pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712731873__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (192) hide show
  1. pulumi_vault/__init__.py +0 -26
  2. pulumi_vault/_inputs.py +20 -0
  3. pulumi_vault/ad/secret_backend.py +6 -2
  4. pulumi_vault/ad/secret_library.py +4 -2
  5. pulumi_vault/ad/secret_role.py +4 -0
  6. pulumi_vault/alicloud/auth_backend_role.py +192 -69
  7. pulumi_vault/approle/auth_backend_login.py +4 -0
  8. pulumi_vault/approle/auth_backend_role.py +186 -63
  9. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  10. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  11. pulumi_vault/audit.py +20 -12
  12. pulumi_vault/audit_request_header.py +6 -6
  13. pulumi_vault/auth_backend.py +0 -47
  14. pulumi_vault/aws/auth_backend_client.py +17 -253
  15. pulumi_vault/aws/auth_backend_config_identity.py +4 -0
  16. pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
  17. pulumi_vault/aws/auth_backend_login.py +8 -0
  18. pulumi_vault/aws/auth_backend_role.py +186 -63
  19. pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
  20. pulumi_vault/aws/auth_backend_sts_role.py +4 -0
  21. pulumi_vault/aws/secret_backend_role.py +4 -56
  22. pulumi_vault/aws/secret_backend_static_role.py +4 -2
  23. pulumi_vault/azure/auth_backend_config.py +10 -139
  24. pulumi_vault/azure/auth_backend_role.py +186 -63
  25. pulumi_vault/azure/backend.py +22 -217
  26. pulumi_vault/azure/backend_role.py +18 -14
  27. pulumi_vault/azure/get_access_credentials.py +4 -0
  28. pulumi_vault/cert_auth_backend_role.py +208 -75
  29. pulumi_vault/consul/secret_backend.py +18 -10
  30. pulumi_vault/consul/secret_backend_role.py +4 -2
  31. pulumi_vault/database/_inputs.py +784 -522
  32. pulumi_vault/database/outputs.py +784 -522
  33. pulumi_vault/database/secret_backend_connection.py +4 -2
  34. pulumi_vault/database/secret_backend_role.py +4 -4
  35. pulumi_vault/database/secret_backend_static_role.py +8 -10
  36. pulumi_vault/database/secrets_mount.py +4 -286
  37. pulumi_vault/egp_policy.py +8 -4
  38. pulumi_vault/gcp/auth_backend.py +18 -226
  39. pulumi_vault/gcp/auth_backend_role.py +264 -63
  40. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  41. pulumi_vault/gcp/secret_backend.py +9 -275
  42. pulumi_vault/gcp/secret_impersonated_account.py +14 -12
  43. pulumi_vault/gcp/secret_roleset.py +6 -4
  44. pulumi_vault/gcp/secret_static_account.py +16 -14
  45. pulumi_vault/generic/endpoint.py +8 -4
  46. pulumi_vault/generic/get_secret.py +4 -40
  47. pulumi_vault/get_auth_backend.py +4 -0
  48. pulumi_vault/get_auth_backends.py +8 -0
  49. pulumi_vault/get_namespace.py +12 -0
  50. pulumi_vault/get_namespaces.py +12 -4
  51. pulumi_vault/get_nomad_access_token.py +4 -0
  52. pulumi_vault/get_policy_document.py +8 -8
  53. pulumi_vault/get_raft_autopilot_state.py +4 -0
  54. pulumi_vault/github/auth_backend.py +4 -0
  55. pulumi_vault/github/team.py +6 -2
  56. pulumi_vault/github/user.py +6 -2
  57. pulumi_vault/identity/entity.py +8 -6
  58. pulumi_vault/identity/entity_alias.py +8 -6
  59. pulumi_vault/identity/entity_policies.py +12 -12
  60. pulumi_vault/identity/get_entity.py +4 -0
  61. pulumi_vault/identity/get_group.py +4 -0
  62. pulumi_vault/identity/get_oidc_client_creds.py +4 -2
  63. pulumi_vault/identity/get_oidc_openid_config.py +6 -10
  64. pulumi_vault/identity/get_oidc_public_keys.py +6 -10
  65. pulumi_vault/identity/group.py +42 -38
  66. pulumi_vault/identity/group_alias.py +4 -2
  67. pulumi_vault/identity/group_member_entity_ids.py +16 -12
  68. pulumi_vault/identity/group_member_group_ids.py +20 -24
  69. pulumi_vault/identity/group_policies.py +8 -4
  70. pulumi_vault/identity/mfa_duo.py +8 -4
  71. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  72. pulumi_vault/identity/mfa_okta.py +8 -4
  73. pulumi_vault/identity/mfa_pingid.py +4 -0
  74. pulumi_vault/identity/mfa_totp.py +4 -0
  75. pulumi_vault/identity/oidc.py +4 -0
  76. pulumi_vault/identity/oidc_assignment.py +6 -10
  77. pulumi_vault/identity/oidc_client.py +10 -10
  78. pulumi_vault/identity/oidc_key.py +12 -16
  79. pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
  80. pulumi_vault/identity/oidc_provider.py +16 -22
  81. pulumi_vault/identity/oidc_role.py +20 -28
  82. pulumi_vault/identity/oidc_scope.py +8 -6
  83. pulumi_vault/jwt/auth_backend.py +32 -20
  84. pulumi_vault/jwt/auth_backend_role.py +225 -91
  85. pulumi_vault/kmip/secret_backend.py +14 -10
  86. pulumi_vault/kmip/secret_role.py +4 -0
  87. pulumi_vault/kmip/secret_scope.py +4 -0
  88. pulumi_vault/kubernetes/auth_backend_config.py +4 -0
  89. pulumi_vault/kubernetes/auth_backend_role.py +172 -56
  90. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  91. pulumi_vault/kubernetes/secret_backend.py +8 -288
  92. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  93. pulumi_vault/kv/get_secret.py +4 -0
  94. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
  95. pulumi_vault/kv/get_secret_v2.py +0 -58
  96. pulumi_vault/kv/get_secrets_list.py +8 -4
  97. pulumi_vault/kv/get_secrets_list_v2.py +12 -14
  98. pulumi_vault/kv/secret.py +4 -0
  99. pulumi_vault/kv/secret_backend_v2.py +4 -0
  100. pulumi_vault/kv/secret_v2.py +4 -2
  101. pulumi_vault/ldap/auth_backend.py +161 -66
  102. pulumi_vault/ldap/auth_backend_group.py +4 -0
  103. pulumi_vault/ldap/auth_backend_user.py +4 -0
  104. pulumi_vault/ldap/secret_backend.py +8 -286
  105. pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
  106. pulumi_vault/ldap/secret_backend_library_set.py +4 -2
  107. pulumi_vault/ldap/secret_backend_static_role.py +4 -0
  108. pulumi_vault/managed/_inputs.py +132 -84
  109. pulumi_vault/managed/keys.py +28 -7
  110. pulumi_vault/managed/outputs.py +132 -84
  111. pulumi_vault/mfa_duo.py +6 -4
  112. pulumi_vault/mfa_okta.py +6 -4
  113. pulumi_vault/mfa_pingid.py +6 -4
  114. pulumi_vault/mfa_totp.py +12 -10
  115. pulumi_vault/mongodbatlas/secret_backend.py +4 -0
  116. pulumi_vault/mongodbatlas/secret_role.py +4 -2
  117. pulumi_vault/mount.py +42 -350
  118. pulumi_vault/nomad_secret_backend.py +8 -4
  119. pulumi_vault/nomad_secret_role.py +4 -0
  120. pulumi_vault/okta/_inputs.py +8 -8
  121. pulumi_vault/okta/auth_backend.py +10 -459
  122. pulumi_vault/okta/auth_backend_group.py +4 -0
  123. pulumi_vault/okta/auth_backend_user.py +4 -0
  124. pulumi_vault/okta/outputs.py +8 -8
  125. pulumi_vault/outputs.py +20 -0
  126. pulumi_vault/password_policy.py +8 -6
  127. pulumi_vault/pkisecret/__init__.py +0 -2
  128. pulumi_vault/pkisecret/_inputs.py +0 -30
  129. pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
  130. pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
  131. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  132. pulumi_vault/pkisecret/get_backend_key.py +6 -2
  133. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  134. pulumi_vault/pkisecret/outputs.py +0 -54
  135. pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
  136. pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
  137. pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
  138. pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
  139. pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
  140. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
  141. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
  142. pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
  143. pulumi_vault/pkisecret/secret_backend_role.py +4 -2
  144. pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
  145. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
  146. pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
  147. pulumi_vault/provider.py +8 -0
  148. pulumi_vault/pulumi-plugin.json +1 -2
  149. pulumi_vault/quota_lease_count.py +8 -53
  150. pulumi_vault/quota_rate_limit.py +4 -49
  151. pulumi_vault/rabbitmq/secret_backend.py +8 -4
  152. pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
  153. pulumi_vault/raft_autopilot.py +4 -0
  154. pulumi_vault/raft_snapshot_agent_config.py +304 -109
  155. pulumi_vault/rgp_policy.py +6 -2
  156. pulumi_vault/saml/auth_backend.py +12 -8
  157. pulumi_vault/saml/auth_backend_role.py +178 -64
  158. pulumi_vault/secrets/sync_association.py +10 -12
  159. pulumi_vault/secrets/sync_aws_destination.py +8 -6
  160. pulumi_vault/secrets/sync_azure_destination.py +12 -10
  161. pulumi_vault/secrets/sync_config.py +6 -2
  162. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  163. pulumi_vault/secrets/sync_gh_destination.py +8 -6
  164. pulumi_vault/secrets/sync_github_apps.py +8 -8
  165. pulumi_vault/secrets/sync_vercel_destination.py +8 -6
  166. pulumi_vault/ssh/_inputs.py +32 -6
  167. pulumi_vault/ssh/outputs.py +32 -6
  168. pulumi_vault/ssh/secret_backend_ca.py +4 -94
  169. pulumi_vault/ssh/secret_backend_role.py +4 -4
  170. pulumi_vault/terraformcloud/secret_backend.py +56 -0
  171. pulumi_vault/terraformcloud/secret_creds.py +17 -2
  172. pulumi_vault/terraformcloud/secret_role.py +69 -2
  173. pulumi_vault/token.py +18 -14
  174. pulumi_vault/tokenauth/auth_backend_role.py +180 -64
  175. pulumi_vault/transform/alphabet.py +6 -4
  176. pulumi_vault/transform/get_decode.py +4 -4
  177. pulumi_vault/transform/get_encode.py +4 -4
  178. pulumi_vault/transform/role.py +6 -4
  179. pulumi_vault/transform/template.py +4 -4
  180. pulumi_vault/transit/get_decrypt.py +20 -4
  181. pulumi_vault/transit/get_encrypt.py +14 -0
  182. pulumi_vault/transit/secret_backend_key.py +6 -6
  183. pulumi_vault/transit/secret_cache_config.py +4 -0
  184. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712731873.dist-info}/METADATA +1 -1
  185. pulumi_vault-6.2.0a1712731873.dist-info/RECORD +252 -0
  186. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712731873.dist-info}/WHEEL +1 -1
  187. pulumi_vault/pkisecret/backend_config_est.py +0 -614
  188. pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
  189. pulumi_vault/plugin.py +0 -590
  190. pulumi_vault/plugin_pinned_version.py +0 -293
  191. pulumi_vault-6.2.0.dist-info/RECORD +0 -256
  192. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712731873.dist-info}/top_level.txt +0 -0
@@ -40,15 +40,32 @@ class AuthBackendRoleArgs:
40
40
  The value should not contain leading or trailing forward slashes.
41
41
  The `namespace` is always relative to the provider's configured namespace.
42
42
  *Available only for Vault Enterprise*.
43
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
44
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
45
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
46
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
47
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
48
- :param pulumi.Input[int] token_period: Generated Token's Period
49
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
50
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
51
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
43
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
44
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
45
+ as well.
46
+ :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
47
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
48
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
49
+ `token_max_ttl` would otherwise allow a renewal.
50
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
51
+ Its current value will be referenced at renewal time.
52
+ :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
53
+ generated tokens; otherwise it will be added to the policies set in token_policies.
54
+ :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
55
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
56
+ :param pulumi.Input[int] token_period: If set, indicates that the
57
+ token generated using this role should never expire. The token should be renewed within the
58
+ duration specified by this value. At each renewal, the token's TTL will be set to the
59
+ value of this field. Specified in seconds.
60
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
61
+ on the auth method, this list may be supplemented by user/group/other values.
62
+ :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
63
+ Its current value will be referenced at renewal time.
64
+ :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
65
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
66
+ `service` tokens). For token store roles, there are two additional possibilities:
67
+ `default-service` and `default-batch` which specify the type to return unless the client
68
+ requests a different type at generation time.
52
69
  """
53
70
  pulumi.set(__self__, "arn", arn)
54
71
  pulumi.set(__self__, "role", role)
@@ -134,7 +151,9 @@ class AuthBackendRoleArgs:
134
151
  @pulumi.getter(name="tokenBoundCidrs")
135
152
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
136
153
  """
137
- Specifies the blocks of IP addresses which are allowed to use the generated token
154
+ List of CIDR blocks; if set, specifies blocks of IP
155
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
156
+ as well.
138
157
  """
139
158
  return pulumi.get(self, "token_bound_cidrs")
140
159
 
@@ -146,7 +165,10 @@ class AuthBackendRoleArgs:
146
165
  @pulumi.getter(name="tokenExplicitMaxTtl")
147
166
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
148
167
  """
149
- Generated Token's Explicit Maximum TTL in seconds
168
+ If set, will encode an
169
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
170
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
171
+ `token_max_ttl` would otherwise allow a renewal.
150
172
  """
151
173
  return pulumi.get(self, "token_explicit_max_ttl")
152
174
 
@@ -158,7 +180,8 @@ class AuthBackendRoleArgs:
158
180
  @pulumi.getter(name="tokenMaxTtl")
159
181
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
160
182
  """
161
- The maximum lifetime of the generated token
183
+ The maximum lifetime for generated tokens in number of seconds.
184
+ Its current value will be referenced at renewal time.
162
185
  """
163
186
  return pulumi.get(self, "token_max_ttl")
164
187
 
@@ -170,7 +193,8 @@ class AuthBackendRoleArgs:
170
193
  @pulumi.getter(name="tokenNoDefaultPolicy")
171
194
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
172
195
  """
173
- If true, the 'default' policy will not automatically be added to generated tokens
196
+ If set, the default policy will not be set on
197
+ generated tokens; otherwise it will be added to the policies set in token_policies.
174
198
  """
175
199
  return pulumi.get(self, "token_no_default_policy")
176
200
 
@@ -182,7 +206,8 @@ class AuthBackendRoleArgs:
182
206
  @pulumi.getter(name="tokenNumUses")
183
207
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
184
208
  """
185
- The maximum number of times a token may be used, a value of zero means unlimited
209
+ The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
210
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
186
211
  """
187
212
  return pulumi.get(self, "token_num_uses")
188
213
 
@@ -194,7 +219,10 @@ class AuthBackendRoleArgs:
194
219
  @pulumi.getter(name="tokenPeriod")
195
220
  def token_period(self) -> Optional[pulumi.Input[int]]:
196
221
  """
197
- Generated Token's Period
222
+ If set, indicates that the
223
+ token generated using this role should never expire. The token should be renewed within the
224
+ duration specified by this value. At each renewal, the token's TTL will be set to the
225
+ value of this field. Specified in seconds.
198
226
  """
199
227
  return pulumi.get(self, "token_period")
200
228
 
@@ -206,7 +234,8 @@ class AuthBackendRoleArgs:
206
234
  @pulumi.getter(name="tokenPolicies")
207
235
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
208
236
  """
209
- Generated Token's Policies
237
+ List of policies to encode onto generated tokens. Depending
238
+ on the auth method, this list may be supplemented by user/group/other values.
210
239
  """
211
240
  return pulumi.get(self, "token_policies")
212
241
 
@@ -218,7 +247,8 @@ class AuthBackendRoleArgs:
218
247
  @pulumi.getter(name="tokenTtl")
219
248
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
220
249
  """
221
- The initial ttl of the token to generate in seconds
250
+ The incremental lifetime for generated tokens in number of seconds.
251
+ Its current value will be referenced at renewal time.
222
252
  """
223
253
  return pulumi.get(self, "token_ttl")
224
254
 
@@ -230,7 +260,11 @@ class AuthBackendRoleArgs:
230
260
  @pulumi.getter(name="tokenType")
231
261
  def token_type(self) -> Optional[pulumi.Input[str]]:
232
262
  """
233
- The type of token to generate, service or batch
263
+ The type of token that should be generated. Can be `service`,
264
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
265
+ `service` tokens). For token store roles, there are two additional possibilities:
266
+ `default-service` and `default-batch` which specify the type to return unless the client
267
+ requests a different type at generation time.
234
268
  """
235
269
  return pulumi.get(self, "token_type")
236
270
 
@@ -268,15 +302,32 @@ class _AuthBackendRoleState:
268
302
  *Available only for Vault Enterprise*.
269
303
  :param pulumi.Input[str] role: Name of the role. Must correspond with the name of
270
304
  the role reflected in the arn.
271
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
272
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
273
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
274
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
275
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
276
- :param pulumi.Input[int] token_period: Generated Token's Period
277
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
278
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
279
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
305
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
306
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
307
+ as well.
308
+ :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
309
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
310
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
311
+ `token_max_ttl` would otherwise allow a renewal.
312
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
313
+ Its current value will be referenced at renewal time.
314
+ :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
315
+ generated tokens; otherwise it will be added to the policies set in token_policies.
316
+ :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
317
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
318
+ :param pulumi.Input[int] token_period: If set, indicates that the
319
+ token generated using this role should never expire. The token should be renewed within the
320
+ duration specified by this value. At each renewal, the token's TTL will be set to the
321
+ value of this field. Specified in seconds.
322
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
323
+ on the auth method, this list may be supplemented by user/group/other values.
324
+ :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
325
+ Its current value will be referenced at renewal time.
326
+ :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
327
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
328
+ `service` tokens). For token store roles, there are two additional possibilities:
329
+ `default-service` and `default-batch` which specify the type to return unless the client
330
+ requests a different type at generation time.
280
331
  """
281
332
  if arn is not None:
282
333
  pulumi.set(__self__, "arn", arn)
@@ -364,7 +415,9 @@ class _AuthBackendRoleState:
364
415
  @pulumi.getter(name="tokenBoundCidrs")
365
416
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
366
417
  """
367
- Specifies the blocks of IP addresses which are allowed to use the generated token
418
+ List of CIDR blocks; if set, specifies blocks of IP
419
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
420
+ as well.
368
421
  """
369
422
  return pulumi.get(self, "token_bound_cidrs")
370
423
 
@@ -376,7 +429,10 @@ class _AuthBackendRoleState:
376
429
  @pulumi.getter(name="tokenExplicitMaxTtl")
377
430
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
378
431
  """
379
- Generated Token's Explicit Maximum TTL in seconds
432
+ If set, will encode an
433
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
434
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
435
+ `token_max_ttl` would otherwise allow a renewal.
380
436
  """
381
437
  return pulumi.get(self, "token_explicit_max_ttl")
382
438
 
@@ -388,7 +444,8 @@ class _AuthBackendRoleState:
388
444
  @pulumi.getter(name="tokenMaxTtl")
389
445
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
390
446
  """
391
- The maximum lifetime of the generated token
447
+ The maximum lifetime for generated tokens in number of seconds.
448
+ Its current value will be referenced at renewal time.
392
449
  """
393
450
  return pulumi.get(self, "token_max_ttl")
394
451
 
@@ -400,7 +457,8 @@ class _AuthBackendRoleState:
400
457
  @pulumi.getter(name="tokenNoDefaultPolicy")
401
458
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
402
459
  """
403
- If true, the 'default' policy will not automatically be added to generated tokens
460
+ If set, the default policy will not be set on
461
+ generated tokens; otherwise it will be added to the policies set in token_policies.
404
462
  """
405
463
  return pulumi.get(self, "token_no_default_policy")
406
464
 
@@ -412,7 +470,8 @@ class _AuthBackendRoleState:
412
470
  @pulumi.getter(name="tokenNumUses")
413
471
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
414
472
  """
415
- The maximum number of times a token may be used, a value of zero means unlimited
473
+ The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
474
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
416
475
  """
417
476
  return pulumi.get(self, "token_num_uses")
418
477
 
@@ -424,7 +483,10 @@ class _AuthBackendRoleState:
424
483
  @pulumi.getter(name="tokenPeriod")
425
484
  def token_period(self) -> Optional[pulumi.Input[int]]:
426
485
  """
427
- Generated Token's Period
486
+ If set, indicates that the
487
+ token generated using this role should never expire. The token should be renewed within the
488
+ duration specified by this value. At each renewal, the token's TTL will be set to the
489
+ value of this field. Specified in seconds.
428
490
  """
429
491
  return pulumi.get(self, "token_period")
430
492
 
@@ -436,7 +498,8 @@ class _AuthBackendRoleState:
436
498
  @pulumi.getter(name="tokenPolicies")
437
499
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
438
500
  """
439
- Generated Token's Policies
501
+ List of policies to encode onto generated tokens. Depending
502
+ on the auth method, this list may be supplemented by user/group/other values.
440
503
  """
441
504
  return pulumi.get(self, "token_policies")
442
505
 
@@ -448,7 +511,8 @@ class _AuthBackendRoleState:
448
511
  @pulumi.getter(name="tokenTtl")
449
512
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
450
513
  """
451
- The initial ttl of the token to generate in seconds
514
+ The incremental lifetime for generated tokens in number of seconds.
515
+ Its current value will be referenced at renewal time.
452
516
  """
453
517
  return pulumi.get(self, "token_ttl")
454
518
 
@@ -460,7 +524,11 @@ class _AuthBackendRoleState:
460
524
  @pulumi.getter(name="tokenType")
461
525
  def token_type(self) -> Optional[pulumi.Input[str]]:
462
526
  """
463
- The type of token to generate, service or batch
527
+ The type of token that should be generated. Can be `service`,
528
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
529
+ `service` tokens). For token store roles, there are two additional possibilities:
530
+ `default-service` and `default-batch` which specify the type to return unless the client
531
+ requests a different type at generation time.
464
532
  """
465
533
  return pulumi.get(self, "token_type")
466
534
 
@@ -493,18 +561,20 @@ class AuthBackendRole(pulumi.CustomResource):
493
561
 
494
562
  ## Example Usage
495
563
 
564
+ <!--Start PulumiCodeChooser -->
496
565
  ```python
497
566
  import pulumi
498
567
  import pulumi_vault as vault
499
568
 
500
- alicloud = vault.AuthBackend("alicloud",
569
+ alicloud_auth_backend = vault.AuthBackend("alicloudAuthBackend",
501
570
  type="alicloud",
502
571
  path="alicloud")
503
- alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("alicloud",
504
- backend=alicloud.path,
572
+ alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("alicloudAuthBackendRole",
573
+ backend=alicloud_auth_backend.path,
505
574
  role="example",
506
575
  arn="acs:ram:123456:tf:role/foobar")
507
576
  ```
577
+ <!--End PulumiCodeChooser -->
508
578
 
509
579
  ## Import
510
580
 
@@ -527,15 +597,32 @@ class AuthBackendRole(pulumi.CustomResource):
527
597
  *Available only for Vault Enterprise*.
528
598
  :param pulumi.Input[str] role: Name of the role. Must correspond with the name of
529
599
  the role reflected in the arn.
530
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
531
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
532
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
533
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
534
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
535
- :param pulumi.Input[int] token_period: Generated Token's Period
536
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
537
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
538
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
600
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
601
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
602
+ as well.
603
+ :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
604
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
605
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
606
+ `token_max_ttl` would otherwise allow a renewal.
607
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
608
+ Its current value will be referenced at renewal time.
609
+ :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
610
+ generated tokens; otherwise it will be added to the policies set in token_policies.
611
+ :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
612
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
613
+ :param pulumi.Input[int] token_period: If set, indicates that the
614
+ token generated using this role should never expire. The token should be renewed within the
615
+ duration specified by this value. At each renewal, the token's TTL will be set to the
616
+ value of this field. Specified in seconds.
617
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
618
+ on the auth method, this list may be supplemented by user/group/other values.
619
+ :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
620
+ Its current value will be referenced at renewal time.
621
+ :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
622
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
623
+ `service` tokens). For token store roles, there are two additional possibilities:
624
+ `default-service` and `default-batch` which specify the type to return unless the client
625
+ requests a different type at generation time.
539
626
  """
540
627
  ...
541
628
  @overload
@@ -548,18 +635,20 @@ class AuthBackendRole(pulumi.CustomResource):
548
635
 
549
636
  ## Example Usage
550
637
 
638
+ <!--Start PulumiCodeChooser -->
551
639
  ```python
552
640
  import pulumi
553
641
  import pulumi_vault as vault
554
642
 
555
- alicloud = vault.AuthBackend("alicloud",
643
+ alicloud_auth_backend = vault.AuthBackend("alicloudAuthBackend",
556
644
  type="alicloud",
557
645
  path="alicloud")
558
- alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("alicloud",
559
- backend=alicloud.path,
646
+ alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("alicloudAuthBackendRole",
647
+ backend=alicloud_auth_backend.path,
560
648
  role="example",
561
649
  arn="acs:ram:123456:tf:role/foobar")
562
650
  ```
651
+ <!--End PulumiCodeChooser -->
563
652
 
564
653
  ## Import
565
654
 
@@ -664,15 +753,32 @@ class AuthBackendRole(pulumi.CustomResource):
664
753
  *Available only for Vault Enterprise*.
665
754
  :param pulumi.Input[str] role: Name of the role. Must correspond with the name of
666
755
  the role reflected in the arn.
667
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
668
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
669
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
670
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
671
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
672
- :param pulumi.Input[int] token_period: Generated Token's Period
673
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
674
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
675
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
756
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
757
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
758
+ as well.
759
+ :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
760
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
761
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
762
+ `token_max_ttl` would otherwise allow a renewal.
763
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
764
+ Its current value will be referenced at renewal time.
765
+ :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
766
+ generated tokens; otherwise it will be added to the policies set in token_policies.
767
+ :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
768
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
769
+ :param pulumi.Input[int] token_period: If set, indicates that the
770
+ token generated using this role should never expire. The token should be renewed within the
771
+ duration specified by this value. At each renewal, the token's TTL will be set to the
772
+ value of this field. Specified in seconds.
773
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
774
+ on the auth method, this list may be supplemented by user/group/other values.
775
+ :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
776
+ Its current value will be referenced at renewal time.
777
+ :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
778
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
779
+ `service` tokens). For token store roles, there are two additional possibilities:
780
+ `default-service` and `default-batch` which specify the type to return unless the client
781
+ requests a different type at generation time.
676
782
  """
677
783
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
678
784
 
@@ -736,7 +842,9 @@ class AuthBackendRole(pulumi.CustomResource):
736
842
  @pulumi.getter(name="tokenBoundCidrs")
737
843
  def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
738
844
  """
739
- Specifies the blocks of IP addresses which are allowed to use the generated token
845
+ List of CIDR blocks; if set, specifies blocks of IP
846
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
847
+ as well.
740
848
  """
741
849
  return pulumi.get(self, "token_bound_cidrs")
742
850
 
@@ -744,7 +852,10 @@ class AuthBackendRole(pulumi.CustomResource):
744
852
  @pulumi.getter(name="tokenExplicitMaxTtl")
745
853
  def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
746
854
  """
747
- Generated Token's Explicit Maximum TTL in seconds
855
+ If set, will encode an
856
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
857
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
858
+ `token_max_ttl` would otherwise allow a renewal.
748
859
  """
749
860
  return pulumi.get(self, "token_explicit_max_ttl")
750
861
 
@@ -752,7 +863,8 @@ class AuthBackendRole(pulumi.CustomResource):
752
863
  @pulumi.getter(name="tokenMaxTtl")
753
864
  def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
754
865
  """
755
- The maximum lifetime of the generated token
866
+ The maximum lifetime for generated tokens in number of seconds.
867
+ Its current value will be referenced at renewal time.
756
868
  """
757
869
  return pulumi.get(self, "token_max_ttl")
758
870
 
@@ -760,7 +872,8 @@ class AuthBackendRole(pulumi.CustomResource):
760
872
  @pulumi.getter(name="tokenNoDefaultPolicy")
761
873
  def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
762
874
  """
763
- If true, the 'default' policy will not automatically be added to generated tokens
875
+ If set, the default policy will not be set on
876
+ generated tokens; otherwise it will be added to the policies set in token_policies.
764
877
  """
765
878
  return pulumi.get(self, "token_no_default_policy")
766
879
 
@@ -768,7 +881,8 @@ class AuthBackendRole(pulumi.CustomResource):
768
881
  @pulumi.getter(name="tokenNumUses")
769
882
  def token_num_uses(self) -> pulumi.Output[Optional[int]]:
770
883
  """
771
- The maximum number of times a token may be used, a value of zero means unlimited
884
+ The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
885
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
772
886
  """
773
887
  return pulumi.get(self, "token_num_uses")
774
888
 
@@ -776,7 +890,10 @@ class AuthBackendRole(pulumi.CustomResource):
776
890
  @pulumi.getter(name="tokenPeriod")
777
891
  def token_period(self) -> pulumi.Output[Optional[int]]:
778
892
  """
779
- Generated Token's Period
893
+ If set, indicates that the
894
+ token generated using this role should never expire. The token should be renewed within the
895
+ duration specified by this value. At each renewal, the token's TTL will be set to the
896
+ value of this field. Specified in seconds.
780
897
  """
781
898
  return pulumi.get(self, "token_period")
782
899
 
@@ -784,7 +901,8 @@ class AuthBackendRole(pulumi.CustomResource):
784
901
  @pulumi.getter(name="tokenPolicies")
785
902
  def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
786
903
  """
787
- Generated Token's Policies
904
+ List of policies to encode onto generated tokens. Depending
905
+ on the auth method, this list may be supplemented by user/group/other values.
788
906
  """
789
907
  return pulumi.get(self, "token_policies")
790
908
 
@@ -792,7 +910,8 @@ class AuthBackendRole(pulumi.CustomResource):
792
910
  @pulumi.getter(name="tokenTtl")
793
911
  def token_ttl(self) -> pulumi.Output[Optional[int]]:
794
912
  """
795
- The initial ttl of the token to generate in seconds
913
+ The incremental lifetime for generated tokens in number of seconds.
914
+ Its current value will be referenced at renewal time.
796
915
  """
797
916
  return pulumi.get(self, "token_ttl")
798
917
 
@@ -800,7 +919,11 @@ class AuthBackendRole(pulumi.CustomResource):
800
919
  @pulumi.getter(name="tokenType")
801
920
  def token_type(self) -> pulumi.Output[Optional[str]]:
802
921
  """
803
- The type of token to generate, service or batch
922
+ The type of token that should be generated. Can be `service`,
923
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
924
+ `service` tokens). For token store roles, there are two additional possibilities:
925
+ `default-service` and `default-batch` which specify the type to return unless the client
926
+ requests a different type at generation time.
804
927
  """
805
928
  return pulumi.get(self, "token_type")
806
929
 
@@ -299,6 +299,7 @@ class AuthBackendLogin(pulumi.CustomResource):
299
299
 
300
300
  ## Example Usage
301
301
 
302
+ <!--Start PulumiCodeChooser -->
302
303
  ```python
303
304
  import pulumi
304
305
  import pulumi_vault as vault
@@ -320,6 +321,7 @@ class AuthBackendLogin(pulumi.CustomResource):
320
321
  role_id=example.role_id,
321
322
  secret_id=id.secret_id)
322
323
  ```
324
+ <!--End PulumiCodeChooser -->
323
325
 
324
326
  :param str resource_name: The name of the resource.
325
327
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -345,6 +347,7 @@ class AuthBackendLogin(pulumi.CustomResource):
345
347
 
346
348
  ## Example Usage
347
349
 
350
+ <!--Start PulumiCodeChooser -->
348
351
  ```python
349
352
  import pulumi
350
353
  import pulumi_vault as vault
@@ -366,6 +369,7 @@ class AuthBackendLogin(pulumi.CustomResource):
366
369
  role_id=example.role_id,
367
370
  secret_id=id.secret_id)
368
371
  ```
372
+ <!--End PulumiCodeChooser -->
369
373
 
370
374
  :param str resource_name: The name of the resource.
371
375
  :param AuthBackendLoginArgs args: The arguments to use to populate this resource's properties.