pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (192) hide show
  1. pulumi_vault/__init__.py +0 -26
  2. pulumi_vault/_inputs.py +20 -0
  3. pulumi_vault/ad/secret_backend.py +6 -2
  4. pulumi_vault/ad/secret_library.py +4 -2
  5. pulumi_vault/ad/secret_role.py +4 -0
  6. pulumi_vault/alicloud/auth_backend_role.py +192 -69
  7. pulumi_vault/approle/auth_backend_login.py +4 -0
  8. pulumi_vault/approle/auth_backend_role.py +186 -63
  9. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  10. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  11. pulumi_vault/audit.py +20 -12
  12. pulumi_vault/audit_request_header.py +6 -6
  13. pulumi_vault/auth_backend.py +0 -47
  14. pulumi_vault/aws/auth_backend_client.py +17 -253
  15. pulumi_vault/aws/auth_backend_config_identity.py +4 -0
  16. pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
  17. pulumi_vault/aws/auth_backend_login.py +8 -0
  18. pulumi_vault/aws/auth_backend_role.py +186 -63
  19. pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
  20. pulumi_vault/aws/auth_backend_sts_role.py +4 -0
  21. pulumi_vault/aws/secret_backend_role.py +4 -56
  22. pulumi_vault/aws/secret_backend_static_role.py +4 -2
  23. pulumi_vault/azure/auth_backend_config.py +10 -139
  24. pulumi_vault/azure/auth_backend_role.py +186 -63
  25. pulumi_vault/azure/backend.py +22 -217
  26. pulumi_vault/azure/backend_role.py +18 -14
  27. pulumi_vault/azure/get_access_credentials.py +4 -0
  28. pulumi_vault/cert_auth_backend_role.py +208 -75
  29. pulumi_vault/consul/secret_backend.py +18 -10
  30. pulumi_vault/consul/secret_backend_role.py +4 -2
  31. pulumi_vault/database/_inputs.py +784 -522
  32. pulumi_vault/database/outputs.py +784 -522
  33. pulumi_vault/database/secret_backend_connection.py +4 -2
  34. pulumi_vault/database/secret_backend_role.py +4 -4
  35. pulumi_vault/database/secret_backend_static_role.py +8 -10
  36. pulumi_vault/database/secrets_mount.py +4 -286
  37. pulumi_vault/egp_policy.py +8 -4
  38. pulumi_vault/gcp/auth_backend.py +18 -226
  39. pulumi_vault/gcp/auth_backend_role.py +264 -63
  40. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  41. pulumi_vault/gcp/secret_backend.py +9 -275
  42. pulumi_vault/gcp/secret_impersonated_account.py +14 -12
  43. pulumi_vault/gcp/secret_roleset.py +6 -4
  44. pulumi_vault/gcp/secret_static_account.py +16 -14
  45. pulumi_vault/generic/endpoint.py +8 -4
  46. pulumi_vault/generic/get_secret.py +4 -40
  47. pulumi_vault/get_auth_backend.py +4 -0
  48. pulumi_vault/get_auth_backends.py +8 -0
  49. pulumi_vault/get_namespace.py +12 -0
  50. pulumi_vault/get_namespaces.py +12 -4
  51. pulumi_vault/get_nomad_access_token.py +4 -0
  52. pulumi_vault/get_policy_document.py +8 -8
  53. pulumi_vault/get_raft_autopilot_state.py +4 -0
  54. pulumi_vault/github/auth_backend.py +4 -0
  55. pulumi_vault/github/team.py +6 -2
  56. pulumi_vault/github/user.py +6 -2
  57. pulumi_vault/identity/entity.py +8 -6
  58. pulumi_vault/identity/entity_alias.py +8 -6
  59. pulumi_vault/identity/entity_policies.py +12 -12
  60. pulumi_vault/identity/get_entity.py +4 -0
  61. pulumi_vault/identity/get_group.py +4 -0
  62. pulumi_vault/identity/get_oidc_client_creds.py +4 -2
  63. pulumi_vault/identity/get_oidc_openid_config.py +6 -10
  64. pulumi_vault/identity/get_oidc_public_keys.py +6 -10
  65. pulumi_vault/identity/group.py +42 -38
  66. pulumi_vault/identity/group_alias.py +4 -2
  67. pulumi_vault/identity/group_member_entity_ids.py +16 -12
  68. pulumi_vault/identity/group_member_group_ids.py +20 -24
  69. pulumi_vault/identity/group_policies.py +8 -4
  70. pulumi_vault/identity/mfa_duo.py +8 -4
  71. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  72. pulumi_vault/identity/mfa_okta.py +8 -4
  73. pulumi_vault/identity/mfa_pingid.py +4 -0
  74. pulumi_vault/identity/mfa_totp.py +4 -0
  75. pulumi_vault/identity/oidc.py +4 -0
  76. pulumi_vault/identity/oidc_assignment.py +6 -10
  77. pulumi_vault/identity/oidc_client.py +10 -10
  78. pulumi_vault/identity/oidc_key.py +12 -16
  79. pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
  80. pulumi_vault/identity/oidc_provider.py +16 -22
  81. pulumi_vault/identity/oidc_role.py +20 -28
  82. pulumi_vault/identity/oidc_scope.py +8 -6
  83. pulumi_vault/jwt/auth_backend.py +32 -20
  84. pulumi_vault/jwt/auth_backend_role.py +225 -91
  85. pulumi_vault/kmip/secret_backend.py +14 -10
  86. pulumi_vault/kmip/secret_role.py +4 -0
  87. pulumi_vault/kmip/secret_scope.py +4 -0
  88. pulumi_vault/kubernetes/auth_backend_config.py +4 -0
  89. pulumi_vault/kubernetes/auth_backend_role.py +172 -56
  90. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  91. pulumi_vault/kubernetes/secret_backend.py +8 -288
  92. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  93. pulumi_vault/kv/get_secret.py +4 -0
  94. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
  95. pulumi_vault/kv/get_secret_v2.py +0 -58
  96. pulumi_vault/kv/get_secrets_list.py +8 -4
  97. pulumi_vault/kv/get_secrets_list_v2.py +12 -14
  98. pulumi_vault/kv/secret.py +4 -0
  99. pulumi_vault/kv/secret_backend_v2.py +4 -0
  100. pulumi_vault/kv/secret_v2.py +4 -2
  101. pulumi_vault/ldap/auth_backend.py +161 -66
  102. pulumi_vault/ldap/auth_backend_group.py +4 -0
  103. pulumi_vault/ldap/auth_backend_user.py +4 -0
  104. pulumi_vault/ldap/secret_backend.py +8 -286
  105. pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
  106. pulumi_vault/ldap/secret_backend_library_set.py +4 -2
  107. pulumi_vault/ldap/secret_backend_static_role.py +4 -0
  108. pulumi_vault/managed/_inputs.py +132 -84
  109. pulumi_vault/managed/keys.py +28 -7
  110. pulumi_vault/managed/outputs.py +132 -84
  111. pulumi_vault/mfa_duo.py +6 -4
  112. pulumi_vault/mfa_okta.py +6 -4
  113. pulumi_vault/mfa_pingid.py +6 -4
  114. pulumi_vault/mfa_totp.py +12 -10
  115. pulumi_vault/mongodbatlas/secret_backend.py +4 -0
  116. pulumi_vault/mongodbatlas/secret_role.py +4 -2
  117. pulumi_vault/mount.py +42 -350
  118. pulumi_vault/nomad_secret_backend.py +8 -4
  119. pulumi_vault/nomad_secret_role.py +4 -0
  120. pulumi_vault/okta/_inputs.py +8 -8
  121. pulumi_vault/okta/auth_backend.py +10 -459
  122. pulumi_vault/okta/auth_backend_group.py +4 -0
  123. pulumi_vault/okta/auth_backend_user.py +4 -0
  124. pulumi_vault/okta/outputs.py +8 -8
  125. pulumi_vault/outputs.py +20 -0
  126. pulumi_vault/password_policy.py +8 -6
  127. pulumi_vault/pkisecret/__init__.py +0 -2
  128. pulumi_vault/pkisecret/_inputs.py +0 -30
  129. pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
  130. pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
  131. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  132. pulumi_vault/pkisecret/get_backend_key.py +6 -2
  133. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  134. pulumi_vault/pkisecret/outputs.py +0 -54
  135. pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
  136. pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
  137. pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
  138. pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
  139. pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
  140. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
  141. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
  142. pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
  143. pulumi_vault/pkisecret/secret_backend_role.py +4 -2
  144. pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
  145. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
  146. pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
  147. pulumi_vault/provider.py +8 -0
  148. pulumi_vault/pulumi-plugin.json +1 -2
  149. pulumi_vault/quota_lease_count.py +8 -53
  150. pulumi_vault/quota_rate_limit.py +4 -49
  151. pulumi_vault/rabbitmq/secret_backend.py +8 -4
  152. pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
  153. pulumi_vault/raft_autopilot.py +4 -0
  154. pulumi_vault/raft_snapshot_agent_config.py +304 -109
  155. pulumi_vault/rgp_policy.py +6 -2
  156. pulumi_vault/saml/auth_backend.py +12 -8
  157. pulumi_vault/saml/auth_backend_role.py +178 -64
  158. pulumi_vault/secrets/sync_association.py +10 -12
  159. pulumi_vault/secrets/sync_aws_destination.py +8 -6
  160. pulumi_vault/secrets/sync_azure_destination.py +12 -10
  161. pulumi_vault/secrets/sync_config.py +6 -2
  162. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  163. pulumi_vault/secrets/sync_gh_destination.py +8 -6
  164. pulumi_vault/secrets/sync_github_apps.py +8 -8
  165. pulumi_vault/secrets/sync_vercel_destination.py +8 -6
  166. pulumi_vault/ssh/_inputs.py +32 -6
  167. pulumi_vault/ssh/outputs.py +32 -6
  168. pulumi_vault/ssh/secret_backend_ca.py +4 -94
  169. pulumi_vault/ssh/secret_backend_role.py +4 -4
  170. pulumi_vault/terraformcloud/secret_backend.py +56 -0
  171. pulumi_vault/terraformcloud/secret_creds.py +17 -2
  172. pulumi_vault/terraformcloud/secret_role.py +69 -2
  173. pulumi_vault/token.py +18 -14
  174. pulumi_vault/tokenauth/auth_backend_role.py +180 -64
  175. pulumi_vault/transform/alphabet.py +6 -4
  176. pulumi_vault/transform/get_decode.py +4 -4
  177. pulumi_vault/transform/get_encode.py +4 -4
  178. pulumi_vault/transform/role.py +6 -4
  179. pulumi_vault/transform/template.py +4 -4
  180. pulumi_vault/transit/get_decrypt.py +20 -4
  181. pulumi_vault/transit/get_encrypt.py +14 -0
  182. pulumi_vault/transit/secret_backend_key.py +6 -6
  183. pulumi_vault/transit/secret_cache_config.py +4 -0
  184. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
  185. pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
  186. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +1 -1
  187. pulumi_vault/pkisecret/backend_config_est.py +0 -614
  188. pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
  189. pulumi_vault/plugin.py +0 -590
  190. pulumi_vault/plugin_pinned_version.py +0 -293
  191. pulumi_vault-6.2.0.dist-info/RECORD +0 -256
  192. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -58,15 +58,32 @@ class AuthBackendRoleArgs:
58
58
  The value should not contain leading or trailing forward slashes.
59
59
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
60
60
  *Available only for Vault Enterprise*.
61
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
62
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
63
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
64
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
65
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
66
- :param pulumi.Input[int] token_period: Generated Token's Period
67
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
68
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
69
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
61
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
62
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
63
+ as well.
64
+ :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
65
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
66
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
67
+ `token_max_ttl` would otherwise allow a renewal.
68
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
69
+ Its current value will be referenced at renewal time.
70
+ :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
71
+ generated tokens; otherwise it will be added to the policies set in token_policies.
72
+ :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/azure#token_num_uses)
73
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
74
+ :param pulumi.Input[int] token_period: If set, indicates that the
75
+ token generated using this role should never expire. The token should be renewed within the
76
+ duration specified by this value. At each renewal, the token's TTL will be set to the
77
+ value of this field. Specified in seconds.
78
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
79
+ on the auth method, this list may be supplemented by user/group/other values.
80
+ :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
81
+ Its current value will be referenced at renewal time.
82
+ :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
83
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
84
+ `service` tokens). For token store roles, there are two additional possibilities:
85
+ `default-service` and `default-batch` which specify the type to return unless the client
86
+ requests a different type at generation time.
70
87
  """
71
88
  pulumi.set(__self__, "role", role)
72
89
  if backend is not None:
@@ -231,7 +248,9 @@ class AuthBackendRoleArgs:
231
248
  @pulumi.getter(name="tokenBoundCidrs")
232
249
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
233
250
  """
234
- Specifies the blocks of IP addresses which are allowed to use the generated token
251
+ List of CIDR blocks; if set, specifies blocks of IP
252
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
253
+ as well.
235
254
  """
236
255
  return pulumi.get(self, "token_bound_cidrs")
237
256
 
@@ -243,7 +262,10 @@ class AuthBackendRoleArgs:
243
262
  @pulumi.getter(name="tokenExplicitMaxTtl")
244
263
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
245
264
  """
246
- Generated Token's Explicit Maximum TTL in seconds
265
+ If set, will encode an
266
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
267
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
268
+ `token_max_ttl` would otherwise allow a renewal.
247
269
  """
248
270
  return pulumi.get(self, "token_explicit_max_ttl")
249
271
 
@@ -255,7 +277,8 @@ class AuthBackendRoleArgs:
255
277
  @pulumi.getter(name="tokenMaxTtl")
256
278
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
257
279
  """
258
- The maximum lifetime of the generated token
280
+ The maximum lifetime for generated tokens in number of seconds.
281
+ Its current value will be referenced at renewal time.
259
282
  """
260
283
  return pulumi.get(self, "token_max_ttl")
261
284
 
@@ -267,7 +290,8 @@ class AuthBackendRoleArgs:
267
290
  @pulumi.getter(name="tokenNoDefaultPolicy")
268
291
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
269
292
  """
270
- If true, the 'default' policy will not automatically be added to generated tokens
293
+ If set, the default policy will not be set on
294
+ generated tokens; otherwise it will be added to the policies set in token_policies.
271
295
  """
272
296
  return pulumi.get(self, "token_no_default_policy")
273
297
 
@@ -279,7 +303,8 @@ class AuthBackendRoleArgs:
279
303
  @pulumi.getter(name="tokenNumUses")
280
304
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
281
305
  """
282
- The maximum number of times a token may be used, a value of zero means unlimited
306
+ The [maximum number](https://www.vaultproject.io/api-docs/azure#token_num_uses)
307
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
283
308
  """
284
309
  return pulumi.get(self, "token_num_uses")
285
310
 
@@ -291,7 +316,10 @@ class AuthBackendRoleArgs:
291
316
  @pulumi.getter(name="tokenPeriod")
292
317
  def token_period(self) -> Optional[pulumi.Input[int]]:
293
318
  """
294
- Generated Token's Period
319
+ If set, indicates that the
320
+ token generated using this role should never expire. The token should be renewed within the
321
+ duration specified by this value. At each renewal, the token's TTL will be set to the
322
+ value of this field. Specified in seconds.
295
323
  """
296
324
  return pulumi.get(self, "token_period")
297
325
 
@@ -303,7 +331,8 @@ class AuthBackendRoleArgs:
303
331
  @pulumi.getter(name="tokenPolicies")
304
332
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
305
333
  """
306
- Generated Token's Policies
334
+ List of policies to encode onto generated tokens. Depending
335
+ on the auth method, this list may be supplemented by user/group/other values.
307
336
  """
308
337
  return pulumi.get(self, "token_policies")
309
338
 
@@ -315,7 +344,8 @@ class AuthBackendRoleArgs:
315
344
  @pulumi.getter(name="tokenTtl")
316
345
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
317
346
  """
318
- The initial ttl of the token to generate in seconds
347
+ The incremental lifetime for generated tokens in number of seconds.
348
+ Its current value will be referenced at renewal time.
319
349
  """
320
350
  return pulumi.get(self, "token_ttl")
321
351
 
@@ -327,7 +357,11 @@ class AuthBackendRoleArgs:
327
357
  @pulumi.getter(name="tokenType")
328
358
  def token_type(self) -> Optional[pulumi.Input[str]]:
329
359
  """
330
- The type of token to generate, service or batch
360
+ The type of token that should be generated. Can be `service`,
361
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
362
+ `service` tokens). For token store roles, there are two additional possibilities:
363
+ `default-service` and `default-batch` which specify the type to return unless the client
364
+ requests a different type at generation time.
331
365
  """
332
366
  return pulumi.get(self, "token_type")
333
367
 
@@ -383,15 +417,32 @@ class _AuthBackendRoleState:
383
417
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
384
418
  *Available only for Vault Enterprise*.
385
419
  :param pulumi.Input[str] role: The name of the role.
386
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
387
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
388
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
389
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
390
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
391
- :param pulumi.Input[int] token_period: Generated Token's Period
392
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
393
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
394
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
420
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
421
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
422
+ as well.
423
+ :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
424
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
425
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
426
+ `token_max_ttl` would otherwise allow a renewal.
427
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
428
+ Its current value will be referenced at renewal time.
429
+ :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
430
+ generated tokens; otherwise it will be added to the policies set in token_policies.
431
+ :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/azure#token_num_uses)
432
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
433
+ :param pulumi.Input[int] token_period: If set, indicates that the
434
+ token generated using this role should never expire. The token should be renewed within the
435
+ duration specified by this value. At each renewal, the token's TTL will be set to the
436
+ value of this field. Specified in seconds.
437
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
438
+ on the auth method, this list may be supplemented by user/group/other values.
439
+ :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
440
+ Its current value will be referenced at renewal time.
441
+ :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
442
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
443
+ `service` tokens). For token store roles, there are two additional possibilities:
444
+ `default-service` and `default-batch` which specify the type to return unless the client
445
+ requests a different type at generation time.
395
446
  """
396
447
  if backend is not None:
397
448
  pulumi.set(__self__, "backend", backend)
@@ -557,7 +608,9 @@ class _AuthBackendRoleState:
557
608
  @pulumi.getter(name="tokenBoundCidrs")
558
609
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
559
610
  """
560
- Specifies the blocks of IP addresses which are allowed to use the generated token
611
+ List of CIDR blocks; if set, specifies blocks of IP
612
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
613
+ as well.
561
614
  """
562
615
  return pulumi.get(self, "token_bound_cidrs")
563
616
 
@@ -569,7 +622,10 @@ class _AuthBackendRoleState:
569
622
  @pulumi.getter(name="tokenExplicitMaxTtl")
570
623
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
571
624
  """
572
- Generated Token's Explicit Maximum TTL in seconds
625
+ If set, will encode an
626
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
627
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
628
+ `token_max_ttl` would otherwise allow a renewal.
573
629
  """
574
630
  return pulumi.get(self, "token_explicit_max_ttl")
575
631
 
@@ -581,7 +637,8 @@ class _AuthBackendRoleState:
581
637
  @pulumi.getter(name="tokenMaxTtl")
582
638
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
583
639
  """
584
- The maximum lifetime of the generated token
640
+ The maximum lifetime for generated tokens in number of seconds.
641
+ Its current value will be referenced at renewal time.
585
642
  """
586
643
  return pulumi.get(self, "token_max_ttl")
587
644
 
@@ -593,7 +650,8 @@ class _AuthBackendRoleState:
593
650
  @pulumi.getter(name="tokenNoDefaultPolicy")
594
651
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
595
652
  """
596
- If true, the 'default' policy will not automatically be added to generated tokens
653
+ If set, the default policy will not be set on
654
+ generated tokens; otherwise it will be added to the policies set in token_policies.
597
655
  """
598
656
  return pulumi.get(self, "token_no_default_policy")
599
657
 
@@ -605,7 +663,8 @@ class _AuthBackendRoleState:
605
663
  @pulumi.getter(name="tokenNumUses")
606
664
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
607
665
  """
608
- The maximum number of times a token may be used, a value of zero means unlimited
666
+ The [maximum number](https://www.vaultproject.io/api-docs/azure#token_num_uses)
667
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
609
668
  """
610
669
  return pulumi.get(self, "token_num_uses")
611
670
 
@@ -617,7 +676,10 @@ class _AuthBackendRoleState:
617
676
  @pulumi.getter(name="tokenPeriod")
618
677
  def token_period(self) -> Optional[pulumi.Input[int]]:
619
678
  """
620
- Generated Token's Period
679
+ If set, indicates that the
680
+ token generated using this role should never expire. The token should be renewed within the
681
+ duration specified by this value. At each renewal, the token's TTL will be set to the
682
+ value of this field. Specified in seconds.
621
683
  """
622
684
  return pulumi.get(self, "token_period")
623
685
 
@@ -629,7 +691,8 @@ class _AuthBackendRoleState:
629
691
  @pulumi.getter(name="tokenPolicies")
630
692
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
631
693
  """
632
- Generated Token's Policies
694
+ List of policies to encode onto generated tokens. Depending
695
+ on the auth method, this list may be supplemented by user/group/other values.
633
696
  """
634
697
  return pulumi.get(self, "token_policies")
635
698
 
@@ -641,7 +704,8 @@ class _AuthBackendRoleState:
641
704
  @pulumi.getter(name="tokenTtl")
642
705
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
643
706
  """
644
- The initial ttl of the token to generate in seconds
707
+ The incremental lifetime for generated tokens in number of seconds.
708
+ Its current value will be referenced at renewal time.
645
709
  """
646
710
  return pulumi.get(self, "token_ttl")
647
711
 
@@ -653,7 +717,11 @@ class _AuthBackendRoleState:
653
717
  @pulumi.getter(name="tokenType")
654
718
  def token_type(self) -> Optional[pulumi.Input[str]]:
655
719
  """
656
- The type of token to generate, service or batch
720
+ The type of token that should be generated. Can be `service`,
721
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
722
+ `service` tokens). For token store roles, there are two additional possibilities:
723
+ `default-service` and `default-batch` which specify the type to return unless the client
724
+ requests a different type at generation time.
657
725
  """
658
726
  return pulumi.get(self, "token_type")
659
727
 
@@ -695,6 +763,7 @@ class AuthBackendRole(pulumi.CustomResource):
695
763
 
696
764
  ## Example Usage
697
765
 
766
+ <!--Start PulumiCodeChooser -->
698
767
  ```python
699
768
  import pulumi
700
769
  import pulumi_vault as vault
@@ -713,6 +782,7 @@ class AuthBackendRole(pulumi.CustomResource):
713
782
  "prod",
714
783
  ])
715
784
  ```
785
+ <!--End PulumiCodeChooser -->
716
786
 
717
787
  ## Import
718
788
 
@@ -748,15 +818,32 @@ class AuthBackendRole(pulumi.CustomResource):
748
818
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
749
819
  *Available only for Vault Enterprise*.
750
820
  :param pulumi.Input[str] role: The name of the role.
751
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
752
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
753
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
754
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
755
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
756
- :param pulumi.Input[int] token_period: Generated Token's Period
757
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
758
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
759
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
821
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
822
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
823
+ as well.
824
+ :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
825
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
826
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
827
+ `token_max_ttl` would otherwise allow a renewal.
828
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
829
+ Its current value will be referenced at renewal time.
830
+ :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
831
+ generated tokens; otherwise it will be added to the policies set in token_policies.
832
+ :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/azure#token_num_uses)
833
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
834
+ :param pulumi.Input[int] token_period: If set, indicates that the
835
+ token generated using this role should never expire. The token should be renewed within the
836
+ duration specified by this value. At each renewal, the token's TTL will be set to the
837
+ value of this field. Specified in seconds.
838
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
839
+ on the auth method, this list may be supplemented by user/group/other values.
840
+ :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
841
+ Its current value will be referenced at renewal time.
842
+ :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
843
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
844
+ `service` tokens). For token store roles, there are two additional possibilities:
845
+ `default-service` and `default-batch` which specify the type to return unless the client
846
+ requests a different type at generation time.
760
847
  """
761
848
  ...
762
849
  @overload
@@ -773,6 +860,7 @@ class AuthBackendRole(pulumi.CustomResource):
773
860
 
774
861
  ## Example Usage
775
862
 
863
+ <!--Start PulumiCodeChooser -->
776
864
  ```python
777
865
  import pulumi
778
866
  import pulumi_vault as vault
@@ -791,6 +879,7 @@ class AuthBackendRole(pulumi.CustomResource):
791
879
  "prod",
792
880
  ])
793
881
  ```
882
+ <!--End PulumiCodeChooser -->
794
883
 
795
884
  ## Import
796
885
 
@@ -921,15 +1010,32 @@ class AuthBackendRole(pulumi.CustomResource):
921
1010
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
922
1011
  *Available only for Vault Enterprise*.
923
1012
  :param pulumi.Input[str] role: The name of the role.
924
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
925
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
926
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
927
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
928
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
929
- :param pulumi.Input[int] token_period: Generated Token's Period
930
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
931
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
932
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
1013
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
1014
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
1015
+ as well.
1016
+ :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
1017
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1018
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1019
+ `token_max_ttl` would otherwise allow a renewal.
1020
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
1021
+ Its current value will be referenced at renewal time.
1022
+ :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
1023
+ generated tokens; otherwise it will be added to the policies set in token_policies.
1024
+ :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/azure#token_num_uses)
1025
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
1026
+ :param pulumi.Input[int] token_period: If set, indicates that the
1027
+ token generated using this role should never expire. The token should be renewed within the
1028
+ duration specified by this value. At each renewal, the token's TTL will be set to the
1029
+ value of this field. Specified in seconds.
1030
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
1031
+ on the auth method, this list may be supplemented by user/group/other values.
1032
+ :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
1033
+ Its current value will be referenced at renewal time.
1034
+ :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
1035
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
1036
+ `service` tokens). For token store roles, there are two additional possibilities:
1037
+ `default-service` and `default-batch` which specify the type to return unless the client
1038
+ requests a different type at generation time.
933
1039
  """
934
1040
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
935
1041
 
@@ -1046,7 +1152,9 @@ class AuthBackendRole(pulumi.CustomResource):
1046
1152
  @pulumi.getter(name="tokenBoundCidrs")
1047
1153
  def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
1048
1154
  """
1049
- Specifies the blocks of IP addresses which are allowed to use the generated token
1155
+ List of CIDR blocks; if set, specifies blocks of IP
1156
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
1157
+ as well.
1050
1158
  """
1051
1159
  return pulumi.get(self, "token_bound_cidrs")
1052
1160
 
@@ -1054,7 +1162,10 @@ class AuthBackendRole(pulumi.CustomResource):
1054
1162
  @pulumi.getter(name="tokenExplicitMaxTtl")
1055
1163
  def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
1056
1164
  """
1057
- Generated Token's Explicit Maximum TTL in seconds
1165
+ If set, will encode an
1166
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1167
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1168
+ `token_max_ttl` would otherwise allow a renewal.
1058
1169
  """
1059
1170
  return pulumi.get(self, "token_explicit_max_ttl")
1060
1171
 
@@ -1062,7 +1173,8 @@ class AuthBackendRole(pulumi.CustomResource):
1062
1173
  @pulumi.getter(name="tokenMaxTtl")
1063
1174
  def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
1064
1175
  """
1065
- The maximum lifetime of the generated token
1176
+ The maximum lifetime for generated tokens in number of seconds.
1177
+ Its current value will be referenced at renewal time.
1066
1178
  """
1067
1179
  return pulumi.get(self, "token_max_ttl")
1068
1180
 
@@ -1070,7 +1182,8 @@ class AuthBackendRole(pulumi.CustomResource):
1070
1182
  @pulumi.getter(name="tokenNoDefaultPolicy")
1071
1183
  def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
1072
1184
  """
1073
- If true, the 'default' policy will not automatically be added to generated tokens
1185
+ If set, the default policy will not be set on
1186
+ generated tokens; otherwise it will be added to the policies set in token_policies.
1074
1187
  """
1075
1188
  return pulumi.get(self, "token_no_default_policy")
1076
1189
 
@@ -1078,7 +1191,8 @@ class AuthBackendRole(pulumi.CustomResource):
1078
1191
  @pulumi.getter(name="tokenNumUses")
1079
1192
  def token_num_uses(self) -> pulumi.Output[Optional[int]]:
1080
1193
  """
1081
- The maximum number of times a token may be used, a value of zero means unlimited
1194
+ The [maximum number](https://www.vaultproject.io/api-docs/azure#token_num_uses)
1195
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
1082
1196
  """
1083
1197
  return pulumi.get(self, "token_num_uses")
1084
1198
 
@@ -1086,7 +1200,10 @@ class AuthBackendRole(pulumi.CustomResource):
1086
1200
  @pulumi.getter(name="tokenPeriod")
1087
1201
  def token_period(self) -> pulumi.Output[Optional[int]]:
1088
1202
  """
1089
- Generated Token's Period
1203
+ If set, indicates that the
1204
+ token generated using this role should never expire. The token should be renewed within the
1205
+ duration specified by this value. At each renewal, the token's TTL will be set to the
1206
+ value of this field. Specified in seconds.
1090
1207
  """
1091
1208
  return pulumi.get(self, "token_period")
1092
1209
 
@@ -1094,7 +1211,8 @@ class AuthBackendRole(pulumi.CustomResource):
1094
1211
  @pulumi.getter(name="tokenPolicies")
1095
1212
  def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
1096
1213
  """
1097
- Generated Token's Policies
1214
+ List of policies to encode onto generated tokens. Depending
1215
+ on the auth method, this list may be supplemented by user/group/other values.
1098
1216
  """
1099
1217
  return pulumi.get(self, "token_policies")
1100
1218
 
@@ -1102,7 +1220,8 @@ class AuthBackendRole(pulumi.CustomResource):
1102
1220
  @pulumi.getter(name="tokenTtl")
1103
1221
  def token_ttl(self) -> pulumi.Output[Optional[int]]:
1104
1222
  """
1105
- The initial ttl of the token to generate in seconds
1223
+ The incremental lifetime for generated tokens in number of seconds.
1224
+ Its current value will be referenced at renewal time.
1106
1225
  """
1107
1226
  return pulumi.get(self, "token_ttl")
1108
1227
 
@@ -1110,7 +1229,11 @@ class AuthBackendRole(pulumi.CustomResource):
1110
1229
  @pulumi.getter(name="tokenType")
1111
1230
  def token_type(self) -> pulumi.Output[Optional[str]]:
1112
1231
  """
1113
- The type of token to generate, service or batch
1232
+ The type of token that should be generated. Can be `service`,
1233
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
1234
+ `service` tokens). For token store roles, there are two additional possibilities:
1235
+ `default-service` and `default-batch` which specify the type to return unless the client
1236
+ requests a different type at generation time.
1114
1237
  """
1115
1238
  return pulumi.get(self, "token_type")
1116
1239