pulumi-vault 6.2.0a1713561465__py3-none-any.whl → 6.2.0a1714114277__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (179) hide show
  1. pulumi_vault/_inputs.py +0 -20
  2. pulumi_vault/ad/secret_backend.py +0 -4
  3. pulumi_vault/ad/secret_library.py +0 -4
  4. pulumi_vault/ad/secret_role.py +0 -4
  5. pulumi_vault/alicloud/auth_backend_role.py +63 -186
  6. pulumi_vault/approle/auth_backend_login.py +0 -4
  7. pulumi_vault/approle/auth_backend_role.py +63 -186
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
  9. pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
  10. pulumi_vault/audit.py +0 -8
  11. pulumi_vault/audit_request_header.py +0 -4
  12. pulumi_vault/aws/auth_backend_client.py +0 -4
  13. pulumi_vault/aws/auth_backend_config_identity.py +0 -4
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -4
  15. pulumi_vault/aws/auth_backend_role.py +63 -186
  16. pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -4
  17. pulumi_vault/aws/auth_backend_sts_role.py +0 -4
  18. pulumi_vault/aws/secret_backend_role.py +0 -4
  19. pulumi_vault/aws/secret_backend_static_role.py +0 -4
  20. pulumi_vault/azure/auth_backend_config.py +0 -4
  21. pulumi_vault/azure/auth_backend_role.py +63 -186
  22. pulumi_vault/azure/backend.py +0 -8
  23. pulumi_vault/azure/backend_role.py +0 -4
  24. pulumi_vault/azure/get_access_credentials.py +0 -4
  25. pulumi_vault/cert_auth_backend_role.py +63 -200
  26. pulumi_vault/consul/secret_backend.py +0 -8
  27. pulumi_vault/consul/secret_backend_role.py +0 -4
  28. pulumi_vault/database/_inputs.py +522 -784
  29. pulumi_vault/database/outputs.py +522 -784
  30. pulumi_vault/database/secret_backend_connection.py +0 -4
  31. pulumi_vault/database/secret_backend_role.py +0 -4
  32. pulumi_vault/database/secret_backend_static_role.py +0 -4
  33. pulumi_vault/database/secrets_mount.py +0 -4
  34. pulumi_vault/egp_policy.py +0 -4
  35. pulumi_vault/gcp/auth_backend_role.py +63 -264
  36. pulumi_vault/gcp/get_auth_backend_role.py +0 -4
  37. pulumi_vault/gcp/secret_backend.py +0 -4
  38. pulumi_vault/gcp/secret_impersonated_account.py +0 -4
  39. pulumi_vault/gcp/secret_roleset.py +0 -4
  40. pulumi_vault/gcp/secret_static_account.py +0 -4
  41. pulumi_vault/generic/endpoint.py +0 -4
  42. pulumi_vault/generic/get_secret.py +0 -8
  43. pulumi_vault/get_auth_backend.py +0 -4
  44. pulumi_vault/get_auth_backends.py +0 -8
  45. pulumi_vault/get_namespace.py +0 -12
  46. pulumi_vault/get_namespaces.py +0 -8
  47. pulumi_vault/get_nomad_access_token.py +0 -4
  48. pulumi_vault/get_policy_document.py +0 -4
  49. pulumi_vault/get_raft_autopilot_state.py +0 -4
  50. pulumi_vault/github/auth_backend.py +0 -4
  51. pulumi_vault/github/team.py +0 -4
  52. pulumi_vault/github/user.py +0 -4
  53. pulumi_vault/identity/entity.py +0 -4
  54. pulumi_vault/identity/entity_alias.py +0 -4
  55. pulumi_vault/identity/entity_policies.py +0 -8
  56. pulumi_vault/identity/get_entity.py +0 -4
  57. pulumi_vault/identity/get_group.py +0 -4
  58. pulumi_vault/identity/get_oidc_client_creds.py +0 -4
  59. pulumi_vault/identity/get_oidc_openid_config.py +0 -4
  60. pulumi_vault/identity/get_oidc_public_keys.py +0 -4
  61. pulumi_vault/identity/group.py +0 -12
  62. pulumi_vault/identity/group_alias.py +0 -4
  63. pulumi_vault/identity/group_member_entity_ids.py +0 -8
  64. pulumi_vault/identity/group_member_group_ids.py +0 -8
  65. pulumi_vault/identity/group_policies.py +0 -8
  66. pulumi_vault/identity/mfa_duo.py +0 -4
  67. pulumi_vault/identity/mfa_login_enforcement.py +0 -4
  68. pulumi_vault/identity/mfa_okta.py +0 -4
  69. pulumi_vault/identity/mfa_pingid.py +0 -4
  70. pulumi_vault/identity/mfa_totp.py +0 -4
  71. pulumi_vault/identity/oidc.py +0 -4
  72. pulumi_vault/identity/oidc_assignment.py +0 -4
  73. pulumi_vault/identity/oidc_client.py +0 -4
  74. pulumi_vault/identity/oidc_key.py +0 -4
  75. pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -4
  76. pulumi_vault/identity/oidc_provider.py +0 -4
  77. pulumi_vault/identity/oidc_role.py +0 -8
  78. pulumi_vault/identity/oidc_scope.py +0 -4
  79. pulumi_vault/jwt/auth_backend.py +0 -12
  80. pulumi_vault/jwt/auth_backend_role.py +63 -190
  81. pulumi_vault/kmip/secret_backend.py +0 -4
  82. pulumi_vault/kmip/secret_role.py +0 -4
  83. pulumi_vault/kmip/secret_scope.py +0 -4
  84. pulumi_vault/kubernetes/auth_backend_config.py +0 -4
  85. pulumi_vault/kubernetes/auth_backend_role.py +56 -172
  86. pulumi_vault/kubernetes/get_service_account_token.py +0 -4
  87. pulumi_vault/kubernetes/secret_backend.py +0 -4
  88. pulumi_vault/kubernetes/secret_backend_role.py +0 -12
  89. pulumi_vault/kv/get_secret.py +0 -4
  90. pulumi_vault/kv/get_secret_subkeys_v2.py +0 -4
  91. pulumi_vault/kv/get_secret_v2.py +0 -4
  92. pulumi_vault/kv/get_secrets_list.py +0 -4
  93. pulumi_vault/kv/get_secrets_list_v2.py +0 -4
  94. pulumi_vault/kv/secret.py +0 -4
  95. pulumi_vault/kv/secret_backend_v2.py +0 -4
  96. pulumi_vault/kv/secret_v2.py +0 -4
  97. pulumi_vault/ldap/auth_backend.py +56 -151
  98. pulumi_vault/ldap/auth_backend_group.py +0 -4
  99. pulumi_vault/ldap/auth_backend_user.py +0 -4
  100. pulumi_vault/ldap/secret_backend.py +0 -4
  101. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
  102. pulumi_vault/ldap/secret_backend_library_set.py +0 -4
  103. pulumi_vault/ldap/secret_backend_static_role.py +0 -4
  104. pulumi_vault/managed/_inputs.py +84 -132
  105. pulumi_vault/managed/keys.py +7 -28
  106. pulumi_vault/managed/outputs.py +84 -132
  107. pulumi_vault/mfa_duo.py +0 -4
  108. pulumi_vault/mfa_okta.py +0 -4
  109. pulumi_vault/mfa_pingid.py +0 -4
  110. pulumi_vault/mfa_totp.py +0 -4
  111. pulumi_vault/mongodbatlas/secret_backend.py +0 -4
  112. pulumi_vault/mongodbatlas/secret_role.py +0 -4
  113. pulumi_vault/mount.py +0 -16
  114. pulumi_vault/nomad_secret_backend.py +0 -4
  115. pulumi_vault/nomad_secret_role.py +0 -4
  116. pulumi_vault/okta/_inputs.py +8 -8
  117. pulumi_vault/okta/auth_backend.py +0 -4
  118. pulumi_vault/okta/auth_backend_group.py +0 -4
  119. pulumi_vault/okta/auth_backend_user.py +0 -4
  120. pulumi_vault/okta/outputs.py +8 -8
  121. pulumi_vault/outputs.py +0 -20
  122. pulumi_vault/password_policy.py +0 -4
  123. pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
  124. pulumi_vault/pkisecret/get_backend_issuer.py +0 -4
  125. pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
  126. pulumi_vault/pkisecret/get_backend_key.py +0 -4
  127. pulumi_vault/pkisecret/get_backend_keys.py +0 -4
  128. pulumi_vault/pkisecret/secret_backend_cert.py +0 -4
  129. pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -4
  130. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
  131. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
  132. pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -4
  133. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -4
  134. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -4
  135. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
  136. pulumi_vault/pkisecret/secret_backend_role.py +0 -4
  137. pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -4
  138. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -4
  139. pulumi_vault/pkisecret/secret_backend_sign.py +0 -4
  140. pulumi_vault/quota_lease_count.py +0 -4
  141. pulumi_vault/quota_rate_limit.py +0 -4
  142. pulumi_vault/rabbitmq/secret_backend.py +0 -4
  143. pulumi_vault/rabbitmq/secret_backend_role.py +0 -4
  144. pulumi_vault/raft_autopilot.py +0 -4
  145. pulumi_vault/raft_snapshot_agent_config.py +91 -292
  146. pulumi_vault/rgp_policy.py +0 -4
  147. pulumi_vault/saml/auth_backend.py +0 -4
  148. pulumi_vault/saml/auth_backend_role.py +56 -172
  149. pulumi_vault/secrets/sync_association.py +0 -4
  150. pulumi_vault/secrets/sync_aws_destination.py +0 -4
  151. pulumi_vault/secrets/sync_azure_destination.py +0 -4
  152. pulumi_vault/secrets/sync_config.py +0 -4
  153. pulumi_vault/secrets/sync_gcp_destination.py +0 -4
  154. pulumi_vault/secrets/sync_gh_destination.py +0 -4
  155. pulumi_vault/secrets/sync_github_apps.py +0 -4
  156. pulumi_vault/secrets/sync_vercel_destination.py +0 -4
  157. pulumi_vault/ssh/_inputs.py +6 -20
  158. pulumi_vault/ssh/outputs.py +6 -20
  159. pulumi_vault/ssh/secret_backend_ca.py +0 -4
  160. pulumi_vault/ssh/secret_backend_role.py +0 -4
  161. pulumi_vault/terraformcloud/secret_backend.py +0 -4
  162. pulumi_vault/terraformcloud/secret_creds.py +0 -4
  163. pulumi_vault/terraformcloud/secret_role.py +0 -4
  164. pulumi_vault/token.py +0 -4
  165. pulumi_vault/tokenauth/auth_backend_role.py +56 -172
  166. pulumi_vault/transform/alphabet.py +0 -4
  167. pulumi_vault/transform/get_decode.py +0 -4
  168. pulumi_vault/transform/get_encode.py +0 -4
  169. pulumi_vault/transform/role.py +0 -4
  170. pulumi_vault/transform/template.py +0 -4
  171. pulumi_vault/transit/get_decrypt.py +0 -16
  172. pulumi_vault/transit/get_encrypt.py +0 -14
  173. pulumi_vault/transit/secret_backend_key.py +0 -4
  174. pulumi_vault/transit/secret_cache_config.py +0 -4
  175. {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/METADATA +1 -1
  176. pulumi_vault-6.2.0a1714114277.dist-info/RECORD +252 -0
  177. pulumi_vault-6.2.0a1713561465.dist-info/RECORD +0 -252
  178. {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/WHEEL +0 -0
  179. {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/top_level.txt +0 -0
pulumi_vault/_inputs.py CHANGED
@@ -1844,19 +1844,12 @@ class GetPolicyDocumentRuleAllowedParameterArgs:
1844
1844
  def __init__(__self__, *,
1845
1845
  key: str,
1846
1846
  values: Sequence[str]):
1847
- """
1848
- :param str key: name of permitted or denied parameter.
1849
- :param Sequence[str] values: list of values what are permitted or denied by policy rule.
1850
- """
1851
1847
  pulumi.set(__self__, "key", key)
1852
1848
  pulumi.set(__self__, "values", values)
1853
1849
 
1854
1850
  @property
1855
1851
  @pulumi.getter
1856
1852
  def key(self) -> str:
1857
- """
1858
- name of permitted or denied parameter.
1859
- """
1860
1853
  return pulumi.get(self, "key")
1861
1854
 
1862
1855
  @key.setter
@@ -1866,9 +1859,6 @@ class GetPolicyDocumentRuleAllowedParameterArgs:
1866
1859
  @property
1867
1860
  @pulumi.getter
1868
1861
  def values(self) -> Sequence[str]:
1869
- """
1870
- list of values what are permitted or denied by policy rule.
1871
- """
1872
1862
  return pulumi.get(self, "values")
1873
1863
 
1874
1864
  @values.setter
@@ -1881,19 +1871,12 @@ class GetPolicyDocumentRuleDeniedParameterArgs:
1881
1871
  def __init__(__self__, *,
1882
1872
  key: str,
1883
1873
  values: Sequence[str]):
1884
- """
1885
- :param str key: name of permitted or denied parameter.
1886
- :param Sequence[str] values: list of values what are permitted or denied by policy rule.
1887
- """
1888
1874
  pulumi.set(__self__, "key", key)
1889
1875
  pulumi.set(__self__, "values", values)
1890
1876
 
1891
1877
  @property
1892
1878
  @pulumi.getter
1893
1879
  def key(self) -> str:
1894
- """
1895
- name of permitted or denied parameter.
1896
- """
1897
1880
  return pulumi.get(self, "key")
1898
1881
 
1899
1882
  @key.setter
@@ -1903,9 +1886,6 @@ class GetPolicyDocumentRuleDeniedParameterArgs:
1903
1886
  @property
1904
1887
  @pulumi.getter
1905
1888
  def values(self) -> Sequence[str]:
1906
- """
1907
- list of values what are permitted or denied by policy rule.
1908
- """
1909
1889
  return pulumi.get(self, "values")
1910
1890
 
1911
1891
  @values.setter
@@ -1252,7 +1252,6 @@ class SecretBackend(pulumi.CustomResource):
1252
1252
  """
1253
1253
  ## Example Usage
1254
1254
 
1255
- <!--Start PulumiCodeChooser -->
1256
1255
  ```python
1257
1256
  import pulumi
1258
1257
  import pulumi_vault as vault
@@ -1265,7 +1264,6 @@ class SecretBackend(pulumi.CustomResource):
1265
1264
  insecure_tls=True,
1266
1265
  userdn="CN=Users,DC=corp,DC=example,DC=net")
1267
1266
  ```
1268
- <!--End PulumiCodeChooser -->
1269
1267
 
1270
1268
  ## Import
1271
1269
 
@@ -1345,7 +1343,6 @@ class SecretBackend(pulumi.CustomResource):
1345
1343
  """
1346
1344
  ## Example Usage
1347
1345
 
1348
- <!--Start PulumiCodeChooser -->
1349
1346
  ```python
1350
1347
  import pulumi
1351
1348
  import pulumi_vault as vault
@@ -1358,7 +1355,6 @@ class SecretBackend(pulumi.CustomResource):
1358
1355
  insecure_tls=True,
1359
1356
  userdn="CN=Users,DC=corp,DC=example,DC=net")
1360
1357
  ```
1361
- <!--End PulumiCodeChooser -->
1362
1358
 
1363
1359
  ## Import
1364
1360
 
@@ -293,7 +293,6 @@ class SecretLibrary(pulumi.CustomResource):
293
293
  """
294
294
  ## Example Usage
295
295
 
296
- <!--Start PulumiCodeChooser -->
297
296
  ```python
298
297
  import pulumi
299
298
  import pulumi_vault as vault
@@ -316,7 +315,6 @@ class SecretLibrary(pulumi.CustomResource):
316
315
  disable_check_in_enforcement=True,
317
316
  max_ttl=120)
318
317
  ```
319
- <!--End PulumiCodeChooser -->
320
318
 
321
319
  ## Import
322
320
 
@@ -352,7 +350,6 @@ class SecretLibrary(pulumi.CustomResource):
352
350
  """
353
351
  ## Example Usage
354
352
 
355
- <!--Start PulumiCodeChooser -->
356
353
  ```python
357
354
  import pulumi
358
355
  import pulumi_vault as vault
@@ -375,7 +372,6 @@ class SecretLibrary(pulumi.CustomResource):
375
372
  disable_check_in_enforcement=True,
376
373
  max_ttl=120)
377
374
  ```
378
- <!--End PulumiCodeChooser -->
379
375
 
380
376
  ## Import
381
377
 
@@ -258,7 +258,6 @@ class SecretRole(pulumi.CustomResource):
258
258
  """
259
259
  ## Example Usage
260
260
 
261
- <!--Start PulumiCodeChooser -->
262
261
  ```python
263
262
  import pulumi
264
263
  import pulumi_vault as vault
@@ -276,7 +275,6 @@ class SecretRole(pulumi.CustomResource):
276
275
  service_account_name="Bob",
277
276
  ttl=60)
278
277
  ```
279
- <!--End PulumiCodeChooser -->
280
278
 
281
279
  ## Import
282
280
 
@@ -310,7 +308,6 @@ class SecretRole(pulumi.CustomResource):
310
308
  """
311
309
  ## Example Usage
312
310
 
313
- <!--Start PulumiCodeChooser -->
314
311
  ```python
315
312
  import pulumi
316
313
  import pulumi_vault as vault
@@ -328,7 +325,6 @@ class SecretRole(pulumi.CustomResource):
328
325
  service_account_name="Bob",
329
326
  ttl=60)
330
327
  ```
331
- <!--End PulumiCodeChooser -->
332
328
 
333
329
  ## Import
334
330
 
@@ -40,32 +40,15 @@ class AuthBackendRoleArgs:
40
40
  The value should not contain leading or trailing forward slashes.
41
41
  The `namespace` is always relative to the provider's configured namespace.
42
42
  *Available only for Vault Enterprise*.
43
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
44
- addresses which can authenticate successfully, and ties the resulting token to these blocks
45
- as well.
46
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
47
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
48
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
49
- `token_max_ttl` would otherwise allow a renewal.
50
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
51
- Its current value will be referenced at renewal time.
52
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
53
- generated tokens; otherwise it will be added to the policies set in token_policies.
54
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
55
- of times a generated token may be used (within its lifetime); 0 means unlimited.
56
- :param pulumi.Input[int] token_period: If set, indicates that the
57
- token generated using this role should never expire. The token should be renewed within the
58
- duration specified by this value. At each renewal, the token's TTL will be set to the
59
- value of this field. Specified in seconds.
60
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
61
- on the auth method, this list may be supplemented by user/group/other values.
62
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
63
- Its current value will be referenced at renewal time.
64
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
65
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
66
- `service` tokens). For token store roles, there are two additional possibilities:
67
- `default-service` and `default-batch` which specify the type to return unless the client
68
- requests a different type at generation time.
43
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
44
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
45
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
46
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
47
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
48
+ :param pulumi.Input[int] token_period: Generated Token's Period
49
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
50
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
51
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
69
52
  """
70
53
  pulumi.set(__self__, "arn", arn)
71
54
  pulumi.set(__self__, "role", role)
@@ -151,9 +134,7 @@ class AuthBackendRoleArgs:
151
134
  @pulumi.getter(name="tokenBoundCidrs")
152
135
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
153
136
  """
154
- List of CIDR blocks; if set, specifies blocks of IP
155
- addresses which can authenticate successfully, and ties the resulting token to these blocks
156
- as well.
137
+ Specifies the blocks of IP addresses which are allowed to use the generated token
157
138
  """
158
139
  return pulumi.get(self, "token_bound_cidrs")
159
140
 
@@ -165,10 +146,7 @@ class AuthBackendRoleArgs:
165
146
  @pulumi.getter(name="tokenExplicitMaxTtl")
166
147
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
167
148
  """
168
- If set, will encode an
169
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
170
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
171
- `token_max_ttl` would otherwise allow a renewal.
149
+ Generated Token's Explicit Maximum TTL in seconds
172
150
  """
173
151
  return pulumi.get(self, "token_explicit_max_ttl")
174
152
 
@@ -180,8 +158,7 @@ class AuthBackendRoleArgs:
180
158
  @pulumi.getter(name="tokenMaxTtl")
181
159
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
182
160
  """
183
- The maximum lifetime for generated tokens in number of seconds.
184
- Its current value will be referenced at renewal time.
161
+ The maximum lifetime of the generated token
185
162
  """
186
163
  return pulumi.get(self, "token_max_ttl")
187
164
 
@@ -193,8 +170,7 @@ class AuthBackendRoleArgs:
193
170
  @pulumi.getter(name="tokenNoDefaultPolicy")
194
171
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
195
172
  """
196
- If set, the default policy will not be set on
197
- generated tokens; otherwise it will be added to the policies set in token_policies.
173
+ If true, the 'default' policy will not automatically be added to generated tokens
198
174
  """
199
175
  return pulumi.get(self, "token_no_default_policy")
200
176
 
@@ -206,8 +182,7 @@ class AuthBackendRoleArgs:
206
182
  @pulumi.getter(name="tokenNumUses")
207
183
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
208
184
  """
209
- The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
210
- of times a generated token may be used (within its lifetime); 0 means unlimited.
185
+ The maximum number of times a token may be used, a value of zero means unlimited
211
186
  """
212
187
  return pulumi.get(self, "token_num_uses")
213
188
 
@@ -219,10 +194,7 @@ class AuthBackendRoleArgs:
219
194
  @pulumi.getter(name="tokenPeriod")
220
195
  def token_period(self) -> Optional[pulumi.Input[int]]:
221
196
  """
222
- If set, indicates that the
223
- token generated using this role should never expire. The token should be renewed within the
224
- duration specified by this value. At each renewal, the token's TTL will be set to the
225
- value of this field. Specified in seconds.
197
+ Generated Token's Period
226
198
  """
227
199
  return pulumi.get(self, "token_period")
228
200
 
@@ -234,8 +206,7 @@ class AuthBackendRoleArgs:
234
206
  @pulumi.getter(name="tokenPolicies")
235
207
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
236
208
  """
237
- List of policies to encode onto generated tokens. Depending
238
- on the auth method, this list may be supplemented by user/group/other values.
209
+ Generated Token's Policies
239
210
  """
240
211
  return pulumi.get(self, "token_policies")
241
212
 
@@ -247,8 +218,7 @@ class AuthBackendRoleArgs:
247
218
  @pulumi.getter(name="tokenTtl")
248
219
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
249
220
  """
250
- The incremental lifetime for generated tokens in number of seconds.
251
- Its current value will be referenced at renewal time.
221
+ The initial ttl of the token to generate in seconds
252
222
  """
253
223
  return pulumi.get(self, "token_ttl")
254
224
 
@@ -260,11 +230,7 @@ class AuthBackendRoleArgs:
260
230
  @pulumi.getter(name="tokenType")
261
231
  def token_type(self) -> Optional[pulumi.Input[str]]:
262
232
  """
263
- The type of token that should be generated. Can be `service`,
264
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
265
- `service` tokens). For token store roles, there are two additional possibilities:
266
- `default-service` and `default-batch` which specify the type to return unless the client
267
- requests a different type at generation time.
233
+ The type of token to generate, service or batch
268
234
  """
269
235
  return pulumi.get(self, "token_type")
270
236
 
@@ -302,32 +268,15 @@ class _AuthBackendRoleState:
302
268
  *Available only for Vault Enterprise*.
303
269
  :param pulumi.Input[str] role: Name of the role. Must correspond with the name of
304
270
  the role reflected in the arn.
305
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
306
- addresses which can authenticate successfully, and ties the resulting token to these blocks
307
- as well.
308
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
309
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
310
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
311
- `token_max_ttl` would otherwise allow a renewal.
312
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
313
- Its current value will be referenced at renewal time.
314
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
315
- generated tokens; otherwise it will be added to the policies set in token_policies.
316
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
317
- of times a generated token may be used (within its lifetime); 0 means unlimited.
318
- :param pulumi.Input[int] token_period: If set, indicates that the
319
- token generated using this role should never expire. The token should be renewed within the
320
- duration specified by this value. At each renewal, the token's TTL will be set to the
321
- value of this field. Specified in seconds.
322
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
323
- on the auth method, this list may be supplemented by user/group/other values.
324
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
325
- Its current value will be referenced at renewal time.
326
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
327
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
328
- `service` tokens). For token store roles, there are two additional possibilities:
329
- `default-service` and `default-batch` which specify the type to return unless the client
330
- requests a different type at generation time.
271
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
272
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
273
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
274
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
275
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
276
+ :param pulumi.Input[int] token_period: Generated Token's Period
277
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
278
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
279
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
331
280
  """
332
281
  if arn is not None:
333
282
  pulumi.set(__self__, "arn", arn)
@@ -415,9 +364,7 @@ class _AuthBackendRoleState:
415
364
  @pulumi.getter(name="tokenBoundCidrs")
416
365
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
417
366
  """
418
- List of CIDR blocks; if set, specifies blocks of IP
419
- addresses which can authenticate successfully, and ties the resulting token to these blocks
420
- as well.
367
+ Specifies the blocks of IP addresses which are allowed to use the generated token
421
368
  """
422
369
  return pulumi.get(self, "token_bound_cidrs")
423
370
 
@@ -429,10 +376,7 @@ class _AuthBackendRoleState:
429
376
  @pulumi.getter(name="tokenExplicitMaxTtl")
430
377
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
431
378
  """
432
- If set, will encode an
433
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
434
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
435
- `token_max_ttl` would otherwise allow a renewal.
379
+ Generated Token's Explicit Maximum TTL in seconds
436
380
  """
437
381
  return pulumi.get(self, "token_explicit_max_ttl")
438
382
 
@@ -444,8 +388,7 @@ class _AuthBackendRoleState:
444
388
  @pulumi.getter(name="tokenMaxTtl")
445
389
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
446
390
  """
447
- The maximum lifetime for generated tokens in number of seconds.
448
- Its current value will be referenced at renewal time.
391
+ The maximum lifetime of the generated token
449
392
  """
450
393
  return pulumi.get(self, "token_max_ttl")
451
394
 
@@ -457,8 +400,7 @@ class _AuthBackendRoleState:
457
400
  @pulumi.getter(name="tokenNoDefaultPolicy")
458
401
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
459
402
  """
460
- If set, the default policy will not be set on
461
- generated tokens; otherwise it will be added to the policies set in token_policies.
403
+ If true, the 'default' policy will not automatically be added to generated tokens
462
404
  """
463
405
  return pulumi.get(self, "token_no_default_policy")
464
406
 
@@ -470,8 +412,7 @@ class _AuthBackendRoleState:
470
412
  @pulumi.getter(name="tokenNumUses")
471
413
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
472
414
  """
473
- The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
474
- of times a generated token may be used (within its lifetime); 0 means unlimited.
415
+ The maximum number of times a token may be used, a value of zero means unlimited
475
416
  """
476
417
  return pulumi.get(self, "token_num_uses")
477
418
 
@@ -483,10 +424,7 @@ class _AuthBackendRoleState:
483
424
  @pulumi.getter(name="tokenPeriod")
484
425
  def token_period(self) -> Optional[pulumi.Input[int]]:
485
426
  """
486
- If set, indicates that the
487
- token generated using this role should never expire. The token should be renewed within the
488
- duration specified by this value. At each renewal, the token's TTL will be set to the
489
- value of this field. Specified in seconds.
427
+ Generated Token's Period
490
428
  """
491
429
  return pulumi.get(self, "token_period")
492
430
 
@@ -498,8 +436,7 @@ class _AuthBackendRoleState:
498
436
  @pulumi.getter(name="tokenPolicies")
499
437
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
500
438
  """
501
- List of policies to encode onto generated tokens. Depending
502
- on the auth method, this list may be supplemented by user/group/other values.
439
+ Generated Token's Policies
503
440
  """
504
441
  return pulumi.get(self, "token_policies")
505
442
 
@@ -511,8 +448,7 @@ class _AuthBackendRoleState:
511
448
  @pulumi.getter(name="tokenTtl")
512
449
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
513
450
  """
514
- The incremental lifetime for generated tokens in number of seconds.
515
- Its current value will be referenced at renewal time.
451
+ The initial ttl of the token to generate in seconds
516
452
  """
517
453
  return pulumi.get(self, "token_ttl")
518
454
 
@@ -524,11 +460,7 @@ class _AuthBackendRoleState:
524
460
  @pulumi.getter(name="tokenType")
525
461
  def token_type(self) -> Optional[pulumi.Input[str]]:
526
462
  """
527
- The type of token that should be generated. Can be `service`,
528
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
529
- `service` tokens). For token store roles, there are two additional possibilities:
530
- `default-service` and `default-batch` which specify the type to return unless the client
531
- requests a different type at generation time.
463
+ The type of token to generate, service or batch
532
464
  """
533
465
  return pulumi.get(self, "token_type")
534
466
 
@@ -561,7 +493,6 @@ class AuthBackendRole(pulumi.CustomResource):
561
493
 
562
494
  ## Example Usage
563
495
 
564
- <!--Start PulumiCodeChooser -->
565
496
  ```python
566
497
  import pulumi
567
498
  import pulumi_vault as vault
@@ -574,7 +505,6 @@ class AuthBackendRole(pulumi.CustomResource):
574
505
  role="example",
575
506
  arn="acs:ram:123456:tf:role/foobar")
576
507
  ```
577
- <!--End PulumiCodeChooser -->
578
508
 
579
509
  ## Import
580
510
 
@@ -597,32 +527,15 @@ class AuthBackendRole(pulumi.CustomResource):
597
527
  *Available only for Vault Enterprise*.
598
528
  :param pulumi.Input[str] role: Name of the role. Must correspond with the name of
599
529
  the role reflected in the arn.
600
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
601
- addresses which can authenticate successfully, and ties the resulting token to these blocks
602
- as well.
603
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
604
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
605
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
606
- `token_max_ttl` would otherwise allow a renewal.
607
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
608
- Its current value will be referenced at renewal time.
609
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
610
- generated tokens; otherwise it will be added to the policies set in token_policies.
611
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
612
- of times a generated token may be used (within its lifetime); 0 means unlimited.
613
- :param pulumi.Input[int] token_period: If set, indicates that the
614
- token generated using this role should never expire. The token should be renewed within the
615
- duration specified by this value. At each renewal, the token's TTL will be set to the
616
- value of this field. Specified in seconds.
617
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
618
- on the auth method, this list may be supplemented by user/group/other values.
619
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
620
- Its current value will be referenced at renewal time.
621
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
622
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
623
- `service` tokens). For token store roles, there are two additional possibilities:
624
- `default-service` and `default-batch` which specify the type to return unless the client
625
- requests a different type at generation time.
530
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
531
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
532
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
533
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
534
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
535
+ :param pulumi.Input[int] token_period: Generated Token's Period
536
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
537
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
538
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
626
539
  """
627
540
  ...
628
541
  @overload
@@ -635,7 +548,6 @@ class AuthBackendRole(pulumi.CustomResource):
635
548
 
636
549
  ## Example Usage
637
550
 
638
- <!--Start PulumiCodeChooser -->
639
551
  ```python
640
552
  import pulumi
641
553
  import pulumi_vault as vault
@@ -648,7 +560,6 @@ class AuthBackendRole(pulumi.CustomResource):
648
560
  role="example",
649
561
  arn="acs:ram:123456:tf:role/foobar")
650
562
  ```
651
- <!--End PulumiCodeChooser -->
652
563
 
653
564
  ## Import
654
565
 
@@ -753,32 +664,15 @@ class AuthBackendRole(pulumi.CustomResource):
753
664
  *Available only for Vault Enterprise*.
754
665
  :param pulumi.Input[str] role: Name of the role. Must correspond with the name of
755
666
  the role reflected in the arn.
756
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
757
- addresses which can authenticate successfully, and ties the resulting token to these blocks
758
- as well.
759
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
760
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
761
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
762
- `token_max_ttl` would otherwise allow a renewal.
763
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
764
- Its current value will be referenced at renewal time.
765
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
766
- generated tokens; otherwise it will be added to the policies set in token_policies.
767
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
768
- of times a generated token may be used (within its lifetime); 0 means unlimited.
769
- :param pulumi.Input[int] token_period: If set, indicates that the
770
- token generated using this role should never expire. The token should be renewed within the
771
- duration specified by this value. At each renewal, the token's TTL will be set to the
772
- value of this field. Specified in seconds.
773
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
774
- on the auth method, this list may be supplemented by user/group/other values.
775
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
776
- Its current value will be referenced at renewal time.
777
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
778
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
779
- `service` tokens). For token store roles, there are two additional possibilities:
780
- `default-service` and `default-batch` which specify the type to return unless the client
781
- requests a different type at generation time.
667
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
668
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
669
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
670
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
671
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
672
+ :param pulumi.Input[int] token_period: Generated Token's Period
673
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
674
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
675
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
782
676
  """
783
677
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
784
678
 
@@ -842,9 +736,7 @@ class AuthBackendRole(pulumi.CustomResource):
842
736
  @pulumi.getter(name="tokenBoundCidrs")
843
737
  def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
844
738
  """
845
- List of CIDR blocks; if set, specifies blocks of IP
846
- addresses which can authenticate successfully, and ties the resulting token to these blocks
847
- as well.
739
+ Specifies the blocks of IP addresses which are allowed to use the generated token
848
740
  """
849
741
  return pulumi.get(self, "token_bound_cidrs")
850
742
 
@@ -852,10 +744,7 @@ class AuthBackendRole(pulumi.CustomResource):
852
744
  @pulumi.getter(name="tokenExplicitMaxTtl")
853
745
  def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
854
746
  """
855
- If set, will encode an
856
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
857
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
858
- `token_max_ttl` would otherwise allow a renewal.
747
+ Generated Token's Explicit Maximum TTL in seconds
859
748
  """
860
749
  return pulumi.get(self, "token_explicit_max_ttl")
861
750
 
@@ -863,8 +752,7 @@ class AuthBackendRole(pulumi.CustomResource):
863
752
  @pulumi.getter(name="tokenMaxTtl")
864
753
  def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
865
754
  """
866
- The maximum lifetime for generated tokens in number of seconds.
867
- Its current value will be referenced at renewal time.
755
+ The maximum lifetime of the generated token
868
756
  """
869
757
  return pulumi.get(self, "token_max_ttl")
870
758
 
@@ -872,8 +760,7 @@ class AuthBackendRole(pulumi.CustomResource):
872
760
  @pulumi.getter(name="tokenNoDefaultPolicy")
873
761
  def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
874
762
  """
875
- If set, the default policy will not be set on
876
- generated tokens; otherwise it will be added to the policies set in token_policies.
763
+ If true, the 'default' policy will not automatically be added to generated tokens
877
764
  """
878
765
  return pulumi.get(self, "token_no_default_policy")
879
766
 
@@ -881,8 +768,7 @@ class AuthBackendRole(pulumi.CustomResource):
881
768
  @pulumi.getter(name="tokenNumUses")
882
769
  def token_num_uses(self) -> pulumi.Output[Optional[int]]:
883
770
  """
884
- The [maximum number](https://www.vaultproject.io/api-docs/auth/alicloud#token_num_uses)
885
- of times a generated token may be used (within its lifetime); 0 means unlimited.
771
+ The maximum number of times a token may be used, a value of zero means unlimited
886
772
  """
887
773
  return pulumi.get(self, "token_num_uses")
888
774
 
@@ -890,10 +776,7 @@ class AuthBackendRole(pulumi.CustomResource):
890
776
  @pulumi.getter(name="tokenPeriod")
891
777
  def token_period(self) -> pulumi.Output[Optional[int]]:
892
778
  """
893
- If set, indicates that the
894
- token generated using this role should never expire. The token should be renewed within the
895
- duration specified by this value. At each renewal, the token's TTL will be set to the
896
- value of this field. Specified in seconds.
779
+ Generated Token's Period
897
780
  """
898
781
  return pulumi.get(self, "token_period")
899
782
 
@@ -901,8 +784,7 @@ class AuthBackendRole(pulumi.CustomResource):
901
784
  @pulumi.getter(name="tokenPolicies")
902
785
  def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
903
786
  """
904
- List of policies to encode onto generated tokens. Depending
905
- on the auth method, this list may be supplemented by user/group/other values.
787
+ Generated Token's Policies
906
788
  """
907
789
  return pulumi.get(self, "token_policies")
908
790
 
@@ -910,8 +792,7 @@ class AuthBackendRole(pulumi.CustomResource):
910
792
  @pulumi.getter(name="tokenTtl")
911
793
  def token_ttl(self) -> pulumi.Output[Optional[int]]:
912
794
  """
913
- The incremental lifetime for generated tokens in number of seconds.
914
- Its current value will be referenced at renewal time.
795
+ The initial ttl of the token to generate in seconds
915
796
  """
916
797
  return pulumi.get(self, "token_ttl")
917
798
 
@@ -919,11 +800,7 @@ class AuthBackendRole(pulumi.CustomResource):
919
800
  @pulumi.getter(name="tokenType")
920
801
  def token_type(self) -> pulumi.Output[Optional[str]]:
921
802
  """
922
- The type of token that should be generated. Can be `service`,
923
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
924
- `service` tokens). For token store roles, there are two additional possibilities:
925
- `default-service` and `default-batch` which specify the type to return unless the client
926
- requests a different type at generation time.
803
+ The type of token to generate, service or batch
927
804
  """
928
805
  return pulumi.get(self, "token_type")
929
806