pulumi-vault 6.2.0a1713339773__py3-none-any.whl → 6.2.0a1713905519__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (180) hide show
  1. pulumi_vault/_inputs.py +0 -20
  2. pulumi_vault/ad/secret_backend.py +2 -6
  3. pulumi_vault/ad/secret_library.py +2 -4
  4. pulumi_vault/ad/secret_role.py +0 -4
  5. pulumi_vault/alicloud/auth_backend_role.py +69 -192
  6. pulumi_vault/approle/auth_backend_login.py +0 -4
  7. pulumi_vault/approle/auth_backend_role.py +63 -186
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
  9. pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
  10. pulumi_vault/audit.py +12 -20
  11. pulumi_vault/audit_request_header.py +6 -6
  12. pulumi_vault/aws/auth_backend_client.py +6 -10
  13. pulumi_vault/aws/auth_backend_config_identity.py +0 -4
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -10
  15. pulumi_vault/aws/auth_backend_role.py +63 -186
  16. pulumi_vault/aws/auth_backend_roletag_blacklist.py +6 -10
  17. pulumi_vault/aws/auth_backend_sts_role.py +0 -4
  18. pulumi_vault/aws/secret_backend_role.py +2 -4
  19. pulumi_vault/aws/secret_backend_static_role.py +2 -4
  20. pulumi_vault/azure/auth_backend_config.py +6 -10
  21. pulumi_vault/azure/auth_backend_role.py +63 -186
  22. pulumi_vault/azure/backend.py +16 -24
  23. pulumi_vault/azure/backend_role.py +14 -18
  24. pulumi_vault/azure/get_access_credentials.py +0 -4
  25. pulumi_vault/cert_auth_backend_role.py +75 -208
  26. pulumi_vault/consul/secret_backend.py +10 -18
  27. pulumi_vault/consul/secret_backend_role.py +2 -4
  28. pulumi_vault/database/_inputs.py +522 -784
  29. pulumi_vault/database/outputs.py +522 -784
  30. pulumi_vault/database/secret_backend_connection.py +2 -4
  31. pulumi_vault/database/secret_backend_role.py +4 -4
  32. pulumi_vault/database/secret_backend_static_role.py +10 -8
  33. pulumi_vault/database/secrets_mount.py +4 -4
  34. pulumi_vault/egp_policy.py +4 -8
  35. pulumi_vault/gcp/auth_backend.py +0 -36
  36. pulumi_vault/gcp/auth_backend_role.py +63 -264
  37. pulumi_vault/gcp/get_auth_backend_role.py +0 -4
  38. pulumi_vault/gcp/secret_backend.py +4 -6
  39. pulumi_vault/gcp/secret_impersonated_account.py +12 -14
  40. pulumi_vault/gcp/secret_roleset.py +4 -6
  41. pulumi_vault/gcp/secret_static_account.py +14 -16
  42. pulumi_vault/generic/endpoint.py +4 -8
  43. pulumi_vault/generic/get_secret.py +40 -4
  44. pulumi_vault/get_auth_backend.py +0 -4
  45. pulumi_vault/get_auth_backends.py +0 -8
  46. pulumi_vault/get_namespace.py +0 -12
  47. pulumi_vault/get_namespaces.py +4 -12
  48. pulumi_vault/get_nomad_access_token.py +0 -4
  49. pulumi_vault/get_policy_document.py +8 -8
  50. pulumi_vault/get_raft_autopilot_state.py +0 -4
  51. pulumi_vault/github/auth_backend.py +0 -4
  52. pulumi_vault/github/team.py +2 -6
  53. pulumi_vault/github/user.py +2 -6
  54. pulumi_vault/identity/entity.py +6 -8
  55. pulumi_vault/identity/entity_alias.py +6 -8
  56. pulumi_vault/identity/entity_policies.py +12 -12
  57. pulumi_vault/identity/get_entity.py +0 -4
  58. pulumi_vault/identity/get_group.py +0 -4
  59. pulumi_vault/identity/get_oidc_client_creds.py +2 -4
  60. pulumi_vault/identity/get_oidc_openid_config.py +10 -6
  61. pulumi_vault/identity/get_oidc_public_keys.py +10 -6
  62. pulumi_vault/identity/group.py +38 -42
  63. pulumi_vault/identity/group_alias.py +2 -4
  64. pulumi_vault/identity/group_member_entity_ids.py +12 -16
  65. pulumi_vault/identity/group_member_group_ids.py +24 -20
  66. pulumi_vault/identity/group_policies.py +4 -8
  67. pulumi_vault/identity/mfa_duo.py +4 -8
  68. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  69. pulumi_vault/identity/mfa_okta.py +4 -8
  70. pulumi_vault/identity/mfa_pingid.py +0 -4
  71. pulumi_vault/identity/mfa_totp.py +0 -4
  72. pulumi_vault/identity/oidc.py +0 -4
  73. pulumi_vault/identity/oidc_assignment.py +10 -6
  74. pulumi_vault/identity/oidc_client.py +10 -10
  75. pulumi_vault/identity/oidc_key.py +16 -12
  76. pulumi_vault/identity/oidc_key_allowed_client_id.py +16 -12
  77. pulumi_vault/identity/oidc_provider.py +22 -16
  78. pulumi_vault/identity/oidc_role.py +28 -20
  79. pulumi_vault/identity/oidc_scope.py +6 -8
  80. pulumi_vault/jwt/auth_backend.py +20 -32
  81. pulumi_vault/jwt/auth_backend_role.py +63 -190
  82. pulumi_vault/kmip/secret_backend.py +10 -14
  83. pulumi_vault/kmip/secret_role.py +0 -4
  84. pulumi_vault/kmip/secret_scope.py +0 -4
  85. pulumi_vault/kubernetes/auth_backend_config.py +0 -4
  86. pulumi_vault/kubernetes/auth_backend_role.py +56 -172
  87. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  88. pulumi_vault/kubernetes/secret_backend.py +6 -8
  89. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  90. pulumi_vault/kv/get_secret.py +0 -4
  91. pulumi_vault/kv/get_secret_subkeys_v2.py +4 -6
  92. pulumi_vault/kv/get_secret_v2.py +58 -0
  93. pulumi_vault/kv/get_secrets_list.py +4 -8
  94. pulumi_vault/kv/get_secrets_list_v2.py +14 -12
  95. pulumi_vault/kv/secret.py +0 -4
  96. pulumi_vault/kv/secret_backend_v2.py +0 -4
  97. pulumi_vault/kv/secret_v2.py +2 -4
  98. pulumi_vault/ldap/auth_backend.py +66 -161
  99. pulumi_vault/ldap/auth_backend_group.py +0 -4
  100. pulumi_vault/ldap/auth_backend_user.py +0 -4
  101. pulumi_vault/ldap/secret_backend.py +4 -8
  102. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
  103. pulumi_vault/ldap/secret_backend_library_set.py +2 -4
  104. pulumi_vault/ldap/secret_backend_static_role.py +0 -4
  105. pulumi_vault/managed/_inputs.py +84 -132
  106. pulumi_vault/managed/keys.py +7 -28
  107. pulumi_vault/managed/outputs.py +84 -132
  108. pulumi_vault/mfa_duo.py +4 -6
  109. pulumi_vault/mfa_okta.py +4 -6
  110. pulumi_vault/mfa_pingid.py +4 -6
  111. pulumi_vault/mfa_totp.py +10 -12
  112. pulumi_vault/mongodbatlas/secret_backend.py +0 -4
  113. pulumi_vault/mongodbatlas/secret_role.py +2 -4
  114. pulumi_vault/mount.py +26 -42
  115. pulumi_vault/nomad_secret_backend.py +4 -8
  116. pulumi_vault/nomad_secret_role.py +0 -4
  117. pulumi_vault/okta/_inputs.py +8 -8
  118. pulumi_vault/okta/auth_backend.py +6 -10
  119. pulumi_vault/okta/auth_backend_group.py +0 -4
  120. pulumi_vault/okta/auth_backend_user.py +0 -4
  121. pulumi_vault/okta/outputs.py +8 -8
  122. pulumi_vault/outputs.py +0 -20
  123. pulumi_vault/password_policy.py +6 -8
  124. pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
  125. pulumi_vault/pkisecret/get_backend_issuer.py +36 -0
  126. pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
  127. pulumi_vault/pkisecret/get_backend_key.py +2 -6
  128. pulumi_vault/pkisecret/get_backend_keys.py +0 -4
  129. pulumi_vault/pkisecret/secret_backend_cert.py +6 -8
  130. pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -8
  131. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
  132. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
  133. pulumi_vault/pkisecret/secret_backend_crl_config.py +2 -6
  134. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -8
  135. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +10 -14
  136. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
  137. pulumi_vault/pkisecret/secret_backend_role.py +2 -4
  138. pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -8
  139. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -10
  140. pulumi_vault/pkisecret/secret_backend_sign.py +6 -8
  141. pulumi_vault/quota_lease_count.py +6 -8
  142. pulumi_vault/quota_rate_limit.py +2 -4
  143. pulumi_vault/rabbitmq/secret_backend.py +4 -8
  144. pulumi_vault/rabbitmq/secret_backend_role.py +2 -4
  145. pulumi_vault/raft_autopilot.py +0 -4
  146. pulumi_vault/raft_snapshot_agent_config.py +109 -304
  147. pulumi_vault/rgp_policy.py +2 -6
  148. pulumi_vault/saml/auth_backend.py +8 -12
  149. pulumi_vault/saml/auth_backend_role.py +64 -178
  150. pulumi_vault/secrets/sync_association.py +12 -10
  151. pulumi_vault/secrets/sync_aws_destination.py +6 -8
  152. pulumi_vault/secrets/sync_azure_destination.py +10 -12
  153. pulumi_vault/secrets/sync_config.py +2 -6
  154. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  155. pulumi_vault/secrets/sync_gh_destination.py +6 -8
  156. pulumi_vault/secrets/sync_github_apps.py +8 -8
  157. pulumi_vault/secrets/sync_vercel_destination.py +6 -8
  158. pulumi_vault/ssh/_inputs.py +6 -32
  159. pulumi_vault/ssh/outputs.py +6 -32
  160. pulumi_vault/ssh/secret_backend_ca.py +0 -4
  161. pulumi_vault/ssh/secret_backend_role.py +4 -4
  162. pulumi_vault/terraformcloud/secret_backend.py +0 -4
  163. pulumi_vault/terraformcloud/secret_creds.py +2 -4
  164. pulumi_vault/terraformcloud/secret_role.py +2 -4
  165. pulumi_vault/token.py +14 -18
  166. pulumi_vault/tokenauth/auth_backend_role.py +64 -180
  167. pulumi_vault/transform/alphabet.py +4 -6
  168. pulumi_vault/transform/get_decode.py +4 -4
  169. pulumi_vault/transform/get_encode.py +4 -4
  170. pulumi_vault/transform/role.py +4 -6
  171. pulumi_vault/transform/template.py +4 -4
  172. pulumi_vault/transit/get_decrypt.py +4 -20
  173. pulumi_vault/transit/get_encrypt.py +0 -14
  174. pulumi_vault/transit/secret_backend_key.py +6 -6
  175. pulumi_vault/transit/secret_cache_config.py +0 -4
  176. {pulumi_vault-6.2.0a1713339773.dist-info → pulumi_vault-6.2.0a1713905519.dist-info}/METADATA +1 -1
  177. pulumi_vault-6.2.0a1713905519.dist-info/RECORD +252 -0
  178. pulumi_vault-6.2.0a1713339773.dist-info/RECORD +0 -252
  179. {pulumi_vault-6.2.0a1713339773.dist-info → pulumi_vault-6.2.0a1713905519.dist-info}/WHEEL +0 -0
  180. {pulumi_vault-6.2.0a1713339773.dist-info → pulumi_vault-6.2.0a1713905519.dist-info}/top_level.txt +0 -0
@@ -231,7 +231,6 @@ class SecretCreds(pulumi.CustomResource):
231
231
  """
232
232
  ## Example Usage
233
233
 
234
- <!--Start PulumiCodeChooser -->
235
234
  ```python
236
235
  import pulumi
237
236
  import pulumi_vault as vault
@@ -242,13 +241,13 @@ class SecretCreds(pulumi.CustomResource):
242
241
  token="V0idfhi2iksSDU234ucdbi2nidsi...")
243
242
  example = vault.terraformcloud.SecretRole("example",
244
243
  backend=test.backend,
244
+ name="test-role",
245
245
  organization="example-organization-name",
246
246
  team_id="team-ieF4isC...")
247
247
  token = vault.terraformcloud.SecretCreds("token",
248
248
  backend=test.backend,
249
249
  role=example.name)
250
250
  ```
251
- <!--End PulumiCodeChooser -->
252
251
 
253
252
  :param str resource_name: The name of the resource.
254
253
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -268,7 +267,6 @@ class SecretCreds(pulumi.CustomResource):
268
267
  """
269
268
  ## Example Usage
270
269
 
271
- <!--Start PulumiCodeChooser -->
272
270
  ```python
273
271
  import pulumi
274
272
  import pulumi_vault as vault
@@ -279,13 +277,13 @@ class SecretCreds(pulumi.CustomResource):
279
277
  token="V0idfhi2iksSDU234ucdbi2nidsi...")
280
278
  example = vault.terraformcloud.SecretRole("example",
281
279
  backend=test.backend,
280
+ name="test-role",
282
281
  organization="example-organization-name",
283
282
  team_id="team-ieF4isC...")
284
283
  token = vault.terraformcloud.SecretCreds("token",
285
284
  backend=test.backend,
286
285
  role=example.name)
287
286
  ```
288
- <!--End PulumiCodeChooser -->
289
287
 
290
288
  :param str resource_name: The name of the resource.
291
289
  :param SecretCredsArgs args: The arguments to use to populate this resource's properties.
@@ -312,7 +312,6 @@ class SecretRole(pulumi.CustomResource):
312
312
  """
313
313
  ## Example Usage
314
314
 
315
- <!--Start PulumiCodeChooser -->
316
315
  ```python
317
316
  import pulumi
318
317
  import pulumi_vault as vault
@@ -323,10 +322,10 @@ class SecretRole(pulumi.CustomResource):
323
322
  token="V0idfhi2iksSDU234ucdbi2nidsi...")
324
323
  example = vault.terraformcloud.SecretRole("example",
325
324
  backend=test.backend,
325
+ name="test-role",
326
326
  organization="example-organization-name",
327
327
  team_id="team-ieF4isC...")
328
328
  ```
329
- <!--End PulumiCodeChooser -->
330
329
 
331
330
  ## Import
332
331
 
@@ -359,7 +358,6 @@ class SecretRole(pulumi.CustomResource):
359
358
  """
360
359
  ## Example Usage
361
360
 
362
- <!--Start PulumiCodeChooser -->
363
361
  ```python
364
362
  import pulumi
365
363
  import pulumi_vault as vault
@@ -370,10 +368,10 @@ class SecretRole(pulumi.CustomResource):
370
368
  token="V0idfhi2iksSDU234ucdbi2nidsi...")
371
369
  example = vault.terraformcloud.SecretRole("example",
372
370
  backend=test.backend,
371
+ name="test-role",
373
372
  organization="example-organization-name",
374
373
  team_id="team-ieF4isC...")
375
374
  ```
376
- <!--End PulumiCodeChooser -->
377
375
 
378
376
  ## Import
379
377
 
pulumi_vault/token.py CHANGED
@@ -623,26 +623,24 @@ class Token(pulumi.CustomResource):
623
623
  """
624
624
  ## Example Usage
625
625
 
626
- <!--Start PulumiCodeChooser -->
627
626
  ```python
628
627
  import pulumi
629
628
  import pulumi_vault as vault
630
629
 
631
630
  example = vault.Token("example",
632
- metadata={
633
- "purpose": "service-account",
634
- },
631
+ role_name="app",
635
632
  policies=[
636
633
  "policy1",
637
634
  "policy2",
638
635
  ],
639
- renew_increment=86400,
640
- renew_min_lease=43200,
641
636
  renewable=True,
642
- role_name="app",
643
- ttl="24h")
637
+ ttl="24h",
638
+ renew_min_lease=43200,
639
+ renew_increment=86400,
640
+ metadata={
641
+ "purpose": "service-account",
642
+ })
644
643
  ```
645
- <!--End PulumiCodeChooser -->
646
644
 
647
645
  ## Import
648
646
 
@@ -682,26 +680,24 @@ class Token(pulumi.CustomResource):
682
680
  """
683
681
  ## Example Usage
684
682
 
685
- <!--Start PulumiCodeChooser -->
686
683
  ```python
687
684
  import pulumi
688
685
  import pulumi_vault as vault
689
686
 
690
687
  example = vault.Token("example",
691
- metadata={
692
- "purpose": "service-account",
693
- },
688
+ role_name="app",
694
689
  policies=[
695
690
  "policy1",
696
691
  "policy2",
697
692
  ],
698
- renew_increment=86400,
699
- renew_min_lease=43200,
700
693
  renewable=True,
701
- role_name="app",
702
- ttl="24h")
694
+ ttl="24h",
695
+ renew_min_lease=43200,
696
+ renew_increment=86400,
697
+ metadata={
698
+ "purpose": "service-account",
699
+ })
703
700
  ```
704
- <!--End PulumiCodeChooser -->
705
701
 
706
702
  ## Import
707
703
 
@@ -50,31 +50,15 @@ class AuthBackendRoleArgs:
50
50
 
51
51
  > Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
52
52
  :param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
53
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
54
- addresses which can authenticate successfully, and ties the resulting token to these blocks
55
- as well.
56
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
57
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
58
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
59
- `token_max_ttl` would otherwise allow a renewal.
60
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
61
- Its current value will be referenced at renewal time.
62
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
63
- generated tokens; otherwise it will be added to the policies set in token_policies.
64
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/token#token_num_uses)
65
- of times a generated token may be used (within its lifetime); 0 means unlimited.
66
- :param pulumi.Input[int] token_period: If set, indicates that the
67
- token generated using this role should never expire. The token should be renewed within the
68
- duration specified by this value. At each renewal, the token's TTL will be set to the
69
- value of this field. Specified in seconds.
53
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
54
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
55
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
56
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
57
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
58
+ :param pulumi.Input[int] token_period: Generated Token's Period
70
59
  :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
71
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
72
- Its current value will be referenced at renewal time.
73
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
74
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
75
- `service` tokens). For token store roles, there are two additional possibilities:
76
- `default-service` and `default-batch` which specify the type to return unless the client
77
- requests a different type at generation time.
60
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
61
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
78
62
  """
79
63
  pulumi.set(__self__, "role_name", role_name)
80
64
  if allowed_entity_aliases is not None:
@@ -243,9 +227,7 @@ class AuthBackendRoleArgs:
243
227
  @pulumi.getter(name="tokenBoundCidrs")
244
228
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
245
229
  """
246
- List of CIDR blocks; if set, specifies blocks of IP
247
- addresses which can authenticate successfully, and ties the resulting token to these blocks
248
- as well.
230
+ Specifies the blocks of IP addresses which are allowed to use the generated token
249
231
  """
250
232
  return pulumi.get(self, "token_bound_cidrs")
251
233
 
@@ -257,10 +239,7 @@ class AuthBackendRoleArgs:
257
239
  @pulumi.getter(name="tokenExplicitMaxTtl")
258
240
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
259
241
  """
260
- If set, will encode an
261
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
262
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
263
- `token_max_ttl` would otherwise allow a renewal.
242
+ Generated Token's Explicit Maximum TTL in seconds
264
243
  """
265
244
  return pulumi.get(self, "token_explicit_max_ttl")
266
245
 
@@ -272,8 +251,7 @@ class AuthBackendRoleArgs:
272
251
  @pulumi.getter(name="tokenMaxTtl")
273
252
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
274
253
  """
275
- The maximum lifetime for generated tokens in number of seconds.
276
- Its current value will be referenced at renewal time.
254
+ The maximum lifetime of the generated token
277
255
  """
278
256
  return pulumi.get(self, "token_max_ttl")
279
257
 
@@ -285,8 +263,7 @@ class AuthBackendRoleArgs:
285
263
  @pulumi.getter(name="tokenNoDefaultPolicy")
286
264
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
287
265
  """
288
- If set, the default policy will not be set on
289
- generated tokens; otherwise it will be added to the policies set in token_policies.
266
+ If true, the 'default' policy will not automatically be added to generated tokens
290
267
  """
291
268
  return pulumi.get(self, "token_no_default_policy")
292
269
 
@@ -298,8 +275,7 @@ class AuthBackendRoleArgs:
298
275
  @pulumi.getter(name="tokenNumUses")
299
276
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
300
277
  """
301
- The [maximum number](https://www.vaultproject.io/api-docs/token#token_num_uses)
302
- of times a generated token may be used (within its lifetime); 0 means unlimited.
278
+ The maximum number of times a token may be used, a value of zero means unlimited
303
279
  """
304
280
  return pulumi.get(self, "token_num_uses")
305
281
 
@@ -311,10 +287,7 @@ class AuthBackendRoleArgs:
311
287
  @pulumi.getter(name="tokenPeriod")
312
288
  def token_period(self) -> Optional[pulumi.Input[int]]:
313
289
  """
314
- If set, indicates that the
315
- token generated using this role should never expire. The token should be renewed within the
316
- duration specified by this value. At each renewal, the token's TTL will be set to the
317
- value of this field. Specified in seconds.
290
+ Generated Token's Period
318
291
  """
319
292
  return pulumi.get(self, "token_period")
320
293
 
@@ -338,8 +311,7 @@ class AuthBackendRoleArgs:
338
311
  @pulumi.getter(name="tokenTtl")
339
312
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
340
313
  """
341
- The incremental lifetime for generated tokens in number of seconds.
342
- Its current value will be referenced at renewal time.
314
+ The initial ttl of the token to generate in seconds
343
315
  """
344
316
  return pulumi.get(self, "token_ttl")
345
317
 
@@ -351,11 +323,7 @@ class AuthBackendRoleArgs:
351
323
  @pulumi.getter(name="tokenType")
352
324
  def token_type(self) -> Optional[pulumi.Input[str]]:
353
325
  """
354
- The type of token that should be generated. Can be `service`,
355
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
356
- `service` tokens). For token store roles, there are two additional possibilities:
357
- `default-service` and `default-batch` which specify the type to return unless the client
358
- requests a different type at generation time.
326
+ The type of token to generate, service or batch
359
327
  """
360
328
  return pulumi.get(self, "token_type")
361
329
 
@@ -403,31 +371,15 @@ class _AuthBackendRoleState:
403
371
  > Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
404
372
  :param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
405
373
  :param pulumi.Input[str] role_name: The name of the role.
406
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
407
- addresses which can authenticate successfully, and ties the resulting token to these blocks
408
- as well.
409
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
410
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
411
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
412
- `token_max_ttl` would otherwise allow a renewal.
413
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
414
- Its current value will be referenced at renewal time.
415
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
416
- generated tokens; otherwise it will be added to the policies set in token_policies.
417
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/token#token_num_uses)
418
- of times a generated token may be used (within its lifetime); 0 means unlimited.
419
- :param pulumi.Input[int] token_period: If set, indicates that the
420
- token generated using this role should never expire. The token should be renewed within the
421
- duration specified by this value. At each renewal, the token's TTL will be set to the
422
- value of this field. Specified in seconds.
374
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
375
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
376
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
377
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
378
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
379
+ :param pulumi.Input[int] token_period: Generated Token's Period
423
380
  :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
424
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
425
- Its current value will be referenced at renewal time.
426
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
427
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
428
- `service` tokens). For token store roles, there are two additional possibilities:
429
- `default-service` and `default-batch` which specify the type to return unless the client
430
- requests a different type at generation time.
381
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
382
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
431
383
  """
432
384
  if allowed_entity_aliases is not None:
433
385
  pulumi.set(__self__, "allowed_entity_aliases", allowed_entity_aliases)
@@ -597,9 +549,7 @@ class _AuthBackendRoleState:
597
549
  @pulumi.getter(name="tokenBoundCidrs")
598
550
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
599
551
  """
600
- List of CIDR blocks; if set, specifies blocks of IP
601
- addresses which can authenticate successfully, and ties the resulting token to these blocks
602
- as well.
552
+ Specifies the blocks of IP addresses which are allowed to use the generated token
603
553
  """
604
554
  return pulumi.get(self, "token_bound_cidrs")
605
555
 
@@ -611,10 +561,7 @@ class _AuthBackendRoleState:
611
561
  @pulumi.getter(name="tokenExplicitMaxTtl")
612
562
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
613
563
  """
614
- If set, will encode an
615
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
616
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
617
- `token_max_ttl` would otherwise allow a renewal.
564
+ Generated Token's Explicit Maximum TTL in seconds
618
565
  """
619
566
  return pulumi.get(self, "token_explicit_max_ttl")
620
567
 
@@ -626,8 +573,7 @@ class _AuthBackendRoleState:
626
573
  @pulumi.getter(name="tokenMaxTtl")
627
574
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
628
575
  """
629
- The maximum lifetime for generated tokens in number of seconds.
630
- Its current value will be referenced at renewal time.
576
+ The maximum lifetime of the generated token
631
577
  """
632
578
  return pulumi.get(self, "token_max_ttl")
633
579
 
@@ -639,8 +585,7 @@ class _AuthBackendRoleState:
639
585
  @pulumi.getter(name="tokenNoDefaultPolicy")
640
586
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
641
587
  """
642
- If set, the default policy will not be set on
643
- generated tokens; otherwise it will be added to the policies set in token_policies.
588
+ If true, the 'default' policy will not automatically be added to generated tokens
644
589
  """
645
590
  return pulumi.get(self, "token_no_default_policy")
646
591
 
@@ -652,8 +597,7 @@ class _AuthBackendRoleState:
652
597
  @pulumi.getter(name="tokenNumUses")
653
598
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
654
599
  """
655
- The [maximum number](https://www.vaultproject.io/api-docs/token#token_num_uses)
656
- of times a generated token may be used (within its lifetime); 0 means unlimited.
600
+ The maximum number of times a token may be used, a value of zero means unlimited
657
601
  """
658
602
  return pulumi.get(self, "token_num_uses")
659
603
 
@@ -665,10 +609,7 @@ class _AuthBackendRoleState:
665
609
  @pulumi.getter(name="tokenPeriod")
666
610
  def token_period(self) -> Optional[pulumi.Input[int]]:
667
611
  """
668
- If set, indicates that the
669
- token generated using this role should never expire. The token should be renewed within the
670
- duration specified by this value. At each renewal, the token's TTL will be set to the
671
- value of this field. Specified in seconds.
612
+ Generated Token's Period
672
613
  """
673
614
  return pulumi.get(self, "token_period")
674
615
 
@@ -692,8 +633,7 @@ class _AuthBackendRoleState:
692
633
  @pulumi.getter(name="tokenTtl")
693
634
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
694
635
  """
695
- The incremental lifetime for generated tokens in number of seconds.
696
- Its current value will be referenced at renewal time.
636
+ The initial ttl of the token to generate in seconds
697
637
  """
698
638
  return pulumi.get(self, "token_ttl")
699
639
 
@@ -705,11 +645,7 @@ class _AuthBackendRoleState:
705
645
  @pulumi.getter(name="tokenType")
706
646
  def token_type(self) -> Optional[pulumi.Input[str]]:
707
647
  """
708
- The type of token that should be generated. Can be `service`,
709
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
710
- `service` tokens). For token store roles, there are two additional possibilities:
711
- `default-service` and `default-batch` which specify the type to return unless the client
712
- requests a different type at generation time.
648
+ The type of token to generate, service or batch
713
649
  """
714
650
  return pulumi.get(self, "token_type")
715
651
 
@@ -750,26 +686,24 @@ class AuthBackendRole(pulumi.CustomResource):
750
686
 
751
687
  ## Example Usage
752
688
 
753
- <!--Start PulumiCodeChooser -->
754
689
  ```python
755
690
  import pulumi
756
691
  import pulumi_vault as vault
757
692
 
758
693
  example = vault.tokenauth.AuthBackendRole("example",
759
- allowed_entity_aliases=["test_entity"],
694
+ role_name="my-role",
760
695
  allowed_policies=[
761
696
  "dev",
762
697
  "test",
763
698
  ],
764
699
  disallowed_policies=["default"],
700
+ allowed_entity_aliases=["test_entity"],
765
701
  orphan=True,
766
- path_suffix="path-suffix",
702
+ token_period=86400,
767
703
  renewable=True,
768
- role_name="my-role",
769
704
  token_explicit_max_ttl=115200,
770
- token_period=86400)
705
+ path_suffix="path-suffix")
771
706
  ```
772
- <!--End PulumiCodeChooser -->
773
707
 
774
708
  ## Import
775
709
 
@@ -796,31 +730,15 @@ class AuthBackendRole(pulumi.CustomResource):
796
730
  > Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
797
731
  :param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
798
732
  :param pulumi.Input[str] role_name: The name of the role.
799
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
800
- addresses which can authenticate successfully, and ties the resulting token to these blocks
801
- as well.
802
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
803
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
804
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
805
- `token_max_ttl` would otherwise allow a renewal.
806
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
807
- Its current value will be referenced at renewal time.
808
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
809
- generated tokens; otherwise it will be added to the policies set in token_policies.
810
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/token#token_num_uses)
811
- of times a generated token may be used (within its lifetime); 0 means unlimited.
812
- :param pulumi.Input[int] token_period: If set, indicates that the
813
- token generated using this role should never expire. The token should be renewed within the
814
- duration specified by this value. At each renewal, the token's TTL will be set to the
815
- value of this field. Specified in seconds.
733
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
734
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
735
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
736
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
737
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
738
+ :param pulumi.Input[int] token_period: Generated Token's Period
816
739
  :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
817
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
818
- Its current value will be referenced at renewal time.
819
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
820
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
821
- `service` tokens). For token store roles, there are two additional possibilities:
822
- `default-service` and `default-batch` which specify the type to return unless the client
823
- requests a different type at generation time.
740
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
741
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
824
742
  """
825
743
  ...
826
744
  @overload
@@ -835,26 +753,24 @@ class AuthBackendRole(pulumi.CustomResource):
835
753
 
836
754
  ## Example Usage
837
755
 
838
- <!--Start PulumiCodeChooser -->
839
756
  ```python
840
757
  import pulumi
841
758
  import pulumi_vault as vault
842
759
 
843
760
  example = vault.tokenauth.AuthBackendRole("example",
844
- allowed_entity_aliases=["test_entity"],
761
+ role_name="my-role",
845
762
  allowed_policies=[
846
763
  "dev",
847
764
  "test",
848
765
  ],
849
766
  disallowed_policies=["default"],
767
+ allowed_entity_aliases=["test_entity"],
850
768
  orphan=True,
851
- path_suffix="path-suffix",
769
+ token_period=86400,
852
770
  renewable=True,
853
- role_name="my-role",
854
771
  token_explicit_max_ttl=115200,
855
- token_period=86400)
772
+ path_suffix="path-suffix")
856
773
  ```
857
- <!--End PulumiCodeChooser -->
858
774
 
859
775
  ## Import
860
776
 
@@ -979,31 +895,15 @@ class AuthBackendRole(pulumi.CustomResource):
979
895
  > Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
980
896
  :param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
981
897
  :param pulumi.Input[str] role_name: The name of the role.
982
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
983
- addresses which can authenticate successfully, and ties the resulting token to these blocks
984
- as well.
985
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
986
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
987
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
988
- `token_max_ttl` would otherwise allow a renewal.
989
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
990
- Its current value will be referenced at renewal time.
991
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
992
- generated tokens; otherwise it will be added to the policies set in token_policies.
993
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/token#token_num_uses)
994
- of times a generated token may be used (within its lifetime); 0 means unlimited.
995
- :param pulumi.Input[int] token_period: If set, indicates that the
996
- token generated using this role should never expire. The token should be renewed within the
997
- duration specified by this value. At each renewal, the token's TTL will be set to the
998
- value of this field. Specified in seconds.
898
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
899
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
900
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
901
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
902
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
903
+ :param pulumi.Input[int] token_period: Generated Token's Period
999
904
  :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
1000
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
1001
- Its current value will be referenced at renewal time.
1002
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
1003
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
1004
- `service` tokens). For token store roles, there are two additional possibilities:
1005
- `default-service` and `default-batch` which specify the type to return unless the client
1006
- requests a different type at generation time.
905
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
906
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
1007
907
  """
1008
908
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
1009
909
 
@@ -1119,9 +1019,7 @@ class AuthBackendRole(pulumi.CustomResource):
1119
1019
  @pulumi.getter(name="tokenBoundCidrs")
1120
1020
  def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
1121
1021
  """
1122
- List of CIDR blocks; if set, specifies blocks of IP
1123
- addresses which can authenticate successfully, and ties the resulting token to these blocks
1124
- as well.
1022
+ Specifies the blocks of IP addresses which are allowed to use the generated token
1125
1023
  """
1126
1024
  return pulumi.get(self, "token_bound_cidrs")
1127
1025
 
@@ -1129,10 +1027,7 @@ class AuthBackendRole(pulumi.CustomResource):
1129
1027
  @pulumi.getter(name="tokenExplicitMaxTtl")
1130
1028
  def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
1131
1029
  """
1132
- If set, will encode an
1133
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1134
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1135
- `token_max_ttl` would otherwise allow a renewal.
1030
+ Generated Token's Explicit Maximum TTL in seconds
1136
1031
  """
1137
1032
  return pulumi.get(self, "token_explicit_max_ttl")
1138
1033
 
@@ -1140,8 +1035,7 @@ class AuthBackendRole(pulumi.CustomResource):
1140
1035
  @pulumi.getter(name="tokenMaxTtl")
1141
1036
  def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
1142
1037
  """
1143
- The maximum lifetime for generated tokens in number of seconds.
1144
- Its current value will be referenced at renewal time.
1038
+ The maximum lifetime of the generated token
1145
1039
  """
1146
1040
  return pulumi.get(self, "token_max_ttl")
1147
1041
 
@@ -1149,8 +1043,7 @@ class AuthBackendRole(pulumi.CustomResource):
1149
1043
  @pulumi.getter(name="tokenNoDefaultPolicy")
1150
1044
  def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
1151
1045
  """
1152
- If set, the default policy will not be set on
1153
- generated tokens; otherwise it will be added to the policies set in token_policies.
1046
+ If true, the 'default' policy will not automatically be added to generated tokens
1154
1047
  """
1155
1048
  return pulumi.get(self, "token_no_default_policy")
1156
1049
 
@@ -1158,8 +1051,7 @@ class AuthBackendRole(pulumi.CustomResource):
1158
1051
  @pulumi.getter(name="tokenNumUses")
1159
1052
  def token_num_uses(self) -> pulumi.Output[Optional[int]]:
1160
1053
  """
1161
- The [maximum number](https://www.vaultproject.io/api-docs/token#token_num_uses)
1162
- of times a generated token may be used (within its lifetime); 0 means unlimited.
1054
+ The maximum number of times a token may be used, a value of zero means unlimited
1163
1055
  """
1164
1056
  return pulumi.get(self, "token_num_uses")
1165
1057
 
@@ -1167,10 +1059,7 @@ class AuthBackendRole(pulumi.CustomResource):
1167
1059
  @pulumi.getter(name="tokenPeriod")
1168
1060
  def token_period(self) -> pulumi.Output[Optional[int]]:
1169
1061
  """
1170
- If set, indicates that the
1171
- token generated using this role should never expire. The token should be renewed within the
1172
- duration specified by this value. At each renewal, the token's TTL will be set to the
1173
- value of this field. Specified in seconds.
1062
+ Generated Token's Period
1174
1063
  """
1175
1064
  return pulumi.get(self, "token_period")
1176
1065
 
@@ -1186,8 +1075,7 @@ class AuthBackendRole(pulumi.CustomResource):
1186
1075
  @pulumi.getter(name="tokenTtl")
1187
1076
  def token_ttl(self) -> pulumi.Output[Optional[int]]:
1188
1077
  """
1189
- The incremental lifetime for generated tokens in number of seconds.
1190
- Its current value will be referenced at renewal time.
1078
+ The initial ttl of the token to generate in seconds
1191
1079
  """
1192
1080
  return pulumi.get(self, "token_ttl")
1193
1081
 
@@ -1195,11 +1083,7 @@ class AuthBackendRole(pulumi.CustomResource):
1195
1083
  @pulumi.getter(name="tokenType")
1196
1084
  def token_type(self) -> pulumi.Output[Optional[str]]:
1197
1085
  """
1198
- The type of token that should be generated. Can be `service`,
1199
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
1200
- `service` tokens). For token store roles, there are two additional possibilities:
1201
- `default-service` and `default-batch` which specify the type to return unless the client
1202
- requests a different type at generation time.
1086
+ The type of token to generate, service or batch
1203
1087
  """
1204
1088
  return pulumi.get(self, "token_type")
1205
1089