pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (192) hide show
  1. pulumi_vault/__init__.py +0 -26
  2. pulumi_vault/_inputs.py +20 -0
  3. pulumi_vault/ad/secret_backend.py +6 -2
  4. pulumi_vault/ad/secret_library.py +4 -2
  5. pulumi_vault/ad/secret_role.py +4 -0
  6. pulumi_vault/alicloud/auth_backend_role.py +192 -69
  7. pulumi_vault/approle/auth_backend_login.py +4 -0
  8. pulumi_vault/approle/auth_backend_role.py +186 -63
  9. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  10. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  11. pulumi_vault/audit.py +20 -12
  12. pulumi_vault/audit_request_header.py +6 -6
  13. pulumi_vault/auth_backend.py +0 -47
  14. pulumi_vault/aws/auth_backend_client.py +17 -253
  15. pulumi_vault/aws/auth_backend_config_identity.py +4 -0
  16. pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
  17. pulumi_vault/aws/auth_backend_login.py +8 -0
  18. pulumi_vault/aws/auth_backend_role.py +186 -63
  19. pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
  20. pulumi_vault/aws/auth_backend_sts_role.py +4 -0
  21. pulumi_vault/aws/secret_backend_role.py +4 -56
  22. pulumi_vault/aws/secret_backend_static_role.py +4 -2
  23. pulumi_vault/azure/auth_backend_config.py +10 -139
  24. pulumi_vault/azure/auth_backend_role.py +186 -63
  25. pulumi_vault/azure/backend.py +22 -217
  26. pulumi_vault/azure/backend_role.py +18 -14
  27. pulumi_vault/azure/get_access_credentials.py +4 -0
  28. pulumi_vault/cert_auth_backend_role.py +208 -75
  29. pulumi_vault/consul/secret_backend.py +18 -10
  30. pulumi_vault/consul/secret_backend_role.py +4 -2
  31. pulumi_vault/database/_inputs.py +784 -522
  32. pulumi_vault/database/outputs.py +784 -522
  33. pulumi_vault/database/secret_backend_connection.py +4 -2
  34. pulumi_vault/database/secret_backend_role.py +4 -4
  35. pulumi_vault/database/secret_backend_static_role.py +8 -10
  36. pulumi_vault/database/secrets_mount.py +4 -286
  37. pulumi_vault/egp_policy.py +8 -4
  38. pulumi_vault/gcp/auth_backend.py +18 -226
  39. pulumi_vault/gcp/auth_backend_role.py +264 -63
  40. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  41. pulumi_vault/gcp/secret_backend.py +9 -275
  42. pulumi_vault/gcp/secret_impersonated_account.py +14 -12
  43. pulumi_vault/gcp/secret_roleset.py +6 -4
  44. pulumi_vault/gcp/secret_static_account.py +16 -14
  45. pulumi_vault/generic/endpoint.py +8 -4
  46. pulumi_vault/generic/get_secret.py +4 -40
  47. pulumi_vault/get_auth_backend.py +4 -0
  48. pulumi_vault/get_auth_backends.py +8 -0
  49. pulumi_vault/get_namespace.py +12 -0
  50. pulumi_vault/get_namespaces.py +12 -4
  51. pulumi_vault/get_nomad_access_token.py +4 -0
  52. pulumi_vault/get_policy_document.py +8 -8
  53. pulumi_vault/get_raft_autopilot_state.py +4 -0
  54. pulumi_vault/github/auth_backend.py +4 -0
  55. pulumi_vault/github/team.py +6 -2
  56. pulumi_vault/github/user.py +6 -2
  57. pulumi_vault/identity/entity.py +8 -6
  58. pulumi_vault/identity/entity_alias.py +8 -6
  59. pulumi_vault/identity/entity_policies.py +12 -12
  60. pulumi_vault/identity/get_entity.py +4 -0
  61. pulumi_vault/identity/get_group.py +4 -0
  62. pulumi_vault/identity/get_oidc_client_creds.py +4 -2
  63. pulumi_vault/identity/get_oidc_openid_config.py +6 -10
  64. pulumi_vault/identity/get_oidc_public_keys.py +6 -10
  65. pulumi_vault/identity/group.py +42 -38
  66. pulumi_vault/identity/group_alias.py +4 -2
  67. pulumi_vault/identity/group_member_entity_ids.py +16 -12
  68. pulumi_vault/identity/group_member_group_ids.py +20 -24
  69. pulumi_vault/identity/group_policies.py +8 -4
  70. pulumi_vault/identity/mfa_duo.py +8 -4
  71. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  72. pulumi_vault/identity/mfa_okta.py +8 -4
  73. pulumi_vault/identity/mfa_pingid.py +4 -0
  74. pulumi_vault/identity/mfa_totp.py +4 -0
  75. pulumi_vault/identity/oidc.py +4 -0
  76. pulumi_vault/identity/oidc_assignment.py +6 -10
  77. pulumi_vault/identity/oidc_client.py +10 -10
  78. pulumi_vault/identity/oidc_key.py +12 -16
  79. pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
  80. pulumi_vault/identity/oidc_provider.py +16 -22
  81. pulumi_vault/identity/oidc_role.py +20 -28
  82. pulumi_vault/identity/oidc_scope.py +8 -6
  83. pulumi_vault/jwt/auth_backend.py +32 -20
  84. pulumi_vault/jwt/auth_backend_role.py +225 -91
  85. pulumi_vault/kmip/secret_backend.py +14 -10
  86. pulumi_vault/kmip/secret_role.py +4 -0
  87. pulumi_vault/kmip/secret_scope.py +4 -0
  88. pulumi_vault/kubernetes/auth_backend_config.py +4 -0
  89. pulumi_vault/kubernetes/auth_backend_role.py +172 -56
  90. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  91. pulumi_vault/kubernetes/secret_backend.py +8 -288
  92. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  93. pulumi_vault/kv/get_secret.py +4 -0
  94. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
  95. pulumi_vault/kv/get_secret_v2.py +0 -58
  96. pulumi_vault/kv/get_secrets_list.py +8 -4
  97. pulumi_vault/kv/get_secrets_list_v2.py +12 -14
  98. pulumi_vault/kv/secret.py +4 -0
  99. pulumi_vault/kv/secret_backend_v2.py +4 -0
  100. pulumi_vault/kv/secret_v2.py +4 -2
  101. pulumi_vault/ldap/auth_backend.py +161 -66
  102. pulumi_vault/ldap/auth_backend_group.py +4 -0
  103. pulumi_vault/ldap/auth_backend_user.py +4 -0
  104. pulumi_vault/ldap/secret_backend.py +8 -286
  105. pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
  106. pulumi_vault/ldap/secret_backend_library_set.py +4 -2
  107. pulumi_vault/ldap/secret_backend_static_role.py +4 -0
  108. pulumi_vault/managed/_inputs.py +132 -84
  109. pulumi_vault/managed/keys.py +28 -7
  110. pulumi_vault/managed/outputs.py +132 -84
  111. pulumi_vault/mfa_duo.py +6 -4
  112. pulumi_vault/mfa_okta.py +6 -4
  113. pulumi_vault/mfa_pingid.py +6 -4
  114. pulumi_vault/mfa_totp.py +12 -10
  115. pulumi_vault/mongodbatlas/secret_backend.py +4 -0
  116. pulumi_vault/mongodbatlas/secret_role.py +4 -2
  117. pulumi_vault/mount.py +42 -350
  118. pulumi_vault/nomad_secret_backend.py +8 -4
  119. pulumi_vault/nomad_secret_role.py +4 -0
  120. pulumi_vault/okta/_inputs.py +8 -8
  121. pulumi_vault/okta/auth_backend.py +10 -459
  122. pulumi_vault/okta/auth_backend_group.py +4 -0
  123. pulumi_vault/okta/auth_backend_user.py +4 -0
  124. pulumi_vault/okta/outputs.py +8 -8
  125. pulumi_vault/outputs.py +20 -0
  126. pulumi_vault/password_policy.py +8 -6
  127. pulumi_vault/pkisecret/__init__.py +0 -2
  128. pulumi_vault/pkisecret/_inputs.py +0 -30
  129. pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
  130. pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
  131. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  132. pulumi_vault/pkisecret/get_backend_key.py +6 -2
  133. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  134. pulumi_vault/pkisecret/outputs.py +0 -54
  135. pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
  136. pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
  137. pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
  138. pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
  139. pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
  140. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
  141. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
  142. pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
  143. pulumi_vault/pkisecret/secret_backend_role.py +4 -2
  144. pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
  145. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
  146. pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
  147. pulumi_vault/provider.py +8 -0
  148. pulumi_vault/pulumi-plugin.json +1 -2
  149. pulumi_vault/quota_lease_count.py +8 -53
  150. pulumi_vault/quota_rate_limit.py +4 -49
  151. pulumi_vault/rabbitmq/secret_backend.py +8 -4
  152. pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
  153. pulumi_vault/raft_autopilot.py +4 -0
  154. pulumi_vault/raft_snapshot_agent_config.py +304 -109
  155. pulumi_vault/rgp_policy.py +6 -2
  156. pulumi_vault/saml/auth_backend.py +12 -8
  157. pulumi_vault/saml/auth_backend_role.py +178 -64
  158. pulumi_vault/secrets/sync_association.py +10 -12
  159. pulumi_vault/secrets/sync_aws_destination.py +8 -6
  160. pulumi_vault/secrets/sync_azure_destination.py +12 -10
  161. pulumi_vault/secrets/sync_config.py +6 -2
  162. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  163. pulumi_vault/secrets/sync_gh_destination.py +8 -6
  164. pulumi_vault/secrets/sync_github_apps.py +8 -8
  165. pulumi_vault/secrets/sync_vercel_destination.py +8 -6
  166. pulumi_vault/ssh/_inputs.py +32 -6
  167. pulumi_vault/ssh/outputs.py +32 -6
  168. pulumi_vault/ssh/secret_backend_ca.py +4 -94
  169. pulumi_vault/ssh/secret_backend_role.py +4 -4
  170. pulumi_vault/terraformcloud/secret_backend.py +56 -0
  171. pulumi_vault/terraformcloud/secret_creds.py +17 -2
  172. pulumi_vault/terraformcloud/secret_role.py +69 -2
  173. pulumi_vault/token.py +18 -14
  174. pulumi_vault/tokenauth/auth_backend_role.py +180 -64
  175. pulumi_vault/transform/alphabet.py +6 -4
  176. pulumi_vault/transform/get_decode.py +4 -4
  177. pulumi_vault/transform/get_encode.py +4 -4
  178. pulumi_vault/transform/role.py +6 -4
  179. pulumi_vault/transform/template.py +4 -4
  180. pulumi_vault/transit/get_decrypt.py +20 -4
  181. pulumi_vault/transit/get_encrypt.py +14 -0
  182. pulumi_vault/transit/secret_backend_key.py +6 -6
  183. pulumi_vault/transit/secret_cache_config.py +4 -0
  184. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
  185. pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
  186. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +1 -1
  187. pulumi_vault/pkisecret/backend_config_est.py +0 -614
  188. pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
  189. pulumi_vault/plugin.py +0 -590
  190. pulumi_vault/plugin_pinned_version.py +0 -293
  191. pulumi_vault-6.2.0.dist-info/RECORD +0 -256
  192. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -117,15 +117,32 @@ class AuthBackendRoleArgs:
117
117
  for this field should be the key of the tag on the EC2 instance. `auth_type`
118
118
  must be set to `ec2` or `inferred_entity_type` must be set to `ec2_instance`
119
119
  to use this constraint.
120
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
121
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
122
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
123
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
124
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
125
- :param pulumi.Input[int] token_period: Generated Token's Period
126
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
127
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
128
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
120
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
121
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
122
+ as well.
123
+ :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
124
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
125
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
126
+ `token_max_ttl` would otherwise allow a renewal.
127
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
128
+ Its current value will be referenced at renewal time.
129
+ :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
130
+ generated tokens; otherwise it will be added to the policies set in token_policies.
131
+ :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/aws#token_num_uses)
132
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
133
+ :param pulumi.Input[int] token_period: If set, indicates that the
134
+ token generated using this role should never expire. The token should be renewed within the
135
+ duration specified by this value. At each renewal, the token's TTL will be set to the
136
+ value of this field. Specified in seconds.
137
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
138
+ on the auth method, this list may be supplemented by user/group/other values.
139
+ :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
140
+ Its current value will be referenced at renewal time.
141
+ :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
142
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
143
+ `service` tokens). For token store roles, there are two additional possibilities:
144
+ `default-service` and `default-batch` which specify the type to return unless the client
145
+ requests a different type at generation time.
129
146
  """
130
147
  pulumi.set(__self__, "role", role)
131
148
  if allow_instance_migration is not None:
@@ -469,7 +486,9 @@ class AuthBackendRoleArgs:
469
486
  @pulumi.getter(name="tokenBoundCidrs")
470
487
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
471
488
  """
472
- Specifies the blocks of IP addresses which are allowed to use the generated token
489
+ List of CIDR blocks; if set, specifies blocks of IP
490
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
491
+ as well.
473
492
  """
474
493
  return pulumi.get(self, "token_bound_cidrs")
475
494
 
@@ -481,7 +500,10 @@ class AuthBackendRoleArgs:
481
500
  @pulumi.getter(name="tokenExplicitMaxTtl")
482
501
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
483
502
  """
484
- Generated Token's Explicit Maximum TTL in seconds
503
+ If set, will encode an
504
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
505
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
506
+ `token_max_ttl` would otherwise allow a renewal.
485
507
  """
486
508
  return pulumi.get(self, "token_explicit_max_ttl")
487
509
 
@@ -493,7 +515,8 @@ class AuthBackendRoleArgs:
493
515
  @pulumi.getter(name="tokenMaxTtl")
494
516
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
495
517
  """
496
- The maximum lifetime of the generated token
518
+ The maximum lifetime for generated tokens in number of seconds.
519
+ Its current value will be referenced at renewal time.
497
520
  """
498
521
  return pulumi.get(self, "token_max_ttl")
499
522
 
@@ -505,7 +528,8 @@ class AuthBackendRoleArgs:
505
528
  @pulumi.getter(name="tokenNoDefaultPolicy")
506
529
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
507
530
  """
508
- If true, the 'default' policy will not automatically be added to generated tokens
531
+ If set, the default policy will not be set on
532
+ generated tokens; otherwise it will be added to the policies set in token_policies.
509
533
  """
510
534
  return pulumi.get(self, "token_no_default_policy")
511
535
 
@@ -517,7 +541,8 @@ class AuthBackendRoleArgs:
517
541
  @pulumi.getter(name="tokenNumUses")
518
542
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
519
543
  """
520
- The maximum number of times a token may be used, a value of zero means unlimited
544
+ The [maximum number](https://www.vaultproject.io/api-docs/auth/aws#token_num_uses)
545
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
521
546
  """
522
547
  return pulumi.get(self, "token_num_uses")
523
548
 
@@ -529,7 +554,10 @@ class AuthBackendRoleArgs:
529
554
  @pulumi.getter(name="tokenPeriod")
530
555
  def token_period(self) -> Optional[pulumi.Input[int]]:
531
556
  """
532
- Generated Token's Period
557
+ If set, indicates that the
558
+ token generated using this role should never expire. The token should be renewed within the
559
+ duration specified by this value. At each renewal, the token's TTL will be set to the
560
+ value of this field. Specified in seconds.
533
561
  """
534
562
  return pulumi.get(self, "token_period")
535
563
 
@@ -541,7 +569,8 @@ class AuthBackendRoleArgs:
541
569
  @pulumi.getter(name="tokenPolicies")
542
570
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
543
571
  """
544
- Generated Token's Policies
572
+ List of policies to encode onto generated tokens. Depending
573
+ on the auth method, this list may be supplemented by user/group/other values.
545
574
  """
546
575
  return pulumi.get(self, "token_policies")
547
576
 
@@ -553,7 +582,8 @@ class AuthBackendRoleArgs:
553
582
  @pulumi.getter(name="tokenTtl")
554
583
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
555
584
  """
556
- The initial ttl of the token to generate in seconds
585
+ The incremental lifetime for generated tokens in number of seconds.
586
+ Its current value will be referenced at renewal time.
557
587
  """
558
588
  return pulumi.get(self, "token_ttl")
559
589
 
@@ -565,7 +595,11 @@ class AuthBackendRoleArgs:
565
595
  @pulumi.getter(name="tokenType")
566
596
  def token_type(self) -> Optional[pulumi.Input[str]]:
567
597
  """
568
- The type of token to generate, service or batch
598
+ The type of token that should be generated. Can be `service`,
599
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
600
+ `service` tokens). For token store roles, there are two additional possibilities:
601
+ `default-service` and `default-batch` which specify the type to return unless the client
602
+ requests a different type at generation time.
569
603
  """
570
604
  return pulumi.get(self, "token_type")
571
605
 
@@ -682,15 +716,32 @@ class _AuthBackendRoleState:
682
716
  for this field should be the key of the tag on the EC2 instance. `auth_type`
683
717
  must be set to `ec2` or `inferred_entity_type` must be set to `ec2_instance`
684
718
  to use this constraint.
685
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
686
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
687
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
688
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
689
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
690
- :param pulumi.Input[int] token_period: Generated Token's Period
691
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
692
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
693
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
719
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
720
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
721
+ as well.
722
+ :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
723
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
724
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
725
+ `token_max_ttl` would otherwise allow a renewal.
726
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
727
+ Its current value will be referenced at renewal time.
728
+ :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
729
+ generated tokens; otherwise it will be added to the policies set in token_policies.
730
+ :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/aws#token_num_uses)
731
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
732
+ :param pulumi.Input[int] token_period: If set, indicates that the
733
+ token generated using this role should never expire. The token should be renewed within the
734
+ duration specified by this value. At each renewal, the token's TTL will be set to the
735
+ value of this field. Specified in seconds.
736
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
737
+ on the auth method, this list may be supplemented by user/group/other values.
738
+ :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
739
+ Its current value will be referenced at renewal time.
740
+ :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
741
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
742
+ `service` tokens). For token store roles, there are two additional possibilities:
743
+ `default-service` and `default-batch` which specify the type to return unless the client
744
+ requests a different type at generation time.
694
745
  """
695
746
  if allow_instance_migration is not None:
696
747
  pulumi.set(__self__, "allow_instance_migration", allow_instance_migration)
@@ -1049,7 +1100,9 @@ class _AuthBackendRoleState:
1049
1100
  @pulumi.getter(name="tokenBoundCidrs")
1050
1101
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
1051
1102
  """
1052
- Specifies the blocks of IP addresses which are allowed to use the generated token
1103
+ List of CIDR blocks; if set, specifies blocks of IP
1104
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
1105
+ as well.
1053
1106
  """
1054
1107
  return pulumi.get(self, "token_bound_cidrs")
1055
1108
 
@@ -1061,7 +1114,10 @@ class _AuthBackendRoleState:
1061
1114
  @pulumi.getter(name="tokenExplicitMaxTtl")
1062
1115
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
1063
1116
  """
1064
- Generated Token's Explicit Maximum TTL in seconds
1117
+ If set, will encode an
1118
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1119
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1120
+ `token_max_ttl` would otherwise allow a renewal.
1065
1121
  """
1066
1122
  return pulumi.get(self, "token_explicit_max_ttl")
1067
1123
 
@@ -1073,7 +1129,8 @@ class _AuthBackendRoleState:
1073
1129
  @pulumi.getter(name="tokenMaxTtl")
1074
1130
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
1075
1131
  """
1076
- The maximum lifetime of the generated token
1132
+ The maximum lifetime for generated tokens in number of seconds.
1133
+ Its current value will be referenced at renewal time.
1077
1134
  """
1078
1135
  return pulumi.get(self, "token_max_ttl")
1079
1136
 
@@ -1085,7 +1142,8 @@ class _AuthBackendRoleState:
1085
1142
  @pulumi.getter(name="tokenNoDefaultPolicy")
1086
1143
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
1087
1144
  """
1088
- If true, the 'default' policy will not automatically be added to generated tokens
1145
+ If set, the default policy will not be set on
1146
+ generated tokens; otherwise it will be added to the policies set in token_policies.
1089
1147
  """
1090
1148
  return pulumi.get(self, "token_no_default_policy")
1091
1149
 
@@ -1097,7 +1155,8 @@ class _AuthBackendRoleState:
1097
1155
  @pulumi.getter(name="tokenNumUses")
1098
1156
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
1099
1157
  """
1100
- The maximum number of times a token may be used, a value of zero means unlimited
1158
+ The [maximum number](https://www.vaultproject.io/api-docs/auth/aws#token_num_uses)
1159
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
1101
1160
  """
1102
1161
  return pulumi.get(self, "token_num_uses")
1103
1162
 
@@ -1109,7 +1168,10 @@ class _AuthBackendRoleState:
1109
1168
  @pulumi.getter(name="tokenPeriod")
1110
1169
  def token_period(self) -> Optional[pulumi.Input[int]]:
1111
1170
  """
1112
- Generated Token's Period
1171
+ If set, indicates that the
1172
+ token generated using this role should never expire. The token should be renewed within the
1173
+ duration specified by this value. At each renewal, the token's TTL will be set to the
1174
+ value of this field. Specified in seconds.
1113
1175
  """
1114
1176
  return pulumi.get(self, "token_period")
1115
1177
 
@@ -1121,7 +1183,8 @@ class _AuthBackendRoleState:
1121
1183
  @pulumi.getter(name="tokenPolicies")
1122
1184
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
1123
1185
  """
1124
- Generated Token's Policies
1186
+ List of policies to encode onto generated tokens. Depending
1187
+ on the auth method, this list may be supplemented by user/group/other values.
1125
1188
  """
1126
1189
  return pulumi.get(self, "token_policies")
1127
1190
 
@@ -1133,7 +1196,8 @@ class _AuthBackendRoleState:
1133
1196
  @pulumi.getter(name="tokenTtl")
1134
1197
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
1135
1198
  """
1136
- The initial ttl of the token to generate in seconds
1199
+ The incremental lifetime for generated tokens in number of seconds.
1200
+ Its current value will be referenced at renewal time.
1137
1201
  """
1138
1202
  return pulumi.get(self, "token_ttl")
1139
1203
 
@@ -1145,7 +1209,11 @@ class _AuthBackendRoleState:
1145
1209
  @pulumi.getter(name="tokenType")
1146
1210
  def token_type(self) -> Optional[pulumi.Input[str]]:
1147
1211
  """
1148
- The type of token to generate, service or batch
1212
+ The type of token that should be generated. Can be `service`,
1213
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
1214
+ `service` tokens). For token store roles, there are two additional possibilities:
1215
+ `default-service` and `default-batch` which specify the type to return unless the client
1216
+ requests a different type at generation time.
1149
1217
  """
1150
1218
  return pulumi.get(self, "token_type")
1151
1219
 
@@ -1197,6 +1265,7 @@ class AuthBackendRole(pulumi.CustomResource):
1197
1265
 
1198
1266
  ## Example Usage
1199
1267
 
1268
+ <!--Start PulumiCodeChooser -->
1200
1269
  ```python
1201
1270
  import pulumi
1202
1271
  import pulumi_vault as vault
@@ -1222,6 +1291,7 @@ class AuthBackendRole(pulumi.CustomResource):
1222
1291
  "prod",
1223
1292
  ])
1224
1293
  ```
1294
+ <!--End PulumiCodeChooser -->
1225
1295
 
1226
1296
  ## Import
1227
1297
 
@@ -1306,15 +1376,32 @@ class AuthBackendRole(pulumi.CustomResource):
1306
1376
  for this field should be the key of the tag on the EC2 instance. `auth_type`
1307
1377
  must be set to `ec2` or `inferred_entity_type` must be set to `ec2_instance`
1308
1378
  to use this constraint.
1309
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
1310
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
1311
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
1312
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
1313
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
1314
- :param pulumi.Input[int] token_period: Generated Token's Period
1315
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
1316
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
1317
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
1379
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
1380
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
1381
+ as well.
1382
+ :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
1383
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1384
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1385
+ `token_max_ttl` would otherwise allow a renewal.
1386
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
1387
+ Its current value will be referenced at renewal time.
1388
+ :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
1389
+ generated tokens; otherwise it will be added to the policies set in token_policies.
1390
+ :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/aws#token_num_uses)
1391
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
1392
+ :param pulumi.Input[int] token_period: If set, indicates that the
1393
+ token generated using this role should never expire. The token should be renewed within the
1394
+ duration specified by this value. At each renewal, the token's TTL will be set to the
1395
+ value of this field. Specified in seconds.
1396
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
1397
+ on the auth method, this list may be supplemented by user/group/other values.
1398
+ :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
1399
+ Its current value will be referenced at renewal time.
1400
+ :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
1401
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
1402
+ `service` tokens). For token store roles, there are two additional possibilities:
1403
+ `default-service` and `default-batch` which specify the type to return unless the client
1404
+ requests a different type at generation time.
1318
1405
  """
1319
1406
  ...
1320
1407
  @overload
@@ -1331,6 +1418,7 @@ class AuthBackendRole(pulumi.CustomResource):
1331
1418
 
1332
1419
  ## Example Usage
1333
1420
 
1421
+ <!--Start PulumiCodeChooser -->
1334
1422
  ```python
1335
1423
  import pulumi
1336
1424
  import pulumi_vault as vault
@@ -1356,6 +1444,7 @@ class AuthBackendRole(pulumi.CustomResource):
1356
1444
  "prod",
1357
1445
  ])
1358
1446
  ```
1447
+ <!--End PulumiCodeChooser -->
1359
1448
 
1360
1449
  ## Import
1361
1450
 
@@ -1568,15 +1657,32 @@ class AuthBackendRole(pulumi.CustomResource):
1568
1657
  for this field should be the key of the tag on the EC2 instance. `auth_type`
1569
1658
  must be set to `ec2` or `inferred_entity_type` must be set to `ec2_instance`
1570
1659
  to use this constraint.
1571
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
1572
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
1573
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
1574
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
1575
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
1576
- :param pulumi.Input[int] token_period: Generated Token's Period
1577
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
1578
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
1579
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
1660
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
1661
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
1662
+ as well.
1663
+ :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
1664
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1665
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1666
+ `token_max_ttl` would otherwise allow a renewal.
1667
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
1668
+ Its current value will be referenced at renewal time.
1669
+ :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
1670
+ generated tokens; otherwise it will be added to the policies set in token_policies.
1671
+ :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/aws#token_num_uses)
1672
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
1673
+ :param pulumi.Input[int] token_period: If set, indicates that the
1674
+ token generated using this role should never expire. The token should be renewed within the
1675
+ duration specified by this value. At each renewal, the token's TTL will be set to the
1676
+ value of this field. Specified in seconds.
1677
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
1678
+ on the auth method, this list may be supplemented by user/group/other values.
1679
+ :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
1680
+ Its current value will be referenced at renewal time.
1681
+ :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
1682
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
1683
+ `service` tokens). For token store roles, there are two additional possibilities:
1684
+ `default-service` and `default-batch` which specify the type to return unless the client
1685
+ requests a different type at generation time.
1580
1686
  """
1581
1687
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
1582
1688
 
@@ -1831,7 +1937,9 @@ class AuthBackendRole(pulumi.CustomResource):
1831
1937
  @pulumi.getter(name="tokenBoundCidrs")
1832
1938
  def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
1833
1939
  """
1834
- Specifies the blocks of IP addresses which are allowed to use the generated token
1940
+ List of CIDR blocks; if set, specifies blocks of IP
1941
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
1942
+ as well.
1835
1943
  """
1836
1944
  return pulumi.get(self, "token_bound_cidrs")
1837
1945
 
@@ -1839,7 +1947,10 @@ class AuthBackendRole(pulumi.CustomResource):
1839
1947
  @pulumi.getter(name="tokenExplicitMaxTtl")
1840
1948
  def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
1841
1949
  """
1842
- Generated Token's Explicit Maximum TTL in seconds
1950
+ If set, will encode an
1951
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1952
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1953
+ `token_max_ttl` would otherwise allow a renewal.
1843
1954
  """
1844
1955
  return pulumi.get(self, "token_explicit_max_ttl")
1845
1956
 
@@ -1847,7 +1958,8 @@ class AuthBackendRole(pulumi.CustomResource):
1847
1958
  @pulumi.getter(name="tokenMaxTtl")
1848
1959
  def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
1849
1960
  """
1850
- The maximum lifetime of the generated token
1961
+ The maximum lifetime for generated tokens in number of seconds.
1962
+ Its current value will be referenced at renewal time.
1851
1963
  """
1852
1964
  return pulumi.get(self, "token_max_ttl")
1853
1965
 
@@ -1855,7 +1967,8 @@ class AuthBackendRole(pulumi.CustomResource):
1855
1967
  @pulumi.getter(name="tokenNoDefaultPolicy")
1856
1968
  def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
1857
1969
  """
1858
- If true, the 'default' policy will not automatically be added to generated tokens
1970
+ If set, the default policy will not be set on
1971
+ generated tokens; otherwise it will be added to the policies set in token_policies.
1859
1972
  """
1860
1973
  return pulumi.get(self, "token_no_default_policy")
1861
1974
 
@@ -1863,7 +1976,8 @@ class AuthBackendRole(pulumi.CustomResource):
1863
1976
  @pulumi.getter(name="tokenNumUses")
1864
1977
  def token_num_uses(self) -> pulumi.Output[Optional[int]]:
1865
1978
  """
1866
- The maximum number of times a token may be used, a value of zero means unlimited
1979
+ The [maximum number](https://www.vaultproject.io/api-docs/auth/aws#token_num_uses)
1980
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
1867
1981
  """
1868
1982
  return pulumi.get(self, "token_num_uses")
1869
1983
 
@@ -1871,7 +1985,10 @@ class AuthBackendRole(pulumi.CustomResource):
1871
1985
  @pulumi.getter(name="tokenPeriod")
1872
1986
  def token_period(self) -> pulumi.Output[Optional[int]]:
1873
1987
  """
1874
- Generated Token's Period
1988
+ If set, indicates that the
1989
+ token generated using this role should never expire. The token should be renewed within the
1990
+ duration specified by this value. At each renewal, the token's TTL will be set to the
1991
+ value of this field. Specified in seconds.
1875
1992
  """
1876
1993
  return pulumi.get(self, "token_period")
1877
1994
 
@@ -1879,7 +1996,8 @@ class AuthBackendRole(pulumi.CustomResource):
1879
1996
  @pulumi.getter(name="tokenPolicies")
1880
1997
  def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
1881
1998
  """
1882
- Generated Token's Policies
1999
+ List of policies to encode onto generated tokens. Depending
2000
+ on the auth method, this list may be supplemented by user/group/other values.
1883
2001
  """
1884
2002
  return pulumi.get(self, "token_policies")
1885
2003
 
@@ -1887,7 +2005,8 @@ class AuthBackendRole(pulumi.CustomResource):
1887
2005
  @pulumi.getter(name="tokenTtl")
1888
2006
  def token_ttl(self) -> pulumi.Output[Optional[int]]:
1889
2007
  """
1890
- The initial ttl of the token to generate in seconds
2008
+ The incremental lifetime for generated tokens in number of seconds.
2009
+ Its current value will be referenced at renewal time.
1891
2010
  """
1892
2011
  return pulumi.get(self, "token_ttl")
1893
2012
 
@@ -1895,7 +2014,11 @@ class AuthBackendRole(pulumi.CustomResource):
1895
2014
  @pulumi.getter(name="tokenType")
1896
2015
  def token_type(self) -> pulumi.Output[Optional[str]]:
1897
2016
  """
1898
- The type of token to generate, service or batch
2017
+ The type of token that should be generated. Can be `service`,
2018
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
2019
+ `service` tokens). For token store roles, there are two additional possibilities:
2020
+ `default-service` and `default-batch` which specify the type to return unless the client
2021
+ requests a different type at generation time.
1899
2022
  """
1900
2023
  return pulumi.get(self, "token_type")
1901
2024
 
@@ -197,15 +197,17 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
197
197
 
198
198
  ## Example Usage
199
199
 
200
+ <!--Start PulumiCodeChooser -->
200
201
  ```python
201
202
  import pulumi
202
203
  import pulumi_vault as vault
203
204
 
204
- example = vault.AuthBackend("example", type="aws")
205
- example_auth_backend_roletag_blacklist = vault.aws.AuthBackendRoletagBlacklist("example",
206
- backend=example.path,
205
+ example_auth_backend = vault.AuthBackend("exampleAuthBackend", type="aws")
206
+ example_auth_backend_roletag_blacklist = vault.aws.AuthBackendRoletagBlacklist("exampleAuthBackendRoletagBlacklist",
207
+ backend=example_auth_backend.path,
207
208
  safety_buffer=360)
208
209
  ```
210
+ <!--End PulumiCodeChooser -->
209
211
 
210
212
  :param str resource_name: The name of the resource.
211
213
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -232,15 +234,17 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
232
234
 
233
235
  ## Example Usage
234
236
 
237
+ <!--Start PulumiCodeChooser -->
235
238
  ```python
236
239
  import pulumi
237
240
  import pulumi_vault as vault
238
241
 
239
- example = vault.AuthBackend("example", type="aws")
240
- example_auth_backend_roletag_blacklist = vault.aws.AuthBackendRoletagBlacklist("example",
241
- backend=example.path,
242
+ example_auth_backend = vault.AuthBackend("exampleAuthBackend", type="aws")
243
+ example_auth_backend_roletag_blacklist = vault.aws.AuthBackendRoletagBlacklist("exampleAuthBackendRoletagBlacklist",
244
+ backend=example_auth_backend.path,
242
245
  safety_buffer=360)
243
246
  ```
247
+ <!--End PulumiCodeChooser -->
244
248
 
245
249
  :param str resource_name: The name of the resource.
246
250
  :param AuthBackendRoletagBlacklistArgs args: The arguments to use to populate this resource's properties.
@@ -186,6 +186,7 @@ class AuthBackendStsRole(pulumi.CustomResource):
186
186
  """
187
187
  ## Example Usage
188
188
 
189
+ <!--Start PulumiCodeChooser -->
189
190
  ```python
190
191
  import pulumi
191
192
  import pulumi_vault as vault
@@ -196,6 +197,7 @@ class AuthBackendStsRole(pulumi.CustomResource):
196
197
  account_id="1234567890",
197
198
  sts_role="arn:aws:iam::1234567890:role/my-role")
198
199
  ```
200
+ <!--End PulumiCodeChooser -->
199
201
 
200
202
  ## Import
201
203
 
@@ -226,6 +228,7 @@ class AuthBackendStsRole(pulumi.CustomResource):
226
228
  """
227
229
  ## Example Usage
228
230
 
231
+ <!--Start PulumiCodeChooser -->
229
232
  ```python
230
233
  import pulumi
231
234
  import pulumi_vault as vault
@@ -236,6 +239,7 @@ class AuthBackendStsRole(pulumi.CustomResource):
236
239
  account_id="1234567890",
237
240
  sts_role="arn:aws:iam::1234567890:role/my-role")
238
241
  ```
242
+ <!--End PulumiCodeChooser -->
239
243
 
240
244
  ## Import
241
245