pulumi-vault 6.1.1a1717550614__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (183) hide show
  1. pulumi_vault/_inputs.py +20 -0
  2. pulumi_vault/ad/secret_backend.py +6 -2
  3. pulumi_vault/ad/secret_library.py +4 -2
  4. pulumi_vault/ad/secret_role.py +4 -0
  5. pulumi_vault/alicloud/auth_backend_role.py +192 -69
  6. pulumi_vault/approle/auth_backend_login.py +4 -0
  7. pulumi_vault/approle/auth_backend_role.py +186 -63
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  9. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  10. pulumi_vault/audit.py +20 -12
  11. pulumi_vault/audit_request_header.py +6 -6
  12. pulumi_vault/aws/auth_backend_client.py +10 -6
  13. pulumi_vault/aws/auth_backend_config_identity.py +4 -0
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
  15. pulumi_vault/aws/auth_backend_login.py +8 -0
  16. pulumi_vault/aws/auth_backend_role.py +186 -63
  17. pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
  18. pulumi_vault/aws/auth_backend_sts_role.py +4 -0
  19. pulumi_vault/aws/secret_backend_role.py +4 -2
  20. pulumi_vault/aws/secret_backend_static_role.py +4 -2
  21. pulumi_vault/azure/auth_backend_config.py +10 -6
  22. pulumi_vault/azure/auth_backend_role.py +186 -63
  23. pulumi_vault/azure/backend.py +24 -16
  24. pulumi_vault/azure/backend_role.py +18 -14
  25. pulumi_vault/azure/get_access_credentials.py +4 -0
  26. pulumi_vault/cert_auth_backend_role.py +208 -75
  27. pulumi_vault/consul/secret_backend.py +18 -10
  28. pulumi_vault/consul/secret_backend_role.py +4 -2
  29. pulumi_vault/database/_inputs.py +784 -522
  30. pulumi_vault/database/outputs.py +784 -522
  31. pulumi_vault/database/secret_backend_connection.py +4 -2
  32. pulumi_vault/database/secret_backend_role.py +4 -4
  33. pulumi_vault/database/secret_backend_static_role.py +8 -10
  34. pulumi_vault/database/secrets_mount.py +4 -4
  35. pulumi_vault/egp_policy.py +8 -4
  36. pulumi_vault/gcp/auth_backend.py +36 -0
  37. pulumi_vault/gcp/auth_backend_role.py +264 -63
  38. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  39. pulumi_vault/gcp/secret_backend.py +6 -4
  40. pulumi_vault/gcp/secret_impersonated_account.py +14 -12
  41. pulumi_vault/gcp/secret_roleset.py +6 -4
  42. pulumi_vault/gcp/secret_static_account.py +16 -14
  43. pulumi_vault/generic/endpoint.py +8 -4
  44. pulumi_vault/generic/get_secret.py +4 -40
  45. pulumi_vault/get_auth_backend.py +4 -0
  46. pulumi_vault/get_auth_backends.py +8 -0
  47. pulumi_vault/get_namespace.py +12 -0
  48. pulumi_vault/get_namespaces.py +12 -4
  49. pulumi_vault/get_nomad_access_token.py +4 -0
  50. pulumi_vault/get_policy_document.py +8 -8
  51. pulumi_vault/get_raft_autopilot_state.py +4 -0
  52. pulumi_vault/github/auth_backend.py +4 -0
  53. pulumi_vault/github/team.py +6 -2
  54. pulumi_vault/github/user.py +6 -2
  55. pulumi_vault/identity/entity.py +8 -6
  56. pulumi_vault/identity/entity_alias.py +8 -6
  57. pulumi_vault/identity/entity_policies.py +12 -12
  58. pulumi_vault/identity/get_entity.py +4 -0
  59. pulumi_vault/identity/get_group.py +4 -0
  60. pulumi_vault/identity/get_oidc_client_creds.py +4 -2
  61. pulumi_vault/identity/get_oidc_openid_config.py +6 -10
  62. pulumi_vault/identity/get_oidc_public_keys.py +6 -10
  63. pulumi_vault/identity/group.py +42 -38
  64. pulumi_vault/identity/group_alias.py +4 -2
  65. pulumi_vault/identity/group_member_entity_ids.py +16 -12
  66. pulumi_vault/identity/group_member_group_ids.py +20 -24
  67. pulumi_vault/identity/group_policies.py +8 -4
  68. pulumi_vault/identity/mfa_duo.py +8 -4
  69. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  70. pulumi_vault/identity/mfa_okta.py +8 -4
  71. pulumi_vault/identity/mfa_pingid.py +4 -0
  72. pulumi_vault/identity/mfa_totp.py +4 -0
  73. pulumi_vault/identity/oidc.py +4 -0
  74. pulumi_vault/identity/oidc_assignment.py +6 -10
  75. pulumi_vault/identity/oidc_client.py +10 -10
  76. pulumi_vault/identity/oidc_key.py +12 -16
  77. pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
  78. pulumi_vault/identity/oidc_provider.py +16 -22
  79. pulumi_vault/identity/oidc_role.py +20 -28
  80. pulumi_vault/identity/oidc_scope.py +8 -6
  81. pulumi_vault/jwt/auth_backend.py +32 -20
  82. pulumi_vault/jwt/auth_backend_role.py +190 -63
  83. pulumi_vault/kmip/secret_backend.py +14 -10
  84. pulumi_vault/kmip/secret_role.py +4 -0
  85. pulumi_vault/kmip/secret_scope.py +4 -0
  86. pulumi_vault/kubernetes/auth_backend_config.py +4 -0
  87. pulumi_vault/kubernetes/auth_backend_role.py +172 -56
  88. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  89. pulumi_vault/kubernetes/secret_backend.py +8 -6
  90. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  91. pulumi_vault/kv/get_secret.py +4 -0
  92. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
  93. pulumi_vault/kv/get_secret_v2.py +0 -58
  94. pulumi_vault/kv/get_secrets_list.py +8 -4
  95. pulumi_vault/kv/get_secrets_list_v2.py +12 -14
  96. pulumi_vault/kv/secret.py +4 -0
  97. pulumi_vault/kv/secret_backend_v2.py +4 -0
  98. pulumi_vault/kv/secret_v2.py +4 -2
  99. pulumi_vault/ldap/auth_backend.py +161 -66
  100. pulumi_vault/ldap/auth_backend_group.py +4 -0
  101. pulumi_vault/ldap/auth_backend_user.py +4 -0
  102. pulumi_vault/ldap/secret_backend.py +8 -4
  103. pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
  104. pulumi_vault/ldap/secret_backend_library_set.py +4 -2
  105. pulumi_vault/ldap/secret_backend_static_role.py +4 -0
  106. pulumi_vault/managed/_inputs.py +132 -84
  107. pulumi_vault/managed/keys.py +28 -7
  108. pulumi_vault/managed/outputs.py +132 -84
  109. pulumi_vault/mfa_duo.py +6 -4
  110. pulumi_vault/mfa_okta.py +6 -4
  111. pulumi_vault/mfa_pingid.py +6 -4
  112. pulumi_vault/mfa_totp.py +12 -10
  113. pulumi_vault/mongodbatlas/secret_backend.py +4 -0
  114. pulumi_vault/mongodbatlas/secret_role.py +4 -2
  115. pulumi_vault/mount.py +42 -26
  116. pulumi_vault/nomad_secret_backend.py +8 -4
  117. pulumi_vault/nomad_secret_role.py +4 -0
  118. pulumi_vault/okta/_inputs.py +8 -8
  119. pulumi_vault/okta/auth_backend.py +10 -6
  120. pulumi_vault/okta/auth_backend_group.py +4 -0
  121. pulumi_vault/okta/auth_backend_user.py +4 -0
  122. pulumi_vault/okta/outputs.py +8 -8
  123. pulumi_vault/outputs.py +20 -0
  124. pulumi_vault/password_policy.py +8 -6
  125. pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
  126. pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
  127. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  128. pulumi_vault/pkisecret/get_backend_key.py +6 -2
  129. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  130. pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
  131. pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
  132. pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
  133. pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
  134. pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
  135. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
  136. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
  137. pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
  138. pulumi_vault/pkisecret/secret_backend_role.py +4 -2
  139. pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
  140. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
  141. pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
  142. pulumi_vault/provider.py +8 -0
  143. pulumi_vault/pulumi-plugin.json +1 -2
  144. pulumi_vault/quota_lease_count.py +8 -6
  145. pulumi_vault/quota_rate_limit.py +4 -2
  146. pulumi_vault/rabbitmq/secret_backend.py +8 -4
  147. pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
  148. pulumi_vault/raft_autopilot.py +4 -0
  149. pulumi_vault/raft_snapshot_agent_config.py +304 -109
  150. pulumi_vault/rgp_policy.py +6 -2
  151. pulumi_vault/saml/auth_backend.py +12 -8
  152. pulumi_vault/saml/auth_backend_role.py +178 -64
  153. pulumi_vault/secrets/sync_association.py +10 -12
  154. pulumi_vault/secrets/sync_aws_destination.py +8 -6
  155. pulumi_vault/secrets/sync_azure_destination.py +12 -10
  156. pulumi_vault/secrets/sync_config.py +6 -2
  157. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  158. pulumi_vault/secrets/sync_gh_destination.py +8 -6
  159. pulumi_vault/secrets/sync_github_apps.py +8 -8
  160. pulumi_vault/secrets/sync_vercel_destination.py +8 -6
  161. pulumi_vault/ssh/_inputs.py +32 -6
  162. pulumi_vault/ssh/outputs.py +32 -6
  163. pulumi_vault/ssh/secret_backend_ca.py +4 -0
  164. pulumi_vault/ssh/secret_backend_role.py +4 -4
  165. pulumi_vault/terraformcloud/secret_backend.py +56 -0
  166. pulumi_vault/terraformcloud/secret_creds.py +17 -2
  167. pulumi_vault/terraformcloud/secret_role.py +69 -2
  168. pulumi_vault/token.py +18 -14
  169. pulumi_vault/tokenauth/auth_backend_role.py +180 -64
  170. pulumi_vault/transform/alphabet.py +6 -4
  171. pulumi_vault/transform/get_decode.py +4 -4
  172. pulumi_vault/transform/get_encode.py +4 -4
  173. pulumi_vault/transform/role.py +6 -4
  174. pulumi_vault/transform/template.py +4 -4
  175. pulumi_vault/transit/get_decrypt.py +20 -4
  176. pulumi_vault/transit/get_encrypt.py +14 -0
  177. pulumi_vault/transit/secret_backend_key.py +6 -6
  178. pulumi_vault/transit/secret_cache_config.py +4 -0
  179. {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
  180. pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
  181. pulumi_vault-6.1.1a1717550614.dist-info/RECORD +0 -252
  182. {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +0 -0
  183. {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -89,15 +89,32 @@ class AuthBackendRoleArgs:
89
89
  :param pulumi.Input[Sequence[pulumi.Input[str]]] oidc_scopes: If set, a list of OIDC scopes to be used with an OIDC role.
90
90
  The standard scope "openid" is automatically included and need not be specified.
91
91
  :param pulumi.Input[str] role_type: Type of role, either "oidc" (default) or "jwt".
92
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
93
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
94
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
95
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
96
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
97
- :param pulumi.Input[int] token_period: Generated Token's Period
98
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
99
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
100
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
92
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
93
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
94
+ as well.
95
+ :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
96
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
97
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
98
+ `token_max_ttl` would otherwise allow a renewal.
99
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
100
+ Its current value will be referenced at renewal time.
101
+ :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
102
+ generated tokens; otherwise it will be added to the policies set in token_policies.
103
+ :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/jwt#token_num_uses)
104
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
105
+ :param pulumi.Input[int] token_period: If set, indicates that the
106
+ token generated using this role should never expire. The token should be renewed within the
107
+ duration specified by this value. At each renewal, the token's TTL will be set to the
108
+ value of this field. Specified in seconds.
109
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
110
+ on the auth method, this list may be supplemented by user/group/other values.
111
+ :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
112
+ Its current value will be referenced at renewal time.
113
+ :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
114
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
115
+ `service` tokens). For token store roles, there are two additional possibilities:
116
+ `default-service` and `default-batch` which specify the type to return unless the client
117
+ requests a different type at generation time.
101
118
  :param pulumi.Input[bool] user_claim_json_pointer: Specifies if the `user_claim` value uses
102
119
  [JSON pointer](https://www.vaultproject.io/docs/auth/jwt#claim-specifications-and-json-pointer)
103
120
  syntax for referencing claims. By default, the `user_claim` value will not use JSON pointer.
@@ -409,7 +426,9 @@ class AuthBackendRoleArgs:
409
426
  @pulumi.getter(name="tokenBoundCidrs")
410
427
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
411
428
  """
412
- Specifies the blocks of IP addresses which are allowed to use the generated token
429
+ List of CIDR blocks; if set, specifies blocks of IP
430
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
431
+ as well.
413
432
  """
414
433
  return pulumi.get(self, "token_bound_cidrs")
415
434
 
@@ -421,7 +440,10 @@ class AuthBackendRoleArgs:
421
440
  @pulumi.getter(name="tokenExplicitMaxTtl")
422
441
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
423
442
  """
424
- Generated Token's Explicit Maximum TTL in seconds
443
+ If set, will encode an
444
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
445
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
446
+ `token_max_ttl` would otherwise allow a renewal.
425
447
  """
426
448
  return pulumi.get(self, "token_explicit_max_ttl")
427
449
 
@@ -433,7 +455,8 @@ class AuthBackendRoleArgs:
433
455
  @pulumi.getter(name="tokenMaxTtl")
434
456
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
435
457
  """
436
- The maximum lifetime of the generated token
458
+ The maximum lifetime for generated tokens in number of seconds.
459
+ Its current value will be referenced at renewal time.
437
460
  """
438
461
  return pulumi.get(self, "token_max_ttl")
439
462
 
@@ -445,7 +468,8 @@ class AuthBackendRoleArgs:
445
468
  @pulumi.getter(name="tokenNoDefaultPolicy")
446
469
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
447
470
  """
448
- If true, the 'default' policy will not automatically be added to generated tokens
471
+ If set, the default policy will not be set on
472
+ generated tokens; otherwise it will be added to the policies set in token_policies.
449
473
  """
450
474
  return pulumi.get(self, "token_no_default_policy")
451
475
 
@@ -457,7 +481,8 @@ class AuthBackendRoleArgs:
457
481
  @pulumi.getter(name="tokenNumUses")
458
482
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
459
483
  """
460
- The maximum number of times a token may be used, a value of zero means unlimited
484
+ The [maximum number](https://www.vaultproject.io/api-docs/jwt#token_num_uses)
485
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
461
486
  """
462
487
  return pulumi.get(self, "token_num_uses")
463
488
 
@@ -469,7 +494,10 @@ class AuthBackendRoleArgs:
469
494
  @pulumi.getter(name="tokenPeriod")
470
495
  def token_period(self) -> Optional[pulumi.Input[int]]:
471
496
  """
472
- Generated Token's Period
497
+ If set, indicates that the
498
+ token generated using this role should never expire. The token should be renewed within the
499
+ duration specified by this value. At each renewal, the token's TTL will be set to the
500
+ value of this field. Specified in seconds.
473
501
  """
474
502
  return pulumi.get(self, "token_period")
475
503
 
@@ -481,7 +509,8 @@ class AuthBackendRoleArgs:
481
509
  @pulumi.getter(name="tokenPolicies")
482
510
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
483
511
  """
484
- Generated Token's Policies
512
+ List of policies to encode onto generated tokens. Depending
513
+ on the auth method, this list may be supplemented by user/group/other values.
485
514
  """
486
515
  return pulumi.get(self, "token_policies")
487
516
 
@@ -493,7 +522,8 @@ class AuthBackendRoleArgs:
493
522
  @pulumi.getter(name="tokenTtl")
494
523
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
495
524
  """
496
- The initial ttl of the token to generate in seconds
525
+ The incremental lifetime for generated tokens in number of seconds.
526
+ Its current value will be referenced at renewal time.
497
527
  """
498
528
  return pulumi.get(self, "token_ttl")
499
529
 
@@ -505,7 +535,11 @@ class AuthBackendRoleArgs:
505
535
  @pulumi.getter(name="tokenType")
506
536
  def token_type(self) -> Optional[pulumi.Input[str]]:
507
537
  """
508
- The type of token to generate, service or batch
538
+ The type of token that should be generated. Can be `service`,
539
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
540
+ `service` tokens). For token store roles, there are two additional possibilities:
541
+ `default-service` and `default-batch` which specify the type to return unless the client
542
+ requests a different type at generation time.
509
543
  """
510
544
  return pulumi.get(self, "token_type")
511
545
 
@@ -618,15 +652,32 @@ class _AuthBackendRoleState:
618
652
  The standard scope "openid" is automatically included and need not be specified.
619
653
  :param pulumi.Input[str] role_name: The name of the role.
620
654
  :param pulumi.Input[str] role_type: Type of role, either "oidc" (default) or "jwt".
621
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
622
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
623
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
624
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
625
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
626
- :param pulumi.Input[int] token_period: Generated Token's Period
627
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
628
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
629
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
655
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
656
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
657
+ as well.
658
+ :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
659
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
660
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
661
+ `token_max_ttl` would otherwise allow a renewal.
662
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
663
+ Its current value will be referenced at renewal time.
664
+ :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
665
+ generated tokens; otherwise it will be added to the policies set in token_policies.
666
+ :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/jwt#token_num_uses)
667
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
668
+ :param pulumi.Input[int] token_period: If set, indicates that the
669
+ token generated using this role should never expire. The token should be renewed within the
670
+ duration specified by this value. At each renewal, the token's TTL will be set to the
671
+ value of this field. Specified in seconds.
672
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
673
+ on the auth method, this list may be supplemented by user/group/other values.
674
+ :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
675
+ Its current value will be referenced at renewal time.
676
+ :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
677
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
678
+ `service` tokens). For token store roles, there are two additional possibilities:
679
+ `default-service` and `default-batch` which specify the type to return unless the client
680
+ requests a different type at generation time.
630
681
  :param pulumi.Input[str] user_claim: The claim to use to uniquely identify
631
682
  the user; this will be used as the name for the Identity entity alias created
632
683
  due to a successful login.
@@ -929,7 +980,9 @@ class _AuthBackendRoleState:
929
980
  @pulumi.getter(name="tokenBoundCidrs")
930
981
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
931
982
  """
932
- Specifies the blocks of IP addresses which are allowed to use the generated token
983
+ List of CIDR blocks; if set, specifies blocks of IP
984
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
985
+ as well.
933
986
  """
934
987
  return pulumi.get(self, "token_bound_cidrs")
935
988
 
@@ -941,7 +994,10 @@ class _AuthBackendRoleState:
941
994
  @pulumi.getter(name="tokenExplicitMaxTtl")
942
995
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
943
996
  """
944
- Generated Token's Explicit Maximum TTL in seconds
997
+ If set, will encode an
998
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
999
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1000
+ `token_max_ttl` would otherwise allow a renewal.
945
1001
  """
946
1002
  return pulumi.get(self, "token_explicit_max_ttl")
947
1003
 
@@ -953,7 +1009,8 @@ class _AuthBackendRoleState:
953
1009
  @pulumi.getter(name="tokenMaxTtl")
954
1010
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
955
1011
  """
956
- The maximum lifetime of the generated token
1012
+ The maximum lifetime for generated tokens in number of seconds.
1013
+ Its current value will be referenced at renewal time.
957
1014
  """
958
1015
  return pulumi.get(self, "token_max_ttl")
959
1016
 
@@ -965,7 +1022,8 @@ class _AuthBackendRoleState:
965
1022
  @pulumi.getter(name="tokenNoDefaultPolicy")
966
1023
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
967
1024
  """
968
- If true, the 'default' policy will not automatically be added to generated tokens
1025
+ If set, the default policy will not be set on
1026
+ generated tokens; otherwise it will be added to the policies set in token_policies.
969
1027
  """
970
1028
  return pulumi.get(self, "token_no_default_policy")
971
1029
 
@@ -977,7 +1035,8 @@ class _AuthBackendRoleState:
977
1035
  @pulumi.getter(name="tokenNumUses")
978
1036
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
979
1037
  """
980
- The maximum number of times a token may be used, a value of zero means unlimited
1038
+ The [maximum number](https://www.vaultproject.io/api-docs/jwt#token_num_uses)
1039
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
981
1040
  """
982
1041
  return pulumi.get(self, "token_num_uses")
983
1042
 
@@ -989,7 +1048,10 @@ class _AuthBackendRoleState:
989
1048
  @pulumi.getter(name="tokenPeriod")
990
1049
  def token_period(self) -> Optional[pulumi.Input[int]]:
991
1050
  """
992
- Generated Token's Period
1051
+ If set, indicates that the
1052
+ token generated using this role should never expire. The token should be renewed within the
1053
+ duration specified by this value. At each renewal, the token's TTL will be set to the
1054
+ value of this field. Specified in seconds.
993
1055
  """
994
1056
  return pulumi.get(self, "token_period")
995
1057
 
@@ -1001,7 +1063,8 @@ class _AuthBackendRoleState:
1001
1063
  @pulumi.getter(name="tokenPolicies")
1002
1064
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
1003
1065
  """
1004
- Generated Token's Policies
1066
+ List of policies to encode onto generated tokens. Depending
1067
+ on the auth method, this list may be supplemented by user/group/other values.
1005
1068
  """
1006
1069
  return pulumi.get(self, "token_policies")
1007
1070
 
@@ -1013,7 +1076,8 @@ class _AuthBackendRoleState:
1013
1076
  @pulumi.getter(name="tokenTtl")
1014
1077
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
1015
1078
  """
1016
- The initial ttl of the token to generate in seconds
1079
+ The incremental lifetime for generated tokens in number of seconds.
1080
+ Its current value will be referenced at renewal time.
1017
1081
  """
1018
1082
  return pulumi.get(self, "token_ttl")
1019
1083
 
@@ -1025,7 +1089,11 @@ class _AuthBackendRoleState:
1025
1089
  @pulumi.getter(name="tokenType")
1026
1090
  def token_type(self) -> Optional[pulumi.Input[str]]:
1027
1091
  """
1028
- The type of token to generate, service or batch
1092
+ The type of token that should be generated. Can be `service`,
1093
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
1094
+ `service` tokens). For token store roles, there are two additional possibilities:
1095
+ `default-service` and `default-batch` which specify the type to return unless the client
1096
+ requests a different type at generation time.
1029
1097
  """
1030
1098
  return pulumi.get(self, "token_type")
1031
1099
 
@@ -1121,6 +1189,7 @@ class AuthBackendRole(pulumi.CustomResource):
1121
1189
 
1122
1190
  Role for JWT backend:
1123
1191
 
1192
+ <!--Start PulumiCodeChooser -->
1124
1193
  ```python
1125
1194
  import pulumi
1126
1195
  import pulumi_vault as vault
@@ -1141,9 +1210,11 @@ class AuthBackendRole(pulumi.CustomResource):
1141
1210
  user_claim="https://vault/user",
1142
1211
  role_type="jwt")
1143
1212
  ```
1213
+ <!--End PulumiCodeChooser -->
1144
1214
 
1145
1215
  Role for OIDC backend:
1146
1216
 
1217
+ <!--Start PulumiCodeChooser -->
1147
1218
  ```python
1148
1219
  import pulumi
1149
1220
  import pulumi_vault as vault
@@ -1163,6 +1234,7 @@ class AuthBackendRole(pulumi.CustomResource):
1163
1234
  role_type="oidc",
1164
1235
  allowed_redirect_uris=["http://localhost:8200/ui/vault/auth/oidc/oidc/callback"])
1165
1236
  ```
1237
+ <!--End PulumiCodeChooser -->
1166
1238
 
1167
1239
  ## Import
1168
1240
 
@@ -1215,15 +1287,32 @@ class AuthBackendRole(pulumi.CustomResource):
1215
1287
  The standard scope "openid" is automatically included and need not be specified.
1216
1288
  :param pulumi.Input[str] role_name: The name of the role.
1217
1289
  :param pulumi.Input[str] role_type: Type of role, either "oidc" (default) or "jwt".
1218
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
1219
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
1220
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
1221
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
1222
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
1223
- :param pulumi.Input[int] token_period: Generated Token's Period
1224
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
1225
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
1226
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
1290
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
1291
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
1292
+ as well.
1293
+ :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
1294
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1295
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1296
+ `token_max_ttl` would otherwise allow a renewal.
1297
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
1298
+ Its current value will be referenced at renewal time.
1299
+ :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
1300
+ generated tokens; otherwise it will be added to the policies set in token_policies.
1301
+ :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/jwt#token_num_uses)
1302
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
1303
+ :param pulumi.Input[int] token_period: If set, indicates that the
1304
+ token generated using this role should never expire. The token should be renewed within the
1305
+ duration specified by this value. At each renewal, the token's TTL will be set to the
1306
+ value of this field. Specified in seconds.
1307
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
1308
+ on the auth method, this list may be supplemented by user/group/other values.
1309
+ :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
1310
+ Its current value will be referenced at renewal time.
1311
+ :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
1312
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
1313
+ `service` tokens). For token store roles, there are two additional possibilities:
1314
+ `default-service` and `default-batch` which specify the type to return unless the client
1315
+ requests a different type at generation time.
1227
1316
  :param pulumi.Input[str] user_claim: The claim to use to uniquely identify
1228
1317
  the user; this will be used as the name for the Identity entity alias created
1229
1318
  due to a successful login.
@@ -1250,6 +1339,7 @@ class AuthBackendRole(pulumi.CustomResource):
1250
1339
 
1251
1340
  Role for JWT backend:
1252
1341
 
1342
+ <!--Start PulumiCodeChooser -->
1253
1343
  ```python
1254
1344
  import pulumi
1255
1345
  import pulumi_vault as vault
@@ -1270,9 +1360,11 @@ class AuthBackendRole(pulumi.CustomResource):
1270
1360
  user_claim="https://vault/user",
1271
1361
  role_type="jwt")
1272
1362
  ```
1363
+ <!--End PulumiCodeChooser -->
1273
1364
 
1274
1365
  Role for OIDC backend:
1275
1366
 
1367
+ <!--Start PulumiCodeChooser -->
1276
1368
  ```python
1277
1369
  import pulumi
1278
1370
  import pulumi_vault as vault
@@ -1292,6 +1384,7 @@ class AuthBackendRole(pulumi.CustomResource):
1292
1384
  role_type="oidc",
1293
1385
  allowed_redirect_uris=["http://localhost:8200/ui/vault/auth/oidc/oidc/callback"])
1294
1386
  ```
1387
+ <!--End PulumiCodeChooser -->
1295
1388
 
1296
1389
  ## Import
1297
1390
 
@@ -1474,15 +1567,32 @@ class AuthBackendRole(pulumi.CustomResource):
1474
1567
  The standard scope "openid" is automatically included and need not be specified.
1475
1568
  :param pulumi.Input[str] role_name: The name of the role.
1476
1569
  :param pulumi.Input[str] role_type: Type of role, either "oidc" (default) or "jwt".
1477
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
1478
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
1479
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
1480
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
1481
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
1482
- :param pulumi.Input[int] token_period: Generated Token's Period
1483
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
1484
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
1485
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
1570
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
1571
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
1572
+ as well.
1573
+ :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
1574
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1575
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1576
+ `token_max_ttl` would otherwise allow a renewal.
1577
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
1578
+ Its current value will be referenced at renewal time.
1579
+ :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
1580
+ generated tokens; otherwise it will be added to the policies set in token_policies.
1581
+ :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/jwt#token_num_uses)
1582
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
1583
+ :param pulumi.Input[int] token_period: If set, indicates that the
1584
+ token generated using this role should never expire. The token should be renewed within the
1585
+ duration specified by this value. At each renewal, the token's TTL will be set to the
1586
+ value of this field. Specified in seconds.
1587
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
1588
+ on the auth method, this list may be supplemented by user/group/other values.
1589
+ :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
1590
+ Its current value will be referenced at renewal time.
1591
+ :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
1592
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
1593
+ `service` tokens). For token store roles, there are two additional possibilities:
1594
+ `default-service` and `default-batch` which specify the type to return unless the client
1595
+ requests a different type at generation time.
1486
1596
  :param pulumi.Input[str] user_claim: The claim to use to uniquely identify
1487
1597
  the user; this will be used as the name for the Identity entity alias created
1488
1598
  due to a successful login.
@@ -1693,7 +1803,9 @@ class AuthBackendRole(pulumi.CustomResource):
1693
1803
  @pulumi.getter(name="tokenBoundCidrs")
1694
1804
  def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
1695
1805
  """
1696
- Specifies the blocks of IP addresses which are allowed to use the generated token
1806
+ List of CIDR blocks; if set, specifies blocks of IP
1807
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
1808
+ as well.
1697
1809
  """
1698
1810
  return pulumi.get(self, "token_bound_cidrs")
1699
1811
 
@@ -1701,7 +1813,10 @@ class AuthBackendRole(pulumi.CustomResource):
1701
1813
  @pulumi.getter(name="tokenExplicitMaxTtl")
1702
1814
  def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
1703
1815
  """
1704
- Generated Token's Explicit Maximum TTL in seconds
1816
+ If set, will encode an
1817
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1818
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1819
+ `token_max_ttl` would otherwise allow a renewal.
1705
1820
  """
1706
1821
  return pulumi.get(self, "token_explicit_max_ttl")
1707
1822
 
@@ -1709,7 +1824,8 @@ class AuthBackendRole(pulumi.CustomResource):
1709
1824
  @pulumi.getter(name="tokenMaxTtl")
1710
1825
  def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
1711
1826
  """
1712
- The maximum lifetime of the generated token
1827
+ The maximum lifetime for generated tokens in number of seconds.
1828
+ Its current value will be referenced at renewal time.
1713
1829
  """
1714
1830
  return pulumi.get(self, "token_max_ttl")
1715
1831
 
@@ -1717,7 +1833,8 @@ class AuthBackendRole(pulumi.CustomResource):
1717
1833
  @pulumi.getter(name="tokenNoDefaultPolicy")
1718
1834
  def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
1719
1835
  """
1720
- If true, the 'default' policy will not automatically be added to generated tokens
1836
+ If set, the default policy will not be set on
1837
+ generated tokens; otherwise it will be added to the policies set in token_policies.
1721
1838
  """
1722
1839
  return pulumi.get(self, "token_no_default_policy")
1723
1840
 
@@ -1725,7 +1842,8 @@ class AuthBackendRole(pulumi.CustomResource):
1725
1842
  @pulumi.getter(name="tokenNumUses")
1726
1843
  def token_num_uses(self) -> pulumi.Output[Optional[int]]:
1727
1844
  """
1728
- The maximum number of times a token may be used, a value of zero means unlimited
1845
+ The [maximum number](https://www.vaultproject.io/api-docs/jwt#token_num_uses)
1846
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
1729
1847
  """
1730
1848
  return pulumi.get(self, "token_num_uses")
1731
1849
 
@@ -1733,7 +1851,10 @@ class AuthBackendRole(pulumi.CustomResource):
1733
1851
  @pulumi.getter(name="tokenPeriod")
1734
1852
  def token_period(self) -> pulumi.Output[Optional[int]]:
1735
1853
  """
1736
- Generated Token's Period
1854
+ If set, indicates that the
1855
+ token generated using this role should never expire. The token should be renewed within the
1856
+ duration specified by this value. At each renewal, the token's TTL will be set to the
1857
+ value of this field. Specified in seconds.
1737
1858
  """
1738
1859
  return pulumi.get(self, "token_period")
1739
1860
 
@@ -1741,7 +1862,8 @@ class AuthBackendRole(pulumi.CustomResource):
1741
1862
  @pulumi.getter(name="tokenPolicies")
1742
1863
  def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
1743
1864
  """
1744
- Generated Token's Policies
1865
+ List of policies to encode onto generated tokens. Depending
1866
+ on the auth method, this list may be supplemented by user/group/other values.
1745
1867
  """
1746
1868
  return pulumi.get(self, "token_policies")
1747
1869
 
@@ -1749,7 +1871,8 @@ class AuthBackendRole(pulumi.CustomResource):
1749
1871
  @pulumi.getter(name="tokenTtl")
1750
1872
  def token_ttl(self) -> pulumi.Output[Optional[int]]:
1751
1873
  """
1752
- The initial ttl of the token to generate in seconds
1874
+ The incremental lifetime for generated tokens in number of seconds.
1875
+ Its current value will be referenced at renewal time.
1753
1876
  """
1754
1877
  return pulumi.get(self, "token_ttl")
1755
1878
 
@@ -1757,7 +1880,11 @@ class AuthBackendRole(pulumi.CustomResource):
1757
1880
  @pulumi.getter(name="tokenType")
1758
1881
  def token_type(self) -> pulumi.Output[Optional[str]]:
1759
1882
  """
1760
- The type of token to generate, service or batch
1883
+ The type of token that should be generated. Can be `service`,
1884
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
1885
+ `service` tokens). For token store roles, there are two additional possibilities:
1886
+ `default-service` and `default-batch` which specify the type to return unless the client
1887
+ requests a different type at generation time.
1761
1888
  """
1762
1889
  return pulumi.get(self, "token_type")
1763
1890
 
@@ -488,23 +488,25 @@ class SecretBackend(pulumi.CustomResource):
488
488
 
489
489
  ## Example Usage
490
490
 
491
+ <!--Start PulumiCodeChooser -->
491
492
  ```python
492
493
  import pulumi
493
494
  import pulumi_vault as vault
494
495
 
495
496
  default = vault.kmip.SecretBackend("default",
496
- path="kmip",
497
+ default_tls_client_key_bits=4096,
498
+ default_tls_client_key_type="rsa",
499
+ default_tls_client_ttl=86400,
497
500
  description="Vault KMIP backend",
498
501
  listen_addrs=[
499
502
  "127.0.0.1:5696",
500
503
  "127.0.0.1:8080",
501
504
  ],
502
- tls_ca_key_type="rsa",
505
+ path="kmip",
503
506
  tls_ca_key_bits=4096,
504
- default_tls_client_key_type="rsa",
505
- default_tls_client_key_bits=4096,
506
- default_tls_client_ttl=86400)
507
+ tls_ca_key_type="rsa")
507
508
  ```
509
+ <!--End PulumiCodeChooser -->
508
510
 
509
511
  ## Import
510
512
 
@@ -548,23 +550,25 @@ class SecretBackend(pulumi.CustomResource):
548
550
 
549
551
  ## Example Usage
550
552
 
553
+ <!--Start PulumiCodeChooser -->
551
554
  ```python
552
555
  import pulumi
553
556
  import pulumi_vault as vault
554
557
 
555
558
  default = vault.kmip.SecretBackend("default",
556
- path="kmip",
559
+ default_tls_client_key_bits=4096,
560
+ default_tls_client_key_type="rsa",
561
+ default_tls_client_ttl=86400,
557
562
  description="Vault KMIP backend",
558
563
  listen_addrs=[
559
564
  "127.0.0.1:5696",
560
565
  "127.0.0.1:8080",
561
566
  ],
562
- tls_ca_key_type="rsa",
567
+ path="kmip",
563
568
  tls_ca_key_bits=4096,
564
- default_tls_client_key_type="rsa",
565
- default_tls_client_key_bits=4096,
566
- default_tls_client_ttl=86400)
569
+ tls_ca_key_type="rsa")
567
570
  ```
571
+ <!--End PulumiCodeChooser -->
568
572
 
569
573
  ## Import
570
574
 
@@ -746,6 +746,7 @@ class SecretRole(pulumi.CustomResource):
746
746
 
747
747
  ## Example Usage
748
748
 
749
+ <!--Start PulumiCodeChooser -->
749
750
  ```python
750
751
  import pulumi
751
752
  import pulumi_vault as vault
@@ -769,6 +770,7 @@ class SecretRole(pulumi.CustomResource):
769
770
  operation_create=True,
770
771
  operation_destroy=True)
771
772
  ```
773
+ <!--End PulumiCodeChooser -->
772
774
 
773
775
  ## Import
774
776
 
@@ -819,6 +821,7 @@ class SecretRole(pulumi.CustomResource):
819
821
 
820
822
  ## Example Usage
821
823
 
824
+ <!--Start PulumiCodeChooser -->
822
825
  ```python
823
826
  import pulumi
824
827
  import pulumi_vault as vault
@@ -842,6 +845,7 @@ class SecretRole(pulumi.CustomResource):
842
845
  operation_create=True,
843
846
  operation_destroy=True)
844
847
  ```
848
+ <!--End PulumiCodeChooser -->
845
849
 
846
850
  ## Import
847
851
 
@@ -186,6 +186,7 @@ class SecretScope(pulumi.CustomResource):
186
186
 
187
187
  ## Example Usage
188
188
 
189
+ <!--Start PulumiCodeChooser -->
189
190
  ```python
190
191
  import pulumi
191
192
  import pulumi_vault as vault
@@ -198,6 +199,7 @@ class SecretScope(pulumi.CustomResource):
198
199
  scope="dev",
199
200
  force=True)
200
201
  ```
202
+ <!--End PulumiCodeChooser -->
201
203
 
202
204
  ## Import
203
205
 
@@ -231,6 +233,7 @@ class SecretScope(pulumi.CustomResource):
231
233
 
232
234
  ## Example Usage
233
235
 
236
+ <!--Start PulumiCodeChooser -->
234
237
  ```python
235
238
  import pulumi
236
239
  import pulumi_vault as vault
@@ -243,6 +246,7 @@ class SecretScope(pulumi.CustomResource):
243
246
  scope="dev",
244
247
  force=True)
245
248
  ```
249
+ <!--End PulumiCodeChooser -->
246
250
 
247
251
  ## Import
248
252