pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (192) hide show
  1. pulumi_vault/__init__.py +0 -26
  2. pulumi_vault/_inputs.py +20 -0
  3. pulumi_vault/ad/secret_backend.py +6 -2
  4. pulumi_vault/ad/secret_library.py +4 -2
  5. pulumi_vault/ad/secret_role.py +4 -0
  6. pulumi_vault/alicloud/auth_backend_role.py +192 -69
  7. pulumi_vault/approle/auth_backend_login.py +4 -0
  8. pulumi_vault/approle/auth_backend_role.py +186 -63
  9. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  10. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  11. pulumi_vault/audit.py +20 -12
  12. pulumi_vault/audit_request_header.py +6 -6
  13. pulumi_vault/auth_backend.py +0 -47
  14. pulumi_vault/aws/auth_backend_client.py +17 -253
  15. pulumi_vault/aws/auth_backend_config_identity.py +4 -0
  16. pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
  17. pulumi_vault/aws/auth_backend_login.py +8 -0
  18. pulumi_vault/aws/auth_backend_role.py +186 -63
  19. pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
  20. pulumi_vault/aws/auth_backend_sts_role.py +4 -0
  21. pulumi_vault/aws/secret_backend_role.py +4 -56
  22. pulumi_vault/aws/secret_backend_static_role.py +4 -2
  23. pulumi_vault/azure/auth_backend_config.py +10 -139
  24. pulumi_vault/azure/auth_backend_role.py +186 -63
  25. pulumi_vault/azure/backend.py +22 -217
  26. pulumi_vault/azure/backend_role.py +18 -14
  27. pulumi_vault/azure/get_access_credentials.py +4 -0
  28. pulumi_vault/cert_auth_backend_role.py +208 -75
  29. pulumi_vault/consul/secret_backend.py +18 -10
  30. pulumi_vault/consul/secret_backend_role.py +4 -2
  31. pulumi_vault/database/_inputs.py +784 -522
  32. pulumi_vault/database/outputs.py +784 -522
  33. pulumi_vault/database/secret_backend_connection.py +4 -2
  34. pulumi_vault/database/secret_backend_role.py +4 -4
  35. pulumi_vault/database/secret_backend_static_role.py +8 -10
  36. pulumi_vault/database/secrets_mount.py +4 -286
  37. pulumi_vault/egp_policy.py +8 -4
  38. pulumi_vault/gcp/auth_backend.py +18 -226
  39. pulumi_vault/gcp/auth_backend_role.py +264 -63
  40. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  41. pulumi_vault/gcp/secret_backend.py +9 -275
  42. pulumi_vault/gcp/secret_impersonated_account.py +14 -12
  43. pulumi_vault/gcp/secret_roleset.py +6 -4
  44. pulumi_vault/gcp/secret_static_account.py +16 -14
  45. pulumi_vault/generic/endpoint.py +8 -4
  46. pulumi_vault/generic/get_secret.py +4 -40
  47. pulumi_vault/get_auth_backend.py +4 -0
  48. pulumi_vault/get_auth_backends.py +8 -0
  49. pulumi_vault/get_namespace.py +12 -0
  50. pulumi_vault/get_namespaces.py +12 -4
  51. pulumi_vault/get_nomad_access_token.py +4 -0
  52. pulumi_vault/get_policy_document.py +8 -8
  53. pulumi_vault/get_raft_autopilot_state.py +4 -0
  54. pulumi_vault/github/auth_backend.py +4 -0
  55. pulumi_vault/github/team.py +6 -2
  56. pulumi_vault/github/user.py +6 -2
  57. pulumi_vault/identity/entity.py +8 -6
  58. pulumi_vault/identity/entity_alias.py +8 -6
  59. pulumi_vault/identity/entity_policies.py +12 -12
  60. pulumi_vault/identity/get_entity.py +4 -0
  61. pulumi_vault/identity/get_group.py +4 -0
  62. pulumi_vault/identity/get_oidc_client_creds.py +4 -2
  63. pulumi_vault/identity/get_oidc_openid_config.py +6 -10
  64. pulumi_vault/identity/get_oidc_public_keys.py +6 -10
  65. pulumi_vault/identity/group.py +42 -38
  66. pulumi_vault/identity/group_alias.py +4 -2
  67. pulumi_vault/identity/group_member_entity_ids.py +16 -12
  68. pulumi_vault/identity/group_member_group_ids.py +20 -24
  69. pulumi_vault/identity/group_policies.py +8 -4
  70. pulumi_vault/identity/mfa_duo.py +8 -4
  71. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  72. pulumi_vault/identity/mfa_okta.py +8 -4
  73. pulumi_vault/identity/mfa_pingid.py +4 -0
  74. pulumi_vault/identity/mfa_totp.py +4 -0
  75. pulumi_vault/identity/oidc.py +4 -0
  76. pulumi_vault/identity/oidc_assignment.py +6 -10
  77. pulumi_vault/identity/oidc_client.py +10 -10
  78. pulumi_vault/identity/oidc_key.py +12 -16
  79. pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
  80. pulumi_vault/identity/oidc_provider.py +16 -22
  81. pulumi_vault/identity/oidc_role.py +20 -28
  82. pulumi_vault/identity/oidc_scope.py +8 -6
  83. pulumi_vault/jwt/auth_backend.py +32 -20
  84. pulumi_vault/jwt/auth_backend_role.py +225 -91
  85. pulumi_vault/kmip/secret_backend.py +14 -10
  86. pulumi_vault/kmip/secret_role.py +4 -0
  87. pulumi_vault/kmip/secret_scope.py +4 -0
  88. pulumi_vault/kubernetes/auth_backend_config.py +4 -0
  89. pulumi_vault/kubernetes/auth_backend_role.py +172 -56
  90. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  91. pulumi_vault/kubernetes/secret_backend.py +8 -288
  92. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  93. pulumi_vault/kv/get_secret.py +4 -0
  94. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
  95. pulumi_vault/kv/get_secret_v2.py +0 -58
  96. pulumi_vault/kv/get_secrets_list.py +8 -4
  97. pulumi_vault/kv/get_secrets_list_v2.py +12 -14
  98. pulumi_vault/kv/secret.py +4 -0
  99. pulumi_vault/kv/secret_backend_v2.py +4 -0
  100. pulumi_vault/kv/secret_v2.py +4 -2
  101. pulumi_vault/ldap/auth_backend.py +161 -66
  102. pulumi_vault/ldap/auth_backend_group.py +4 -0
  103. pulumi_vault/ldap/auth_backend_user.py +4 -0
  104. pulumi_vault/ldap/secret_backend.py +8 -286
  105. pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
  106. pulumi_vault/ldap/secret_backend_library_set.py +4 -2
  107. pulumi_vault/ldap/secret_backend_static_role.py +4 -0
  108. pulumi_vault/managed/_inputs.py +132 -84
  109. pulumi_vault/managed/keys.py +28 -7
  110. pulumi_vault/managed/outputs.py +132 -84
  111. pulumi_vault/mfa_duo.py +6 -4
  112. pulumi_vault/mfa_okta.py +6 -4
  113. pulumi_vault/mfa_pingid.py +6 -4
  114. pulumi_vault/mfa_totp.py +12 -10
  115. pulumi_vault/mongodbatlas/secret_backend.py +4 -0
  116. pulumi_vault/mongodbatlas/secret_role.py +4 -2
  117. pulumi_vault/mount.py +42 -350
  118. pulumi_vault/nomad_secret_backend.py +8 -4
  119. pulumi_vault/nomad_secret_role.py +4 -0
  120. pulumi_vault/okta/_inputs.py +8 -8
  121. pulumi_vault/okta/auth_backend.py +10 -459
  122. pulumi_vault/okta/auth_backend_group.py +4 -0
  123. pulumi_vault/okta/auth_backend_user.py +4 -0
  124. pulumi_vault/okta/outputs.py +8 -8
  125. pulumi_vault/outputs.py +20 -0
  126. pulumi_vault/password_policy.py +8 -6
  127. pulumi_vault/pkisecret/__init__.py +0 -2
  128. pulumi_vault/pkisecret/_inputs.py +0 -30
  129. pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
  130. pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
  131. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  132. pulumi_vault/pkisecret/get_backend_key.py +6 -2
  133. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  134. pulumi_vault/pkisecret/outputs.py +0 -54
  135. pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
  136. pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
  137. pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
  138. pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
  139. pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
  140. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
  141. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
  142. pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
  143. pulumi_vault/pkisecret/secret_backend_role.py +4 -2
  144. pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
  145. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
  146. pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
  147. pulumi_vault/provider.py +8 -0
  148. pulumi_vault/pulumi-plugin.json +1 -2
  149. pulumi_vault/quota_lease_count.py +8 -53
  150. pulumi_vault/quota_rate_limit.py +4 -49
  151. pulumi_vault/rabbitmq/secret_backend.py +8 -4
  152. pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
  153. pulumi_vault/raft_autopilot.py +4 -0
  154. pulumi_vault/raft_snapshot_agent_config.py +304 -109
  155. pulumi_vault/rgp_policy.py +6 -2
  156. pulumi_vault/saml/auth_backend.py +12 -8
  157. pulumi_vault/saml/auth_backend_role.py +178 -64
  158. pulumi_vault/secrets/sync_association.py +10 -12
  159. pulumi_vault/secrets/sync_aws_destination.py +8 -6
  160. pulumi_vault/secrets/sync_azure_destination.py +12 -10
  161. pulumi_vault/secrets/sync_config.py +6 -2
  162. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  163. pulumi_vault/secrets/sync_gh_destination.py +8 -6
  164. pulumi_vault/secrets/sync_github_apps.py +8 -8
  165. pulumi_vault/secrets/sync_vercel_destination.py +8 -6
  166. pulumi_vault/ssh/_inputs.py +32 -6
  167. pulumi_vault/ssh/outputs.py +32 -6
  168. pulumi_vault/ssh/secret_backend_ca.py +4 -94
  169. pulumi_vault/ssh/secret_backend_role.py +4 -4
  170. pulumi_vault/terraformcloud/secret_backend.py +56 -0
  171. pulumi_vault/terraformcloud/secret_creds.py +17 -2
  172. pulumi_vault/terraformcloud/secret_role.py +69 -2
  173. pulumi_vault/token.py +18 -14
  174. pulumi_vault/tokenauth/auth_backend_role.py +180 -64
  175. pulumi_vault/transform/alphabet.py +6 -4
  176. pulumi_vault/transform/get_decode.py +4 -4
  177. pulumi_vault/transform/get_encode.py +4 -4
  178. pulumi_vault/transform/role.py +6 -4
  179. pulumi_vault/transform/template.py +4 -4
  180. pulumi_vault/transit/get_decrypt.py +20 -4
  181. pulumi_vault/transit/get_encrypt.py +14 -0
  182. pulumi_vault/transit/secret_backend_key.py +6 -6
  183. pulumi_vault/transit/secret_cache_config.py +4 -0
  184. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
  185. pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
  186. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +1 -1
  187. pulumi_vault/pkisecret/backend_config_est.py +0 -614
  188. pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
  189. pulumi_vault/plugin.py +0 -590
  190. pulumi_vault/plugin_pinned_version.py +0 -293
  191. pulumi_vault-6.2.0.dist-info/RECORD +0 -256
  192. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -50,15 +50,31 @@ class AuthBackendRoleArgs:
50
50
 
51
51
  > Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
52
52
  :param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
53
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
54
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
55
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
56
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
57
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
58
- :param pulumi.Input[int] token_period: Generated Token's Period
53
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
54
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
55
+ as well.
56
+ :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
57
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
58
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
59
+ `token_max_ttl` would otherwise allow a renewal.
60
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
61
+ Its current value will be referenced at renewal time.
62
+ :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
63
+ generated tokens; otherwise it will be added to the policies set in token_policies.
64
+ :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/token#token_num_uses)
65
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
66
+ :param pulumi.Input[int] token_period: If set, indicates that the
67
+ token generated using this role should never expire. The token should be renewed within the
68
+ duration specified by this value. At each renewal, the token's TTL will be set to the
69
+ value of this field. Specified in seconds.
59
70
  :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
60
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
61
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
71
+ :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
72
+ Its current value will be referenced at renewal time.
73
+ :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
74
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
75
+ `service` tokens). For token store roles, there are two additional possibilities:
76
+ `default-service` and `default-batch` which specify the type to return unless the client
77
+ requests a different type at generation time.
62
78
  """
63
79
  pulumi.set(__self__, "role_name", role_name)
64
80
  if allowed_entity_aliases is not None:
@@ -227,7 +243,9 @@ class AuthBackendRoleArgs:
227
243
  @pulumi.getter(name="tokenBoundCidrs")
228
244
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
229
245
  """
230
- Specifies the blocks of IP addresses which are allowed to use the generated token
246
+ List of CIDR blocks; if set, specifies blocks of IP
247
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
248
+ as well.
231
249
  """
232
250
  return pulumi.get(self, "token_bound_cidrs")
233
251
 
@@ -239,7 +257,10 @@ class AuthBackendRoleArgs:
239
257
  @pulumi.getter(name="tokenExplicitMaxTtl")
240
258
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
241
259
  """
242
- Generated Token's Explicit Maximum TTL in seconds
260
+ If set, will encode an
261
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
262
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
263
+ `token_max_ttl` would otherwise allow a renewal.
243
264
  """
244
265
  return pulumi.get(self, "token_explicit_max_ttl")
245
266
 
@@ -251,7 +272,8 @@ class AuthBackendRoleArgs:
251
272
  @pulumi.getter(name="tokenMaxTtl")
252
273
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
253
274
  """
254
- The maximum lifetime of the generated token
275
+ The maximum lifetime for generated tokens in number of seconds.
276
+ Its current value will be referenced at renewal time.
255
277
  """
256
278
  return pulumi.get(self, "token_max_ttl")
257
279
 
@@ -263,7 +285,8 @@ class AuthBackendRoleArgs:
263
285
  @pulumi.getter(name="tokenNoDefaultPolicy")
264
286
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
265
287
  """
266
- If true, the 'default' policy will not automatically be added to generated tokens
288
+ If set, the default policy will not be set on
289
+ generated tokens; otherwise it will be added to the policies set in token_policies.
267
290
  """
268
291
  return pulumi.get(self, "token_no_default_policy")
269
292
 
@@ -275,7 +298,8 @@ class AuthBackendRoleArgs:
275
298
  @pulumi.getter(name="tokenNumUses")
276
299
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
277
300
  """
278
- The maximum number of times a token may be used, a value of zero means unlimited
301
+ The [maximum number](https://www.vaultproject.io/api-docs/token#token_num_uses)
302
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
279
303
  """
280
304
  return pulumi.get(self, "token_num_uses")
281
305
 
@@ -287,7 +311,10 @@ class AuthBackendRoleArgs:
287
311
  @pulumi.getter(name="tokenPeriod")
288
312
  def token_period(self) -> Optional[pulumi.Input[int]]:
289
313
  """
290
- Generated Token's Period
314
+ If set, indicates that the
315
+ token generated using this role should never expire. The token should be renewed within the
316
+ duration specified by this value. At each renewal, the token's TTL will be set to the
317
+ value of this field. Specified in seconds.
291
318
  """
292
319
  return pulumi.get(self, "token_period")
293
320
 
@@ -311,7 +338,8 @@ class AuthBackendRoleArgs:
311
338
  @pulumi.getter(name="tokenTtl")
312
339
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
313
340
  """
314
- The initial ttl of the token to generate in seconds
341
+ The incremental lifetime for generated tokens in number of seconds.
342
+ Its current value will be referenced at renewal time.
315
343
  """
316
344
  return pulumi.get(self, "token_ttl")
317
345
 
@@ -323,7 +351,11 @@ class AuthBackendRoleArgs:
323
351
  @pulumi.getter(name="tokenType")
324
352
  def token_type(self) -> Optional[pulumi.Input[str]]:
325
353
  """
326
- The type of token to generate, service or batch
354
+ The type of token that should be generated. Can be `service`,
355
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
356
+ `service` tokens). For token store roles, there are two additional possibilities:
357
+ `default-service` and `default-batch` which specify the type to return unless the client
358
+ requests a different type at generation time.
327
359
  """
328
360
  return pulumi.get(self, "token_type")
329
361
 
@@ -371,15 +403,31 @@ class _AuthBackendRoleState:
371
403
  > Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
372
404
  :param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
373
405
  :param pulumi.Input[str] role_name: The name of the role.
374
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
375
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
376
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
377
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
378
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
379
- :param pulumi.Input[int] token_period: Generated Token's Period
406
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
407
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
408
+ as well.
409
+ :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
410
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
411
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
412
+ `token_max_ttl` would otherwise allow a renewal.
413
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
414
+ Its current value will be referenced at renewal time.
415
+ :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
416
+ generated tokens; otherwise it will be added to the policies set in token_policies.
417
+ :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/token#token_num_uses)
418
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
419
+ :param pulumi.Input[int] token_period: If set, indicates that the
420
+ token generated using this role should never expire. The token should be renewed within the
421
+ duration specified by this value. At each renewal, the token's TTL will be set to the
422
+ value of this field. Specified in seconds.
380
423
  :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
381
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
382
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
424
+ :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
425
+ Its current value will be referenced at renewal time.
426
+ :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
427
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
428
+ `service` tokens). For token store roles, there are two additional possibilities:
429
+ `default-service` and `default-batch` which specify the type to return unless the client
430
+ requests a different type at generation time.
383
431
  """
384
432
  if allowed_entity_aliases is not None:
385
433
  pulumi.set(__self__, "allowed_entity_aliases", allowed_entity_aliases)
@@ -549,7 +597,9 @@ class _AuthBackendRoleState:
549
597
  @pulumi.getter(name="tokenBoundCidrs")
550
598
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
551
599
  """
552
- Specifies the blocks of IP addresses which are allowed to use the generated token
600
+ List of CIDR blocks; if set, specifies blocks of IP
601
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
602
+ as well.
553
603
  """
554
604
  return pulumi.get(self, "token_bound_cidrs")
555
605
 
@@ -561,7 +611,10 @@ class _AuthBackendRoleState:
561
611
  @pulumi.getter(name="tokenExplicitMaxTtl")
562
612
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
563
613
  """
564
- Generated Token's Explicit Maximum TTL in seconds
614
+ If set, will encode an
615
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
616
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
617
+ `token_max_ttl` would otherwise allow a renewal.
565
618
  """
566
619
  return pulumi.get(self, "token_explicit_max_ttl")
567
620
 
@@ -573,7 +626,8 @@ class _AuthBackendRoleState:
573
626
  @pulumi.getter(name="tokenMaxTtl")
574
627
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
575
628
  """
576
- The maximum lifetime of the generated token
629
+ The maximum lifetime for generated tokens in number of seconds.
630
+ Its current value will be referenced at renewal time.
577
631
  """
578
632
  return pulumi.get(self, "token_max_ttl")
579
633
 
@@ -585,7 +639,8 @@ class _AuthBackendRoleState:
585
639
  @pulumi.getter(name="tokenNoDefaultPolicy")
586
640
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
587
641
  """
588
- If true, the 'default' policy will not automatically be added to generated tokens
642
+ If set, the default policy will not be set on
643
+ generated tokens; otherwise it will be added to the policies set in token_policies.
589
644
  """
590
645
  return pulumi.get(self, "token_no_default_policy")
591
646
 
@@ -597,7 +652,8 @@ class _AuthBackendRoleState:
597
652
  @pulumi.getter(name="tokenNumUses")
598
653
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
599
654
  """
600
- The maximum number of times a token may be used, a value of zero means unlimited
655
+ The [maximum number](https://www.vaultproject.io/api-docs/token#token_num_uses)
656
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
601
657
  """
602
658
  return pulumi.get(self, "token_num_uses")
603
659
 
@@ -609,7 +665,10 @@ class _AuthBackendRoleState:
609
665
  @pulumi.getter(name="tokenPeriod")
610
666
  def token_period(self) -> Optional[pulumi.Input[int]]:
611
667
  """
612
- Generated Token's Period
668
+ If set, indicates that the
669
+ token generated using this role should never expire. The token should be renewed within the
670
+ duration specified by this value. At each renewal, the token's TTL will be set to the
671
+ value of this field. Specified in seconds.
613
672
  """
614
673
  return pulumi.get(self, "token_period")
615
674
 
@@ -633,7 +692,8 @@ class _AuthBackendRoleState:
633
692
  @pulumi.getter(name="tokenTtl")
634
693
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
635
694
  """
636
- The initial ttl of the token to generate in seconds
695
+ The incremental lifetime for generated tokens in number of seconds.
696
+ Its current value will be referenced at renewal time.
637
697
  """
638
698
  return pulumi.get(self, "token_ttl")
639
699
 
@@ -645,7 +705,11 @@ class _AuthBackendRoleState:
645
705
  @pulumi.getter(name="tokenType")
646
706
  def token_type(self) -> Optional[pulumi.Input[str]]:
647
707
  """
648
- The type of token to generate, service or batch
708
+ The type of token that should be generated. Can be `service`,
709
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
710
+ `service` tokens). For token store roles, there are two additional possibilities:
711
+ `default-service` and `default-batch` which specify the type to return unless the client
712
+ requests a different type at generation time.
649
713
  """
650
714
  return pulumi.get(self, "token_type")
651
715
 
@@ -686,24 +750,26 @@ class AuthBackendRole(pulumi.CustomResource):
686
750
 
687
751
  ## Example Usage
688
752
 
753
+ <!--Start PulumiCodeChooser -->
689
754
  ```python
690
755
  import pulumi
691
756
  import pulumi_vault as vault
692
757
 
693
758
  example = vault.tokenauth.AuthBackendRole("example",
694
- role_name="my-role",
759
+ allowed_entity_aliases=["test_entity"],
695
760
  allowed_policies=[
696
761
  "dev",
697
762
  "test",
698
763
  ],
699
764
  disallowed_policies=["default"],
700
- allowed_entity_aliases=["test_entity"],
701
765
  orphan=True,
702
- token_period=86400,
766
+ path_suffix="path-suffix",
703
767
  renewable=True,
768
+ role_name="my-role",
704
769
  token_explicit_max_ttl=115200,
705
- path_suffix="path-suffix")
770
+ token_period=86400)
706
771
  ```
772
+ <!--End PulumiCodeChooser -->
707
773
 
708
774
  ## Import
709
775
 
@@ -730,15 +796,31 @@ class AuthBackendRole(pulumi.CustomResource):
730
796
  > Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
731
797
  :param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
732
798
  :param pulumi.Input[str] role_name: The name of the role.
733
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
734
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
735
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
736
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
737
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
738
- :param pulumi.Input[int] token_period: Generated Token's Period
799
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
800
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
801
+ as well.
802
+ :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
803
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
804
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
805
+ `token_max_ttl` would otherwise allow a renewal.
806
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
807
+ Its current value will be referenced at renewal time.
808
+ :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
809
+ generated tokens; otherwise it will be added to the policies set in token_policies.
810
+ :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/token#token_num_uses)
811
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
812
+ :param pulumi.Input[int] token_period: If set, indicates that the
813
+ token generated using this role should never expire. The token should be renewed within the
814
+ duration specified by this value. At each renewal, the token's TTL will be set to the
815
+ value of this field. Specified in seconds.
739
816
  :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
740
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
741
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
817
+ :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
818
+ Its current value will be referenced at renewal time.
819
+ :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
820
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
821
+ `service` tokens). For token store roles, there are two additional possibilities:
822
+ `default-service` and `default-batch` which specify the type to return unless the client
823
+ requests a different type at generation time.
742
824
  """
743
825
  ...
744
826
  @overload
@@ -753,24 +835,26 @@ class AuthBackendRole(pulumi.CustomResource):
753
835
 
754
836
  ## Example Usage
755
837
 
838
+ <!--Start PulumiCodeChooser -->
756
839
  ```python
757
840
  import pulumi
758
841
  import pulumi_vault as vault
759
842
 
760
843
  example = vault.tokenauth.AuthBackendRole("example",
761
- role_name="my-role",
844
+ allowed_entity_aliases=["test_entity"],
762
845
  allowed_policies=[
763
846
  "dev",
764
847
  "test",
765
848
  ],
766
849
  disallowed_policies=["default"],
767
- allowed_entity_aliases=["test_entity"],
768
850
  orphan=True,
769
- token_period=86400,
851
+ path_suffix="path-suffix",
770
852
  renewable=True,
853
+ role_name="my-role",
771
854
  token_explicit_max_ttl=115200,
772
- path_suffix="path-suffix")
855
+ token_period=86400)
773
856
  ```
857
+ <!--End PulumiCodeChooser -->
774
858
 
775
859
  ## Import
776
860
 
@@ -895,15 +979,31 @@ class AuthBackendRole(pulumi.CustomResource):
895
979
  > Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
896
980
  :param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
897
981
  :param pulumi.Input[str] role_name: The name of the role.
898
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
899
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
900
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
901
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
902
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
903
- :param pulumi.Input[int] token_period: Generated Token's Period
982
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
983
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
984
+ as well.
985
+ :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
986
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
987
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
988
+ `token_max_ttl` would otherwise allow a renewal.
989
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
990
+ Its current value will be referenced at renewal time.
991
+ :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
992
+ generated tokens; otherwise it will be added to the policies set in token_policies.
993
+ :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/token#token_num_uses)
994
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
995
+ :param pulumi.Input[int] token_period: If set, indicates that the
996
+ token generated using this role should never expire. The token should be renewed within the
997
+ duration specified by this value. At each renewal, the token's TTL will be set to the
998
+ value of this field. Specified in seconds.
904
999
  :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
905
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
906
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
1000
+ :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
1001
+ Its current value will be referenced at renewal time.
1002
+ :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
1003
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
1004
+ `service` tokens). For token store roles, there are two additional possibilities:
1005
+ `default-service` and `default-batch` which specify the type to return unless the client
1006
+ requests a different type at generation time.
907
1007
  """
908
1008
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
909
1009
 
@@ -1019,7 +1119,9 @@ class AuthBackendRole(pulumi.CustomResource):
1019
1119
  @pulumi.getter(name="tokenBoundCidrs")
1020
1120
  def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
1021
1121
  """
1022
- Specifies the blocks of IP addresses which are allowed to use the generated token
1122
+ List of CIDR blocks; if set, specifies blocks of IP
1123
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
1124
+ as well.
1023
1125
  """
1024
1126
  return pulumi.get(self, "token_bound_cidrs")
1025
1127
 
@@ -1027,7 +1129,10 @@ class AuthBackendRole(pulumi.CustomResource):
1027
1129
  @pulumi.getter(name="tokenExplicitMaxTtl")
1028
1130
  def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
1029
1131
  """
1030
- Generated Token's Explicit Maximum TTL in seconds
1132
+ If set, will encode an
1133
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1134
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1135
+ `token_max_ttl` would otherwise allow a renewal.
1031
1136
  """
1032
1137
  return pulumi.get(self, "token_explicit_max_ttl")
1033
1138
 
@@ -1035,7 +1140,8 @@ class AuthBackendRole(pulumi.CustomResource):
1035
1140
  @pulumi.getter(name="tokenMaxTtl")
1036
1141
  def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
1037
1142
  """
1038
- The maximum lifetime of the generated token
1143
+ The maximum lifetime for generated tokens in number of seconds.
1144
+ Its current value will be referenced at renewal time.
1039
1145
  """
1040
1146
  return pulumi.get(self, "token_max_ttl")
1041
1147
 
@@ -1043,7 +1149,8 @@ class AuthBackendRole(pulumi.CustomResource):
1043
1149
  @pulumi.getter(name="tokenNoDefaultPolicy")
1044
1150
  def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
1045
1151
  """
1046
- If true, the 'default' policy will not automatically be added to generated tokens
1152
+ If set, the default policy will not be set on
1153
+ generated tokens; otherwise it will be added to the policies set in token_policies.
1047
1154
  """
1048
1155
  return pulumi.get(self, "token_no_default_policy")
1049
1156
 
@@ -1051,7 +1158,8 @@ class AuthBackendRole(pulumi.CustomResource):
1051
1158
  @pulumi.getter(name="tokenNumUses")
1052
1159
  def token_num_uses(self) -> pulumi.Output[Optional[int]]:
1053
1160
  """
1054
- The maximum number of times a token may be used, a value of zero means unlimited
1161
+ The [maximum number](https://www.vaultproject.io/api-docs/token#token_num_uses)
1162
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
1055
1163
  """
1056
1164
  return pulumi.get(self, "token_num_uses")
1057
1165
 
@@ -1059,7 +1167,10 @@ class AuthBackendRole(pulumi.CustomResource):
1059
1167
  @pulumi.getter(name="tokenPeriod")
1060
1168
  def token_period(self) -> pulumi.Output[Optional[int]]:
1061
1169
  """
1062
- Generated Token's Period
1170
+ If set, indicates that the
1171
+ token generated using this role should never expire. The token should be renewed within the
1172
+ duration specified by this value. At each renewal, the token's TTL will be set to the
1173
+ value of this field. Specified in seconds.
1063
1174
  """
1064
1175
  return pulumi.get(self, "token_period")
1065
1176
 
@@ -1075,7 +1186,8 @@ class AuthBackendRole(pulumi.CustomResource):
1075
1186
  @pulumi.getter(name="tokenTtl")
1076
1187
  def token_ttl(self) -> pulumi.Output[Optional[int]]:
1077
1188
  """
1078
- The initial ttl of the token to generate in seconds
1189
+ The incremental lifetime for generated tokens in number of seconds.
1190
+ Its current value will be referenced at renewal time.
1079
1191
  """
1080
1192
  return pulumi.get(self, "token_ttl")
1081
1193
 
@@ -1083,7 +1195,11 @@ class AuthBackendRole(pulumi.CustomResource):
1083
1195
  @pulumi.getter(name="tokenType")
1084
1196
  def token_type(self) -> pulumi.Output[Optional[str]]:
1085
1197
  """
1086
- The type of token to generate, service or batch
1198
+ The type of token that should be generated. Can be `service`,
1199
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
1200
+ `service` tokens). For token store roles, there are two additional possibilities:
1201
+ `default-service` and `default-batch` which specify the type to return unless the client
1202
+ requests a different type at generation time.
1087
1203
  """
1088
1204
  return pulumi.get(self, "token_type")
1089
1205
 
@@ -183,18 +183,19 @@ class Alphabet(pulumi.CustomResource):
183
183
 
184
184
  ## Example Usage
185
185
 
186
+ <!--Start PulumiCodeChooser -->
186
187
  ```python
187
188
  import pulumi
188
189
  import pulumi_vault as vault
189
190
 
190
- mount_transform = vault.Mount("mount_transform",
191
+ mount_transform = vault.Mount("mountTransform",
191
192
  path="transform",
192
193
  type="transform")
193
194
  test = vault.transform.Alphabet("test",
194
195
  path=mount_transform.path,
195
- name="numerics",
196
196
  alphabet="0123456789")
197
197
  ```
198
+ <!--End PulumiCodeChooser -->
198
199
 
199
200
  :param str resource_name: The name of the resource.
200
201
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -219,18 +220,19 @@ class Alphabet(pulumi.CustomResource):
219
220
 
220
221
  ## Example Usage
221
222
 
223
+ <!--Start PulumiCodeChooser -->
222
224
  ```python
223
225
  import pulumi
224
226
  import pulumi_vault as vault
225
227
 
226
- mount_transform = vault.Mount("mount_transform",
228
+ mount_transform = vault.Mount("mountTransform",
227
229
  path="transform",
228
230
  type="transform")
229
231
  test = vault.transform.Alphabet("test",
230
232
  path=mount_transform.path,
231
- name="numerics",
232
233
  alphabet="0123456789")
233
234
  ```
235
+ <!--End PulumiCodeChooser -->
234
236
 
235
237
  :param str resource_name: The name of the resource.
236
238
  :param AlphabetArgs args: The arguments to use to populate this resource's properties.
@@ -142,6 +142,7 @@ def get_decode(batch_inputs: Optional[Sequence[Mapping[str, Any]]] = None,
142
142
 
143
143
  ## Example Usage
144
144
 
145
+ <!--Start PulumiCodeChooser -->
145
146
  ```python
146
147
  import pulumi
147
148
  import pulumi_vault as vault
@@ -151,19 +152,18 @@ def get_decode(batch_inputs: Optional[Sequence[Mapping[str, Any]]] = None,
151
152
  type="transform")
152
153
  ccn_fpe = vault.transform.Transformation("ccn-fpe",
153
154
  path=transform.path,
154
- name="ccn-fpe",
155
155
  type="fpe",
156
156
  template="builtin/creditcardnumber",
157
157
  tweak_source="internal",
158
158
  allowed_roles=["payments"])
159
159
  payments = vault.transform.Role("payments",
160
160
  path=ccn_fpe.path,
161
- name="payments",
162
161
  transformations=["ccn-fpe"])
163
162
  test = vault.transform.get_decode_output(path=payments.path,
164
163
  role_name="payments",
165
164
  value="9300-3376-4943-8903")
166
165
  ```
166
+ <!--End PulumiCodeChooser -->
167
167
 
168
168
 
169
169
  :param Sequence[Mapping[str, Any]] batch_inputs: Specifies a list of items to be decoded in a single batch. If this parameter is set, the top-level parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.
@@ -223,6 +223,7 @@ def get_decode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
223
223
 
224
224
  ## Example Usage
225
225
 
226
+ <!--Start PulumiCodeChooser -->
226
227
  ```python
227
228
  import pulumi
228
229
  import pulumi_vault as vault
@@ -232,19 +233,18 @@ def get_decode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
232
233
  type="transform")
233
234
  ccn_fpe = vault.transform.Transformation("ccn-fpe",
234
235
  path=transform.path,
235
- name="ccn-fpe",
236
236
  type="fpe",
237
237
  template="builtin/creditcardnumber",
238
238
  tweak_source="internal",
239
239
  allowed_roles=["payments"])
240
240
  payments = vault.transform.Role("payments",
241
241
  path=ccn_fpe.path,
242
- name="payments",
243
242
  transformations=["ccn-fpe"])
244
243
  test = vault.transform.get_decode_output(path=payments.path,
245
244
  role_name="payments",
246
245
  value="9300-3376-4943-8903")
247
246
  ```
247
+ <!--End PulumiCodeChooser -->
248
248
 
249
249
 
250
250
  :param Sequence[Mapping[str, Any]] batch_inputs: Specifies a list of items to be decoded in a single batch. If this parameter is set, the top-level parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.
@@ -142,6 +142,7 @@ def get_encode(batch_inputs: Optional[Sequence[Mapping[str, Any]]] = None,
142
142
 
143
143
  ## Example Usage
144
144
 
145
+ <!--Start PulumiCodeChooser -->
145
146
  ```python
146
147
  import pulumi
147
148
  import pulumi_vault as vault
@@ -151,14 +152,12 @@ def get_encode(batch_inputs: Optional[Sequence[Mapping[str, Any]]] = None,
151
152
  type="transform")
152
153
  ccn_fpe = vault.transform.Transformation("ccn-fpe",
153
154
  path=transform.path,
154
- name="ccn-fpe",
155
155
  type="fpe",
156
156
  template="builtin/creditcardnumber",
157
157
  tweak_source="internal",
158
158
  allowed_roles=["payments"])
159
159
  payments = vault.transform.Role("payments",
160
160
  path=ccn_fpe.path,
161
- name="payments",
162
161
  transformations=["ccn-fpe"])
163
162
  test = vault.transform.get_encode_output(path=payments.path,
164
163
  role_name="payments",
@@ -166,6 +165,7 @@ def get_encode(batch_inputs: Optional[Sequence[Mapping[str, Any]]] = None,
166
165
  "value": "1111-2222-3333-4444",
167
166
  }])
168
167
  ```
168
+ <!--End PulumiCodeChooser -->
169
169
 
170
170
 
171
171
  :param Sequence[Mapping[str, Any]] batch_inputs: Specifies a list of items to be encoded in a single batch. If this parameter is set, the parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.
@@ -225,6 +225,7 @@ def get_encode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
225
225
 
226
226
  ## Example Usage
227
227
 
228
+ <!--Start PulumiCodeChooser -->
228
229
  ```python
229
230
  import pulumi
230
231
  import pulumi_vault as vault
@@ -234,14 +235,12 @@ def get_encode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
234
235
  type="transform")
235
236
  ccn_fpe = vault.transform.Transformation("ccn-fpe",
236
237
  path=transform.path,
237
- name="ccn-fpe",
238
238
  type="fpe",
239
239
  template="builtin/creditcardnumber",
240
240
  tweak_source="internal",
241
241
  allowed_roles=["payments"])
242
242
  payments = vault.transform.Role("payments",
243
243
  path=ccn_fpe.path,
244
- name="payments",
245
244
  transformations=["ccn-fpe"])
246
245
  test = vault.transform.get_encode_output(path=payments.path,
247
246
  role_name="payments",
@@ -249,6 +248,7 @@ def get_encode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
249
248
  "value": "1111-2222-3333-4444",
250
249
  }])
251
250
  ```
251
+ <!--End PulumiCodeChooser -->
252
252
 
253
253
 
254
254
  :param Sequence[Mapping[str, Any]] batch_inputs: Specifies a list of items to be encoded in a single batch. If this parameter is set, the parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.