pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (192) hide show
  1. pulumi_vault/__init__.py +0 -26
  2. pulumi_vault/_inputs.py +20 -0
  3. pulumi_vault/ad/secret_backend.py +6 -2
  4. pulumi_vault/ad/secret_library.py +4 -2
  5. pulumi_vault/ad/secret_role.py +4 -0
  6. pulumi_vault/alicloud/auth_backend_role.py +192 -69
  7. pulumi_vault/approle/auth_backend_login.py +4 -0
  8. pulumi_vault/approle/auth_backend_role.py +186 -63
  9. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  10. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  11. pulumi_vault/audit.py +20 -12
  12. pulumi_vault/audit_request_header.py +6 -6
  13. pulumi_vault/auth_backend.py +0 -47
  14. pulumi_vault/aws/auth_backend_client.py +17 -253
  15. pulumi_vault/aws/auth_backend_config_identity.py +4 -0
  16. pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
  17. pulumi_vault/aws/auth_backend_login.py +8 -0
  18. pulumi_vault/aws/auth_backend_role.py +186 -63
  19. pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
  20. pulumi_vault/aws/auth_backend_sts_role.py +4 -0
  21. pulumi_vault/aws/secret_backend_role.py +4 -56
  22. pulumi_vault/aws/secret_backend_static_role.py +4 -2
  23. pulumi_vault/azure/auth_backend_config.py +10 -139
  24. pulumi_vault/azure/auth_backend_role.py +186 -63
  25. pulumi_vault/azure/backend.py +22 -217
  26. pulumi_vault/azure/backend_role.py +18 -14
  27. pulumi_vault/azure/get_access_credentials.py +4 -0
  28. pulumi_vault/cert_auth_backend_role.py +208 -75
  29. pulumi_vault/consul/secret_backend.py +18 -10
  30. pulumi_vault/consul/secret_backend_role.py +4 -2
  31. pulumi_vault/database/_inputs.py +784 -522
  32. pulumi_vault/database/outputs.py +784 -522
  33. pulumi_vault/database/secret_backend_connection.py +4 -2
  34. pulumi_vault/database/secret_backend_role.py +4 -4
  35. pulumi_vault/database/secret_backend_static_role.py +8 -10
  36. pulumi_vault/database/secrets_mount.py +4 -286
  37. pulumi_vault/egp_policy.py +8 -4
  38. pulumi_vault/gcp/auth_backend.py +18 -226
  39. pulumi_vault/gcp/auth_backend_role.py +264 -63
  40. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  41. pulumi_vault/gcp/secret_backend.py +9 -275
  42. pulumi_vault/gcp/secret_impersonated_account.py +14 -12
  43. pulumi_vault/gcp/secret_roleset.py +6 -4
  44. pulumi_vault/gcp/secret_static_account.py +16 -14
  45. pulumi_vault/generic/endpoint.py +8 -4
  46. pulumi_vault/generic/get_secret.py +4 -40
  47. pulumi_vault/get_auth_backend.py +4 -0
  48. pulumi_vault/get_auth_backends.py +8 -0
  49. pulumi_vault/get_namespace.py +12 -0
  50. pulumi_vault/get_namespaces.py +12 -4
  51. pulumi_vault/get_nomad_access_token.py +4 -0
  52. pulumi_vault/get_policy_document.py +8 -8
  53. pulumi_vault/get_raft_autopilot_state.py +4 -0
  54. pulumi_vault/github/auth_backend.py +4 -0
  55. pulumi_vault/github/team.py +6 -2
  56. pulumi_vault/github/user.py +6 -2
  57. pulumi_vault/identity/entity.py +8 -6
  58. pulumi_vault/identity/entity_alias.py +8 -6
  59. pulumi_vault/identity/entity_policies.py +12 -12
  60. pulumi_vault/identity/get_entity.py +4 -0
  61. pulumi_vault/identity/get_group.py +4 -0
  62. pulumi_vault/identity/get_oidc_client_creds.py +4 -2
  63. pulumi_vault/identity/get_oidc_openid_config.py +6 -10
  64. pulumi_vault/identity/get_oidc_public_keys.py +6 -10
  65. pulumi_vault/identity/group.py +42 -38
  66. pulumi_vault/identity/group_alias.py +4 -2
  67. pulumi_vault/identity/group_member_entity_ids.py +16 -12
  68. pulumi_vault/identity/group_member_group_ids.py +20 -24
  69. pulumi_vault/identity/group_policies.py +8 -4
  70. pulumi_vault/identity/mfa_duo.py +8 -4
  71. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  72. pulumi_vault/identity/mfa_okta.py +8 -4
  73. pulumi_vault/identity/mfa_pingid.py +4 -0
  74. pulumi_vault/identity/mfa_totp.py +4 -0
  75. pulumi_vault/identity/oidc.py +4 -0
  76. pulumi_vault/identity/oidc_assignment.py +6 -10
  77. pulumi_vault/identity/oidc_client.py +10 -10
  78. pulumi_vault/identity/oidc_key.py +12 -16
  79. pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
  80. pulumi_vault/identity/oidc_provider.py +16 -22
  81. pulumi_vault/identity/oidc_role.py +20 -28
  82. pulumi_vault/identity/oidc_scope.py +8 -6
  83. pulumi_vault/jwt/auth_backend.py +32 -20
  84. pulumi_vault/jwt/auth_backend_role.py +225 -91
  85. pulumi_vault/kmip/secret_backend.py +14 -10
  86. pulumi_vault/kmip/secret_role.py +4 -0
  87. pulumi_vault/kmip/secret_scope.py +4 -0
  88. pulumi_vault/kubernetes/auth_backend_config.py +4 -0
  89. pulumi_vault/kubernetes/auth_backend_role.py +172 -56
  90. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  91. pulumi_vault/kubernetes/secret_backend.py +8 -288
  92. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  93. pulumi_vault/kv/get_secret.py +4 -0
  94. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
  95. pulumi_vault/kv/get_secret_v2.py +0 -58
  96. pulumi_vault/kv/get_secrets_list.py +8 -4
  97. pulumi_vault/kv/get_secrets_list_v2.py +12 -14
  98. pulumi_vault/kv/secret.py +4 -0
  99. pulumi_vault/kv/secret_backend_v2.py +4 -0
  100. pulumi_vault/kv/secret_v2.py +4 -2
  101. pulumi_vault/ldap/auth_backend.py +161 -66
  102. pulumi_vault/ldap/auth_backend_group.py +4 -0
  103. pulumi_vault/ldap/auth_backend_user.py +4 -0
  104. pulumi_vault/ldap/secret_backend.py +8 -286
  105. pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
  106. pulumi_vault/ldap/secret_backend_library_set.py +4 -2
  107. pulumi_vault/ldap/secret_backend_static_role.py +4 -0
  108. pulumi_vault/managed/_inputs.py +132 -84
  109. pulumi_vault/managed/keys.py +28 -7
  110. pulumi_vault/managed/outputs.py +132 -84
  111. pulumi_vault/mfa_duo.py +6 -4
  112. pulumi_vault/mfa_okta.py +6 -4
  113. pulumi_vault/mfa_pingid.py +6 -4
  114. pulumi_vault/mfa_totp.py +12 -10
  115. pulumi_vault/mongodbatlas/secret_backend.py +4 -0
  116. pulumi_vault/mongodbatlas/secret_role.py +4 -2
  117. pulumi_vault/mount.py +42 -350
  118. pulumi_vault/nomad_secret_backend.py +8 -4
  119. pulumi_vault/nomad_secret_role.py +4 -0
  120. pulumi_vault/okta/_inputs.py +8 -8
  121. pulumi_vault/okta/auth_backend.py +10 -459
  122. pulumi_vault/okta/auth_backend_group.py +4 -0
  123. pulumi_vault/okta/auth_backend_user.py +4 -0
  124. pulumi_vault/okta/outputs.py +8 -8
  125. pulumi_vault/outputs.py +20 -0
  126. pulumi_vault/password_policy.py +8 -6
  127. pulumi_vault/pkisecret/__init__.py +0 -2
  128. pulumi_vault/pkisecret/_inputs.py +0 -30
  129. pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
  130. pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
  131. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  132. pulumi_vault/pkisecret/get_backend_key.py +6 -2
  133. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  134. pulumi_vault/pkisecret/outputs.py +0 -54
  135. pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
  136. pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
  137. pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
  138. pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
  139. pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
  140. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
  141. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
  142. pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
  143. pulumi_vault/pkisecret/secret_backend_role.py +4 -2
  144. pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
  145. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
  146. pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
  147. pulumi_vault/provider.py +8 -0
  148. pulumi_vault/pulumi-plugin.json +1 -2
  149. pulumi_vault/quota_lease_count.py +8 -53
  150. pulumi_vault/quota_rate_limit.py +4 -49
  151. pulumi_vault/rabbitmq/secret_backend.py +8 -4
  152. pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
  153. pulumi_vault/raft_autopilot.py +4 -0
  154. pulumi_vault/raft_snapshot_agent_config.py +304 -109
  155. pulumi_vault/rgp_policy.py +6 -2
  156. pulumi_vault/saml/auth_backend.py +12 -8
  157. pulumi_vault/saml/auth_backend_role.py +178 -64
  158. pulumi_vault/secrets/sync_association.py +10 -12
  159. pulumi_vault/secrets/sync_aws_destination.py +8 -6
  160. pulumi_vault/secrets/sync_azure_destination.py +12 -10
  161. pulumi_vault/secrets/sync_config.py +6 -2
  162. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  163. pulumi_vault/secrets/sync_gh_destination.py +8 -6
  164. pulumi_vault/secrets/sync_github_apps.py +8 -8
  165. pulumi_vault/secrets/sync_vercel_destination.py +8 -6
  166. pulumi_vault/ssh/_inputs.py +32 -6
  167. pulumi_vault/ssh/outputs.py +32 -6
  168. pulumi_vault/ssh/secret_backend_ca.py +4 -94
  169. pulumi_vault/ssh/secret_backend_role.py +4 -4
  170. pulumi_vault/terraformcloud/secret_backend.py +56 -0
  171. pulumi_vault/terraformcloud/secret_creds.py +17 -2
  172. pulumi_vault/terraformcloud/secret_role.py +69 -2
  173. pulumi_vault/token.py +18 -14
  174. pulumi_vault/tokenauth/auth_backend_role.py +180 -64
  175. pulumi_vault/transform/alphabet.py +6 -4
  176. pulumi_vault/transform/get_decode.py +4 -4
  177. pulumi_vault/transform/get_encode.py +4 -4
  178. pulumi_vault/transform/role.py +6 -4
  179. pulumi_vault/transform/template.py +4 -4
  180. pulumi_vault/transit/get_decrypt.py +20 -4
  181. pulumi_vault/transit/get_encrypt.py +14 -0
  182. pulumi_vault/transit/secret_backend_key.py +6 -6
  183. pulumi_vault/transit/secret_cache_config.py +4 -0
  184. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
  185. pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
  186. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +1 -1
  187. pulumi_vault/pkisecret/backend_config_est.py +0 -614
  188. pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
  189. pulumi_vault/plugin.py +0 -590
  190. pulumi_vault/plugin_pinned_version.py +0 -293
  191. pulumi_vault-6.2.0.dist-info/RECORD +0 -256
  192. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -51,15 +51,32 @@ class AuthBackendRoleArgs:
51
51
  expire. A value of zero will allow unlimited uses.
52
52
  :param pulumi.Input[int] secret_id_ttl: The number of seconds after which any SecretID
53
53
  expires.
54
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
55
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
56
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
57
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
58
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
59
- :param pulumi.Input[int] token_period: Generated Token's Period
60
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
61
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
62
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
54
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
55
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
56
+ as well.
57
+ :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
58
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
59
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
60
+ `token_max_ttl` would otherwise allow a renewal.
61
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
62
+ Its current value will be referenced at renewal time.
63
+ :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
64
+ generated tokens; otherwise it will be added to the policies set in token_policies.
65
+ :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/approle#token_num_uses)
66
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
67
+ :param pulumi.Input[int] token_period: If set, indicates that the
68
+ token generated using this role should never expire. The token should be renewed within the
69
+ duration specified by this value. At each renewal, the token's TTL will be set to the
70
+ value of this field. Specified in seconds.
71
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
72
+ on the auth method, this list may be supplemented by user/group/other values.
73
+ :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
74
+ Its current value will be referenced at renewal time.
75
+ :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
76
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
77
+ `service` tokens). For token store roles, there are two additional possibilities:
78
+ `default-service` and `default-batch` which specify the type to return unless the client
79
+ requests a different type at generation time.
63
80
  """
64
81
  pulumi.set(__self__, "role_name", role_name)
65
82
  if backend is not None:
@@ -205,7 +222,9 @@ class AuthBackendRoleArgs:
205
222
  @pulumi.getter(name="tokenBoundCidrs")
206
223
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
207
224
  """
208
- Specifies the blocks of IP addresses which are allowed to use the generated token
225
+ List of CIDR blocks; if set, specifies blocks of IP
226
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
227
+ as well.
209
228
  """
210
229
  return pulumi.get(self, "token_bound_cidrs")
211
230
 
@@ -217,7 +236,10 @@ class AuthBackendRoleArgs:
217
236
  @pulumi.getter(name="tokenExplicitMaxTtl")
218
237
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
219
238
  """
220
- Generated Token's Explicit Maximum TTL in seconds
239
+ If set, will encode an
240
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
241
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
242
+ `token_max_ttl` would otherwise allow a renewal.
221
243
  """
222
244
  return pulumi.get(self, "token_explicit_max_ttl")
223
245
 
@@ -229,7 +251,8 @@ class AuthBackendRoleArgs:
229
251
  @pulumi.getter(name="tokenMaxTtl")
230
252
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
231
253
  """
232
- The maximum lifetime of the generated token
254
+ The maximum lifetime for generated tokens in number of seconds.
255
+ Its current value will be referenced at renewal time.
233
256
  """
234
257
  return pulumi.get(self, "token_max_ttl")
235
258
 
@@ -241,7 +264,8 @@ class AuthBackendRoleArgs:
241
264
  @pulumi.getter(name="tokenNoDefaultPolicy")
242
265
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
243
266
  """
244
- If true, the 'default' policy will not automatically be added to generated tokens
267
+ If set, the default policy will not be set on
268
+ generated tokens; otherwise it will be added to the policies set in token_policies.
245
269
  """
246
270
  return pulumi.get(self, "token_no_default_policy")
247
271
 
@@ -253,7 +277,8 @@ class AuthBackendRoleArgs:
253
277
  @pulumi.getter(name="tokenNumUses")
254
278
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
255
279
  """
256
- The maximum number of times a token may be used, a value of zero means unlimited
280
+ The [maximum number](https://www.vaultproject.io/api-docs/auth/approle#token_num_uses)
281
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
257
282
  """
258
283
  return pulumi.get(self, "token_num_uses")
259
284
 
@@ -265,7 +290,10 @@ class AuthBackendRoleArgs:
265
290
  @pulumi.getter(name="tokenPeriod")
266
291
  def token_period(self) -> Optional[pulumi.Input[int]]:
267
292
  """
268
- Generated Token's Period
293
+ If set, indicates that the
294
+ token generated using this role should never expire. The token should be renewed within the
295
+ duration specified by this value. At each renewal, the token's TTL will be set to the
296
+ value of this field. Specified in seconds.
269
297
  """
270
298
  return pulumi.get(self, "token_period")
271
299
 
@@ -277,7 +305,8 @@ class AuthBackendRoleArgs:
277
305
  @pulumi.getter(name="tokenPolicies")
278
306
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
279
307
  """
280
- Generated Token's Policies
308
+ List of policies to encode onto generated tokens. Depending
309
+ on the auth method, this list may be supplemented by user/group/other values.
281
310
  """
282
311
  return pulumi.get(self, "token_policies")
283
312
 
@@ -289,7 +318,8 @@ class AuthBackendRoleArgs:
289
318
  @pulumi.getter(name="tokenTtl")
290
319
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
291
320
  """
292
- The initial ttl of the token to generate in seconds
321
+ The incremental lifetime for generated tokens in number of seconds.
322
+ Its current value will be referenced at renewal time.
293
323
  """
294
324
  return pulumi.get(self, "token_ttl")
295
325
 
@@ -301,7 +331,11 @@ class AuthBackendRoleArgs:
301
331
  @pulumi.getter(name="tokenType")
302
332
  def token_type(self) -> Optional[pulumi.Input[str]]:
303
333
  """
304
- The type of token to generate, service or batch
334
+ The type of token that should be generated. Can be `service`,
335
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
336
+ `service` tokens). For token store roles, there are two additional possibilities:
337
+ `default-service` and `default-batch` which specify the type to return unless the client
338
+ requests a different type at generation time.
305
339
  """
306
340
  return pulumi.get(self, "token_type")
307
341
 
@@ -350,15 +384,32 @@ class _AuthBackendRoleState:
350
384
  expire. A value of zero will allow unlimited uses.
351
385
  :param pulumi.Input[int] secret_id_ttl: The number of seconds after which any SecretID
352
386
  expires.
353
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
354
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
355
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
356
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
357
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
358
- :param pulumi.Input[int] token_period: Generated Token's Period
359
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
360
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
361
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
387
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
388
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
389
+ as well.
390
+ :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
391
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
392
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
393
+ `token_max_ttl` would otherwise allow a renewal.
394
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
395
+ Its current value will be referenced at renewal time.
396
+ :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
397
+ generated tokens; otherwise it will be added to the policies set in token_policies.
398
+ :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/approle#token_num_uses)
399
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
400
+ :param pulumi.Input[int] token_period: If set, indicates that the
401
+ token generated using this role should never expire. The token should be renewed within the
402
+ duration specified by this value. At each renewal, the token's TTL will be set to the
403
+ value of this field. Specified in seconds.
404
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
405
+ on the auth method, this list may be supplemented by user/group/other values.
406
+ :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
407
+ Its current value will be referenced at renewal time.
408
+ :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
409
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
410
+ `service` tokens). For token store roles, there are two additional possibilities:
411
+ `default-service` and `default-batch` which specify the type to return unless the client
412
+ requests a different type at generation time.
362
413
  """
363
414
  if backend is not None:
364
415
  pulumi.set(__self__, "backend", backend)
@@ -505,7 +556,9 @@ class _AuthBackendRoleState:
505
556
  @pulumi.getter(name="tokenBoundCidrs")
506
557
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
507
558
  """
508
- Specifies the blocks of IP addresses which are allowed to use the generated token
559
+ List of CIDR blocks; if set, specifies blocks of IP
560
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
561
+ as well.
509
562
  """
510
563
  return pulumi.get(self, "token_bound_cidrs")
511
564
 
@@ -517,7 +570,10 @@ class _AuthBackendRoleState:
517
570
  @pulumi.getter(name="tokenExplicitMaxTtl")
518
571
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
519
572
  """
520
- Generated Token's Explicit Maximum TTL in seconds
573
+ If set, will encode an
574
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
575
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
576
+ `token_max_ttl` would otherwise allow a renewal.
521
577
  """
522
578
  return pulumi.get(self, "token_explicit_max_ttl")
523
579
 
@@ -529,7 +585,8 @@ class _AuthBackendRoleState:
529
585
  @pulumi.getter(name="tokenMaxTtl")
530
586
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
531
587
  """
532
- The maximum lifetime of the generated token
588
+ The maximum lifetime for generated tokens in number of seconds.
589
+ Its current value will be referenced at renewal time.
533
590
  """
534
591
  return pulumi.get(self, "token_max_ttl")
535
592
 
@@ -541,7 +598,8 @@ class _AuthBackendRoleState:
541
598
  @pulumi.getter(name="tokenNoDefaultPolicy")
542
599
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
543
600
  """
544
- If true, the 'default' policy will not automatically be added to generated tokens
601
+ If set, the default policy will not be set on
602
+ generated tokens; otherwise it will be added to the policies set in token_policies.
545
603
  """
546
604
  return pulumi.get(self, "token_no_default_policy")
547
605
 
@@ -553,7 +611,8 @@ class _AuthBackendRoleState:
553
611
  @pulumi.getter(name="tokenNumUses")
554
612
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
555
613
  """
556
- The maximum number of times a token may be used, a value of zero means unlimited
614
+ The [maximum number](https://www.vaultproject.io/api-docs/auth/approle#token_num_uses)
615
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
557
616
  """
558
617
  return pulumi.get(self, "token_num_uses")
559
618
 
@@ -565,7 +624,10 @@ class _AuthBackendRoleState:
565
624
  @pulumi.getter(name="tokenPeriod")
566
625
  def token_period(self) -> Optional[pulumi.Input[int]]:
567
626
  """
568
- Generated Token's Period
627
+ If set, indicates that the
628
+ token generated using this role should never expire. The token should be renewed within the
629
+ duration specified by this value. At each renewal, the token's TTL will be set to the
630
+ value of this field. Specified in seconds.
569
631
  """
570
632
  return pulumi.get(self, "token_period")
571
633
 
@@ -577,7 +639,8 @@ class _AuthBackendRoleState:
577
639
  @pulumi.getter(name="tokenPolicies")
578
640
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
579
641
  """
580
- Generated Token's Policies
642
+ List of policies to encode onto generated tokens. Depending
643
+ on the auth method, this list may be supplemented by user/group/other values.
581
644
  """
582
645
  return pulumi.get(self, "token_policies")
583
646
 
@@ -589,7 +652,8 @@ class _AuthBackendRoleState:
589
652
  @pulumi.getter(name="tokenTtl")
590
653
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
591
654
  """
592
- The initial ttl of the token to generate in seconds
655
+ The incremental lifetime for generated tokens in number of seconds.
656
+ Its current value will be referenced at renewal time.
593
657
  """
594
658
  return pulumi.get(self, "token_ttl")
595
659
 
@@ -601,7 +665,11 @@ class _AuthBackendRoleState:
601
665
  @pulumi.getter(name="tokenType")
602
666
  def token_type(self) -> Optional[pulumi.Input[str]]:
603
667
  """
604
- The type of token to generate, service or batch
668
+ The type of token that should be generated. Can be `service`,
669
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
670
+ `service` tokens). For token store roles, there are two additional possibilities:
671
+ `default-service` and `default-batch` which specify the type to return unless the client
672
+ requests a different type at generation time.
605
673
  """
606
674
  return pulumi.get(self, "token_type")
607
675
 
@@ -640,6 +708,7 @@ class AuthBackendRole(pulumi.CustomResource):
640
708
 
641
709
  ## Example Usage
642
710
 
711
+ <!--Start PulumiCodeChooser -->
643
712
  ```python
644
713
  import pulumi
645
714
  import pulumi_vault as vault
@@ -654,6 +723,7 @@ class AuthBackendRole(pulumi.CustomResource):
654
723
  "prod",
655
724
  ])
656
725
  ```
726
+ <!--End PulumiCodeChooser -->
657
727
 
658
728
  ## Import
659
729
 
@@ -683,15 +753,32 @@ class AuthBackendRole(pulumi.CustomResource):
683
753
  expire. A value of zero will allow unlimited uses.
684
754
  :param pulumi.Input[int] secret_id_ttl: The number of seconds after which any SecretID
685
755
  expires.
686
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
687
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
688
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
689
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
690
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
691
- :param pulumi.Input[int] token_period: Generated Token's Period
692
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
693
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
694
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
756
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
757
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
758
+ as well.
759
+ :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
760
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
761
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
762
+ `token_max_ttl` would otherwise allow a renewal.
763
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
764
+ Its current value will be referenced at renewal time.
765
+ :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
766
+ generated tokens; otherwise it will be added to the policies set in token_policies.
767
+ :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/approle#token_num_uses)
768
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
769
+ :param pulumi.Input[int] token_period: If set, indicates that the
770
+ token generated using this role should never expire. The token should be renewed within the
771
+ duration specified by this value. At each renewal, the token's TTL will be set to the
772
+ value of this field. Specified in seconds.
773
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
774
+ on the auth method, this list may be supplemented by user/group/other values.
775
+ :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
776
+ Its current value will be referenced at renewal time.
777
+ :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
778
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
779
+ `service` tokens). For token store roles, there are two additional possibilities:
780
+ `default-service` and `default-batch` which specify the type to return unless the client
781
+ requests a different type at generation time.
695
782
  """
696
783
  ...
697
784
  @overload
@@ -706,6 +793,7 @@ class AuthBackendRole(pulumi.CustomResource):
706
793
 
707
794
  ## Example Usage
708
795
 
796
+ <!--Start PulumiCodeChooser -->
709
797
  ```python
710
798
  import pulumi
711
799
  import pulumi_vault as vault
@@ -720,6 +808,7 @@ class AuthBackendRole(pulumi.CustomResource):
720
808
  "prod",
721
809
  ])
722
810
  ```
811
+ <!--End PulumiCodeChooser -->
723
812
 
724
813
  ## Import
725
814
 
@@ -841,15 +930,32 @@ class AuthBackendRole(pulumi.CustomResource):
841
930
  expire. A value of zero will allow unlimited uses.
842
931
  :param pulumi.Input[int] secret_id_ttl: The number of seconds after which any SecretID
843
932
  expires.
844
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
845
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
846
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
847
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
848
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
849
- :param pulumi.Input[int] token_period: Generated Token's Period
850
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
851
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
852
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
933
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
934
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
935
+ as well.
936
+ :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
937
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
938
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
939
+ `token_max_ttl` would otherwise allow a renewal.
940
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
941
+ Its current value will be referenced at renewal time.
942
+ :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
943
+ generated tokens; otherwise it will be added to the policies set in token_policies.
944
+ :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/approle#token_num_uses)
945
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
946
+ :param pulumi.Input[int] token_period: If set, indicates that the
947
+ token generated using this role should never expire. The token should be renewed within the
948
+ duration specified by this value. At each renewal, the token's TTL will be set to the
949
+ value of this field. Specified in seconds.
950
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
951
+ on the auth method, this list may be supplemented by user/group/other values.
952
+ :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
953
+ Its current value will be referenced at renewal time.
954
+ :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
955
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
956
+ `service` tokens). For token store roles, there are two additional possibilities:
957
+ `default-service` and `default-batch` which specify the type to return unless the client
958
+ requests a different type at generation time.
853
959
  """
854
960
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
855
961
 
@@ -952,7 +1058,9 @@ class AuthBackendRole(pulumi.CustomResource):
952
1058
  @pulumi.getter(name="tokenBoundCidrs")
953
1059
  def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
954
1060
  """
955
- Specifies the blocks of IP addresses which are allowed to use the generated token
1061
+ List of CIDR blocks; if set, specifies blocks of IP
1062
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
1063
+ as well.
956
1064
  """
957
1065
  return pulumi.get(self, "token_bound_cidrs")
958
1066
 
@@ -960,7 +1068,10 @@ class AuthBackendRole(pulumi.CustomResource):
960
1068
  @pulumi.getter(name="tokenExplicitMaxTtl")
961
1069
  def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
962
1070
  """
963
- Generated Token's Explicit Maximum TTL in seconds
1071
+ If set, will encode an
1072
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1073
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1074
+ `token_max_ttl` would otherwise allow a renewal.
964
1075
  """
965
1076
  return pulumi.get(self, "token_explicit_max_ttl")
966
1077
 
@@ -968,7 +1079,8 @@ class AuthBackendRole(pulumi.CustomResource):
968
1079
  @pulumi.getter(name="tokenMaxTtl")
969
1080
  def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
970
1081
  """
971
- The maximum lifetime of the generated token
1082
+ The maximum lifetime for generated tokens in number of seconds.
1083
+ Its current value will be referenced at renewal time.
972
1084
  """
973
1085
  return pulumi.get(self, "token_max_ttl")
974
1086
 
@@ -976,7 +1088,8 @@ class AuthBackendRole(pulumi.CustomResource):
976
1088
  @pulumi.getter(name="tokenNoDefaultPolicy")
977
1089
  def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
978
1090
  """
979
- If true, the 'default' policy will not automatically be added to generated tokens
1091
+ If set, the default policy will not be set on
1092
+ generated tokens; otherwise it will be added to the policies set in token_policies.
980
1093
  """
981
1094
  return pulumi.get(self, "token_no_default_policy")
982
1095
 
@@ -984,7 +1097,8 @@ class AuthBackendRole(pulumi.CustomResource):
984
1097
  @pulumi.getter(name="tokenNumUses")
985
1098
  def token_num_uses(self) -> pulumi.Output[Optional[int]]:
986
1099
  """
987
- The maximum number of times a token may be used, a value of zero means unlimited
1100
+ The [maximum number](https://www.vaultproject.io/api-docs/auth/approle#token_num_uses)
1101
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
988
1102
  """
989
1103
  return pulumi.get(self, "token_num_uses")
990
1104
 
@@ -992,7 +1106,10 @@ class AuthBackendRole(pulumi.CustomResource):
992
1106
  @pulumi.getter(name="tokenPeriod")
993
1107
  def token_period(self) -> pulumi.Output[Optional[int]]:
994
1108
  """
995
- Generated Token's Period
1109
+ If set, indicates that the
1110
+ token generated using this role should never expire. The token should be renewed within the
1111
+ duration specified by this value. At each renewal, the token's TTL will be set to the
1112
+ value of this field. Specified in seconds.
996
1113
  """
997
1114
  return pulumi.get(self, "token_period")
998
1115
 
@@ -1000,7 +1117,8 @@ class AuthBackendRole(pulumi.CustomResource):
1000
1117
  @pulumi.getter(name="tokenPolicies")
1001
1118
  def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
1002
1119
  """
1003
- Generated Token's Policies
1120
+ List of policies to encode onto generated tokens. Depending
1121
+ on the auth method, this list may be supplemented by user/group/other values.
1004
1122
  """
1005
1123
  return pulumi.get(self, "token_policies")
1006
1124
 
@@ -1008,7 +1126,8 @@ class AuthBackendRole(pulumi.CustomResource):
1008
1126
  @pulumi.getter(name="tokenTtl")
1009
1127
  def token_ttl(self) -> pulumi.Output[Optional[int]]:
1010
1128
  """
1011
- The initial ttl of the token to generate in seconds
1129
+ The incremental lifetime for generated tokens in number of seconds.
1130
+ Its current value will be referenced at renewal time.
1012
1131
  """
1013
1132
  return pulumi.get(self, "token_ttl")
1014
1133
 
@@ -1016,7 +1135,11 @@ class AuthBackendRole(pulumi.CustomResource):
1016
1135
  @pulumi.getter(name="tokenType")
1017
1136
  def token_type(self) -> pulumi.Output[Optional[str]]:
1018
1137
  """
1019
- The type of token to generate, service or batch
1138
+ The type of token that should be generated. Can be `service`,
1139
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
1140
+ `service` tokens). For token store roles, there are two additional possibilities:
1141
+ `default-service` and `default-batch` which specify the type to return unless the client
1142
+ requests a different type at generation time.
1020
1143
  """
1021
1144
  return pulumi.get(self, "token_type")
1022
1145
 
@@ -397,6 +397,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
397
397
 
398
398
  ## Example Usage
399
399
 
400
+ <!--Start PulumiCodeChooser -->
400
401
  ```python
401
402
  import pulumi
402
403
  import json
@@ -418,6 +419,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
418
419
  "hello": "world",
419
420
  }))
420
421
  ```
422
+ <!--End PulumiCodeChooser -->
421
423
 
422
424
  :param str resource_name: The name of the resource.
423
425
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -454,6 +456,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
454
456
 
455
457
  ## Example Usage
456
458
 
459
+ <!--Start PulumiCodeChooser -->
457
460
  ```python
458
461
  import pulumi
459
462
  import json
@@ -475,6 +478,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
475
478
  "hello": "world",
476
479
  }))
477
480
  ```
481
+ <!--End PulumiCodeChooser -->
478
482
 
479
483
  :param str resource_name: The name of the resource.
480
484
  :param AuthBackendRoleSecretIdArgs args: The arguments to use to populate this resource's properties.
@@ -92,6 +92,7 @@ def get_auth_backend_role_id(backend: Optional[str] = None,
92
92
 
93
93
  ## Example Usage
94
94
 
95
+ <!--Start PulumiCodeChooser -->
95
96
  ```python
96
97
  import pulumi
97
98
  import pulumi_vault as vault
@@ -100,6 +101,7 @@ def get_auth_backend_role_id(backend: Optional[str] = None,
100
101
  role_name="my-role")
101
102
  pulumi.export("role-id", role.role_id)
102
103
  ```
104
+ <!--End PulumiCodeChooser -->
103
105
 
104
106
 
105
107
  :param str backend: The unique name for the AppRole backend the role to
@@ -135,6 +137,7 @@ def get_auth_backend_role_id_output(backend: Optional[pulumi.Input[Optional[str]
135
137
 
136
138
  ## Example Usage
137
139
 
140
+ <!--Start PulumiCodeChooser -->
138
141
  ```python
139
142
  import pulumi
140
143
  import pulumi_vault as vault
@@ -143,6 +146,7 @@ def get_auth_backend_role_id_output(backend: Optional[pulumi.Input[Optional[str]
143
146
  role_name="my-role")
144
147
  pulumi.export("role-id", role.role_id)
145
148
  ```
149
+ <!--End PulumiCodeChooser -->
146
150
 
147
151
 
148
152
  :param str backend: The unique name for the AppRole backend the role to
pulumi_vault/audit.py CHANGED
@@ -254,33 +254,37 @@ class Audit(pulumi.CustomResource):
254
254
 
255
255
  ### File Audit Device)
256
256
 
257
+ <!--Start PulumiCodeChooser -->
257
258
  ```python
258
259
  import pulumi
259
260
  import pulumi_vault as vault
260
261
 
261
262
  test = vault.Audit("test",
262
- type="file",
263
263
  options={
264
264
  "file_path": "C:/temp/audit.txt",
265
- })
265
+ },
266
+ type="file")
266
267
  ```
268
+ <!--End PulumiCodeChooser -->
267
269
 
268
270
  ### Socket Audit Device)
269
271
 
272
+ <!--Start PulumiCodeChooser -->
270
273
  ```python
271
274
  import pulumi
272
275
  import pulumi_vault as vault
273
276
 
274
277
  test = vault.Audit("test",
275
- type="socket",
276
- path="app_socket",
277
278
  local=False,
278
279
  options={
279
280
  "address": "127.0.0.1:8000",
280
- "socket_type": "tcp",
281
281
  "description": "application x socket",
282
- })
282
+ "socket_type": "tcp",
283
+ },
284
+ path="app_socket",
285
+ type="socket")
283
286
  ```
287
+ <!--End PulumiCodeChooser -->
284
288
 
285
289
  ## Import
286
290
 
@@ -315,33 +319,37 @@ class Audit(pulumi.CustomResource):
315
319
 
316
320
  ### File Audit Device)
317
321
 
322
+ <!--Start PulumiCodeChooser -->
318
323
  ```python
319
324
  import pulumi
320
325
  import pulumi_vault as vault
321
326
 
322
327
  test = vault.Audit("test",
323
- type="file",
324
328
  options={
325
329
  "file_path": "C:/temp/audit.txt",
326
- })
330
+ },
331
+ type="file")
327
332
  ```
333
+ <!--End PulumiCodeChooser -->
328
334
 
329
335
  ### Socket Audit Device)
330
336
 
337
+ <!--Start PulumiCodeChooser -->
331
338
  ```python
332
339
  import pulumi
333
340
  import pulumi_vault as vault
334
341
 
335
342
  test = vault.Audit("test",
336
- type="socket",
337
- path="app_socket",
338
343
  local=False,
339
344
  options={
340
345
  "address": "127.0.0.1:8000",
341
- "socket_type": "tcp",
342
346
  "description": "application x socket",
343
- })
347
+ "socket_type": "tcp",
348
+ },
349
+ path="app_socket",
350
+ type="socket")
344
351
  ```
352
+ <!--End PulumiCodeChooser -->
345
353
 
346
354
  ## Import
347
355