pulumi-vault 6.1.1a1717550614__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (183) hide show
  1. pulumi_vault/_inputs.py +20 -0
  2. pulumi_vault/ad/secret_backend.py +6 -2
  3. pulumi_vault/ad/secret_library.py +4 -2
  4. pulumi_vault/ad/secret_role.py +4 -0
  5. pulumi_vault/alicloud/auth_backend_role.py +192 -69
  6. pulumi_vault/approle/auth_backend_login.py +4 -0
  7. pulumi_vault/approle/auth_backend_role.py +186 -63
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  9. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  10. pulumi_vault/audit.py +20 -12
  11. pulumi_vault/audit_request_header.py +6 -6
  12. pulumi_vault/aws/auth_backend_client.py +10 -6
  13. pulumi_vault/aws/auth_backend_config_identity.py +4 -0
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
  15. pulumi_vault/aws/auth_backend_login.py +8 -0
  16. pulumi_vault/aws/auth_backend_role.py +186 -63
  17. pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
  18. pulumi_vault/aws/auth_backend_sts_role.py +4 -0
  19. pulumi_vault/aws/secret_backend_role.py +4 -2
  20. pulumi_vault/aws/secret_backend_static_role.py +4 -2
  21. pulumi_vault/azure/auth_backend_config.py +10 -6
  22. pulumi_vault/azure/auth_backend_role.py +186 -63
  23. pulumi_vault/azure/backend.py +24 -16
  24. pulumi_vault/azure/backend_role.py +18 -14
  25. pulumi_vault/azure/get_access_credentials.py +4 -0
  26. pulumi_vault/cert_auth_backend_role.py +208 -75
  27. pulumi_vault/consul/secret_backend.py +18 -10
  28. pulumi_vault/consul/secret_backend_role.py +4 -2
  29. pulumi_vault/database/_inputs.py +784 -522
  30. pulumi_vault/database/outputs.py +784 -522
  31. pulumi_vault/database/secret_backend_connection.py +4 -2
  32. pulumi_vault/database/secret_backend_role.py +4 -4
  33. pulumi_vault/database/secret_backend_static_role.py +8 -10
  34. pulumi_vault/database/secrets_mount.py +4 -4
  35. pulumi_vault/egp_policy.py +8 -4
  36. pulumi_vault/gcp/auth_backend.py +36 -0
  37. pulumi_vault/gcp/auth_backend_role.py +264 -63
  38. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  39. pulumi_vault/gcp/secret_backend.py +6 -4
  40. pulumi_vault/gcp/secret_impersonated_account.py +14 -12
  41. pulumi_vault/gcp/secret_roleset.py +6 -4
  42. pulumi_vault/gcp/secret_static_account.py +16 -14
  43. pulumi_vault/generic/endpoint.py +8 -4
  44. pulumi_vault/generic/get_secret.py +4 -40
  45. pulumi_vault/get_auth_backend.py +4 -0
  46. pulumi_vault/get_auth_backends.py +8 -0
  47. pulumi_vault/get_namespace.py +12 -0
  48. pulumi_vault/get_namespaces.py +12 -4
  49. pulumi_vault/get_nomad_access_token.py +4 -0
  50. pulumi_vault/get_policy_document.py +8 -8
  51. pulumi_vault/get_raft_autopilot_state.py +4 -0
  52. pulumi_vault/github/auth_backend.py +4 -0
  53. pulumi_vault/github/team.py +6 -2
  54. pulumi_vault/github/user.py +6 -2
  55. pulumi_vault/identity/entity.py +8 -6
  56. pulumi_vault/identity/entity_alias.py +8 -6
  57. pulumi_vault/identity/entity_policies.py +12 -12
  58. pulumi_vault/identity/get_entity.py +4 -0
  59. pulumi_vault/identity/get_group.py +4 -0
  60. pulumi_vault/identity/get_oidc_client_creds.py +4 -2
  61. pulumi_vault/identity/get_oidc_openid_config.py +6 -10
  62. pulumi_vault/identity/get_oidc_public_keys.py +6 -10
  63. pulumi_vault/identity/group.py +42 -38
  64. pulumi_vault/identity/group_alias.py +4 -2
  65. pulumi_vault/identity/group_member_entity_ids.py +16 -12
  66. pulumi_vault/identity/group_member_group_ids.py +20 -24
  67. pulumi_vault/identity/group_policies.py +8 -4
  68. pulumi_vault/identity/mfa_duo.py +8 -4
  69. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  70. pulumi_vault/identity/mfa_okta.py +8 -4
  71. pulumi_vault/identity/mfa_pingid.py +4 -0
  72. pulumi_vault/identity/mfa_totp.py +4 -0
  73. pulumi_vault/identity/oidc.py +4 -0
  74. pulumi_vault/identity/oidc_assignment.py +6 -10
  75. pulumi_vault/identity/oidc_client.py +10 -10
  76. pulumi_vault/identity/oidc_key.py +12 -16
  77. pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
  78. pulumi_vault/identity/oidc_provider.py +16 -22
  79. pulumi_vault/identity/oidc_role.py +20 -28
  80. pulumi_vault/identity/oidc_scope.py +8 -6
  81. pulumi_vault/jwt/auth_backend.py +32 -20
  82. pulumi_vault/jwt/auth_backend_role.py +190 -63
  83. pulumi_vault/kmip/secret_backend.py +14 -10
  84. pulumi_vault/kmip/secret_role.py +4 -0
  85. pulumi_vault/kmip/secret_scope.py +4 -0
  86. pulumi_vault/kubernetes/auth_backend_config.py +4 -0
  87. pulumi_vault/kubernetes/auth_backend_role.py +172 -56
  88. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  89. pulumi_vault/kubernetes/secret_backend.py +8 -6
  90. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  91. pulumi_vault/kv/get_secret.py +4 -0
  92. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
  93. pulumi_vault/kv/get_secret_v2.py +0 -58
  94. pulumi_vault/kv/get_secrets_list.py +8 -4
  95. pulumi_vault/kv/get_secrets_list_v2.py +12 -14
  96. pulumi_vault/kv/secret.py +4 -0
  97. pulumi_vault/kv/secret_backend_v2.py +4 -0
  98. pulumi_vault/kv/secret_v2.py +4 -2
  99. pulumi_vault/ldap/auth_backend.py +161 -66
  100. pulumi_vault/ldap/auth_backend_group.py +4 -0
  101. pulumi_vault/ldap/auth_backend_user.py +4 -0
  102. pulumi_vault/ldap/secret_backend.py +8 -4
  103. pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
  104. pulumi_vault/ldap/secret_backend_library_set.py +4 -2
  105. pulumi_vault/ldap/secret_backend_static_role.py +4 -0
  106. pulumi_vault/managed/_inputs.py +132 -84
  107. pulumi_vault/managed/keys.py +28 -7
  108. pulumi_vault/managed/outputs.py +132 -84
  109. pulumi_vault/mfa_duo.py +6 -4
  110. pulumi_vault/mfa_okta.py +6 -4
  111. pulumi_vault/mfa_pingid.py +6 -4
  112. pulumi_vault/mfa_totp.py +12 -10
  113. pulumi_vault/mongodbatlas/secret_backend.py +4 -0
  114. pulumi_vault/mongodbatlas/secret_role.py +4 -2
  115. pulumi_vault/mount.py +42 -26
  116. pulumi_vault/nomad_secret_backend.py +8 -4
  117. pulumi_vault/nomad_secret_role.py +4 -0
  118. pulumi_vault/okta/_inputs.py +8 -8
  119. pulumi_vault/okta/auth_backend.py +10 -6
  120. pulumi_vault/okta/auth_backend_group.py +4 -0
  121. pulumi_vault/okta/auth_backend_user.py +4 -0
  122. pulumi_vault/okta/outputs.py +8 -8
  123. pulumi_vault/outputs.py +20 -0
  124. pulumi_vault/password_policy.py +8 -6
  125. pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
  126. pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
  127. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  128. pulumi_vault/pkisecret/get_backend_key.py +6 -2
  129. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  130. pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
  131. pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
  132. pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
  133. pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
  134. pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
  135. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
  136. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
  137. pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
  138. pulumi_vault/pkisecret/secret_backend_role.py +4 -2
  139. pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
  140. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
  141. pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
  142. pulumi_vault/provider.py +8 -0
  143. pulumi_vault/pulumi-plugin.json +1 -2
  144. pulumi_vault/quota_lease_count.py +8 -6
  145. pulumi_vault/quota_rate_limit.py +4 -2
  146. pulumi_vault/rabbitmq/secret_backend.py +8 -4
  147. pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
  148. pulumi_vault/raft_autopilot.py +4 -0
  149. pulumi_vault/raft_snapshot_agent_config.py +304 -109
  150. pulumi_vault/rgp_policy.py +6 -2
  151. pulumi_vault/saml/auth_backend.py +12 -8
  152. pulumi_vault/saml/auth_backend_role.py +178 -64
  153. pulumi_vault/secrets/sync_association.py +10 -12
  154. pulumi_vault/secrets/sync_aws_destination.py +8 -6
  155. pulumi_vault/secrets/sync_azure_destination.py +12 -10
  156. pulumi_vault/secrets/sync_config.py +6 -2
  157. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  158. pulumi_vault/secrets/sync_gh_destination.py +8 -6
  159. pulumi_vault/secrets/sync_github_apps.py +8 -8
  160. pulumi_vault/secrets/sync_vercel_destination.py +8 -6
  161. pulumi_vault/ssh/_inputs.py +32 -6
  162. pulumi_vault/ssh/outputs.py +32 -6
  163. pulumi_vault/ssh/secret_backend_ca.py +4 -0
  164. pulumi_vault/ssh/secret_backend_role.py +4 -4
  165. pulumi_vault/terraformcloud/secret_backend.py +56 -0
  166. pulumi_vault/terraformcloud/secret_creds.py +17 -2
  167. pulumi_vault/terraformcloud/secret_role.py +69 -2
  168. pulumi_vault/token.py +18 -14
  169. pulumi_vault/tokenauth/auth_backend_role.py +180 -64
  170. pulumi_vault/transform/alphabet.py +6 -4
  171. pulumi_vault/transform/get_decode.py +4 -4
  172. pulumi_vault/transform/get_encode.py +4 -4
  173. pulumi_vault/transform/role.py +6 -4
  174. pulumi_vault/transform/template.py +4 -4
  175. pulumi_vault/transit/get_decrypt.py +20 -4
  176. pulumi_vault/transit/get_encrypt.py +14 -0
  177. pulumi_vault/transit/secret_backend_key.py +6 -6
  178. pulumi_vault/transit/secret_cache_config.py +4 -0
  179. {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
  180. pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
  181. pulumi_vault-6.1.1a1717550614.dist-info/RECORD +0 -252
  182. {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +0 -0
  183. {pulumi_vault-6.1.1a1717550614.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -348,6 +348,7 @@ class AuthBackendConfig(pulumi.CustomResource):
348
348
 
349
349
  ## Example Usage
350
350
 
351
+ <!--Start PulumiCodeChooser -->
351
352
  ```python
352
353
  import pulumi
353
354
  import pulumi_vault as vault
@@ -363,6 +364,7 @@ class AuthBackendConfig(pulumi.CustomResource):
363
364
  issuer="api",
364
365
  disable_iss_validation=True)
365
366
  ```
367
+ <!--End PulumiCodeChooser -->
366
368
 
367
369
  ## Import
368
370
 
@@ -400,6 +402,7 @@ class AuthBackendConfig(pulumi.CustomResource):
400
402
 
401
403
  ## Example Usage
402
404
 
405
+ <!--Start PulumiCodeChooser -->
403
406
  ```python
404
407
  import pulumi
405
408
  import pulumi_vault as vault
@@ -415,6 +418,7 @@ class AuthBackendConfig(pulumi.CustomResource):
415
418
  issuer="api",
416
419
  disable_iss_validation=True)
417
420
  ```
421
+ <!--End PulumiCodeChooser -->
418
422
 
419
423
  ## Import
420
424
 
@@ -47,15 +47,31 @@ class AuthBackendRoleArgs:
47
47
  The value should not contain leading or trailing forward slashes.
48
48
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
49
49
  *Available only for Vault Enterprise*.
50
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
51
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
52
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
53
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
54
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
55
- :param pulumi.Input[int] token_period: Generated Token's Period
56
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
50
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
51
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
52
+ as well.
53
+ :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
54
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
55
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
56
+ `token_max_ttl` would otherwise allow a renewal.
57
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
58
+ Its current value will be referenced at renewal time.
59
+ :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
60
+ generated tokens; otherwise it will be added to the policies set in token_policies.
61
+ :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/kubernetes#token_num_uses)
62
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
63
+ :param pulumi.Input[int] token_period: If set, indicates that the
64
+ token generated using this role should never expire. The token should be renewed within the
65
+ duration specified by this value. At each renewal, the token's TTL will be set to the
66
+ value of this field. Specified in seconds.
67
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
68
+ on the auth method, this list may be supplemented by user/group/other values.
57
69
  :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
58
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
70
+ :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
71
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
72
+ `service` tokens). For token store roles, there are two additional possibilities:
73
+ `default-service` and `default-batch` which specify the type to return unless the client
74
+ requests a different type at generation time.
59
75
  """
60
76
  pulumi.set(__self__, "bound_service_account_names", bound_service_account_names)
61
77
  pulumi.set(__self__, "bound_service_account_namespaces", bound_service_account_namespaces)
@@ -183,7 +199,9 @@ class AuthBackendRoleArgs:
183
199
  @pulumi.getter(name="tokenBoundCidrs")
184
200
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
185
201
  """
186
- Specifies the blocks of IP addresses which are allowed to use the generated token
202
+ List of CIDR blocks; if set, specifies blocks of IP
203
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
204
+ as well.
187
205
  """
188
206
  return pulumi.get(self, "token_bound_cidrs")
189
207
 
@@ -195,7 +213,10 @@ class AuthBackendRoleArgs:
195
213
  @pulumi.getter(name="tokenExplicitMaxTtl")
196
214
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
197
215
  """
198
- Generated Token's Explicit Maximum TTL in seconds
216
+ If set, will encode an
217
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
218
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
219
+ `token_max_ttl` would otherwise allow a renewal.
199
220
  """
200
221
  return pulumi.get(self, "token_explicit_max_ttl")
201
222
 
@@ -207,7 +228,8 @@ class AuthBackendRoleArgs:
207
228
  @pulumi.getter(name="tokenMaxTtl")
208
229
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
209
230
  """
210
- The maximum lifetime of the generated token
231
+ The maximum lifetime for generated tokens in number of seconds.
232
+ Its current value will be referenced at renewal time.
211
233
  """
212
234
  return pulumi.get(self, "token_max_ttl")
213
235
 
@@ -219,7 +241,8 @@ class AuthBackendRoleArgs:
219
241
  @pulumi.getter(name="tokenNoDefaultPolicy")
220
242
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
221
243
  """
222
- If true, the 'default' policy will not automatically be added to generated tokens
244
+ If set, the default policy will not be set on
245
+ generated tokens; otherwise it will be added to the policies set in token_policies.
223
246
  """
224
247
  return pulumi.get(self, "token_no_default_policy")
225
248
 
@@ -231,7 +254,8 @@ class AuthBackendRoleArgs:
231
254
  @pulumi.getter(name="tokenNumUses")
232
255
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
233
256
  """
234
- The maximum number of times a token may be used, a value of zero means unlimited
257
+ The [maximum number](https://www.vaultproject.io/api-docs/kubernetes#token_num_uses)
258
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
235
259
  """
236
260
  return pulumi.get(self, "token_num_uses")
237
261
 
@@ -243,7 +267,10 @@ class AuthBackendRoleArgs:
243
267
  @pulumi.getter(name="tokenPeriod")
244
268
  def token_period(self) -> Optional[pulumi.Input[int]]:
245
269
  """
246
- Generated Token's Period
270
+ If set, indicates that the
271
+ token generated using this role should never expire. The token should be renewed within the
272
+ duration specified by this value. At each renewal, the token's TTL will be set to the
273
+ value of this field. Specified in seconds.
247
274
  """
248
275
  return pulumi.get(self, "token_period")
249
276
 
@@ -255,7 +282,8 @@ class AuthBackendRoleArgs:
255
282
  @pulumi.getter(name="tokenPolicies")
256
283
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
257
284
  """
258
- Generated Token's Policies
285
+ List of policies to encode onto generated tokens. Depending
286
+ on the auth method, this list may be supplemented by user/group/other values.
259
287
  """
260
288
  return pulumi.get(self, "token_policies")
261
289
 
@@ -279,7 +307,11 @@ class AuthBackendRoleArgs:
279
307
  @pulumi.getter(name="tokenType")
280
308
  def token_type(self) -> Optional[pulumi.Input[str]]:
281
309
  """
282
- The type of token to generate, service or batch
310
+ The type of token that should be generated. Can be `service`,
311
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
312
+ `service` tokens). For token store roles, there are two additional possibilities:
313
+ `default-service` and `default-batch` which specify the type to return unless the client
314
+ requests a different type at generation time.
283
315
  """
284
316
  return pulumi.get(self, "token_type")
285
317
 
@@ -324,15 +356,31 @@ class _AuthBackendRoleState:
324
356
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
325
357
  *Available only for Vault Enterprise*.
326
358
  :param pulumi.Input[str] role_name: Name of the role.
327
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
328
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
329
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
330
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
331
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
332
- :param pulumi.Input[int] token_period: Generated Token's Period
333
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
359
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
360
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
361
+ as well.
362
+ :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
363
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
364
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
365
+ `token_max_ttl` would otherwise allow a renewal.
366
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
367
+ Its current value will be referenced at renewal time.
368
+ :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
369
+ generated tokens; otherwise it will be added to the policies set in token_policies.
370
+ :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/kubernetes#token_num_uses)
371
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
372
+ :param pulumi.Input[int] token_period: If set, indicates that the
373
+ token generated using this role should never expire. The token should be renewed within the
374
+ duration specified by this value. At each renewal, the token's TTL will be set to the
375
+ value of this field. Specified in seconds.
376
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
377
+ on the auth method, this list may be supplemented by user/group/other values.
334
378
  :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
335
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
379
+ :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
380
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
381
+ `service` tokens). For token store roles, there are two additional possibilities:
382
+ `default-service` and `default-batch` which specify the type to return unless the client
383
+ requests a different type at generation time.
336
384
  """
337
385
  if alias_name_source is not None:
338
386
  pulumi.set(__self__, "alias_name_source", alias_name_source)
@@ -463,7 +511,9 @@ class _AuthBackendRoleState:
463
511
  @pulumi.getter(name="tokenBoundCidrs")
464
512
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
465
513
  """
466
- Specifies the blocks of IP addresses which are allowed to use the generated token
514
+ List of CIDR blocks; if set, specifies blocks of IP
515
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
516
+ as well.
467
517
  """
468
518
  return pulumi.get(self, "token_bound_cidrs")
469
519
 
@@ -475,7 +525,10 @@ class _AuthBackendRoleState:
475
525
  @pulumi.getter(name="tokenExplicitMaxTtl")
476
526
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
477
527
  """
478
- Generated Token's Explicit Maximum TTL in seconds
528
+ If set, will encode an
529
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
530
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
531
+ `token_max_ttl` would otherwise allow a renewal.
479
532
  """
480
533
  return pulumi.get(self, "token_explicit_max_ttl")
481
534
 
@@ -487,7 +540,8 @@ class _AuthBackendRoleState:
487
540
  @pulumi.getter(name="tokenMaxTtl")
488
541
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
489
542
  """
490
- The maximum lifetime of the generated token
543
+ The maximum lifetime for generated tokens in number of seconds.
544
+ Its current value will be referenced at renewal time.
491
545
  """
492
546
  return pulumi.get(self, "token_max_ttl")
493
547
 
@@ -499,7 +553,8 @@ class _AuthBackendRoleState:
499
553
  @pulumi.getter(name="tokenNoDefaultPolicy")
500
554
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
501
555
  """
502
- If true, the 'default' policy will not automatically be added to generated tokens
556
+ If set, the default policy will not be set on
557
+ generated tokens; otherwise it will be added to the policies set in token_policies.
503
558
  """
504
559
  return pulumi.get(self, "token_no_default_policy")
505
560
 
@@ -511,7 +566,8 @@ class _AuthBackendRoleState:
511
566
  @pulumi.getter(name="tokenNumUses")
512
567
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
513
568
  """
514
- The maximum number of times a token may be used, a value of zero means unlimited
569
+ The [maximum number](https://www.vaultproject.io/api-docs/kubernetes#token_num_uses)
570
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
515
571
  """
516
572
  return pulumi.get(self, "token_num_uses")
517
573
 
@@ -523,7 +579,10 @@ class _AuthBackendRoleState:
523
579
  @pulumi.getter(name="tokenPeriod")
524
580
  def token_period(self) -> Optional[pulumi.Input[int]]:
525
581
  """
526
- Generated Token's Period
582
+ If set, indicates that the
583
+ token generated using this role should never expire. The token should be renewed within the
584
+ duration specified by this value. At each renewal, the token's TTL will be set to the
585
+ value of this field. Specified in seconds.
527
586
  """
528
587
  return pulumi.get(self, "token_period")
529
588
 
@@ -535,7 +594,8 @@ class _AuthBackendRoleState:
535
594
  @pulumi.getter(name="tokenPolicies")
536
595
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
537
596
  """
538
- Generated Token's Policies
597
+ List of policies to encode onto generated tokens. Depending
598
+ on the auth method, this list may be supplemented by user/group/other values.
539
599
  """
540
600
  return pulumi.get(self, "token_policies")
541
601
 
@@ -559,7 +619,11 @@ class _AuthBackendRoleState:
559
619
  @pulumi.getter(name="tokenType")
560
620
  def token_type(self) -> Optional[pulumi.Input[str]]:
561
621
  """
562
- The type of token to generate, service or batch
622
+ The type of token that should be generated. Can be `service`,
623
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
624
+ `service` tokens). For token store roles, there are two additional possibilities:
625
+ `default-service` and `default-batch` which specify the type to return unless the client
626
+ requests a different type at generation time.
563
627
  """
564
628
  return pulumi.get(self, "token_type")
565
629
 
@@ -597,6 +661,7 @@ class AuthBackendRole(pulumi.CustomResource):
597
661
 
598
662
  ## Example Usage
599
663
 
664
+ <!--Start PulumiCodeChooser -->
600
665
  ```python
601
666
  import pulumi
602
667
  import pulumi_vault as vault
@@ -615,6 +680,7 @@ class AuthBackendRole(pulumi.CustomResource):
615
680
  ],
616
681
  audience="vault")
617
682
  ```
683
+ <!--End PulumiCodeChooser -->
618
684
 
619
685
  ## Import
620
686
 
@@ -641,15 +707,31 @@ class AuthBackendRole(pulumi.CustomResource):
641
707
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
642
708
  *Available only for Vault Enterprise*.
643
709
  :param pulumi.Input[str] role_name: Name of the role.
644
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
645
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
646
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
647
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
648
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
649
- :param pulumi.Input[int] token_period: Generated Token's Period
650
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
710
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
711
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
712
+ as well.
713
+ :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
714
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
715
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
716
+ `token_max_ttl` would otherwise allow a renewal.
717
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
718
+ Its current value will be referenced at renewal time.
719
+ :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
720
+ generated tokens; otherwise it will be added to the policies set in token_policies.
721
+ :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/kubernetes#token_num_uses)
722
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
723
+ :param pulumi.Input[int] token_period: If set, indicates that the
724
+ token generated using this role should never expire. The token should be renewed within the
725
+ duration specified by this value. At each renewal, the token's TTL will be set to the
726
+ value of this field. Specified in seconds.
727
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
728
+ on the auth method, this list may be supplemented by user/group/other values.
651
729
  :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
652
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
730
+ :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
731
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
732
+ `service` tokens). For token store roles, there are two additional possibilities:
733
+ `default-service` and `default-batch` which specify the type to return unless the client
734
+ requests a different type at generation time.
653
735
  """
654
736
  ...
655
737
  @overload
@@ -664,6 +746,7 @@ class AuthBackendRole(pulumi.CustomResource):
664
746
 
665
747
  ## Example Usage
666
748
 
749
+ <!--Start PulumiCodeChooser -->
667
750
  ```python
668
751
  import pulumi
669
752
  import pulumi_vault as vault
@@ -682,6 +765,7 @@ class AuthBackendRole(pulumi.CustomResource):
682
765
  ],
683
766
  audience="vault")
684
767
  ```
768
+ <!--End PulumiCodeChooser -->
685
769
 
686
770
  ## Import
687
771
 
@@ -801,15 +885,31 @@ class AuthBackendRole(pulumi.CustomResource):
801
885
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
802
886
  *Available only for Vault Enterprise*.
803
887
  :param pulumi.Input[str] role_name: Name of the role.
804
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
805
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
806
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
807
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
808
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
809
- :param pulumi.Input[int] token_period: Generated Token's Period
810
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
888
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
889
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
890
+ as well.
891
+ :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
892
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
893
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
894
+ `token_max_ttl` would otherwise allow a renewal.
895
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
896
+ Its current value will be referenced at renewal time.
897
+ :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
898
+ generated tokens; otherwise it will be added to the policies set in token_policies.
899
+ :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/kubernetes#token_num_uses)
900
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
901
+ :param pulumi.Input[int] token_period: If set, indicates that the
902
+ token generated using this role should never expire. The token should be renewed within the
903
+ duration specified by this value. At each renewal, the token's TTL will be set to the
904
+ value of this field. Specified in seconds.
905
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
906
+ on the auth method, this list may be supplemented by user/group/other values.
811
907
  :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
812
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
908
+ :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
909
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
910
+ `service` tokens). For token store roles, there are two additional possibilities:
911
+ `default-service` and `default-batch` which specify the type to return unless the client
912
+ requests a different type at generation time.
813
913
  """
814
914
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
815
915
 
@@ -901,7 +1001,9 @@ class AuthBackendRole(pulumi.CustomResource):
901
1001
  @pulumi.getter(name="tokenBoundCidrs")
902
1002
  def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
903
1003
  """
904
- Specifies the blocks of IP addresses which are allowed to use the generated token
1004
+ List of CIDR blocks; if set, specifies blocks of IP
1005
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
1006
+ as well.
905
1007
  """
906
1008
  return pulumi.get(self, "token_bound_cidrs")
907
1009
 
@@ -909,7 +1011,10 @@ class AuthBackendRole(pulumi.CustomResource):
909
1011
  @pulumi.getter(name="tokenExplicitMaxTtl")
910
1012
  def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
911
1013
  """
912
- Generated Token's Explicit Maximum TTL in seconds
1014
+ If set, will encode an
1015
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1016
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1017
+ `token_max_ttl` would otherwise allow a renewal.
913
1018
  """
914
1019
  return pulumi.get(self, "token_explicit_max_ttl")
915
1020
 
@@ -917,7 +1022,8 @@ class AuthBackendRole(pulumi.CustomResource):
917
1022
  @pulumi.getter(name="tokenMaxTtl")
918
1023
  def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
919
1024
  """
920
- The maximum lifetime of the generated token
1025
+ The maximum lifetime for generated tokens in number of seconds.
1026
+ Its current value will be referenced at renewal time.
921
1027
  """
922
1028
  return pulumi.get(self, "token_max_ttl")
923
1029
 
@@ -925,7 +1031,8 @@ class AuthBackendRole(pulumi.CustomResource):
925
1031
  @pulumi.getter(name="tokenNoDefaultPolicy")
926
1032
  def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
927
1033
  """
928
- If true, the 'default' policy will not automatically be added to generated tokens
1034
+ If set, the default policy will not be set on
1035
+ generated tokens; otherwise it will be added to the policies set in token_policies.
929
1036
  """
930
1037
  return pulumi.get(self, "token_no_default_policy")
931
1038
 
@@ -933,7 +1040,8 @@ class AuthBackendRole(pulumi.CustomResource):
933
1040
  @pulumi.getter(name="tokenNumUses")
934
1041
  def token_num_uses(self) -> pulumi.Output[Optional[int]]:
935
1042
  """
936
- The maximum number of times a token may be used, a value of zero means unlimited
1043
+ The [maximum number](https://www.vaultproject.io/api-docs/kubernetes#token_num_uses)
1044
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
937
1045
  """
938
1046
  return pulumi.get(self, "token_num_uses")
939
1047
 
@@ -941,7 +1049,10 @@ class AuthBackendRole(pulumi.CustomResource):
941
1049
  @pulumi.getter(name="tokenPeriod")
942
1050
  def token_period(self) -> pulumi.Output[Optional[int]]:
943
1051
  """
944
- Generated Token's Period
1052
+ If set, indicates that the
1053
+ token generated using this role should never expire. The token should be renewed within the
1054
+ duration specified by this value. At each renewal, the token's TTL will be set to the
1055
+ value of this field. Specified in seconds.
945
1056
  """
946
1057
  return pulumi.get(self, "token_period")
947
1058
 
@@ -949,7 +1060,8 @@ class AuthBackendRole(pulumi.CustomResource):
949
1060
  @pulumi.getter(name="tokenPolicies")
950
1061
  def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
951
1062
  """
952
- Generated Token's Policies
1063
+ List of policies to encode onto generated tokens. Depending
1064
+ on the auth method, this list may be supplemented by user/group/other values.
953
1065
  """
954
1066
  return pulumi.get(self, "token_policies")
955
1067
 
@@ -965,7 +1077,11 @@ class AuthBackendRole(pulumi.CustomResource):
965
1077
  @pulumi.getter(name="tokenType")
966
1078
  def token_type(self) -> pulumi.Output[Optional[str]]:
967
1079
  """
968
- The type of token to generate, service or batch
1080
+ The type of token that should be generated. Can be `service`,
1081
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
1082
+ `service` tokens). For token store roles, there are two additional possibilities:
1083
+ `default-service` and `default-batch` which specify the type to return unless the client
1084
+ requests a different type at generation time.
969
1085
  """
970
1086
  return pulumi.get(self, "token_type")
971
1087
 
@@ -180,21 +180,20 @@ def get_service_account_token(backend: Optional[str] = None,
180
180
  """
181
181
  ## Example Usage
182
182
 
183
+ <!--Start PulumiCodeChooser -->
183
184
  ```python
184
185
  import pulumi
185
- import pulumi_std as std
186
186
  import pulumi_vault as vault
187
187
 
188
188
  config = vault.kubernetes.SecretBackend("config",
189
189
  path="kubernetes",
190
190
  description="kubernetes secrets engine description",
191
191
  kubernetes_host="https://127.0.0.1:61233",
192
- kubernetes_ca_cert=std.file(input="/path/to/cert").result,
193
- service_account_jwt=std.file(input="/path/to/token").result,
192
+ kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
193
+ service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
194
194
  disable_local_ca_jwt=False)
195
195
  role = vault.kubernetes.SecretBackendRole("role",
196
196
  backend=config.path,
197
- name="service-account-name-role",
198
197
  allowed_kubernetes_namespaces=["*"],
199
198
  token_max_ttl=43200,
200
199
  token_default_ttl=21600,
@@ -213,6 +212,7 @@ def get_service_account_token(backend: Optional[str] = None,
213
212
  cluster_role_binding=False,
214
213
  ttl="1h")
215
214
  ```
215
+ <!--End PulumiCodeChooser -->
216
216
 
217
217
 
218
218
  :param str backend: The Kubernetes secret backend to generate service account
@@ -267,21 +267,20 @@ def get_service_account_token_output(backend: Optional[pulumi.Input[str]] = None
267
267
  """
268
268
  ## Example Usage
269
269
 
270
+ <!--Start PulumiCodeChooser -->
270
271
  ```python
271
272
  import pulumi
272
- import pulumi_std as std
273
273
  import pulumi_vault as vault
274
274
 
275
275
  config = vault.kubernetes.SecretBackend("config",
276
276
  path="kubernetes",
277
277
  description="kubernetes secrets engine description",
278
278
  kubernetes_host="https://127.0.0.1:61233",
279
- kubernetes_ca_cert=std.file(input="/path/to/cert").result,
280
- service_account_jwt=std.file(input="/path/to/token").result,
279
+ kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
280
+ service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
281
281
  disable_local_ca_jwt=False)
282
282
  role = vault.kubernetes.SecretBackendRole("role",
283
283
  backend=config.path,
284
- name="service-account-name-role",
285
284
  allowed_kubernetes_namespaces=["*"],
286
285
  token_max_ttl=43200,
287
286
  token_default_ttl=21600,
@@ -300,6 +299,7 @@ def get_service_account_token_output(backend: Optional[pulumi.Input[str]] = None
300
299
  cluster_role_binding=False,
301
300
  ttl="1h")
302
301
  ```
302
+ <!--End PulumiCodeChooser -->
303
303
 
304
304
 
305
305
  :param str backend: The Kubernetes secret backend to generate service account
@@ -623,9 +623,9 @@ class SecretBackend(pulumi.CustomResource):
623
623
  """
624
624
  ## Example Usage
625
625
 
626
+ <!--Start PulumiCodeChooser -->
626
627
  ```python
627
628
  import pulumi
628
- import pulumi_std as std
629
629
  import pulumi_vault as vault
630
630
 
631
631
  config = vault.kubernetes.SecretBackend("config",
@@ -634,10 +634,11 @@ class SecretBackend(pulumi.CustomResource):
634
634
  default_lease_ttl_seconds=43200,
635
635
  max_lease_ttl_seconds=86400,
636
636
  kubernetes_host="https://127.0.0.1:61233",
637
- kubernetes_ca_cert=std.file(input="/path/to/cert").result,
638
- service_account_jwt=std.file(input="/path/to/token").result,
637
+ kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
638
+ service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
639
639
  disable_local_ca_jwt=False)
640
640
  ```
641
+ <!--End PulumiCodeChooser -->
641
642
 
642
643
  ## Import
643
644
 
@@ -686,9 +687,9 @@ class SecretBackend(pulumi.CustomResource):
686
687
  """
687
688
  ## Example Usage
688
689
 
690
+ <!--Start PulumiCodeChooser -->
689
691
  ```python
690
692
  import pulumi
691
- import pulumi_std as std
692
693
  import pulumi_vault as vault
693
694
 
694
695
  config = vault.kubernetes.SecretBackend("config",
@@ -697,10 +698,11 @@ class SecretBackend(pulumi.CustomResource):
697
698
  default_lease_ttl_seconds=43200,
698
699
  max_lease_ttl_seconds=86400,
699
700
  kubernetes_host="https://127.0.0.1:61233",
700
- kubernetes_ca_cert=std.file(input="/path/to/cert").result,
701
- service_account_jwt=std.file(input="/path/to/token").result,
701
+ kubernetes_ca_cert=(lambda path: open(path).read())("/path/to/cert"),
702
+ service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
702
703
  disable_local_ca_jwt=False)
703
704
  ```
705
+ <!--End PulumiCodeChooser -->
704
706
 
705
707
  ## Import
706
708