pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (192) hide show
  1. pulumi_vault/__init__.py +0 -26
  2. pulumi_vault/_inputs.py +20 -0
  3. pulumi_vault/ad/secret_backend.py +6 -2
  4. pulumi_vault/ad/secret_library.py +4 -2
  5. pulumi_vault/ad/secret_role.py +4 -0
  6. pulumi_vault/alicloud/auth_backend_role.py +192 -69
  7. pulumi_vault/approle/auth_backend_login.py +4 -0
  8. pulumi_vault/approle/auth_backend_role.py +186 -63
  9. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  10. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  11. pulumi_vault/audit.py +20 -12
  12. pulumi_vault/audit_request_header.py +6 -6
  13. pulumi_vault/auth_backend.py +0 -47
  14. pulumi_vault/aws/auth_backend_client.py +17 -253
  15. pulumi_vault/aws/auth_backend_config_identity.py +4 -0
  16. pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
  17. pulumi_vault/aws/auth_backend_login.py +8 -0
  18. pulumi_vault/aws/auth_backend_role.py +186 -63
  19. pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
  20. pulumi_vault/aws/auth_backend_sts_role.py +4 -0
  21. pulumi_vault/aws/secret_backend_role.py +4 -56
  22. pulumi_vault/aws/secret_backend_static_role.py +4 -2
  23. pulumi_vault/azure/auth_backend_config.py +10 -139
  24. pulumi_vault/azure/auth_backend_role.py +186 -63
  25. pulumi_vault/azure/backend.py +22 -217
  26. pulumi_vault/azure/backend_role.py +18 -14
  27. pulumi_vault/azure/get_access_credentials.py +4 -0
  28. pulumi_vault/cert_auth_backend_role.py +208 -75
  29. pulumi_vault/consul/secret_backend.py +18 -10
  30. pulumi_vault/consul/secret_backend_role.py +4 -2
  31. pulumi_vault/database/_inputs.py +784 -522
  32. pulumi_vault/database/outputs.py +784 -522
  33. pulumi_vault/database/secret_backend_connection.py +4 -2
  34. pulumi_vault/database/secret_backend_role.py +4 -4
  35. pulumi_vault/database/secret_backend_static_role.py +8 -10
  36. pulumi_vault/database/secrets_mount.py +4 -286
  37. pulumi_vault/egp_policy.py +8 -4
  38. pulumi_vault/gcp/auth_backend.py +18 -226
  39. pulumi_vault/gcp/auth_backend_role.py +264 -63
  40. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  41. pulumi_vault/gcp/secret_backend.py +9 -275
  42. pulumi_vault/gcp/secret_impersonated_account.py +14 -12
  43. pulumi_vault/gcp/secret_roleset.py +6 -4
  44. pulumi_vault/gcp/secret_static_account.py +16 -14
  45. pulumi_vault/generic/endpoint.py +8 -4
  46. pulumi_vault/generic/get_secret.py +4 -40
  47. pulumi_vault/get_auth_backend.py +4 -0
  48. pulumi_vault/get_auth_backends.py +8 -0
  49. pulumi_vault/get_namespace.py +12 -0
  50. pulumi_vault/get_namespaces.py +12 -4
  51. pulumi_vault/get_nomad_access_token.py +4 -0
  52. pulumi_vault/get_policy_document.py +8 -8
  53. pulumi_vault/get_raft_autopilot_state.py +4 -0
  54. pulumi_vault/github/auth_backend.py +4 -0
  55. pulumi_vault/github/team.py +6 -2
  56. pulumi_vault/github/user.py +6 -2
  57. pulumi_vault/identity/entity.py +8 -6
  58. pulumi_vault/identity/entity_alias.py +8 -6
  59. pulumi_vault/identity/entity_policies.py +12 -12
  60. pulumi_vault/identity/get_entity.py +4 -0
  61. pulumi_vault/identity/get_group.py +4 -0
  62. pulumi_vault/identity/get_oidc_client_creds.py +4 -2
  63. pulumi_vault/identity/get_oidc_openid_config.py +6 -10
  64. pulumi_vault/identity/get_oidc_public_keys.py +6 -10
  65. pulumi_vault/identity/group.py +42 -38
  66. pulumi_vault/identity/group_alias.py +4 -2
  67. pulumi_vault/identity/group_member_entity_ids.py +16 -12
  68. pulumi_vault/identity/group_member_group_ids.py +20 -24
  69. pulumi_vault/identity/group_policies.py +8 -4
  70. pulumi_vault/identity/mfa_duo.py +8 -4
  71. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  72. pulumi_vault/identity/mfa_okta.py +8 -4
  73. pulumi_vault/identity/mfa_pingid.py +4 -0
  74. pulumi_vault/identity/mfa_totp.py +4 -0
  75. pulumi_vault/identity/oidc.py +4 -0
  76. pulumi_vault/identity/oidc_assignment.py +6 -10
  77. pulumi_vault/identity/oidc_client.py +10 -10
  78. pulumi_vault/identity/oidc_key.py +12 -16
  79. pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
  80. pulumi_vault/identity/oidc_provider.py +16 -22
  81. pulumi_vault/identity/oidc_role.py +20 -28
  82. pulumi_vault/identity/oidc_scope.py +8 -6
  83. pulumi_vault/jwt/auth_backend.py +32 -20
  84. pulumi_vault/jwt/auth_backend_role.py +225 -91
  85. pulumi_vault/kmip/secret_backend.py +14 -10
  86. pulumi_vault/kmip/secret_role.py +4 -0
  87. pulumi_vault/kmip/secret_scope.py +4 -0
  88. pulumi_vault/kubernetes/auth_backend_config.py +4 -0
  89. pulumi_vault/kubernetes/auth_backend_role.py +172 -56
  90. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  91. pulumi_vault/kubernetes/secret_backend.py +8 -288
  92. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  93. pulumi_vault/kv/get_secret.py +4 -0
  94. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
  95. pulumi_vault/kv/get_secret_v2.py +0 -58
  96. pulumi_vault/kv/get_secrets_list.py +8 -4
  97. pulumi_vault/kv/get_secrets_list_v2.py +12 -14
  98. pulumi_vault/kv/secret.py +4 -0
  99. pulumi_vault/kv/secret_backend_v2.py +4 -0
  100. pulumi_vault/kv/secret_v2.py +4 -2
  101. pulumi_vault/ldap/auth_backend.py +161 -66
  102. pulumi_vault/ldap/auth_backend_group.py +4 -0
  103. pulumi_vault/ldap/auth_backend_user.py +4 -0
  104. pulumi_vault/ldap/secret_backend.py +8 -286
  105. pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
  106. pulumi_vault/ldap/secret_backend_library_set.py +4 -2
  107. pulumi_vault/ldap/secret_backend_static_role.py +4 -0
  108. pulumi_vault/managed/_inputs.py +132 -84
  109. pulumi_vault/managed/keys.py +28 -7
  110. pulumi_vault/managed/outputs.py +132 -84
  111. pulumi_vault/mfa_duo.py +6 -4
  112. pulumi_vault/mfa_okta.py +6 -4
  113. pulumi_vault/mfa_pingid.py +6 -4
  114. pulumi_vault/mfa_totp.py +12 -10
  115. pulumi_vault/mongodbatlas/secret_backend.py +4 -0
  116. pulumi_vault/mongodbatlas/secret_role.py +4 -2
  117. pulumi_vault/mount.py +42 -350
  118. pulumi_vault/nomad_secret_backend.py +8 -4
  119. pulumi_vault/nomad_secret_role.py +4 -0
  120. pulumi_vault/okta/_inputs.py +8 -8
  121. pulumi_vault/okta/auth_backend.py +10 -459
  122. pulumi_vault/okta/auth_backend_group.py +4 -0
  123. pulumi_vault/okta/auth_backend_user.py +4 -0
  124. pulumi_vault/okta/outputs.py +8 -8
  125. pulumi_vault/outputs.py +20 -0
  126. pulumi_vault/password_policy.py +8 -6
  127. pulumi_vault/pkisecret/__init__.py +0 -2
  128. pulumi_vault/pkisecret/_inputs.py +0 -30
  129. pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
  130. pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
  131. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  132. pulumi_vault/pkisecret/get_backend_key.py +6 -2
  133. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  134. pulumi_vault/pkisecret/outputs.py +0 -54
  135. pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
  136. pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
  137. pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
  138. pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
  139. pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
  140. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
  141. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
  142. pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
  143. pulumi_vault/pkisecret/secret_backend_role.py +4 -2
  144. pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
  145. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
  146. pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
  147. pulumi_vault/provider.py +8 -0
  148. pulumi_vault/pulumi-plugin.json +1 -2
  149. pulumi_vault/quota_lease_count.py +8 -53
  150. pulumi_vault/quota_rate_limit.py +4 -49
  151. pulumi_vault/rabbitmq/secret_backend.py +8 -4
  152. pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
  153. pulumi_vault/raft_autopilot.py +4 -0
  154. pulumi_vault/raft_snapshot_agent_config.py +304 -109
  155. pulumi_vault/rgp_policy.py +6 -2
  156. pulumi_vault/saml/auth_backend.py +12 -8
  157. pulumi_vault/saml/auth_backend_role.py +178 -64
  158. pulumi_vault/secrets/sync_association.py +10 -12
  159. pulumi_vault/secrets/sync_aws_destination.py +8 -6
  160. pulumi_vault/secrets/sync_azure_destination.py +12 -10
  161. pulumi_vault/secrets/sync_config.py +6 -2
  162. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  163. pulumi_vault/secrets/sync_gh_destination.py +8 -6
  164. pulumi_vault/secrets/sync_github_apps.py +8 -8
  165. pulumi_vault/secrets/sync_vercel_destination.py +8 -6
  166. pulumi_vault/ssh/_inputs.py +32 -6
  167. pulumi_vault/ssh/outputs.py +32 -6
  168. pulumi_vault/ssh/secret_backend_ca.py +4 -94
  169. pulumi_vault/ssh/secret_backend_role.py +4 -4
  170. pulumi_vault/terraformcloud/secret_backend.py +56 -0
  171. pulumi_vault/terraformcloud/secret_creds.py +17 -2
  172. pulumi_vault/terraformcloud/secret_role.py +69 -2
  173. pulumi_vault/token.py +18 -14
  174. pulumi_vault/tokenauth/auth_backend_role.py +180 -64
  175. pulumi_vault/transform/alphabet.py +6 -4
  176. pulumi_vault/transform/get_decode.py +4 -4
  177. pulumi_vault/transform/get_encode.py +4 -4
  178. pulumi_vault/transform/role.py +6 -4
  179. pulumi_vault/transform/template.py +4 -4
  180. pulumi_vault/transit/get_decrypt.py +20 -4
  181. pulumi_vault/transit/get_encrypt.py +14 -0
  182. pulumi_vault/transit/secret_backend_key.py +6 -6
  183. pulumi_vault/transit/secret_cache_config.py +4 -0
  184. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
  185. pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
  186. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +1 -1
  187. pulumi_vault/pkisecret/backend_config_est.py +0 -614
  188. pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
  189. pulumi_vault/plugin.py +0 -590
  190. pulumi_vault/plugin_pinned_version.py +0 -293
  191. pulumi_vault-6.2.0.dist-info/RECORD +0 -256
  192. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -26,15 +26,6 @@ class AuthBackendArgs:
26
26
  namespace: Optional[pulumi.Input[str]] = None,
27
27
  path: Optional[pulumi.Input[str]] = None,
28
28
  token: Optional[pulumi.Input[str]] = None,
29
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
30
- token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
31
- token_max_ttl: Optional[pulumi.Input[int]] = None,
32
- token_no_default_policy: Optional[pulumi.Input[bool]] = None,
33
- token_num_uses: Optional[pulumi.Input[int]] = None,
34
- token_period: Optional[pulumi.Input[int]] = None,
35
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
36
- token_ttl: Optional[pulumi.Input[int]] = None,
37
- token_type: Optional[pulumi.Input[str]] = None,
38
29
  ttl: Optional[pulumi.Input[str]] = None,
39
30
  users: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]]] = None):
40
31
  """
@@ -56,15 +47,6 @@ class AuthBackendArgs:
56
47
  :param pulumi.Input[str] path: Path to mount the Okta auth backend. Default to path `okta`.
57
48
  :param pulumi.Input[str] token: The Okta API token. This is required to query Okta for user group membership.
58
49
  If this is not supplied only locally configured groups will be enabled.
59
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
60
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
61
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
62
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
63
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
64
- :param pulumi.Input[int] token_period: Generated Token's Period
65
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
66
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
67
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
68
50
  :param pulumi.Input[str] ttl: Duration after which authentication will be expired.
69
51
  [See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
70
52
  :param pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]] users: Associate Okta users with groups or policies within Vault.
@@ -81,9 +63,6 @@ class AuthBackendArgs:
81
63
  pulumi.set(__self__, "disable_remount", disable_remount)
82
64
  if groups is not None:
83
65
  pulumi.set(__self__, "groups", groups)
84
- if max_ttl is not None:
85
- warnings.warn("""Deprecated. Please use `token_max_ttl` instead.""", DeprecationWarning)
86
- pulumi.log.warn("""max_ttl is deprecated: Deprecated. Please use `token_max_ttl` instead.""")
87
66
  if max_ttl is not None:
88
67
  pulumi.set(__self__, "max_ttl", max_ttl)
89
68
  if namespace is not None:
@@ -92,27 +71,6 @@ class AuthBackendArgs:
92
71
  pulumi.set(__self__, "path", path)
93
72
  if token is not None:
94
73
  pulumi.set(__self__, "token", token)
95
- if token_bound_cidrs is not None:
96
- pulumi.set(__self__, "token_bound_cidrs", token_bound_cidrs)
97
- if token_explicit_max_ttl is not None:
98
- pulumi.set(__self__, "token_explicit_max_ttl", token_explicit_max_ttl)
99
- if token_max_ttl is not None:
100
- pulumi.set(__self__, "token_max_ttl", token_max_ttl)
101
- if token_no_default_policy is not None:
102
- pulumi.set(__self__, "token_no_default_policy", token_no_default_policy)
103
- if token_num_uses is not None:
104
- pulumi.set(__self__, "token_num_uses", token_num_uses)
105
- if token_period is not None:
106
- pulumi.set(__self__, "token_period", token_period)
107
- if token_policies is not None:
108
- pulumi.set(__self__, "token_policies", token_policies)
109
- if token_ttl is not None:
110
- pulumi.set(__self__, "token_ttl", token_ttl)
111
- if token_type is not None:
112
- pulumi.set(__self__, "token_type", token_type)
113
- if ttl is not None:
114
- warnings.warn("""Deprecated. Please use `token_ttl` instead.""", DeprecationWarning)
115
- pulumi.log.warn("""ttl is deprecated: Deprecated. Please use `token_ttl` instead.""")
116
74
  if ttl is not None:
117
75
  pulumi.set(__self__, "ttl", ttl)
118
76
  if users is not None:
@@ -199,9 +157,6 @@ class AuthBackendArgs:
199
157
  Maximum duration after which authentication will be expired
200
158
  [See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
201
159
  """
202
- warnings.warn("""Deprecated. Please use `token_max_ttl` instead.""", DeprecationWarning)
203
- pulumi.log.warn("""max_ttl is deprecated: Deprecated. Please use `token_max_ttl` instead.""")
204
-
205
160
  return pulumi.get(self, "max_ttl")
206
161
 
207
162
  @max_ttl.setter
@@ -248,114 +203,6 @@ class AuthBackendArgs:
248
203
  def token(self, value: Optional[pulumi.Input[str]]):
249
204
  pulumi.set(self, "token", value)
250
205
 
251
- @property
252
- @pulumi.getter(name="tokenBoundCidrs")
253
- def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
254
- """
255
- Specifies the blocks of IP addresses which are allowed to use the generated token
256
- """
257
- return pulumi.get(self, "token_bound_cidrs")
258
-
259
- @token_bound_cidrs.setter
260
- def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
261
- pulumi.set(self, "token_bound_cidrs", value)
262
-
263
- @property
264
- @pulumi.getter(name="tokenExplicitMaxTtl")
265
- def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
266
- """
267
- Generated Token's Explicit Maximum TTL in seconds
268
- """
269
- return pulumi.get(self, "token_explicit_max_ttl")
270
-
271
- @token_explicit_max_ttl.setter
272
- def token_explicit_max_ttl(self, value: Optional[pulumi.Input[int]]):
273
- pulumi.set(self, "token_explicit_max_ttl", value)
274
-
275
- @property
276
- @pulumi.getter(name="tokenMaxTtl")
277
- def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
278
- """
279
- The maximum lifetime of the generated token
280
- """
281
- return pulumi.get(self, "token_max_ttl")
282
-
283
- @token_max_ttl.setter
284
- def token_max_ttl(self, value: Optional[pulumi.Input[int]]):
285
- pulumi.set(self, "token_max_ttl", value)
286
-
287
- @property
288
- @pulumi.getter(name="tokenNoDefaultPolicy")
289
- def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
290
- """
291
- If true, the 'default' policy will not automatically be added to generated tokens
292
- """
293
- return pulumi.get(self, "token_no_default_policy")
294
-
295
- @token_no_default_policy.setter
296
- def token_no_default_policy(self, value: Optional[pulumi.Input[bool]]):
297
- pulumi.set(self, "token_no_default_policy", value)
298
-
299
- @property
300
- @pulumi.getter(name="tokenNumUses")
301
- def token_num_uses(self) -> Optional[pulumi.Input[int]]:
302
- """
303
- The maximum number of times a token may be used, a value of zero means unlimited
304
- """
305
- return pulumi.get(self, "token_num_uses")
306
-
307
- @token_num_uses.setter
308
- def token_num_uses(self, value: Optional[pulumi.Input[int]]):
309
- pulumi.set(self, "token_num_uses", value)
310
-
311
- @property
312
- @pulumi.getter(name="tokenPeriod")
313
- def token_period(self) -> Optional[pulumi.Input[int]]:
314
- """
315
- Generated Token's Period
316
- """
317
- return pulumi.get(self, "token_period")
318
-
319
- @token_period.setter
320
- def token_period(self, value: Optional[pulumi.Input[int]]):
321
- pulumi.set(self, "token_period", value)
322
-
323
- @property
324
- @pulumi.getter(name="tokenPolicies")
325
- def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
326
- """
327
- Generated Token's Policies
328
- """
329
- return pulumi.get(self, "token_policies")
330
-
331
- @token_policies.setter
332
- def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
333
- pulumi.set(self, "token_policies", value)
334
-
335
- @property
336
- @pulumi.getter(name="tokenTtl")
337
- def token_ttl(self) -> Optional[pulumi.Input[int]]:
338
- """
339
- The initial ttl of the token to generate in seconds
340
- """
341
- return pulumi.get(self, "token_ttl")
342
-
343
- @token_ttl.setter
344
- def token_ttl(self, value: Optional[pulumi.Input[int]]):
345
- pulumi.set(self, "token_ttl", value)
346
-
347
- @property
348
- @pulumi.getter(name="tokenType")
349
- def token_type(self) -> Optional[pulumi.Input[str]]:
350
- """
351
- The type of token to generate, service or batch
352
- """
353
- return pulumi.get(self, "token_type")
354
-
355
- @token_type.setter
356
- def token_type(self, value: Optional[pulumi.Input[str]]):
357
- pulumi.set(self, "token_type", value)
358
-
359
206
  @property
360
207
  @pulumi.getter
361
208
  def ttl(self) -> Optional[pulumi.Input[str]]:
@@ -363,9 +210,6 @@ class AuthBackendArgs:
363
210
  Duration after which authentication will be expired.
364
211
  [See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
365
212
  """
366
- warnings.warn("""Deprecated. Please use `token_ttl` instead.""", DeprecationWarning)
367
- pulumi.log.warn("""ttl is deprecated: Deprecated. Please use `token_ttl` instead.""")
368
-
369
213
  return pulumi.get(self, "ttl")
370
214
 
371
215
  @ttl.setter
@@ -400,15 +244,6 @@ class _AuthBackendState:
400
244
  organization: Optional[pulumi.Input[str]] = None,
401
245
  path: Optional[pulumi.Input[str]] = None,
402
246
  token: Optional[pulumi.Input[str]] = None,
403
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
404
- token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
405
- token_max_ttl: Optional[pulumi.Input[int]] = None,
406
- token_no_default_policy: Optional[pulumi.Input[bool]] = None,
407
- token_num_uses: Optional[pulumi.Input[int]] = None,
408
- token_period: Optional[pulumi.Input[int]] = None,
409
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
410
- token_ttl: Optional[pulumi.Input[int]] = None,
411
- token_type: Optional[pulumi.Input[str]] = None,
412
247
  ttl: Optional[pulumi.Input[str]] = None,
413
248
  users: Optional[pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]]] = None):
414
249
  """
@@ -431,15 +266,6 @@ class _AuthBackendState:
431
266
  :param pulumi.Input[str] path: Path to mount the Okta auth backend. Default to path `okta`.
432
267
  :param pulumi.Input[str] token: The Okta API token. This is required to query Okta for user group membership.
433
268
  If this is not supplied only locally configured groups will be enabled.
434
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
435
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
436
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
437
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
438
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
439
- :param pulumi.Input[int] token_period: Generated Token's Period
440
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
441
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
442
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
443
269
  :param pulumi.Input[str] ttl: Duration after which authentication will be expired.
444
270
  [See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
445
271
  :param pulumi.Input[Sequence[pulumi.Input['AuthBackendUserArgs']]] users: Associate Okta users with groups or policies within Vault.
@@ -457,9 +283,6 @@ class _AuthBackendState:
457
283
  pulumi.set(__self__, "disable_remount", disable_remount)
458
284
  if groups is not None:
459
285
  pulumi.set(__self__, "groups", groups)
460
- if max_ttl is not None:
461
- warnings.warn("""Deprecated. Please use `token_max_ttl` instead.""", DeprecationWarning)
462
- pulumi.log.warn("""max_ttl is deprecated: Deprecated. Please use `token_max_ttl` instead.""")
463
286
  if max_ttl is not None:
464
287
  pulumi.set(__self__, "max_ttl", max_ttl)
465
288
  if namespace is not None:
@@ -470,27 +293,6 @@ class _AuthBackendState:
470
293
  pulumi.set(__self__, "path", path)
471
294
  if token is not None:
472
295
  pulumi.set(__self__, "token", token)
473
- if token_bound_cidrs is not None:
474
- pulumi.set(__self__, "token_bound_cidrs", token_bound_cidrs)
475
- if token_explicit_max_ttl is not None:
476
- pulumi.set(__self__, "token_explicit_max_ttl", token_explicit_max_ttl)
477
- if token_max_ttl is not None:
478
- pulumi.set(__self__, "token_max_ttl", token_max_ttl)
479
- if token_no_default_policy is not None:
480
- pulumi.set(__self__, "token_no_default_policy", token_no_default_policy)
481
- if token_num_uses is not None:
482
- pulumi.set(__self__, "token_num_uses", token_num_uses)
483
- if token_period is not None:
484
- pulumi.set(__self__, "token_period", token_period)
485
- if token_policies is not None:
486
- pulumi.set(__self__, "token_policies", token_policies)
487
- if token_ttl is not None:
488
- pulumi.set(__self__, "token_ttl", token_ttl)
489
- if token_type is not None:
490
- pulumi.set(__self__, "token_type", token_type)
491
- if ttl is not None:
492
- warnings.warn("""Deprecated. Please use `token_ttl` instead.""", DeprecationWarning)
493
- pulumi.log.warn("""ttl is deprecated: Deprecated. Please use `token_ttl` instead.""")
494
296
  if ttl is not None:
495
297
  pulumi.set(__self__, "ttl", ttl)
496
298
  if users is not None:
@@ -577,9 +379,6 @@ class _AuthBackendState:
577
379
  Maximum duration after which authentication will be expired
578
380
  [See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
579
381
  """
580
- warnings.warn("""Deprecated. Please use `token_max_ttl` instead.""", DeprecationWarning)
581
- pulumi.log.warn("""max_ttl is deprecated: Deprecated. Please use `token_max_ttl` instead.""")
582
-
583
382
  return pulumi.get(self, "max_ttl")
584
383
 
585
384
  @max_ttl.setter
@@ -638,114 +437,6 @@ class _AuthBackendState:
638
437
  def token(self, value: Optional[pulumi.Input[str]]):
639
438
  pulumi.set(self, "token", value)
640
439
 
641
- @property
642
- @pulumi.getter(name="tokenBoundCidrs")
643
- def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
644
- """
645
- Specifies the blocks of IP addresses which are allowed to use the generated token
646
- """
647
- return pulumi.get(self, "token_bound_cidrs")
648
-
649
- @token_bound_cidrs.setter
650
- def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
651
- pulumi.set(self, "token_bound_cidrs", value)
652
-
653
- @property
654
- @pulumi.getter(name="tokenExplicitMaxTtl")
655
- def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
656
- """
657
- Generated Token's Explicit Maximum TTL in seconds
658
- """
659
- return pulumi.get(self, "token_explicit_max_ttl")
660
-
661
- @token_explicit_max_ttl.setter
662
- def token_explicit_max_ttl(self, value: Optional[pulumi.Input[int]]):
663
- pulumi.set(self, "token_explicit_max_ttl", value)
664
-
665
- @property
666
- @pulumi.getter(name="tokenMaxTtl")
667
- def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
668
- """
669
- The maximum lifetime of the generated token
670
- """
671
- return pulumi.get(self, "token_max_ttl")
672
-
673
- @token_max_ttl.setter
674
- def token_max_ttl(self, value: Optional[pulumi.Input[int]]):
675
- pulumi.set(self, "token_max_ttl", value)
676
-
677
- @property
678
- @pulumi.getter(name="tokenNoDefaultPolicy")
679
- def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
680
- """
681
- If true, the 'default' policy will not automatically be added to generated tokens
682
- """
683
- return pulumi.get(self, "token_no_default_policy")
684
-
685
- @token_no_default_policy.setter
686
- def token_no_default_policy(self, value: Optional[pulumi.Input[bool]]):
687
- pulumi.set(self, "token_no_default_policy", value)
688
-
689
- @property
690
- @pulumi.getter(name="tokenNumUses")
691
- def token_num_uses(self) -> Optional[pulumi.Input[int]]:
692
- """
693
- The maximum number of times a token may be used, a value of zero means unlimited
694
- """
695
- return pulumi.get(self, "token_num_uses")
696
-
697
- @token_num_uses.setter
698
- def token_num_uses(self, value: Optional[pulumi.Input[int]]):
699
- pulumi.set(self, "token_num_uses", value)
700
-
701
- @property
702
- @pulumi.getter(name="tokenPeriod")
703
- def token_period(self) -> Optional[pulumi.Input[int]]:
704
- """
705
- Generated Token's Period
706
- """
707
- return pulumi.get(self, "token_period")
708
-
709
- @token_period.setter
710
- def token_period(self, value: Optional[pulumi.Input[int]]):
711
- pulumi.set(self, "token_period", value)
712
-
713
- @property
714
- @pulumi.getter(name="tokenPolicies")
715
- def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
716
- """
717
- Generated Token's Policies
718
- """
719
- return pulumi.get(self, "token_policies")
720
-
721
- @token_policies.setter
722
- def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
723
- pulumi.set(self, "token_policies", value)
724
-
725
- @property
726
- @pulumi.getter(name="tokenTtl")
727
- def token_ttl(self) -> Optional[pulumi.Input[int]]:
728
- """
729
- The initial ttl of the token to generate in seconds
730
- """
731
- return pulumi.get(self, "token_ttl")
732
-
733
- @token_ttl.setter
734
- def token_ttl(self, value: Optional[pulumi.Input[int]]):
735
- pulumi.set(self, "token_ttl", value)
736
-
737
- @property
738
- @pulumi.getter(name="tokenType")
739
- def token_type(self) -> Optional[pulumi.Input[str]]:
740
- """
741
- The type of token to generate, service or batch
742
- """
743
- return pulumi.get(self, "token_type")
744
-
745
- @token_type.setter
746
- def token_type(self, value: Optional[pulumi.Input[str]]):
747
- pulumi.set(self, "token_type", value)
748
-
749
440
  @property
750
441
  @pulumi.getter
751
442
  def ttl(self) -> Optional[pulumi.Input[str]]:
@@ -753,9 +444,6 @@ class _AuthBackendState:
753
444
  Duration after which authentication will be expired.
754
445
  [See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
755
446
  """
756
- warnings.warn("""Deprecated. Please use `token_ttl` instead.""", DeprecationWarning)
757
- pulumi.log.warn("""ttl is deprecated: Deprecated. Please use `token_ttl` instead.""")
758
-
759
447
  return pulumi.get(self, "ttl")
760
448
 
761
449
  @ttl.setter
@@ -791,15 +479,6 @@ class AuthBackend(pulumi.CustomResource):
791
479
  organization: Optional[pulumi.Input[str]] = None,
792
480
  path: Optional[pulumi.Input[str]] = None,
793
481
  token: Optional[pulumi.Input[str]] = None,
794
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
795
- token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
796
- token_max_ttl: Optional[pulumi.Input[int]] = None,
797
- token_no_default_policy: Optional[pulumi.Input[bool]] = None,
798
- token_num_uses: Optional[pulumi.Input[int]] = None,
799
- token_period: Optional[pulumi.Input[int]] = None,
800
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
801
- token_ttl: Optional[pulumi.Input[int]] = None,
802
- token_type: Optional[pulumi.Input[str]] = None,
803
482
  ttl: Optional[pulumi.Input[str]] = None,
804
483
  users: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['AuthBackendUserArgs']]]]] = None,
805
484
  __props__=None):
@@ -809,14 +488,13 @@ class AuthBackend(pulumi.CustomResource):
809
488
 
810
489
  ## Example Usage
811
490
 
491
+ <!--Start PulumiCodeChooser -->
812
492
  ```python
813
493
  import pulumi
814
494
  import pulumi_vault as vault
815
495
 
816
496
  example = vault.okta.AuthBackend("example",
817
497
  description="Demonstration of the Terraform Okta auth backend",
818
- organization="example",
819
- token="something that should be kept secret",
820
498
  groups=[vault.okta.AuthBackendGroupArgs(
821
499
  group_name="foo",
822
500
  policies=[
@@ -824,11 +502,14 @@ class AuthBackend(pulumi.CustomResource):
824
502
  "two",
825
503
  ],
826
504
  )],
505
+ organization="example",
506
+ token="something that should be kept secret",
827
507
  users=[vault.okta.AuthBackendUserArgs(
828
- username="bar",
829
508
  groups=["foo"],
509
+ username="bar",
830
510
  )])
831
511
  ```
512
+ <!--End PulumiCodeChooser -->
832
513
 
833
514
  ## Import
834
515
 
@@ -857,15 +538,6 @@ class AuthBackend(pulumi.CustomResource):
857
538
  :param pulumi.Input[str] path: Path to mount the Okta auth backend. Default to path `okta`.
858
539
  :param pulumi.Input[str] token: The Okta API token. This is required to query Okta for user group membership.
859
540
  If this is not supplied only locally configured groups will be enabled.
860
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
861
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
862
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
863
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
864
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
865
- :param pulumi.Input[int] token_period: Generated Token's Period
866
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
867
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
868
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
869
541
  :param pulumi.Input[str] ttl: Duration after which authentication will be expired.
870
542
  [See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
871
543
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['AuthBackendUserArgs']]]] users: Associate Okta users with groups or policies within Vault.
@@ -883,14 +555,13 @@ class AuthBackend(pulumi.CustomResource):
883
555
 
884
556
  ## Example Usage
885
557
 
558
+ <!--Start PulumiCodeChooser -->
886
559
  ```python
887
560
  import pulumi
888
561
  import pulumi_vault as vault
889
562
 
890
563
  example = vault.okta.AuthBackend("example",
891
564
  description="Demonstration of the Terraform Okta auth backend",
892
- organization="example",
893
- token="something that should be kept secret",
894
565
  groups=[vault.okta.AuthBackendGroupArgs(
895
566
  group_name="foo",
896
567
  policies=[
@@ -898,11 +569,14 @@ class AuthBackend(pulumi.CustomResource):
898
569
  "two",
899
570
  ],
900
571
  )],
572
+ organization="example",
573
+ token="something that should be kept secret",
901
574
  users=[vault.okta.AuthBackendUserArgs(
902
- username="bar",
903
575
  groups=["foo"],
576
+ username="bar",
904
577
  )])
905
578
  ```
579
+ <!--End PulumiCodeChooser -->
906
580
 
907
581
  ## Import
908
582
 
@@ -937,15 +611,6 @@ class AuthBackend(pulumi.CustomResource):
937
611
  organization: Optional[pulumi.Input[str]] = None,
938
612
  path: Optional[pulumi.Input[str]] = None,
939
613
  token: Optional[pulumi.Input[str]] = None,
940
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
941
- token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
942
- token_max_ttl: Optional[pulumi.Input[int]] = None,
943
- token_no_default_policy: Optional[pulumi.Input[bool]] = None,
944
- token_num_uses: Optional[pulumi.Input[int]] = None,
945
- token_period: Optional[pulumi.Input[int]] = None,
946
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
947
- token_ttl: Optional[pulumi.Input[int]] = None,
948
- token_type: Optional[pulumi.Input[str]] = None,
949
614
  ttl: Optional[pulumi.Input[str]] = None,
950
615
  users: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['AuthBackendUserArgs']]]]] = None,
951
616
  __props__=None):
@@ -969,15 +634,6 @@ class AuthBackend(pulumi.CustomResource):
969
634
  __props__.__dict__["organization"] = organization
970
635
  __props__.__dict__["path"] = path
971
636
  __props__.__dict__["token"] = None if token is None else pulumi.Output.secret(token)
972
- __props__.__dict__["token_bound_cidrs"] = token_bound_cidrs
973
- __props__.__dict__["token_explicit_max_ttl"] = token_explicit_max_ttl
974
- __props__.__dict__["token_max_ttl"] = token_max_ttl
975
- __props__.__dict__["token_no_default_policy"] = token_no_default_policy
976
- __props__.__dict__["token_num_uses"] = token_num_uses
977
- __props__.__dict__["token_period"] = token_period
978
- __props__.__dict__["token_policies"] = token_policies
979
- __props__.__dict__["token_ttl"] = token_ttl
980
- __props__.__dict__["token_type"] = token_type
981
637
  __props__.__dict__["ttl"] = ttl
982
638
  __props__.__dict__["users"] = users
983
639
  __props__.__dict__["accessor"] = None
@@ -1004,15 +660,6 @@ class AuthBackend(pulumi.CustomResource):
1004
660
  organization: Optional[pulumi.Input[str]] = None,
1005
661
  path: Optional[pulumi.Input[str]] = None,
1006
662
  token: Optional[pulumi.Input[str]] = None,
1007
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1008
- token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
1009
- token_max_ttl: Optional[pulumi.Input[int]] = None,
1010
- token_no_default_policy: Optional[pulumi.Input[bool]] = None,
1011
- token_num_uses: Optional[pulumi.Input[int]] = None,
1012
- token_period: Optional[pulumi.Input[int]] = None,
1013
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1014
- token_ttl: Optional[pulumi.Input[int]] = None,
1015
- token_type: Optional[pulumi.Input[str]] = None,
1016
663
  ttl: Optional[pulumi.Input[str]] = None,
1017
664
  users: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['AuthBackendUserArgs']]]]] = None) -> 'AuthBackend':
1018
665
  """
@@ -1040,15 +687,6 @@ class AuthBackend(pulumi.CustomResource):
1040
687
  :param pulumi.Input[str] path: Path to mount the Okta auth backend. Default to path `okta`.
1041
688
  :param pulumi.Input[str] token: The Okta API token. This is required to query Okta for user group membership.
1042
689
  If this is not supplied only locally configured groups will be enabled.
1043
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
1044
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
1045
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
1046
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
1047
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
1048
- :param pulumi.Input[int] token_period: Generated Token's Period
1049
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
1050
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
1051
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
1052
690
  :param pulumi.Input[str] ttl: Duration after which authentication will be expired.
1053
691
  [See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
1054
692
  :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['AuthBackendUserArgs']]]] users: Associate Okta users with groups or policies within Vault.
@@ -1069,15 +707,6 @@ class AuthBackend(pulumi.CustomResource):
1069
707
  __props__.__dict__["organization"] = organization
1070
708
  __props__.__dict__["path"] = path
1071
709
  __props__.__dict__["token"] = token
1072
- __props__.__dict__["token_bound_cidrs"] = token_bound_cidrs
1073
- __props__.__dict__["token_explicit_max_ttl"] = token_explicit_max_ttl
1074
- __props__.__dict__["token_max_ttl"] = token_max_ttl
1075
- __props__.__dict__["token_no_default_policy"] = token_no_default_policy
1076
- __props__.__dict__["token_num_uses"] = token_num_uses
1077
- __props__.__dict__["token_period"] = token_period
1078
- __props__.__dict__["token_policies"] = token_policies
1079
- __props__.__dict__["token_ttl"] = token_ttl
1080
- __props__.__dict__["token_type"] = token_type
1081
710
  __props__.__dict__["ttl"] = ttl
1082
711
  __props__.__dict__["users"] = users
1083
712
  return AuthBackend(resource_name, opts=opts, __props__=__props__)
@@ -1139,9 +768,6 @@ class AuthBackend(pulumi.CustomResource):
1139
768
  Maximum duration after which authentication will be expired
1140
769
  [See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
1141
770
  """
1142
- warnings.warn("""Deprecated. Please use `token_max_ttl` instead.""", DeprecationWarning)
1143
- pulumi.log.warn("""max_ttl is deprecated: Deprecated. Please use `token_max_ttl` instead.""")
1144
-
1145
771
  return pulumi.get(self, "max_ttl")
1146
772
 
1147
773
  @property
@@ -1180,78 +806,6 @@ class AuthBackend(pulumi.CustomResource):
1180
806
  """
1181
807
  return pulumi.get(self, "token")
1182
808
 
1183
- @property
1184
- @pulumi.getter(name="tokenBoundCidrs")
1185
- def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
1186
- """
1187
- Specifies the blocks of IP addresses which are allowed to use the generated token
1188
- """
1189
- return pulumi.get(self, "token_bound_cidrs")
1190
-
1191
- @property
1192
- @pulumi.getter(name="tokenExplicitMaxTtl")
1193
- def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
1194
- """
1195
- Generated Token's Explicit Maximum TTL in seconds
1196
- """
1197
- return pulumi.get(self, "token_explicit_max_ttl")
1198
-
1199
- @property
1200
- @pulumi.getter(name="tokenMaxTtl")
1201
- def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
1202
- """
1203
- The maximum lifetime of the generated token
1204
- """
1205
- return pulumi.get(self, "token_max_ttl")
1206
-
1207
- @property
1208
- @pulumi.getter(name="tokenNoDefaultPolicy")
1209
- def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
1210
- """
1211
- If true, the 'default' policy will not automatically be added to generated tokens
1212
- """
1213
- return pulumi.get(self, "token_no_default_policy")
1214
-
1215
- @property
1216
- @pulumi.getter(name="tokenNumUses")
1217
- def token_num_uses(self) -> pulumi.Output[Optional[int]]:
1218
- """
1219
- The maximum number of times a token may be used, a value of zero means unlimited
1220
- """
1221
- return pulumi.get(self, "token_num_uses")
1222
-
1223
- @property
1224
- @pulumi.getter(name="tokenPeriod")
1225
- def token_period(self) -> pulumi.Output[Optional[int]]:
1226
- """
1227
- Generated Token's Period
1228
- """
1229
- return pulumi.get(self, "token_period")
1230
-
1231
- @property
1232
- @pulumi.getter(name="tokenPolicies")
1233
- def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
1234
- """
1235
- Generated Token's Policies
1236
- """
1237
- return pulumi.get(self, "token_policies")
1238
-
1239
- @property
1240
- @pulumi.getter(name="tokenTtl")
1241
- def token_ttl(self) -> pulumi.Output[Optional[int]]:
1242
- """
1243
- The initial ttl of the token to generate in seconds
1244
- """
1245
- return pulumi.get(self, "token_ttl")
1246
-
1247
- @property
1248
- @pulumi.getter(name="tokenType")
1249
- def token_type(self) -> pulumi.Output[Optional[str]]:
1250
- """
1251
- The type of token to generate, service or batch
1252
- """
1253
- return pulumi.get(self, "token_type")
1254
-
1255
809
  @property
1256
810
  @pulumi.getter
1257
811
  def ttl(self) -> pulumi.Output[Optional[str]]:
@@ -1259,9 +813,6 @@ class AuthBackend(pulumi.CustomResource):
1259
813
  Duration after which authentication will be expired.
1260
814
  [See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
1261
815
  """
1262
- warnings.warn("""Deprecated. Please use `token_ttl` instead.""", DeprecationWarning)
1263
- pulumi.log.warn("""ttl is deprecated: Deprecated. Please use `token_ttl` instead.""")
1264
-
1265
816
  return pulumi.get(self, "ttl")
1266
817
 
1267
818
  @property