pulumi-vault 6.1.1a1717550614__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +20 -0
- pulumi_vault/ad/secret_backend.py +6 -2
- pulumi_vault/ad/secret_library.py +4 -2
- pulumi_vault/ad/secret_role.py +4 -0
- pulumi_vault/alicloud/auth_backend_role.py +192 -69
- pulumi_vault/approle/auth_backend_login.py +4 -0
- pulumi_vault/approle/auth_backend_role.py +186 -63
- pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
- pulumi_vault/audit.py +20 -12
- pulumi_vault/audit_request_header.py +6 -6
- pulumi_vault/aws/auth_backend_client.py +10 -6
- pulumi_vault/aws/auth_backend_config_identity.py +4 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
- pulumi_vault/aws/auth_backend_login.py +8 -0
- pulumi_vault/aws/auth_backend_role.py +186 -63
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
- pulumi_vault/aws/auth_backend_sts_role.py +4 -0
- pulumi_vault/aws/secret_backend_role.py +4 -2
- pulumi_vault/aws/secret_backend_static_role.py +4 -2
- pulumi_vault/azure/auth_backend_config.py +10 -6
- pulumi_vault/azure/auth_backend_role.py +186 -63
- pulumi_vault/azure/backend.py +24 -16
- pulumi_vault/azure/backend_role.py +18 -14
- pulumi_vault/azure/get_access_credentials.py +4 -0
- pulumi_vault/cert_auth_backend_role.py +208 -75
- pulumi_vault/consul/secret_backend.py +18 -10
- pulumi_vault/consul/secret_backend_role.py +4 -2
- pulumi_vault/database/_inputs.py +784 -522
- pulumi_vault/database/outputs.py +784 -522
- pulumi_vault/database/secret_backend_connection.py +4 -2
- pulumi_vault/database/secret_backend_role.py +4 -4
- pulumi_vault/database/secret_backend_static_role.py +8 -10
- pulumi_vault/database/secrets_mount.py +4 -4
- pulumi_vault/egp_policy.py +8 -4
- pulumi_vault/gcp/auth_backend.py +36 -0
- pulumi_vault/gcp/auth_backend_role.py +264 -63
- pulumi_vault/gcp/get_auth_backend_role.py +4 -0
- pulumi_vault/gcp/secret_backend.py +6 -4
- pulumi_vault/gcp/secret_impersonated_account.py +14 -12
- pulumi_vault/gcp/secret_roleset.py +6 -4
- pulumi_vault/gcp/secret_static_account.py +16 -14
- pulumi_vault/generic/endpoint.py +8 -4
- pulumi_vault/generic/get_secret.py +4 -40
- pulumi_vault/get_auth_backend.py +4 -0
- pulumi_vault/get_auth_backends.py +8 -0
- pulumi_vault/get_namespace.py +12 -0
- pulumi_vault/get_namespaces.py +12 -4
- pulumi_vault/get_nomad_access_token.py +4 -0
- pulumi_vault/get_policy_document.py +8 -8
- pulumi_vault/get_raft_autopilot_state.py +4 -0
- pulumi_vault/github/auth_backend.py +4 -0
- pulumi_vault/github/team.py +6 -2
- pulumi_vault/github/user.py +6 -2
- pulumi_vault/identity/entity.py +8 -6
- pulumi_vault/identity/entity_alias.py +8 -6
- pulumi_vault/identity/entity_policies.py +12 -12
- pulumi_vault/identity/get_entity.py +4 -0
- pulumi_vault/identity/get_group.py +4 -0
- pulumi_vault/identity/get_oidc_client_creds.py +4 -2
- pulumi_vault/identity/get_oidc_openid_config.py +6 -10
- pulumi_vault/identity/get_oidc_public_keys.py +6 -10
- pulumi_vault/identity/group.py +42 -38
- pulumi_vault/identity/group_alias.py +4 -2
- pulumi_vault/identity/group_member_entity_ids.py +16 -12
- pulumi_vault/identity/group_member_group_ids.py +20 -24
- pulumi_vault/identity/group_policies.py +8 -4
- pulumi_vault/identity/mfa_duo.py +8 -4
- pulumi_vault/identity/mfa_login_enforcement.py +8 -8
- pulumi_vault/identity/mfa_okta.py +8 -4
- pulumi_vault/identity/mfa_pingid.py +4 -0
- pulumi_vault/identity/mfa_totp.py +4 -0
- pulumi_vault/identity/oidc.py +4 -0
- pulumi_vault/identity/oidc_assignment.py +6 -10
- pulumi_vault/identity/oidc_client.py +10 -10
- pulumi_vault/identity/oidc_key.py +12 -16
- pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
- pulumi_vault/identity/oidc_provider.py +16 -22
- pulumi_vault/identity/oidc_role.py +20 -28
- pulumi_vault/identity/oidc_scope.py +8 -6
- pulumi_vault/jwt/auth_backend.py +32 -20
- pulumi_vault/jwt/auth_backend_role.py +190 -63
- pulumi_vault/kmip/secret_backend.py +14 -10
- pulumi_vault/kmip/secret_role.py +4 -0
- pulumi_vault/kmip/secret_scope.py +4 -0
- pulumi_vault/kubernetes/auth_backend_config.py +4 -0
- pulumi_vault/kubernetes/auth_backend_role.py +172 -56
- pulumi_vault/kubernetes/get_service_account_token.py +8 -8
- pulumi_vault/kubernetes/secret_backend.py +8 -6
- pulumi_vault/kubernetes/secret_backend_role.py +24 -24
- pulumi_vault/kv/get_secret.py +4 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
- pulumi_vault/kv/get_secret_v2.py +0 -58
- pulumi_vault/kv/get_secrets_list.py +8 -4
- pulumi_vault/kv/get_secrets_list_v2.py +12 -14
- pulumi_vault/kv/secret.py +4 -0
- pulumi_vault/kv/secret_backend_v2.py +4 -0
- pulumi_vault/kv/secret_v2.py +4 -2
- pulumi_vault/ldap/auth_backend.py +161 -66
- pulumi_vault/ldap/auth_backend_group.py +4 -0
- pulumi_vault/ldap/auth_backend_user.py +4 -0
- pulumi_vault/ldap/secret_backend.py +8 -4
- pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
- pulumi_vault/ldap/secret_backend_library_set.py +4 -2
- pulumi_vault/ldap/secret_backend_static_role.py +4 -0
- pulumi_vault/managed/_inputs.py +132 -84
- pulumi_vault/managed/keys.py +28 -7
- pulumi_vault/managed/outputs.py +132 -84
- pulumi_vault/mfa_duo.py +6 -4
- pulumi_vault/mfa_okta.py +6 -4
- pulumi_vault/mfa_pingid.py +6 -4
- pulumi_vault/mfa_totp.py +12 -10
- pulumi_vault/mongodbatlas/secret_backend.py +4 -0
- pulumi_vault/mongodbatlas/secret_role.py +4 -2
- pulumi_vault/mount.py +42 -26
- pulumi_vault/nomad_secret_backend.py +8 -4
- pulumi_vault/nomad_secret_role.py +4 -0
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +10 -6
- pulumi_vault/okta/auth_backend_group.py +4 -0
- pulumi_vault/okta/auth_backend_user.py +4 -0
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +20 -0
- pulumi_vault/password_policy.py +8 -6
- pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
- pulumi_vault/pkisecret/get_backend_key.py +6 -2
- pulumi_vault/pkisecret/get_backend_keys.py +4 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
- pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
- pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
- pulumi_vault/pkisecret/secret_backend_role.py +4 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
- pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
- pulumi_vault/provider.py +8 -0
- pulumi_vault/pulumi-plugin.json +1 -2
- pulumi_vault/quota_lease_count.py +8 -6
- pulumi_vault/quota_rate_limit.py +4 -2
- pulumi_vault/rabbitmq/secret_backend.py +8 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
- pulumi_vault/raft_autopilot.py +4 -0
- pulumi_vault/raft_snapshot_agent_config.py +304 -109
- pulumi_vault/rgp_policy.py +6 -2
- pulumi_vault/saml/auth_backend.py +12 -8
- pulumi_vault/saml/auth_backend_role.py +178 -64
- pulumi_vault/secrets/sync_association.py +10 -12
- pulumi_vault/secrets/sync_aws_destination.py +8 -6
- pulumi_vault/secrets/sync_azure_destination.py +12 -10
- pulumi_vault/secrets/sync_config.py +6 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -6
- pulumi_vault/secrets/sync_gh_destination.py +8 -6
- pulumi_vault/secrets/sync_github_apps.py +8 -8
- pulumi_vault/secrets/sync_vercel_destination.py +8 -6
- pulumi_vault/ssh/_inputs.py +32 -6
- pulumi_vault/ssh/outputs.py +32 -6
- pulumi_vault/ssh/secret_backend_ca.py +4 -0
- pulumi_vault/ssh/secret_backend_role.py +4 -4
- pulumi_vault/terraformcloud/secret_backend.py +56 -0
- pulumi_vault/terraformcloud/secret_creds.py +17 -2
- pulumi_vault/terraformcloud/secret_role.py +69 -2
- pulumi_vault/token.py +18 -14
- pulumi_vault/tokenauth/auth_backend_role.py +180 -64
- pulumi_vault/transform/alphabet.py +6 -4
- pulumi_vault/transform/get_decode.py +4 -4
- pulumi_vault/transform/get_encode.py +4 -4
- pulumi_vault/transform/role.py +6 -4
- pulumi_vault/transform/template.py +4 -4
- pulumi_vault/transit/get_decrypt.py +20 -4
- pulumi_vault/transit/get_encrypt.py +14 -0
- pulumi_vault/transit/secret_backend_key.py +6 -6
- pulumi_vault/transit/secret_cache_config.py +4 -0
- {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
- pulumi_vault-6.1.1a1717550614.dist-info/RECORD +0 -252
- {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -89,15 +89,32 @@ class AuthBackendRoleArgs:
|
|
89
89
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] oidc_scopes: If set, a list of OIDC scopes to be used with an OIDC role.
|
90
90
|
The standard scope "openid" is automatically included and need not be specified.
|
91
91
|
:param pulumi.Input[str] role_type: Type of role, either "oidc" (default) or "jwt".
|
92
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
93
|
-
|
94
|
-
|
95
|
-
:param pulumi.Input[
|
96
|
-
|
97
|
-
|
98
|
-
|
99
|
-
:param pulumi.Input[int]
|
100
|
-
|
92
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
93
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
94
|
+
as well.
|
95
|
+
:param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
|
96
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
97
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
98
|
+
`token_max_ttl` would otherwise allow a renewal.
|
99
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
100
|
+
Its current value will be referenced at renewal time.
|
101
|
+
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
102
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
103
|
+
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/jwt#token_num_uses)
|
104
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
105
|
+
:param pulumi.Input[int] token_period: If set, indicates that the
|
106
|
+
token generated using this role should never expire. The token should be renewed within the
|
107
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
108
|
+
value of this field. Specified in seconds.
|
109
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
110
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
111
|
+
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
112
|
+
Its current value will be referenced at renewal time.
|
113
|
+
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
114
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
115
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
116
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
117
|
+
requests a different type at generation time.
|
101
118
|
:param pulumi.Input[bool] user_claim_json_pointer: Specifies if the `user_claim` value uses
|
102
119
|
[JSON pointer](https://www.vaultproject.io/docs/auth/jwt#claim-specifications-and-json-pointer)
|
103
120
|
syntax for referencing claims. By default, the `user_claim` value will not use JSON pointer.
|
@@ -409,7 +426,9 @@ class AuthBackendRoleArgs:
|
|
409
426
|
@pulumi.getter(name="tokenBoundCidrs")
|
410
427
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
411
428
|
"""
|
412
|
-
|
429
|
+
List of CIDR blocks; if set, specifies blocks of IP
|
430
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
431
|
+
as well.
|
413
432
|
"""
|
414
433
|
return pulumi.get(self, "token_bound_cidrs")
|
415
434
|
|
@@ -421,7 +440,10 @@ class AuthBackendRoleArgs:
|
|
421
440
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
422
441
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
423
442
|
"""
|
424
|
-
|
443
|
+
If set, will encode an
|
444
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
445
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
446
|
+
`token_max_ttl` would otherwise allow a renewal.
|
425
447
|
"""
|
426
448
|
return pulumi.get(self, "token_explicit_max_ttl")
|
427
449
|
|
@@ -433,7 +455,8 @@ class AuthBackendRoleArgs:
|
|
433
455
|
@pulumi.getter(name="tokenMaxTtl")
|
434
456
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
435
457
|
"""
|
436
|
-
The maximum lifetime
|
458
|
+
The maximum lifetime for generated tokens in number of seconds.
|
459
|
+
Its current value will be referenced at renewal time.
|
437
460
|
"""
|
438
461
|
return pulumi.get(self, "token_max_ttl")
|
439
462
|
|
@@ -445,7 +468,8 @@ class AuthBackendRoleArgs:
|
|
445
468
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
446
469
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
447
470
|
"""
|
448
|
-
If
|
471
|
+
If set, the default policy will not be set on
|
472
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
449
473
|
"""
|
450
474
|
return pulumi.get(self, "token_no_default_policy")
|
451
475
|
|
@@ -457,7 +481,8 @@ class AuthBackendRoleArgs:
|
|
457
481
|
@pulumi.getter(name="tokenNumUses")
|
458
482
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
459
483
|
"""
|
460
|
-
The maximum number
|
484
|
+
The [maximum number](https://www.vaultproject.io/api-docs/jwt#token_num_uses)
|
485
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
461
486
|
"""
|
462
487
|
return pulumi.get(self, "token_num_uses")
|
463
488
|
|
@@ -469,7 +494,10 @@ class AuthBackendRoleArgs:
|
|
469
494
|
@pulumi.getter(name="tokenPeriod")
|
470
495
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
471
496
|
"""
|
472
|
-
|
497
|
+
If set, indicates that the
|
498
|
+
token generated using this role should never expire. The token should be renewed within the
|
499
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
500
|
+
value of this field. Specified in seconds.
|
473
501
|
"""
|
474
502
|
return pulumi.get(self, "token_period")
|
475
503
|
|
@@ -481,7 +509,8 @@ class AuthBackendRoleArgs:
|
|
481
509
|
@pulumi.getter(name="tokenPolicies")
|
482
510
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
483
511
|
"""
|
484
|
-
|
512
|
+
List of policies to encode onto generated tokens. Depending
|
513
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
485
514
|
"""
|
486
515
|
return pulumi.get(self, "token_policies")
|
487
516
|
|
@@ -493,7 +522,8 @@ class AuthBackendRoleArgs:
|
|
493
522
|
@pulumi.getter(name="tokenTtl")
|
494
523
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
495
524
|
"""
|
496
|
-
The
|
525
|
+
The incremental lifetime for generated tokens in number of seconds.
|
526
|
+
Its current value will be referenced at renewal time.
|
497
527
|
"""
|
498
528
|
return pulumi.get(self, "token_ttl")
|
499
529
|
|
@@ -505,7 +535,11 @@ class AuthBackendRoleArgs:
|
|
505
535
|
@pulumi.getter(name="tokenType")
|
506
536
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
507
537
|
"""
|
508
|
-
The type of token
|
538
|
+
The type of token that should be generated. Can be `service`,
|
539
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
540
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
541
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
542
|
+
requests a different type at generation time.
|
509
543
|
"""
|
510
544
|
return pulumi.get(self, "token_type")
|
511
545
|
|
@@ -618,15 +652,32 @@ class _AuthBackendRoleState:
|
|
618
652
|
The standard scope "openid" is automatically included and need not be specified.
|
619
653
|
:param pulumi.Input[str] role_name: The name of the role.
|
620
654
|
:param pulumi.Input[str] role_type: Type of role, either "oidc" (default) or "jwt".
|
621
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
622
|
-
|
623
|
-
|
624
|
-
:param pulumi.Input[
|
625
|
-
|
626
|
-
|
627
|
-
|
628
|
-
:param pulumi.Input[int]
|
629
|
-
|
655
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
656
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
657
|
+
as well.
|
658
|
+
:param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
|
659
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
660
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
661
|
+
`token_max_ttl` would otherwise allow a renewal.
|
662
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
663
|
+
Its current value will be referenced at renewal time.
|
664
|
+
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
665
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
666
|
+
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/jwt#token_num_uses)
|
667
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
668
|
+
:param pulumi.Input[int] token_period: If set, indicates that the
|
669
|
+
token generated using this role should never expire. The token should be renewed within the
|
670
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
671
|
+
value of this field. Specified in seconds.
|
672
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
673
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
674
|
+
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
675
|
+
Its current value will be referenced at renewal time.
|
676
|
+
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
677
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
678
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
679
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
680
|
+
requests a different type at generation time.
|
630
681
|
:param pulumi.Input[str] user_claim: The claim to use to uniquely identify
|
631
682
|
the user; this will be used as the name for the Identity entity alias created
|
632
683
|
due to a successful login.
|
@@ -929,7 +980,9 @@ class _AuthBackendRoleState:
|
|
929
980
|
@pulumi.getter(name="tokenBoundCidrs")
|
930
981
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
931
982
|
"""
|
932
|
-
|
983
|
+
List of CIDR blocks; if set, specifies blocks of IP
|
984
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
985
|
+
as well.
|
933
986
|
"""
|
934
987
|
return pulumi.get(self, "token_bound_cidrs")
|
935
988
|
|
@@ -941,7 +994,10 @@ class _AuthBackendRoleState:
|
|
941
994
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
942
995
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
943
996
|
"""
|
944
|
-
|
997
|
+
If set, will encode an
|
998
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
999
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1000
|
+
`token_max_ttl` would otherwise allow a renewal.
|
945
1001
|
"""
|
946
1002
|
return pulumi.get(self, "token_explicit_max_ttl")
|
947
1003
|
|
@@ -953,7 +1009,8 @@ class _AuthBackendRoleState:
|
|
953
1009
|
@pulumi.getter(name="tokenMaxTtl")
|
954
1010
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
955
1011
|
"""
|
956
|
-
The maximum lifetime
|
1012
|
+
The maximum lifetime for generated tokens in number of seconds.
|
1013
|
+
Its current value will be referenced at renewal time.
|
957
1014
|
"""
|
958
1015
|
return pulumi.get(self, "token_max_ttl")
|
959
1016
|
|
@@ -965,7 +1022,8 @@ class _AuthBackendRoleState:
|
|
965
1022
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
966
1023
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
967
1024
|
"""
|
968
|
-
If
|
1025
|
+
If set, the default policy will not be set on
|
1026
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
969
1027
|
"""
|
970
1028
|
return pulumi.get(self, "token_no_default_policy")
|
971
1029
|
|
@@ -977,7 +1035,8 @@ class _AuthBackendRoleState:
|
|
977
1035
|
@pulumi.getter(name="tokenNumUses")
|
978
1036
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
979
1037
|
"""
|
980
|
-
The maximum number
|
1038
|
+
The [maximum number](https://www.vaultproject.io/api-docs/jwt#token_num_uses)
|
1039
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
981
1040
|
"""
|
982
1041
|
return pulumi.get(self, "token_num_uses")
|
983
1042
|
|
@@ -989,7 +1048,10 @@ class _AuthBackendRoleState:
|
|
989
1048
|
@pulumi.getter(name="tokenPeriod")
|
990
1049
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
991
1050
|
"""
|
992
|
-
|
1051
|
+
If set, indicates that the
|
1052
|
+
token generated using this role should never expire. The token should be renewed within the
|
1053
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1054
|
+
value of this field. Specified in seconds.
|
993
1055
|
"""
|
994
1056
|
return pulumi.get(self, "token_period")
|
995
1057
|
|
@@ -1001,7 +1063,8 @@ class _AuthBackendRoleState:
|
|
1001
1063
|
@pulumi.getter(name="tokenPolicies")
|
1002
1064
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
1003
1065
|
"""
|
1004
|
-
|
1066
|
+
List of policies to encode onto generated tokens. Depending
|
1067
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
1005
1068
|
"""
|
1006
1069
|
return pulumi.get(self, "token_policies")
|
1007
1070
|
|
@@ -1013,7 +1076,8 @@ class _AuthBackendRoleState:
|
|
1013
1076
|
@pulumi.getter(name="tokenTtl")
|
1014
1077
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
1015
1078
|
"""
|
1016
|
-
The
|
1079
|
+
The incremental lifetime for generated tokens in number of seconds.
|
1080
|
+
Its current value will be referenced at renewal time.
|
1017
1081
|
"""
|
1018
1082
|
return pulumi.get(self, "token_ttl")
|
1019
1083
|
|
@@ -1025,7 +1089,11 @@ class _AuthBackendRoleState:
|
|
1025
1089
|
@pulumi.getter(name="tokenType")
|
1026
1090
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
1027
1091
|
"""
|
1028
|
-
The type of token
|
1092
|
+
The type of token that should be generated. Can be `service`,
|
1093
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1094
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
1095
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
1096
|
+
requests a different type at generation time.
|
1029
1097
|
"""
|
1030
1098
|
return pulumi.get(self, "token_type")
|
1031
1099
|
|
@@ -1121,6 +1189,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1121
1189
|
|
1122
1190
|
Role for JWT backend:
|
1123
1191
|
|
1192
|
+
<!--Start PulumiCodeChooser -->
|
1124
1193
|
```python
|
1125
1194
|
import pulumi
|
1126
1195
|
import pulumi_vault as vault
|
@@ -1141,9 +1210,11 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1141
1210
|
user_claim="https://vault/user",
|
1142
1211
|
role_type="jwt")
|
1143
1212
|
```
|
1213
|
+
<!--End PulumiCodeChooser -->
|
1144
1214
|
|
1145
1215
|
Role for OIDC backend:
|
1146
1216
|
|
1217
|
+
<!--Start PulumiCodeChooser -->
|
1147
1218
|
```python
|
1148
1219
|
import pulumi
|
1149
1220
|
import pulumi_vault as vault
|
@@ -1163,6 +1234,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1163
1234
|
role_type="oidc",
|
1164
1235
|
allowed_redirect_uris=["http://localhost:8200/ui/vault/auth/oidc/oidc/callback"])
|
1165
1236
|
```
|
1237
|
+
<!--End PulumiCodeChooser -->
|
1166
1238
|
|
1167
1239
|
## Import
|
1168
1240
|
|
@@ -1215,15 +1287,32 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1215
1287
|
The standard scope "openid" is automatically included and need not be specified.
|
1216
1288
|
:param pulumi.Input[str] role_name: The name of the role.
|
1217
1289
|
:param pulumi.Input[str] role_type: Type of role, either "oidc" (default) or "jwt".
|
1218
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
1219
|
-
|
1220
|
-
|
1221
|
-
:param pulumi.Input[
|
1222
|
-
|
1223
|
-
|
1224
|
-
|
1225
|
-
:param pulumi.Input[int]
|
1226
|
-
|
1290
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
1291
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
1292
|
+
as well.
|
1293
|
+
:param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
|
1294
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
1295
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1296
|
+
`token_max_ttl` would otherwise allow a renewal.
|
1297
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
1298
|
+
Its current value will be referenced at renewal time.
|
1299
|
+
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
1300
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1301
|
+
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/jwt#token_num_uses)
|
1302
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1303
|
+
:param pulumi.Input[int] token_period: If set, indicates that the
|
1304
|
+
token generated using this role should never expire. The token should be renewed within the
|
1305
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1306
|
+
value of this field. Specified in seconds.
|
1307
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
1308
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
1309
|
+
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
1310
|
+
Its current value will be referenced at renewal time.
|
1311
|
+
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
1312
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1313
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
1314
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
1315
|
+
requests a different type at generation time.
|
1227
1316
|
:param pulumi.Input[str] user_claim: The claim to use to uniquely identify
|
1228
1317
|
the user; this will be used as the name for the Identity entity alias created
|
1229
1318
|
due to a successful login.
|
@@ -1250,6 +1339,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1250
1339
|
|
1251
1340
|
Role for JWT backend:
|
1252
1341
|
|
1342
|
+
<!--Start PulumiCodeChooser -->
|
1253
1343
|
```python
|
1254
1344
|
import pulumi
|
1255
1345
|
import pulumi_vault as vault
|
@@ -1270,9 +1360,11 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1270
1360
|
user_claim="https://vault/user",
|
1271
1361
|
role_type="jwt")
|
1272
1362
|
```
|
1363
|
+
<!--End PulumiCodeChooser -->
|
1273
1364
|
|
1274
1365
|
Role for OIDC backend:
|
1275
1366
|
|
1367
|
+
<!--Start PulumiCodeChooser -->
|
1276
1368
|
```python
|
1277
1369
|
import pulumi
|
1278
1370
|
import pulumi_vault as vault
|
@@ -1292,6 +1384,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1292
1384
|
role_type="oidc",
|
1293
1385
|
allowed_redirect_uris=["http://localhost:8200/ui/vault/auth/oidc/oidc/callback"])
|
1294
1386
|
```
|
1387
|
+
<!--End PulumiCodeChooser -->
|
1295
1388
|
|
1296
1389
|
## Import
|
1297
1390
|
|
@@ -1474,15 +1567,32 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1474
1567
|
The standard scope "openid" is automatically included and need not be specified.
|
1475
1568
|
:param pulumi.Input[str] role_name: The name of the role.
|
1476
1569
|
:param pulumi.Input[str] role_type: Type of role, either "oidc" (default) or "jwt".
|
1477
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
1478
|
-
|
1479
|
-
|
1480
|
-
:param pulumi.Input[
|
1481
|
-
|
1482
|
-
|
1483
|
-
|
1484
|
-
:param pulumi.Input[int]
|
1485
|
-
|
1570
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
|
1571
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
1572
|
+
as well.
|
1573
|
+
:param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
|
1574
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
1575
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1576
|
+
`token_max_ttl` would otherwise allow a renewal.
|
1577
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
1578
|
+
Its current value will be referenced at renewal time.
|
1579
|
+
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
1580
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1581
|
+
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/jwt#token_num_uses)
|
1582
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1583
|
+
:param pulumi.Input[int] token_period: If set, indicates that the
|
1584
|
+
token generated using this role should never expire. The token should be renewed within the
|
1585
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1586
|
+
value of this field. Specified in seconds.
|
1587
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
1588
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
1589
|
+
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
1590
|
+
Its current value will be referenced at renewal time.
|
1591
|
+
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
1592
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1593
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
1594
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
1595
|
+
requests a different type at generation time.
|
1486
1596
|
:param pulumi.Input[str] user_claim: The claim to use to uniquely identify
|
1487
1597
|
the user; this will be used as the name for the Identity entity alias created
|
1488
1598
|
due to a successful login.
|
@@ -1693,7 +1803,9 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1693
1803
|
@pulumi.getter(name="tokenBoundCidrs")
|
1694
1804
|
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1695
1805
|
"""
|
1696
|
-
|
1806
|
+
List of CIDR blocks; if set, specifies blocks of IP
|
1807
|
+
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
1808
|
+
as well.
|
1697
1809
|
"""
|
1698
1810
|
return pulumi.get(self, "token_bound_cidrs")
|
1699
1811
|
|
@@ -1701,7 +1813,10 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1701
1813
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
1702
1814
|
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1703
1815
|
"""
|
1704
|
-
|
1816
|
+
If set, will encode an
|
1817
|
+
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
1818
|
+
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1819
|
+
`token_max_ttl` would otherwise allow a renewal.
|
1705
1820
|
"""
|
1706
1821
|
return pulumi.get(self, "token_explicit_max_ttl")
|
1707
1822
|
|
@@ -1709,7 +1824,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1709
1824
|
@pulumi.getter(name="tokenMaxTtl")
|
1710
1825
|
def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1711
1826
|
"""
|
1712
|
-
The maximum lifetime
|
1827
|
+
The maximum lifetime for generated tokens in number of seconds.
|
1828
|
+
Its current value will be referenced at renewal time.
|
1713
1829
|
"""
|
1714
1830
|
return pulumi.get(self, "token_max_ttl")
|
1715
1831
|
|
@@ -1717,7 +1833,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1717
1833
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
1718
1834
|
def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
|
1719
1835
|
"""
|
1720
|
-
If
|
1836
|
+
If set, the default policy will not be set on
|
1837
|
+
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1721
1838
|
"""
|
1722
1839
|
return pulumi.get(self, "token_no_default_policy")
|
1723
1840
|
|
@@ -1725,7 +1842,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1725
1842
|
@pulumi.getter(name="tokenNumUses")
|
1726
1843
|
def token_num_uses(self) -> pulumi.Output[Optional[int]]:
|
1727
1844
|
"""
|
1728
|
-
The maximum number
|
1845
|
+
The [maximum number](https://www.vaultproject.io/api-docs/jwt#token_num_uses)
|
1846
|
+
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1729
1847
|
"""
|
1730
1848
|
return pulumi.get(self, "token_num_uses")
|
1731
1849
|
|
@@ -1733,7 +1851,10 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1733
1851
|
@pulumi.getter(name="tokenPeriod")
|
1734
1852
|
def token_period(self) -> pulumi.Output[Optional[int]]:
|
1735
1853
|
"""
|
1736
|
-
|
1854
|
+
If set, indicates that the
|
1855
|
+
token generated using this role should never expire. The token should be renewed within the
|
1856
|
+
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1857
|
+
value of this field. Specified in seconds.
|
1737
1858
|
"""
|
1738
1859
|
return pulumi.get(self, "token_period")
|
1739
1860
|
|
@@ -1741,7 +1862,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1741
1862
|
@pulumi.getter(name="tokenPolicies")
|
1742
1863
|
def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1743
1864
|
"""
|
1744
|
-
|
1865
|
+
List of policies to encode onto generated tokens. Depending
|
1866
|
+
on the auth method, this list may be supplemented by user/group/other values.
|
1745
1867
|
"""
|
1746
1868
|
return pulumi.get(self, "token_policies")
|
1747
1869
|
|
@@ -1749,7 +1871,8 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1749
1871
|
@pulumi.getter(name="tokenTtl")
|
1750
1872
|
def token_ttl(self) -> pulumi.Output[Optional[int]]:
|
1751
1873
|
"""
|
1752
|
-
The
|
1874
|
+
The incremental lifetime for generated tokens in number of seconds.
|
1875
|
+
Its current value will be referenced at renewal time.
|
1753
1876
|
"""
|
1754
1877
|
return pulumi.get(self, "token_ttl")
|
1755
1878
|
|
@@ -1757,7 +1880,11 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1757
1880
|
@pulumi.getter(name="tokenType")
|
1758
1881
|
def token_type(self) -> pulumi.Output[Optional[str]]:
|
1759
1882
|
"""
|
1760
|
-
The type of token
|
1883
|
+
The type of token that should be generated. Can be `service`,
|
1884
|
+
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1885
|
+
`service` tokens). For token store roles, there are two additional possibilities:
|
1886
|
+
`default-service` and `default-batch` which specify the type to return unless the client
|
1887
|
+
requests a different type at generation time.
|
1761
1888
|
"""
|
1762
1889
|
return pulumi.get(self, "token_type")
|
1763
1890
|
|
@@ -488,23 +488,25 @@ class SecretBackend(pulumi.CustomResource):
|
|
488
488
|
|
489
489
|
## Example Usage
|
490
490
|
|
491
|
+
<!--Start PulumiCodeChooser -->
|
491
492
|
```python
|
492
493
|
import pulumi
|
493
494
|
import pulumi_vault as vault
|
494
495
|
|
495
496
|
default = vault.kmip.SecretBackend("default",
|
496
|
-
|
497
|
+
default_tls_client_key_bits=4096,
|
498
|
+
default_tls_client_key_type="rsa",
|
499
|
+
default_tls_client_ttl=86400,
|
497
500
|
description="Vault KMIP backend",
|
498
501
|
listen_addrs=[
|
499
502
|
"127.0.0.1:5696",
|
500
503
|
"127.0.0.1:8080",
|
501
504
|
],
|
502
|
-
|
505
|
+
path="kmip",
|
503
506
|
tls_ca_key_bits=4096,
|
504
|
-
|
505
|
-
default_tls_client_key_bits=4096,
|
506
|
-
default_tls_client_ttl=86400)
|
507
|
+
tls_ca_key_type="rsa")
|
507
508
|
```
|
509
|
+
<!--End PulumiCodeChooser -->
|
508
510
|
|
509
511
|
## Import
|
510
512
|
|
@@ -548,23 +550,25 @@ class SecretBackend(pulumi.CustomResource):
|
|
548
550
|
|
549
551
|
## Example Usage
|
550
552
|
|
553
|
+
<!--Start PulumiCodeChooser -->
|
551
554
|
```python
|
552
555
|
import pulumi
|
553
556
|
import pulumi_vault as vault
|
554
557
|
|
555
558
|
default = vault.kmip.SecretBackend("default",
|
556
|
-
|
559
|
+
default_tls_client_key_bits=4096,
|
560
|
+
default_tls_client_key_type="rsa",
|
561
|
+
default_tls_client_ttl=86400,
|
557
562
|
description="Vault KMIP backend",
|
558
563
|
listen_addrs=[
|
559
564
|
"127.0.0.1:5696",
|
560
565
|
"127.0.0.1:8080",
|
561
566
|
],
|
562
|
-
|
567
|
+
path="kmip",
|
563
568
|
tls_ca_key_bits=4096,
|
564
|
-
|
565
|
-
default_tls_client_key_bits=4096,
|
566
|
-
default_tls_client_ttl=86400)
|
569
|
+
tls_ca_key_type="rsa")
|
567
570
|
```
|
571
|
+
<!--End PulumiCodeChooser -->
|
568
572
|
|
569
573
|
## Import
|
570
574
|
|
pulumi_vault/kmip/secret_role.py
CHANGED
@@ -746,6 +746,7 @@ class SecretRole(pulumi.CustomResource):
|
|
746
746
|
|
747
747
|
## Example Usage
|
748
748
|
|
749
|
+
<!--Start PulumiCodeChooser -->
|
749
750
|
```python
|
750
751
|
import pulumi
|
751
752
|
import pulumi_vault as vault
|
@@ -769,6 +770,7 @@ class SecretRole(pulumi.CustomResource):
|
|
769
770
|
operation_create=True,
|
770
771
|
operation_destroy=True)
|
771
772
|
```
|
773
|
+
<!--End PulumiCodeChooser -->
|
772
774
|
|
773
775
|
## Import
|
774
776
|
|
@@ -819,6 +821,7 @@ class SecretRole(pulumi.CustomResource):
|
|
819
821
|
|
820
822
|
## Example Usage
|
821
823
|
|
824
|
+
<!--Start PulumiCodeChooser -->
|
822
825
|
```python
|
823
826
|
import pulumi
|
824
827
|
import pulumi_vault as vault
|
@@ -842,6 +845,7 @@ class SecretRole(pulumi.CustomResource):
|
|
842
845
|
operation_create=True,
|
843
846
|
operation_destroy=True)
|
844
847
|
```
|
848
|
+
<!--End PulumiCodeChooser -->
|
845
849
|
|
846
850
|
## Import
|
847
851
|
|
@@ -186,6 +186,7 @@ class SecretScope(pulumi.CustomResource):
|
|
186
186
|
|
187
187
|
## Example Usage
|
188
188
|
|
189
|
+
<!--Start PulumiCodeChooser -->
|
189
190
|
```python
|
190
191
|
import pulumi
|
191
192
|
import pulumi_vault as vault
|
@@ -198,6 +199,7 @@ class SecretScope(pulumi.CustomResource):
|
|
198
199
|
scope="dev",
|
199
200
|
force=True)
|
200
201
|
```
|
202
|
+
<!--End PulumiCodeChooser -->
|
201
203
|
|
202
204
|
## Import
|
203
205
|
|
@@ -231,6 +233,7 @@ class SecretScope(pulumi.CustomResource):
|
|
231
233
|
|
232
234
|
## Example Usage
|
233
235
|
|
236
|
+
<!--Start PulumiCodeChooser -->
|
234
237
|
```python
|
235
238
|
import pulumi
|
236
239
|
import pulumi_vault as vault
|
@@ -243,6 +246,7 @@ class SecretScope(pulumi.CustomResource):
|
|
243
246
|
scope="dev",
|
244
247
|
force=True)
|
245
248
|
```
|
249
|
+
<!--End PulumiCodeChooser -->
|
246
250
|
|
247
251
|
## Import
|
248
252
|
|