pulumi-vault 6.2.0a1713561465__py3-none-any.whl → 6.2.0a1714114277__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -20
- pulumi_vault/ad/secret_backend.py +0 -4
- pulumi_vault/ad/secret_library.py +0 -4
- pulumi_vault/ad/secret_role.py +0 -4
- pulumi_vault/alicloud/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_login.py +0 -4
- pulumi_vault/approle/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
- pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
- pulumi_vault/audit.py +0 -8
- pulumi_vault/audit_request_header.py +0 -4
- pulumi_vault/aws/auth_backend_client.py +0 -4
- pulumi_vault/aws/auth_backend_config_identity.py +0 -4
- pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -4
- pulumi_vault/aws/auth_backend_role.py +63 -186
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -4
- pulumi_vault/aws/auth_backend_sts_role.py +0 -4
- pulumi_vault/aws/secret_backend_role.py +0 -4
- pulumi_vault/aws/secret_backend_static_role.py +0 -4
- pulumi_vault/azure/auth_backend_config.py +0 -4
- pulumi_vault/azure/auth_backend_role.py +63 -186
- pulumi_vault/azure/backend.py +0 -8
- pulumi_vault/azure/backend_role.py +0 -4
- pulumi_vault/azure/get_access_credentials.py +0 -4
- pulumi_vault/cert_auth_backend_role.py +63 -200
- pulumi_vault/consul/secret_backend.py +0 -8
- pulumi_vault/consul/secret_backend_role.py +0 -4
- pulumi_vault/database/_inputs.py +522 -784
- pulumi_vault/database/outputs.py +522 -784
- pulumi_vault/database/secret_backend_connection.py +0 -4
- pulumi_vault/database/secret_backend_role.py +0 -4
- pulumi_vault/database/secret_backend_static_role.py +0 -4
- pulumi_vault/database/secrets_mount.py +0 -4
- pulumi_vault/egp_policy.py +0 -4
- pulumi_vault/gcp/auth_backend_role.py +63 -264
- pulumi_vault/gcp/get_auth_backend_role.py +0 -4
- pulumi_vault/gcp/secret_backend.py +0 -4
- pulumi_vault/gcp/secret_impersonated_account.py +0 -4
- pulumi_vault/gcp/secret_roleset.py +0 -4
- pulumi_vault/gcp/secret_static_account.py +0 -4
- pulumi_vault/generic/endpoint.py +0 -4
- pulumi_vault/generic/get_secret.py +0 -8
- pulumi_vault/get_auth_backend.py +0 -4
- pulumi_vault/get_auth_backends.py +0 -8
- pulumi_vault/get_namespace.py +0 -12
- pulumi_vault/get_namespaces.py +0 -8
- pulumi_vault/get_nomad_access_token.py +0 -4
- pulumi_vault/get_policy_document.py +0 -4
- pulumi_vault/get_raft_autopilot_state.py +0 -4
- pulumi_vault/github/auth_backend.py +0 -4
- pulumi_vault/github/team.py +0 -4
- pulumi_vault/github/user.py +0 -4
- pulumi_vault/identity/entity.py +0 -4
- pulumi_vault/identity/entity_alias.py +0 -4
- pulumi_vault/identity/entity_policies.py +0 -8
- pulumi_vault/identity/get_entity.py +0 -4
- pulumi_vault/identity/get_group.py +0 -4
- pulumi_vault/identity/get_oidc_client_creds.py +0 -4
- pulumi_vault/identity/get_oidc_openid_config.py +0 -4
- pulumi_vault/identity/get_oidc_public_keys.py +0 -4
- pulumi_vault/identity/group.py +0 -12
- pulumi_vault/identity/group_alias.py +0 -4
- pulumi_vault/identity/group_member_entity_ids.py +0 -8
- pulumi_vault/identity/group_member_group_ids.py +0 -8
- pulumi_vault/identity/group_policies.py +0 -8
- pulumi_vault/identity/mfa_duo.py +0 -4
- pulumi_vault/identity/mfa_login_enforcement.py +0 -4
- pulumi_vault/identity/mfa_okta.py +0 -4
- pulumi_vault/identity/mfa_pingid.py +0 -4
- pulumi_vault/identity/mfa_totp.py +0 -4
- pulumi_vault/identity/oidc.py +0 -4
- pulumi_vault/identity/oidc_assignment.py +0 -4
- pulumi_vault/identity/oidc_client.py +0 -4
- pulumi_vault/identity/oidc_key.py +0 -4
- pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -4
- pulumi_vault/identity/oidc_provider.py +0 -4
- pulumi_vault/identity/oidc_role.py +0 -8
- pulumi_vault/identity/oidc_scope.py +0 -4
- pulumi_vault/jwt/auth_backend.py +0 -12
- pulumi_vault/jwt/auth_backend_role.py +63 -190
- pulumi_vault/kmip/secret_backend.py +0 -4
- pulumi_vault/kmip/secret_role.py +0 -4
- pulumi_vault/kmip/secret_scope.py +0 -4
- pulumi_vault/kubernetes/auth_backend_config.py +0 -4
- pulumi_vault/kubernetes/auth_backend_role.py +56 -172
- pulumi_vault/kubernetes/get_service_account_token.py +0 -4
- pulumi_vault/kubernetes/secret_backend.py +0 -4
- pulumi_vault/kubernetes/secret_backend_role.py +0 -12
- pulumi_vault/kv/get_secret.py +0 -4
- pulumi_vault/kv/get_secret_subkeys_v2.py +0 -4
- pulumi_vault/kv/get_secret_v2.py +0 -4
- pulumi_vault/kv/get_secrets_list.py +0 -4
- pulumi_vault/kv/get_secrets_list_v2.py +0 -4
- pulumi_vault/kv/secret.py +0 -4
- pulumi_vault/kv/secret_backend_v2.py +0 -4
- pulumi_vault/kv/secret_v2.py +0 -4
- pulumi_vault/ldap/auth_backend.py +56 -151
- pulumi_vault/ldap/auth_backend_group.py +0 -4
- pulumi_vault/ldap/auth_backend_user.py +0 -4
- pulumi_vault/ldap/secret_backend.py +0 -4
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
- pulumi_vault/ldap/secret_backend_library_set.py +0 -4
- pulumi_vault/ldap/secret_backend_static_role.py +0 -4
- pulumi_vault/managed/_inputs.py +84 -132
- pulumi_vault/managed/keys.py +7 -28
- pulumi_vault/managed/outputs.py +84 -132
- pulumi_vault/mfa_duo.py +0 -4
- pulumi_vault/mfa_okta.py +0 -4
- pulumi_vault/mfa_pingid.py +0 -4
- pulumi_vault/mfa_totp.py +0 -4
- pulumi_vault/mongodbatlas/secret_backend.py +0 -4
- pulumi_vault/mongodbatlas/secret_role.py +0 -4
- pulumi_vault/mount.py +0 -16
- pulumi_vault/nomad_secret_backend.py +0 -4
- pulumi_vault/nomad_secret_role.py +0 -4
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +0 -4
- pulumi_vault/okta/auth_backend_group.py +0 -4
- pulumi_vault/okta/auth_backend_user.py +0 -4
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +0 -20
- pulumi_vault/password_policy.py +0 -4
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
- pulumi_vault/pkisecret/get_backend_key.py +0 -4
- pulumi_vault/pkisecret/get_backend_keys.py +0 -4
- pulumi_vault/pkisecret/secret_backend_cert.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
- pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -4
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/secret_backend_role.py +0 -4
- pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -4
- pulumi_vault/pkisecret/secret_backend_sign.py +0 -4
- pulumi_vault/quota_lease_count.py +0 -4
- pulumi_vault/quota_rate_limit.py +0 -4
- pulumi_vault/rabbitmq/secret_backend.py +0 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +0 -4
- pulumi_vault/raft_autopilot.py +0 -4
- pulumi_vault/raft_snapshot_agent_config.py +91 -292
- pulumi_vault/rgp_policy.py +0 -4
- pulumi_vault/saml/auth_backend.py +0 -4
- pulumi_vault/saml/auth_backend_role.py +56 -172
- pulumi_vault/secrets/sync_association.py +0 -4
- pulumi_vault/secrets/sync_aws_destination.py +0 -4
- pulumi_vault/secrets/sync_azure_destination.py +0 -4
- pulumi_vault/secrets/sync_config.py +0 -4
- pulumi_vault/secrets/sync_gcp_destination.py +0 -4
- pulumi_vault/secrets/sync_gh_destination.py +0 -4
- pulumi_vault/secrets/sync_github_apps.py +0 -4
- pulumi_vault/secrets/sync_vercel_destination.py +0 -4
- pulumi_vault/ssh/_inputs.py +6 -20
- pulumi_vault/ssh/outputs.py +6 -20
- pulumi_vault/ssh/secret_backend_ca.py +0 -4
- pulumi_vault/ssh/secret_backend_role.py +0 -4
- pulumi_vault/terraformcloud/secret_backend.py +0 -4
- pulumi_vault/terraformcloud/secret_creds.py +0 -4
- pulumi_vault/terraformcloud/secret_role.py +0 -4
- pulumi_vault/token.py +0 -4
- pulumi_vault/tokenauth/auth_backend_role.py +56 -172
- pulumi_vault/transform/alphabet.py +0 -4
- pulumi_vault/transform/get_decode.py +0 -4
- pulumi_vault/transform/get_encode.py +0 -4
- pulumi_vault/transform/role.py +0 -4
- pulumi_vault/transform/template.py +0 -4
- pulumi_vault/transit/get_decrypt.py +0 -16
- pulumi_vault/transit/get_encrypt.py +0 -14
- pulumi_vault/transit/secret_backend_key.py +0 -4
- pulumi_vault/transit/secret_cache_config.py +0 -4
- {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1714114277.dist-info/RECORD +252 -0
- pulumi_vault-6.2.0a1713561465.dist-info/RECORD +0 -252
- {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/top_level.txt +0 -0
pulumi_vault/rgp_policy.py
CHANGED
@@ -182,7 +182,6 @@ class RgpPolicy(pulumi.CustomResource):
|
|
182
182
|
|
183
183
|
## Example Usage
|
184
184
|
|
185
|
-
<!--Start PulumiCodeChooser -->
|
186
185
|
```python
|
187
186
|
import pulumi
|
188
187
|
import pulumi_vault as vault
|
@@ -195,7 +194,6 @@ class RgpPolicy(pulumi.CustomResource):
|
|
195
194
|
}
|
196
195
|
\"\"\")
|
197
196
|
```
|
198
|
-
<!--End PulumiCodeChooser -->
|
199
197
|
|
200
198
|
:param str resource_name: The name of the resource.
|
201
199
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -220,7 +218,6 @@ class RgpPolicy(pulumi.CustomResource):
|
|
220
218
|
|
221
219
|
## Example Usage
|
222
220
|
|
223
|
-
<!--Start PulumiCodeChooser -->
|
224
221
|
```python
|
225
222
|
import pulumi
|
226
223
|
import pulumi_vault as vault
|
@@ -233,7 +230,6 @@ class RgpPolicy(pulumi.CustomResource):
|
|
233
230
|
}
|
234
231
|
\"\"\")
|
235
232
|
```
|
236
|
-
<!--End PulumiCodeChooser -->
|
237
233
|
|
238
234
|
:param str resource_name: The name of the resource.
|
239
235
|
:param RgpPolicyArgs args: The arguments to use to populate this resource's properties.
|
@@ -445,7 +445,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
445
445
|
|
446
446
|
## Example Usage
|
447
447
|
|
448
|
-
<!--Start PulumiCodeChooser -->
|
449
448
|
```python
|
450
449
|
import pulumi
|
451
450
|
import pulumi_vault as vault
|
@@ -457,7 +456,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
457
456
|
acs_urls=["https://my.vault.primary/v1/auth/saml/callback"],
|
458
457
|
default_role="admin")
|
459
458
|
```
|
460
|
-
<!--End PulumiCodeChooser -->
|
461
459
|
|
462
460
|
## Import
|
463
461
|
|
@@ -505,7 +503,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
505
503
|
|
506
504
|
## Example Usage
|
507
505
|
|
508
|
-
<!--Start PulumiCodeChooser -->
|
509
506
|
```python
|
510
507
|
import pulumi
|
511
508
|
import pulumi_vault as vault
|
@@ -517,7 +514,6 @@ class AuthBackend(pulumi.CustomResource):
|
|
517
514
|
acs_urls=["https://my.vault.primary/v1/auth/saml/callback"],
|
518
515
|
default_role="admin")
|
519
516
|
```
|
520
|
-
<!--End PulumiCodeChooser -->
|
521
517
|
|
522
518
|
## Import
|
523
519
|
|
@@ -47,31 +47,15 @@ class AuthBackendRoleArgs:
|
|
47
47
|
The value should not contain leading or trailing forward slashes.
|
48
48
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
49
49
|
*Available only for Vault Enterprise*.
|
50
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
51
|
-
|
52
|
-
|
53
|
-
:param pulumi.Input[
|
54
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
55
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
56
|
-
`token_max_ttl` would otherwise allow a renewal.
|
57
|
-
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
58
|
-
Its current value will be referenced at renewal time.
|
59
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
60
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
50
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
51
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
52
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
53
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
61
54
|
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
62
|
-
:param pulumi.Input[int] token_period:
|
63
|
-
|
64
|
-
|
65
|
-
|
66
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
67
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
68
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
69
|
-
Its current value will be referenced at renewal time.
|
70
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
71
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
72
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
73
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
74
|
-
requests a different type at generation time.
|
55
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
56
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
57
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
58
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
75
59
|
"""
|
76
60
|
pulumi.set(__self__, "path", path)
|
77
61
|
if bound_attributes is not None:
|
@@ -213,9 +197,7 @@ class AuthBackendRoleArgs:
|
|
213
197
|
@pulumi.getter(name="tokenBoundCidrs")
|
214
198
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
215
199
|
"""
|
216
|
-
|
217
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
218
|
-
as well.
|
200
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
219
201
|
"""
|
220
202
|
return pulumi.get(self, "token_bound_cidrs")
|
221
203
|
|
@@ -227,10 +209,7 @@ class AuthBackendRoleArgs:
|
|
227
209
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
228
210
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
229
211
|
"""
|
230
|
-
|
231
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
232
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
233
|
-
`token_max_ttl` would otherwise allow a renewal.
|
212
|
+
Generated Token's Explicit Maximum TTL in seconds
|
234
213
|
"""
|
235
214
|
return pulumi.get(self, "token_explicit_max_ttl")
|
236
215
|
|
@@ -242,8 +221,7 @@ class AuthBackendRoleArgs:
|
|
242
221
|
@pulumi.getter(name="tokenMaxTtl")
|
243
222
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
244
223
|
"""
|
245
|
-
The maximum lifetime
|
246
|
-
Its current value will be referenced at renewal time.
|
224
|
+
The maximum lifetime of the generated token
|
247
225
|
"""
|
248
226
|
return pulumi.get(self, "token_max_ttl")
|
249
227
|
|
@@ -255,8 +233,7 @@ class AuthBackendRoleArgs:
|
|
255
233
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
256
234
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
257
235
|
"""
|
258
|
-
If
|
259
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
236
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
260
237
|
"""
|
261
238
|
return pulumi.get(self, "token_no_default_policy")
|
262
239
|
|
@@ -280,10 +257,7 @@ class AuthBackendRoleArgs:
|
|
280
257
|
@pulumi.getter(name="tokenPeriod")
|
281
258
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
282
259
|
"""
|
283
|
-
|
284
|
-
token generated using this role should never expire. The token should be renewed within the
|
285
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
286
|
-
value of this field. Specified in seconds.
|
260
|
+
Generated Token's Period
|
287
261
|
"""
|
288
262
|
return pulumi.get(self, "token_period")
|
289
263
|
|
@@ -295,8 +269,7 @@ class AuthBackendRoleArgs:
|
|
295
269
|
@pulumi.getter(name="tokenPolicies")
|
296
270
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
297
271
|
"""
|
298
|
-
|
299
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
272
|
+
Generated Token's Policies
|
300
273
|
"""
|
301
274
|
return pulumi.get(self, "token_policies")
|
302
275
|
|
@@ -308,8 +281,7 @@ class AuthBackendRoleArgs:
|
|
308
281
|
@pulumi.getter(name="tokenTtl")
|
309
282
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
310
283
|
"""
|
311
|
-
The
|
312
|
-
Its current value will be referenced at renewal time.
|
284
|
+
The initial ttl of the token to generate in seconds
|
313
285
|
"""
|
314
286
|
return pulumi.get(self, "token_ttl")
|
315
287
|
|
@@ -321,11 +293,7 @@ class AuthBackendRoleArgs:
|
|
321
293
|
@pulumi.getter(name="tokenType")
|
322
294
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
323
295
|
"""
|
324
|
-
The type of token
|
325
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
326
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
327
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
328
|
-
requests a different type at generation time.
|
296
|
+
The type of token to generate, service or batch
|
329
297
|
"""
|
330
298
|
return pulumi.get(self, "token_type")
|
331
299
|
|
@@ -370,31 +338,15 @@ class _AuthBackendRoleState:
|
|
370
338
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
371
339
|
*Available only for Vault Enterprise*.
|
372
340
|
:param pulumi.Input[str] path: Path where the auth backend is mounted.
|
373
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
374
|
-
|
375
|
-
|
376
|
-
:param pulumi.Input[
|
377
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
378
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
379
|
-
`token_max_ttl` would otherwise allow a renewal.
|
380
|
-
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
381
|
-
Its current value will be referenced at renewal time.
|
382
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
383
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
341
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
342
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
343
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
344
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
384
345
|
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
385
|
-
:param pulumi.Input[int] token_period:
|
386
|
-
|
387
|
-
|
388
|
-
|
389
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
390
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
391
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
392
|
-
Its current value will be referenced at renewal time.
|
393
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
394
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
395
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
396
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
397
|
-
requests a different type at generation time.
|
346
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
347
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
348
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
349
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
398
350
|
"""
|
399
351
|
if bound_attributes is not None:
|
400
352
|
pulumi.set(__self__, "bound_attributes", bound_attributes)
|
@@ -537,9 +489,7 @@ class _AuthBackendRoleState:
|
|
537
489
|
@pulumi.getter(name="tokenBoundCidrs")
|
538
490
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
539
491
|
"""
|
540
|
-
|
541
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
542
|
-
as well.
|
492
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
543
493
|
"""
|
544
494
|
return pulumi.get(self, "token_bound_cidrs")
|
545
495
|
|
@@ -551,10 +501,7 @@ class _AuthBackendRoleState:
|
|
551
501
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
552
502
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
553
503
|
"""
|
554
|
-
|
555
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
556
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
557
|
-
`token_max_ttl` would otherwise allow a renewal.
|
504
|
+
Generated Token's Explicit Maximum TTL in seconds
|
558
505
|
"""
|
559
506
|
return pulumi.get(self, "token_explicit_max_ttl")
|
560
507
|
|
@@ -566,8 +513,7 @@ class _AuthBackendRoleState:
|
|
566
513
|
@pulumi.getter(name="tokenMaxTtl")
|
567
514
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
568
515
|
"""
|
569
|
-
The maximum lifetime
|
570
|
-
Its current value will be referenced at renewal time.
|
516
|
+
The maximum lifetime of the generated token
|
571
517
|
"""
|
572
518
|
return pulumi.get(self, "token_max_ttl")
|
573
519
|
|
@@ -579,8 +525,7 @@ class _AuthBackendRoleState:
|
|
579
525
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
580
526
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
581
527
|
"""
|
582
|
-
If
|
583
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
528
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
584
529
|
"""
|
585
530
|
return pulumi.get(self, "token_no_default_policy")
|
586
531
|
|
@@ -604,10 +549,7 @@ class _AuthBackendRoleState:
|
|
604
549
|
@pulumi.getter(name="tokenPeriod")
|
605
550
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
606
551
|
"""
|
607
|
-
|
608
|
-
token generated using this role should never expire. The token should be renewed within the
|
609
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
610
|
-
value of this field. Specified in seconds.
|
552
|
+
Generated Token's Period
|
611
553
|
"""
|
612
554
|
return pulumi.get(self, "token_period")
|
613
555
|
|
@@ -619,8 +561,7 @@ class _AuthBackendRoleState:
|
|
619
561
|
@pulumi.getter(name="tokenPolicies")
|
620
562
|
def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
621
563
|
"""
|
622
|
-
|
623
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
564
|
+
Generated Token's Policies
|
624
565
|
"""
|
625
566
|
return pulumi.get(self, "token_policies")
|
626
567
|
|
@@ -632,8 +573,7 @@ class _AuthBackendRoleState:
|
|
632
573
|
@pulumi.getter(name="tokenTtl")
|
633
574
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
634
575
|
"""
|
635
|
-
The
|
636
|
-
Its current value will be referenced at renewal time.
|
576
|
+
The initial ttl of the token to generate in seconds
|
637
577
|
"""
|
638
578
|
return pulumi.get(self, "token_ttl")
|
639
579
|
|
@@ -645,11 +585,7 @@ class _AuthBackendRoleState:
|
|
645
585
|
@pulumi.getter(name="tokenType")
|
646
586
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
647
587
|
"""
|
648
|
-
The type of token
|
649
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
650
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
651
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
652
|
-
requests a different type at generation time.
|
588
|
+
The type of token to generate, service or batch
|
653
589
|
"""
|
654
590
|
return pulumi.get(self, "token_type")
|
655
591
|
|
@@ -688,7 +624,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
688
624
|
|
689
625
|
## Example Usage
|
690
626
|
|
691
|
-
<!--Start PulumiCodeChooser -->
|
692
627
|
```python
|
693
628
|
import pulumi
|
694
629
|
import pulumi_vault as vault
|
@@ -710,7 +645,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
710
645
|
token_policies=["writer"],
|
711
646
|
token_ttl=86400)
|
712
647
|
```
|
713
|
-
<!--End PulumiCodeChooser -->
|
714
648
|
|
715
649
|
## Import
|
716
650
|
|
@@ -736,31 +670,15 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
736
670
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
737
671
|
*Available only for Vault Enterprise*.
|
738
672
|
:param pulumi.Input[str] path: Path where the auth backend is mounted.
|
739
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
740
|
-
|
741
|
-
|
742
|
-
:param pulumi.Input[
|
743
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
744
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
745
|
-
`token_max_ttl` would otherwise allow a renewal.
|
746
|
-
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
747
|
-
Its current value will be referenced at renewal time.
|
748
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
749
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
673
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
674
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
675
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
676
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
750
677
|
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
751
|
-
:param pulumi.Input[int] token_period:
|
752
|
-
|
753
|
-
|
754
|
-
|
755
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
756
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
757
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
758
|
-
Its current value will be referenced at renewal time.
|
759
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
760
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
761
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
762
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
763
|
-
requests a different type at generation time.
|
678
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
679
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
680
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
681
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
764
682
|
"""
|
765
683
|
...
|
766
684
|
@overload
|
@@ -775,7 +693,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
775
693
|
|
776
694
|
## Example Usage
|
777
695
|
|
778
|
-
<!--Start PulumiCodeChooser -->
|
779
696
|
```python
|
780
697
|
import pulumi
|
781
698
|
import pulumi_vault as vault
|
@@ -797,7 +714,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
797
714
|
token_policies=["writer"],
|
798
715
|
token_ttl=86400)
|
799
716
|
```
|
800
|
-
<!--End PulumiCodeChooser -->
|
801
717
|
|
802
718
|
## Import
|
803
719
|
|
@@ -915,31 +831,15 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
915
831
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
916
832
|
*Available only for Vault Enterprise*.
|
917
833
|
:param pulumi.Input[str] path: Path where the auth backend is mounted.
|
918
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
919
|
-
|
920
|
-
|
921
|
-
:param pulumi.Input[
|
922
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
923
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
924
|
-
`token_max_ttl` would otherwise allow a renewal.
|
925
|
-
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
926
|
-
Its current value will be referenced at renewal time.
|
927
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
928
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
834
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
835
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
836
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
837
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
929
838
|
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
930
|
-
:param pulumi.Input[int] token_period:
|
931
|
-
|
932
|
-
|
933
|
-
|
934
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
|
935
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
936
|
-
:param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
|
937
|
-
Its current value will be referenced at renewal time.
|
938
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
939
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
940
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
941
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
942
|
-
requests a different type at generation time.
|
839
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
840
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
841
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
842
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
943
843
|
"""
|
944
844
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
945
845
|
|
@@ -1038,9 +938,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1038
938
|
@pulumi.getter(name="tokenBoundCidrs")
|
1039
939
|
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1040
940
|
"""
|
1041
|
-
|
1042
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
1043
|
-
as well.
|
941
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
1044
942
|
"""
|
1045
943
|
return pulumi.get(self, "token_bound_cidrs")
|
1046
944
|
|
@@ -1048,10 +946,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1048
946
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
1049
947
|
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1050
948
|
"""
|
1051
|
-
|
1052
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
1053
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1054
|
-
`token_max_ttl` would otherwise allow a renewal.
|
949
|
+
Generated Token's Explicit Maximum TTL in seconds
|
1055
950
|
"""
|
1056
951
|
return pulumi.get(self, "token_explicit_max_ttl")
|
1057
952
|
|
@@ -1059,8 +954,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1059
954
|
@pulumi.getter(name="tokenMaxTtl")
|
1060
955
|
def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1061
956
|
"""
|
1062
|
-
The maximum lifetime
|
1063
|
-
Its current value will be referenced at renewal time.
|
957
|
+
The maximum lifetime of the generated token
|
1064
958
|
"""
|
1065
959
|
return pulumi.get(self, "token_max_ttl")
|
1066
960
|
|
@@ -1068,8 +962,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1068
962
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
1069
963
|
def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
|
1070
964
|
"""
|
1071
|
-
If
|
1072
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
965
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
1073
966
|
"""
|
1074
967
|
return pulumi.get(self, "token_no_default_policy")
|
1075
968
|
|
@@ -1085,10 +978,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1085
978
|
@pulumi.getter(name="tokenPeriod")
|
1086
979
|
def token_period(self) -> pulumi.Output[Optional[int]]:
|
1087
980
|
"""
|
1088
|
-
|
1089
|
-
token generated using this role should never expire. The token should be renewed within the
|
1090
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1091
|
-
value of this field. Specified in seconds.
|
981
|
+
Generated Token's Period
|
1092
982
|
"""
|
1093
983
|
return pulumi.get(self, "token_period")
|
1094
984
|
|
@@ -1096,8 +986,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1096
986
|
@pulumi.getter(name="tokenPolicies")
|
1097
987
|
def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1098
988
|
"""
|
1099
|
-
|
1100
|
-
on the auth method, this list may be supplemented by user/group/other values.
|
989
|
+
Generated Token's Policies
|
1101
990
|
"""
|
1102
991
|
return pulumi.get(self, "token_policies")
|
1103
992
|
|
@@ -1105,8 +994,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1105
994
|
@pulumi.getter(name="tokenTtl")
|
1106
995
|
def token_ttl(self) -> pulumi.Output[Optional[int]]:
|
1107
996
|
"""
|
1108
|
-
The
|
1109
|
-
Its current value will be referenced at renewal time.
|
997
|
+
The initial ttl of the token to generate in seconds
|
1110
998
|
"""
|
1111
999
|
return pulumi.get(self, "token_ttl")
|
1112
1000
|
|
@@ -1114,11 +1002,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1114
1002
|
@pulumi.getter(name="tokenType")
|
1115
1003
|
def token_type(self) -> pulumi.Output[Optional[str]]:
|
1116
1004
|
"""
|
1117
|
-
The type of token
|
1118
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1119
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
1120
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
1121
|
-
requests a different type at generation time.
|
1005
|
+
The type of token to generate, service or batch
|
1122
1006
|
"""
|
1123
1007
|
return pulumi.get(self, "token_type")
|
1124
1008
|
|
@@ -224,7 +224,6 @@ class SyncAssociation(pulumi.CustomResource):
|
|
224
224
|
"""
|
225
225
|
## Example Usage
|
226
226
|
|
227
|
-
<!--Start PulumiCodeChooser -->
|
228
227
|
```python
|
229
228
|
import pulumi
|
230
229
|
import json
|
@@ -256,7 +255,6 @@ class SyncAssociation(pulumi.CustomResource):
|
|
256
255
|
mount=kvv2.path,
|
257
256
|
secret_name=token.name)
|
258
257
|
```
|
259
|
-
<!--End PulumiCodeChooser -->
|
260
258
|
|
261
259
|
:param str resource_name: The name of the resource.
|
262
260
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -277,7 +275,6 @@ class SyncAssociation(pulumi.CustomResource):
|
|
277
275
|
"""
|
278
276
|
## Example Usage
|
279
277
|
|
280
|
-
<!--Start PulumiCodeChooser -->
|
281
278
|
```python
|
282
279
|
import pulumi
|
283
280
|
import json
|
@@ -309,7 +306,6 @@ class SyncAssociation(pulumi.CustomResource):
|
|
309
306
|
mount=kvv2.path,
|
310
307
|
secret_name=token.name)
|
311
308
|
```
|
312
|
-
<!--End PulumiCodeChooser -->
|
313
309
|
|
314
310
|
:param str resource_name: The name of the resource.
|
315
311
|
:param SyncAssociationArgs args: The arguments to use to populate this resource's properties.
|
@@ -454,7 +454,6 @@ class SyncAwsDestination(pulumi.CustomResource):
|
|
454
454
|
"""
|
455
455
|
## Example Usage
|
456
456
|
|
457
|
-
<!--Start PulumiCodeChooser -->
|
458
457
|
```python
|
459
458
|
import pulumi
|
460
459
|
import pulumi_vault as vault
|
@@ -471,7 +470,6 @@ class SyncAwsDestination(pulumi.CustomResource):
|
|
471
470
|
"foo": "bar",
|
472
471
|
})
|
473
472
|
```
|
474
|
-
<!--End PulumiCodeChooser -->
|
475
473
|
|
476
474
|
## Import
|
477
475
|
|
@@ -521,7 +519,6 @@ class SyncAwsDestination(pulumi.CustomResource):
|
|
521
519
|
"""
|
522
520
|
## Example Usage
|
523
521
|
|
524
|
-
<!--Start PulumiCodeChooser -->
|
525
522
|
```python
|
526
523
|
import pulumi
|
527
524
|
import pulumi_vault as vault
|
@@ -538,7 +535,6 @@ class SyncAwsDestination(pulumi.CustomResource):
|
|
538
535
|
"foo": "bar",
|
539
536
|
})
|
540
537
|
```
|
541
|
-
<!--End PulumiCodeChooser -->
|
542
538
|
|
543
539
|
## Import
|
544
540
|
|
@@ -430,7 +430,6 @@ class SyncAzureDestination(pulumi.CustomResource):
|
|
430
430
|
"""
|
431
431
|
## Example Usage
|
432
432
|
|
433
|
-
<!--Start PulumiCodeChooser -->
|
434
433
|
```python
|
435
434
|
import pulumi
|
436
435
|
import pulumi_vault as vault
|
@@ -446,7 +445,6 @@ class SyncAzureDestination(pulumi.CustomResource):
|
|
446
445
|
"foo": "bar",
|
447
446
|
})
|
448
447
|
```
|
449
|
-
<!--End PulumiCodeChooser -->
|
450
448
|
|
451
449
|
## Import
|
452
450
|
|
@@ -490,7 +488,6 @@ class SyncAzureDestination(pulumi.CustomResource):
|
|
490
488
|
"""
|
491
489
|
## Example Usage
|
492
490
|
|
493
|
-
<!--Start PulumiCodeChooser -->
|
494
491
|
```python
|
495
492
|
import pulumi
|
496
493
|
import pulumi_vault as vault
|
@@ -506,7 +503,6 @@ class SyncAzureDestination(pulumi.CustomResource):
|
|
506
503
|
"foo": "bar",
|
507
504
|
})
|
508
505
|
```
|
509
|
-
<!--End PulumiCodeChooser -->
|
510
506
|
|
511
507
|
## Import
|
512
508
|
|
@@ -150,7 +150,6 @@ class SyncConfig(pulumi.CustomResource):
|
|
150
150
|
|
151
151
|
## Example Usage
|
152
152
|
|
153
|
-
<!--Start PulumiCodeChooser -->
|
154
153
|
```python
|
155
154
|
import pulumi
|
156
155
|
import pulumi_vault as vault
|
@@ -159,7 +158,6 @@ class SyncConfig(pulumi.CustomResource):
|
|
159
158
|
disabled=True,
|
160
159
|
queue_capacity=500000)
|
161
160
|
```
|
162
|
-
<!--End PulumiCodeChooser -->
|
163
161
|
|
164
162
|
## Import
|
165
163
|
|
@@ -191,7 +189,6 @@ class SyncConfig(pulumi.CustomResource):
|
|
191
189
|
|
192
190
|
## Example Usage
|
193
191
|
|
194
|
-
<!--Start PulumiCodeChooser -->
|
195
192
|
```python
|
196
193
|
import pulumi
|
197
194
|
import pulumi_vault as vault
|
@@ -200,7 +197,6 @@ class SyncConfig(pulumi.CustomResource):
|
|
200
197
|
disabled=True,
|
201
198
|
queue_capacity=500000)
|
202
199
|
```
|
203
|
-
<!--End PulumiCodeChooser -->
|
204
200
|
|
205
201
|
## Import
|
206
202
|
|