@ -1048,10 +989,7 @@ class _AuthBackendRoleState:
|
|
1048
989
|
@pulumi.getter(name="tokenPeriod")
|
1049
990
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
1050
991
|
"""
|
1051
|
-
|
1052
|
-
token generated using this role should never expire. The token should be renewed within the
|
1053
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1054
|
-
value of this field. Specified in seconds.
|
992
|
+
Generated Token's Period
|
1055
993
|
"""
|
1056
994
|
return pulumi.get(self, "token_period")
|
1057
995
|
|
@@ -1063,8 +1001,7 @@ class _AuthBackendRoleState:
|
|
1063
1001
|
@pulumi.getter(name="tokenPolicies")
|
1064
1002
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
1065
1003
|
"""
|
1066
|
-
|
1067
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
1004
|
+
Generated Token's Policies
|
1068
1005
|
"""
|
1069
1006
|
return pulumi.get(self, "token_policies")
|
1070
1007
|
|
@@ -1076,8 +1013,7 @@ class _AuthBackendRoleState:
|
|
1076
1013
|
@pulumi.getter(name="tokenTtl")
|
1077
1014
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
1078
1015
|
"""
|
1079
|
-
The
|
1080
|
-
Its current value will be referenced at renewal time.
|
1016
|
+
The initial ttl of the token to generate in seconds
|
1081
1017
|
"""
|
1082
1018
|
return pulumi.get(self, "token_ttl")
|
1083
1019
|
|
@@ -1089,11 +1025,7 @@ class _AuthBackendRoleState:
|
|
1089
1025
|
@pulumi.getter(name="tokenType")
|
1090
1026
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
1091
1027
|
"""
|
1092
|
-
The type of token
|
1093
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1094
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
1095
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
1096
|
-
requests a different type at generation time.
|
1028
|
+
The type of token to generate, service or batch
|
1097
1029
|
"""
|
1098
1030
|
return pulumi.get(self, "token_type")
|
1099
1031
|
|
@@ -1189,7 +1121,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1189
1121
|
|
1190
1122
|
Role for JWT backend:
|
1191
1123
|
|
1192
|
-
<!--Start PulumiCodeChooser -->
|
1193
1124
|
```python
|
1194
1125
|
import pulumi
|
1195
1126
|
import pulumi_vault as vault
|
@@ -1210,11 +1141,9 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1210
1141
|
user_claim="https://vault/user",
|
1211
1142
|
role_type="jwt")
|
1212
1143
|
```
|
1213
|
-
<!--End PulumiCodeChooser -->
|
1214
1144
|
|
1215
1145
|
Role for OIDC backend:
|
1216
1146
|
|
1217
|
-
<!--Start PulumiCodeChooser -->
|
1218
1147
|
```python
|
1219
1148
|
import pulumi
|
1220
1149
|
import pulumi_vault as vault
|
@@ -1234,7 +1163,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1234
1163
|
role_type="oidc",
|
1235
1164
|
allowed_redirect_uris=["http://localhost:8200/ui/vault/auth/oidc/oidc/callback"])
|
1236
1165
|
```
|
1237
|
-
<!--End PulumiCodeChooser -->
|
1238
1166
|
|
1239
1167
|
## Import
|
1240
1168
|
|
@@ -1287,32 +1215,15 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1287
1215
|
The standard scope "openid" is automatically included and need not be specified.
|
1288
1216
|
:param pulumi.Input[str] role_name: The name of the role.
|
1289
1217
|
:param pulumi.Input[str] role_type: Type of role, either "oidc" (default) or "jwt".
|
1290
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
1291
|
-
|
1292
|
-
|
1293
|
-
:param pulumi.Input[
|
1294
|
-
|
1295
|
-
|
1296
|
-
|
1297
|
-
:param pulumi.Input[int]
|
1298
|
-
|
1299
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
1300
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1301
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/jwt#token_num_uses)
|
1302
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1303
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
1304
|
-
token generated using this role should never expire. The token should be renewed within the
|
1305
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1306
|
-
value of this field. Specified in seconds.
|
1307
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
1308
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
1309
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
1310
|
-
Its current value will be referenced at renewal time.
|
1311
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
1312
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1313
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
1314
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
1315
|
-
requests a different type at generation time.
|
1218
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
1219
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
1220
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
1221
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
1222
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
1223
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
1224
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
1225
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
1226
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
1316
1227
|
:param pulumi.Input[str] user_claim: The claim to use to uniquely identify
|
1317
1228
|
the user; this will be used as the name for the Identity entity alias created
|
1318
1229
|
due to a successful login.
|
@@ -1339,7 +1250,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1339
1250
|
|
1340
1251
|
Role for JWT backend:
|
1341
1252
|
|
1342
|
-
<!--Start PulumiCodeChooser -->
|
1343
1253
|
```python
|
1344
1254
|
import pulumi
|
1345
1255
|
import pulumi_vault as vault
|
@@ -1360,11 +1270,9 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1360
1270
|
user_claim="https://vault/user",
|
1361
1271
|
role_type="jwt")
|
1362
1272
|
```
|
1363
|
-
<!--End PulumiCodeChooser -->
|
1364
1273
|
|
1365
1274
|
Role for OIDC backend:
|
1366
1275
|
|
1367
|
-
<!--Start PulumiCodeChooser -->
|
1368
1276
|
```python
|
1369
1277
|
import pulumi
|
1370
1278
|
import pulumi_vault as vault
|
@@ -1384,7 +1292,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1384
1292
|
role_type="oidc",
|
1385
1293
|
allowed_redirect_uris=["http://localhost:8200/ui/vault/auth/oidc/oidc/callback"])
|
1386
1294
|
```
|
1387
|
-
<!--End PulumiCodeChooser -->
|
1388
1295
|
|
1389
1296
|
## Import
|
1390
1297
|
|
@@ -1567,32 +1474,15 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1567
1474
|
The standard scope "openid" is automatically included and need not be specified.
|
1568
1475
|
:param pulumi.Input[str] role_name: The name of the role.
|
1569
1476
|
:param pulumi.Input[str] role_type: Type of role, either "oidc" (default) or "jwt".
|
1570
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
1571
|
-
|
1572
|
-
|
1573
|
-
:param pulumi.Input[
|
1574
|
-
|
1575
|
-
|
1576
|
-
|
1577
|
-
:param pulumi.Input[int]
|
1578
|
-
|
1579
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
1580
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1581
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/jwt#token_num_uses)
|
1582
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1583
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
1584
|
-
token generated using this role should never expire. The token should be renewed within the
|
1585
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1586
|
-
value of this field. Specified in seconds.
|
1587
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
1588
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
1589
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
1590
|
-
Its current value will be referenced at renewal time.
|
1591
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
1592
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1593
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
1594
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
1595
|
-
requests a different type at generation time.
|
1477
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
1478
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
1479
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
1480
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
1481
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
1482
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
1483
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
1484
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
1485
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
1596
1486
|
:param pulumi.Input[str] user_claim: The claim to use to uniquely identify
|
1597
1487
|
the user; this will be used as the name for the Identity entity alias created
|
1598
1488
|
due to a successful login.
|
@@ -1803,9 +1693,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1803
1693
|
@pulumi.getter(name="tokenBoundCidrs")
|
1804
1694
|
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1805
1695
|
"""
|
1806
|
-
|
1807
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
1808
|
-
as well.
|
1696
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
1809
1697
|
"""
|
1810
1698
|
return pulumi.get(self, "token_bound_cidrs")
|
1811
1699
|
|
@@ -1813,10 +1701,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1813
1701
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
1814
1702
|
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1815
1703
|
"""
|
1816
|
-
|
1817
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
1818
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1819
|
-
`token_max_ttl` would otherwise allow a renewal.
|
1704
|
+
Generated Token's Explicit Maximum TTL in seconds
|
1820
1705
|
"""
|
1821
1706
|
return pulumi.get(self, "token_explicit_max_ttl")
|
1822
1707
|
|
@@ -1824,8 +1709,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1824
1709
|
@pulumi.getter(name="tokenMaxTtl")
|
1825
1710
|
def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1826
1711
|
"""
|
1827
|
-
The maximum lifetime
|
1828
|
-
Its current value will be referenced at renewal time.
|
1712
|
+
The maximum lifetime of the generated token
|
1829
1713
|
"""
|
1830
1714
|
return pulumi.get(self, "token_max_ttl")
|
1831
1715
|
|
@@ -1833,8 +1717,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1833
1717
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
1834
1718
|
def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
|
1835
1719
|
"""
|
1836
|
-
If
|
1837
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1720
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
1838
1721
|
"""
|
1839
1722
|
return pulumi.get(self, "token_no_default_policy")
|
1840
1723
|
|
@@ -1842,8 +1725,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1842
1725
|
@pulumi.getter(name="tokenNumUses")
|
1843
1726
|
def token_num_uses(self) -> pulumi.Output[Optional[int]]:
|
1844
1727
|
"""
|
1845
|
-
The
|
1846
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1728
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
1847
1729
|
"""
|
1848
1730
|
return pulumi.get(self, "token_num_uses")
|
1849
1731
|
|
@@ -1851,10 +1733,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1851
1733
|
@pulumi.getter(name="tokenPeriod")
|
1852
1734
|
def token_period(self) -> pulumi.Output[Optional[int]]:
|
1853
1735
|
"""
|
1854
|
-
|
1855
|
-
token generated using this role should never expire. The token should be renewed within the
|
1856
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1857
|
-
value of this field. Specified in seconds.
|
1736
|
+
Generated Token's Period
|
1858
1737
|
"""
|
1859
1738
|
return pulumi.get(self, "token_period")
|
1860
1739
|
|
@@ -1862,8 +1741,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1862
1741
|
@pulumi.getter(name="tokenPolicies")
|
1863
1742
|
def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1864
1743
|
"""
|
1865
|
-
|
1866
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
1744
|
+
Generated Token's Policies
|
1867
1745
|
"""
|
1868
1746
|
return pulumi.get(self, "token_policies")
|
1869
1747
|
|
@@ -1871,8 +1749,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1871
1749
|
@pulumi.getter(name="tokenTtl")
|
1872
1750
|
def token_ttl(self) -> pulumi.Output[Optional[int]]:
|
1873
1751
|
"""
|
1874
|
-
The
|
1875
|
-
Its current value will be referenced at renewal time.
|
1752
|
+
The initial ttl of the token to generate in seconds
|
1876
1753
|
"""
|
1877
1754
|
return pulumi.get(self, "token_ttl")
|
1878
1755
|
|
@@ -1880,11 +1757,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1880
1757
|
@pulumi.getter(name="tokenType")
|
1881
1758
|
def token_type(self) -> pulumi.Output[Optional[str]]:
|
1882
1759
|
"""
|
1883
|
-
The type of token
|
1884
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1885
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
1886
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
1887
|
-
requests a different type at generation time.
|
1760
|
+
The type of token to generate, service or batch
|
1888
1761
|
"""
|
1889
1762
|
return pulumi.get(self, "token_type")
|
1890
1763
|
|
@@ -488,25 +488,23 @@ class SecretBackend(pulumi.CustomResource):
|
|
488
488
|
|
489
489
|
## Example Usage
|
490
490
|
|
491
|
-
<!--Start PulumiCodeChooser -->
|
492
491
|
```python
|
493
492
|
import pulumi
|
494
493
|
import pulumi_vault as vault
|
495
494
|
|
496
495
|
default = vault.kmip.SecretBackend("default",
|
497
|
-
|
498
|
-
default_tls_client_key_type="rsa",
|
499
|
-
default_tls_client_ttl=86400,
|
496
|
+
path="kmip",
|
500
497
|
description="Vault KMIP backend",
|
501
498
|
listen_addrs=[
|
502
499
|
"127.0.0.1:5696",
|
503
500
|
"127.0.0.1:8080",
|
504
501
|
],
|
505
|
-
|
502
|
+
tls_ca_key_type="rsa",
|
506
503
|
tls_ca_key_bits=4096,
|
507
|
-
|
504
|
+
default_tls_client_key_type="rsa",
|
505
|
+
default_tls_client_key_bits=4096,
|
506
|
+
default_tls_client_ttl=86400)
|
508
507
|
```
|
509
|
-
<!--End PulumiCodeChooser -->
|
510
508
|
|
511
509
|
## Import
|
512
510
|
|
@@ -550,25 +548,23 @@ class SecretBackend(pulumi.CustomResource):
|
|
550
548
|
|
551
549
|
## Example Usage
|
552
550
|
|
553
|
-
<!--Start PulumiCodeChooser -->
|
554
551
|
```python
|
555
552
|
import pulumi
|
556
553
|
import pulumi_vault as vault
|
557
554
|
|
558
555
|
default = vault.kmip.SecretBackend("default",
|
559
|
-
|
560
|
-
default_tls_client_key_type="rsa",
|
561
|
-
default_tls_client_ttl=86400,
|
556
|
+
path="kmip",
|
562
557
|
description="Vault KMIP backend",
|
563
558
|
listen_addrs=[
|
564
559
|
"127.0.0.1:5696",
|
565
560
|
"127.0.0.1:8080",
|
566
561
|
],
|
567
|
-
|
562
|
+
tls_ca_key_type="rsa",
|
568
563
|
tls_ca_key_bits=4096,
|
569
|
-
|
564
|
+
default_tls_client_key_type="rsa",
|
565
|
+
default_tls_client_key_bits=4096,
|
566
|
+
default_tls_client_ttl=86400)
|
570
567
|
```
|
571
|
-
<!--End PulumiCodeChooser -->
|
572
568
|
|
573
569
|
## Import
|
574
570
|
|
pulumi_vault/kmip/secret_role.py
CHANGED
@@ -746,7 +746,6 @@ class SecretRole(pulumi.CustomResource):
|
|
746
746
|
|
747
747
|
## Example Usage
|
748
748
|
|
749
|
-
<!--Start PulumiCodeChooser -->
|
750
749
|
```python
|
751
750
|
import pulumi
|
752
751
|
import pulumi_vault as vault
|
@@ -770,7 +769,6 @@ class SecretRole(pulumi.CustomResource):
|
|
770
769
|
operation_create=True,
|
771
770
|
operation_destroy=True)
|
772
771
|
```
|
773
|
-
<!--End PulumiCodeChooser -->
|
774
772
|
|
775
773
|
## Import
|
776
774
|
|
@@ -821,7 +819,6 @@ class SecretRole(pulumi.CustomResource):
|
|
821
819
|
|
822
820
|
## Example Usage
|
823
821
|
|
824
|
-
<!--Start PulumiCodeChooser -->
|
825
822
|
```python
|
826
823
|
import pulumi
|
827
824
|
import pulumi_vault as vault
|
@@ -845,7 +842,6 @@ class SecretRole(pulumi.CustomResource):
|
|
845
842
|
operation_create=True,
|
846
843
|
operation_destroy=True)
|
847
844
|
```
|
848
|
-
<!--End PulumiCodeChooser -->
|
849
845
|
|
850
846
|
## Import
|
851
847
|
|
@@ -186,7 +186,6 @@ class SecretScope(pulumi.CustomResource):
|
|
186
186
|
|
187
187
|
## Example Usage
|
188
188
|
|
189
|
-
<!--Start PulumiCodeChooser -->
|
190
189
|
```python
|
191
190
|
import pulumi
|
192
191
|
import pulumi_vault as vault
|
@@ -199,7 +198,6 @@ class SecretScope(pulumi.CustomResource):
|
|
199
198
|
scope="dev",
|
200
199
|
force=True)
|
201
200
|
```
|
202
|
-
<!--End PulumiCodeChooser -->
|
203
201
|
|
204
202
|
## Import
|
205
203
|
|
@@ -233,7 +231,6 @@ class SecretScope(pulumi.CustomResource):
|
|
233
231
|
|
234
232
|
## Example Usage
|
235
233
|
|
236
|
-
<!--Start PulumiCodeChooser -->
|
237
234
|
```python
|
238
235
|
import pulumi
|
239
236
|
import pulumi_vault as vault
|
@@ -246,7 +243,6 @@ class SecretScope(pulumi.CustomResource):
|
|
246
243
|
scope="dev",
|
247
244
|
force=True)
|
248
245
|
```
|
249
|
-
<!--End PulumiCodeChooser -->
|
250
246
|
|
251
247
|
## Import
|
252
248
|
|