pulumi-vault 6.2.0a1713561465__py3-none-any.whl → 6.2.0a1714114277__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (179) hide show
  1. pulumi_vault/_inputs.py +0 -20
  2. pulumi_vault/ad/secret_backend.py +0 -4
  3. pulumi_vault/ad/secret_library.py +0 -4
  4. pulumi_vault/ad/secret_role.py +0 -4
  5. pulumi_vault/alicloud/auth_backend_role.py +63 -186
  6. pulumi_vault/approle/auth_backend_login.py +0 -4
  7. pulumi_vault/approle/auth_backend_role.py +63 -186
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
  9. pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
  10. pulumi_vault/audit.py +0 -8
  11. pulumi_vault/audit_request_header.py +0 -4
  12. pulumi_vault/aws/auth_backend_client.py +0 -4
  13. pulumi_vault/aws/auth_backend_config_identity.py +0 -4
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -4
  15. pulumi_vault/aws/auth_backend_role.py +63 -186
  16. pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -4
  17. pulumi_vault/aws/auth_backend_sts_role.py +0 -4
  18. pulumi_vault/aws/secret_backend_role.py +0 -4
  19. pulumi_vault/aws/secret_backend_static_role.py +0 -4
  20. pulumi_vault/azure/auth_backend_config.py +0 -4
  21. pulumi_vault/azure/auth_backend_role.py +63 -186
  22. pulumi_vault/azure/backend.py +0 -8
  23. pulumi_vault/azure/backend_role.py +0 -4
  24. pulumi_vault/azure/get_access_credentials.py +0 -4
  25. pulumi_vault/cert_auth_backend_role.py +63 -200
  26. pulumi_vault/consul/secret_backend.py +0 -8
  27. pulumi_vault/consul/secret_backend_role.py +0 -4
  28. pulumi_vault/database/_inputs.py +522 -784
  29. pulumi_vault/database/outputs.py +522 -784
  30. pulumi_vault/database/secret_backend_connection.py +0 -4
  31. pulumi_vault/database/secret_backend_role.py +0 -4
  32. pulumi_vault/database/secret_backend_static_role.py +0 -4
  33. pulumi_vault/database/secrets_mount.py +0 -4
  34. pulumi_vault/egp_policy.py +0 -4
  35. pulumi_vault/gcp/auth_backend_role.py +63 -264
  36. pulumi_vault/gcp/get_auth_backend_role.py +0 -4
  37. pulumi_vault/gcp/secret_backend.py +0 -4
  38. pulumi_vault/gcp/secret_impersonated_account.py +0 -4
  39. pulumi_vault/gcp/secret_roleset.py +0 -4
  40. pulumi_vault/gcp/secret_static_account.py +0 -4
  41. pulumi_vault/generic/endpoint.py +0 -4
  42. pulumi_vault/generic/get_secret.py +0 -8
  43. pulumi_vault/get_auth_backend.py +0 -4
  44. pulumi_vault/get_auth_backends.py +0 -8
  45. pulumi_vault/get_namespace.py +0 -12
  46. pulumi_vault/get_namespaces.py +0 -8
  47. pulumi_vault/get_nomad_access_token.py +0 -4
  48. pulumi_vault/get_policy_document.py +0 -4
  49. pulumi_vault/get_raft_autopilot_state.py +0 -4
  50. pulumi_vault/github/auth_backend.py +0 -4
  51. pulumi_vault/github/team.py +0 -4
  52. pulumi_vault/github/user.py +0 -4
  53. pulumi_vault/identity/entity.py +0 -4
  54. pulumi_vault/identity/entity_alias.py +0 -4
  55. pulumi_vault/identity/entity_policies.py +0 -8
  56. pulumi_vault/identity/get_entity.py +0 -4
  57. pulumi_vault/identity/get_group.py +0 -4
  58. pulumi_vault/identity/get_oidc_client_creds.py +0 -4
  59. pulumi_vault/identity/get_oidc_openid_config.py +0 -4
  60. pulumi_vault/identity/get_oidc_public_keys.py +0 -4
  61. pulumi_vault/identity/group.py +0 -12
  62. pulumi_vault/identity/group_alias.py +0 -4
  63. pulumi_vault/identity/group_member_entity_ids.py +0 -8
  64. pulumi_vault/identity/group_member_group_ids.py +0 -8
  65. pulumi_vault/identity/group_policies.py +0 -8
  66. pulumi_vault/identity/mfa_duo.py +0 -4
  67. pulumi_vault/identity/mfa_login_enforcement.py +0 -4
  68. pulumi_vault/identity/mfa_okta.py +0 -4
  69. pulumi_vault/identity/mfa_pingid.py +0 -4
  70. pulumi_vault/identity/mfa_totp.py +0 -4
  71. pulumi_vault/identity/oidc.py +0 -4
  72. pulumi_vault/identity/oidc_assignment.py +0 -4
  73. pulumi_vault/identity/oidc_client.py +0 -4
  74. pulumi_vault/identity/oidc_key.py +0 -4
  75. pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -4
  76. pulumi_vault/identity/oidc_provider.py +0 -4
  77. pulumi_vault/identity/oidc_role.py +0 -8
  78. pulumi_vault/identity/oidc_scope.py +0 -4
  79. pulumi_vault/jwt/auth_backend.py +0 -12
  80. pulumi_vault/jwt/auth_backend_role.py +63 -190
  81. pulumi_vault/kmip/secret_backend.py +0 -4
  82. pulumi_vault/kmip/secret_role.py +0 -4
  83. pulumi_vault/kmip/secret_scope.py +0 -4
  84. pulumi_vault/kubernetes/auth_backend_config.py +0 -4
  85. pulumi_vault/kubernetes/auth_backend_role.py +56 -172
  86. pulumi_vault/kubernetes/get_service_account_token.py +0 -4
  87. pulumi_vault/kubernetes/secret_backend.py +0 -4
  88. pulumi_vault/kubernetes/secret_backend_role.py +0 -12
  89. pulumi_vault/kv/get_secret.py +0 -4
  90. pulumi_vault/kv/get_secret_subkeys_v2.py +0 -4
  91. pulumi_vault/kv/get_secret_v2.py +0 -4
  92. pulumi_vault/kv/get_secrets_list.py +0 -4
  93. pulumi_vault/kv/get_secrets_list_v2.py +0 -4
  94. pulumi_vault/kv/secret.py +0 -4
  95. pulumi_vault/kv/secret_backend_v2.py +0 -4
  96. pulumi_vault/kv/secret_v2.py +0 -4
  97. pulumi_vault/ldap/auth_backend.py +56 -151
  98. pulumi_vault/ldap/auth_backend_group.py +0 -4
  99. pulumi_vault/ldap/auth_backend_user.py +0 -4
  100. pulumi_vault/ldap/secret_backend.py +0 -4
  101. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
  102. pulumi_vault/ldap/secret_backend_library_set.py +0 -4
  103. pulumi_vault/ldap/secret_backend_static_role.py +0 -4
  104. pulumi_vault/managed/_inputs.py +84 -132
  105. pulumi_vault/managed/keys.py +7 -28
  106. pulumi_vault/managed/outputs.py +84 -132
  107. pulumi_vault/mfa_duo.py +0 -4
  108. pulumi_vault/mfa_okta.py +0 -4
  109. pulumi_vault/mfa_pingid.py +0 -4
  110. pulumi_vault/mfa_totp.py +0 -4
  111. pulumi_vault/mongodbatlas/secret_backend.py +0 -4
  112. pulumi_vault/mongodbatlas/secret_role.py +0 -4
  113. pulumi_vault/mount.py +0 -16
  114. pulumi_vault/nomad_secret_backend.py +0 -4
  115. pulumi_vault/nomad_secret_role.py +0 -4
  116. pulumi_vault/okta/_inputs.py +8 -8
  117. pulumi_vault/okta/auth_backend.py +0 -4
  118. pulumi_vault/okta/auth_backend_group.py +0 -4
  119. pulumi_vault/okta/auth_backend_user.py +0 -4
  120. pulumi_vault/okta/outputs.py +8 -8
  121. pulumi_vault/outputs.py +0 -20
  122. pulumi_vault/password_policy.py +0 -4
  123. pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
  124. pulumi_vault/pkisecret/get_backend_issuer.py +0 -4
  125. pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
  126. pulumi_vault/pkisecret/get_backend_key.py +0 -4
  127. pulumi_vault/pkisecret/get_backend_keys.py +0 -4
  128. pulumi_vault/pkisecret/secret_backend_cert.py +0 -4
  129. pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -4
  130. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
  131. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
  132. pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -4
  133. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -4
  134. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -4
  135. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
  136. pulumi_vault/pkisecret/secret_backend_role.py +0 -4
  137. pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -4
  138. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -4
  139. pulumi_vault/pkisecret/secret_backend_sign.py +0 -4
  140. pulumi_vault/quota_lease_count.py +0 -4
  141. pulumi_vault/quota_rate_limit.py +0 -4
  142. pulumi_vault/rabbitmq/secret_backend.py +0 -4
  143. pulumi_vault/rabbitmq/secret_backend_role.py +0 -4
  144. pulumi_vault/raft_autopilot.py +0 -4
  145. pulumi_vault/raft_snapshot_agent_config.py +91 -292
  146. pulumi_vault/rgp_policy.py +0 -4
  147. pulumi_vault/saml/auth_backend.py +0 -4
  148. pulumi_vault/saml/auth_backend_role.py +56 -172
  149. pulumi_vault/secrets/sync_association.py +0 -4
  150. pulumi_vault/secrets/sync_aws_destination.py +0 -4
  151. pulumi_vault/secrets/sync_azure_destination.py +0 -4
  152. pulumi_vault/secrets/sync_config.py +0 -4
  153. pulumi_vault/secrets/sync_gcp_destination.py +0 -4
  154. pulumi_vault/secrets/sync_gh_destination.py +0 -4
  155. pulumi_vault/secrets/sync_github_apps.py +0 -4
  156. pulumi_vault/secrets/sync_vercel_destination.py +0 -4
  157. pulumi_vault/ssh/_inputs.py +6 -20
  158. pulumi_vault/ssh/outputs.py +6 -20
  159. pulumi_vault/ssh/secret_backend_ca.py +0 -4
  160. pulumi_vault/ssh/secret_backend_role.py +0 -4
  161. pulumi_vault/terraformcloud/secret_backend.py +0 -4
  162. pulumi_vault/terraformcloud/secret_creds.py +0 -4
  163. pulumi_vault/terraformcloud/secret_role.py +0 -4
  164. pulumi_vault/token.py +0 -4
  165. pulumi_vault/tokenauth/auth_backend_role.py +56 -172
  166. pulumi_vault/transform/alphabet.py +0 -4
  167. pulumi_vault/transform/get_decode.py +0 -4
  168. pulumi_vault/transform/get_encode.py +0 -4
  169. pulumi_vault/transform/role.py +0 -4
  170. pulumi_vault/transform/template.py +0 -4
  171. pulumi_vault/transit/get_decrypt.py +0 -16
  172. pulumi_vault/transit/get_encrypt.py +0 -14
  173. pulumi_vault/transit/secret_backend_key.py +0 -4
  174. pulumi_vault/transit/secret_cache_config.py +0 -4
  175. {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/METADATA +1 -1
  176. pulumi_vault-6.2.0a1714114277.dist-info/RECORD +252 -0
  177. pulumi_vault-6.2.0a1713561465.dist-info/RECORD +0 -252
  178. {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/WHEEL +0 -0
  179. {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/top_level.txt +0 -0
@@ -47,31 +47,15 @@ class AuthBackendRoleArgs:
47
47
  The value should not contain leading or trailing forward slashes.
48
48
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
49
49
  *Available only for Vault Enterprise*.
50
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
51
- addresses which can authenticate successfully, and ties the resulting token to these blocks
52
- as well.
53
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
54
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
55
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
56
- `token_max_ttl` would otherwise allow a renewal.
57
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
58
- Its current value will be referenced at renewal time.
59
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
60
- generated tokens; otherwise it will be added to the policies set in token_policies.
61
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/kubernetes#token_num_uses)
62
- of times a generated token may be used (within its lifetime); 0 means unlimited.
63
- :param pulumi.Input[int] token_period: If set, indicates that the
64
- token generated using this role should never expire. The token should be renewed within the
65
- duration specified by this value. At each renewal, the token's TTL will be set to the
66
- value of this field. Specified in seconds.
67
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
68
- on the auth method, this list may be supplemented by user/group/other values.
50
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
51
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
52
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
53
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
54
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
55
+ :param pulumi.Input[int] token_period: Generated Token's Period
56
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
69
57
  :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
70
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
71
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
72
- `service` tokens). For token store roles, there are two additional possibilities:
73
- `default-service` and `default-batch` which specify the type to return unless the client
74
- requests a different type at generation time.
58
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
75
59
  """
76
60
  pulumi.set(__self__, "bound_service_account_names", bound_service_account_names)
77
61
  pulumi.set(__self__, "bound_service_account_namespaces", bound_service_account_namespaces)
@@ -199,9 +183,7 @@ class AuthBackendRoleArgs:
199
183
  @pulumi.getter(name="tokenBoundCidrs")
200
184
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
201
185
  """
202
- List of CIDR blocks; if set, specifies blocks of IP
203
- addresses which can authenticate successfully, and ties the resulting token to these blocks
204
- as well.
186
+ Specifies the blocks of IP addresses which are allowed to use the generated token
205
187
  """
206
188
  return pulumi.get(self, "token_bound_cidrs")
207
189
 
@@ -213,10 +195,7 @@ class AuthBackendRoleArgs:
213
195
  @pulumi.getter(name="tokenExplicitMaxTtl")
214
196
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
215
197
  """
216
- If set, will encode an
217
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
218
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
219
- `token_max_ttl` would otherwise allow a renewal.
198
+ Generated Token's Explicit Maximum TTL in seconds
220
199
  """
221
200
  return pulumi.get(self, "token_explicit_max_ttl")
222
201
 
@@ -228,8 +207,7 @@ class AuthBackendRoleArgs:
228
207
  @pulumi.getter(name="tokenMaxTtl")
229
208
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
230
209
  """
231
- The maximum lifetime for generated tokens in number of seconds.
232
- Its current value will be referenced at renewal time.
210
+ The maximum lifetime of the generated token
233
211
  """
234
212
  return pulumi.get(self, "token_max_ttl")
235
213
 
@@ -241,8 +219,7 @@ class AuthBackendRoleArgs:
241
219
  @pulumi.getter(name="tokenNoDefaultPolicy")
242
220
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
243
221
  """
244
- If set, the default policy will not be set on
245
- generated tokens; otherwise it will be added to the policies set in token_policies.
222
+ If true, the 'default' policy will not automatically be added to generated tokens
246
223
  """
247
224
  return pulumi.get(self, "token_no_default_policy")
248
225
 
@@ -254,8 +231,7 @@ class AuthBackendRoleArgs:
254
231
  @pulumi.getter(name="tokenNumUses")
255
232
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
256
233
  """
257
- The [maximum number](https://www.vaultproject.io/api-docs/kubernetes#token_num_uses)
258
- of times a generated token may be used (within its lifetime); 0 means unlimited.
234
+ The maximum number of times a token may be used, a value of zero means unlimited
259
235
  """
260
236
  return pulumi.get(self, "token_num_uses")
261
237
 
@@ -267,10 +243,7 @@ class AuthBackendRoleArgs:
267
243
  @pulumi.getter(name="tokenPeriod")
268
244
  def token_period(self) -> Optional[pulumi.Input[int]]:
269
245
  """
270
- If set, indicates that the
271
- token generated using this role should never expire. The token should be renewed within the
272
- duration specified by this value. At each renewal, the token's TTL will be set to the
273
- value of this field. Specified in seconds.
246
+ Generated Token's Period
274
247
  """
275
248
  return pulumi.get(self, "token_period")
276
249
 
@@ -282,8 +255,7 @@ class AuthBackendRoleArgs:
282
255
  @pulumi.getter(name="tokenPolicies")
283
256
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
284
257
  """
285
- List of policies to encode onto generated tokens. Depending
286
- on the auth method, this list may be supplemented by user/group/other values.
258
+ Generated Token's Policies
287
259
  """
288
260
  return pulumi.get(self, "token_policies")
289
261
 
@@ -307,11 +279,7 @@ class AuthBackendRoleArgs:
307
279
  @pulumi.getter(name="tokenType")
308
280
  def token_type(self) -> Optional[pulumi.Input[str]]:
309
281
  """
310
- The type of token that should be generated. Can be `service`,
311
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
312
- `service` tokens). For token store roles, there are two additional possibilities:
313
- `default-service` and `default-batch` which specify the type to return unless the client
314
- requests a different type at generation time.
282
+ The type of token to generate, service or batch
315
283
  """
316
284
  return pulumi.get(self, "token_type")
317
285
 
@@ -356,31 +324,15 @@ class _AuthBackendRoleState:
356
324
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
357
325
  *Available only for Vault Enterprise*.
358
326
  :param pulumi.Input[str] role_name: Name of the role.
359
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
360
- addresses which can authenticate successfully, and ties the resulting token to these blocks
361
- as well.
362
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
363
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
364
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
365
- `token_max_ttl` would otherwise allow a renewal.
366
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
367
- Its current value will be referenced at renewal time.
368
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
369
- generated tokens; otherwise it will be added to the policies set in token_policies.
370
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/kubernetes#token_num_uses)
371
- of times a generated token may be used (within its lifetime); 0 means unlimited.
372
- :param pulumi.Input[int] token_period: If set, indicates that the
373
- token generated using this role should never expire. The token should be renewed within the
374
- duration specified by this value. At each renewal, the token's TTL will be set to the
375
- value of this field. Specified in seconds.
376
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
377
- on the auth method, this list may be supplemented by user/group/other values.
327
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
328
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
329
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
330
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
331
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
332
+ :param pulumi.Input[int] token_period: Generated Token's Period
333
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
378
334
  :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
379
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
380
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
381
- `service` tokens). For token store roles, there are two additional possibilities:
382
- `default-service` and `default-batch` which specify the type to return unless the client
383
- requests a different type at generation time.
335
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
384
336
  """
385
337
  if alias_name_source is not None:
386
338
  pulumi.set(__self__, "alias_name_source", alias_name_source)
@@ -511,9 +463,7 @@ class _AuthBackendRoleState:
511
463
  @pulumi.getter(name="tokenBoundCidrs")
512
464
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
513
465
  """
514
- List of CIDR blocks; if set, specifies blocks of IP
515
- addresses which can authenticate successfully, and ties the resulting token to these blocks
516
- as well.
466
+ Specifies the blocks of IP addresses which are allowed to use the generated token
517
467
  """
518
468
  return pulumi.get(self, "token_bound_cidrs")
519
469
 
@@ -525,10 +475,7 @@ class _AuthBackendRoleState:
525
475
  @pulumi.getter(name="tokenExplicitMaxTtl")
526
476
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
527
477
  """
528
- If set, will encode an
529
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
530
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
531
- `token_max_ttl` would otherwise allow a renewal.
478
+ Generated Token's Explicit Maximum TTL in seconds
532
479
  """
533
480
  return pulumi.get(self, "token_explicit_max_ttl")
534
481
 
@@ -540,8 +487,7 @@ class _AuthBackendRoleState:
540
487
  @pulumi.getter(name="tokenMaxTtl")
541
488
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
542
489
  """
543
- The maximum lifetime for generated tokens in number of seconds.
544
- Its current value will be referenced at renewal time.
490
+ The maximum lifetime of the generated token
545
491
  """
546
492
  return pulumi.get(self, "token_max_ttl")
547
493
 
@@ -553,8 +499,7 @@ class _AuthBackendRoleState:
553
499
  @pulumi.getter(name="tokenNoDefaultPolicy")
554
500
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
555
501
  """
556
- If set, the default policy will not be set on
557
- generated tokens; otherwise it will be added to the policies set in token_policies.
502
+ If true, the 'default' policy will not automatically be added to generated tokens
558
503
  """
559
504
  return pulumi.get(self, "token_no_default_policy")
560
505
 
@@ -566,8 +511,7 @@ class _AuthBackendRoleState:
566
511
  @pulumi.getter(name="tokenNumUses")
567
512
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
568
513
  """
569
- The [maximum number](https://www.vaultproject.io/api-docs/kubernetes#token_num_uses)
570
- of times a generated token may be used (within its lifetime); 0 means unlimited.
514
+ The maximum number of times a token may be used, a value of zero means unlimited
571
515
  """
572
516
  return pulumi.get(self, "token_num_uses")
573
517
 
@@ -579,10 +523,7 @@ class _AuthBackendRoleState:
579
523
  @pulumi.getter(name="tokenPeriod")
580
524
  def token_period(self) -> Optional[pulumi.Input[int]]:
581
525
  """
582
- If set, indicates that the
583
- token generated using this role should never expire. The token should be renewed within the
584
- duration specified by this value. At each renewal, the token's TTL will be set to the
585
- value of this field. Specified in seconds.
526
+ Generated Token's Period
586
527
  """
587
528
  return pulumi.get(self, "token_period")
588
529
 
@@ -594,8 +535,7 @@ class _AuthBackendRoleState:
594
535
  @pulumi.getter(name="tokenPolicies")
595
536
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
596
537
  """
597
- List of policies to encode onto generated tokens. Depending
598
- on the auth method, this list may be supplemented by user/group/other values.
538
+ Generated Token's Policies
599
539
  """
600
540
  return pulumi.get(self, "token_policies")
601
541
 
@@ -619,11 +559,7 @@ class _AuthBackendRoleState:
619
559
  @pulumi.getter(name="tokenType")
620
560
  def token_type(self) -> Optional[pulumi.Input[str]]:
621
561
  """
622
- The type of token that should be generated. Can be `service`,
623
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
624
- `service` tokens). For token store roles, there are two additional possibilities:
625
- `default-service` and `default-batch` which specify the type to return unless the client
626
- requests a different type at generation time.
562
+ The type of token to generate, service or batch
627
563
  """
628
564
  return pulumi.get(self, "token_type")
629
565
 
@@ -661,7 +597,6 @@ class AuthBackendRole(pulumi.CustomResource):
661
597
 
662
598
  ## Example Usage
663
599
 
664
- <!--Start PulumiCodeChooser -->
665
600
  ```python
666
601
  import pulumi
667
602
  import pulumi_vault as vault
@@ -680,7 +615,6 @@ class AuthBackendRole(pulumi.CustomResource):
680
615
  ],
681
616
  audience="vault")
682
617
  ```
683
- <!--End PulumiCodeChooser -->
684
618
 
685
619
  ## Import
686
620
 
@@ -707,31 +641,15 @@ class AuthBackendRole(pulumi.CustomResource):
707
641
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
708
642
  *Available only for Vault Enterprise*.
709
643
  :param pulumi.Input[str] role_name: Name of the role.
710
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
711
- addresses which can authenticate successfully, and ties the resulting token to these blocks
712
- as well.
713
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
714
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
715
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
716
- `token_max_ttl` would otherwise allow a renewal.
717
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
718
- Its current value will be referenced at renewal time.
719
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
720
- generated tokens; otherwise it will be added to the policies set in token_policies.
721
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/kubernetes#token_num_uses)
722
- of times a generated token may be used (within its lifetime); 0 means unlimited.
723
- :param pulumi.Input[int] token_period: If set, indicates that the
724
- token generated using this role should never expire. The token should be renewed within the
725
- duration specified by this value. At each renewal, the token's TTL will be set to the
726
- value of this field. Specified in seconds.
727
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
728
- on the auth method, this list may be supplemented by user/group/other values.
644
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
645
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
646
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
647
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
648
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
649
+ :param pulumi.Input[int] token_period: Generated Token's Period
650
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
729
651
  :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
730
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
731
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
732
- `service` tokens). For token store roles, there are two additional possibilities:
733
- `default-service` and `default-batch` which specify the type to return unless the client
734
- requests a different type at generation time.
652
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
735
653
  """
736
654
  ...
737
655
  @overload
@@ -746,7 +664,6 @@ class AuthBackendRole(pulumi.CustomResource):
746
664
 
747
665
  ## Example Usage
748
666
 
749
- <!--Start PulumiCodeChooser -->
750
667
  ```python
751
668
  import pulumi
752
669
  import pulumi_vault as vault
@@ -765,7 +682,6 @@ class AuthBackendRole(pulumi.CustomResource):
765
682
  ],
766
683
  audience="vault")
767
684
  ```
768
- <!--End PulumiCodeChooser -->
769
685
 
770
686
  ## Import
771
687
 
@@ -885,31 +801,15 @@ class AuthBackendRole(pulumi.CustomResource):
885
801
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
886
802
  *Available only for Vault Enterprise*.
887
803
  :param pulumi.Input[str] role_name: Name of the role.
888
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
889
- addresses which can authenticate successfully, and ties the resulting token to these blocks
890
- as well.
891
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
892
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
893
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
894
- `token_max_ttl` would otherwise allow a renewal.
895
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
896
- Its current value will be referenced at renewal time.
897
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
898
- generated tokens; otherwise it will be added to the policies set in token_policies.
899
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/kubernetes#token_num_uses)
900
- of times a generated token may be used (within its lifetime); 0 means unlimited.
901
- :param pulumi.Input[int] token_period: If set, indicates that the
902
- token generated using this role should never expire. The token should be renewed within the
903
- duration specified by this value. At each renewal, the token's TTL will be set to the
904
- value of this field. Specified in seconds.
905
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
906
- on the auth method, this list may be supplemented by user/group/other values.
804
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
805
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
806
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
807
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
808
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
809
+ :param pulumi.Input[int] token_period: Generated Token's Period
810
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
907
811
  :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
908
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
909
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
910
- `service` tokens). For token store roles, there are two additional possibilities:
911
- `default-service` and `default-batch` which specify the type to return unless the client
912
- requests a different type at generation time.
812
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
913
813
  """
914
814
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
915
815
 
@@ -1001,9 +901,7 @@ class AuthBackendRole(pulumi.CustomResource):
1001
901
  @pulumi.getter(name="tokenBoundCidrs")
1002
902
  def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
1003
903
  """
1004
- List of CIDR blocks; if set, specifies blocks of IP
1005
- addresses which can authenticate successfully, and ties the resulting token to these blocks
1006
- as well.
904
+ Specifies the blocks of IP addresses which are allowed to use the generated token
1007
905
  """
1008
906
  return pulumi.get(self, "token_bound_cidrs")
1009
907
 
@@ -1011,10 +909,7 @@ class AuthBackendRole(pulumi.CustomResource):
1011
909
  @pulumi.getter(name="tokenExplicitMaxTtl")
1012
910
  def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
1013
911
  """
1014
- If set, will encode an
1015
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1016
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1017
- `token_max_ttl` would otherwise allow a renewal.
912
+ Generated Token's Explicit Maximum TTL in seconds
1018
913
  """
1019
914
  return pulumi.get(self, "token_explicit_max_ttl")
1020
915
 
@@ -1022,8 +917,7 @@ class AuthBackendRole(pulumi.CustomResource):
1022
917
  @pulumi.getter(name="tokenMaxTtl")
1023
918
  def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
1024
919
  """
1025
- The maximum lifetime for generated tokens in number of seconds.
1026
- Its current value will be referenced at renewal time.
920
+ The maximum lifetime of the generated token
1027
921
  """
1028
922
  return pulumi.get(self, "token_max_ttl")
1029
923
 
@@ -1031,8 +925,7 @@ class AuthBackendRole(pulumi.CustomResource):
1031
925
  @pulumi.getter(name="tokenNoDefaultPolicy")
1032
926
  def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
1033
927
  """
1034
- If set, the default policy will not be set on
1035
- generated tokens; otherwise it will be added to the policies set in token_policies.
928
+ If true, the 'default' policy will not automatically be added to generated tokens
1036
929
  """
1037
930
  return pulumi.get(self, "token_no_default_policy")
1038
931
 
@@ -1040,8 +933,7 @@ class AuthBackendRole(pulumi.CustomResource):
1040
933
  @pulumi.getter(name="tokenNumUses")
1041
934
  def token_num_uses(self) -> pulumi.Output[Optional[int]]:
1042
935
  """
1043
- The [maximum number](https://www.vaultproject.io/api-docs/kubernetes#token_num_uses)
1044
- of times a generated token may be used (within its lifetime); 0 means unlimited.
936
+ The maximum number of times a token may be used, a value of zero means unlimited
1045
937
  """
1046
938
  return pulumi.get(self, "token_num_uses")
1047
939
 
@@ -1049,10 +941,7 @@ class AuthBackendRole(pulumi.CustomResource):
1049
941
  @pulumi.getter(name="tokenPeriod")
1050
942
  def token_period(self) -> pulumi.Output[Optional[int]]:
1051
943
  """
1052
- If set, indicates that the
1053
- token generated using this role should never expire. The token should be renewed within the
1054
- duration specified by this value. At each renewal, the token's TTL will be set to the
1055
- value of this field. Specified in seconds.
944
+ Generated Token's Period
1056
945
  """
1057
946
  return pulumi.get(self, "token_period")
1058
947
 
@@ -1060,8 +949,7 @@ class AuthBackendRole(pulumi.CustomResource):
1060
949
  @pulumi.getter(name="tokenPolicies")
1061
950
  def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
1062
951
  """
1063
- List of policies to encode onto generated tokens. Depending
1064
- on the auth method, this list may be supplemented by user/group/other values.
952
+ Generated Token's Policies
1065
953
  """
1066
954
  return pulumi.get(self, "token_policies")
1067
955
 
@@ -1077,11 +965,7 @@ class AuthBackendRole(pulumi.CustomResource):
1077
965
  @pulumi.getter(name="tokenType")
1078
966
  def token_type(self) -> pulumi.Output[Optional[str]]:
1079
967
  """
1080
- The type of token that should be generated. Can be `service`,
1081
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
1082
- `service` tokens). For token store roles, there are two additional possibilities:
1083
- `default-service` and `default-batch` which specify the type to return unless the client
1084
- requests a different type at generation time.
968
+ The type of token to generate, service or batch
1085
969
  """
1086
970
  return pulumi.get(self, "token_type")
1087
971
 
@@ -180,7 +180,6 @@ def get_service_account_token(backend: Optional[str] = None,
180
180
  """
181
181
  ## Example Usage
182
182
 
183
- <!--Start PulumiCodeChooser -->
184
183
  ```python
185
184
  import pulumi
186
185
  import pulumi_std as std
@@ -214,7 +213,6 @@ def get_service_account_token(backend: Optional[str] = None,
214
213
  cluster_role_binding=False,
215
214
  ttl="1h")
216
215
  ```
217
- <!--End PulumiCodeChooser -->
218
216
 
219
217
 
220
218
  :param str backend: The Kubernetes secret backend to generate service account
@@ -269,7 +267,6 @@ def get_service_account_token_output(backend: Optional[pulumi.Input[str]] = None
269
267
  """
270
268
  ## Example Usage
271
269
 
272
- <!--Start PulumiCodeChooser -->
273
270
  ```python
274
271
  import pulumi
275
272
  import pulumi_std as std
@@ -303,7 +300,6 @@ def get_service_account_token_output(backend: Optional[pulumi.Input[str]] = None
303
300
  cluster_role_binding=False,
304
301
  ttl="1h")
305
302
  ```
306
- <!--End PulumiCodeChooser -->
307
303
 
308
304
 
309
305
  :param str backend: The Kubernetes secret backend to generate service account
@@ -623,7 +623,6 @@ class SecretBackend(pulumi.CustomResource):
623
623
  """
624
624
  ## Example Usage
625
625
 
626
- <!--Start PulumiCodeChooser -->
627
626
  ```python
628
627
  import pulumi
629
628
  import pulumi_std as std
@@ -639,7 +638,6 @@ class SecretBackend(pulumi.CustomResource):
639
638
  service_account_jwt=std.file(input="/path/to/token").result,
640
639
  disable_local_ca_jwt=False)
641
640
  ```
642
- <!--End PulumiCodeChooser -->
643
641
 
644
642
  ## Import
645
643
 
@@ -688,7 +686,6 @@ class SecretBackend(pulumi.CustomResource):
688
686
  """
689
687
  ## Example Usage
690
688
 
691
- <!--Start PulumiCodeChooser -->
692
689
  ```python
693
690
  import pulumi
694
691
  import pulumi_std as std
@@ -704,7 +701,6 @@ class SecretBackend(pulumi.CustomResource):
704
701
  service_account_jwt=std.file(input="/path/to/token").result,
705
702
  disable_local_ca_jwt=False)
706
703
  ```
707
- <!--End PulumiCodeChooser -->
708
704
 
709
705
  ## Import
710
706
 
@@ -591,7 +591,6 @@ class SecretBackendRole(pulumi.CustomResource):
591
591
 
592
592
  Example using `service_account_name` mode:
593
593
 
594
- <!--Start PulumiCodeChooser -->
595
594
  ```python
596
595
  import pulumi
597
596
  import pulumi_std as std
@@ -620,11 +619,9 @@ class SecretBackendRole(pulumi.CustomResource):
620
619
  "location": "earth",
621
620
  })
622
621
  ```
623
- <!--End PulumiCodeChooser -->
624
622
 
625
623
  Example using `kubernetes_role_name` mode:
626
624
 
627
- <!--Start PulumiCodeChooser -->
628
625
  ```python
629
626
  import pulumi
630
627
  import pulumi_std as std
@@ -653,11 +650,9 @@ class SecretBackendRole(pulumi.CustomResource):
653
650
  "location": "earth",
654
651
  })
655
652
  ```
656
- <!--End PulumiCodeChooser -->
657
653
 
658
654
  Example using `generated_role_rules` mode:
659
655
 
660
- <!--Start PulumiCodeChooser -->
661
656
  ```python
662
657
  import pulumi
663
658
  import pulumi_std as std
@@ -691,7 +686,6 @@ class SecretBackendRole(pulumi.CustomResource):
691
686
  "location": "earth",
692
687
  })
693
688
  ```
694
- <!--End PulumiCodeChooser -->
695
689
 
696
690
  ## Import
697
691
 
@@ -754,7 +748,6 @@ class SecretBackendRole(pulumi.CustomResource):
754
748
 
755
749
  Example using `service_account_name` mode:
756
750
 
757
- <!--Start PulumiCodeChooser -->
758
751
  ```python
759
752
  import pulumi
760
753
  import pulumi_std as std
@@ -783,11 +776,9 @@ class SecretBackendRole(pulumi.CustomResource):
783
776
  "location": "earth",
784
777
  })
785
778
  ```
786
- <!--End PulumiCodeChooser -->
787
779
 
788
780
  Example using `kubernetes_role_name` mode:
789
781
 
790
- <!--Start PulumiCodeChooser -->
791
782
  ```python
792
783
  import pulumi
793
784
  import pulumi_std as std
@@ -816,11 +807,9 @@ class SecretBackendRole(pulumi.CustomResource):
816
807
  "location": "earth",
817
808
  })
818
809
  ```
819
- <!--End PulumiCodeChooser -->
820
810
 
821
811
  Example using `generated_role_rules` mode:
822
812
 
823
- <!--Start PulumiCodeChooser -->
824
813
  ```python
825
814
  import pulumi
826
815
  import pulumi_std as std
@@ -854,7 +843,6 @@ class SecretBackendRole(pulumi.CustomResource):
854
843
  "location": "earth",
855
844
  })
856
845
  ```
857
- <!--End PulumiCodeChooser -->
858
846
 
859
847
  ## Import
860
848
 
@@ -134,7 +134,6 @@ def get_secret(namespace: Optional[str] = None,
134
134
  """
135
135
  ## Example Usage
136
136
 
137
- <!--Start PulumiCodeChooser -->
138
137
  ```python
139
138
  import pulumi
140
139
  import json
@@ -155,7 +154,6 @@ def get_secret(namespace: Optional[str] = None,
155
154
  }))
156
155
  secret_data = vault.kv.get_secret_output(path=secret.path)
157
156
  ```
158
- <!--End PulumiCodeChooser -->
159
157
 
160
158
  ## Required Vault Capabilities
161
159
 
@@ -192,7 +190,6 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
192
190
  """
193
191
  ## Example Usage
194
192
 
195
- <!--Start PulumiCodeChooser -->
196
193
  ```python
197
194
  import pulumi
198
195
  import json
@@ -213,7 +210,6 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
213
210
  }))
214
211
  secret_data = vault.kv.get_secret_output(path=secret.path)
215
212
  ```
216
- <!--End PulumiCodeChooser -->
217
213
 
218
214
  ## Required Vault Capabilities
219
215