pulumi-vault 6.2.0a1713561465__py3-none-any.whl → 6.2.0a1714114277__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -20
- pulumi_vault/ad/secret_backend.py +0 -4
- pulumi_vault/ad/secret_library.py +0 -4
- pulumi_vault/ad/secret_role.py +0 -4
- pulumi_vault/alicloud/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_login.py +0 -4
- pulumi_vault/approle/auth_backend_role.py +63 -186
- pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
- pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
- pulumi_vault/audit.py +0 -8
- pulumi_vault/audit_request_header.py +0 -4
- pulumi_vault/aws/auth_backend_client.py +0 -4
- pulumi_vault/aws/auth_backend_config_identity.py +0 -4
- pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -4
- pulumi_vault/aws/auth_backend_role.py +63 -186
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -4
- pulumi_vault/aws/auth_backend_sts_role.py +0 -4
- pulumi_vault/aws/secret_backend_role.py +0 -4
- pulumi_vault/aws/secret_backend_static_role.py +0 -4
- pulumi_vault/azure/auth_backend_config.py +0 -4
- pulumi_vault/azure/auth_backend_role.py +63 -186
- pulumi_vault/azure/backend.py +0 -8
- pulumi_vault/azure/backend_role.py +0 -4
- pulumi_vault/azure/get_access_credentials.py +0 -4
- pulumi_vault/cert_auth_backend_role.py +63 -200
- pulumi_vault/consul/secret_backend.py +0 -8
- pulumi_vault/consul/secret_backend_role.py +0 -4
- pulumi_vault/database/_inputs.py +522 -784
- pulumi_vault/database/outputs.py +522 -784
- pulumi_vault/database/secret_backend_connection.py +0 -4
- pulumi_vault/database/secret_backend_role.py +0 -4
- pulumi_vault/database/secret_backend_static_role.py +0 -4
- pulumi_vault/database/secrets_mount.py +0 -4
- pulumi_vault/egp_policy.py +0 -4
- pulumi_vault/gcp/auth_backend_role.py +63 -264
- pulumi_vault/gcp/get_auth_backend_role.py +0 -4
- pulumi_vault/gcp/secret_backend.py +0 -4
- pulumi_vault/gcp/secret_impersonated_account.py +0 -4
- pulumi_vault/gcp/secret_roleset.py +0 -4
- pulumi_vault/gcp/secret_static_account.py +0 -4
- pulumi_vault/generic/endpoint.py +0 -4
- pulumi_vault/generic/get_secret.py +0 -8
- pulumi_vault/get_auth_backend.py +0 -4
- pulumi_vault/get_auth_backends.py +0 -8
- pulumi_vault/get_namespace.py +0 -12
- pulumi_vault/get_namespaces.py +0 -8
- pulumi_vault/get_nomad_access_token.py +0 -4
- pulumi_vault/get_policy_document.py +0 -4
- pulumi_vault/get_raft_autopilot_state.py +0 -4
- pulumi_vault/github/auth_backend.py +0 -4
- pulumi_vault/github/team.py +0 -4
- pulumi_vault/github/user.py +0 -4
- pulumi_vault/identity/entity.py +0 -4
- pulumi_vault/identity/entity_alias.py +0 -4
- pulumi_vault/identity/entity_policies.py +0 -8
- pulumi_vault/identity/get_entity.py +0 -4
- pulumi_vault/identity/get_group.py +0 -4
- pulumi_vault/identity/get_oidc_client_creds.py +0 -4
- pulumi_vault/identity/get_oidc_openid_config.py +0 -4
- pulumi_vault/identity/get_oidc_public_keys.py +0 -4
- pulumi_vault/identity/group.py +0 -12
- pulumi_vault/identity/group_alias.py +0 -4
- pulumi_vault/identity/group_member_entity_ids.py +0 -8
- pulumi_vault/identity/group_member_group_ids.py +0 -8
- pulumi_vault/identity/group_policies.py +0 -8
- pulumi_vault/identity/mfa_duo.py +0 -4
- pulumi_vault/identity/mfa_login_enforcement.py +0 -4
- pulumi_vault/identity/mfa_okta.py +0 -4
- pulumi_vault/identity/mfa_pingid.py +0 -4
- pulumi_vault/identity/mfa_totp.py +0 -4
- pulumi_vault/identity/oidc.py +0 -4
- pulumi_vault/identity/oidc_assignment.py +0 -4
- pulumi_vault/identity/oidc_client.py +0 -4
- pulumi_vault/identity/oidc_key.py +0 -4
- pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -4
- pulumi_vault/identity/oidc_provider.py +0 -4
- pulumi_vault/identity/oidc_role.py +0 -8
- pulumi_vault/identity/oidc_scope.py +0 -4
- pulumi_vault/jwt/auth_backend.py +0 -12
- pulumi_vault/jwt/auth_backend_role.py +63 -190
- pulumi_vault/kmip/secret_backend.py +0 -4
- pulumi_vault/kmip/secret_role.py +0 -4
- pulumi_vault/kmip/secret_scope.py +0 -4
- pulumi_vault/kubernetes/auth_backend_config.py +0 -4
- pulumi_vault/kubernetes/auth_backend_role.py +56 -172
- pulumi_vault/kubernetes/get_service_account_token.py +0 -4
- pulumi_vault/kubernetes/secret_backend.py +0 -4
- pulumi_vault/kubernetes/secret_backend_role.py +0 -12
- pulumi_vault/kv/get_secret.py +0 -4
- pulumi_vault/kv/get_secret_subkeys_v2.py +0 -4
- pulumi_vault/kv/get_secret_v2.py +0 -4
- pulumi_vault/kv/get_secrets_list.py +0 -4
- pulumi_vault/kv/get_secrets_list_v2.py +0 -4
- pulumi_vault/kv/secret.py +0 -4
- pulumi_vault/kv/secret_backend_v2.py +0 -4
- pulumi_vault/kv/secret_v2.py +0 -4
- pulumi_vault/ldap/auth_backend.py +56 -151
- pulumi_vault/ldap/auth_backend_group.py +0 -4
- pulumi_vault/ldap/auth_backend_user.py +0 -4
- pulumi_vault/ldap/secret_backend.py +0 -4
- pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
- pulumi_vault/ldap/secret_backend_library_set.py +0 -4
- pulumi_vault/ldap/secret_backend_static_role.py +0 -4
- pulumi_vault/managed/_inputs.py +84 -132
- pulumi_vault/managed/keys.py +7 -28
- pulumi_vault/managed/outputs.py +84 -132
- pulumi_vault/mfa_duo.py +0 -4
- pulumi_vault/mfa_okta.py +0 -4
- pulumi_vault/mfa_pingid.py +0 -4
- pulumi_vault/mfa_totp.py +0 -4
- pulumi_vault/mongodbatlas/secret_backend.py +0 -4
- pulumi_vault/mongodbatlas/secret_role.py +0 -4
- pulumi_vault/mount.py +0 -16
- pulumi_vault/nomad_secret_backend.py +0 -4
- pulumi_vault/nomad_secret_role.py +0 -4
- pulumi_vault/okta/_inputs.py +8 -8
- pulumi_vault/okta/auth_backend.py +0 -4
- pulumi_vault/okta/auth_backend_group.py +0 -4
- pulumi_vault/okta/auth_backend_user.py +0 -4
- pulumi_vault/okta/outputs.py +8 -8
- pulumi_vault/outputs.py +0 -20
- pulumi_vault/password_policy.py +0 -4
- pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
- pulumi_vault/pkisecret/get_backend_key.py +0 -4
- pulumi_vault/pkisecret/get_backend_keys.py +0 -4
- pulumi_vault/pkisecret/secret_backend_cert.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
- pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
- pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -4
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -4
- pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
- pulumi_vault/pkisecret/secret_backend_role.py +0 -4
- pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -4
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -4
- pulumi_vault/pkisecret/secret_backend_sign.py +0 -4
- pulumi_vault/quota_lease_count.py +0 -4
- pulumi_vault/quota_rate_limit.py +0 -4
- pulumi_vault/rabbitmq/secret_backend.py +0 -4
- pulumi_vault/rabbitmq/secret_backend_role.py +0 -4
- pulumi_vault/raft_autopilot.py +0 -4
- pulumi_vault/raft_snapshot_agent_config.py +91 -292
- pulumi_vault/rgp_policy.py +0 -4
- pulumi_vault/saml/auth_backend.py +0 -4
- pulumi_vault/saml/auth_backend_role.py +56 -172
- pulumi_vault/secrets/sync_association.py +0 -4
- pulumi_vault/secrets/sync_aws_destination.py +0 -4
- pulumi_vault/secrets/sync_azure_destination.py +0 -4
- pulumi_vault/secrets/sync_config.py +0 -4
- pulumi_vault/secrets/sync_gcp_destination.py +0 -4
- pulumi_vault/secrets/sync_gh_destination.py +0 -4
- pulumi_vault/secrets/sync_github_apps.py +0 -4
- pulumi_vault/secrets/sync_vercel_destination.py +0 -4
- pulumi_vault/ssh/_inputs.py +6 -20
- pulumi_vault/ssh/outputs.py +6 -20
- pulumi_vault/ssh/secret_backend_ca.py +0 -4
- pulumi_vault/ssh/secret_backend_role.py +0 -4
- pulumi_vault/terraformcloud/secret_backend.py +0 -4
- pulumi_vault/terraformcloud/secret_creds.py +0 -4
- pulumi_vault/terraformcloud/secret_role.py +0 -4
- pulumi_vault/token.py +0 -4
- pulumi_vault/tokenauth/auth_backend_role.py +56 -172
- pulumi_vault/transform/alphabet.py +0 -4
- pulumi_vault/transform/get_decode.py +0 -4
- pulumi_vault/transform/get_encode.py +0 -4
- pulumi_vault/transform/role.py +0 -4
- pulumi_vault/transform/template.py +0 -4
- pulumi_vault/transit/get_decrypt.py +0 -16
- pulumi_vault/transit/get_encrypt.py +0 -14
- pulumi_vault/transit/secret_backend_key.py +0 -4
- pulumi_vault/transit/secret_cache_config.py +0 -4
- {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/METADATA +1 -1
- pulumi_vault-6.2.0a1714114277.dist-info/RECORD +252 -0
- pulumi_vault-6.2.0a1713561465.dist-info/RECORD +0 -252
- {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/top_level.txt +0 -0
@@ -50,31 +50,15 @@ class AuthBackendRoleArgs:
|
|
50
50
|
|
51
51
|
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
52
52
|
:param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
53
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
54
|
-
|
55
|
-
|
56
|
-
:param pulumi.Input[
|
57
|
-
|
58
|
-
|
59
|
-
`token_max_ttl` would otherwise allow a renewal.
|
60
|
-
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
61
|
-
Its current value will be referenced at renewal time.
|
62
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
63
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
64
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/token#token_num_uses)
|
65
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
66
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
67
|
-
token generated using this role should never expire. The token should be renewed within the
|
68
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
69
|
-
value of this field. Specified in seconds.
|
53
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
54
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
55
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
56
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
57
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
58
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
70
59
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
71
|
-
:param pulumi.Input[int] token_ttl: The
|
72
|
-
|
73
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
74
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
75
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
76
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
77
|
-
requests a different type at generation time.
|
60
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
61
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
78
62
|
"""
|
79
63
|
pulumi.set(__self__, "role_name", role_name)
|
80
64
|
if allowed_entity_aliases is not None:
|
@@ -243,9 +227,7 @@ class AuthBackendRoleArgs:
|
|
243
227
|
@pulumi.getter(name="tokenBoundCidrs")
|
244
228
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
245
229
|
"""
|
246
|
-
|
247
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
248
|
-
as well.
|
230
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
249
231
|
"""
|
250
232
|
return pulumi.get(self, "token_bound_cidrs")
|
251
233
|
|
@@ -257,10 +239,7 @@ class AuthBackendRoleArgs:
|
|
257
239
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
258
240
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
259
241
|
"""
|
260
|
-
|
261
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
262
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
263
|
-
`token_max_ttl` would otherwise allow a renewal.
|
242
|
+
Generated Token's Explicit Maximum TTL in seconds
|
264
243
|
"""
|
265
244
|
return pulumi.get(self, "token_explicit_max_ttl")
|
266
245
|
|
@@ -272,8 +251,7 @@ class AuthBackendRoleArgs:
|
|
272
251
|
@pulumi.getter(name="tokenMaxTtl")
|
273
252
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
274
253
|
"""
|
275
|
-
The maximum lifetime
|
276
|
-
Its current value will be referenced at renewal time.
|
254
|
+
The maximum lifetime of the generated token
|
277
255
|
"""
|
278
256
|
return pulumi.get(self, "token_max_ttl")
|
279
257
|
|
@@ -285,8 +263,7 @@ class AuthBackendRoleArgs:
|
|
285
263
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
286
264
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
287
265
|
"""
|
288
|
-
If
|
289
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
266
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
290
267
|
"""
|
291
268
|
return pulumi.get(self, "token_no_default_policy")
|
292
269
|
|
@@ -298,8 +275,7 @@ class AuthBackendRoleArgs:
|
|
298
275
|
@pulumi.getter(name="tokenNumUses")
|
299
276
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
300
277
|
"""
|
301
|
-
The
|
302
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
278
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
303
279
|
"""
|
304
280
|
return pulumi.get(self, "token_num_uses")
|
305
281
|
|
@@ -311,10 +287,7 @@ class AuthBackendRoleArgs:
|
|
311
287
|
@pulumi.getter(name="tokenPeriod")
|
312
288
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
313
289
|
"""
|
314
|
-
|
315
|
-
token generated using this role should never expire. The token should be renewed within the
|
316
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
317
|
-
value of this field. Specified in seconds.
|
290
|
+
Generated Token's Period
|
318
291
|
"""
|
319
292
|
return pulumi.get(self, "token_period")
|
320
293
|
|
@@ -338,8 +311,7 @@ class AuthBackendRoleArgs:
|
|
338
311
|
@pulumi.getter(name="tokenTtl")
|
339
312
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
340
313
|
"""
|
341
|
-
The
|
342
|
-
Its current value will be referenced at renewal time.
|
314
|
+
The initial ttl of the token to generate in seconds
|
343
315
|
"""
|
344
316
|
return pulumi.get(self, "token_ttl")
|
345
317
|
|
@@ -351,11 +323,7 @@ class AuthBackendRoleArgs:
|
|
351
323
|
@pulumi.getter(name="tokenType")
|
352
324
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
353
325
|
"""
|
354
|
-
The type of token
|
355
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
356
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
357
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
358
|
-
requests a different type at generation time.
|
326
|
+
The type of token to generate, service or batch
|
359
327
|
"""
|
360
328
|
return pulumi.get(self, "token_type")
|
361
329
|
|
@@ -403,31 +371,15 @@ class _AuthBackendRoleState:
|
|
403
371
|
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
404
372
|
:param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
405
373
|
:param pulumi.Input[str] role_name: The name of the role.
|
406
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
407
|
-
|
408
|
-
|
409
|
-
:param pulumi.Input[
|
410
|
-
|
411
|
-
|
412
|
-
`token_max_ttl` would otherwise allow a renewal.
|
413
|
-
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
414
|
-
Its current value will be referenced at renewal time.
|
415
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
416
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
417
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/token#token_num_uses)
|
418
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
419
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
420
|
-
token generated using this role should never expire. The token should be renewed within the
|
421
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
422
|
-
value of this field. Specified in seconds.
|
374
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
375
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
376
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
377
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
378
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
379
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
423
380
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
424
|
-
:param pulumi.Input[int] token_ttl: The
|
425
|
-
|
426
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
427
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
428
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
429
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
430
|
-
requests a different type at generation time.
|
381
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
382
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
431
383
|
"""
|
432
384
|
if allowed_entity_aliases is not None:
|
433
385
|
pulumi.set(__self__, "allowed_entity_aliases", allowed_entity_aliases)
|
@@ -597,9 +549,7 @@ class _AuthBackendRoleState:
|
|
597
549
|
@pulumi.getter(name="tokenBoundCidrs")
|
598
550
|
def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
599
551
|
"""
|
600
|
-
|
601
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
602
|
-
as well.
|
552
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
603
553
|
"""
|
604
554
|
return pulumi.get(self, "token_bound_cidrs")
|
605
555
|
|
@@ -611,10 +561,7 @@ class _AuthBackendRoleState:
|
|
611
561
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
612
562
|
def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
613
563
|
"""
|
614
|
-
|
615
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
616
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
617
|
-
`token_max_ttl` would otherwise allow a renewal.
|
564
|
+
Generated Token's Explicit Maximum TTL in seconds
|
618
565
|
"""
|
619
566
|
return pulumi.get(self, "token_explicit_max_ttl")
|
620
567
|
|
@@ -626,8 +573,7 @@ class _AuthBackendRoleState:
|
|
626
573
|
@pulumi.getter(name="tokenMaxTtl")
|
627
574
|
def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
|
628
575
|
"""
|
629
|
-
The maximum lifetime
|
630
|
-
Its current value will be referenced at renewal time.
|
576
|
+
The maximum lifetime of the generated token
|
631
577
|
"""
|
632
578
|
return pulumi.get(self, "token_max_ttl")
|
633
579
|
|
@@ -639,8 +585,7 @@ class _AuthBackendRoleState:
|
|
639
585
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
640
586
|
def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
|
641
587
|
"""
|
642
|
-
If
|
643
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
588
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
644
589
|
"""
|
645
590
|
return pulumi.get(self, "token_no_default_policy")
|
646
591
|
|
@@ -652,8 +597,7 @@ class _AuthBackendRoleState:
|
|
652
597
|
@pulumi.getter(name="tokenNumUses")
|
653
598
|
def token_num_uses(self) -> Optional[pulumi.Input[int]]:
|
654
599
|
"""
|
655
|
-
The
|
656
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
600
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
657
601
|
"""
|
658
602
|
return pulumi.get(self, "token_num_uses")
|
659
603
|
|
@@ -665,10 +609,7 @@ class _AuthBackendRoleState:
|
|
665
609
|
@pulumi.getter(name="tokenPeriod")
|
666
610
|
def token_period(self) -> Optional[pulumi.Input[int]]:
|
667
611
|
"""
|
668
|
-
|
669
|
-
token generated using this role should never expire. The token should be renewed within the
|
670
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
671
|
-
value of this field. Specified in seconds.
|
612
|
+
Generated Token's Period
|
672
613
|
"""
|
673
614
|
return pulumi.get(self, "token_period")
|
674
615
|
|
@@ -692,8 +633,7 @@ class _AuthBackendRoleState:
|
|
692
633
|
@pulumi.getter(name="tokenTtl")
|
693
634
|
def token_ttl(self) -> Optional[pulumi.Input[int]]:
|
694
635
|
"""
|
695
|
-
The
|
696
|
-
Its current value will be referenced at renewal time.
|
636
|
+
The initial ttl of the token to generate in seconds
|
697
637
|
"""
|
698
638
|
return pulumi.get(self, "token_ttl")
|
699
639
|
|
@@ -705,11 +645,7 @@ class _AuthBackendRoleState:
|
|
705
645
|
@pulumi.getter(name="tokenType")
|
706
646
|
def token_type(self) -> Optional[pulumi.Input[str]]:
|
707
647
|
"""
|
708
|
-
The type of token
|
709
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
710
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
711
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
712
|
-
requests a different type at generation time.
|
648
|
+
The type of token to generate, service or batch
|
713
649
|
"""
|
714
650
|
return pulumi.get(self, "token_type")
|
715
651
|
|
@@ -750,7 +686,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
750
686
|
|
751
687
|
## Example Usage
|
752
688
|
|
753
|
-
<!--Start PulumiCodeChooser -->
|
754
689
|
```python
|
755
690
|
import pulumi
|
756
691
|
import pulumi_vault as vault
|
@@ -769,7 +704,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
769
704
|
token_explicit_max_ttl=115200,
|
770
705
|
path_suffix="path-suffix")
|
771
706
|
```
|
772
|
-
<!--End PulumiCodeChooser -->
|
773
707
|
|
774
708
|
## Import
|
775
709
|
|
@@ -796,31 +730,15 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
796
730
|
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
797
731
|
:param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
798
732
|
:param pulumi.Input[str] role_name: The name of the role.
|
799
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
800
|
-
|
801
|
-
|
802
|
-
:param pulumi.Input[
|
803
|
-
|
804
|
-
|
805
|
-
`token_max_ttl` would otherwise allow a renewal.
|
806
|
-
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
807
|
-
Its current value will be referenced at renewal time.
|
808
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
809
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
810
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/token#token_num_uses)
|
811
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
812
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
813
|
-
token generated using this role should never expire. The token should be renewed within the
|
814
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
815
|
-
value of this field. Specified in seconds.
|
733
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
734
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
735
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
736
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
737
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
738
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
816
739
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
817
|
-
:param pulumi.Input[int] token_ttl: The
|
818
|
-
|
819
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
820
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
821
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
822
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
823
|
-
requests a different type at generation time.
|
740
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
741
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
824
742
|
"""
|
825
743
|
...
|
826
744
|
@overload
|
@@ -835,7 +753,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
835
753
|
|
836
754
|
## Example Usage
|
837
755
|
|
838
|
-
<!--Start PulumiCodeChooser -->
|
839
756
|
```python
|
840
757
|
import pulumi
|
841
758
|
import pulumi_vault as vault
|
@@ -854,7 +771,6 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
854
771
|
token_explicit_max_ttl=115200,
|
855
772
|
path_suffix="path-suffix")
|
856
773
|
```
|
857
|
-
<!--End PulumiCodeChooser -->
|
858
774
|
|
859
775
|
## Import
|
860
776
|
|
@@ -979,31 +895,15 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
979
895
|
> Due to a bug the resource. This *will* cause all existing tokens issued by this role to be revoked.
|
980
896
|
:param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
|
981
897
|
:param pulumi.Input[str] role_name: The name of the role.
|
982
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs:
|
983
|
-
|
984
|
-
|
985
|
-
:param pulumi.Input[
|
986
|
-
|
987
|
-
|
988
|
-
`token_max_ttl` would otherwise allow a renewal.
|
989
|
-
:param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
|
990
|
-
Its current value will be referenced at renewal time.
|
991
|
-
:param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
|
992
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
993
|
-
:param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/token#token_num_uses)
|
994
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
995
|
-
:param pulumi.Input[int] token_period: If set, indicates that the
|
996
|
-
token generated using this role should never expire. The token should be renewed within the
|
997
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
998
|
-
value of this field. Specified in seconds.
|
898
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
|
899
|
+
:param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
|
900
|
+
:param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
|
901
|
+
:param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
|
902
|
+
:param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
|
903
|
+
:param pulumi.Input[int] token_period: Generated Token's Period
|
999
904
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
|
1000
|
-
:param pulumi.Input[int] token_ttl: The
|
1001
|
-
|
1002
|
-
:param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
|
1003
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1004
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
1005
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
1006
|
-
requests a different type at generation time.
|
905
|
+
:param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
|
906
|
+
:param pulumi.Input[str] token_type: The type of token to generate, service or batch
|
1007
907
|
"""
|
1008
908
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
1009
909
|
|
@@ -1119,9 +1019,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1119
1019
|
@pulumi.getter(name="tokenBoundCidrs")
|
1120
1020
|
def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
1121
1021
|
"""
|
1122
|
-
|
1123
|
-
addresses which can authenticate successfully, and ties the resulting token to these blocks
|
1124
|
-
as well.
|
1022
|
+
Specifies the blocks of IP addresses which are allowed to use the generated token
|
1125
1023
|
"""
|
1126
1024
|
return pulumi.get(self, "token_bound_cidrs")
|
1127
1025
|
|
@@ -1129,10 +1027,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1129
1027
|
@pulumi.getter(name="tokenExplicitMaxTtl")
|
1130
1028
|
def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1131
1029
|
"""
|
1132
|
-
|
1133
|
-
[explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
1134
|
-
onto the token in number of seconds. This is a hard cap even if `token_ttl` and
|
1135
|
-
`token_max_ttl` would otherwise allow a renewal.
|
1030
|
+
Generated Token's Explicit Maximum TTL in seconds
|
1136
1031
|
"""
|
1137
1032
|
return pulumi.get(self, "token_explicit_max_ttl")
|
1138
1033
|
|
@@ -1140,8 +1035,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1140
1035
|
@pulumi.getter(name="tokenMaxTtl")
|
1141
1036
|
def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
|
1142
1037
|
"""
|
1143
|
-
The maximum lifetime
|
1144
|
-
Its current value will be referenced at renewal time.
|
1038
|
+
The maximum lifetime of the generated token
|
1145
1039
|
"""
|
1146
1040
|
return pulumi.get(self, "token_max_ttl")
|
1147
1041
|
|
@@ -1149,8 +1043,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1149
1043
|
@pulumi.getter(name="tokenNoDefaultPolicy")
|
1150
1044
|
def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
|
1151
1045
|
"""
|
1152
|
-
If
|
1153
|
-
generated tokens; otherwise it will be added to the policies set in token_policies.
|
1046
|
+
If true, the 'default' policy will not automatically be added to generated tokens
|
1154
1047
|
"""
|
1155
1048
|
return pulumi.get(self, "token_no_default_policy")
|
1156
1049
|
|
@@ -1158,8 +1051,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1158
1051
|
@pulumi.getter(name="tokenNumUses")
|
1159
1052
|
def token_num_uses(self) -> pulumi.Output[Optional[int]]:
|
1160
1053
|
"""
|
1161
|
-
The
|
1162
|
-
of times a generated token may be used (within its lifetime); 0 means unlimited.
|
1054
|
+
The maximum number of times a token may be used, a value of zero means unlimited
|
1163
1055
|
"""
|
1164
1056
|
return pulumi.get(self, "token_num_uses")
|
1165
1057
|
|
@@ -1167,10 +1059,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1167
1059
|
@pulumi.getter(name="tokenPeriod")
|
1168
1060
|
def token_period(self) -> pulumi.Output[Optional[int]]:
|
1169
1061
|
"""
|
1170
|
-
|
1171
|
-
token generated using this role should never expire. The token should be renewed within the
|
1172
|
-
duration specified by this value. At each renewal, the token's TTL will be set to the
|
1173
|
-
value of this field. Specified in seconds.
|
1062
|
+
Generated Token's Period
|
1174
1063
|
"""
|
1175
1064
|
return pulumi.get(self, "token_period")
|
1176
1065
|
|
@@ -1186,8 +1075,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1186
1075
|
@pulumi.getter(name="tokenTtl")
|
1187
1076
|
def token_ttl(self) -> pulumi.Output[Optional[int]]:
|
1188
1077
|
"""
|
1189
|
-
The
|
1190
|
-
Its current value will be referenced at renewal time.
|
1078
|
+
The initial ttl of the token to generate in seconds
|
1191
1079
|
"""
|
1192
1080
|
return pulumi.get(self, "token_ttl")
|
1193
1081
|
|
@@ -1195,11 +1083,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
1195
1083
|
@pulumi.getter(name="tokenType")
|
1196
1084
|
def token_type(self) -> pulumi.Output[Optional[str]]:
|
1197
1085
|
"""
|
1198
|
-
The type of token
|
1199
|
-
`batch`, or `default` to use the mount's tuned default (which unless changed will be
|
1200
|
-
`service` tokens). For token store roles, there are two additional possibilities:
|
1201
|
-
`default-service` and `default-batch` which specify the type to return unless the client
|
1202
|
-
requests a different type at generation time.
|
1086
|
+
The type of token to generate, service or batch
|
1203
1087
|
"""
|
1204
1088
|
return pulumi.get(self, "token_type")
|
1205
1089
|
|
@@ -183,7 +183,6 @@ class Alphabet(pulumi.CustomResource):
|
|
183
183
|
|
184
184
|
## Example Usage
|
185
185
|
|
186
|
-
<!--Start PulumiCodeChooser -->
|
187
186
|
```python
|
188
187
|
import pulumi
|
189
188
|
import pulumi_vault as vault
|
@@ -196,7 +195,6 @@ class Alphabet(pulumi.CustomResource):
|
|
196
195
|
name="numerics",
|
197
196
|
alphabet="0123456789")
|
198
197
|
```
|
199
|
-
<!--End PulumiCodeChooser -->
|
200
198
|
|
201
199
|
:param str resource_name: The name of the resource.
|
202
200
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -221,7 +219,6 @@ class Alphabet(pulumi.CustomResource):
|
|
221
219
|
|
222
220
|
## Example Usage
|
223
221
|
|
224
|
-
<!--Start PulumiCodeChooser -->
|
225
222
|
```python
|
226
223
|
import pulumi
|
227
224
|
import pulumi_vault as vault
|
@@ -234,7 +231,6 @@ class Alphabet(pulumi.CustomResource):
|
|
234
231
|
name="numerics",
|
235
232
|
alphabet="0123456789")
|
236
233
|
```
|
237
|
-
<!--End PulumiCodeChooser -->
|
238
234
|
|
239
235
|
:param str resource_name: The name of the resource.
|
240
236
|
:param AlphabetArgs args: The arguments to use to populate this resource's properties.
|
@@ -142,7 +142,6 @@ def get_decode(batch_inputs: Optional[Sequence[Mapping[str, Any]]] = None,
|
|
142
142
|
|
143
143
|
## Example Usage
|
144
144
|
|
145
|
-
<!--Start PulumiCodeChooser -->
|
146
145
|
```python
|
147
146
|
import pulumi
|
148
147
|
import pulumi_vault as vault
|
@@ -165,7 +164,6 @@ def get_decode(batch_inputs: Optional[Sequence[Mapping[str, Any]]] = None,
|
|
165
164
|
role_name="payments",
|
166
165
|
value="9300-3376-4943-8903")
|
167
166
|
```
|
168
|
-
<!--End PulumiCodeChooser -->
|
169
167
|
|
170
168
|
|
171
169
|
:param Sequence[Mapping[str, Any]] batch_inputs: Specifies a list of items to be decoded in a single batch. If this parameter is set, the top-level parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.
|
@@ -225,7 +223,6 @@ def get_decode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
|
|
225
223
|
|
226
224
|
## Example Usage
|
227
225
|
|
228
|
-
<!--Start PulumiCodeChooser -->
|
229
226
|
```python
|
230
227
|
import pulumi
|
231
228
|
import pulumi_vault as vault
|
@@ -248,7 +245,6 @@ def get_decode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
|
|
248
245
|
role_name="payments",
|
249
246
|
value="9300-3376-4943-8903")
|
250
247
|
```
|
251
|
-
<!--End PulumiCodeChooser -->
|
252
248
|
|
253
249
|
|
254
250
|
:param Sequence[Mapping[str, Any]] batch_inputs: Specifies a list of items to be decoded in a single batch. If this parameter is set, the top-level parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.
|
@@ -142,7 +142,6 @@ def get_encode(batch_inputs: Optional[Sequence[Mapping[str, Any]]] = None,
|
|
142
142
|
|
143
143
|
## Example Usage
|
144
144
|
|
145
|
-
<!--Start PulumiCodeChooser -->
|
146
145
|
```python
|
147
146
|
import pulumi
|
148
147
|
import pulumi_vault as vault
|
@@ -167,7 +166,6 @@ def get_encode(batch_inputs: Optional[Sequence[Mapping[str, Any]]] = None,
|
|
167
166
|
"value": "1111-2222-3333-4444",
|
168
167
|
}])
|
169
168
|
```
|
170
|
-
<!--End PulumiCodeChooser -->
|
171
169
|
|
172
170
|
|
173
171
|
:param Sequence[Mapping[str, Any]] batch_inputs: Specifies a list of items to be encoded in a single batch. If this parameter is set, the parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.
|
@@ -227,7 +225,6 @@ def get_encode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
|
|
227
225
|
|
228
226
|
## Example Usage
|
229
227
|
|
230
|
-
<!--Start PulumiCodeChooser -->
|
231
228
|
```python
|
232
229
|
import pulumi
|
233
230
|
import pulumi_vault as vault
|
@@ -252,7 +249,6 @@ def get_encode_output(batch_inputs: Optional[pulumi.Input[Optional[Sequence[Mapp
|
|
252
249
|
"value": "1111-2222-3333-4444",
|
253
250
|
}])
|
254
251
|
```
|
255
|
-
<!--End PulumiCodeChooser -->
|
256
252
|
|
257
253
|
|
258
254
|
:param Sequence[Mapping[str, Any]] batch_inputs: Specifies a list of items to be encoded in a single batch. If this parameter is set, the parameters 'value', 'transformation' and 'tweak' will be ignored. Each batch item within the list can specify these parameters instead.
|
pulumi_vault/transform/role.py
CHANGED
@@ -184,7 +184,6 @@ class Role(pulumi.CustomResource):
|
|
184
184
|
|
185
185
|
## Example Usage
|
186
186
|
|
187
|
-
<!--Start PulumiCodeChooser -->
|
188
187
|
```python
|
189
188
|
import pulumi
|
190
189
|
import pulumi_vault as vault
|
@@ -197,7 +196,6 @@ class Role(pulumi.CustomResource):
|
|
197
196
|
name="payments",
|
198
197
|
transformations=["ccn-fpe"])
|
199
198
|
```
|
200
|
-
<!--End PulumiCodeChooser -->
|
201
199
|
|
202
200
|
:param str resource_name: The name of the resource.
|
203
201
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -223,7 +221,6 @@ class Role(pulumi.CustomResource):
|
|
223
221
|
|
224
222
|
## Example Usage
|
225
223
|
|
226
|
-
<!--Start PulumiCodeChooser -->
|
227
224
|
```python
|
228
225
|
import pulumi
|
229
226
|
import pulumi_vault as vault
|
@@ -236,7 +233,6 @@ class Role(pulumi.CustomResource):
|
|
236
233
|
name="payments",
|
237
234
|
transformations=["ccn-fpe"])
|
238
235
|
```
|
239
|
-
<!--End PulumiCodeChooser -->
|
240
236
|
|
241
237
|
:param str resource_name: The name of the resource.
|
242
238
|
:param RoleArgs args: The arguments to use to populate this resource's properties.
|
@@ -334,7 +334,6 @@ class Template(pulumi.CustomResource):
|
|
334
334
|
backslashes must be escaped to appear correctly in Vault. For further
|
335
335
|
assistance escaping your own custom regex, see String Literals.
|
336
336
|
|
337
|
-
<!--Start PulumiCodeChooser -->
|
338
337
|
```python
|
339
338
|
import pulumi
|
340
339
|
import pulumi_vault as vault
|
@@ -357,7 +356,6 @@ class Template(pulumi.CustomResource):
|
|
357
356
|
"last-four-digits": "$4",
|
358
357
|
})
|
359
358
|
```
|
360
|
-
<!--End PulumiCodeChooser -->
|
361
359
|
|
362
360
|
:param str resource_name: The name of the resource.
|
363
361
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -399,7 +397,6 @@ class Template(pulumi.CustomResource):
|
|
399
397
|
backslashes must be escaped to appear correctly in Vault. For further
|
400
398
|
assistance escaping your own custom regex, see String Literals.
|
401
399
|
|
402
|
-
<!--Start PulumiCodeChooser -->
|
403
400
|
```python
|
404
401
|
import pulumi
|
405
402
|
import pulumi_vault as vault
|
@@ -422,7 +419,6 @@ class Template(pulumi.CustomResource):
|
|
422
419
|
"last-four-digits": "$4",
|
423
420
|
})
|
424
421
|
```
|
425
|
-
<!--End PulumiCodeChooser -->
|
426
422
|
|
427
423
|
:param str resource_name: The name of the resource.
|
428
424
|
:param TemplateArgs args: The arguments to use to populate this resource's properties.
|