pulumi-vault 6.2.0a1713561465__py3-none-any.whl → 6.2.0a1714114277__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (179) hide show
  1. pulumi_vault/_inputs.py +0 -20
  2. pulumi_vault/ad/secret_backend.py +0 -4
  3. pulumi_vault/ad/secret_library.py +0 -4
  4. pulumi_vault/ad/secret_role.py +0 -4
  5. pulumi_vault/alicloud/auth_backend_role.py +63 -186
  6. pulumi_vault/approle/auth_backend_login.py +0 -4
  7. pulumi_vault/approle/auth_backend_role.py +63 -186
  8. pulumi_vault/approle/auth_backend_role_secret_id.py +0 -4
  9. pulumi_vault/approle/get_auth_backend_role_id.py +0 -4
  10. pulumi_vault/audit.py +0 -8
  11. pulumi_vault/audit_request_header.py +0 -4
  12. pulumi_vault/aws/auth_backend_client.py +0 -4
  13. pulumi_vault/aws/auth_backend_config_identity.py +0 -4
  14. pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -4
  15. pulumi_vault/aws/auth_backend_role.py +63 -186
  16. pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -4
  17. pulumi_vault/aws/auth_backend_sts_role.py +0 -4
  18. pulumi_vault/aws/secret_backend_role.py +0 -4
  19. pulumi_vault/aws/secret_backend_static_role.py +0 -4
  20. pulumi_vault/azure/auth_backend_config.py +0 -4
  21. pulumi_vault/azure/auth_backend_role.py +63 -186
  22. pulumi_vault/azure/backend.py +0 -8
  23. pulumi_vault/azure/backend_role.py +0 -4
  24. pulumi_vault/azure/get_access_credentials.py +0 -4
  25. pulumi_vault/cert_auth_backend_role.py +63 -200
  26. pulumi_vault/consul/secret_backend.py +0 -8
  27. pulumi_vault/consul/secret_backend_role.py +0 -4
  28. pulumi_vault/database/_inputs.py +522 -784
  29. pulumi_vault/database/outputs.py +522 -784
  30. pulumi_vault/database/secret_backend_connection.py +0 -4
  31. pulumi_vault/database/secret_backend_role.py +0 -4
  32. pulumi_vault/database/secret_backend_static_role.py +0 -4
  33. pulumi_vault/database/secrets_mount.py +0 -4
  34. pulumi_vault/egp_policy.py +0 -4
  35. pulumi_vault/gcp/auth_backend_role.py +63 -264
  36. pulumi_vault/gcp/get_auth_backend_role.py +0 -4
  37. pulumi_vault/gcp/secret_backend.py +0 -4
  38. pulumi_vault/gcp/secret_impersonated_account.py +0 -4
  39. pulumi_vault/gcp/secret_roleset.py +0 -4
  40. pulumi_vault/gcp/secret_static_account.py +0 -4
  41. pulumi_vault/generic/endpoint.py +0 -4
  42. pulumi_vault/generic/get_secret.py +0 -8
  43. pulumi_vault/get_auth_backend.py +0 -4
  44. pulumi_vault/get_auth_backends.py +0 -8
  45. pulumi_vault/get_namespace.py +0 -12
  46. pulumi_vault/get_namespaces.py +0 -8
  47. pulumi_vault/get_nomad_access_token.py +0 -4
  48. pulumi_vault/get_policy_document.py +0 -4
  49. pulumi_vault/get_raft_autopilot_state.py +0 -4
  50. pulumi_vault/github/auth_backend.py +0 -4
  51. pulumi_vault/github/team.py +0 -4
  52. pulumi_vault/github/user.py +0 -4
  53. pulumi_vault/identity/entity.py +0 -4
  54. pulumi_vault/identity/entity_alias.py +0 -4
  55. pulumi_vault/identity/entity_policies.py +0 -8
  56. pulumi_vault/identity/get_entity.py +0 -4
  57. pulumi_vault/identity/get_group.py +0 -4
  58. pulumi_vault/identity/get_oidc_client_creds.py +0 -4
  59. pulumi_vault/identity/get_oidc_openid_config.py +0 -4
  60. pulumi_vault/identity/get_oidc_public_keys.py +0 -4
  61. pulumi_vault/identity/group.py +0 -12
  62. pulumi_vault/identity/group_alias.py +0 -4
  63. pulumi_vault/identity/group_member_entity_ids.py +0 -8
  64. pulumi_vault/identity/group_member_group_ids.py +0 -8
  65. pulumi_vault/identity/group_policies.py +0 -8
  66. pulumi_vault/identity/mfa_duo.py +0 -4
  67. pulumi_vault/identity/mfa_login_enforcement.py +0 -4
  68. pulumi_vault/identity/mfa_okta.py +0 -4
  69. pulumi_vault/identity/mfa_pingid.py +0 -4
  70. pulumi_vault/identity/mfa_totp.py +0 -4
  71. pulumi_vault/identity/oidc.py +0 -4
  72. pulumi_vault/identity/oidc_assignment.py +0 -4
  73. pulumi_vault/identity/oidc_client.py +0 -4
  74. pulumi_vault/identity/oidc_key.py +0 -4
  75. pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -4
  76. pulumi_vault/identity/oidc_provider.py +0 -4
  77. pulumi_vault/identity/oidc_role.py +0 -8
  78. pulumi_vault/identity/oidc_scope.py +0 -4
  79. pulumi_vault/jwt/auth_backend.py +0 -12
  80. pulumi_vault/jwt/auth_backend_role.py +63 -190
  81. pulumi_vault/kmip/secret_backend.py +0 -4
  82. pulumi_vault/kmip/secret_role.py +0 -4
  83. pulumi_vault/kmip/secret_scope.py +0 -4
  84. pulumi_vault/kubernetes/auth_backend_config.py +0 -4
  85. pulumi_vault/kubernetes/auth_backend_role.py +56 -172
  86. pulumi_vault/kubernetes/get_service_account_token.py +0 -4
  87. pulumi_vault/kubernetes/secret_backend.py +0 -4
  88. pulumi_vault/kubernetes/secret_backend_role.py +0 -12
  89. pulumi_vault/kv/get_secret.py +0 -4
  90. pulumi_vault/kv/get_secret_subkeys_v2.py +0 -4
  91. pulumi_vault/kv/get_secret_v2.py +0 -4
  92. pulumi_vault/kv/get_secrets_list.py +0 -4
  93. pulumi_vault/kv/get_secrets_list_v2.py +0 -4
  94. pulumi_vault/kv/secret.py +0 -4
  95. pulumi_vault/kv/secret_backend_v2.py +0 -4
  96. pulumi_vault/kv/secret_v2.py +0 -4
  97. pulumi_vault/ldap/auth_backend.py +56 -151
  98. pulumi_vault/ldap/auth_backend_group.py +0 -4
  99. pulumi_vault/ldap/auth_backend_user.py +0 -4
  100. pulumi_vault/ldap/secret_backend.py +0 -4
  101. pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -4
  102. pulumi_vault/ldap/secret_backend_library_set.py +0 -4
  103. pulumi_vault/ldap/secret_backend_static_role.py +0 -4
  104. pulumi_vault/managed/_inputs.py +84 -132
  105. pulumi_vault/managed/keys.py +7 -28
  106. pulumi_vault/managed/outputs.py +84 -132
  107. pulumi_vault/mfa_duo.py +0 -4
  108. pulumi_vault/mfa_okta.py +0 -4
  109. pulumi_vault/mfa_pingid.py +0 -4
  110. pulumi_vault/mfa_totp.py +0 -4
  111. pulumi_vault/mongodbatlas/secret_backend.py +0 -4
  112. pulumi_vault/mongodbatlas/secret_role.py +0 -4
  113. pulumi_vault/mount.py +0 -16
  114. pulumi_vault/nomad_secret_backend.py +0 -4
  115. pulumi_vault/nomad_secret_role.py +0 -4
  116. pulumi_vault/okta/_inputs.py +8 -8
  117. pulumi_vault/okta/auth_backend.py +0 -4
  118. pulumi_vault/okta/auth_backend_group.py +0 -4
  119. pulumi_vault/okta/auth_backend_user.py +0 -4
  120. pulumi_vault/okta/outputs.py +8 -8
  121. pulumi_vault/outputs.py +0 -20
  122. pulumi_vault/password_policy.py +0 -4
  123. pulumi_vault/pkisecret/backend_config_cluster.py +0 -4
  124. pulumi_vault/pkisecret/get_backend_issuer.py +0 -4
  125. pulumi_vault/pkisecret/get_backend_issuers.py +0 -4
  126. pulumi_vault/pkisecret/get_backend_key.py +0 -4
  127. pulumi_vault/pkisecret/get_backend_keys.py +0 -4
  128. pulumi_vault/pkisecret/secret_backend_cert.py +0 -4
  129. pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -4
  130. pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -4
  131. pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -4
  132. pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -4
  133. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -4
  134. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -4
  135. pulumi_vault/pkisecret/secret_backend_issuer.py +0 -4
  136. pulumi_vault/pkisecret/secret_backend_role.py +0 -4
  137. pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -4
  138. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -4
  139. pulumi_vault/pkisecret/secret_backend_sign.py +0 -4
  140. pulumi_vault/quota_lease_count.py +0 -4
  141. pulumi_vault/quota_rate_limit.py +0 -4
  142. pulumi_vault/rabbitmq/secret_backend.py +0 -4
  143. pulumi_vault/rabbitmq/secret_backend_role.py +0 -4
  144. pulumi_vault/raft_autopilot.py +0 -4
  145. pulumi_vault/raft_snapshot_agent_config.py +91 -292
  146. pulumi_vault/rgp_policy.py +0 -4
  147. pulumi_vault/saml/auth_backend.py +0 -4
  148. pulumi_vault/saml/auth_backend_role.py +56 -172
  149. pulumi_vault/secrets/sync_association.py +0 -4
  150. pulumi_vault/secrets/sync_aws_destination.py +0 -4
  151. pulumi_vault/secrets/sync_azure_destination.py +0 -4
  152. pulumi_vault/secrets/sync_config.py +0 -4
  153. pulumi_vault/secrets/sync_gcp_destination.py +0 -4
  154. pulumi_vault/secrets/sync_gh_destination.py +0 -4
  155. pulumi_vault/secrets/sync_github_apps.py +0 -4
  156. pulumi_vault/secrets/sync_vercel_destination.py +0 -4
  157. pulumi_vault/ssh/_inputs.py +6 -20
  158. pulumi_vault/ssh/outputs.py +6 -20
  159. pulumi_vault/ssh/secret_backend_ca.py +0 -4
  160. pulumi_vault/ssh/secret_backend_role.py +0 -4
  161. pulumi_vault/terraformcloud/secret_backend.py +0 -4
  162. pulumi_vault/terraformcloud/secret_creds.py +0 -4
  163. pulumi_vault/terraformcloud/secret_role.py +0 -4
  164. pulumi_vault/token.py +0 -4
  165. pulumi_vault/tokenauth/auth_backend_role.py +56 -172
  166. pulumi_vault/transform/alphabet.py +0 -4
  167. pulumi_vault/transform/get_decode.py +0 -4
  168. pulumi_vault/transform/get_encode.py +0 -4
  169. pulumi_vault/transform/role.py +0 -4
  170. pulumi_vault/transform/template.py +0 -4
  171. pulumi_vault/transit/get_decrypt.py +0 -16
  172. pulumi_vault/transit/get_encrypt.py +0 -14
  173. pulumi_vault/transit/secret_backend_key.py +0 -4
  174. pulumi_vault/transit/secret_cache_config.py +0 -4
  175. {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/METADATA +1 -1
  176. pulumi_vault-6.2.0a1714114277.dist-info/RECORD +252 -0
  177. pulumi_vault-6.2.0a1713561465.dist-info/RECORD +0 -252
  178. {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/WHEEL +0 -0
  179. {pulumi_vault-6.2.0a1713561465.dist-info → pulumi_vault-6.2.0a1714114277.dist-info}/top_level.txt +0 -0
@@ -382,7 +382,6 @@ class Backend(pulumi.CustomResource):
382
382
 
383
383
  ### *Vault-1.9 And Above*
384
384
 
385
- <!--Start PulumiCodeChooser -->
386
385
  ```python
387
386
  import pulumi
388
387
  import pulumi_vault as vault
@@ -395,11 +394,9 @@ class Backend(pulumi.CustomResource):
395
394
  client_secret="12345678901234567890",
396
395
  environment="AzurePublicCloud")
397
396
  ```
398
- <!--End PulumiCodeChooser -->
399
397
 
400
398
  ### *Vault-1.8 And Below*
401
399
 
402
- <!--Start PulumiCodeChooser -->
403
400
  ```python
404
401
  import pulumi
405
402
  import pulumi_vault as vault
@@ -412,7 +409,6 @@ class Backend(pulumi.CustomResource):
412
409
  client_secret="12345678901234567890",
413
410
  environment="AzurePublicCloud")
414
411
  ```
415
- <!--End PulumiCodeChooser -->
416
412
 
417
413
  :param str resource_name: The name of the resource.
418
414
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -442,7 +438,6 @@ class Backend(pulumi.CustomResource):
442
438
 
443
439
  ### *Vault-1.9 And Above*
444
440
 
445
- <!--Start PulumiCodeChooser -->
446
441
  ```python
447
442
  import pulumi
448
443
  import pulumi_vault as vault
@@ -455,11 +450,9 @@ class Backend(pulumi.CustomResource):
455
450
  client_secret="12345678901234567890",
456
451
  environment="AzurePublicCloud")
457
452
  ```
458
- <!--End PulumiCodeChooser -->
459
453
 
460
454
  ### *Vault-1.8 And Below*
461
455
 
462
- <!--Start PulumiCodeChooser -->
463
456
  ```python
464
457
  import pulumi
465
458
  import pulumi_vault as vault
@@ -472,7 +465,6 @@ class Backend(pulumi.CustomResource):
472
465
  client_secret="12345678901234567890",
473
466
  environment="AzurePublicCloud")
474
467
  ```
475
- <!--End PulumiCodeChooser -->
476
468
 
477
469
  :param str resource_name: The name of the resource.
478
470
  :param BackendArgs args: The arguments to use to populate this resource's properties.
@@ -465,7 +465,6 @@ class BackendRole(pulumi.CustomResource):
465
465
  """
466
466
  ## Example Usage
467
467
 
468
- <!--Start PulumiCodeChooser -->
469
468
  ```python
470
469
  import pulumi
471
470
  import pulumi_vault as vault
@@ -496,7 +495,6 @@ class BackendRole(pulumi.CustomResource):
496
495
  ttl="300",
497
496
  max_ttl="600")
498
497
  ```
499
- <!--End PulumiCodeChooser -->
500
498
 
501
499
  :param str resource_name: The name of the resource.
502
500
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -530,7 +528,6 @@ class BackendRole(pulumi.CustomResource):
530
528
  """
531
529
  ## Example Usage
532
530
 
533
- <!--Start PulumiCodeChooser -->
534
531
  ```python
535
532
  import pulumi
536
533
  import pulumi_vault as vault
@@ -561,7 +558,6 @@ class BackendRole(pulumi.CustomResource):
561
558
  ttl="300",
562
559
  max_ttl="600")
563
560
  ```
564
- <!--End PulumiCodeChooser -->
565
561
 
566
562
  :param str resource_name: The name of the resource.
567
563
  :param BackendRoleArgs args: The arguments to use to populate this resource's properties.
@@ -216,7 +216,6 @@ def get_access_credentials(backend: Optional[str] = None,
216
216
  """
217
217
  ## Example Usage
218
218
 
219
- <!--Start PulumiCodeChooser -->
220
219
  ```python
221
220
  import pulumi
222
221
  import pulumi_vault as vault
@@ -227,7 +226,6 @@ def get_access_credentials(backend: Optional[str] = None,
227
226
  num_seconds_between_tests=1,
228
227
  max_cred_validation_seconds=300)
229
228
  ```
230
- <!--End PulumiCodeChooser -->
231
229
 
232
230
  ## Caveats
233
231
 
@@ -317,7 +315,6 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
317
315
  """
318
316
  ## Example Usage
319
317
 
320
- <!--Start PulumiCodeChooser -->
321
318
  ```python
322
319
  import pulumi
323
320
  import pulumi_vault as vault
@@ -328,7 +325,6 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
328
325
  num_seconds_between_tests=1,
329
326
  max_cred_validation_seconds=300)
330
327
  ```
331
- <!--End PulumiCodeChooser -->
332
328
 
333
329
  ## Caveats
334
330
 
@@ -75,34 +75,15 @@ class CertAuthBackendRoleArgs:
75
75
  Requires Vault version 1.13+.
76
76
  :param pulumi.Input[Sequence[pulumi.Input[str]]] required_extensions: TLS extensions required on
77
77
  client certificates
78
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
79
- addresses which can authenticate successfully, and ties the resulting token to these blocks
80
- as well.
81
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
82
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
83
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
84
- `token_max_ttl` would otherwise allow a renewal.
85
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
86
- Its current value will be referenced at renewal time.
87
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
88
- generated tokens; otherwise it will be added to the policies set in token_policies.
89
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/cert#token_num_uses)
90
- of times a generated token may be used (within its lifetime); 0 means unlimited.
91
- :param pulumi.Input[int] token_period: If set, indicates that the
92
- token generated using this role should never expire. The token should be renewed within the
93
- duration specified by this value. At each renewal, the token's TTL will be set to the
94
- value of this field. Specified in seconds.
95
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
96
- on the auth method, this list may be supplemented by user/group/other values.
97
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
98
- Its current value will be referenced at renewal time.
99
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
100
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
101
- `service` tokens). For token store roles, there are two additional possibilities:
102
- `default-service` and `default-batch` which specify the type to return unless the client
103
- requests a different type at generation time.
104
-
105
- For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
78
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
79
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
80
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
81
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
82
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
83
+ :param pulumi.Input[int] token_period: Generated Token's Period
84
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
85
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
86
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
106
87
  """
107
88
  pulumi.set(__self__, "certificate", certificate)
108
89
  if allowed_common_names is not None:
@@ -380,9 +361,7 @@ class CertAuthBackendRoleArgs:
380
361
  @pulumi.getter(name="tokenBoundCidrs")
381
362
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
382
363
  """
383
- List of CIDR blocks; if set, specifies blocks of IP
384
- addresses which can authenticate successfully, and ties the resulting token to these blocks
385
- as well.
364
+ Specifies the blocks of IP addresses which are allowed to use the generated token
386
365
  """
387
366
  return pulumi.get(self, "token_bound_cidrs")
388
367
 
@@ -394,10 +373,7 @@ class CertAuthBackendRoleArgs:
394
373
  @pulumi.getter(name="tokenExplicitMaxTtl")
395
374
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
396
375
  """
397
- If set, will encode an
398
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
399
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
400
- `token_max_ttl` would otherwise allow a renewal.
376
+ Generated Token's Explicit Maximum TTL in seconds
401
377
  """
402
378
  return pulumi.get(self, "token_explicit_max_ttl")
403
379
 
@@ -409,8 +385,7 @@ class CertAuthBackendRoleArgs:
409
385
  @pulumi.getter(name="tokenMaxTtl")
410
386
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
411
387
  """
412
- The maximum lifetime for generated tokens in number of seconds.
413
- Its current value will be referenced at renewal time.
388
+ The maximum lifetime of the generated token
414
389
  """
415
390
  return pulumi.get(self, "token_max_ttl")
416
391
 
@@ -422,8 +397,7 @@ class CertAuthBackendRoleArgs:
422
397
  @pulumi.getter(name="tokenNoDefaultPolicy")
423
398
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
424
399
  """
425
- If set, the default policy will not be set on
426
- generated tokens; otherwise it will be added to the policies set in token_policies.
400
+ If true, the 'default' policy will not automatically be added to generated tokens
427
401
  """
428
402
  return pulumi.get(self, "token_no_default_policy")
429
403
 
@@ -435,8 +409,7 @@ class CertAuthBackendRoleArgs:
435
409
  @pulumi.getter(name="tokenNumUses")
436
410
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
437
411
  """
438
- The [maximum number](https://www.vaultproject.io/api-docs/auth/cert#token_num_uses)
439
- of times a generated token may be used (within its lifetime); 0 means unlimited.
412
+ The maximum number of times a token may be used, a value of zero means unlimited
440
413
  """
441
414
  return pulumi.get(self, "token_num_uses")
442
415
 
@@ -448,10 +421,7 @@ class CertAuthBackendRoleArgs:
448
421
  @pulumi.getter(name="tokenPeriod")
449
422
  def token_period(self) -> Optional[pulumi.Input[int]]:
450
423
  """
451
- If set, indicates that the
452
- token generated using this role should never expire. The token should be renewed within the
453
- duration specified by this value. At each renewal, the token's TTL will be set to the
454
- value of this field. Specified in seconds.
424
+ Generated Token's Period
455
425
  """
456
426
  return pulumi.get(self, "token_period")
457
427
 
@@ -463,8 +433,7 @@ class CertAuthBackendRoleArgs:
463
433
  @pulumi.getter(name="tokenPolicies")
464
434
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
465
435
  """
466
- List of policies to encode onto generated tokens. Depending
467
- on the auth method, this list may be supplemented by user/group/other values.
436
+ Generated Token's Policies
468
437
  """
469
438
  return pulumi.get(self, "token_policies")
470
439
 
@@ -476,8 +445,7 @@ class CertAuthBackendRoleArgs:
476
445
  @pulumi.getter(name="tokenTtl")
477
446
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
478
447
  """
479
- The incremental lifetime for generated tokens in number of seconds.
480
- Its current value will be referenced at renewal time.
448
+ The initial ttl of the token to generate in seconds
481
449
  """
482
450
  return pulumi.get(self, "token_ttl")
483
451
 
@@ -489,13 +457,7 @@ class CertAuthBackendRoleArgs:
489
457
  @pulumi.getter(name="tokenType")
490
458
  def token_type(self) -> Optional[pulumi.Input[str]]:
491
459
  """
492
- The type of token that should be generated. Can be `service`,
493
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
494
- `service` tokens). For token store roles, there are two additional possibilities:
495
- `default-service` and `default-batch` which specify the type to return unless the client
496
- requests a different type at generation time.
497
-
498
- For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
460
+ The type of token to generate, service or batch
499
461
  """
500
462
  return pulumi.get(self, "token_type")
501
463
 
@@ -568,34 +530,15 @@ class _CertAuthBackendRoleState:
568
530
  Requires Vault version 1.13+.
569
531
  :param pulumi.Input[Sequence[pulumi.Input[str]]] required_extensions: TLS extensions required on
570
532
  client certificates
571
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
572
- addresses which can authenticate successfully, and ties the resulting token to these blocks
573
- as well.
574
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
575
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
576
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
577
- `token_max_ttl` would otherwise allow a renewal.
578
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
579
- Its current value will be referenced at renewal time.
580
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
581
- generated tokens; otherwise it will be added to the policies set in token_policies.
582
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/cert#token_num_uses)
583
- of times a generated token may be used (within its lifetime); 0 means unlimited.
584
- :param pulumi.Input[int] token_period: If set, indicates that the
585
- token generated using this role should never expire. The token should be renewed within the
586
- duration specified by this value. At each renewal, the token's TTL will be set to the
587
- value of this field. Specified in seconds.
588
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
589
- on the auth method, this list may be supplemented by user/group/other values.
590
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
591
- Its current value will be referenced at renewal time.
592
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
593
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
594
- `service` tokens). For token store roles, there are two additional possibilities:
595
- `default-service` and `default-batch` which specify the type to return unless the client
596
- requests a different type at generation time.
597
-
598
- For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
533
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
534
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
535
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
536
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
537
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
538
+ :param pulumi.Input[int] token_period: Generated Token's Period
539
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
540
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
541
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
599
542
  """
600
543
  if allowed_common_names is not None:
601
544
  pulumi.set(__self__, "allowed_common_names", allowed_common_names)
@@ -874,9 +817,7 @@ class _CertAuthBackendRoleState:
874
817
  @pulumi.getter(name="tokenBoundCidrs")
875
818
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
876
819
  """
877
- List of CIDR blocks; if set, specifies blocks of IP
878
- addresses which can authenticate successfully, and ties the resulting token to these blocks
879
- as well.
820
+ Specifies the blocks of IP addresses which are allowed to use the generated token
880
821
  """
881
822
  return pulumi.get(self, "token_bound_cidrs")
882
823
 
@@ -888,10 +829,7 @@ class _CertAuthBackendRoleState:
888
829
  @pulumi.getter(name="tokenExplicitMaxTtl")
889
830
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
890
831
  """
891
- If set, will encode an
892
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
893
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
894
- `token_max_ttl` would otherwise allow a renewal.
832
+ Generated Token's Explicit Maximum TTL in seconds
895
833
  """
896
834
  return pulumi.get(self, "token_explicit_max_ttl")
897
835
 
@@ -903,8 +841,7 @@ class _CertAuthBackendRoleState:
903
841
  @pulumi.getter(name="tokenMaxTtl")
904
842
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
905
843
  """
906
- The maximum lifetime for generated tokens in number of seconds.
907
- Its current value will be referenced at renewal time.
844
+ The maximum lifetime of the generated token
908
845
  """
909
846
  return pulumi.get(self, "token_max_ttl")
910
847
 
@@ -916,8 +853,7 @@ class _CertAuthBackendRoleState:
916
853
  @pulumi.getter(name="tokenNoDefaultPolicy")
917
854
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
918
855
  """
919
- If set, the default policy will not be set on
920
- generated tokens; otherwise it will be added to the policies set in token_policies.
856
+ If true, the 'default' policy will not automatically be added to generated tokens
921
857
  """
922
858
  return pulumi.get(self, "token_no_default_policy")
923
859
 
@@ -929,8 +865,7 @@ class _CertAuthBackendRoleState:
929
865
  @pulumi.getter(name="tokenNumUses")
930
866
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
931
867
  """
932
- The [maximum number](https://www.vaultproject.io/api-docs/auth/cert#token_num_uses)
933
- of times a generated token may be used (within its lifetime); 0 means unlimited.
868
+ The maximum number of times a token may be used, a value of zero means unlimited
934
869
  """
935
870
  return pulumi.get(self, "token_num_uses")
936
871
 
@@ -942,10 +877,7 @@ class _CertAuthBackendRoleState:
942
877
  @pulumi.getter(name="tokenPeriod")
943
878
  def token_period(self) -> Optional[pulumi.Input[int]]:
944
879
  """
945
- If set, indicates that the
946
- token generated using this role should never expire. The token should be renewed within the
947
- duration specified by this value. At each renewal, the token's TTL will be set to the
948
- value of this field. Specified in seconds.
880
+ Generated Token's Period
949
881
  """
950
882
  return pulumi.get(self, "token_period")
951
883
 
@@ -957,8 +889,7 @@ class _CertAuthBackendRoleState:
957
889
  @pulumi.getter(name="tokenPolicies")
958
890
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
959
891
  """
960
- List of policies to encode onto generated tokens. Depending
961
- on the auth method, this list may be supplemented by user/group/other values.
892
+ Generated Token's Policies
962
893
  """
963
894
  return pulumi.get(self, "token_policies")
964
895
 
@@ -970,8 +901,7 @@ class _CertAuthBackendRoleState:
970
901
  @pulumi.getter(name="tokenTtl")
971
902
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
972
903
  """
973
- The incremental lifetime for generated tokens in number of seconds.
974
- Its current value will be referenced at renewal time.
904
+ The initial ttl of the token to generate in seconds
975
905
  """
976
906
  return pulumi.get(self, "token_ttl")
977
907
 
@@ -983,13 +913,7 @@ class _CertAuthBackendRoleState:
983
913
  @pulumi.getter(name="tokenType")
984
914
  def token_type(self) -> Optional[pulumi.Input[str]]:
985
915
  """
986
- The type of token that should be generated. Can be `service`,
987
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
988
- `service` tokens). For token store roles, there are two additional possibilities:
989
- `default-service` and `default-batch` which specify the type to return unless the client
990
- requests a different type at generation time.
991
-
992
- For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
916
+ The type of token to generate, service or batch
993
917
  """
994
918
  return pulumi.get(self, "token_type")
995
919
 
@@ -1035,7 +959,6 @@ class CertAuthBackendRole(pulumi.CustomResource):
1035
959
 
1036
960
  ## Example Usage
1037
961
 
1038
- <!--Start PulumiCodeChooser -->
1039
962
  ```python
1040
963
  import pulumi
1041
964
  import pulumi_std as std
@@ -1056,7 +979,6 @@ class CertAuthBackendRole(pulumi.CustomResource):
1056
979
  token_max_ttl=600,
1057
980
  token_policies=["foo"])
1058
981
  ```
1059
- <!--End PulumiCodeChooser -->
1060
982
 
1061
983
  :param str resource_name: The name of the resource.
1062
984
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -1093,34 +1015,15 @@ class CertAuthBackendRole(pulumi.CustomResource):
1093
1015
  Requires Vault version 1.13+.
1094
1016
  :param pulumi.Input[Sequence[pulumi.Input[str]]] required_extensions: TLS extensions required on
1095
1017
  client certificates
1096
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
1097
- addresses which can authenticate successfully, and ties the resulting token to these blocks
1098
- as well.
1099
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
1100
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1101
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1102
- `token_max_ttl` would otherwise allow a renewal.
1103
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
1104
- Its current value will be referenced at renewal time.
1105
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
1106
- generated tokens; otherwise it will be added to the policies set in token_policies.
1107
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/cert#token_num_uses)
1108
- of times a generated token may be used (within its lifetime); 0 means unlimited.
1109
- :param pulumi.Input[int] token_period: If set, indicates that the
1110
- token generated using this role should never expire. The token should be renewed within the
1111
- duration specified by this value. At each renewal, the token's TTL will be set to the
1112
- value of this field. Specified in seconds.
1113
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
1114
- on the auth method, this list may be supplemented by user/group/other values.
1115
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
1116
- Its current value will be referenced at renewal time.
1117
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
1118
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
1119
- `service` tokens). For token store roles, there are two additional possibilities:
1120
- `default-service` and `default-batch` which specify the type to return unless the client
1121
- requests a different type at generation time.
1122
-
1123
- For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
1018
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
1019
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
1020
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
1021
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
1022
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
1023
+ :param pulumi.Input[int] token_period: Generated Token's Period
1024
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
1025
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
1026
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
1124
1027
  """
1125
1028
  ...
1126
1029
  @overload
@@ -1133,7 +1036,6 @@ class CertAuthBackendRole(pulumi.CustomResource):
1133
1036
 
1134
1037
  ## Example Usage
1135
1038
 
1136
- <!--Start PulumiCodeChooser -->
1137
1039
  ```python
1138
1040
  import pulumi
1139
1041
  import pulumi_std as std
@@ -1154,7 +1056,6 @@ class CertAuthBackendRole(pulumi.CustomResource):
1154
1056
  token_max_ttl=600,
1155
1057
  token_policies=["foo"])
1156
1058
  ```
1157
- <!--End PulumiCodeChooser -->
1158
1059
 
1159
1060
  :param str resource_name: The name of the resource.
1160
1061
  :param CertAuthBackendRoleArgs args: The arguments to use to populate this resource's properties.
@@ -1310,34 +1211,15 @@ class CertAuthBackendRole(pulumi.CustomResource):
1310
1211
  Requires Vault version 1.13+.
1311
1212
  :param pulumi.Input[Sequence[pulumi.Input[str]]] required_extensions: TLS extensions required on
1312
1213
  client certificates
1313
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
1314
- addresses which can authenticate successfully, and ties the resulting token to these blocks
1315
- as well.
1316
- :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
1317
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1318
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1319
- `token_max_ttl` would otherwise allow a renewal.
1320
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
1321
- Its current value will be referenced at renewal time.
1322
- :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
1323
- generated tokens; otherwise it will be added to the policies set in token_policies.
1324
- :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/auth/cert#token_num_uses)
1325
- of times a generated token may be used (within its lifetime); 0 means unlimited.
1326
- :param pulumi.Input[int] token_period: If set, indicates that the
1327
- token generated using this role should never expire. The token should be renewed within the
1328
- duration specified by this value. At each renewal, the token's TTL will be set to the
1329
- value of this field. Specified in seconds.
1330
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
1331
- on the auth method, this list may be supplemented by user/group/other values.
1332
- :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
1333
- Its current value will be referenced at renewal time.
1334
- :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
1335
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
1336
- `service` tokens). For token store roles, there are two additional possibilities:
1337
- `default-service` and `default-batch` which specify the type to return unless the client
1338
- requests a different type at generation time.
1339
-
1340
- For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
1214
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
1215
+ :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
1216
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
1217
+ :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
1218
+ :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
1219
+ :param pulumi.Input[int] token_period: Generated Token's Period
1220
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
1221
+ :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
1222
+ :param pulumi.Input[str] token_type: The type of token to generate, service or batch
1341
1223
  """
1342
1224
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
1343
1225
 
@@ -1527,9 +1409,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
1527
1409
  @pulumi.getter(name="tokenBoundCidrs")
1528
1410
  def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
1529
1411
  """
1530
- List of CIDR blocks; if set, specifies blocks of IP
1531
- addresses which can authenticate successfully, and ties the resulting token to these blocks
1532
- as well.
1412
+ Specifies the blocks of IP addresses which are allowed to use the generated token
1533
1413
  """
1534
1414
  return pulumi.get(self, "token_bound_cidrs")
1535
1415
 
@@ -1537,10 +1417,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
1537
1417
  @pulumi.getter(name="tokenExplicitMaxTtl")
1538
1418
  def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
1539
1419
  """
1540
- If set, will encode an
1541
- [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1542
- onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1543
- `token_max_ttl` would otherwise allow a renewal.
1420
+ Generated Token's Explicit Maximum TTL in seconds
1544
1421
  """
1545
1422
  return pulumi.get(self, "token_explicit_max_ttl")
1546
1423
 
@@ -1548,8 +1425,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
1548
1425
  @pulumi.getter(name="tokenMaxTtl")
1549
1426
  def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
1550
1427
  """
1551
- The maximum lifetime for generated tokens in number of seconds.
1552
- Its current value will be referenced at renewal time.
1428
+ The maximum lifetime of the generated token
1553
1429
  """
1554
1430
  return pulumi.get(self, "token_max_ttl")
1555
1431
 
@@ -1557,8 +1433,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
1557
1433
  @pulumi.getter(name="tokenNoDefaultPolicy")
1558
1434
  def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
1559
1435
  """
1560
- If set, the default policy will not be set on
1561
- generated tokens; otherwise it will be added to the policies set in token_policies.
1436
+ If true, the 'default' policy will not automatically be added to generated tokens
1562
1437
  """
1563
1438
  return pulumi.get(self, "token_no_default_policy")
1564
1439
 
@@ -1566,8 +1441,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
1566
1441
  @pulumi.getter(name="tokenNumUses")
1567
1442
  def token_num_uses(self) -> pulumi.Output[Optional[int]]:
1568
1443
  """
1569
- The [maximum number](https://www.vaultproject.io/api-docs/auth/cert#token_num_uses)
1570
- of times a generated token may be used (within its lifetime); 0 means unlimited.
1444
+ The maximum number of times a token may be used, a value of zero means unlimited
1571
1445
  """
1572
1446
  return pulumi.get(self, "token_num_uses")
1573
1447
 
@@ -1575,10 +1449,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
1575
1449
  @pulumi.getter(name="tokenPeriod")
1576
1450
  def token_period(self) -> pulumi.Output[Optional[int]]:
1577
1451
  """
1578
- If set, indicates that the
1579
- token generated using this role should never expire. The token should be renewed within the
1580
- duration specified by this value. At each renewal, the token's TTL will be set to the
1581
- value of this field. Specified in seconds.
1452
+ Generated Token's Period
1582
1453
  """
1583
1454
  return pulumi.get(self, "token_period")
1584
1455
 
@@ -1586,8 +1457,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
1586
1457
  @pulumi.getter(name="tokenPolicies")
1587
1458
  def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
1588
1459
  """
1589
- List of policies to encode onto generated tokens. Depending
1590
- on the auth method, this list may be supplemented by user/group/other values.
1460
+ Generated Token's Policies
1591
1461
  """
1592
1462
  return pulumi.get(self, "token_policies")
1593
1463
 
@@ -1595,8 +1465,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
1595
1465
  @pulumi.getter(name="tokenTtl")
1596
1466
  def token_ttl(self) -> pulumi.Output[Optional[int]]:
1597
1467
  """
1598
- The incremental lifetime for generated tokens in number of seconds.
1599
- Its current value will be referenced at renewal time.
1468
+ The initial ttl of the token to generate in seconds
1600
1469
  """
1601
1470
  return pulumi.get(self, "token_ttl")
1602
1471
 
@@ -1604,13 +1473,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
1604
1473
  @pulumi.getter(name="tokenType")
1605
1474
  def token_type(self) -> pulumi.Output[Optional[str]]:
1606
1475
  """
1607
- The type of token that should be generated. Can be `service`,
1608
- `batch`, or `default` to use the mount's tuned default (which unless changed will be
1609
- `service` tokens). For token store roles, there are two additional possibilities:
1610
- `default-service` and `default-batch` which specify the type to return unless the client
1611
- requests a different type at generation time.
1612
-
1613
- For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
1476
+ The type of token to generate, service or batch
1614
1477
  """
1615
1478
  return pulumi.get(self, "token_type")
1616
1479