pulumi-vault 6.1.0a1712233015__py3-none-any.whl → 6.1.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (184) hide show
  1. pulumi_vault/_inputs.py +0 -20
  2. pulumi_vault/ad/secret_backend.py +2 -6
  3. pulumi_vault/ad/secret_library.py +2 -4
  4. pulumi_vault/ad/secret_role.py +0 -4
  5. pulumi_vault/alicloud/auth_backend_role.py +69 -192
  6. pulumi_vault/approle/auth_backend_login.py +0 -4
  7. pulumi_vault/approle/auth_backend_role.py +63 -186
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
  9. pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
  10. pulumi_vault/audit.py +12 -20
  11. pulumi_vault/audit_request_header.py +6 -6
  12. pulumi_vault/aws/auth_backend_client.py +6 -10
  13. pulumi_vault/aws/auth_backend_config_identity.py +0 -4
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
  15. pulumi_vault/aws/auth_backend_login.py +0 -8
  16. pulumi_vault/aws/auth_backend_role.py +63 -186
  17. pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
  18. pulumi_vault/aws/auth_backend_sts_role.py +0 -4
  19. pulumi_vault/aws/secret_backend.py +63 -0
  20. pulumi_vault/aws/secret_backend_role.py +2 -4
  21. pulumi_vault/aws/secret_backend_static_role.py +2 -4
  22. pulumi_vault/azure/auth_backend_config.py +6 -10
  23. pulumi_vault/azure/auth_backend_role.py +63 -186
  24. pulumi_vault/azure/backend.py +16 -24
  25. pulumi_vault/azure/backend_role.py +14 -18
  26. pulumi_vault/azure/get_access_credentials.py +0 -4
  27. pulumi_vault/cert_auth_backend_role.py +75 -208
  28. pulumi_vault/consul/secret_backend.py +10 -18
  29. pulumi_vault/consul/secret_backend_role.py +2 -4
  30. pulumi_vault/database/_inputs.py +522 -784
  31. pulumi_vault/database/outputs.py +522 -784
  32. pulumi_vault/database/secret_backend_connection.py +2 -4
  33. pulumi_vault/database/secret_backend_role.py +4 -4
  34. pulumi_vault/database/secret_backend_static_role.py +10 -8
  35. pulumi_vault/database/secrets_mount.py +4 -4
  36. pulumi_vault/egp_policy.py +4 -8
  37. pulumi_vault/gcp/auth_backend.py +0 -36
  38. pulumi_vault/gcp/auth_backend_role.py +63 -264
  39. pulumi_vault/gcp/get_auth_backend_role.py +0 -4
  40. pulumi_vault/gcp/secret_backend.py +4 -6
  41. pulumi_vault/gcp/secret_impersonated_account.py +12 -14
  42. pulumi_vault/gcp/secret_roleset.py +4 -6
  43. pulumi_vault/gcp/secret_static_account.py +14 -16
  44. pulumi_vault/generic/endpoint.py +4 -8
  45. pulumi_vault/generic/get_secret.py +40 -4
  46. pulumi_vault/get_auth_backend.py +0 -4
  47. pulumi_vault/get_auth_backends.py +0 -8
  48. pulumi_vault/get_namespace.py +0 -12
  49. pulumi_vault/get_namespaces.py +4 -12
  50. pulumi_vault/get_nomad_access_token.py +0 -4
  51. pulumi_vault/get_policy_document.py +8 -8
  52. pulumi_vault/get_raft_autopilot_state.py +0 -4
  53. pulumi_vault/github/auth_backend.py +0 -4
  54. pulumi_vault/github/team.py +2 -6
  55. pulumi_vault/github/user.py +2 -6
  56. pulumi_vault/identity/entity.py +6 -8
  57. pulumi_vault/identity/entity_alias.py +6 -8
  58. pulumi_vault/identity/entity_policies.py +12 -12
  59. pulumi_vault/identity/get_entity.py +0 -4
  60. pulumi_vault/identity/get_group.py +0 -4
  61. pulumi_vault/identity/get_oidc_client_creds.py +2 -4
  62. pulumi_vault/identity/get_oidc_openid_config.py +10 -6
  63. pulumi_vault/identity/get_oidc_public_keys.py +10 -6
  64. pulumi_vault/identity/group.py +38 -42
  65. pulumi_vault/identity/group_alias.py +2 -4
  66. pulumi_vault/identity/group_member_entity_ids.py +12 -16
  67. pulumi_vault/identity/group_member_group_ids.py +24 -20
  68. pulumi_vault/identity/group_policies.py +4 -8
  69. pulumi_vault/identity/mfa_duo.py +4 -8
  70. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  71. pulumi_vault/identity/mfa_okta.py +4 -8
  72. pulumi_vault/identity/mfa_pingid.py +0 -4
  73. pulumi_vault/identity/mfa_totp.py +0 -4
  74. pulumi_vault/identity/oidc.py +0 -4
  75. pulumi_vault/identity/oidc_assignment.py +10 -6
  76. pulumi_vault/identity/oidc_client.py +10 -10
  77. pulumi_vault/identity/oidc_key.py +16 -12
  78. pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
  79. pulumi_vault/identity/oidc_provider.py +22 -16
  80. pulumi_vault/identity/oidc_role.py +28 -20
  81. pulumi_vault/identity/oidc_scope.py +6 -8
  82. pulumi_vault/jwt/auth_backend.py +20 -32
  83. pulumi_vault/jwt/auth_backend_role.py +63 -190
  84. pulumi_vault/kmip/secret_backend.py +10 -14
  85. pulumi_vault/kmip/secret_role.py +0 -4
  86. pulumi_vault/kmip/secret_scope.py +0 -4
  87. pulumi_vault/kubernetes/auth_backend_config.py +0 -4
  88. pulumi_vault/kubernetes/auth_backend_role.py +56 -172
  89. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  90. pulumi_vault/kubernetes/secret_backend.py +6 -8
  91. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  92. pulumi_vault/kv/get_secret.py +0 -4
  93. pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
  94. pulumi_vault/kv/get_secret_v2.py +58 -0
  95. pulumi_vault/kv/get_secrets_list.py +4 -8
  96. pulumi_vault/kv/get_secrets_list_v2.py +14 -12
  97. pulumi_vault/kv/secret.py +0 -4
  98. pulumi_vault/kv/secret_backend_v2.py +0 -4
  99. pulumi_vault/kv/secret_v2.py +2 -4
  100. pulumi_vault/ldap/auth_backend.py +66 -161
  101. pulumi_vault/ldap/auth_backend_group.py +0 -4
  102. pulumi_vault/ldap/auth_backend_user.py +0 -4
  103. pulumi_vault/ldap/secret_backend.py +4 -8
  104. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
  105. pulumi_vault/ldap/secret_backend_library_set.py +2 -4
  106. pulumi_vault/ldap/secret_backend_static_role.py +0 -4
  107. pulumi_vault/managed/_inputs.py +84 -132
  108. pulumi_vault/managed/keys.py +7 -28
  109. pulumi_vault/managed/outputs.py +84 -132
  110. pulumi_vault/mfa_duo.py +4 -6
  111. pulumi_vault/mfa_okta.py +4 -6
  112. pulumi_vault/mfa_pingid.py +4 -6
  113. pulumi_vault/mfa_totp.py +10 -12
  114. pulumi_vault/mongodbatlas/secret_backend.py +0 -4
  115. pulumi_vault/mongodbatlas/secret_role.py +2 -4
  116. pulumi_vault/mount.py +26 -42
  117. pulumi_vault/nomad_secret_backend.py +4 -8
  118. pulumi_vault/nomad_secret_role.py +0 -4
  119. pulumi_vault/okta/_inputs.py +8 -8
  120. pulumi_vault/okta/auth_backend.py +6 -10
  121. pulumi_vault/okta/auth_backend_group.py +0 -4
  122. pulumi_vault/okta/auth_backend_user.py +0 -4
  123. pulumi_vault/okta/outputs.py +8 -8
  124. pulumi_vault/outputs.py +0 -20
  125. pulumi_vault/password_policy.py +6 -8
  126. pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
  127. pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
  128. pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
  129. pulumi_vault/pkisecret/get_backend_key.py +2 -6
  130. pulumi_vault/pkisecret/get_backend_keys.py +0 -4
  131. pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
  132. pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
  133. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
  134. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
  135. pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
  136. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
  137. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
  138. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
  139. pulumi_vault/pkisecret/secret_backend_role.py +2 -4
  140. pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
  141. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
  142. pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
  143. pulumi_vault/provider.py +0 -8
  144. pulumi_vault/pulumi-plugin.json +2 -1
  145. pulumi_vault/quota_lease_count.py +6 -8
  146. pulumi_vault/quota_rate_limit.py +2 -4
  147. pulumi_vault/rabbitmq/secret_backend.py +4 -8
  148. pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
  149. pulumi_vault/raft_autopilot.py +0 -4
  150. pulumi_vault/raft_snapshot_agent_config.py +109 -304
  151. pulumi_vault/rgp_policy.py +2 -6
  152. pulumi_vault/saml/auth_backend.py +8 -12
  153. pulumi_vault/saml/auth_backend_role.py +64 -178
  154. pulumi_vault/secrets/sync_association.py +12 -10
  155. pulumi_vault/secrets/sync_aws_destination.py +6 -8
  156. pulumi_vault/secrets/sync_azure_destination.py +10 -12
  157. pulumi_vault/secrets/sync_config.py +2 -6
  158. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  159. pulumi_vault/secrets/sync_gh_destination.py +6 -8
  160. pulumi_vault/secrets/sync_github_apps.py +8 -8
  161. pulumi_vault/secrets/sync_vercel_destination.py +6 -8
  162. pulumi_vault/ssh/_inputs.py +6 -32
  163. pulumi_vault/ssh/outputs.py +6 -32
  164. pulumi_vault/ssh/secret_backend_ca.py +0 -4
  165. pulumi_vault/ssh/secret_backend_role.py +4 -4
  166. pulumi_vault/terraformcloud/secret_backend.py +0 -56
  167. pulumi_vault/terraformcloud/secret_creds.py +2 -17
  168. pulumi_vault/terraformcloud/secret_role.py +2 -69
  169. pulumi_vault/token.py +14 -18
  170. pulumi_vault/tokenauth/auth_backend_role.py +64 -180
  171. pulumi_vault/transform/alphabet.py +4 -6
  172. pulumi_vault/transform/get_decode.py +4 -4
  173. pulumi_vault/transform/get_encode.py +4 -4
  174. pulumi_vault/transform/role.py +4 -6
  175. pulumi_vault/transform/template.py +4 -4
  176. pulumi_vault/transit/get_decrypt.py +4 -20
  177. pulumi_vault/transit/get_encrypt.py +0 -14
  178. pulumi_vault/transit/secret_backend_key.py +6 -6
  179. pulumi_vault/transit/secret_cache_config.py +0 -4
  180. {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1.dist-info}/METADATA +1 -1
  181. pulumi_vault-6.1.1.dist-info/RECORD +252 -0
  182. pulumi_vault-6.1.0a1712233015.dist-info/RECORD +0 -252
  183. {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1.dist-info}/WHEEL +0 -0
  184. {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1.dist-info}/top_level.txt +0 -0
@@ -50,31 +50,15 @@ class AuthBackendRoleArgs:
50
50
 
51
51
  > Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
52
52
  :param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
53
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
54
- addresses which can authenticate successfully, and ties the resulting token to these blocks
55
- as well.
56
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
57
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
58
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
59
- `token_max_ttl` would otherwise allow a renewal.
60
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
61
- Its current value will be referenced at renewal time.
62
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
63
- generated tokens; otherwise it will be added to the policies set in token_policies.
64
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/token#token_num_uses)
65
- of times a generated token may be used (within its lifetime); 0 means unlimited.
66
- :param pulumi.Input[int] token_period: If set, indicates that the
67
- token generated using this role should never expire. The token should be renewed within the
68
- duration specified by this value. At each renewal, the token's TTL will be set to the
69
- value of this field. Specified in seconds.
53
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
54
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
55
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
56
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
57
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
58
+ :param pulumi.Input[int] token_period: Generated Token's Period
70
59
  :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
71
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
72
- Its current value will be referenced at renewal time.
73
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
74
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
75
- `service` tokens). For token store roles, there are two additional possibilities:
76
- `default-service` and `default-batch` which specify the type to return unless the client
77
- requests a different type at generation time.
60
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
61
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
78
62
  """
79
63
  pulumi.set(__self__, "role_name", role_name)
80
64
  if allowed_entity_aliases is not None:
@@ -243,9 +227,7 @@ class AuthBackendRoleArgs:
243
227
  @pulumi.getter(name="tokenBoundCidrs")
244
228
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
245
229
  """
246
- List of CIDR blocks; if set, specifies blocks of IP
247
- addresses which can authenticate successfully, and ties the resulting token to these blocks
248
- as well.
230
+ Specifies the blocks of IP addresses which are allowed to use the generated token
249
231
  """
250
232
  return pulumi.get(self, "token_bound_cidrs")
251
233
 
@@ -257,10 +239,7 @@ class AuthBackendRoleArgs:
257
239
  @pulumi.getter(name="tokenExplicitMaxTtl")
258
240
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
259
241
  """
260
- If set, will encode an
261
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
262
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
263
- `token_max_ttl` would otherwise allow a renewal.
242
+ Generated Token's Explicit Maximum TTL in seconds
264
243
  """
265
244
  return pulumi.get(self, "token_explicit_max_ttl")
266
245
 
@@ -272,8 +251,7 @@ class AuthBackendRoleArgs:
272
251
  @pulumi.getter(name="tokenMaxTtl")
273
252
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
274
253
  """
275
- The maximum lifetime for generated tokens in number of seconds.
276
- Its current value will be referenced at renewal time.
254
+ The maximum lifetime of the generated token
277
255
  """
278
256
  return pulumi.get(self, "token_max_ttl")
279
257
 
@@ -285,8 +263,7 @@ class AuthBackendRoleArgs:
285
263
  @pulumi.getter(name="tokenNoDefaultPolicy")
286
264
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
287
265
  """
288
- If set, the default policy will not be set on
289
- generated tokens; otherwise it will be added to the policies set in token_policies.
266
+ If true, the 'default' policy will not automatically be added to generated tokens
290
267
  """
291
268
  return pulumi.get(self, "token_no_default_policy")
292
269
 
@@ -298,8 +275,7 @@ class AuthBackendRoleArgs:
298
275
  @pulumi.getter(name="tokenNumUses")
299
276
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
300
277
  """
301
- The [maximum number](https://www.vaultproject.io/api-docs/token#token_num_uses)
302
- of times a generated token may be used (within its lifetime); 0 means unlimited.
278
+ The maximum number of times a token may be used, a value of zero means unlimited
303
279
  """
304
280
  return pulumi.get(self, "token_num_uses")
305
281
 
@@ -311,10 +287,7 @@ class AuthBackendRoleArgs:
311
287
  @pulumi.getter(name="tokenPeriod")
312
288
  def token_period(self) -> Optional[pulumi.Input[int]]:
313
289
  """
314
- If set, indicates that the
315
- token generated using this role should never expire. The token should be renewed within the
316
- duration specified by this value. At each renewal, the token's TTL will be set to the
317
- value of this field. Specified in seconds.
290
+ Generated Token's Period
318
291
  """
319
292
  return pulumi.get(self, "token_period")
320
293
 
@@ -338,8 +311,7 @@ class AuthBackendRoleArgs:
338
311
  @pulumi.getter(name="tokenTtl")
339
312
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
340
313
  """
341
- The incremental lifetime for generated tokens in number of seconds.
342
- Its current value will be referenced at renewal time.
314
+ The initial ttl of the token to generate in seconds
343
315
  """
344
316
  return pulumi.get(self, "token_ttl")
345
317
 
@@ -351,11 +323,7 @@ class AuthBackendRoleArgs:
351
323
  @pulumi.getter(name="tokenType")
352
324
  def token_type(self) -> Optional[pulumi.Input[str]]:
353
325
  """
354
- The type of token that should be generated. Can be `service`,
355
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
356
- `service` tokens). For token store roles, there are two additional possibilities:
357
- `default-service` and `default-batch` which specify the type to return unless the client
358
- requests a different type at generation time.
326
+ The type of token to generate, service or batch
359
327
  """
360
328
  return pulumi.get(self, "token_type")
361
329
 
@@ -403,31 +371,15 @@ class _AuthBackendRoleState:
403
371
  > Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
404
372
  :param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
405
373
  :param pulumi.Input[str] role_name: The name of the role.
406
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
407
- addresses which can authenticate successfully, and ties the resulting token to these blocks
408
- as well.
409
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
410
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
411
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
412
- `token_max_ttl` would otherwise allow a renewal.
413
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
414
- Its current value will be referenced at renewal time.
415
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
416
- generated tokens; otherwise it will be added to the policies set in token_policies.
417
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/token#token_num_uses)
418
- of times a generated token may be used (within its lifetime); 0 means unlimited.
419
- :param pulumi.Input[int] token_period: If set, indicates that the
420
- token generated using this role should never expire. The token should be renewed within the
421
- duration specified by this value. At each renewal, the token's TTL will be set to the
422
- value of this field. Specified in seconds.
374
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
375
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
376
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
377
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
378
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
379
+ :param pulumi.Input[int] token_period: Generated Token's Period
423
380
  :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
424
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
425
- Its current value will be referenced at renewal time.
426
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
427
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
428
- `service` tokens). For token store roles, there are two additional possibilities:
429
- `default-service` and `default-batch` which specify the type to return unless the client
430
- requests a different type at generation time.
381
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
382
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
431
383
  """
432
384
  if allowed_entity_aliases is not None:
433
385
  pulumi.set(__self__, "allowed_entity_aliases", allowed_entity_aliases)
@@ -597,9 +549,7 @@ class _AuthBackendRoleState:
597
549
  @pulumi.getter(name="tokenBoundCidrs")
598
550
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
599
551
  """
600
- List of CIDR blocks; if set, specifies blocks of IP
601
- addresses which can authenticate successfully, and ties the resulting token to these blocks
602
- as well.
552
+ Specifies the blocks of IP addresses which are allowed to use the generated token
603
553
  """
604
554
  return pulumi.get(self, "token_bound_cidrs")
605
555
 
@@ -611,10 +561,7 @@ class _AuthBackendRoleState:
611
561
  @pulumi.getter(name="tokenExplicitMaxTtl")
612
562
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
613
563
  """
614
- If set, will encode an
615
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
616
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
617
- `token_max_ttl` would otherwise allow a renewal.
564
+ Generated Token's Explicit Maximum TTL in seconds
618
565
  """
619
566
  return pulumi.get(self, "token_explicit_max_ttl")
620
567
 
@@ -626,8 +573,7 @@ class _AuthBackendRoleState:
626
573
  @pulumi.getter(name="tokenMaxTtl")
627
574
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
628
575
  """
629
- The maximum lifetime for generated tokens in number of seconds.
630
- Its current value will be referenced at renewal time.
576
+ The maximum lifetime of the generated token
631
577
  """
632
578
  return pulumi.get(self, "token_max_ttl")
633
579
 
@@ -639,8 +585,7 @@ class _AuthBackendRoleState:
639
585
  @pulumi.getter(name="tokenNoDefaultPolicy")
640
586
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
641
587
  """
642
- If set, the default policy will not be set on
643
- generated tokens; otherwise it will be added to the policies set in token_policies.
588
+ If true, the 'default' policy will not automatically be added to generated tokens
644
589
  """
645
590
  return pulumi.get(self, "token_no_default_policy")
646
591
 
@@ -652,8 +597,7 @@ class _AuthBackendRoleState:
652
597
  @pulumi.getter(name="tokenNumUses")
653
598
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
654
599
  """
655
- The [maximum number](https://www.vaultproject.io/api-docs/token#token_num_uses)
656
- of times a generated token may be used (within its lifetime); 0 means unlimited.
600
+ The maximum number of times a token may be used, a value of zero means unlimited
657
601
  """
658
602
  return pulumi.get(self, "token_num_uses")
659
603
 
@@ -665,10 +609,7 @@ class _AuthBackendRoleState:
665
609
  @pulumi.getter(name="tokenPeriod")
666
610
  def token_period(self) -> Optional[pulumi.Input[int]]:
667
611
  """
668
- If set, indicates that the
669
- token generated using this role should never expire. The token should be renewed within the
670
- duration specified by this value. At each renewal, the token's TTL will be set to the
671
- value of this field. Specified in seconds.
612
+ Generated Token's Period
672
613
  """
673
614
  return pulumi.get(self, "token_period")
674
615
 
@@ -692,8 +633,7 @@ class _AuthBackendRoleState:
692
633
  @pulumi.getter(name="tokenTtl")
693
634
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
694
635
  """
695
- The incremental lifetime for generated tokens in number of seconds.
696
- Its current value will be referenced at renewal time.
636
+ The initial ttl of the token to generate in seconds
697
637
  """
698
638
  return pulumi.get(self, "token_ttl")
699
639
 
@@ -705,11 +645,7 @@ class _AuthBackendRoleState:
705
645
  @pulumi.getter(name="tokenType")
706
646
  def token_type(self) -> Optional[pulumi.Input[str]]:
707
647
  """
708
- The type of token that should be generated. Can be `service`,
709
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
710
- `service` tokens). For token store roles, there are two additional possibilities:
711
- `default-service` and `default-batch` which specify the type to return unless the client
712
- requests a different type at generation time.
648
+ The type of token to generate, service or batch
713
649
  """
714
650
  return pulumi.get(self, "token_type")
715
651
 
@@ -750,26 +686,24 @@ class AuthBackendRole(pulumi.CustomResource):
750
686
 
751
687
  ## Example Usage
752
688
 
753
- <!--Start PulumiCodeChooser -->
754
689
  ```python
755
690
  import pulumi
756
691
  import pulumi_vault as vault
757
692
 
758
693
  example = vault.tokenauth.AuthBackendRole("example",
759
- allowed_entity_aliases=["test_entity"],
694
+ role_name="my-role",
760
695
  allowed_policies=[
761
696
  "dev",
762
697
  "test",
763
698
  ],
764
699
  disallowed_policies=["default"],
700
+ allowed_entity_aliases=["test_entity"],
765
701
  orphan=True,
766
- path_suffix="path-suffix",
702
+ token_period=86400,
767
703
  renewable=True,
768
- role_name="my-role",
769
704
  token_explicit_max_ttl=115200,
770
- token_period=86400)
705
+ path_suffix="path-suffix")
771
706
  ```
772
- <!--End PulumiCodeChooser -->
773
707
 
774
708
  ## Import
775
709
 
@@ -796,31 +730,15 @@ class AuthBackendRole(pulumi.CustomResource):
796
730
  > Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
797
731
  :param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
798
732
  :param pulumi.Input[str] role_name: The name of the role.
799
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
800
- addresses which can authenticate successfully, and ties the resulting token to these blocks
801
- as well.
802
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
803
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
804
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
805
- `token_max_ttl` would otherwise allow a renewal.
806
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
807
- Its current value will be referenced at renewal time.
808
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
809
- generated tokens; otherwise it will be added to the policies set in token_policies.
810
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/token#token_num_uses)
811
- of times a generated token may be used (within its lifetime); 0 means unlimited.
812
- :param pulumi.Input[int] token_period: If set, indicates that the
813
- token generated using this role should never expire. The token should be renewed within the
814
- duration specified by this value. At each renewal, the token's TTL will be set to the
815
- value of this field. Specified in seconds.
733
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
734
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
735
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
736
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
737
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
738
+ :param pulumi.Input[int] token_period: Generated Token's Period
816
739
  :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
817
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
818
- Its current value will be referenced at renewal time.
819
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
820
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
821
- `service` tokens). For token store roles, there are two additional possibilities:
822
- `default-service` and `default-batch` which specify the type to return unless the client
823
- requests a different type at generation time.
740
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
741
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
824
742
  """
825
743
  ...
826
744
  @overload
@@ -835,26 +753,24 @@ class AuthBackendRole(pulumi.CustomResource):
835
753
 
836
754
  ## Example Usage
837
755
 
838
- <!--Start PulumiCodeChooser -->
839
756
  ```python
840
757
  import pulumi
841
758
  import pulumi_vault as vault
842
759
 
843
760
  example = vault.tokenauth.AuthBackendRole("example",
844
- allowed_entity_aliases=["test_entity"],
761
+ role_name="my-role",
845
762
  allowed_policies=[
846
763
  "dev",
847
764
  "test",
848
765
  ],
849
766
  disallowed_policies=["default"],
767
+ allowed_entity_aliases=["test_entity"],
850
768
  orphan=True,
851
- path_suffix="path-suffix",
769
+ token_period=86400,
852
770
  renewable=True,
853
- role_name="my-role",
854
771
  token_explicit_max_ttl=115200,
855
- token_period=86400)
772
+ path_suffix="path-suffix")
856
773
  ```
857
- <!--End PulumiCodeChooser -->
858
774
 
859
775
  ## Import
860
776
 
@@ -979,31 +895,15 @@ class AuthBackendRole(pulumi.CustomResource):
979
895
  > Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
980
896
  :param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
981
897
  :param pulumi.Input[str] role_name: The name of the role.
982
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
983
- addresses which can authenticate successfully, and ties the resulting token to these blocks
984
- as well.
985
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
986
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
987
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
988
- `token_max_ttl` would otherwise allow a renewal.
989
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
990
- Its current value will be referenced at renewal time.
991
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
992
- generated tokens; otherwise it will be added to the policies set in token_policies.
993
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/token#token_num_uses)
994
- of times a generated token may be used (within its lifetime); 0 means unlimited.
995
- :param pulumi.Input[int] token_period: If set, indicates that the
996
- token generated using this role should never expire. The token should be renewed within the
997
- duration specified by this value. At each renewal, the token's TTL will be set to the
998
- value of this field. Specified in seconds.
898
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
899
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
900
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
901
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
902
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
903
+ :param pulumi.Input[int] token_period: Generated Token's Period
999
904
  :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
1000
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
1001
- Its current value will be referenced at renewal time.
1002
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
1003
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
1004
- `service` tokens). For token store roles, there are two additional possibilities:
1005
- `default-service` and `default-batch` which specify the type to return unless the client
1006
- requests a different type at generation time.
905
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
906
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
1007
907
  """
1008
908
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
1009
909
 
@@ -1119,9 +1019,7 @@ class AuthBackendRole(pulumi.CustomResource):
1119
1019
  @pulumi.getter(name="tokenBoundCidrs")
1120
1020
  def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
1121
1021
  """
1122
- List of CIDR blocks; if set, specifies blocks of IP
1123
- addresses which can authenticate successfully, and ties the resulting token to these blocks
1124
- as well.
1022
+ Specifies the blocks of IP addresses which are allowed to use the generated token
1125
1023
  """
1126
1024
  return pulumi.get(self, "token_bound_cidrs")
1127
1025
 
@@ -1129,10 +1027,7 @@ class AuthBackendRole(pulumi.CustomResource):
1129
1027
  @pulumi.getter(name="tokenExplicitMaxTtl")
1130
1028
  def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
1131
1029
  """
1132
- If set, will encode an
1133
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1134
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1135
- `token_max_ttl` would otherwise allow a renewal.
1030
+ Generated Token's Explicit Maximum TTL in seconds
1136
1031
  """
1137
1032
  return pulumi.get(self, "token_explicit_max_ttl")
1138
1033
 
@@ -1140,8 +1035,7 @@ class AuthBackendRole(pulumi.CustomResource):
1140
1035
  @pulumi.getter(name="tokenMaxTtl")
1141
1036
  def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
1142
1037
  """
1143
- The maximum lifetime for generated tokens in number of seconds.
1144
- Its current value will be referenced at renewal time.
1038
+ The maximum lifetime of the generated token
1145
1039
  """
1146
1040
  return pulumi.get(self, "token_max_ttl")
1147
1041
 
@@ -1149,8 +1043,7 @@ class AuthBackendRole(pulumi.CustomResource):
1149
1043
  @pulumi.getter(name="tokenNoDefaultPolicy")
1150
1044
  def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
1151
1045
  """
1152
- If set, the default policy will not be set on
1153
- generated tokens; otherwise it will be added to the policies set in token_policies.
1046
+ If true, the 'default' policy will not automatically be added to generated tokens
1154
1047
  """
1155
1048
  return pulumi.get(self, "token_no_default_policy")
1156
1049
 
@@ -1158,8 +1051,7 @@ class AuthBackendRole(pulumi.CustomResource):
1158
1051
  @pulumi.getter(name="tokenNumUses")
1159
1052
  def token_num_uses(self) -> pulumi.Output[Optional[int]]:
1160
1053
  """
1161
- The [maximum number](https://www.vaultproject.io/api-docs/token#token_num_uses)
1162
- of times a generated token may be used (within its lifetime); 0 means unlimited.
1054
+ The maximum number of times a token may be used, a value of zero means unlimited
1163
1055
  """
1164
1056
  return pulumi.get(self, "token_num_uses")
1165
1057
 
@@ -1167,10 +1059,7 @@ class AuthBackendRole(pulumi.CustomResource):
1167
1059
  @pulumi.getter(name="tokenPeriod")
1168
1060
  def token_period(self) -> pulumi.Output[Optional[int]]:
1169
1061
  """
1170
- If set, indicates that the
1171
- token generated using this role should never expire. The token should be renewed within the
1172
- duration specified by this value. At each renewal, the token's TTL will be set to the
1173
- value of this field. Specified in seconds.
1062
+ Generated Token's Period
1174
1063
  """
1175
1064
  return pulumi.get(self, "token_period")
1176
1065
 
@@ -1186,8 +1075,7 @@ class AuthBackendRole(pulumi.CustomResource):
1186
1075
  @pulumi.getter(name="tokenTtl")
1187
1076
  def token_ttl(self) -> pulumi.Output[Optional[int]]:
1188
1077
  """
1189
- The incremental lifetime for generated tokens in number of seconds.
1190
- Its current value will be referenced at renewal time.
1078
+ The initial ttl of the token to generate in seconds
1191
1079
  """
1192
1080
  return pulumi.get(self, "token_ttl")
1193
1081
 
@@ -1195,11 +1083,7 @@ class AuthBackendRole(pulumi.CustomResource):
1195
1083
  @pulumi.getter(name="tokenType")
1196
1084
  def token_type(self) -> pulumi.Output[Optional[str]]:
1197
1085
  """
1198
- The type of token that should be generated. Can be `service`,
1199
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
1200
- `service` tokens). For token store roles, there are two additional possibilities:
1201
- `default-service` and `default-batch` which specify the type to return unless the client
1202
- requests a different type at generation time.
1086
+ The type of token to generate, service or batch
1203
1087
  """
1204
1088
  return pulumi.get(self, "token_type")
1205
1089
 
@@ -183,19 +183,18 @@ class Alphabet(pulumi.CustomResource):
183
183
 
184
184
  ## Example Usage
185
185
 
186
- <!--Start PulumiCodeChooser -->
187
186
  ```python
188
187
  import pulumi
189
188
  import pulumi_vault as vault
190
189
 
191
- mount_transform = vault.Mount("mountTransform",
190
+ mount_transform = vault.Mount("mount_transform",
192
191
  path="transform",
193
192
  type="transform")
194
193
  test = vault.transform.Alphabet("test",
195
194
  path=mount_transform.path,
195
+ name="numerics",
196
196
  alphabet="0123456789")
197
197
  ```
198
- <!--End PulumiCodeChooser -->
199
198
 
200
199
  :param str resource_name: The name of the resource.
201
200
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -220,19 +219,18 @@ class Alphabet(pulumi.CustomResource):
220
219
 
221
220
  ## Example Usage
222
221
 
223
- <!--Start PulumiCodeChooser -->
224
222
  ```python
225
223
  import pulumi
226
224
  import pulumi_vault as vault
227
225
 
228
- mount_transform = vault.Mount("mountTransform",
226
+ mount_transform = vault.Mount("mount_transform",
229
227
  path="transform",
230
228
  type="transform")
231
229
  test = vault.transform.Alphabet("test",
232
230
  path=mount_transform.path,
231
+ name="numerics",
233
232
  alphabet="0123456789")
234
233
  ```
235
- <!--End PulumiCodeChooser -->
236
234
 
237
235
  :param str resource_name: The name of the resource.
238
236
  :param AlphabetArgs args: The arguments to use to populate this resource's properties.
@@ -142,7 +142,6 @@ def get_decode(batch_inputs: Optional[Sequence[Mapping[str, Any]]] = None,
142
142
 
143
143
  ## Example Usage
144
144
 
145
- <!--Start PulumiCodeChooser -->
146
145
  ```python
147
146
  import pulumi
148
147
  import pulumi_vault as vault
@@ -152,18 +151,19 @@ def get_decode(batch_inputs: Optional[Sequence[Mapping[str, Any]]] = None,
152
151
  type="transform")
153
152
  ccn_fpe = vault.transform.Transformation("ccn-fpe",
154
153
  path=transform.path,
154
+ name="ccn-fpe",
155
155
  type="fpe",
156
156
  template="builtin/creditcardnumber",
157
157
  tweak_source="internal",
158
158
  allowed_roles=["payments"])
159
159
  payments = vault.transform.Role("payments",
160
160
  path=ccn_fpe.path,
161
+ name="payments",
161
162
  transformations=["ccn-fpe"])
162
163
  test = vault.transform.get_decode_output(path=payments.path,
163
164
  role_name="payments",
164
165
  value="9300-3376-4943-8903")
165
166
  ```
166
- <!--End PulumiCodeChooser -->
167
167
 
168
168
 
169
169
  :param Sequence[Mapping[str, Any]] batch_inputs: Specifies a list of items to be decoded in a single batch. If this parameter is set, the top-level parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.
@@ -223,7 +223,6 @@ def get_decode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
223
223
 
224
224
  ## Example Usage
225
225
 
226
- <!--Start PulumiCodeChooser -->
227
226
  ```python
228
227
  import pulumi
229
228
  import pulumi_vault as vault
@@ -233,18 +232,19 @@ def get_decode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
233
232
  type="transform")
234
233
  ccn_fpe = vault.transform.Transformation("ccn-fpe",
235
234
  path=transform.path,
235
+ name="ccn-fpe",
236
236
  type="fpe",
237
237
  template="builtin/creditcardnumber",
238
238
  tweak_source="internal",
239
239
  allowed_roles=["payments"])
240
240
  payments = vault.transform.Role("payments",
241
241
  path=ccn_fpe.path,
242
+ name="payments",
242
243
  transformations=["ccn-fpe"])
243
244
  test = vault.transform.get_decode_output(path=payments.path,
244
245
  role_name="payments",
245
246
  value="9300-3376-4943-8903")
246
247
  ```
247
- <!--End PulumiCodeChooser -->
248
248
 
249
249
 
250
250
  :param Sequence[Mapping[str, Any]] batch_inputs: Specifies a list of items to be decoded in a single batch. If this parameter is set, the top-level parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.
@@ -142,7 +142,6 @@ def get_encode(batch_inputs: Optional[Sequence[Mapping[str, Any]]] = None,
142
142
 
143
143
  ## Example Usage
144
144
 
145
- <!--Start PulumiCodeChooser -->
146
145
  ```python
147
146
  import pulumi
148
147
  import pulumi_vault as vault
@@ -152,12 +151,14 @@ def get_encode(batch_inputs: Optional[Sequence[Mapping[str, Any]]] = None,
152
151
  type="transform")
153
152
  ccn_fpe = vault.transform.Transformation("ccn-fpe",
154
153
  path=transform.path,
154
+ name="ccn-fpe",
155
155
  type="fpe",
156
156
  template="builtin/creditcardnumber",
157
157
  tweak_source="internal",
158
158
  allowed_roles=["payments"])
159
159
  payments = vault.transform.Role("payments",
160
160
  path=ccn_fpe.path,
161
+ name="payments",
161
162
  transformations=["ccn-fpe"])
162
163
  test = vault.transform.get_encode_output(path=payments.path,
163
164
  role_name="payments",
@@ -165,7 +166,6 @@ def get_encode(batch_inputs: Optional[Sequence[Mapping[str, Any]]] = None,
165
166
  "value": "1111-2222-3333-4444",
166
167
  }])
167
168
  ```
168
- <!--End PulumiCodeChooser -->
169
169
 
170
170
 
171
171
  :param Sequence[Mapping[str, Any]] batch_inputs: Specifies a list of items to be encoded in a single batch. If this parameter is set, the parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.
@@ -225,7 +225,6 @@ def get_encode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
225
225
 
226
226
  ## Example Usage
227
227
 
228
- <!--Start PulumiCodeChooser -->
229
228
  ```python
230
229
  import pulumi
231
230
  import pulumi_vault as vault
@@ -235,12 +234,14 @@ def get_encode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
235
234
  type="transform")
236
235
  ccn_fpe = vault.transform.Transformation("ccn-fpe",
237
236
  path=transform.path,
237
+ name="ccn-fpe",
238
238
  type="fpe",
239
239
  template="builtin/creditcardnumber",
240
240
  tweak_source="internal",
241
241
  allowed_roles=["payments"])
242
242
  payments = vault.transform.Role("payments",
243
243
  path=ccn_fpe.path,
244
+ name="payments",
244
245
  transformations=["ccn-fpe"])
245
246
  test = vault.transform.get_encode_output(path=payments.path,
246
247
  role_name="payments",
@@ -248,7 +249,6 @@ def get_encode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
248
249
  "value": "1111-2222-3333-4444",
249
250
  }])
250
251
  ```
251
- <!--End PulumiCodeChooser -->
252
252
 
253
253
 
254
254
  :param Sequence[Mapping[str, Any]] batch_inputs: Specifies a list of items to be encoded in a single batch. If this parameter is set, the parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.