pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (192) hide show
  1. pulumi_vault/__init__.py +0 -26
  2. pulumi_vault/_inputs.py +20 -0
  3. pulumi_vault/ad/secret_backend.py +6 -2
  4. pulumi_vault/ad/secret_library.py +4 -2
  5. pulumi_vault/ad/secret_role.py +4 -0
  6. pulumi_vault/alicloud/auth_backend_role.py +192 -69
  7. pulumi_vault/approle/auth_backend_login.py +4 -0
  8. pulumi_vault/approle/auth_backend_role.py +186 -63
  9. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  10. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  11. pulumi_vault/audit.py +20 -12
  12. pulumi_vault/audit_request_header.py +6 -6
  13. pulumi_vault/auth_backend.py +0 -47
  14. pulumi_vault/aws/auth_backend_client.py +17 -253
  15. pulumi_vault/aws/auth_backend_config_identity.py +4 -0
  16. pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
  17. pulumi_vault/aws/auth_backend_login.py +8 -0
  18. pulumi_vault/aws/auth_backend_role.py +186 -63
  19. pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
  20. pulumi_vault/aws/auth_backend_sts_role.py +4 -0
  21. pulumi_vault/aws/secret_backend_role.py +4 -56
  22. pulumi_vault/aws/secret_backend_static_role.py +4 -2
  23. pulumi_vault/azure/auth_backend_config.py +10 -139
  24. pulumi_vault/azure/auth_backend_role.py +186 -63
  25. pulumi_vault/azure/backend.py +22 -217
  26. pulumi_vault/azure/backend_role.py +18 -14
  27. pulumi_vault/azure/get_access_credentials.py +4 -0
  28. pulumi_vault/cert_auth_backend_role.py +208 -75
  29. pulumi_vault/consul/secret_backend.py +18 -10
  30. pulumi_vault/consul/secret_backend_role.py +4 -2
  31. pulumi_vault/database/_inputs.py +784 -522
  32. pulumi_vault/database/outputs.py +784 -522
  33. pulumi_vault/database/secret_backend_connection.py +4 -2
  34. pulumi_vault/database/secret_backend_role.py +4 -4
  35. pulumi_vault/database/secret_backend_static_role.py +8 -10
  36. pulumi_vault/database/secrets_mount.py +4 -286
  37. pulumi_vault/egp_policy.py +8 -4
  38. pulumi_vault/gcp/auth_backend.py +18 -226
  39. pulumi_vault/gcp/auth_backend_role.py +264 -63
  40. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  41. pulumi_vault/gcp/secret_backend.py +9 -275
  42. pulumi_vault/gcp/secret_impersonated_account.py +14 -12
  43. pulumi_vault/gcp/secret_roleset.py +6 -4
  44. pulumi_vault/gcp/secret_static_account.py +16 -14
  45. pulumi_vault/generic/endpoint.py +8 -4
  46. pulumi_vault/generic/get_secret.py +4 -40
  47. pulumi_vault/get_auth_backend.py +4 -0
  48. pulumi_vault/get_auth_backends.py +8 -0
  49. pulumi_vault/get_namespace.py +12 -0
  50. pulumi_vault/get_namespaces.py +12 -4
  51. pulumi_vault/get_nomad_access_token.py +4 -0
  52. pulumi_vault/get_policy_document.py +8 -8
  53. pulumi_vault/get_raft_autopilot_state.py +4 -0
  54. pulumi_vault/github/auth_backend.py +4 -0
  55. pulumi_vault/github/team.py +6 -2
  56. pulumi_vault/github/user.py +6 -2
  57. pulumi_vault/identity/entity.py +8 -6
  58. pulumi_vault/identity/entity_alias.py +8 -6
  59. pulumi_vault/identity/entity_policies.py +12 -12
  60. pulumi_vault/identity/get_entity.py +4 -0
  61. pulumi_vault/identity/get_group.py +4 -0
  62. pulumi_vault/identity/get_oidc_client_creds.py +4 -2
  63. pulumi_vault/identity/get_oidc_openid_config.py +6 -10
  64. pulumi_vault/identity/get_oidc_public_keys.py +6 -10
  65. pulumi_vault/identity/group.py +42 -38
  66. pulumi_vault/identity/group_alias.py +4 -2
  67. pulumi_vault/identity/group_member_entity_ids.py +16 -12
  68. pulumi_vault/identity/group_member_group_ids.py +20 -24
  69. pulumi_vault/identity/group_policies.py +8 -4
  70. pulumi_vault/identity/mfa_duo.py +8 -4
  71. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  72. pulumi_vault/identity/mfa_okta.py +8 -4
  73. pulumi_vault/identity/mfa_pingid.py +4 -0
  74. pulumi_vault/identity/mfa_totp.py +4 -0
  75. pulumi_vault/identity/oidc.py +4 -0
  76. pulumi_vault/identity/oidc_assignment.py +6 -10
  77. pulumi_vault/identity/oidc_client.py +10 -10
  78. pulumi_vault/identity/oidc_key.py +12 -16
  79. pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
  80. pulumi_vault/identity/oidc_provider.py +16 -22
  81. pulumi_vault/identity/oidc_role.py +20 -28
  82. pulumi_vault/identity/oidc_scope.py +8 -6
  83. pulumi_vault/jwt/auth_backend.py +32 -20
  84. pulumi_vault/jwt/auth_backend_role.py +225 -91
  85. pulumi_vault/kmip/secret_backend.py +14 -10
  86. pulumi_vault/kmip/secret_role.py +4 -0
  87. pulumi_vault/kmip/secret_scope.py +4 -0
  88. pulumi_vault/kubernetes/auth_backend_config.py +4 -0
  89. pulumi_vault/kubernetes/auth_backend_role.py +172 -56
  90. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  91. pulumi_vault/kubernetes/secret_backend.py +8 -288
  92. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  93. pulumi_vault/kv/get_secret.py +4 -0
  94. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
  95. pulumi_vault/kv/get_secret_v2.py +0 -58
  96. pulumi_vault/kv/get_secrets_list.py +8 -4
  97. pulumi_vault/kv/get_secrets_list_v2.py +12 -14
  98. pulumi_vault/kv/secret.py +4 -0
  99. pulumi_vault/kv/secret_backend_v2.py +4 -0
  100. pulumi_vault/kv/secret_v2.py +4 -2
  101. pulumi_vault/ldap/auth_backend.py +161 -66
  102. pulumi_vault/ldap/auth_backend_group.py +4 -0
  103. pulumi_vault/ldap/auth_backend_user.py +4 -0
  104. pulumi_vault/ldap/secret_backend.py +8 -286
  105. pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
  106. pulumi_vault/ldap/secret_backend_library_set.py +4 -2
  107. pulumi_vault/ldap/secret_backend_static_role.py +4 -0
  108. pulumi_vault/managed/_inputs.py +132 -84
  109. pulumi_vault/managed/keys.py +28 -7
  110. pulumi_vault/managed/outputs.py +132 -84
  111. pulumi_vault/mfa_duo.py +6 -4
  112. pulumi_vault/mfa_okta.py +6 -4
  113. pulumi_vault/mfa_pingid.py +6 -4
  114. pulumi_vault/mfa_totp.py +12 -10
  115. pulumi_vault/mongodbatlas/secret_backend.py +4 -0
  116. pulumi_vault/mongodbatlas/secret_role.py +4 -2
  117. pulumi_vault/mount.py +42 -350
  118. pulumi_vault/nomad_secret_backend.py +8 -4
  119. pulumi_vault/nomad_secret_role.py +4 -0
  120. pulumi_vault/okta/_inputs.py +8 -8
  121. pulumi_vault/okta/auth_backend.py +10 -459
  122. pulumi_vault/okta/auth_backend_group.py +4 -0
  123. pulumi_vault/okta/auth_backend_user.py +4 -0
  124. pulumi_vault/okta/outputs.py +8 -8
  125. pulumi_vault/outputs.py +20 -0
  126. pulumi_vault/password_policy.py +8 -6
  127. pulumi_vault/pkisecret/__init__.py +0 -2
  128. pulumi_vault/pkisecret/_inputs.py +0 -30
  129. pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
  130. pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
  131. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  132. pulumi_vault/pkisecret/get_backend_key.py +6 -2
  133. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  134. pulumi_vault/pkisecret/outputs.py +0 -54
  135. pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
  136. pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
  137. pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
  138. pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
  139. pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
  140. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
  141. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
  142. pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
  143. pulumi_vault/pkisecret/secret_backend_role.py +4 -2
  144. pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
  145. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
  146. pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
  147. pulumi_vault/provider.py +8 -0
  148. pulumi_vault/pulumi-plugin.json +1 -2
  149. pulumi_vault/quota_lease_count.py +8 -53
  150. pulumi_vault/quota_rate_limit.py +4 -49
  151. pulumi_vault/rabbitmq/secret_backend.py +8 -4
  152. pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
  153. pulumi_vault/raft_autopilot.py +4 -0
  154. pulumi_vault/raft_snapshot_agent_config.py +304 -109
  155. pulumi_vault/rgp_policy.py +6 -2
  156. pulumi_vault/saml/auth_backend.py +12 -8
  157. pulumi_vault/saml/auth_backend_role.py +178 -64
  158. pulumi_vault/secrets/sync_association.py +10 -12
  159. pulumi_vault/secrets/sync_aws_destination.py +8 -6
  160. pulumi_vault/secrets/sync_azure_destination.py +12 -10
  161. pulumi_vault/secrets/sync_config.py +6 -2
  162. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  163. pulumi_vault/secrets/sync_gh_destination.py +8 -6
  164. pulumi_vault/secrets/sync_github_apps.py +8 -8
  165. pulumi_vault/secrets/sync_vercel_destination.py +8 -6
  166. pulumi_vault/ssh/_inputs.py +32 -6
  167. pulumi_vault/ssh/outputs.py +32 -6
  168. pulumi_vault/ssh/secret_backend_ca.py +4 -94
  169. pulumi_vault/ssh/secret_backend_role.py +4 -4
  170. pulumi_vault/terraformcloud/secret_backend.py +56 -0
  171. pulumi_vault/terraformcloud/secret_creds.py +17 -2
  172. pulumi_vault/terraformcloud/secret_role.py +69 -2
  173. pulumi_vault/token.py +18 -14
  174. pulumi_vault/tokenauth/auth_backend_role.py +180 -64
  175. pulumi_vault/transform/alphabet.py +6 -4
  176. pulumi_vault/transform/get_decode.py +4 -4
  177. pulumi_vault/transform/get_encode.py +4 -4
  178. pulumi_vault/transform/role.py +6 -4
  179. pulumi_vault/transform/template.py +4 -4
  180. pulumi_vault/transit/get_decrypt.py +20 -4
  181. pulumi_vault/transit/get_encrypt.py +14 -0
  182. pulumi_vault/transit/secret_backend_key.py +6 -6
  183. pulumi_vault/transit/secret_cache_config.py +4 -0
  184. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
  185. pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
  186. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +1 -1
  187. pulumi_vault/pkisecret/backend_config_est.py +0 -614
  188. pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
  189. pulumi_vault/plugin.py +0 -590
  190. pulumi_vault/plugin_pinned_version.py +0 -293
  191. pulumi_vault-6.2.0.dist-info/RECORD +0 -256
  192. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -75,15 +75,34 @@ class CertAuthBackendRoleArgs:
75
75
  Requires Vault version 1.13+.
76
76
  :param pulumi.Input[Sequence[pulumi.Input[str]]] required_extensions: TLS extensions required on
77
77
  client certificates
78
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
79
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
80
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
81
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
82
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
83
- :param pulumi.Input[int] token_period: Generated Token's Period
84
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
85
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
86
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
78
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
79
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
80
+ as well.
81
+ :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
82
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
83
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
84
+ `token_max_ttl` would otherwise allow a renewal.
85
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
86
+ Its current value will be referenced at renewal time.
87
+ :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
88
+ generated tokens; otherwise it will be added to the policies set in token_policies.
89
+ :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/cert#token_num_uses)
90
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
91
+ :param pulumi.Input[int] token_period: If set, indicates that the
92
+ token generated using this role should never expire. The token should be renewed within the
93
+ duration specified by this value. At each renewal, the token's TTL will be set to the
94
+ value of this field. Specified in seconds.
95
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
96
+ on the auth method, this list may be supplemented by user/group/other values.
97
+ :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
98
+ Its current value will be referenced at renewal time.
99
+ :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
100
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
101
+ `service` tokens). For token store roles, there are two additional possibilities:
102
+ `default-service` and `default-batch` which specify the type to return unless the client
103
+ requests a different type at generation time.
104
+
105
+ For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
87
106
  """
88
107
  pulumi.set(__self__, "certificate", certificate)
89
108
  if allowed_common_names is not None:
@@ -361,7 +380,9 @@ class CertAuthBackendRoleArgs:
361
380
  @pulumi.getter(name="tokenBoundCidrs")
362
381
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
363
382
  """
364
- Specifies the blocks of IP addresses which are allowed to use the generated token
383
+ List of CIDR blocks; if set, specifies blocks of IP
384
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
385
+ as well.
365
386
  """
366
387
  return pulumi.get(self, "token_bound_cidrs")
367
388
 
@@ -373,7 +394,10 @@ class CertAuthBackendRoleArgs:
373
394
  @pulumi.getter(name="tokenExplicitMaxTtl")
374
395
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
375
396
  """
376
- Generated Token's Explicit Maximum TTL in seconds
397
+ If set, will encode an
398
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
399
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
400
+ `token_max_ttl` would otherwise allow a renewal.
377
401
  """
378
402
  return pulumi.get(self, "token_explicit_max_ttl")
379
403
 
@@ -385,7 +409,8 @@ class CertAuthBackendRoleArgs:
385
409
  @pulumi.getter(name="tokenMaxTtl")
386
410
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
387
411
  """
388
- The maximum lifetime of the generated token
412
+ The maximum lifetime for generated tokens in number of seconds.
413
+ Its current value will be referenced at renewal time.
389
414
  """
390
415
  return pulumi.get(self, "token_max_ttl")
391
416
 
@@ -397,7 +422,8 @@ class CertAuthBackendRoleArgs:
397
422
  @pulumi.getter(name="tokenNoDefaultPolicy")
398
423
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
399
424
  """
400
- If true, the 'default' policy will not automatically be added to generated tokens
425
+ If set, the default policy will not be set on
426
+ generated tokens; otherwise it will be added to the policies set in token_policies.
401
427
  """
402
428
  return pulumi.get(self, "token_no_default_policy")
403
429
 
@@ -409,7 +435,8 @@ class CertAuthBackendRoleArgs:
409
435
  @pulumi.getter(name="tokenNumUses")
410
436
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
411
437
  """
412
- The maximum number of times a token may be used, a value of zero means unlimited
438
+ The [maximum number](https://www.vaultproject.io/api-docs/auth/cert#token_num_uses)
439
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
413
440
  """
414
441
  return pulumi.get(self, "token_num_uses")
415
442
 
@@ -421,7 +448,10 @@ class CertAuthBackendRoleArgs:
421
448
  @pulumi.getter(name="tokenPeriod")
422
449
  def token_period(self) -> Optional[pulumi.Input[int]]:
423
450
  """
424
- Generated Token's Period
451
+ If set, indicates that the
452
+ token generated using this role should never expire. The token should be renewed within the
453
+ duration specified by this value. At each renewal, the token's TTL will be set to the
454
+ value of this field. Specified in seconds.
425
455
  """
426
456
  return pulumi.get(self, "token_period")
427
457
 
@@ -433,7 +463,8 @@ class CertAuthBackendRoleArgs:
433
463
  @pulumi.getter(name="tokenPolicies")
434
464
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
435
465
  """
436
- Generated Token's Policies
466
+ List of policies to encode onto generated tokens. Depending
467
+ on the auth method, this list may be supplemented by user/group/other values.
437
468
  """
438
469
  return pulumi.get(self, "token_policies")
439
470
 
@@ -445,7 +476,8 @@ class CertAuthBackendRoleArgs:
445
476
  @pulumi.getter(name="tokenTtl")
446
477
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
447
478
  """
448
- The initial ttl of the token to generate in seconds
479
+ The incremental lifetime for generated tokens in number of seconds.
480
+ Its current value will be referenced at renewal time.
449
481
  """
450
482
  return pulumi.get(self, "token_ttl")
451
483
 
@@ -457,7 +489,13 @@ class CertAuthBackendRoleArgs:
457
489
  @pulumi.getter(name="tokenType")
458
490
  def token_type(self) -> Optional[pulumi.Input[str]]:
459
491
  """
460
- The type of token to generate, service or batch
492
+ The type of token that should be generated. Can be `service`,
493
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
494
+ `service` tokens). For token store roles, there are two additional possibilities:
495
+ `default-service` and `default-batch` which specify the type to return unless the client
496
+ requests a different type at generation time.
497
+
498
+ For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
461
499
  """
462
500
  return pulumi.get(self, "token_type")
463
501
 
@@ -530,15 +568,34 @@ class _CertAuthBackendRoleState:
530
568
  Requires Vault version 1.13+.
531
569
  :param pulumi.Input[Sequence[pulumi.Input[str]]] required_extensions: TLS extensions required on
532
570
  client certificates
533
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
534
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
535
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
536
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
537
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
538
- :param pulumi.Input[int] token_period: Generated Token's Period
539
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
540
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
541
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
571
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
572
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
573
+ as well.
574
+ :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
575
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
576
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
577
+ `token_max_ttl` would otherwise allow a renewal.
578
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
579
+ Its current value will be referenced at renewal time.
580
+ :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
581
+ generated tokens; otherwise it will be added to the policies set in token_policies.
582
+ :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/cert#token_num_uses)
583
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
584
+ :param pulumi.Input[int] token_period: If set, indicates that the
585
+ token generated using this role should never expire. The token should be renewed within the
586
+ duration specified by this value. At each renewal, the token's TTL will be set to the
587
+ value of this field. Specified in seconds.
588
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
589
+ on the auth method, this list may be supplemented by user/group/other values.
590
+ :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
591
+ Its current value will be referenced at renewal time.
592
+ :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
593
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
594
+ `service` tokens). For token store roles, there are two additional possibilities:
595
+ `default-service` and `default-batch` which specify the type to return unless the client
596
+ requests a different type at generation time.
597
+
598
+ For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
542
599
  """
543
600
  if allowed_common_names is not None:
544
601
  pulumi.set(__self__, "allowed_common_names", allowed_common_names)
@@ -817,7 +874,9 @@ class _CertAuthBackendRoleState:
817
874
  @pulumi.getter(name="tokenBoundCidrs")
818
875
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
819
876
  """
820
- Specifies the blocks of IP addresses which are allowed to use the generated token
877
+ List of CIDR blocks; if set, specifies blocks of IP
878
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
879
+ as well.
821
880
  """
822
881
  return pulumi.get(self, "token_bound_cidrs")
823
882
 
@@ -829,7 +888,10 @@ class _CertAuthBackendRoleState:
829
888
  @pulumi.getter(name="tokenExplicitMaxTtl")
830
889
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
831
890
  """
832
- Generated Token's Explicit Maximum TTL in seconds
891
+ If set, will encode an
892
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
893
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
894
+ `token_max_ttl` would otherwise allow a renewal.
833
895
  """
834
896
  return pulumi.get(self, "token_explicit_max_ttl")
835
897
 
@@ -841,7 +903,8 @@ class _CertAuthBackendRoleState:
841
903
  @pulumi.getter(name="tokenMaxTtl")
842
904
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
843
905
  """
844
- The maximum lifetime of the generated token
906
+ The maximum lifetime for generated tokens in number of seconds.
907
+ Its current value will be referenced at renewal time.
845
908
  """
846
909
  return pulumi.get(self, "token_max_ttl")
847
910
 
@@ -853,7 +916,8 @@ class _CertAuthBackendRoleState:
853
916
  @pulumi.getter(name="tokenNoDefaultPolicy")
854
917
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
855
918
  """
856
- If true, the 'default' policy will not automatically be added to generated tokens
919
+ If set, the default policy will not be set on
920
+ generated tokens; otherwise it will be added to the policies set in token_policies.
857
921
  """
858
922
  return pulumi.get(self, "token_no_default_policy")
859
923
 
@@ -865,7 +929,8 @@ class _CertAuthBackendRoleState:
865
929
  @pulumi.getter(name="tokenNumUses")
866
930
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
867
931
  """
868
- The maximum number of times a token may be used, a value of zero means unlimited
932
+ The [maximum number](https://www.vaultproject.io/api-docs/auth/cert#token_num_uses)
933
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
869
934
  """
870
935
  return pulumi.get(self, "token_num_uses")
871
936
 
@@ -877,7 +942,10 @@ class _CertAuthBackendRoleState:
877
942
  @pulumi.getter(name="tokenPeriod")
878
943
  def token_period(self) -> Optional[pulumi.Input[int]]:
879
944
  """
880
- Generated Token's Period
945
+ If set, indicates that the
946
+ token generated using this role should never expire. The token should be renewed within the
947
+ duration specified by this value. At each renewal, the token's TTL will be set to the
948
+ value of this field. Specified in seconds.
881
949
  """
882
950
  return pulumi.get(self, "token_period")
883
951
 
@@ -889,7 +957,8 @@ class _CertAuthBackendRoleState:
889
957
  @pulumi.getter(name="tokenPolicies")
890
958
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
891
959
  """
892
- Generated Token's Policies
960
+ List of policies to encode onto generated tokens. Depending
961
+ on the auth method, this list may be supplemented by user/group/other values.
893
962
  """
894
963
  return pulumi.get(self, "token_policies")
895
964
 
@@ -901,7 +970,8 @@ class _CertAuthBackendRoleState:
901
970
  @pulumi.getter(name="tokenTtl")
902
971
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
903
972
  """
904
- The initial ttl of the token to generate in seconds
973
+ The incremental lifetime for generated tokens in number of seconds.
974
+ Its current value will be referenced at renewal time.
905
975
  """
906
976
  return pulumi.get(self, "token_ttl")
907
977
 
@@ -913,7 +983,13 @@ class _CertAuthBackendRoleState:
913
983
  @pulumi.getter(name="tokenType")
914
984
  def token_type(self) -> Optional[pulumi.Input[str]]:
915
985
  """
916
- The type of token to generate, service or batch
986
+ The type of token that should be generated. Can be `service`,
987
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
988
+ `service` tokens). For token store roles, there are two additional possibilities:
989
+ `default-service` and `default-batch` which specify the type to return unless the client
990
+ requests a different type at generation time.
991
+
992
+ For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
917
993
  """
918
994
  return pulumi.get(self, "token_type")
919
995
 
@@ -959,18 +1035,17 @@ class CertAuthBackendRole(pulumi.CustomResource):
959
1035
 
960
1036
  ## Example Usage
961
1037
 
1038
+ <!--Start PulumiCodeChooser -->
962
1039
  ```python
963
1040
  import pulumi
964
- import pulumi_std as std
965
1041
  import pulumi_vault as vault
966
1042
 
967
- cert = vault.AuthBackend("cert",
1043
+ cert_auth_backend = vault.AuthBackend("certAuthBackend",
968
1044
  path="cert",
969
1045
  type="cert")
970
- cert_cert_auth_backend_role = vault.CertAuthBackendRole("cert",
971
- name="foo",
972
- certificate=std.file(input="/path/to/certs/ca-cert.pem").result,
973
- backend=cert.path,
1046
+ cert_cert_auth_backend_role = vault.CertAuthBackendRole("certCertAuthBackendRole",
1047
+ certificate=(lambda path: open(path).read())("/path/to/certs/ca-cert.pem"),
1048
+ backend=cert_auth_backend.path,
974
1049
  allowed_names=[
975
1050
  "foo.example.org",
976
1051
  "baz.example.org",
@@ -979,6 +1054,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
979
1054
  token_max_ttl=600,
980
1055
  token_policies=["foo"])
981
1056
  ```
1057
+ <!--End PulumiCodeChooser -->
982
1058
 
983
1059
  :param str resource_name: The name of the resource.
984
1060
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -1015,15 +1091,34 @@ class CertAuthBackendRole(pulumi.CustomResource):
1015
1091
  Requires Vault version 1.13+.
1016
1092
  :param pulumi.Input[Sequence[pulumi.Input[str]]] required_extensions: TLS extensions required on
1017
1093
  client certificates
1018
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
1019
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
1020
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
1021
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
1022
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
1023
- :param pulumi.Input[int] token_period: Generated Token's Period
1024
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
1025
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
1026
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
1094
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
1095
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
1096
+ as well.
1097
+ :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
1098
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1099
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1100
+ `token_max_ttl` would otherwise allow a renewal.
1101
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
1102
+ Its current value will be referenced at renewal time.
1103
+ :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
1104
+ generated tokens; otherwise it will be added to the policies set in token_policies.
1105
+ :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/cert#token_num_uses)
1106
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
1107
+ :param pulumi.Input[int] token_period: If set, indicates that the
1108
+ token generated using this role should never expire. The token should be renewed within the
1109
+ duration specified by this value. At each renewal, the token's TTL will be set to the
1110
+ value of this field. Specified in seconds.
1111
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
1112
+ on the auth method, this list may be supplemented by user/group/other values.
1113
+ :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
1114
+ Its current value will be referenced at renewal time.
1115
+ :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
1116
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
1117
+ `service` tokens). For token store roles, there are two additional possibilities:
1118
+ `default-service` and `default-batch` which specify the type to return unless the client
1119
+ requests a different type at generation time.
1120
+
1121
+ For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
1027
1122
  """
1028
1123
  ...
1029
1124
  @overload
@@ -1036,18 +1131,17 @@ class CertAuthBackendRole(pulumi.CustomResource):
1036
1131
 
1037
1132
  ## Example Usage
1038
1133
 
1134
+ <!--Start PulumiCodeChooser -->
1039
1135
  ```python
1040
1136
  import pulumi
1041
- import pulumi_std as std
1042
1137
  import pulumi_vault as vault
1043
1138
 
1044
- cert = vault.AuthBackend("cert",
1139
+ cert_auth_backend = vault.AuthBackend("certAuthBackend",
1045
1140
  path="cert",
1046
1141
  type="cert")
1047
- cert_cert_auth_backend_role = vault.CertAuthBackendRole("cert",
1048
- name="foo",
1049
- certificate=std.file(input="/path/to/certs/ca-cert.pem").result,
1050
- backend=cert.path,
1142
+ cert_cert_auth_backend_role = vault.CertAuthBackendRole("certCertAuthBackendRole",
1143
+ certificate=(lambda path: open(path).read())("/path/to/certs/ca-cert.pem"),
1144
+ backend=cert_auth_backend.path,
1051
1145
  allowed_names=[
1052
1146
  "foo.example.org",
1053
1147
  "baz.example.org",
@@ -1056,6 +1150,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
1056
1150
  token_max_ttl=600,
1057
1151
  token_policies=["foo"])
1058
1152
  ```
1153
+ <!--End PulumiCodeChooser -->
1059
1154
 
1060
1155
  :param str resource_name: The name of the resource.
1061
1156
  :param CertAuthBackendRoleArgs args: The arguments to use to populate this resource's properties.
@@ -1211,15 +1306,34 @@ class CertAuthBackendRole(pulumi.CustomResource):
1211
1306
  Requires Vault version 1.13+.
1212
1307
  :param pulumi.Input[Sequence[pulumi.Input[str]]] required_extensions: TLS extensions required on
1213
1308
  client certificates
1214
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
1215
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
1216
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
1217
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
1218
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
1219
- :param pulumi.Input[int] token_period: Generated Token's Period
1220
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
1221
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
1222
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
1309
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
1310
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
1311
+ as well.
1312
+ :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
1313
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1314
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1315
+ `token_max_ttl` would otherwise allow a renewal.
1316
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
1317
+ Its current value will be referenced at renewal time.
1318
+ :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
1319
+ generated tokens; otherwise it will be added to the policies set in token_policies.
1320
+ :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/cert#token_num_uses)
1321
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
1322
+ :param pulumi.Input[int] token_period: If set, indicates that the
1323
+ token generated using this role should never expire. The token should be renewed within the
1324
+ duration specified by this value. At each renewal, the token's TTL will be set to the
1325
+ value of this field. Specified in seconds.
1326
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
1327
+ on the auth method, this list may be supplemented by user/group/other values.
1328
+ :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
1329
+ Its current value will be referenced at renewal time.
1330
+ :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
1331
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
1332
+ `service` tokens). For token store roles, there are two additional possibilities:
1333
+ `default-service` and `default-batch` which specify the type to return unless the client
1334
+ requests a different type at generation time.
1335
+
1336
+ For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
1223
1337
  """
1224
1338
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
1225
1339
 
@@ -1409,7 +1523,9 @@ class CertAuthBackendRole(pulumi.CustomResource):
1409
1523
  @pulumi.getter(name="tokenBoundCidrs")
1410
1524
  def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
1411
1525
  """
1412
- Specifies the blocks of IP addresses which are allowed to use the generated token
1526
+ List of CIDR blocks; if set, specifies blocks of IP
1527
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
1528
+ as well.
1413
1529
  """
1414
1530
  return pulumi.get(self, "token_bound_cidrs")
1415
1531
 
@@ -1417,7 +1533,10 @@ class CertAuthBackendRole(pulumi.CustomResource):
1417
1533
  @pulumi.getter(name="tokenExplicitMaxTtl")
1418
1534
  def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
1419
1535
  """
1420
- Generated Token's Explicit Maximum TTL in seconds
1536
+ If set, will encode an
1537
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1538
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1539
+ `token_max_ttl` would otherwise allow a renewal.
1421
1540
  """
1422
1541
  return pulumi.get(self, "token_explicit_max_ttl")
1423
1542
 
@@ -1425,7 +1544,8 @@ class CertAuthBackendRole(pulumi.CustomResource):
1425
1544
  @pulumi.getter(name="tokenMaxTtl")
1426
1545
  def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
1427
1546
  """
1428
- The maximum lifetime of the generated token
1547
+ The maximum lifetime for generated tokens in number of seconds.
1548
+ Its current value will be referenced at renewal time.
1429
1549
  """
1430
1550
  return pulumi.get(self, "token_max_ttl")
1431
1551
 
@@ -1433,7 +1553,8 @@ class CertAuthBackendRole(pulumi.CustomResource):
1433
1553
  @pulumi.getter(name="tokenNoDefaultPolicy")
1434
1554
  def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
1435
1555
  """
1436
- If true, the 'default' policy will not automatically be added to generated tokens
1556
+ If set, the default policy will not be set on
1557
+ generated tokens; otherwise it will be added to the policies set in token_policies.
1437
1558
  """
1438
1559
  return pulumi.get(self, "token_no_default_policy")
1439
1560
 
@@ -1441,7 +1562,8 @@ class CertAuthBackendRole(pulumi.CustomResource):
1441
1562
  @pulumi.getter(name="tokenNumUses")
1442
1563
  def token_num_uses(self) -> pulumi.Output[Optional[int]]:
1443
1564
  """
1444
- The maximum number of times a token may be used, a value of zero means unlimited
1565
+ The [maximum number](https://www.vaultproject.io/api-docs/auth/cert#token_num_uses)
1566
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
1445
1567
  """
1446
1568
  return pulumi.get(self, "token_num_uses")
1447
1569
 
@@ -1449,7 +1571,10 @@ class CertAuthBackendRole(pulumi.CustomResource):
1449
1571
  @pulumi.getter(name="tokenPeriod")
1450
1572
  def token_period(self) -> pulumi.Output[Optional[int]]:
1451
1573
  """
1452
- Generated Token's Period
1574
+ If set, indicates that the
1575
+ token generated using this role should never expire. The token should be renewed within the
1576
+ duration specified by this value. At each renewal, the token's TTL will be set to the
1577
+ value of this field. Specified in seconds.
1453
1578
  """
1454
1579
  return pulumi.get(self, "token_period")
1455
1580
 
@@ -1457,7 +1582,8 @@ class CertAuthBackendRole(pulumi.CustomResource):
1457
1582
  @pulumi.getter(name="tokenPolicies")
1458
1583
  def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
1459
1584
  """
1460
- Generated Token's Policies
1585
+ List of policies to encode onto generated tokens. Depending
1586
+ on the auth method, this list may be supplemented by user/group/other values.
1461
1587
  """
1462
1588
  return pulumi.get(self, "token_policies")
1463
1589
 
@@ -1465,7 +1591,8 @@ class CertAuthBackendRole(pulumi.CustomResource):
1465
1591
  @pulumi.getter(name="tokenTtl")
1466
1592
  def token_ttl(self) -> pulumi.Output[Optional[int]]:
1467
1593
  """
1468
- The initial ttl of the token to generate in seconds
1594
+ The incremental lifetime for generated tokens in number of seconds.
1595
+ Its current value will be referenced at renewal time.
1469
1596
  """
1470
1597
  return pulumi.get(self, "token_ttl")
1471
1598
 
@@ -1473,7 +1600,13 @@ class CertAuthBackendRole(pulumi.CustomResource):
1473
1600
  @pulumi.getter(name="tokenType")
1474
1601
  def token_type(self) -> pulumi.Output[Optional[str]]:
1475
1602
  """
1476
- The type of token to generate, service or batch
1603
+ The type of token that should be generated. Can be `service`,
1604
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
1605
+ `service` tokens). For token store roles, there are two additional possibilities:
1606
+ `default-service` and `default-batch` which specify the type to return unless the client
1607
+ requests a different type at generation time.
1608
+
1609
+ For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
1477
1610
  """
1478
1611
  return pulumi.get(self, "token_type")
1479
1612
 
@@ -530,28 +530,32 @@ class SecretBackend(pulumi.CustomResource):
530
530
  ## Example Usage
531
531
 
532
532
  ### Creating a standard backend resource:
533
+ <!--Start PulumiCodeChooser -->
533
534
  ```python
534
535
  import pulumi
535
536
  import pulumi_vault as vault
536
537
 
537
538
  test = vault.consul.SecretBackend("test",
538
- path="consul",
539
- description="Manages the Consul backend",
540
539
  address="127.0.0.1:8500",
540
+ description="Manages the Consul backend",
541
+ path="consul",
541
542
  token="4240861b-ce3d-8530-115a-521ff070dd29")
542
543
  ```
544
+ <!--End PulumiCodeChooser -->
543
545
 
544
546
  ### Creating a backend resource to bootstrap a new Consul instance:
547
+ <!--Start PulumiCodeChooser -->
545
548
  ```python
546
549
  import pulumi
547
550
  import pulumi_vault as vault
548
551
 
549
552
  test = vault.consul.SecretBackend("test",
550
- path="consul",
551
- description="Bootstrap the Consul backend",
552
553
  address="127.0.0.1:8500",
553
- bootstrap=True)
554
+ bootstrap=True,
555
+ description="Bootstrap the Consul backend",
556
+ path="consul")
554
557
  ```
558
+ <!--End PulumiCodeChooser -->
555
559
 
556
560
  ## Import
557
561
 
@@ -596,28 +600,32 @@ class SecretBackend(pulumi.CustomResource):
596
600
  ## Example Usage
597
601
 
598
602
  ### Creating a standard backend resource:
603
+ <!--Start PulumiCodeChooser -->
599
604
  ```python
600
605
  import pulumi
601
606
  import pulumi_vault as vault
602
607
 
603
608
  test = vault.consul.SecretBackend("test",
604
- path="consul",
605
- description="Manages the Consul backend",
606
609
  address="127.0.0.1:8500",
610
+ description="Manages the Consul backend",
611
+ path="consul",
607
612
  token="4240861b-ce3d-8530-115a-521ff070dd29")
608
613
  ```
614
+ <!--End PulumiCodeChooser -->
609
615
 
610
616
  ### Creating a backend resource to bootstrap a new Consul instance:
617
+ <!--Start PulumiCodeChooser -->
611
618
  ```python
612
619
  import pulumi
613
620
  import pulumi_vault as vault
614
621
 
615
622
  test = vault.consul.SecretBackend("test",
616
- path="consul",
617
- description="Bootstrap the Consul backend",
618
623
  address="127.0.0.1:8500",
619
- bootstrap=True)
624
+ bootstrap=True,
625
+ description="Bootstrap the Consul backend",
626
+ path="consul")
620
627
  ```
628
+ <!--End PulumiCodeChooser -->
621
629
 
622
630
  ## Import
623
631