pulumi-vault 6.2.0a1713561465__py3-none-any.whl → 6.2.0a1714114277__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (179) hide show
  1. pulumi_vault/_inputs.py +0 -20
  2. pulumi_vault/ad/secret_backend.py +0 -4
  3. pulumi_vault/ad/secret_library.py +0 -4
  4. pulumi_vault/ad/secret_role.py +0 -4
  5. pulumi_vault/alicloud/auth_backend_role.py +63 -186
  6. pulumi_vault/approle/auth_backend_login.py +0 -4
  7. pulumi_vault/approle/auth_backend_role.py +63 -186
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
  9. pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
  10. pulumi_vault/audit.py +0 -8
  11. pulumi_vault/audit_request_header.py +0 -4
  12. pulumi_vault/aws/auth_backend_client.py +0 -4
  13. pulumi_vault/aws/auth_backend_config_identity.py +0 -4
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -4
  15. pulumi_vault/aws/auth_backend_role.py +63 -186
  16. pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -4
  17. pulumi_vault/aws/auth_backend_sts_role.py +0 -4
  18. pulumi_vault/aws/secret_backend_role.py +0 -4
  19. pulumi_vault/aws/secret_backend_static_role.py +0 -4
  20. pulumi_vault/azure/auth_backend_config.py +0 -4
  21. pulumi_vault/azure/auth_backend_role.py +63 -186
  22. pulumi_vault/azure/backend.py +0 -8
  23. pulumi_vault/azure/backend_role.py +0 -4
  24. pulumi_vault/azure/get_access_credentials.py +0 -4
  25. pulumi_vault/cert_auth_backend_role.py +63 -200
  26. pulumi_vault/consul/secret_backend.py +0 -8
  27. pulumi_vault/consul/secret_backend_role.py +0 -4
  28. pulumi_vault/database/_inputs.py +522 -784
  29. pulumi_vault/database/outputs.py +522 -784
  30. pulumi_vault/database/secret_backend_connection.py +0 -4
  31. pulumi_vault/database/secret_backend_role.py +0 -4
  32. pulumi_vault/database/secret_backend_static_role.py +0 -4
  33. pulumi_vault/database/secrets_mount.py +0 -4
  34. pulumi_vault/egp_policy.py +0 -4
  35. pulumi_vault/gcp/auth_backend_role.py +63 -264
  36. pulumi_vault/gcp/get_auth_backend_role.py +0 -4
  37. pulumi_vault/gcp/secret_backend.py +0 -4
  38. pulumi_vault/gcp/secret_impersonated_account.py +0 -4
  39. pulumi_vault/gcp/secret_roleset.py +0 -4
  40. pulumi_vault/gcp/secret_static_account.py +0 -4
  41. pulumi_vault/generic/endpoint.py +0 -4
  42. pulumi_vault/generic/get_secret.py +0 -8
  43. pulumi_vault/get_auth_backend.py +0 -4
  44. pulumi_vault/get_auth_backends.py +0 -8
  45. pulumi_vault/get_namespace.py +0 -12
  46. pulumi_vault/get_namespaces.py +0 -8
  47. pulumi_vault/get_nomad_access_token.py +0 -4
  48. pulumi_vault/get_policy_document.py +0 -4
  49. pulumi_vault/get_raft_autopilot_state.py +0 -4
  50. pulumi_vault/github/auth_backend.py +0 -4
  51. pulumi_vault/github/team.py +0 -4
  52. pulumi_vault/github/user.py +0 -4
  53. pulumi_vault/identity/entity.py +0 -4
  54. pulumi_vault/identity/entity_alias.py +0 -4
  55. pulumi_vault/identity/entity_policies.py +0 -8
  56. pulumi_vault/identity/get_entity.py +0 -4
  57. pulumi_vault/identity/get_group.py +0 -4
  58. pulumi_vault/identity/get_oidc_client_creds.py +0 -4
  59. pulumi_vault/identity/get_oidc_openid_config.py +0 -4
  60. pulumi_vault/identity/get_oidc_public_keys.py +0 -4
  61. pulumi_vault/identity/group.py +0 -12
  62. pulumi_vault/identity/group_alias.py +0 -4
  63. pulumi_vault/identity/group_member_entity_ids.py +0 -8
  64. pulumi_vault/identity/group_member_group_ids.py +0 -8
  65. pulumi_vault/identity/group_policies.py +0 -8
  66. pulumi_vault/identity/mfa_duo.py +0 -4
  67. pulumi_vault/identity/mfa_login_enforcement.py +0 -4
  68. pulumi_vault/identity/mfa_okta.py +0 -4
  69. pulumi_vault/identity/mfa_pingid.py +0 -4
  70. pulumi_vault/identity/mfa_totp.py +0 -4
  71. pulumi_vault/identity/oidc.py +0 -4
  72. pulumi_vault/identity/oidc_assignment.py +0 -4
  73. pulumi_vault/identity/oidc_client.py +0 -4
  74. pulumi_vault/identity/oidc_key.py +0 -4
  75. pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -4
  76. pulumi_vault/identity/oidc_provider.py +0 -4
  77. pulumi_vault/identity/oidc_role.py +0 -8
  78. pulumi_vault/identity/oidc_scope.py +0 -4
  79. pulumi_vault/jwt/auth_backend.py +0 -12
  80. pulumi_vault/jwt/auth_backend_role.py +63 -190
  81. pulumi_vault/kmip/secret_backend.py +0 -4
  82. pulumi_vault/kmip/secret_role.py +0 -4
  83. pulumi_vault/kmip/secret_scope.py +0 -4
  84. pulumi_vault/kubernetes/auth_backend_config.py +0 -4
  85. pulumi_vault/kubernetes/auth_backend_role.py +56 -172
  86. pulumi_vault/kubernetes/get_service_account_token.py +0 -4
  87. pulumi_vault/kubernetes/secret_backend.py +0 -4
  88. pulumi_vault/kubernetes/secret_backend_role.py +0 -12
  89. pulumi_vault/kv/get_secret.py +0 -4
  90. pulumi_vault/kv/get_secret_subkeys_v2.py +0 -4
  91. pulumi_vault/kv/get_secret_v2.py +0 -4
  92. pulumi_vault/kv/get_secrets_list.py +0 -4
  93. pulumi_vault/kv/get_secrets_list_v2.py +0 -4
  94. pulumi_vault/kv/secret.py +0 -4
  95. pulumi_vault/kv/secret_backend_v2.py +0 -4
  96. pulumi_vault/kv/secret_v2.py +0 -4
  97. pulumi_vault/ldap/auth_backend.py +56 -151
  98. pulumi_vault/ldap/auth_backend_group.py +0 -4
  99. pulumi_vault/ldap/auth_backend_user.py +0 -4
  100. pulumi_vault/ldap/secret_backend.py +0 -4
  101. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
  102. pulumi_vault/ldap/secret_backend_library_set.py +0 -4
  103. pulumi_vault/ldap/secret_backend_static_role.py +0 -4
  104. pulumi_vault/managed/_inputs.py +84 -132
  105. pulumi_vault/managed/keys.py +7 -28
  106. pulumi_vault/managed/outputs.py +84 -132
  107. pulumi_vault/mfa_duo.py +0 -4
  108. pulumi_vault/mfa_okta.py +0 -4
  109. pulumi_vault/mfa_pingid.py +0 -4
  110. pulumi_vault/mfa_totp.py +0 -4
  111. pulumi_vault/mongodbatlas/secret_backend.py +0 -4
  112. pulumi_vault/mongodbatlas/secret_role.py +0 -4
  113. pulumi_vault/mount.py +0 -16
  114. pulumi_vault/nomad_secret_backend.py +0 -4
  115. pulumi_vault/nomad_secret_role.py +0 -4
  116. pulumi_vault/okta/_inputs.py +8 -8
  117. pulumi_vault/okta/auth_backend.py +0 -4
  118. pulumi_vault/okta/auth_backend_group.py +0 -4
  119. pulumi_vault/okta/auth_backend_user.py +0 -4
  120. pulumi_vault/okta/outputs.py +8 -8
  121. pulumi_vault/outputs.py +0 -20
  122. pulumi_vault/password_policy.py +0 -4
  123. pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
  124. pulumi_vault/pkisecret/get_backend_issuer.py +0 -4
  125. pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
  126. pulumi_vault/pkisecret/get_backend_key.py +0 -4
  127. pulumi_vault/pkisecret/get_backend_keys.py +0 -4
  128. pulumi_vault/pkisecret/secret_backend_cert.py +0 -4
  129. pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -4
  130. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
  131. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
  132. pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -4
  133. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -4
  134. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -4
  135. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
  136. pulumi_vault/pkisecret/secret_backend_role.py +0 -4
  137. pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -4
  138. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -4
  139. pulumi_vault/pkisecret/secret_backend_sign.py +0 -4
  140. pulumi_vault/quota_lease_count.py +0 -4
  141. pulumi_vault/quota_rate_limit.py +0 -4
  142. pulumi_vault/rabbitmq/secret_backend.py +0 -4
  143. pulumi_vault/rabbitmq/secret_backend_role.py +0 -4
  144. pulumi_vault/raft_autopilot.py +0 -4
  145. pulumi_vault/raft_snapshot_agent_config.py +91 -292
  146. pulumi_vault/rgp_policy.py +0 -4
  147. pulumi_vault/saml/auth_backend.py +0 -4
  148. pulumi_vault/saml/auth_backend_role.py +56 -172
  149. pulumi_vault/secrets/sync_association.py +0 -4
  150. pulumi_vault/secrets/sync_aws_destination.py +0 -4
  151. pulumi_vault/secrets/sync_azure_destination.py +0 -4
  152. pulumi_vault/secrets/sync_config.py +0 -4
  153. pulumi_vault/secrets/sync_gcp_destination.py +0 -4
  154. pulumi_vault/secrets/sync_gh_destination.py +0 -4
  155. pulumi_vault/secrets/sync_github_apps.py +0 -4
  156. pulumi_vault/secrets/sync_vercel_destination.py +0 -4
  157. pulumi_vault/ssh/_inputs.py +6 -20
  158. pulumi_vault/ssh/outputs.py +6 -20
  159. pulumi_vault/ssh/secret_backend_ca.py +0 -4
  160. pulumi_vault/ssh/secret_backend_role.py +0 -4
  161. pulumi_vault/terraformcloud/secret_backend.py +0 -4
  162. pulumi_vault/terraformcloud/secret_creds.py +0 -4
  163. pulumi_vault/terraformcloud/secret_role.py +0 -4
  164. pulumi_vault/token.py +0 -4
  165. pulumi_vault/tokenauth/auth_backend_role.py +56 -172
  166. pulumi_vault/transform/alphabet.py +0 -4
  167. pulumi_vault/transform/get_decode.py +0 -4
  168. pulumi_vault/transform/get_encode.py +0 -4
  169. pulumi_vault/transform/role.py +0 -4
  170. pulumi_vault/transform/template.py +0 -4
  171. pulumi_vault/transit/get_decrypt.py +0 -16
  172. pulumi_vault/transit/get_encrypt.py +0 -14
  173. pulumi_vault/transit/secret_backend_key.py +0 -4
  174. pulumi_vault/transit/secret_cache_config.py +0 -4
  175. {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/METADATA +1 -1
  176. pulumi_vault-6.2.0a1714114277.dist-info/RECORD +252 -0
  177. pulumi_vault-6.2.0a1713561465.dist-info/RECORD +0 -252
  178. {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/WHEEL +0 -0
  179. {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/top_level.txt +0 -0
@@ -299,7 +299,6 @@ class AuthBackendLogin(pulumi.CustomResource):
299
299
 
300
300
  ## Example Usage
301
301
 
302
- <!--Start PulumiCodeChooser -->
303
302
  ```python
304
303
  import pulumi
305
304
  import pulumi_vault as vault
@@ -321,7 +320,6 @@ class AuthBackendLogin(pulumi.CustomResource):
321
320
  role_id=example.role_id,
322
321
  secret_id=id.secret_id)
323
322
  ```
324
- <!--End PulumiCodeChooser -->
325
323
 
326
324
  :param str resource_name: The name of the resource.
327
325
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -347,7 +345,6 @@ class AuthBackendLogin(pulumi.CustomResource):
347
345
 
348
346
  ## Example Usage
349
347
 
350
- <!--Start PulumiCodeChooser -->
351
348
  ```python
352
349
  import pulumi
353
350
  import pulumi_vault as vault
@@ -369,7 +366,6 @@ class AuthBackendLogin(pulumi.CustomResource):
369
366
  role_id=example.role_id,
370
367
  secret_id=id.secret_id)
371
368
  ```
372
- <!--End PulumiCodeChooser -->
373
369
 
374
370
  :param str resource_name: The name of the resource.
375
371
  :param AuthBackendLoginArgs args: The arguments to use to populate this resource's properties.
@@ -51,32 +51,15 @@ class AuthBackendRoleArgs:
51
51
  expire. A value of zero will allow unlimited uses.
52
52
  :param pulumi.Input[int] secret_id_ttl: The number of seconds after which any SecretID
53
53
  expires.
54
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
55
- addresses which can authenticate successfully, and ties the resulting token to these blocks
56
- as well.
57
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
58
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
59
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
60
- `token_max_ttl` would otherwise allow a renewal.
61
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
62
- Its current value will be referenced at renewal time.
63
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
64
- generated tokens; otherwise it will be added to the policies set in token_policies.
65
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/approle#token_num_uses)
66
- of times a generated token may be used (within its lifetime); 0 means unlimited.
67
- :param pulumi.Input[int] token_period: If set, indicates that the
68
- token generated using this role should never expire. The token should be renewed within the
69
- duration specified by this value. At each renewal, the token's TTL will be set to the
70
- value of this field. Specified in seconds.
71
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
72
- on the auth method, this list may be supplemented by user/group/other values.
73
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
74
- Its current value will be referenced at renewal time.
75
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
76
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
77
- `service` tokens). For token store roles, there are two additional possibilities:
78
- `default-service` and `default-batch` which specify the type to return unless the client
79
- requests a different type at generation time.
54
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
55
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
56
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
57
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
58
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
59
+ :param pulumi.Input[int] token_period: Generated Token's Period
60
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
61
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
62
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
80
63
  """
81
64
  pulumi.set(__self__, "role_name", role_name)
82
65
  if backend is not None:
@@ -222,9 +205,7 @@ class AuthBackendRoleArgs:
222
205
  @pulumi.getter(name="tokenBoundCidrs")
223
206
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
224
207
  """
225
- List of CIDR blocks; if set, specifies blocks of IP
226
- addresses which can authenticate successfully, and ties the resulting token to these blocks
227
- as well.
208
+ Specifies the blocks of IP addresses which are allowed to use the generated token
228
209
  """
229
210
  return pulumi.get(self, "token_bound_cidrs")
230
211
 
@@ -236,10 +217,7 @@ class AuthBackendRoleArgs:
236
217
  @pulumi.getter(name="tokenExplicitMaxTtl")
237
218
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
238
219
  """
239
- If set, will encode an
240
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
241
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
242
- `token_max_ttl` would otherwise allow a renewal.
220
+ Generated Token's Explicit Maximum TTL in seconds
243
221
  """
244
222
  return pulumi.get(self, "token_explicit_max_ttl")
245
223
 
@@ -251,8 +229,7 @@ class AuthBackendRoleArgs:
251
229
  @pulumi.getter(name="tokenMaxTtl")
252
230
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
253
231
  """
254
- The maximum lifetime for generated tokens in number of seconds.
255
- Its current value will be referenced at renewal time.
232
+ The maximum lifetime of the generated token
256
233
  """
257
234
  return pulumi.get(self, "token_max_ttl")
258
235
 
@@ -264,8 +241,7 @@ class AuthBackendRoleArgs:
264
241
  @pulumi.getter(name="tokenNoDefaultPolicy")
265
242
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
266
243
  """
267
- If set, the default policy will not be set on
268
- generated tokens; otherwise it will be added to the policies set in token_policies.
244
+ If true, the 'default' policy will not automatically be added to generated tokens
269
245
  """
270
246
  return pulumi.get(self, "token_no_default_policy")
271
247
 
@@ -277,8 +253,7 @@ class AuthBackendRoleArgs:
277
253
  @pulumi.getter(name="tokenNumUses")
278
254
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
279
255
  """
280
- The [maximum number](https://www.vaultproject.io/api-docs/auth/approle#token_num_uses)
281
- of times a generated token may be used (within its lifetime); 0 means unlimited.
256
+ The maximum number of times a token may be used, a value of zero means unlimited
282
257
  """
283
258
  return pulumi.get(self, "token_num_uses")
284
259
 
@@ -290,10 +265,7 @@ class AuthBackendRoleArgs:
290
265
  @pulumi.getter(name="tokenPeriod")
291
266
  def token_period(self) -> Optional[pulumi.Input[int]]:
292
267
  """
293
- If set, indicates that the
294
- token generated using this role should never expire. The token should be renewed within the
295
- duration specified by this value. At each renewal, the token's TTL will be set to the
296
- value of this field. Specified in seconds.
268
+ Generated Token's Period
297
269
  """
298
270
  return pulumi.get(self, "token_period")
299
271
 
@@ -305,8 +277,7 @@ class AuthBackendRoleArgs:
305
277
  @pulumi.getter(name="tokenPolicies")
306
278
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
307
279
  """
308
- List of policies to encode onto generated tokens. Depending
309
- on the auth method, this list may be supplemented by user/group/other values.
280
+ Generated Token's Policies
310
281
  """
311
282
  return pulumi.get(self, "token_policies")
312
283
 
@@ -318,8 +289,7 @@ class AuthBackendRoleArgs:
318
289
  @pulumi.getter(name="tokenTtl")
319
290
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
320
291
  """
321
- The incremental lifetime for generated tokens in number of seconds.
322
- Its current value will be referenced at renewal time.
292
+ The initial ttl of the token to generate in seconds
323
293
  """
324
294
  return pulumi.get(self, "token_ttl")
325
295
 
@@ -331,11 +301,7 @@ class AuthBackendRoleArgs:
331
301
  @pulumi.getter(name="tokenType")
332
302
  def token_type(self) -> Optional[pulumi.Input[str]]:
333
303
  """
334
- The type of token that should be generated. Can be `service`,
335
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
336
- `service` tokens). For token store roles, there are two additional possibilities:
337
- `default-service` and `default-batch` which specify the type to return unless the client
338
- requests a different type at generation time.
304
+ The type of token to generate, service or batch
339
305
  """
340
306
  return pulumi.get(self, "token_type")
341
307
 
@@ -384,32 +350,15 @@ class _AuthBackendRoleState:
384
350
  expire. A value of zero will allow unlimited uses.
385
351
  :param pulumi.Input[int] secret_id_ttl: The number of seconds after which any SecretID
386
352
  expires.
387
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
388
- addresses which can authenticate successfully, and ties the resulting token to these blocks
389
- as well.
390
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
391
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
392
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
393
- `token_max_ttl` would otherwise allow a renewal.
394
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
395
- Its current value will be referenced at renewal time.
396
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
397
- generated tokens; otherwise it will be added to the policies set in token_policies.
398
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/approle#token_num_uses)
399
- of times a generated token may be used (within its lifetime); 0 means unlimited.
400
- :param pulumi.Input[int] token_period: If set, indicates that the
401
- token generated using this role should never expire. The token should be renewed within the
402
- duration specified by this value. At each renewal, the token's TTL will be set to the
403
- value of this field. Specified in seconds.
404
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
405
- on the auth method, this list may be supplemented by user/group/other values.
406
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
407
- Its current value will be referenced at renewal time.
408
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
409
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
410
- `service` tokens). For token store roles, there are two additional possibilities:
411
- `default-service` and `default-batch` which specify the type to return unless the client
412
- requests a different type at generation time.
353
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
354
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
355
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
356
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
357
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
358
+ :param pulumi.Input[int] token_period: Generated Token's Period
359
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
360
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
361
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
413
362
  """
414
363
  if backend is not None:
415
364
  pulumi.set(__self__, "backend", backend)
@@ -556,9 +505,7 @@ class _AuthBackendRoleState:
556
505
  @pulumi.getter(name="tokenBoundCidrs")
557
506
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
558
507
  """
559
- List of CIDR blocks; if set, specifies blocks of IP
560
- addresses which can authenticate successfully, and ties the resulting token to these blocks
561
- as well.
508
+ Specifies the blocks of IP addresses which are allowed to use the generated token
562
509
  """
563
510
  return pulumi.get(self, "token_bound_cidrs")
564
511
 
@@ -570,10 +517,7 @@ class _AuthBackendRoleState:
570
517
  @pulumi.getter(name="tokenExplicitMaxTtl")
571
518
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
572
519
  """
573
- If set, will encode an
574
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
575
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
576
- `token_max_ttl` would otherwise allow a renewal.
520
+ Generated Token's Explicit Maximum TTL in seconds
577
521
  """
578
522
  return pulumi.get(self, "token_explicit_max_ttl")
579
523
 
@@ -585,8 +529,7 @@ class _AuthBackendRoleState:
585
529
  @pulumi.getter(name="tokenMaxTtl")
586
530
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
587
531
  """
588
- The maximum lifetime for generated tokens in number of seconds.
589
- Its current value will be referenced at renewal time.
532
+ The maximum lifetime of the generated token
590
533
  """
591
534
  return pulumi.get(self, "token_max_ttl")
592
535
 
@@ -598,8 +541,7 @@ class _AuthBackendRoleState:
598
541
  @pulumi.getter(name="tokenNoDefaultPolicy")
599
542
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
600
543
  """
601
- If set, the default policy will not be set on
602
- generated tokens; otherwise it will be added to the policies set in token_policies.
544
+ If true, the 'default' policy will not automatically be added to generated tokens
603
545
  """
604
546
  return pulumi.get(self, "token_no_default_policy")
605
547
 
@@ -611,8 +553,7 @@ class _AuthBackendRoleState:
611
553
  @pulumi.getter(name="tokenNumUses")
612
554
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
613
555
  """
614
- The [maximum number](https://www.vaultproject.io/api-docs/auth/approle#token_num_uses)
615
- of times a generated token may be used (within its lifetime); 0 means unlimited.
556
+ The maximum number of times a token may be used, a value of zero means unlimited
616
557
  """
617
558
  return pulumi.get(self, "token_num_uses")
618
559
 
@@ -624,10 +565,7 @@ class _AuthBackendRoleState:
624
565
  @pulumi.getter(name="tokenPeriod")
625
566
  def token_period(self) -> Optional[pulumi.Input[int]]:
626
567
  """
627
- If set, indicates that the
628
- token generated using this role should never expire. The token should be renewed within the
629
- duration specified by this value. At each renewal, the token's TTL will be set to the
630
- value of this field. Specified in seconds.
568
+ Generated Token's Period
631
569
  """
632
570
  return pulumi.get(self, "token_period")
633
571
 
@@ -639,8 +577,7 @@ class _AuthBackendRoleState:
639
577
  @pulumi.getter(name="tokenPolicies")
640
578
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
641
579
  """
642
- List of policies to encode onto generated tokens. Depending
643
- on the auth method, this list may be supplemented by user/group/other values.
580
+ Generated Token's Policies
644
581
  """
645
582
  return pulumi.get(self, "token_policies")
646
583
 
@@ -652,8 +589,7 @@ class _AuthBackendRoleState:
652
589
  @pulumi.getter(name="tokenTtl")
653
590
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
654
591
  """
655
- The incremental lifetime for generated tokens in number of seconds.
656
- Its current value will be referenced at renewal time.
592
+ The initial ttl of the token to generate in seconds
657
593
  """
658
594
  return pulumi.get(self, "token_ttl")
659
595
 
@@ -665,11 +601,7 @@ class _AuthBackendRoleState:
665
601
  @pulumi.getter(name="tokenType")
666
602
  def token_type(self) -> Optional[pulumi.Input[str]]:
667
603
  """
668
- The type of token that should be generated. Can be `service`,
669
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
670
- `service` tokens). For token store roles, there are two additional possibilities:
671
- `default-service` and `default-batch` which specify the type to return unless the client
672
- requests a different type at generation time.
604
+ The type of token to generate, service or batch
673
605
  """
674
606
  return pulumi.get(self, "token_type")
675
607
 
@@ -708,7 +640,6 @@ class AuthBackendRole(pulumi.CustomResource):
708
640
 
709
641
  ## Example Usage
710
642
 
711
- <!--Start PulumiCodeChooser -->
712
643
  ```python
713
644
  import pulumi
714
645
  import pulumi_vault as vault
@@ -723,7 +654,6 @@ class AuthBackendRole(pulumi.CustomResource):
723
654
  "prod",
724
655
  ])
725
656
  ```
726
- <!--End PulumiCodeChooser -->
727
657
 
728
658
  ## Import
729
659
 
@@ -753,32 +683,15 @@ class AuthBackendRole(pulumi.CustomResource):
753
683
  expire. A value of zero will allow unlimited uses.
754
684
  :param pulumi.Input[int] secret_id_ttl: The number of seconds after which any SecretID
755
685
  expires.
756
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
757
- addresses which can authenticate successfully, and ties the resulting token to these blocks
758
- as well.
759
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
760
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
761
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
762
- `token_max_ttl` would otherwise allow a renewal.
763
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
764
- Its current value will be referenced at renewal time.
765
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
766
- generated tokens; otherwise it will be added to the policies set in token_policies.
767
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/approle#token_num_uses)
768
- of times a generated token may be used (within its lifetime); 0 means unlimited.
769
- :param pulumi.Input[int] token_period: If set, indicates that the
770
- token generated using this role should never expire. The token should be renewed within the
771
- duration specified by this value. At each renewal, the token's TTL will be set to the
772
- value of this field. Specified in seconds.
773
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
774
- on the auth method, this list may be supplemented by user/group/other values.
775
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
776
- Its current value will be referenced at renewal time.
777
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
778
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
779
- `service` tokens). For token store roles, there are two additional possibilities:
780
- `default-service` and `default-batch` which specify the type to return unless the client
781
- requests a different type at generation time.
686
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
687
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
688
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
689
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
690
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
691
+ :param pulumi.Input[int] token_period: Generated Token's Period
692
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
693
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
694
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
782
695
  """
783
696
  ...
784
697
  @overload
@@ -793,7 +706,6 @@ class AuthBackendRole(pulumi.CustomResource):
793
706
 
794
707
  ## Example Usage
795
708
 
796
- <!--Start PulumiCodeChooser -->
797
709
  ```python
798
710
  import pulumi
799
711
  import pulumi_vault as vault
@@ -808,7 +720,6 @@ class AuthBackendRole(pulumi.CustomResource):
808
720
  "prod",
809
721
  ])
810
722
  ```
811
- <!--End PulumiCodeChooser -->
812
723
 
813
724
  ## Import
814
725
 
@@ -930,32 +841,15 @@ class AuthBackendRole(pulumi.CustomResource):
930
841
  expire. A value of zero will allow unlimited uses.
931
842
  :param pulumi.Input[int] secret_id_ttl: The number of seconds after which any SecretID
932
843
  expires.
933
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
934
- addresses which can authenticate successfully, and ties the resulting token to these blocks
935
- as well.
936
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
937
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
938
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
939
- `token_max_ttl` would otherwise allow a renewal.
940
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
941
- Its current value will be referenced at renewal time.
942
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
943
- generated tokens; otherwise it will be added to the policies set in token_policies.
944
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/approle#token_num_uses)
945
- of times a generated token may be used (within its lifetime); 0 means unlimited.
946
- :param pulumi.Input[int] token_period: If set, indicates that the
947
- token generated using this role should never expire. The token should be renewed within the
948
- duration specified by this value. At each renewal, the token's TTL will be set to the
949
- value of this field. Specified in seconds.
950
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
951
- on the auth method, this list may be supplemented by user/group/other values.
952
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
953
- Its current value will be referenced at renewal time.
954
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
955
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
956
- `service` tokens). For token store roles, there are two additional possibilities:
957
- `default-service` and `default-batch` which specify the type to return unless the client
958
- requests a different type at generation time.
844
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
845
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
846
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
847
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
848
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
849
+ :param pulumi.Input[int] token_period: Generated Token's Period
850
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
851
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
852
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
959
853
  """
960
854
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
961
855
 
@@ -1058,9 +952,7 @@ class AuthBackendRole(pulumi.CustomResource):
1058
952
  @pulumi.getter(name="tokenBoundCidrs")
1059
953
  def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
1060
954
  """
1061
- List of CIDR blocks; if set, specifies blocks of IP
1062
- addresses which can authenticate successfully, and ties the resulting token to these blocks
1063
- as well.
955
+ Specifies the blocks of IP addresses which are allowed to use the generated token
1064
956
  """
1065
957
  return pulumi.get(self, "token_bound_cidrs")
1066
958
 
@@ -1068,10 +960,7 @@ class AuthBackendRole(pulumi.CustomResource):
1068
960
  @pulumi.getter(name="tokenExplicitMaxTtl")
1069
961
  def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
1070
962
  """
1071
- If set, will encode an
1072
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1073
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1074
- `token_max_ttl` would otherwise allow a renewal.
963
+ Generated Token's Explicit Maximum TTL in seconds
1075
964
  """
1076
965
  return pulumi.get(self, "token_explicit_max_ttl")
1077
966
 
@@ -1079,8 +968,7 @@ class AuthBackendRole(pulumi.CustomResource):
1079
968
  @pulumi.getter(name="tokenMaxTtl")
1080
969
  def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
1081
970
  """
1082
- The maximum lifetime for generated tokens in number of seconds.
1083
- Its current value will be referenced at renewal time.
971
+ The maximum lifetime of the generated token
1084
972
  """
1085
973
  return pulumi.get(self, "token_max_ttl")
1086
974
 
@@ -1088,8 +976,7 @@ class AuthBackendRole(pulumi.CustomResource):
1088
976
  @pulumi.getter(name="tokenNoDefaultPolicy")
1089
977
  def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
1090
978
  """
1091
- If set, the default policy will not be set on
1092
- generated tokens; otherwise it will be added to the policies set in token_policies.
979
+ If true, the 'default' policy will not automatically be added to generated tokens
1093
980
  """
1094
981
  return pulumi.get(self, "token_no_default_policy")
1095
982
 
@@ -1097,8 +984,7 @@ class AuthBackendRole(pulumi.CustomResource):
1097
984
  @pulumi.getter(name="tokenNumUses")
1098
985
  def token_num_uses(self) -> pulumi.Output[Optional[int]]:
1099
986
  """
1100
- The [maximum number](https://www.vaultproject.io/api-docs/auth/approle#token_num_uses)
1101
- of times a generated token may be used (within its lifetime); 0 means unlimited.
987
+ The maximum number of times a token may be used, a value of zero means unlimited
1102
988
  """
1103
989
  return pulumi.get(self, "token_num_uses")
1104
990
 
@@ -1106,10 +992,7 @@ class AuthBackendRole(pulumi.CustomResource):
1106
992
  @pulumi.getter(name="tokenPeriod")
1107
993
  def token_period(self) -> pulumi.Output[Optional[int]]:
1108
994
  """
1109
- If set, indicates that the
1110
- token generated using this role should never expire. The token should be renewed within the
1111
- duration specified by this value. At each renewal, the token's TTL will be set to the
1112
- value of this field. Specified in seconds.
995
+ Generated Token's Period
1113
996
  """
1114
997
  return pulumi.get(self, "token_period")
1115
998
 
@@ -1117,8 +1000,7 @@ class AuthBackendRole(pulumi.CustomResource):
1117
1000
  @pulumi.getter(name="tokenPolicies")
1118
1001
  def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
1119
1002
  """
1120
- List of policies to encode onto generated tokens. Depending
1121
- on the auth method, this list may be supplemented by user/group/other values.
1003
+ Generated Token's Policies
1122
1004
  """
1123
1005
  return pulumi.get(self, "token_policies")
1124
1006
 
@@ -1126,8 +1008,7 @@ class AuthBackendRole(pulumi.CustomResource):
1126
1008
  @pulumi.getter(name="tokenTtl")
1127
1009
  def token_ttl(self) -> pulumi.Output[Optional[int]]:
1128
1010
  """
1129
- The incremental lifetime for generated tokens in number of seconds.
1130
- Its current value will be referenced at renewal time.
1011
+ The initial ttl of the token to generate in seconds
1131
1012
  """
1132
1013
  return pulumi.get(self, "token_ttl")
1133
1014
 
@@ -1135,11 +1016,7 @@ class AuthBackendRole(pulumi.CustomResource):
1135
1016
  @pulumi.getter(name="tokenType")
1136
1017
  def token_type(self) -> pulumi.Output[Optional[str]]:
1137
1018
  """
1138
- The type of token that should be generated. Can be `service`,
1139
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
1140
- `service` tokens). For token store roles, there are two additional possibilities:
1141
- `default-service` and `default-batch` which specify the type to return unless the client
1142
- requests a different type at generation time.
1019
+ The type of token to generate, service or batch
1143
1020
  """
1144
1021
  return pulumi.get(self, "token_type")
1145
1022
 
@@ -397,7 +397,6 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
397
397
 
398
398
  ## Example Usage
399
399
 
400
- <!--Start PulumiCodeChooser -->
401
400
  ```python
402
401
  import pulumi
403
402
  import json
@@ -419,7 +418,6 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
419
418
  "hello": "world",
420
419
  }))
421
420
  ```
422
- <!--End PulumiCodeChooser -->
423
421
 
424
422
  :param str resource_name: The name of the resource.
425
423
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -456,7 +454,6 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
456
454
 
457
455
  ## Example Usage
458
456
 
459
- <!--Start PulumiCodeChooser -->
460
457
  ```python
461
458
  import pulumi
462
459
  import json
@@ -478,7 +475,6 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
478
475
  "hello": "world",
479
476
  }))
480
477
  ```
481
- <!--End PulumiCodeChooser -->
482
478
 
483
479
  :param str resource_name: The name of the resource.
484
480
  :param AuthBackendRoleSecretIdArgs args: The arguments to use to populate this resource's properties.
@@ -92,7 +92,6 @@ def get_auth_backend_role_id(backend: Optional[str] = None,
92
92
 
93
93
  ## Example Usage
94
94
 
95
- <!--Start PulumiCodeChooser -->
96
95
  ```python
97
96
  import pulumi
98
97
  import pulumi_vault as vault
@@ -101,7 +100,6 @@ def get_auth_backend_role_id(backend: Optional[str] = None,
101
100
  role_name="my-role")
102
101
  pulumi.export("role-id", role.role_id)
103
102
  ```
104
- <!--End PulumiCodeChooser -->
105
103
 
106
104
 
107
105
  :param str backend: The unique name for the AppRole backend the role to
@@ -137,7 +135,6 @@ def get_auth_backend_role_id_output(backend: Optional[pulumi.Input[Optional[str]
137
135
 
138
136
  ## Example Usage
139
137
 
140
- <!--Start PulumiCodeChooser -->
141
138
  ```python
142
139
  import pulumi
143
140
  import pulumi_vault as vault
@@ -146,7 +143,6 @@ def get_auth_backend_role_id_output(backend: Optional[pulumi.Input[Optional[str]
146
143
  role_name="my-role")
147
144
  pulumi.export("role-id", role.role_id)
148
145
  ```
149
- <!--End PulumiCodeChooser -->
150
146
 
151
147
 
152
148
  :param str backend: The unique name for the AppRole backend the role to
pulumi_vault/audit.py CHANGED
@@ -254,7 +254,6 @@ class Audit(pulumi.CustomResource):
254
254
 
255
255
  ### File Audit Device)
256
256
 
257
- <!--Start PulumiCodeChooser -->
258
257
  ```python
259
258
  import pulumi
260
259
  import pulumi_vault as vault
@@ -265,11 +264,9 @@ class Audit(pulumi.CustomResource):
265
264
  "file_path": "C:/temp/audit.txt",
266
265
  })
267
266
  ```
268
- <!--End PulumiCodeChooser -->
269
267
 
270
268
  ### Socket Audit Device)
271
269
 
272
- <!--Start PulumiCodeChooser -->
273
270
  ```python
274
271
  import pulumi
275
272
  import pulumi_vault as vault
@@ -284,7 +281,6 @@ class Audit(pulumi.CustomResource):
284
281
  "description": "application x socket",
285
282
  })
286
283
  ```
287
- <!--End PulumiCodeChooser -->
288
284
 
289
285
  ## Import
290
286
 
@@ -319,7 +315,6 @@ class Audit(pulumi.CustomResource):
319
315
 
320
316
  ### File Audit Device)
321
317
 
322
- <!--Start PulumiCodeChooser -->
323
318
  ```python
324
319
  import pulumi
325
320
  import pulumi_vault as vault
@@ -330,11 +325,9 @@ class Audit(pulumi.CustomResource):
330
325
  "file_path": "C:/temp/audit.txt",
331
326
  })
332
327
  ```
333
- <!--End PulumiCodeChooser -->
334
328
 
335
329
  ### Socket Audit Device)
336
330
 
337
- <!--Start PulumiCodeChooser -->
338
331
  ```python
339
332
  import pulumi
340
333
  import pulumi_vault as vault
@@ -349,7 +342,6 @@ class Audit(pulumi.CustomResource):
349
342
  "description": "application x socket",
350
343
  })
351
344
  ```
352
- <!--End PulumiCodeChooser -->
353
345
 
354
346
  ## Import
355
347