pulumi-vault 6.2.0a1713561465__py3-none-any.whl → 6.2.0a1714114277__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (179) hide show
  1. pulumi_vault/_inputs.py +0 -20
  2. pulumi_vault/ad/secret_backend.py +0 -4
  3. pulumi_vault/ad/secret_library.py +0 -4
  4. pulumi_vault/ad/secret_role.py +0 -4
  5. pulumi_vault/alicloud/auth_backend_role.py +63 -186
  6. pulumi_vault/approle/auth_backend_login.py +0 -4
  7. pulumi_vault/approle/auth_backend_role.py +63 -186
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
  9. pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
  10. pulumi_vault/audit.py +0 -8
  11. pulumi_vault/audit_request_header.py +0 -4
  12. pulumi_vault/aws/auth_backend_client.py +0 -4
  13. pulumi_vault/aws/auth_backend_config_identity.py +0 -4
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -4
  15. pulumi_vault/aws/auth_backend_role.py +63 -186
  16. pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -4
  17. pulumi_vault/aws/auth_backend_sts_role.py +0 -4
  18. pulumi_vault/aws/secret_backend_role.py +0 -4
  19. pulumi_vault/aws/secret_backend_static_role.py +0 -4
  20. pulumi_vault/azure/auth_backend_config.py +0 -4
  21. pulumi_vault/azure/auth_backend_role.py +63 -186
  22. pulumi_vault/azure/backend.py +0 -8
  23. pulumi_vault/azure/backend_role.py +0 -4
  24. pulumi_vault/azure/get_access_credentials.py +0 -4
  25. pulumi_vault/cert_auth_backend_role.py +63 -200
  26. pulumi_vault/consul/secret_backend.py +0 -8
  27. pulumi_vault/consul/secret_backend_role.py +0 -4
  28. pulumi_vault/database/_inputs.py +522 -784
  29. pulumi_vault/database/outputs.py +522 -784
  30. pulumi_vault/database/secret_backend_connection.py +0 -4
  31. pulumi_vault/database/secret_backend_role.py +0 -4
  32. pulumi_vault/database/secret_backend_static_role.py +0 -4
  33. pulumi_vault/database/secrets_mount.py +0 -4
  34. pulumi_vault/egp_policy.py +0 -4
  35. pulumi_vault/gcp/auth_backend_role.py +63 -264
  36. pulumi_vault/gcp/get_auth_backend_role.py +0 -4
  37. pulumi_vault/gcp/secret_backend.py +0 -4
  38. pulumi_vault/gcp/secret_impersonated_account.py +0 -4
  39. pulumi_vault/gcp/secret_roleset.py +0 -4
  40. pulumi_vault/gcp/secret_static_account.py +0 -4
  41. pulumi_vault/generic/endpoint.py +0 -4
  42. pulumi_vault/generic/get_secret.py +0 -8
  43. pulumi_vault/get_auth_backend.py +0 -4
  44. pulumi_vault/get_auth_backends.py +0 -8
  45. pulumi_vault/get_namespace.py +0 -12
  46. pulumi_vault/get_namespaces.py +0 -8
  47. pulumi_vault/get_nomad_access_token.py +0 -4
  48. pulumi_vault/get_policy_document.py +0 -4
  49. pulumi_vault/get_raft_autopilot_state.py +0 -4
  50. pulumi_vault/github/auth_backend.py +0 -4
  51. pulumi_vault/github/team.py +0 -4
  52. pulumi_vault/github/user.py +0 -4
  53. pulumi_vault/identity/entity.py +0 -4
  54. pulumi_vault/identity/entity_alias.py +0 -4
  55. pulumi_vault/identity/entity_policies.py +0 -8
  56. pulumi_vault/identity/get_entity.py +0 -4
  57. pulumi_vault/identity/get_group.py +0 -4
  58. pulumi_vault/identity/get_oidc_client_creds.py +0 -4
  59. pulumi_vault/identity/get_oidc_openid_config.py +0 -4
  60. pulumi_vault/identity/get_oidc_public_keys.py +0 -4
  61. pulumi_vault/identity/group.py +0 -12
  62. pulumi_vault/identity/group_alias.py +0 -4
  63. pulumi_vault/identity/group_member_entity_ids.py +0 -8
  64. pulumi_vault/identity/group_member_group_ids.py +0 -8
  65. pulumi_vault/identity/group_policies.py +0 -8
  66. pulumi_vault/identity/mfa_duo.py +0 -4
  67. pulumi_vault/identity/mfa_login_enforcement.py +0 -4
  68. pulumi_vault/identity/mfa_okta.py +0 -4
  69. pulumi_vault/identity/mfa_pingid.py +0 -4
  70. pulumi_vault/identity/mfa_totp.py +0 -4
  71. pulumi_vault/identity/oidc.py +0 -4
  72. pulumi_vault/identity/oidc_assignment.py +0 -4
  73. pulumi_vault/identity/oidc_client.py +0 -4
  74. pulumi_vault/identity/oidc_key.py +0 -4
  75. pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -4
  76. pulumi_vault/identity/oidc_provider.py +0 -4
  77. pulumi_vault/identity/oidc_role.py +0 -8
  78. pulumi_vault/identity/oidc_scope.py +0 -4
  79. pulumi_vault/jwt/auth_backend.py +0 -12
  80. pulumi_vault/jwt/auth_backend_role.py +63 -190
  81. pulumi_vault/kmip/secret_backend.py +0 -4
  82. pulumi_vault/kmip/secret_role.py +0 -4
  83. pulumi_vault/kmip/secret_scope.py +0 -4
  84. pulumi_vault/kubernetes/auth_backend_config.py +0 -4
  85. pulumi_vault/kubernetes/auth_backend_role.py +56 -172
  86. pulumi_vault/kubernetes/get_service_account_token.py +0 -4
  87. pulumi_vault/kubernetes/secret_backend.py +0 -4
  88. pulumi_vault/kubernetes/secret_backend_role.py +0 -12
  89. pulumi_vault/kv/get_secret.py +0 -4
  90. pulumi_vault/kv/get_secret_subkeys_v2.py +0 -4
  91. pulumi_vault/kv/get_secret_v2.py +0 -4
  92. pulumi_vault/kv/get_secrets_list.py +0 -4
  93. pulumi_vault/kv/get_secrets_list_v2.py +0 -4
  94. pulumi_vault/kv/secret.py +0 -4
  95. pulumi_vault/kv/secret_backend_v2.py +0 -4
  96. pulumi_vault/kv/secret_v2.py +0 -4
  97. pulumi_vault/ldap/auth_backend.py +56 -151
  98. pulumi_vault/ldap/auth_backend_group.py +0 -4
  99. pulumi_vault/ldap/auth_backend_user.py +0 -4
  100. pulumi_vault/ldap/secret_backend.py +0 -4
  101. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
  102. pulumi_vault/ldap/secret_backend_library_set.py +0 -4
  103. pulumi_vault/ldap/secret_backend_static_role.py +0 -4
  104. pulumi_vault/managed/_inputs.py +84 -132
  105. pulumi_vault/managed/keys.py +7 -28
  106. pulumi_vault/managed/outputs.py +84 -132
  107. pulumi_vault/mfa_duo.py +0 -4
  108. pulumi_vault/mfa_okta.py +0 -4
  109. pulumi_vault/mfa_pingid.py +0 -4
  110. pulumi_vault/mfa_totp.py +0 -4
  111. pulumi_vault/mongodbatlas/secret_backend.py +0 -4
  112. pulumi_vault/mongodbatlas/secret_role.py +0 -4
  113. pulumi_vault/mount.py +0 -16
  114. pulumi_vault/nomad_secret_backend.py +0 -4
  115. pulumi_vault/nomad_secret_role.py +0 -4
  116. pulumi_vault/okta/_inputs.py +8 -8
  117. pulumi_vault/okta/auth_backend.py +0 -4
  118. pulumi_vault/okta/auth_backend_group.py +0 -4
  119. pulumi_vault/okta/auth_backend_user.py +0 -4
  120. pulumi_vault/okta/outputs.py +8 -8
  121. pulumi_vault/outputs.py +0 -20
  122. pulumi_vault/password_policy.py +0 -4
  123. pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
  124. pulumi_vault/pkisecret/get_backend_issuer.py +0 -4
  125. pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
  126. pulumi_vault/pkisecret/get_backend_key.py +0 -4
  127. pulumi_vault/pkisecret/get_backend_keys.py +0 -4
  128. pulumi_vault/pkisecret/secret_backend_cert.py +0 -4
  129. pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -4
  130. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
  131. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
  132. pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -4
  133. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -4
  134. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -4
  135. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
  136. pulumi_vault/pkisecret/secret_backend_role.py +0 -4
  137. pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -4
  138. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -4
  139. pulumi_vault/pkisecret/secret_backend_sign.py +0 -4
  140. pulumi_vault/quota_lease_count.py +0 -4
  141. pulumi_vault/quota_rate_limit.py +0 -4
  142. pulumi_vault/rabbitmq/secret_backend.py +0 -4
  143. pulumi_vault/rabbitmq/secret_backend_role.py +0 -4
  144. pulumi_vault/raft_autopilot.py +0 -4
  145. pulumi_vault/raft_snapshot_agent_config.py +91 -292
  146. pulumi_vault/rgp_policy.py +0 -4
  147. pulumi_vault/saml/auth_backend.py +0 -4
  148. pulumi_vault/saml/auth_backend_role.py +56 -172
  149. pulumi_vault/secrets/sync_association.py +0 -4
  150. pulumi_vault/secrets/sync_aws_destination.py +0 -4
  151. pulumi_vault/secrets/sync_azure_destination.py +0 -4
  152. pulumi_vault/secrets/sync_config.py +0 -4
  153. pulumi_vault/secrets/sync_gcp_destination.py +0 -4
  154. pulumi_vault/secrets/sync_gh_destination.py +0 -4
  155. pulumi_vault/secrets/sync_github_apps.py +0 -4
  156. pulumi_vault/secrets/sync_vercel_destination.py +0 -4
  157. pulumi_vault/ssh/_inputs.py +6 -20
  158. pulumi_vault/ssh/outputs.py +6 -20
  159. pulumi_vault/ssh/secret_backend_ca.py +0 -4
  160. pulumi_vault/ssh/secret_backend_role.py +0 -4
  161. pulumi_vault/terraformcloud/secret_backend.py +0 -4
  162. pulumi_vault/terraformcloud/secret_creds.py +0 -4
  163. pulumi_vault/terraformcloud/secret_role.py +0 -4
  164. pulumi_vault/token.py +0 -4
  165. pulumi_vault/tokenauth/auth_backend_role.py +56 -172
  166. pulumi_vault/transform/alphabet.py +0 -4
  167. pulumi_vault/transform/get_decode.py +0 -4
  168. pulumi_vault/transform/get_encode.py +0 -4
  169. pulumi_vault/transform/role.py +0 -4
  170. pulumi_vault/transform/template.py +0 -4
  171. pulumi_vault/transit/get_decrypt.py +0 -16
  172. pulumi_vault/transit/get_encrypt.py +0 -14
  173. pulumi_vault/transit/secret_backend_key.py +0 -4
  174. pulumi_vault/transit/secret_cache_config.py +0 -4
  175. {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/METADATA +1 -1
  176. pulumi_vault-6.2.0a1714114277.dist-info/RECORD +252 -0
  177. pulumi_vault-6.2.0a1713561465.dist-info/RECORD +0 -252
  178. {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/WHEEL +0 -0
  179. {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/top_level.txt +0 -0
@@ -182,7 +182,6 @@ class RgpPolicy(pulumi.CustomResource):
182
182
 
183
183
  ## Example Usage
184
184
 
185
- <!--Start PulumiCodeChooser -->
186
185
  ```python
187
186
  import pulumi
188
187
  import pulumi_vault as vault
@@ -195,7 +194,6 @@ class RgpPolicy(pulumi.CustomResource):
195
194
  }
196
195
  \"\"\")
197
196
  ```
198
- <!--End PulumiCodeChooser -->
199
197
 
200
198
  :param str resource_name: The name of the resource.
201
199
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -220,7 +218,6 @@ class RgpPolicy(pulumi.CustomResource):
220
218
 
221
219
  ## Example Usage
222
220
 
223
- <!--Start PulumiCodeChooser -->
224
221
  ```python
225
222
  import pulumi
226
223
  import pulumi_vault as vault
@@ -233,7 +230,6 @@ class RgpPolicy(pulumi.CustomResource):
233
230
  }
234
231
  \"\"\")
235
232
  ```
236
- <!--End PulumiCodeChooser -->
237
233
 
238
234
  :param str resource_name: The name of the resource.
239
235
  :param RgpPolicyArgs args: The arguments to use to populate this resource's properties.
@@ -445,7 +445,6 @@ class AuthBackend(pulumi.CustomResource):
445
445
 
446
446
  ## Example Usage
447
447
 
448
- <!--Start PulumiCodeChooser -->
449
448
  ```python
450
449
  import pulumi
451
450
  import pulumi_vault as vault
@@ -457,7 +456,6 @@ class AuthBackend(pulumi.CustomResource):
457
456
  acs_urls=["https://my.vault.primary/v1/auth/saml/callback"],
458
457
  default_role="admin")
459
458
  ```
460
- <!--End PulumiCodeChooser -->
461
459
 
462
460
  ## Import
463
461
 
@@ -505,7 +503,6 @@ class AuthBackend(pulumi.CustomResource):
505
503
 
506
504
  ## Example Usage
507
505
 
508
- <!--Start PulumiCodeChooser -->
509
506
  ```python
510
507
  import pulumi
511
508
  import pulumi_vault as vault
@@ -517,7 +514,6 @@ class AuthBackend(pulumi.CustomResource):
517
514
  acs_urls=["https://my.vault.primary/v1/auth/saml/callback"],
518
515
  default_role="admin")
519
516
  ```
520
- <!--End PulumiCodeChooser -->
521
517
 
522
518
  ## Import
523
519
 
@@ -47,31 +47,15 @@ class AuthBackendRoleArgs:
47
47
  The value should not contain leading or trailing forward slashes.
48
48
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
49
49
  *Available only for Vault Enterprise*.
50
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
51
- addresses which can authenticate successfully, and ties the resulting token to these blocks
52
- as well.
53
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
54
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
55
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
56
- `token_max_ttl` would otherwise allow a renewal.
57
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
58
- Its current value will be referenced at renewal time.
59
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
60
- generated tokens; otherwise it will be added to the policies set in token_policies.
50
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
51
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
52
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
53
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
61
54
  :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
62
- :param pulumi.Input[int] token_period: If set, indicates that the
63
- token generated using this role should never expire. The token should be renewed within the
64
- duration specified by this value. At each renewal, the token's TTL will be set to the
65
- value of this field. Specified in seconds.
66
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
67
- on the auth method, this list may be supplemented by user/group/other values.
68
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
69
- Its current value will be referenced at renewal time.
70
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
71
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
72
- `service` tokens). For token store roles, there are two additional possibilities:
73
- `default-service` and `default-batch` which specify the type to return unless the client
74
- requests a different type at generation time.
55
+ :param pulumi.Input[int] token_period: Generated Token's Period
56
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
57
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
58
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
75
59
  """
76
60
  pulumi.set(__self__, "path", path)
77
61
  if bound_attributes is not None:
@@ -213,9 +197,7 @@ class AuthBackendRoleArgs:
213
197
  @pulumi.getter(name="tokenBoundCidrs")
214
198
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
215
199
  """
216
- List of CIDR blocks; if set, specifies blocks of IP
217
- addresses which can authenticate successfully, and ties the resulting token to these blocks
218
- as well.
200
+ Specifies the blocks of IP addresses which are allowed to use the generated token
219
201
  """
220
202
  return pulumi.get(self, "token_bound_cidrs")
221
203
 
@@ -227,10 +209,7 @@ class AuthBackendRoleArgs:
227
209
  @pulumi.getter(name="tokenExplicitMaxTtl")
228
210
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
229
211
  """
230
- If set, will encode an
231
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
232
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
233
- `token_max_ttl` would otherwise allow a renewal.
212
+ Generated Token's Explicit Maximum TTL in seconds
234
213
  """
235
214
  return pulumi.get(self, "token_explicit_max_ttl")
236
215
 
@@ -242,8 +221,7 @@ class AuthBackendRoleArgs:
242
221
  @pulumi.getter(name="tokenMaxTtl")
243
222
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
244
223
  """
245
- The maximum lifetime for generated tokens in number of seconds.
246
- Its current value will be referenced at renewal time.
224
+ The maximum lifetime of the generated token
247
225
  """
248
226
  return pulumi.get(self, "token_max_ttl")
249
227
 
@@ -255,8 +233,7 @@ class AuthBackendRoleArgs:
255
233
  @pulumi.getter(name="tokenNoDefaultPolicy")
256
234
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
257
235
  """
258
- If set, the default policy will not be set on
259
- generated tokens; otherwise it will be added to the policies set in token_policies.
236
+ If true, the 'default' policy will not automatically be added to generated tokens
260
237
  """
261
238
  return pulumi.get(self, "token_no_default_policy")
262
239
 
@@ -280,10 +257,7 @@ class AuthBackendRoleArgs:
280
257
  @pulumi.getter(name="tokenPeriod")
281
258
  def token_period(self) -> Optional[pulumi.Input[int]]:
282
259
  """
283
- If set, indicates that the
284
- token generated using this role should never expire. The token should be renewed within the
285
- duration specified by this value. At each renewal, the token's TTL will be set to the
286
- value of this field. Specified in seconds.
260
+ Generated Token's Period
287
261
  """
288
262
  return pulumi.get(self, "token_period")
289
263
 
@@ -295,8 +269,7 @@ class AuthBackendRoleArgs:
295
269
  @pulumi.getter(name="tokenPolicies")
296
270
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
297
271
  """
298
- List of policies to encode onto generated tokens. Depending
299
- on the auth method, this list may be supplemented by user/group/other values.
272
+ Generated Token's Policies
300
273
  """
301
274
  return pulumi.get(self, "token_policies")
302
275
 
@@ -308,8 +281,7 @@ class AuthBackendRoleArgs:
308
281
  @pulumi.getter(name="tokenTtl")
309
282
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
310
283
  """
311
- The incremental lifetime for generated tokens in number of seconds.
312
- Its current value will be referenced at renewal time.
284
+ The initial ttl of the token to generate in seconds
313
285
  """
314
286
  return pulumi.get(self, "token_ttl")
315
287
 
@@ -321,11 +293,7 @@ class AuthBackendRoleArgs:
321
293
  @pulumi.getter(name="tokenType")
322
294
  def token_type(self) -> Optional[pulumi.Input[str]]:
323
295
  """
324
- The type of token that should be generated. Can be `service`,
325
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
326
- `service` tokens). For token store roles, there are two additional possibilities:
327
- `default-service` and `default-batch` which specify the type to return unless the client
328
- requests a different type at generation time.
296
+ The type of token to generate, service or batch
329
297
  """
330
298
  return pulumi.get(self, "token_type")
331
299
 
@@ -370,31 +338,15 @@ class _AuthBackendRoleState:
370
338
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
371
339
  *Available only for Vault Enterprise*.
372
340
  :param pulumi.Input[str] path: Path where the auth backend is mounted.
373
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
374
- addresses which can authenticate successfully, and ties the resulting token to these blocks
375
- as well.
376
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
377
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
378
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
379
- `token_max_ttl` would otherwise allow a renewal.
380
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
381
- Its current value will be referenced at renewal time.
382
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
383
- generated tokens; otherwise it will be added to the policies set in token_policies.
341
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
342
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
343
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
344
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
384
345
  :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
385
- :param pulumi.Input[int] token_period: If set, indicates that the
386
- token generated using this role should never expire. The token should be renewed within the
387
- duration specified by this value. At each renewal, the token's TTL will be set to the
388
- value of this field. Specified in seconds.
389
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
390
- on the auth method, this list may be supplemented by user/group/other values.
391
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
392
- Its current value will be referenced at renewal time.
393
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
394
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
395
- `service` tokens). For token store roles, there are two additional possibilities:
396
- `default-service` and `default-batch` which specify the type to return unless the client
397
- requests a different type at generation time.
346
+ :param pulumi.Input[int] token_period: Generated Token's Period
347
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
348
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
349
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
398
350
  """
399
351
  if bound_attributes is not None:
400
352
  pulumi.set(__self__, "bound_attributes", bound_attributes)
@@ -537,9 +489,7 @@ class _AuthBackendRoleState:
537
489
  @pulumi.getter(name="tokenBoundCidrs")
538
490
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
539
491
  """
540
- List of CIDR blocks; if set, specifies blocks of IP
541
- addresses which can authenticate successfully, and ties the resulting token to these blocks
542
- as well.
492
+ Specifies the blocks of IP addresses which are allowed to use the generated token
543
493
  """
544
494
  return pulumi.get(self, "token_bound_cidrs")
545
495
 
@@ -551,10 +501,7 @@ class _AuthBackendRoleState:
551
501
  @pulumi.getter(name="tokenExplicitMaxTtl")
552
502
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
553
503
  """
554
- If set, will encode an
555
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
556
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
557
- `token_max_ttl` would otherwise allow a renewal.
504
+ Generated Token's Explicit Maximum TTL in seconds
558
505
  """
559
506
  return pulumi.get(self, "token_explicit_max_ttl")
560
507
 
@@ -566,8 +513,7 @@ class _AuthBackendRoleState:
566
513
  @pulumi.getter(name="tokenMaxTtl")
567
514
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
568
515
  """
569
- The maximum lifetime for generated tokens in number of seconds.
570
- Its current value will be referenced at renewal time.
516
+ The maximum lifetime of the generated token
571
517
  """
572
518
  return pulumi.get(self, "token_max_ttl")
573
519
 
@@ -579,8 +525,7 @@ class _AuthBackendRoleState:
579
525
  @pulumi.getter(name="tokenNoDefaultPolicy")
580
526
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
581
527
  """
582
- If set, the default policy will not be set on
583
- generated tokens; otherwise it will be added to the policies set in token_policies.
528
+ If true, the 'default' policy will not automatically be added to generated tokens
584
529
  """
585
530
  return pulumi.get(self, "token_no_default_policy")
586
531
 
@@ -604,10 +549,7 @@ class _AuthBackendRoleState:
604
549
  @pulumi.getter(name="tokenPeriod")
605
550
  def token_period(self) -> Optional[pulumi.Input[int]]:
606
551
  """
607
- If set, indicates that the
608
- token generated using this role should never expire. The token should be renewed within the
609
- duration specified by this value. At each renewal, the token's TTL will be set to the
610
- value of this field. Specified in seconds.
552
+ Generated Token's Period
611
553
  """
612
554
  return pulumi.get(self, "token_period")
613
555
 
@@ -619,8 +561,7 @@ class _AuthBackendRoleState:
619
561
  @pulumi.getter(name="tokenPolicies")
620
562
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
621
563
  """
622
- List of policies to encode onto generated tokens. Depending
623
- on the auth method, this list may be supplemented by user/group/other values.
564
+ Generated Token's Policies
624
565
  """
625
566
  return pulumi.get(self, "token_policies")
626
567
 
@@ -632,8 +573,7 @@ class _AuthBackendRoleState:
632
573
  @pulumi.getter(name="tokenTtl")
633
574
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
634
575
  """
635
- The incremental lifetime for generated tokens in number of seconds.
636
- Its current value will be referenced at renewal time.
576
+ The initial ttl of the token to generate in seconds
637
577
  """
638
578
  return pulumi.get(self, "token_ttl")
639
579
 
@@ -645,11 +585,7 @@ class _AuthBackendRoleState:
645
585
  @pulumi.getter(name="tokenType")
646
586
  def token_type(self) -> Optional[pulumi.Input[str]]:
647
587
  """
648
- The type of token that should be generated. Can be `service`,
649
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
650
- `service` tokens). For token store roles, there are two additional possibilities:
651
- `default-service` and `default-batch` which specify the type to return unless the client
652
- requests a different type at generation time.
588
+ The type of token to generate, service or batch
653
589
  """
654
590
  return pulumi.get(self, "token_type")
655
591
 
@@ -688,7 +624,6 @@ class AuthBackendRole(pulumi.CustomResource):
688
624
 
689
625
  ## Example Usage
690
626
 
691
- <!--Start PulumiCodeChooser -->
692
627
  ```python
693
628
  import pulumi
694
629
  import pulumi_vault as vault
@@ -710,7 +645,6 @@ class AuthBackendRole(pulumi.CustomResource):
710
645
  token_policies=["writer"],
711
646
  token_ttl=86400)
712
647
  ```
713
- <!--End PulumiCodeChooser -->
714
648
 
715
649
  ## Import
716
650
 
@@ -736,31 +670,15 @@ class AuthBackendRole(pulumi.CustomResource):
736
670
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
737
671
  *Available only for Vault Enterprise*.
738
672
  :param pulumi.Input[str] path: Path where the auth backend is mounted.
739
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
740
- addresses which can authenticate successfully, and ties the resulting token to these blocks
741
- as well.
742
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
743
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
744
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
745
- `token_max_ttl` would otherwise allow a renewal.
746
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
747
- Its current value will be referenced at renewal time.
748
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
749
- generated tokens; otherwise it will be added to the policies set in token_policies.
673
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
674
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
675
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
676
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
750
677
  :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
751
- :param pulumi.Input[int] token_period: If set, indicates that the
752
- token generated using this role should never expire. The token should be renewed within the
753
- duration specified by this value. At each renewal, the token's TTL will be set to the
754
- value of this field. Specified in seconds.
755
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
756
- on the auth method, this list may be supplemented by user/group/other values.
757
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
758
- Its current value will be referenced at renewal time.
759
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
760
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
761
- `service` tokens). For token store roles, there are two additional possibilities:
762
- `default-service` and `default-batch` which specify the type to return unless the client
763
- requests a different type at generation time.
678
+ :param pulumi.Input[int] token_period: Generated Token's Period
679
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
680
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
681
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
764
682
  """
765
683
  ...
766
684
  @overload
@@ -775,7 +693,6 @@ class AuthBackendRole(pulumi.CustomResource):
775
693
 
776
694
  ## Example Usage
777
695
 
778
- <!--Start PulumiCodeChooser -->
779
696
  ```python
780
697
  import pulumi
781
698
  import pulumi_vault as vault
@@ -797,7 +714,6 @@ class AuthBackendRole(pulumi.CustomResource):
797
714
  token_policies=["writer"],
798
715
  token_ttl=86400)
799
716
  ```
800
- <!--End PulumiCodeChooser -->
801
717
 
802
718
  ## Import
803
719
 
@@ -915,31 +831,15 @@ class AuthBackendRole(pulumi.CustomResource):
915
831
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
916
832
  *Available only for Vault Enterprise*.
917
833
  :param pulumi.Input[str] path: Path where the auth backend is mounted.
918
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
919
- addresses which can authenticate successfully, and ties the resulting token to these blocks
920
- as well.
921
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
922
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
923
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
924
- `token_max_ttl` would otherwise allow a renewal.
925
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
926
- Its current value will be referenced at renewal time.
927
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
928
- generated tokens; otherwise it will be added to the policies set in token_policies.
834
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
835
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
836
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
837
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
929
838
  :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
930
- :param pulumi.Input[int] token_period: If set, indicates that the
931
- token generated using this role should never expire. The token should be renewed within the
932
- duration specified by this value. At each renewal, the token's TTL will be set to the
933
- value of this field. Specified in seconds.
934
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
935
- on the auth method, this list may be supplemented by user/group/other values.
936
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
937
- Its current value will be referenced at renewal time.
938
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
939
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
940
- `service` tokens). For token store roles, there are two additional possibilities:
941
- `default-service` and `default-batch` which specify the type to return unless the client
942
- requests a different type at generation time.
839
+ :param pulumi.Input[int] token_period: Generated Token's Period
840
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
841
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
842
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
943
843
  """
944
844
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
945
845
 
@@ -1038,9 +938,7 @@ class AuthBackendRole(pulumi.CustomResource):
1038
938
  @pulumi.getter(name="tokenBoundCidrs")
1039
939
  def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
1040
940
  """
1041
- List of CIDR blocks; if set, specifies blocks of IP
1042
- addresses which can authenticate successfully, and ties the resulting token to these blocks
1043
- as well.
941
+ Specifies the blocks of IP addresses which are allowed to use the generated token
1044
942
  """
1045
943
  return pulumi.get(self, "token_bound_cidrs")
1046
944
 
@@ -1048,10 +946,7 @@ class AuthBackendRole(pulumi.CustomResource):
1048
946
  @pulumi.getter(name="tokenExplicitMaxTtl")
1049
947
  def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
1050
948
  """
1051
- If set, will encode an
1052
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1053
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1054
- `token_max_ttl` would otherwise allow a renewal.
949
+ Generated Token's Explicit Maximum TTL in seconds
1055
950
  """
1056
951
  return pulumi.get(self, "token_explicit_max_ttl")
1057
952
 
@@ -1059,8 +954,7 @@ class AuthBackendRole(pulumi.CustomResource):
1059
954
  @pulumi.getter(name="tokenMaxTtl")
1060
955
  def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
1061
956
  """
1062
- The maximum lifetime for generated tokens in number of seconds.
1063
- Its current value will be referenced at renewal time.
957
+ The maximum lifetime of the generated token
1064
958
  """
1065
959
  return pulumi.get(self, "token_max_ttl")
1066
960
 
@@ -1068,8 +962,7 @@ class AuthBackendRole(pulumi.CustomResource):
1068
962
  @pulumi.getter(name="tokenNoDefaultPolicy")
1069
963
  def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
1070
964
  """
1071
- If set, the default policy will not be set on
1072
- generated tokens; otherwise it will be added to the policies set in token_policies.
965
+ If true, the 'default' policy will not automatically be added to generated tokens
1073
966
  """
1074
967
  return pulumi.get(self, "token_no_default_policy")
1075
968
 
@@ -1085,10 +978,7 @@ class AuthBackendRole(pulumi.CustomResource):
1085
978
  @pulumi.getter(name="tokenPeriod")
1086
979
  def token_period(self) -> pulumi.Output[Optional[int]]:
1087
980
  """
1088
- If set, indicates that the
1089
- token generated using this role should never expire. The token should be renewed within the
1090
- duration specified by this value. At each renewal, the token's TTL will be set to the
1091
- value of this field. Specified in seconds.
981
+ Generated Token's Period
1092
982
  """
1093
983
  return pulumi.get(self, "token_period")
1094
984
 
@@ -1096,8 +986,7 @@ class AuthBackendRole(pulumi.CustomResource):
1096
986
  @pulumi.getter(name="tokenPolicies")
1097
987
  def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
1098
988
  """
1099
- List of policies to encode onto generated tokens. Depending
1100
- on the auth method, this list may be supplemented by user/group/other values.
989
+ Generated Token's Policies
1101
990
  """
1102
991
  return pulumi.get(self, "token_policies")
1103
992
 
@@ -1105,8 +994,7 @@ class AuthBackendRole(pulumi.CustomResource):
1105
994
  @pulumi.getter(name="tokenTtl")
1106
995
  def token_ttl(self) -> pulumi.Output[Optional[int]]:
1107
996
  """
1108
- The incremental lifetime for generated tokens in number of seconds.
1109
- Its current value will be referenced at renewal time.
997
+ The initial ttl of the token to generate in seconds
1110
998
  """
1111
999
  return pulumi.get(self, "token_ttl")
1112
1000
 
@@ -1114,11 +1002,7 @@ class AuthBackendRole(pulumi.CustomResource):
1114
1002
  @pulumi.getter(name="tokenType")
1115
1003
  def token_type(self) -> pulumi.Output[Optional[str]]:
1116
1004
  """
1117
- The type of token that should be generated. Can be `service`,
1118
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
1119
- `service` tokens). For token store roles, there are two additional possibilities:
1120
- `default-service` and `default-batch` which specify the type to return unless the client
1121
- requests a different type at generation time.
1005
+ The type of token to generate, service or batch
1122
1006
  """
1123
1007
  return pulumi.get(self, "token_type")
1124
1008
 
@@ -224,7 +224,6 @@ class SyncAssociation(pulumi.CustomResource):
224
224
  """
225
225
  ## Example Usage
226
226
 
227
- <!--Start PulumiCodeChooser -->
228
227
  ```python
229
228
  import pulumi
230
229
  import json
@@ -256,7 +255,6 @@ class SyncAssociation(pulumi.CustomResource):
256
255
  mount=kvv2.path,
257
256
  secret_name=token.name)
258
257
  ```
259
- <!--End PulumiCodeChooser -->
260
258
 
261
259
  :param str resource_name: The name of the resource.
262
260
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -277,7 +275,6 @@ class SyncAssociation(pulumi.CustomResource):
277
275
  """
278
276
  ## Example Usage
279
277
 
280
- <!--Start PulumiCodeChooser -->
281
278
  ```python
282
279
  import pulumi
283
280
  import json
@@ -309,7 +306,6 @@ class SyncAssociation(pulumi.CustomResource):
309
306
  mount=kvv2.path,
310
307
  secret_name=token.name)
311
308
  ```
312
- <!--End PulumiCodeChooser -->
313
309
 
314
310
  :param str resource_name: The name of the resource.
315
311
  :param SyncAssociationArgs args: The arguments to use to populate this resource's properties.
@@ -454,7 +454,6 @@ class SyncAwsDestination(pulumi.CustomResource):
454
454
  """
455
455
  ## Example Usage
456
456
 
457
- <!--Start PulumiCodeChooser -->
458
457
  ```python
459
458
  import pulumi
460
459
  import pulumi_vault as vault
@@ -471,7 +470,6 @@ class SyncAwsDestination(pulumi.CustomResource):
471
470
  "foo": "bar",
472
471
  })
473
472
  ```
474
- <!--End PulumiCodeChooser -->
475
473
 
476
474
  ## Import
477
475
 
@@ -521,7 +519,6 @@ class SyncAwsDestination(pulumi.CustomResource):
521
519
  """
522
520
  ## Example Usage
523
521
 
524
- <!--Start PulumiCodeChooser -->
525
522
  ```python
526
523
  import pulumi
527
524
  import pulumi_vault as vault
@@ -538,7 +535,6 @@ class SyncAwsDestination(pulumi.CustomResource):
538
535
  "foo": "bar",
539
536
  })
540
537
  ```
541
- <!--End PulumiCodeChooser -->
542
538
 
543
539
  ## Import
544
540
 
@@ -430,7 +430,6 @@ class SyncAzureDestination(pulumi.CustomResource):
430
430
  """
431
431
  ## Example Usage
432
432
 
433
- <!--Start PulumiCodeChooser -->
434
433
  ```python
435
434
  import pulumi
436
435
  import pulumi_vault as vault
@@ -446,7 +445,6 @@ class SyncAzureDestination(pulumi.CustomResource):
446
445
  "foo": "bar",
447
446
  })
448
447
  ```
449
- <!--End PulumiCodeChooser -->
450
448
 
451
449
  ## Import
452
450
 
@@ -490,7 +488,6 @@ class SyncAzureDestination(pulumi.CustomResource):
490
488
  """
491
489
  ## Example Usage
492
490
 
493
- <!--Start PulumiCodeChooser -->
494
491
  ```python
495
492
  import pulumi
496
493
  import pulumi_vault as vault
@@ -506,7 +503,6 @@ class SyncAzureDestination(pulumi.CustomResource):
506
503
  "foo": "bar",
507
504
  })
508
505
  ```
509
- <!--End PulumiCodeChooser -->
510
506
 
511
507
  ## Import
512
508
 
@@ -150,7 +150,6 @@ class SyncConfig(pulumi.CustomResource):
150
150
 
151
151
  ## Example Usage
152
152
 
153
- <!--Start PulumiCodeChooser -->
154
153
  ```python
155
154
  import pulumi
156
155
  import pulumi_vault as vault
@@ -159,7 +158,6 @@ class SyncConfig(pulumi.CustomResource):
159
158
  disabled=True,
160
159
  queue_capacity=500000)
161
160
  ```
162
- <!--End PulumiCodeChooser -->
163
161
 
164
162
  ## Import
165
163
 
@@ -191,7 +189,6 @@ class SyncConfig(pulumi.CustomResource):
191
189
 
192
190
  ## Example Usage
193
191
 
194
- <!--Start PulumiCodeChooser -->
195
192
  ```python
196
193
  import pulumi
197
194
  import pulumi_vault as vault
@@ -200,7 +197,6 @@ class SyncConfig(pulumi.CustomResource):
200
197
  disabled=True,
201
198
  queue_capacity=500000)
202
199
  ```
203
- <!--End PulumiCodeChooser -->
204
200
 
205
201
  ## Import
206
202