pulumi-vault 6.1.0a1712233015__py3-none-any.whl → 6.1.1a1717550614__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (184) hide show
  1. pulumi_vault/_inputs.py +0 -20
  2. pulumi_vault/ad/secret_backend.py +2 -6
  3. pulumi_vault/ad/secret_library.py +2 -4
  4. pulumi_vault/ad/secret_role.py +0 -4
  5. pulumi_vault/alicloud/auth_backend_role.py +69 -192
  6. pulumi_vault/approle/auth_backend_login.py +0 -4
  7. pulumi_vault/approle/auth_backend_role.py +63 -186
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
  9. pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
  10. pulumi_vault/audit.py +12 -20
  11. pulumi_vault/audit_request_header.py +6 -6
  12. pulumi_vault/aws/auth_backend_client.py +6 -10
  13. pulumi_vault/aws/auth_backend_config_identity.py +0 -4
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
  15. pulumi_vault/aws/auth_backend_login.py +0 -8
  16. pulumi_vault/aws/auth_backend_role.py +63 -186
  17. pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
  18. pulumi_vault/aws/auth_backend_sts_role.py +0 -4
  19. pulumi_vault/aws/secret_backend.py +63 -0
  20. pulumi_vault/aws/secret_backend_role.py +2 -4
  21. pulumi_vault/aws/secret_backend_static_role.py +2 -4
  22. pulumi_vault/azure/auth_backend_config.py +6 -10
  23. pulumi_vault/azure/auth_backend_role.py +63 -186
  24. pulumi_vault/azure/backend.py +16 -24
  25. pulumi_vault/azure/backend_role.py +14 -18
  26. pulumi_vault/azure/get_access_credentials.py +0 -4
  27. pulumi_vault/cert_auth_backend_role.py +75 -208
  28. pulumi_vault/consul/secret_backend.py +10 -18
  29. pulumi_vault/consul/secret_backend_role.py +2 -4
  30. pulumi_vault/database/_inputs.py +522 -784
  31. pulumi_vault/database/outputs.py +522 -784
  32. pulumi_vault/database/secret_backend_connection.py +2 -4
  33. pulumi_vault/database/secret_backend_role.py +4 -4
  34. pulumi_vault/database/secret_backend_static_role.py +10 -8
  35. pulumi_vault/database/secrets_mount.py +4 -4
  36. pulumi_vault/egp_policy.py +4 -8
  37. pulumi_vault/gcp/auth_backend.py +0 -36
  38. pulumi_vault/gcp/auth_backend_role.py +63 -264
  39. pulumi_vault/gcp/get_auth_backend_role.py +0 -4
  40. pulumi_vault/gcp/secret_backend.py +4 -6
  41. pulumi_vault/gcp/secret_impersonated_account.py +12 -14
  42. pulumi_vault/gcp/secret_roleset.py +4 -6
  43. pulumi_vault/gcp/secret_static_account.py +14 -16
  44. pulumi_vault/generic/endpoint.py +4 -8
  45. pulumi_vault/generic/get_secret.py +40 -4
  46. pulumi_vault/get_auth_backend.py +0 -4
  47. pulumi_vault/get_auth_backends.py +0 -8
  48. pulumi_vault/get_namespace.py +0 -12
  49. pulumi_vault/get_namespaces.py +4 -12
  50. pulumi_vault/get_nomad_access_token.py +0 -4
  51. pulumi_vault/get_policy_document.py +8 -8
  52. pulumi_vault/get_raft_autopilot_state.py +0 -4
  53. pulumi_vault/github/auth_backend.py +0 -4
  54. pulumi_vault/github/team.py +2 -6
  55. pulumi_vault/github/user.py +2 -6
  56. pulumi_vault/identity/entity.py +6 -8
  57. pulumi_vault/identity/entity_alias.py +6 -8
  58. pulumi_vault/identity/entity_policies.py +12 -12
  59. pulumi_vault/identity/get_entity.py +0 -4
  60. pulumi_vault/identity/get_group.py +0 -4
  61. pulumi_vault/identity/get_oidc_client_creds.py +2 -4
  62. pulumi_vault/identity/get_oidc_openid_config.py +10 -6
  63. pulumi_vault/identity/get_oidc_public_keys.py +10 -6
  64. pulumi_vault/identity/group.py +38 -42
  65. pulumi_vault/identity/group_alias.py +2 -4
  66. pulumi_vault/identity/group_member_entity_ids.py +12 -16
  67. pulumi_vault/identity/group_member_group_ids.py +24 -20
  68. pulumi_vault/identity/group_policies.py +4 -8
  69. pulumi_vault/identity/mfa_duo.py +4 -8
  70. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  71. pulumi_vault/identity/mfa_okta.py +4 -8
  72. pulumi_vault/identity/mfa_pingid.py +0 -4
  73. pulumi_vault/identity/mfa_totp.py +0 -4
  74. pulumi_vault/identity/oidc.py +0 -4
  75. pulumi_vault/identity/oidc_assignment.py +10 -6
  76. pulumi_vault/identity/oidc_client.py +10 -10
  77. pulumi_vault/identity/oidc_key.py +16 -12
  78. pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
  79. pulumi_vault/identity/oidc_provider.py +22 -16
  80. pulumi_vault/identity/oidc_role.py +28 -20
  81. pulumi_vault/identity/oidc_scope.py +6 -8
  82. pulumi_vault/jwt/auth_backend.py +20 -32
  83. pulumi_vault/jwt/auth_backend_role.py +63 -190
  84. pulumi_vault/kmip/secret_backend.py +10 -14
  85. pulumi_vault/kmip/secret_role.py +0 -4
  86. pulumi_vault/kmip/secret_scope.py +0 -4
  87. pulumi_vault/kubernetes/auth_backend_config.py +0 -4
  88. pulumi_vault/kubernetes/auth_backend_role.py +56 -172
  89. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  90. pulumi_vault/kubernetes/secret_backend.py +6 -8
  91. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  92. pulumi_vault/kv/get_secret.py +0 -4
  93. pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
  94. pulumi_vault/kv/get_secret_v2.py +58 -0
  95. pulumi_vault/kv/get_secrets_list.py +4 -8
  96. pulumi_vault/kv/get_secrets_list_v2.py +14 -12
  97. pulumi_vault/kv/secret.py +0 -4
  98. pulumi_vault/kv/secret_backend_v2.py +0 -4
  99. pulumi_vault/kv/secret_v2.py +2 -4
  100. pulumi_vault/ldap/auth_backend.py +66 -161
  101. pulumi_vault/ldap/auth_backend_group.py +0 -4
  102. pulumi_vault/ldap/auth_backend_user.py +0 -4
  103. pulumi_vault/ldap/secret_backend.py +4 -8
  104. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
  105. pulumi_vault/ldap/secret_backend_library_set.py +2 -4
  106. pulumi_vault/ldap/secret_backend_static_role.py +0 -4
  107. pulumi_vault/managed/_inputs.py +84 -132
  108. pulumi_vault/managed/keys.py +7 -28
  109. pulumi_vault/managed/outputs.py +84 -132
  110. pulumi_vault/mfa_duo.py +4 -6
  111. pulumi_vault/mfa_okta.py +4 -6
  112. pulumi_vault/mfa_pingid.py +4 -6
  113. pulumi_vault/mfa_totp.py +10 -12
  114. pulumi_vault/mongodbatlas/secret_backend.py +0 -4
  115. pulumi_vault/mongodbatlas/secret_role.py +2 -4
  116. pulumi_vault/mount.py +26 -42
  117. pulumi_vault/nomad_secret_backend.py +4 -8
  118. pulumi_vault/nomad_secret_role.py +0 -4
  119. pulumi_vault/okta/_inputs.py +8 -8
  120. pulumi_vault/okta/auth_backend.py +6 -10
  121. pulumi_vault/okta/auth_backend_group.py +0 -4
  122. pulumi_vault/okta/auth_backend_user.py +0 -4
  123. pulumi_vault/okta/outputs.py +8 -8
  124. pulumi_vault/outputs.py +0 -20
  125. pulumi_vault/password_policy.py +6 -8
  126. pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
  127. pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
  128. pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
  129. pulumi_vault/pkisecret/get_backend_key.py +2 -6
  130. pulumi_vault/pkisecret/get_backend_keys.py +0 -4
  131. pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
  132. pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
  133. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
  134. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
  135. pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
  136. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
  137. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
  138. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
  139. pulumi_vault/pkisecret/secret_backend_role.py +2 -4
  140. pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
  141. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
  142. pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
  143. pulumi_vault/provider.py +0 -8
  144. pulumi_vault/pulumi-plugin.json +2 -1
  145. pulumi_vault/quota_lease_count.py +6 -8
  146. pulumi_vault/quota_rate_limit.py +2 -4
  147. pulumi_vault/rabbitmq/secret_backend.py +4 -8
  148. pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
  149. pulumi_vault/raft_autopilot.py +0 -4
  150. pulumi_vault/raft_snapshot_agent_config.py +109 -304
  151. pulumi_vault/rgp_policy.py +2 -6
  152. pulumi_vault/saml/auth_backend.py +8 -12
  153. pulumi_vault/saml/auth_backend_role.py +64 -178
  154. pulumi_vault/secrets/sync_association.py +12 -10
  155. pulumi_vault/secrets/sync_aws_destination.py +6 -8
  156. pulumi_vault/secrets/sync_azure_destination.py +10 -12
  157. pulumi_vault/secrets/sync_config.py +2 -6
  158. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  159. pulumi_vault/secrets/sync_gh_destination.py +6 -8
  160. pulumi_vault/secrets/sync_github_apps.py +8 -8
  161. pulumi_vault/secrets/sync_vercel_destination.py +6 -8
  162. pulumi_vault/ssh/_inputs.py +6 -32
  163. pulumi_vault/ssh/outputs.py +6 -32
  164. pulumi_vault/ssh/secret_backend_ca.py +0 -4
  165. pulumi_vault/ssh/secret_backend_role.py +4 -4
  166. pulumi_vault/terraformcloud/secret_backend.py +0 -56
  167. pulumi_vault/terraformcloud/secret_creds.py +2 -17
  168. pulumi_vault/terraformcloud/secret_role.py +2 -69
  169. pulumi_vault/token.py +14 -18
  170. pulumi_vault/tokenauth/auth_backend_role.py +64 -180
  171. pulumi_vault/transform/alphabet.py +4 -6
  172. pulumi_vault/transform/get_decode.py +4 -4
  173. pulumi_vault/transform/get_encode.py +4 -4
  174. pulumi_vault/transform/role.py +4 -6
  175. pulumi_vault/transform/template.py +4 -4
  176. pulumi_vault/transit/get_decrypt.py +4 -20
  177. pulumi_vault/transit/get_encrypt.py +0 -14
  178. pulumi_vault/transit/secret_backend_key.py +6 -6
  179. pulumi_vault/transit/secret_cache_config.py +0 -4
  180. {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1a1717550614.dist-info}/METADATA +1 -1
  181. pulumi_vault-6.1.1a1717550614.dist-info/RECORD +252 -0
  182. pulumi_vault-6.1.0a1712233015.dist-info/RECORD +0 -252
  183. {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1a1717550614.dist-info}/WHEEL +0 -0
  184. {pulumi_vault-6.1.0a1712233015.dist-info → pulumi_vault-6.1.1a1717550614.dist-info}/top_level.txt +0 -0
@@ -182,20 +182,18 @@ class RgpPolicy(pulumi.CustomResource):
182
182
 
183
183
  ## Example Usage
184
184
 
185
- <!--Start PulumiCodeChooser -->
186
185
  ```python
187
186
  import pulumi
188
187
  import pulumi_vault as vault
189
188
 
190
189
  allow_all = vault.RgpPolicy("allow-all",
190
+ name="allow-all",
191
191
  enforcement_level="soft-mandatory",
192
192
  policy=\"\"\"main = rule {
193
193
  true
194
194
  }
195
-
196
195
  \"\"\")
197
196
  ```
198
- <!--End PulumiCodeChooser -->
199
197
 
200
198
  :param str resource_name: The name of the resource.
201
199
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -220,20 +218,18 @@ class RgpPolicy(pulumi.CustomResource):
220
218
 
221
219
  ## Example Usage
222
220
 
223
- <!--Start PulumiCodeChooser -->
224
221
  ```python
225
222
  import pulumi
226
223
  import pulumi_vault as vault
227
224
 
228
225
  allow_all = vault.RgpPolicy("allow-all",
226
+ name="allow-all",
229
227
  enforcement_level="soft-mandatory",
230
228
  policy=\"\"\"main = rule {
231
229
  true
232
230
  }
233
-
234
231
  \"\"\")
235
232
  ```
236
- <!--End PulumiCodeChooser -->
237
233
 
238
234
  :param str resource_name: The name of the resource.
239
235
  :param RgpPolicyArgs args: The arguments to use to populate this resource's properties.
@@ -445,19 +445,17 @@ class AuthBackend(pulumi.CustomResource):
445
445
 
446
446
  ## Example Usage
447
447
 
448
- <!--Start PulumiCodeChooser -->
449
448
  ```python
450
449
  import pulumi
451
450
  import pulumi_vault as vault
452
451
 
453
452
  test = vault.saml.AuthBackend("test",
454
- acs_urls=["https://my.vault.primary/v1/auth/saml/callback"],
455
- default_role="admin",
456
- entity_id="https://my.vault/v1/auth/saml",
453
+ path="saml",
457
454
  idp_metadata_url="https://company.okta.com/app/abc123eb9xnIfzlaf697/sso/saml/metadata",
458
- path="saml")
455
+ entity_id="https://my.vault/v1/auth/saml",
456
+ acs_urls=["https://my.vault.primary/v1/auth/saml/callback"],
457
+ default_role="admin")
459
458
  ```
460
- <!--End PulumiCodeChooser -->
461
459
 
462
460
  ## Import
463
461
 
@@ -505,19 +503,17 @@ class AuthBackend(pulumi.CustomResource):
505
503
 
506
504
  ## Example Usage
507
505
 
508
- <!--Start PulumiCodeChooser -->
509
506
  ```python
510
507
  import pulumi
511
508
  import pulumi_vault as vault
512
509
 
513
510
  test = vault.saml.AuthBackend("test",
514
- acs_urls=["https://my.vault.primary/v1/auth/saml/callback"],
515
- default_role="admin",
516
- entity_id="https://my.vault/v1/auth/saml",
511
+ path="saml",
517
512
  idp_metadata_url="https://company.okta.com/app/abc123eb9xnIfzlaf697/sso/saml/metadata",
518
- path="saml")
513
+ entity_id="https://my.vault/v1/auth/saml",
514
+ acs_urls=["https://my.vault.primary/v1/auth/saml/callback"],
515
+ default_role="admin")
519
516
  ```
520
- <!--End PulumiCodeChooser -->
521
517
 
522
518
  ## Import
523
519
 
@@ -47,31 +47,15 @@ class AuthBackendRoleArgs:
47
47
  The value should not contain leading or trailing forward slashes.
48
48
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
49
49
  *Available only for Vault Enterprise*.
50
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
51
- addresses which can authenticate successfully, and ties the resulting token to these blocks
52
- as well.
53
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
54
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
55
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
56
- `token_max_ttl` would otherwise allow a renewal.
57
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
58
- Its current value will be referenced at renewal time.
59
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
60
- generated tokens; otherwise it will be added to the policies set in token_policies.
50
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
51
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
52
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
53
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
61
54
  :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
62
- :param pulumi.Input[int] token_period: If set, indicates that the
63
- token generated using this role should never expire. The token should be renewed within the
64
- duration specified by this value. At each renewal, the token's TTL will be set to the
65
- value of this field. Specified in seconds.
66
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
67
- on the auth method, this list may be supplemented by user/group/other values.
68
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
69
- Its current value will be referenced at renewal time.
70
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
71
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
72
- `service` tokens). For token store roles, there are two additional possibilities:
73
- `default-service` and `default-batch` which specify the type to return unless the client
74
- requests a different type at generation time.
55
+ :param pulumi.Input[int] token_period: Generated Token's Period
56
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
57
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
58
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
75
59
  """
76
60
  pulumi.set(__self__, "path", path)
77
61
  if bound_attributes is not None:
@@ -213,9 +197,7 @@ class AuthBackendRoleArgs:
213
197
  @pulumi.getter(name="tokenBoundCidrs")
214
198
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
215
199
  """
216
- List of CIDR blocks; if set, specifies blocks of IP
217
- addresses which can authenticate successfully, and ties the resulting token to these blocks
218
- as well.
200
+ Specifies the blocks of IP addresses which are allowed to use the generated token
219
201
  """
220
202
  return pulumi.get(self, "token_bound_cidrs")
221
203
 
@@ -227,10 +209,7 @@ class AuthBackendRoleArgs:
227
209
  @pulumi.getter(name="tokenExplicitMaxTtl")
228
210
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
229
211
  """
230
- If set, will encode an
231
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
232
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
233
- `token_max_ttl` would otherwise allow a renewal.
212
+ Generated Token's Explicit Maximum TTL in seconds
234
213
  """
235
214
  return pulumi.get(self, "token_explicit_max_ttl")
236
215
 
@@ -242,8 +221,7 @@ class AuthBackendRoleArgs:
242
221
  @pulumi.getter(name="tokenMaxTtl")
243
222
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
244
223
  """
245
- The maximum lifetime for generated tokens in number of seconds.
246
- Its current value will be referenced at renewal time.
224
+ The maximum lifetime of the generated token
247
225
  """
248
226
  return pulumi.get(self, "token_max_ttl")
249
227
 
@@ -255,8 +233,7 @@ class AuthBackendRoleArgs:
255
233
  @pulumi.getter(name="tokenNoDefaultPolicy")
256
234
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
257
235
  """
258
- If set, the default policy will not be set on
259
- generated tokens; otherwise it will be added to the policies set in token_policies.
236
+ If true, the 'default' policy will not automatically be added to generated tokens
260
237
  """
261
238
  return pulumi.get(self, "token_no_default_policy")
262
239
 
@@ -280,10 +257,7 @@ class AuthBackendRoleArgs:
280
257
  @pulumi.getter(name="tokenPeriod")
281
258
  def token_period(self) -> Optional[pulumi.Input[int]]:
282
259
  """
283
- If set, indicates that the
284
- token generated using this role should never expire. The token should be renewed within the
285
- duration specified by this value. At each renewal, the token's TTL will be set to the
286
- value of this field. Specified in seconds.
260
+ Generated Token's Period
287
261
  """
288
262
  return pulumi.get(self, "token_period")
289
263
 
@@ -295,8 +269,7 @@ class AuthBackendRoleArgs:
295
269
  @pulumi.getter(name="tokenPolicies")
296
270
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
297
271
  """
298
- List of policies to encode onto generated tokens. Depending
299
- on the auth method, this list may be supplemented by user/group/other values.
272
+ Generated Token's Policies
300
273
  """
301
274
  return pulumi.get(self, "token_policies")
302
275
 
@@ -308,8 +281,7 @@ class AuthBackendRoleArgs:
308
281
  @pulumi.getter(name="tokenTtl")
309
282
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
310
283
  """
311
- The incremental lifetime for generated tokens in number of seconds.
312
- Its current value will be referenced at renewal time.
284
+ The initial ttl of the token to generate in seconds
313
285
  """
314
286
  return pulumi.get(self, "token_ttl")
315
287
 
@@ -321,11 +293,7 @@ class AuthBackendRoleArgs:
321
293
  @pulumi.getter(name="tokenType")
322
294
  def token_type(self) -> Optional[pulumi.Input[str]]:
323
295
  """
324
- The type of token that should be generated. Can be `service`,
325
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
326
- `service` tokens). For token store roles, there are two additional possibilities:
327
- `default-service` and `default-batch` which specify the type to return unless the client
328
- requests a different type at generation time.
296
+ The type of token to generate, service or batch
329
297
  """
330
298
  return pulumi.get(self, "token_type")
331
299
 
@@ -370,31 +338,15 @@ class _AuthBackendRoleState:
370
338
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
371
339
  *Available only for Vault Enterprise*.
372
340
  :param pulumi.Input[str] path: Path where the auth backend is mounted.
373
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
374
- addresses which can authenticate successfully, and ties the resulting token to these blocks
375
- as well.
376
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
377
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
378
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
379
- `token_max_ttl` would otherwise allow a renewal.
380
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
381
- Its current value will be referenced at renewal time.
382
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
383
- generated tokens; otherwise it will be added to the policies set in token_policies.
341
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
342
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
343
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
344
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
384
345
  :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
385
- :param pulumi.Input[int] token_period: If set, indicates that the
386
- token generated using this role should never expire. The token should be renewed within the
387
- duration specified by this value. At each renewal, the token's TTL will be set to the
388
- value of this field. Specified in seconds.
389
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
390
- on the auth method, this list may be supplemented by user/group/other values.
391
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
392
- Its current value will be referenced at renewal time.
393
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
394
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
395
- `service` tokens). For token store roles, there are two additional possibilities:
396
- `default-service` and `default-batch` which specify the type to return unless the client
397
- requests a different type at generation time.
346
+ :param pulumi.Input[int] token_period: Generated Token's Period
347
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
348
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
349
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
398
350
  """
399
351
  if bound_attributes is not None:
400
352
  pulumi.set(__self__, "bound_attributes", bound_attributes)
@@ -537,9 +489,7 @@ class _AuthBackendRoleState:
537
489
  @pulumi.getter(name="tokenBoundCidrs")
538
490
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
539
491
  """
540
- List of CIDR blocks; if set, specifies blocks of IP
541
- addresses which can authenticate successfully, and ties the resulting token to these blocks
542
- as well.
492
+ Specifies the blocks of IP addresses which are allowed to use the generated token
543
493
  """
544
494
  return pulumi.get(self, "token_bound_cidrs")
545
495
 
@@ -551,10 +501,7 @@ class _AuthBackendRoleState:
551
501
  @pulumi.getter(name="tokenExplicitMaxTtl")
552
502
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
553
503
  """
554
- If set, will encode an
555
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
556
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
557
- `token_max_ttl` would otherwise allow a renewal.
504
+ Generated Token's Explicit Maximum TTL in seconds
558
505
  """
559
506
  return pulumi.get(self, "token_explicit_max_ttl")
560
507
 
@@ -566,8 +513,7 @@ class _AuthBackendRoleState:
566
513
  @pulumi.getter(name="tokenMaxTtl")
567
514
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
568
515
  """
569
- The maximum lifetime for generated tokens in number of seconds.
570
- Its current value will be referenced at renewal time.
516
+ The maximum lifetime of the generated token
571
517
  """
572
518
  return pulumi.get(self, "token_max_ttl")
573
519
 
@@ -579,8 +525,7 @@ class _AuthBackendRoleState:
579
525
  @pulumi.getter(name="tokenNoDefaultPolicy")
580
526
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
581
527
  """
582
- If set, the default policy will not be set on
583
- generated tokens; otherwise it will be added to the policies set in token_policies.
528
+ If true, the 'default' policy will not automatically be added to generated tokens
584
529
  """
585
530
  return pulumi.get(self, "token_no_default_policy")
586
531
 
@@ -604,10 +549,7 @@ class _AuthBackendRoleState:
604
549
  @pulumi.getter(name="tokenPeriod")
605
550
  def token_period(self) -> Optional[pulumi.Input[int]]:
606
551
  """
607
- If set, indicates that the
608
- token generated using this role should never expire. The token should be renewed within the
609
- duration specified by this value. At each renewal, the token's TTL will be set to the
610
- value of this field. Specified in seconds.
552
+ Generated Token's Period
611
553
  """
612
554
  return pulumi.get(self, "token_period")
613
555
 
@@ -619,8 +561,7 @@ class _AuthBackendRoleState:
619
561
  @pulumi.getter(name="tokenPolicies")
620
562
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
621
563
  """
622
- List of policies to encode onto generated tokens. Depending
623
- on the auth method, this list may be supplemented by user/group/other values.
564
+ Generated Token's Policies
624
565
  """
625
566
  return pulumi.get(self, "token_policies")
626
567
 
@@ -632,8 +573,7 @@ class _AuthBackendRoleState:
632
573
  @pulumi.getter(name="tokenTtl")
633
574
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
634
575
  """
635
- The incremental lifetime for generated tokens in number of seconds.
636
- Its current value will be referenced at renewal time.
576
+ The initial ttl of the token to generate in seconds
637
577
  """
638
578
  return pulumi.get(self, "token_ttl")
639
579
 
@@ -645,11 +585,7 @@ class _AuthBackendRoleState:
645
585
  @pulumi.getter(name="tokenType")
646
586
  def token_type(self) -> Optional[pulumi.Input[str]]:
647
587
  """
648
- The type of token that should be generated. Can be `service`,
649
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
650
- `service` tokens). For token store roles, there are two additional possibilities:
651
- `default-service` and `default-batch` which specify the type to return unless the client
652
- requests a different type at generation time.
588
+ The type of token to generate, service or batch
653
589
  """
654
590
  return pulumi.get(self, "token_type")
655
591
 
@@ -688,19 +624,19 @@ class AuthBackendRole(pulumi.CustomResource):
688
624
 
689
625
  ## Example Usage
690
626
 
691
- <!--Start PulumiCodeChooser -->
692
627
  ```python
693
628
  import pulumi
694
629
  import pulumi_vault as vault
695
630
 
696
- example_auth_backend = vault.saml.AuthBackend("exampleAuthBackend",
631
+ example = vault.saml.AuthBackend("example",
697
632
  path="saml",
698
633
  idp_metadata_url="https://company.okta.com/app/abc123eb9xnIfzlaf697/sso/saml/metadata",
699
634
  entity_id="https://my.vault/v1/auth/saml",
700
635
  acs_urls=["https://my.vault.primary/v1/auth/saml/callback"],
701
636
  default_role="default-role")
702
- example_auth_backend_role = vault.saml.AuthBackendRole("exampleAuthBackendRole",
703
- path=example_auth_backend.path,
637
+ example_auth_backend_role = vault.saml.AuthBackendRole("example",
638
+ path=example.path,
639
+ name="my-role",
704
640
  groups_attribute="groups",
705
641
  bound_attributes={
706
642
  "group": "admin",
@@ -709,7 +645,6 @@ class AuthBackendRole(pulumi.CustomResource):
709
645
  token_policies=["writer"],
710
646
  token_ttl=86400)
711
647
  ```
712
- <!--End PulumiCodeChooser -->
713
648
 
714
649
  ## Import
715
650
 
@@ -735,31 +670,15 @@ class AuthBackendRole(pulumi.CustomResource):
735
670
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
736
671
  *Available only for Vault Enterprise*.
737
672
  :param pulumi.Input[str] path: Path where the auth backend is mounted.
738
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
739
- addresses which can authenticate successfully, and ties the resulting token to these blocks
740
- as well.
741
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
742
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
743
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
744
- `token_max_ttl` would otherwise allow a renewal.
745
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
746
- Its current value will be referenced at renewal time.
747
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
748
- generated tokens; otherwise it will be added to the policies set in token_policies.
673
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
674
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
675
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
676
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
749
677
  :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
750
- :param pulumi.Input[int] token_period: If set, indicates that the
751
- token generated using this role should never expire. The token should be renewed within the
752
- duration specified by this value. At each renewal, the token's TTL will be set to the
753
- value of this field. Specified in seconds.
754
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
755
- on the auth method, this list may be supplemented by user/group/other values.
756
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
757
- Its current value will be referenced at renewal time.
758
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
759
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
760
- `service` tokens). For token store roles, there are two additional possibilities:
761
- `default-service` and `default-batch` which specify the type to return unless the client
762
- requests a different type at generation time.
678
+ :param pulumi.Input[int] token_period: Generated Token's Period
679
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
680
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
681
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
763
682
  """
764
683
  ...
765
684
  @overload
@@ -774,19 +693,19 @@ class AuthBackendRole(pulumi.CustomResource):
774
693
 
775
694
  ## Example Usage
776
695
 
777
- <!--Start PulumiCodeChooser -->
778
696
  ```python
779
697
  import pulumi
780
698
  import pulumi_vault as vault
781
699
 
782
- example_auth_backend = vault.saml.AuthBackend("exampleAuthBackend",
700
+ example = vault.saml.AuthBackend("example",
783
701
  path="saml",
784
702
  idp_metadata_url="https://company.okta.com/app/abc123eb9xnIfzlaf697/sso/saml/metadata",
785
703
  entity_id="https://my.vault/v1/auth/saml",
786
704
  acs_urls=["https://my.vault.primary/v1/auth/saml/callback"],
787
705
  default_role="default-role")
788
- example_auth_backend_role = vault.saml.AuthBackendRole("exampleAuthBackendRole",
789
- path=example_auth_backend.path,
706
+ example_auth_backend_role = vault.saml.AuthBackendRole("example",
707
+ path=example.path,
708
+ name="my-role",
790
709
  groups_attribute="groups",
791
710
  bound_attributes={
792
711
  "group": "admin",
@@ -795,7 +714,6 @@ class AuthBackendRole(pulumi.CustomResource):
795
714
  token_policies=["writer"],
796
715
  token_ttl=86400)
797
716
  ```
798
- <!--End PulumiCodeChooser -->
799
717
 
800
718
  ## Import
801
719
 
@@ -913,31 +831,15 @@ class AuthBackendRole(pulumi.CustomResource):
913
831
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
914
832
  *Available only for Vault Enterprise*.
915
833
  :param pulumi.Input[str] path: Path where the auth backend is mounted.
916
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
917
- addresses which can authenticate successfully, and ties the resulting token to these blocks
918
- as well.
919
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
920
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
921
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
922
- `token_max_ttl` would otherwise allow a renewal.
923
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
924
- Its current value will be referenced at renewal time.
925
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
926
- generated tokens; otherwise it will be added to the policies set in token_policies.
834
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
835
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
836
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
837
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
927
838
  :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
928
- :param pulumi.Input[int] token_period: If set, indicates that the
929
- token generated using this role should never expire. The token should be renewed within the
930
- duration specified by this value. At each renewal, the token's TTL will be set to the
931
- value of this field. Specified in seconds.
932
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
933
- on the auth method, this list may be supplemented by user/group/other values.
934
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
935
- Its current value will be referenced at renewal time.
936
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
937
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
938
- `service` tokens). For token store roles, there are two additional possibilities:
939
- `default-service` and `default-batch` which specify the type to return unless the client
940
- requests a different type at generation time.
839
+ :param pulumi.Input[int] token_period: Generated Token's Period
840
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
841
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
842
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
941
843
  """
942
844
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
943
845
 
@@ -1036,9 +938,7 @@ class AuthBackendRole(pulumi.CustomResource):
1036
938
  @pulumi.getter(name="tokenBoundCidrs")
1037
939
  def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
1038
940
  """
1039
- List of CIDR blocks; if set, specifies blocks of IP
1040
- addresses which can authenticate successfully, and ties the resulting token to these blocks
1041
- as well.
941
+ Specifies the blocks of IP addresses which are allowed to use the generated token
1042
942
  """
1043
943
  return pulumi.get(self, "token_bound_cidrs")
1044
944
 
@@ -1046,10 +946,7 @@ class AuthBackendRole(pulumi.CustomResource):
1046
946
  @pulumi.getter(name="tokenExplicitMaxTtl")
1047
947
  def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
1048
948
  """
1049
- If set, will encode an
1050
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1051
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1052
- `token_max_ttl` would otherwise allow a renewal.
949
+ Generated Token's Explicit Maximum TTL in seconds
1053
950
  """
1054
951
  return pulumi.get(self, "token_explicit_max_ttl")
1055
952
 
@@ -1057,8 +954,7 @@ class AuthBackendRole(pulumi.CustomResource):
1057
954
  @pulumi.getter(name="tokenMaxTtl")
1058
955
  def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
1059
956
  """
1060
- The maximum lifetime for generated tokens in number of seconds.
1061
- Its current value will be referenced at renewal time.
957
+ The maximum lifetime of the generated token
1062
958
  """
1063
959
  return pulumi.get(self, "token_max_ttl")
1064
960
 
@@ -1066,8 +962,7 @@ class AuthBackendRole(pulumi.CustomResource):
1066
962
  @pulumi.getter(name="tokenNoDefaultPolicy")
1067
963
  def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
1068
964
  """
1069
- If set, the default policy will not be set on
1070
- generated tokens; otherwise it will be added to the policies set in token_policies.
965
+ If true, the 'default' policy will not automatically be added to generated tokens
1071
966
  """
1072
967
  return pulumi.get(self, "token_no_default_policy")
1073
968
 
@@ -1083,10 +978,7 @@ class AuthBackendRole(pulumi.CustomResource):
1083
978
  @pulumi.getter(name="tokenPeriod")
1084
979
  def token_period(self) -> pulumi.Output[Optional[int]]:
1085
980
  """
1086
- If set, indicates that the
1087
- token generated using this role should never expire. The token should be renewed within the
1088
- duration specified by this value. At each renewal, the token's TTL will be set to the
1089
- value of this field. Specified in seconds.
981
+ Generated Token's Period
1090
982
  """
1091
983
  return pulumi.get(self, "token_period")
1092
984
 
@@ -1094,8 +986,7 @@ class AuthBackendRole(pulumi.CustomResource):
1094
986
  @pulumi.getter(name="tokenPolicies")
1095
987
  def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
1096
988
  """
1097
- List of policies to encode onto generated tokens. Depending
1098
- on the auth method, this list may be supplemented by user/group/other values.
989
+ Generated Token's Policies
1099
990
  """
1100
991
  return pulumi.get(self, "token_policies")
1101
992
 
@@ -1103,8 +994,7 @@ class AuthBackendRole(pulumi.CustomResource):
1103
994
  @pulumi.getter(name="tokenTtl")
1104
995
  def token_ttl(self) -> pulumi.Output[Optional[int]]:
1105
996
  """
1106
- The incremental lifetime for generated tokens in number of seconds.
1107
- Its current value will be referenced at renewal time.
997
+ The initial ttl of the token to generate in seconds
1108
998
  """
1109
999
  return pulumi.get(self, "token_ttl")
1110
1000
 
@@ -1112,11 +1002,7 @@ class AuthBackendRole(pulumi.CustomResource):
1112
1002
  @pulumi.getter(name="tokenType")
1113
1003
  def token_type(self) -> pulumi.Output[Optional[str]]:
1114
1004
  """
1115
- The type of token that should be generated. Can be `service`,
1116
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
1117
- `service` tokens). For token store roles, there are two additional possibilities:
1118
- `default-service` and `default-batch` which specify the type to return unless the client
1119
- requests a different type at generation time.
1005
+ The type of token to generate, service or batch
1120
1006
  """
1121
1007
  return pulumi.get(self, "token_type")
1122
1008