pulumi-vault 6.2.0a1713561465__py3-none-any.whl → 6.2.0a1714114277__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (179) hide show
  1. pulumi_vault/_inputs.py +0 -20
  2. pulumi_vault/ad/secret_backend.py +0 -4
  3. pulumi_vault/ad/secret_library.py +0 -4
  4. pulumi_vault/ad/secret_role.py +0 -4
  5. pulumi_vault/alicloud/auth_backend_role.py +63 -186
  6. pulumi_vault/approle/auth_backend_login.py +0 -4
  7. pulumi_vault/approle/auth_backend_role.py +63 -186
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
  9. pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
  10. pulumi_vault/audit.py +0 -8
  11. pulumi_vault/audit_request_header.py +0 -4
  12. pulumi_vault/aws/auth_backend_client.py +0 -4
  13. pulumi_vault/aws/auth_backend_config_identity.py +0 -4
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -4
  15. pulumi_vault/aws/auth_backend_role.py +63 -186
  16. pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -4
  17. pulumi_vault/aws/auth_backend_sts_role.py +0 -4
  18. pulumi_vault/aws/secret_backend_role.py +0 -4
  19. pulumi_vault/aws/secret_backend_static_role.py +0 -4
  20. pulumi_vault/azure/auth_backend_config.py +0 -4
  21. pulumi_vault/azure/auth_backend_role.py +63 -186
  22. pulumi_vault/azure/backend.py +0 -8
  23. pulumi_vault/azure/backend_role.py +0 -4
  24. pulumi_vault/azure/get_access_credentials.py +0 -4
  25. pulumi_vault/cert_auth_backend_role.py +63 -200
  26. pulumi_vault/consul/secret_backend.py +0 -8
  27. pulumi_vault/consul/secret_backend_role.py +0 -4
  28. pulumi_vault/database/_inputs.py +522 -784
  29. pulumi_vault/database/outputs.py +522 -784
  30. pulumi_vault/database/secret_backend_connection.py +0 -4
  31. pulumi_vault/database/secret_backend_role.py +0 -4
  32. pulumi_vault/database/secret_backend_static_role.py +0 -4
  33. pulumi_vault/database/secrets_mount.py +0 -4
  34. pulumi_vault/egp_policy.py +0 -4
  35. pulumi_vault/gcp/auth_backend_role.py +63 -264
  36. pulumi_vault/gcp/get_auth_backend_role.py +0 -4
  37. pulumi_vault/gcp/secret_backend.py +0 -4
  38. pulumi_vault/gcp/secret_impersonated_account.py +0 -4
  39. pulumi_vault/gcp/secret_roleset.py +0 -4
  40. pulumi_vault/gcp/secret_static_account.py +0 -4
  41. pulumi_vault/generic/endpoint.py +0 -4
  42. pulumi_vault/generic/get_secret.py +0 -8
  43. pulumi_vault/get_auth_backend.py +0 -4
  44. pulumi_vault/get_auth_backends.py +0 -8
  45. pulumi_vault/get_namespace.py +0 -12
  46. pulumi_vault/get_namespaces.py +0 -8
  47. pulumi_vault/get_nomad_access_token.py +0 -4
  48. pulumi_vault/get_policy_document.py +0 -4
  49. pulumi_vault/get_raft_autopilot_state.py +0 -4
  50. pulumi_vault/github/auth_backend.py +0 -4
  51. pulumi_vault/github/team.py +0 -4
  52. pulumi_vault/github/user.py +0 -4
  53. pulumi_vault/identity/entity.py +0 -4
  54. pulumi_vault/identity/entity_alias.py +0 -4
  55. pulumi_vault/identity/entity_policies.py +0 -8
  56. pulumi_vault/identity/get_entity.py +0 -4
  57. pulumi_vault/identity/get_group.py +0 -4
  58. pulumi_vault/identity/get_oidc_client_creds.py +0 -4
  59. pulumi_vault/identity/get_oidc_openid_config.py +0 -4
  60. pulumi_vault/identity/get_oidc_public_keys.py +0 -4
  61. pulumi_vault/identity/group.py +0 -12
  62. pulumi_vault/identity/group_alias.py +0 -4
  63. pulumi_vault/identity/group_member_entity_ids.py +0 -8
  64. pulumi_vault/identity/group_member_group_ids.py +0 -8
  65. pulumi_vault/identity/group_policies.py +0 -8
  66. pulumi_vault/identity/mfa_duo.py +0 -4
  67. pulumi_vault/identity/mfa_login_enforcement.py +0 -4
  68. pulumi_vault/identity/mfa_okta.py +0 -4
  69. pulumi_vault/identity/mfa_pingid.py +0 -4
  70. pulumi_vault/identity/mfa_totp.py +0 -4
  71. pulumi_vault/identity/oidc.py +0 -4
  72. pulumi_vault/identity/oidc_assignment.py +0 -4
  73. pulumi_vault/identity/oidc_client.py +0 -4
  74. pulumi_vault/identity/oidc_key.py +0 -4
  75. pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -4
  76. pulumi_vault/identity/oidc_provider.py +0 -4
  77. pulumi_vault/identity/oidc_role.py +0 -8
  78. pulumi_vault/identity/oidc_scope.py +0 -4
  79. pulumi_vault/jwt/auth_backend.py +0 -12
  80. pulumi_vault/jwt/auth_backend_role.py +63 -190
  81. pulumi_vault/kmip/secret_backend.py +0 -4
  82. pulumi_vault/kmip/secret_role.py +0 -4
  83. pulumi_vault/kmip/secret_scope.py +0 -4
  84. pulumi_vault/kubernetes/auth_backend_config.py +0 -4
  85. pulumi_vault/kubernetes/auth_backend_role.py +56 -172
  86. pulumi_vault/kubernetes/get_service_account_token.py +0 -4
  87. pulumi_vault/kubernetes/secret_backend.py +0 -4
  88. pulumi_vault/kubernetes/secret_backend_role.py +0 -12
  89. pulumi_vault/kv/get_secret.py +0 -4
  90. pulumi_vault/kv/get_secret_subkeys_v2.py +0 -4
  91. pulumi_vault/kv/get_secret_v2.py +0 -4
  92. pulumi_vault/kv/get_secrets_list.py +0 -4
  93. pulumi_vault/kv/get_secrets_list_v2.py +0 -4
  94. pulumi_vault/kv/secret.py +0 -4
  95. pulumi_vault/kv/secret_backend_v2.py +0 -4
  96. pulumi_vault/kv/secret_v2.py +0 -4
  97. pulumi_vault/ldap/auth_backend.py +56 -151
  98. pulumi_vault/ldap/auth_backend_group.py +0 -4
  99. pulumi_vault/ldap/auth_backend_user.py +0 -4
  100. pulumi_vault/ldap/secret_backend.py +0 -4
  101. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
  102. pulumi_vault/ldap/secret_backend_library_set.py +0 -4
  103. pulumi_vault/ldap/secret_backend_static_role.py +0 -4
  104. pulumi_vault/managed/_inputs.py +84 -132
  105. pulumi_vault/managed/keys.py +7 -28
  106. pulumi_vault/managed/outputs.py +84 -132
  107. pulumi_vault/mfa_duo.py +0 -4
  108. pulumi_vault/mfa_okta.py +0 -4
  109. pulumi_vault/mfa_pingid.py +0 -4
  110. pulumi_vault/mfa_totp.py +0 -4
  111. pulumi_vault/mongodbatlas/secret_backend.py +0 -4
  112. pulumi_vault/mongodbatlas/secret_role.py +0 -4
  113. pulumi_vault/mount.py +0 -16
  114. pulumi_vault/nomad_secret_backend.py +0 -4
  115. pulumi_vault/nomad_secret_role.py +0 -4
  116. pulumi_vault/okta/_inputs.py +8 -8
  117. pulumi_vault/okta/auth_backend.py +0 -4
  118. pulumi_vault/okta/auth_backend_group.py +0 -4
  119. pulumi_vault/okta/auth_backend_user.py +0 -4
  120. pulumi_vault/okta/outputs.py +8 -8
  121. pulumi_vault/outputs.py +0 -20
  122. pulumi_vault/password_policy.py +0 -4
  123. pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
  124. pulumi_vault/pkisecret/get_backend_issuer.py +0 -4
  125. pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
  126. pulumi_vault/pkisecret/get_backend_key.py +0 -4
  127. pulumi_vault/pkisecret/get_backend_keys.py +0 -4
  128. pulumi_vault/pkisecret/secret_backend_cert.py +0 -4
  129. pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -4
  130. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
  131. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
  132. pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -4
  133. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -4
  134. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -4
  135. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
  136. pulumi_vault/pkisecret/secret_backend_role.py +0 -4
  137. pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -4
  138. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -4
  139. pulumi_vault/pkisecret/secret_backend_sign.py +0 -4
  140. pulumi_vault/quota_lease_count.py +0 -4
  141. pulumi_vault/quota_rate_limit.py +0 -4
  142. pulumi_vault/rabbitmq/secret_backend.py +0 -4
  143. pulumi_vault/rabbitmq/secret_backend_role.py +0 -4
  144. pulumi_vault/raft_autopilot.py +0 -4
  145. pulumi_vault/raft_snapshot_agent_config.py +91 -292
  146. pulumi_vault/rgp_policy.py +0 -4
  147. pulumi_vault/saml/auth_backend.py +0 -4
  148. pulumi_vault/saml/auth_backend_role.py +56 -172
  149. pulumi_vault/secrets/sync_association.py +0 -4
  150. pulumi_vault/secrets/sync_aws_destination.py +0 -4
  151. pulumi_vault/secrets/sync_azure_destination.py +0 -4
  152. pulumi_vault/secrets/sync_config.py +0 -4
  153. pulumi_vault/secrets/sync_gcp_destination.py +0 -4
  154. pulumi_vault/secrets/sync_gh_destination.py +0 -4
  155. pulumi_vault/secrets/sync_github_apps.py +0 -4
  156. pulumi_vault/secrets/sync_vercel_destination.py +0 -4
  157. pulumi_vault/ssh/_inputs.py +6 -20
  158. pulumi_vault/ssh/outputs.py +6 -20
  159. pulumi_vault/ssh/secret_backend_ca.py +0 -4
  160. pulumi_vault/ssh/secret_backend_role.py +0 -4
  161. pulumi_vault/terraformcloud/secret_backend.py +0 -4
  162. pulumi_vault/terraformcloud/secret_creds.py +0 -4
  163. pulumi_vault/terraformcloud/secret_role.py +0 -4
  164. pulumi_vault/token.py +0 -4
  165. pulumi_vault/tokenauth/auth_backend_role.py +56 -172
  166. pulumi_vault/transform/alphabet.py +0 -4
  167. pulumi_vault/transform/get_decode.py +0 -4
  168. pulumi_vault/transform/get_encode.py +0 -4
  169. pulumi_vault/transform/role.py +0 -4
  170. pulumi_vault/transform/template.py +0 -4
  171. pulumi_vault/transit/get_decrypt.py +0 -16
  172. pulumi_vault/transit/get_encrypt.py +0 -14
  173. pulumi_vault/transit/secret_backend_key.py +0 -4
  174. pulumi_vault/transit/secret_cache_config.py +0 -4
  175. {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/METADATA +1 -1
  176. pulumi_vault-6.2.0a1714114277.dist-info/RECORD +252 -0
  177. pulumi_vault-6.2.0a1713561465.dist-info/RECORD +0 -252
  178. {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/WHEEL +0 -0
  179. {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/top_level.txt +0 -0
@@ -89,32 +89,15 @@ class AuthBackendRoleArgs:
89
89
  :param pulumi.Input[Sequence[pulumi.Input[str]]] oidc_scopes: If set, a list of OIDC scopes to be used with an OIDC role.
90
90
  The standard scope "openid" is automatically included and need not be specified.
91
91
  :param pulumi.Input[str] role_type: Type of role, either "oidc" (default) or "jwt".
92
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
93
- addresses which can authenticate successfully, and ties the resulting token to these blocks
94
- as well.
95
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
96
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
97
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
98
- `token_max_ttl` would otherwise allow a renewal.
99
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
100
- Its current value will be referenced at renewal time.
101
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
102
- generated tokens; otherwise it will be added to the policies set in token_policies.
103
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/jwt#token_num_uses)
104
- of times a generated token may be used (within its lifetime); 0 means unlimited.
105
- :param pulumi.Input[int] token_period: If set, indicates that the
106
- token generated using this role should never expire. The token should be renewed within the
107
- duration specified by this value. At each renewal, the token's TTL will be set to the
108
- value of this field. Specified in seconds.
109
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
110
- on the auth method, this list may be supplemented by user/group/other values.
111
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
112
- Its current value will be referenced at renewal time.
113
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
114
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
115
- `service` tokens). For token store roles, there are two additional possibilities:
116
- `default-service` and `default-batch` which specify the type to return unless the client
117
- requests a different type at generation time.
92
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
93
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
94
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
95
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
96
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
97
+ :param pulumi.Input[int] token_period: Generated Token's Period
98
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
99
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
100
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
118
101
  :param pulumi.Input[bool] user_claim_json_pointer: Specifies if the `user_claim` value uses
119
102
  [JSON pointer](https://www.vaultproject.io/docs/auth/jwt#claim-specifications-and-json-pointer)
120
103
  syntax for referencing claims. By default, the `user_claim` value will not use JSON pointer.
@@ -426,9 +409,7 @@ class AuthBackendRoleArgs:
426
409
  @pulumi.getter(name="tokenBoundCidrs")
427
410
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
428
411
  """
429
- List of CIDR blocks; if set, specifies blocks of IP
430
- addresses which can authenticate successfully, and ties the resulting token to these blocks
431
- as well.
412
+ Specifies the blocks of IP addresses which are allowed to use the generated token
432
413
  """
433
414
  return pulumi.get(self, "token_bound_cidrs")
434
415
 
@@ -440,10 +421,7 @@ class AuthBackendRoleArgs:
440
421
  @pulumi.getter(name="tokenExplicitMaxTtl")
441
422
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
442
423
  """
443
- If set, will encode an
444
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
445
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
446
- `token_max_ttl` would otherwise allow a renewal.
424
+ Generated Token's Explicit Maximum TTL in seconds
447
425
  """
448
426
  return pulumi.get(self, "token_explicit_max_ttl")
449
427
 
@@ -455,8 +433,7 @@ class AuthBackendRoleArgs:
455
433
  @pulumi.getter(name="tokenMaxTtl")
456
434
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
457
435
  """
458
- The maximum lifetime for generated tokens in number of seconds.
459
- Its current value will be referenced at renewal time.
436
+ The maximum lifetime of the generated token
460
437
  """
461
438
  return pulumi.get(self, "token_max_ttl")
462
439
 
@@ -468,8 +445,7 @@ class AuthBackendRoleArgs:
468
445
  @pulumi.getter(name="tokenNoDefaultPolicy")
469
446
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
470
447
  """
471
- If set, the default policy will not be set on
472
- generated tokens; otherwise it will be added to the policies set in token_policies.
448
+ If true, the 'default' policy will not automatically be added to generated tokens
473
449
  """
474
450
  return pulumi.get(self, "token_no_default_policy")
475
451
 
@@ -481,8 +457,7 @@ class AuthBackendRoleArgs:
481
457
  @pulumi.getter(name="tokenNumUses")
482
458
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
483
459
  """
484
- The [maximum number](https://www.vaultproject.io/api-docs/jwt#token_num_uses)
485
- of times a generated token may be used (within its lifetime); 0 means unlimited.
460
+ The maximum number of times a token may be used, a value of zero means unlimited
486
461
  """
487
462
  return pulumi.get(self, "token_num_uses")
488
463
 
@@ -494,10 +469,7 @@ class AuthBackendRoleArgs:
494
469
  @pulumi.getter(name="tokenPeriod")
495
470
  def token_period(self) -> Optional[pulumi.Input[int]]:
496
471
  """
497
- If set, indicates that the
498
- token generated using this role should never expire. The token should be renewed within the
499
- duration specified by this value. At each renewal, the token's TTL will be set to the
500
- value of this field. Specified in seconds.
472
+ Generated Token's Period
501
473
  """
502
474
  return pulumi.get(self, "token_period")
503
475
 
@@ -509,8 +481,7 @@ class AuthBackendRoleArgs:
509
481
  @pulumi.getter(name="tokenPolicies")
510
482
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
511
483
  """
512
- List of policies to encode onto generated tokens. Depending
513
- on the auth method, this list may be supplemented by user/group/other values.
484
+ Generated Token's Policies
514
485
  """
515
486
  return pulumi.get(self, "token_policies")
516
487
 
@@ -522,8 +493,7 @@ class AuthBackendRoleArgs:
522
493
  @pulumi.getter(name="tokenTtl")
523
494
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
524
495
  """
525
- The incremental lifetime for generated tokens in number of seconds.
526
- Its current value will be referenced at renewal time.
496
+ The initial ttl of the token to generate in seconds
527
497
  """
528
498
  return pulumi.get(self, "token_ttl")
529
499
 
@@ -535,11 +505,7 @@ class AuthBackendRoleArgs:
535
505
  @pulumi.getter(name="tokenType")
536
506
  def token_type(self) -> Optional[pulumi.Input[str]]:
537
507
  """
538
- The type of token that should be generated. Can be `service`,
539
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
540
- `service` tokens). For token store roles, there are two additional possibilities:
541
- `default-service` and `default-batch` which specify the type to return unless the client
542
- requests a different type at generation time.
508
+ The type of token to generate, service or batch
543
509
  """
544
510
  return pulumi.get(self, "token_type")
545
511
 
@@ -652,32 +618,15 @@ class _AuthBackendRoleState:
652
618
  The standard scope "openid" is automatically included and need not be specified.
653
619
  :param pulumi.Input[str] role_name: The name of the role.
654
620
  :param pulumi.Input[str] role_type: Type of role, either "oidc" (default) or "jwt".
655
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
656
- addresses which can authenticate successfully, and ties the resulting token to these blocks
657
- as well.
658
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
659
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
660
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
661
- `token_max_ttl` would otherwise allow a renewal.
662
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
663
- Its current value will be referenced at renewal time.
664
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
665
- generated tokens; otherwise it will be added to the policies set in token_policies.
666
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/jwt#token_num_uses)
667
- of times a generated token may be used (within its lifetime); 0 means unlimited.
668
- :param pulumi.Input[int] token_period: If set, indicates that the
669
- token generated using this role should never expire. The token should be renewed within the
670
- duration specified by this value. At each renewal, the token's TTL will be set to the
671
- value of this field. Specified in seconds.
672
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
673
- on the auth method, this list may be supplemented by user/group/other values.
674
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
675
- Its current value will be referenced at renewal time.
676
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
677
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
678
- `service` tokens). For token store roles, there are two additional possibilities:
679
- `default-service` and `default-batch` which specify the type to return unless the client
680
- requests a different type at generation time.
621
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
622
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
623
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
624
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
625
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
626
+ :param pulumi.Input[int] token_period: Generated Token's Period
627
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
628
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
629
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
681
630
  :param pulumi.Input[str] user_claim: The claim to use to uniquely identify
682
631
  the user; this will be used as the name for the Identity entity alias created
683
632
  due to a successful login.
@@ -980,9 +929,7 @@ class _AuthBackendRoleState:
980
929
  @pulumi.getter(name="tokenBoundCidrs")
981
930
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
982
931
  """
983
- List of CIDR blocks; if set, specifies blocks of IP
984
- addresses which can authenticate successfully, and ties the resulting token to these blocks
985
- as well.
932
+ Specifies the blocks of IP addresses which are allowed to use the generated token
986
933
  """
987
934
  return pulumi.get(self, "token_bound_cidrs")
988
935
 
@@ -994,10 +941,7 @@ class _AuthBackendRoleState:
994
941
  @pulumi.getter(name="tokenExplicitMaxTtl")
995
942
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
996
943
  """
997
- If set, will encode an
998
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
999
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1000
- `token_max_ttl` would otherwise allow a renewal.
944
+ Generated Token's Explicit Maximum TTL in seconds
1001
945
  """
1002
946
  return pulumi.get(self, "token_explicit_max_ttl")
1003
947
 
@@ -1009,8 +953,7 @@ class _AuthBackendRoleState:
1009
953
  @pulumi.getter(name="tokenMaxTtl")
1010
954
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
1011
955
  """
1012
- The maximum lifetime for generated tokens in number of seconds.
1013
- Its current value will be referenced at renewal time.
956
+ The maximum lifetime of the generated token
1014
957
  """
1015
958
  return pulumi.get(self, "token_max_ttl")
1016
959
 
@@ -1022,8 +965,7 @@ class _AuthBackendRoleState:
1022
965
  @pulumi.getter(name="tokenNoDefaultPolicy")
1023
966
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
1024
967
  """
1025
- If set, the default policy will not be set on
1026
- generated tokens; otherwise it will be added to the policies set in token_policies.
968
+ If true, the 'default' policy will not automatically be added to generated tokens
1027
969
  """
1028
970
  return pulumi.get(self, "token_no_default_policy")
1029
971
 
@@ -1035,8 +977,7 @@ class _AuthBackendRoleState:
1035
977
  @pulumi.getter(name="tokenNumUses")
1036
978
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
1037
979
  """
1038
- The [maximum number](https://www.vaultproject.io/api-docs/jwt#token_num_uses)
1039
- of times a generated token may be used (within its lifetime); 0 means unlimited.
980
+ The maximum number of times a token may be used, a value of zero means unlimited
1040
981
  """
1041
982
  return pulumi.get(self, "token_num_uses")
1042
983
 
@@ -1048,10 +989,7 @@ class _AuthBackendRoleState:
1048
989
  @pulumi.getter(name="tokenPeriod")
1049
990
  def token_period(self) -> Optional[pulumi.Input[int]]:
1050
991
  """
1051
- If set, indicates that the
1052
- token generated using this role should never expire. The token should be renewed within the
1053
- duration specified by this value. At each renewal, the token's TTL will be set to the
1054
- value of this field. Specified in seconds.
992
+ Generated Token's Period
1055
993
  """
1056
994
  return pulumi.get(self, "token_period")
1057
995
 
@@ -1063,8 +1001,7 @@ class _AuthBackendRoleState:
1063
1001
  @pulumi.getter(name="tokenPolicies")
1064
1002
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
1065
1003
  """
1066
- List of policies to encode onto generated tokens. Depending
1067
- on the auth method, this list may be supplemented by user/group/other values.
1004
+ Generated Token's Policies
1068
1005
  """
1069
1006
  return pulumi.get(self, "token_policies")
1070
1007
 
@@ -1076,8 +1013,7 @@ class _AuthBackendRoleState:
1076
1013
  @pulumi.getter(name="tokenTtl")
1077
1014
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
1078
1015
  """
1079
- The incremental lifetime for generated tokens in number of seconds.
1080
- Its current value will be referenced at renewal time.
1016
+ The initial ttl of the token to generate in seconds
1081
1017
  """
1082
1018
  return pulumi.get(self, "token_ttl")
1083
1019
 
@@ -1089,11 +1025,7 @@ class _AuthBackendRoleState:
1089
1025
  @pulumi.getter(name="tokenType")
1090
1026
  def token_type(self) -> Optional[pulumi.Input[str]]:
1091
1027
  """
1092
- The type of token that should be generated. Can be `service`,
1093
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
1094
- `service` tokens). For token store roles, there are two additional possibilities:
1095
- `default-service` and `default-batch` which specify the type to return unless the client
1096
- requests a different type at generation time.
1028
+ The type of token to generate, service or batch
1097
1029
  """
1098
1030
  return pulumi.get(self, "token_type")
1099
1031
 
@@ -1189,7 +1121,6 @@ class AuthBackendRole(pulumi.CustomResource):
1189
1121
 
1190
1122
  Role for JWT backend:
1191
1123
 
1192
- <!--Start PulumiCodeChooser -->
1193
1124
  ```python
1194
1125
  import pulumi
1195
1126
  import pulumi_vault as vault
@@ -1210,11 +1141,9 @@ class AuthBackendRole(pulumi.CustomResource):
1210
1141
  user_claim="https://vault/user",
1211
1142
  role_type="jwt")
1212
1143
  ```
1213
- <!--End PulumiCodeChooser -->
1214
1144
 
1215
1145
  Role for OIDC backend:
1216
1146
 
1217
- <!--Start PulumiCodeChooser -->
1218
1147
  ```python
1219
1148
  import pulumi
1220
1149
  import pulumi_vault as vault
@@ -1234,7 +1163,6 @@ class AuthBackendRole(pulumi.CustomResource):
1234
1163
  role_type="oidc",
1235
1164
  allowed_redirect_uris=["http://localhost:8200/ui/vault/auth/oidc/oidc/callback"])
1236
1165
  ```
1237
- <!--End PulumiCodeChooser -->
1238
1166
 
1239
1167
  ## Import
1240
1168
 
@@ -1287,32 +1215,15 @@ class AuthBackendRole(pulumi.CustomResource):
1287
1215
  The standard scope "openid" is automatically included and need not be specified.
1288
1216
  :param pulumi.Input[str] role_name: The name of the role.
1289
1217
  :param pulumi.Input[str] role_type: Type of role, either "oidc" (default) or "jwt".
1290
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
1291
- addresses which can authenticate successfully, and ties the resulting token to these blocks
1292
- as well.
1293
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
1294
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1295
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1296
- `token_max_ttl` would otherwise allow a renewal.
1297
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
1298
- Its current value will be referenced at renewal time.
1299
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
1300
- generated tokens; otherwise it will be added to the policies set in token_policies.
1301
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/jwt#token_num_uses)
1302
- of times a generated token may be used (within its lifetime); 0 means unlimited.
1303
- :param pulumi.Input[int] token_period: If set, indicates that the
1304
- token generated using this role should never expire. The token should be renewed within the
1305
- duration specified by this value. At each renewal, the token's TTL will be set to the
1306
- value of this field. Specified in seconds.
1307
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
1308
- on the auth method, this list may be supplemented by user/group/other values.
1309
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
1310
- Its current value will be referenced at renewal time.
1311
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
1312
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
1313
- `service` tokens). For token store roles, there are two additional possibilities:
1314
- `default-service` and `default-batch` which specify the type to return unless the client
1315
- requests a different type at generation time.
1218
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
1219
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
1220
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
1221
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
1222
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
1223
+ :param pulumi.Input[int] token_period: Generated Token's Period
1224
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
1225
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
1226
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
1316
1227
  :param pulumi.Input[str] user_claim: The claim to use to uniquely identify
1317
1228
  the user; this will be used as the name for the Identity entity alias created
1318
1229
  due to a successful login.
@@ -1339,7 +1250,6 @@ class AuthBackendRole(pulumi.CustomResource):
1339
1250
 
1340
1251
  Role for JWT backend:
1341
1252
 
1342
- <!--Start PulumiCodeChooser -->
1343
1253
  ```python
1344
1254
  import pulumi
1345
1255
  import pulumi_vault as vault
@@ -1360,11 +1270,9 @@ class AuthBackendRole(pulumi.CustomResource):
1360
1270
  user_claim="https://vault/user",
1361
1271
  role_type="jwt")
1362
1272
  ```
1363
- <!--End PulumiCodeChooser -->
1364
1273
 
1365
1274
  Role for OIDC backend:
1366
1275
 
1367
- <!--Start PulumiCodeChooser -->
1368
1276
  ```python
1369
1277
  import pulumi
1370
1278
  import pulumi_vault as vault
@@ -1384,7 +1292,6 @@ class AuthBackendRole(pulumi.CustomResource):
1384
1292
  role_type="oidc",
1385
1293
  allowed_redirect_uris=["http://localhost:8200/ui/vault/auth/oidc/oidc/callback"])
1386
1294
  ```
1387
- <!--End PulumiCodeChooser -->
1388
1295
 
1389
1296
  ## Import
1390
1297
 
@@ -1567,32 +1474,15 @@ class AuthBackendRole(pulumi.CustomResource):
1567
1474
  The standard scope "openid" is automatically included and need not be specified.
1568
1475
  :param pulumi.Input[str] role_name: The name of the role.
1569
1476
  :param pulumi.Input[str] role_type: Type of role, either "oidc" (default) or "jwt".
1570
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
1571
- addresses which can authenticate successfully, and ties the resulting token to these blocks
1572
- as well.
1573
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
1574
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1575
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1576
- `token_max_ttl` would otherwise allow a renewal.
1577
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
1578
- Its current value will be referenced at renewal time.
1579
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
1580
- generated tokens; otherwise it will be added to the policies set in token_policies.
1581
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/jwt#token_num_uses)
1582
- of times a generated token may be used (within its lifetime); 0 means unlimited.
1583
- :param pulumi.Input[int] token_period: If set, indicates that the
1584
- token generated using this role should never expire. The token should be renewed within the
1585
- duration specified by this value. At each renewal, the token's TTL will be set to the
1586
- value of this field. Specified in seconds.
1587
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
1588
- on the auth method, this list may be supplemented by user/group/other values.
1589
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
1590
- Its current value will be referenced at renewal time.
1591
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
1592
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
1593
- `service` tokens). For token store roles, there are two additional possibilities:
1594
- `default-service` and `default-batch` which specify the type to return unless the client
1595
- requests a different type at generation time.
1477
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
1478
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
1479
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
1480
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
1481
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
1482
+ :param pulumi.Input[int] token_period: Generated Token's Period
1483
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
1484
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
1485
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
1596
1486
  :param pulumi.Input[str] user_claim: The claim to use to uniquely identify
1597
1487
  the user; this will be used as the name for the Identity entity alias created
1598
1488
  due to a successful login.
@@ -1803,9 +1693,7 @@ class AuthBackendRole(pulumi.CustomResource):
1803
1693
  @pulumi.getter(name="tokenBoundCidrs")
1804
1694
  def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
1805
1695
  """
1806
- List of CIDR blocks; if set, specifies blocks of IP
1807
- addresses which can authenticate successfully, and ties the resulting token to these blocks
1808
- as well.
1696
+ Specifies the blocks of IP addresses which are allowed to use the generated token
1809
1697
  """
1810
1698
  return pulumi.get(self, "token_bound_cidrs")
1811
1699
 
@@ -1813,10 +1701,7 @@ class AuthBackendRole(pulumi.CustomResource):
1813
1701
  @pulumi.getter(name="tokenExplicitMaxTtl")
1814
1702
  def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
1815
1703
  """
1816
- If set, will encode an
1817
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1818
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1819
- `token_max_ttl` would otherwise allow a renewal.
1704
+ Generated Token's Explicit Maximum TTL in seconds
1820
1705
  """
1821
1706
  return pulumi.get(self, "token_explicit_max_ttl")
1822
1707
 
@@ -1824,8 +1709,7 @@ class AuthBackendRole(pulumi.CustomResource):
1824
1709
  @pulumi.getter(name="tokenMaxTtl")
1825
1710
  def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
1826
1711
  """
1827
- The maximum lifetime for generated tokens in number of seconds.
1828
- Its current value will be referenced at renewal time.
1712
+ The maximum lifetime of the generated token
1829
1713
  """
1830
1714
  return pulumi.get(self, "token_max_ttl")
1831
1715
 
@@ -1833,8 +1717,7 @@ class AuthBackendRole(pulumi.CustomResource):
1833
1717
  @pulumi.getter(name="tokenNoDefaultPolicy")
1834
1718
  def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
1835
1719
  """
1836
- If set, the default policy will not be set on
1837
- generated tokens; otherwise it will be added to the policies set in token_policies.
1720
+ If true, the 'default' policy will not automatically be added to generated tokens
1838
1721
  """
1839
1722
  return pulumi.get(self, "token_no_default_policy")
1840
1723
 
@@ -1842,8 +1725,7 @@ class AuthBackendRole(pulumi.CustomResource):
1842
1725
  @pulumi.getter(name="tokenNumUses")
1843
1726
  def token_num_uses(self) -> pulumi.Output[Optional[int]]:
1844
1727
  """
1845
- The [maximum number](https://www.vaultproject.io/api-docs/jwt#token_num_uses)
1846
- of times a generated token may be used (within its lifetime); 0 means unlimited.
1728
+ The maximum number of times a token may be used, a value of zero means unlimited
1847
1729
  """
1848
1730
  return pulumi.get(self, "token_num_uses")
1849
1731
 
@@ -1851,10 +1733,7 @@ class AuthBackendRole(pulumi.CustomResource):
1851
1733
  @pulumi.getter(name="tokenPeriod")
1852
1734
  def token_period(self) -> pulumi.Output[Optional[int]]:
1853
1735
  """
1854
- If set, indicates that the
1855
- token generated using this role should never expire. The token should be renewed within the
1856
- duration specified by this value. At each renewal, the token's TTL will be set to the
1857
- value of this field. Specified in seconds.
1736
+ Generated Token's Period
1858
1737
  """
1859
1738
  return pulumi.get(self, "token_period")
1860
1739
 
@@ -1862,8 +1741,7 @@ class AuthBackendRole(pulumi.CustomResource):
1862
1741
  @pulumi.getter(name="tokenPolicies")
1863
1742
  def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
1864
1743
  """
1865
- List of policies to encode onto generated tokens. Depending
1866
- on the auth method, this list may be supplemented by user/group/other values.
1744
+ Generated Token's Policies
1867
1745
  """
1868
1746
  return pulumi.get(self, "token_policies")
1869
1747
 
@@ -1871,8 +1749,7 @@ class AuthBackendRole(pulumi.CustomResource):
1871
1749
  @pulumi.getter(name="tokenTtl")
1872
1750
  def token_ttl(self) -> pulumi.Output[Optional[int]]:
1873
1751
  """
1874
- The incremental lifetime for generated tokens in number of seconds.
1875
- Its current value will be referenced at renewal time.
1752
+ The initial ttl of the token to generate in seconds
1876
1753
  """
1877
1754
  return pulumi.get(self, "token_ttl")
1878
1755
 
@@ -1880,11 +1757,7 @@ class AuthBackendRole(pulumi.CustomResource):
1880
1757
  @pulumi.getter(name="tokenType")
1881
1758
  def token_type(self) -> pulumi.Output[Optional[str]]:
1882
1759
  """
1883
- The type of token that should be generated. Can be `service`,
1884
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
1885
- `service` tokens). For token store roles, there are two additional possibilities:
1886
- `default-service` and `default-batch` which specify the type to return unless the client
1887
- requests a different type at generation time.
1760
+ The type of token to generate, service or batch
1888
1761
  """
1889
1762
  return pulumi.get(self, "token_type")
1890
1763
 
@@ -488,7 +488,6 @@ class SecretBackend(pulumi.CustomResource):
488
488
 
489
489
  ## Example Usage
490
490
 
491
- <!--Start PulumiCodeChooser -->
492
491
  ```python
493
492
  import pulumi
494
493
  import pulumi_vault as vault
@@ -506,7 +505,6 @@ class SecretBackend(pulumi.CustomResource):
506
505
  default_tls_client_key_bits=4096,
507
506
  default_tls_client_ttl=86400)
508
507
  ```
509
- <!--End PulumiCodeChooser -->
510
508
 
511
509
  ## Import
512
510
 
@@ -550,7 +548,6 @@ class SecretBackend(pulumi.CustomResource):
550
548
 
551
549
  ## Example Usage
552
550
 
553
- <!--Start PulumiCodeChooser -->
554
551
  ```python
555
552
  import pulumi
556
553
  import pulumi_vault as vault
@@ -568,7 +565,6 @@ class SecretBackend(pulumi.CustomResource):
568
565
  default_tls_client_key_bits=4096,
569
566
  default_tls_client_ttl=86400)
570
567
  ```
571
- <!--End PulumiCodeChooser -->
572
568
 
573
569
  ## Import
574
570
 
@@ -746,7 +746,6 @@ class SecretRole(pulumi.CustomResource):
746
746
 
747
747
  ## Example Usage
748
748
 
749
- <!--Start PulumiCodeChooser -->
750
749
  ```python
751
750
  import pulumi
752
751
  import pulumi_vault as vault
@@ -770,7 +769,6 @@ class SecretRole(pulumi.CustomResource):
770
769
  operation_create=True,
771
770
  operation_destroy=True)
772
771
  ```
773
- <!--End PulumiCodeChooser -->
774
772
 
775
773
  ## Import
776
774
 
@@ -821,7 +819,6 @@ class SecretRole(pulumi.CustomResource):
821
819
 
822
820
  ## Example Usage
823
821
 
824
- <!--Start PulumiCodeChooser -->
825
822
  ```python
826
823
  import pulumi
827
824
  import pulumi_vault as vault
@@ -845,7 +842,6 @@ class SecretRole(pulumi.CustomResource):
845
842
  operation_create=True,
846
843
  operation_destroy=True)
847
844
  ```
848
- <!--End PulumiCodeChooser -->
849
845
 
850
846
  ## Import
851
847
 
@@ -186,7 +186,6 @@ class SecretScope(pulumi.CustomResource):
186
186
 
187
187
  ## Example Usage
188
188
 
189
- <!--Start PulumiCodeChooser -->
190
189
  ```python
191
190
  import pulumi
192
191
  import pulumi_vault as vault
@@ -199,7 +198,6 @@ class SecretScope(pulumi.CustomResource):
199
198
  scope="dev",
200
199
  force=True)
201
200
  ```
202
- <!--End PulumiCodeChooser -->
203
201
 
204
202
  ## Import
205
203
 
@@ -233,7 +231,6 @@ class SecretScope(pulumi.CustomResource):
233
231
 
234
232
  ## Example Usage
235
233
 
236
- <!--Start PulumiCodeChooser -->
237
234
  ```python
238
235
  import pulumi
239
236
  import pulumi_vault as vault
@@ -246,7 +243,6 @@ class SecretScope(pulumi.CustomResource):
246
243
  scope="dev",
247
244
  force=True)
248
245
  ```
249
- <!--End PulumiCodeChooser -->
250
246
 
251
247
  ## Import
252
248
 
@@ -348,7 +348,6 @@ class AuthBackendConfig(pulumi.CustomResource):
348
348
 
349
349
  ## Example Usage
350
350
 
351
- <!--Start PulumiCodeChooser -->
352
351
  ```python
353
352
  import pulumi
354
353
  import pulumi_vault as vault
@@ -364,7 +363,6 @@ class AuthBackendConfig(pulumi.CustomResource):
364
363
  issuer="api",
365
364
  disable_iss_validation=True)
366
365
  ```
367
- <!--End PulumiCodeChooser -->
368
366
 
369
367
  ## Import
370
368
 
@@ -402,7 +400,6 @@ class AuthBackendConfig(pulumi.CustomResource):
402
400
 
403
401
  ## Example Usage
404
402
 
405
- <!--Start PulumiCodeChooser -->
406
403
  ```python
407
404
  import pulumi
408
405
  import pulumi_vault as vault
@@ -418,7 +415,6 @@ class AuthBackendConfig(pulumi.CustomResource):
418
415
  issuer="api",
419
416
  disable_iss_validation=True)
420
417
  ```
421
- <!--End PulumiCodeChooser -->
422
418
 
423
419
  ## Import
424
420