pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (269) hide show
  1. pulumi_vault/__init__.py +19 -1
  2. pulumi_vault/_inputs.py +873 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +1016 -439
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +1057 -285
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +887 -256
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +426 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +878 -336
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +400 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +1006 -227
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +431 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +732 -693
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +380 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +909 -271
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/oci_auth_backend.py +683 -0
  168. pulumi_vault/oci_auth_backend_role.py +798 -0
  169. pulumi_vault/okta/__init__.py +1 -1
  170. pulumi_vault/okta/_inputs.py +31 -32
  171. pulumi_vault/okta/auth_backend.py +305 -306
  172. pulumi_vault/okta/auth_backend_group.py +69 -70
  173. pulumi_vault/okta/auth_backend_user.py +86 -87
  174. pulumi_vault/okta/outputs.py +21 -22
  175. pulumi_vault/outputs.py +234 -82
  176. pulumi_vault/pkisecret/__init__.py +1 -1
  177. pulumi_vault/pkisecret/_inputs.py +55 -56
  178. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  179. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  180. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  181. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  182. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  183. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  184. pulumi_vault/pkisecret/backend_config_scep.py +205 -159
  185. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  186. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  187. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  188. pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
  189. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  190. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  191. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  192. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  193. pulumi_vault/pkisecret/outputs.py +61 -62
  194. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  195. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  196. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  197. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  198. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  199. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  200. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  201. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  202. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  203. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  204. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  205. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  206. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  207. pulumi_vault/plugin.py +154 -155
  208. pulumi_vault/plugin_pinned_version.py +52 -53
  209. pulumi_vault/policy.py +52 -53
  210. pulumi_vault/provider.py +160 -161
  211. pulumi_vault/pulumi-plugin.json +1 -1
  212. pulumi_vault/quota_lease_count.py +103 -104
  213. pulumi_vault/quota_rate_limit.py +171 -172
  214. pulumi_vault/rabbitmq/__init__.py +1 -1
  215. pulumi_vault/rabbitmq/_inputs.py +50 -51
  216. pulumi_vault/rabbitmq/outputs.py +34 -35
  217. pulumi_vault/rabbitmq/secret_backend.py +902 -231
  218. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  219. pulumi_vault/raft_autopilot.py +137 -138
  220. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  221. pulumi_vault/rgp_policy.py +69 -70
  222. pulumi_vault/saml/__init__.py +1 -1
  223. pulumi_vault/saml/auth_backend.py +188 -189
  224. pulumi_vault/saml/auth_backend_role.py +290 -291
  225. pulumi_vault/scep_auth_backend_role.py +252 -253
  226. pulumi_vault/secrets/__init__.py +1 -1
  227. pulumi_vault/secrets/_inputs.py +19 -20
  228. pulumi_vault/secrets/outputs.py +13 -14
  229. pulumi_vault/secrets/sync_association.py +88 -89
  230. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  231. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  232. pulumi_vault/secrets/sync_config.py +52 -53
  233. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  234. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  235. pulumi_vault/secrets/sync_github_apps.py +78 -79
  236. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  237. pulumi_vault/ssh/__init__.py +1 -1
  238. pulumi_vault/ssh/_inputs.py +13 -14
  239. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  240. pulumi_vault/ssh/outputs.py +9 -10
  241. pulumi_vault/ssh/secret_backend_ca.py +217 -124
  242. pulumi_vault/ssh/secret_backend_role.py +446 -447
  243. pulumi_vault/terraformcloud/__init__.py +1 -1
  244. pulumi_vault/terraformcloud/secret_backend.py +833 -155
  245. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  246. pulumi_vault/terraformcloud/secret_role.py +117 -118
  247. pulumi_vault/token.py +301 -302
  248. pulumi_vault/tokenauth/__init__.py +1 -1
  249. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  250. pulumi_vault/transform/__init__.py +1 -1
  251. pulumi_vault/transform/alphabet.py +69 -70
  252. pulumi_vault/transform/get_decode.py +57 -58
  253. pulumi_vault/transform/get_encode.py +57 -58
  254. pulumi_vault/transform/role.py +69 -70
  255. pulumi_vault/transform/template.py +137 -138
  256. pulumi_vault/transform/transformation.py +171 -172
  257. pulumi_vault/transit/__init__.py +1 -1
  258. pulumi_vault/transit/get_cmac.py +47 -48
  259. pulumi_vault/transit/get_decrypt.py +25 -26
  260. pulumi_vault/transit/get_encrypt.py +29 -30
  261. pulumi_vault/transit/get_sign.py +71 -72
  262. pulumi_vault/transit/get_verify.py +83 -84
  263. pulumi_vault/transit/secret_backend_key.py +377 -350
  264. pulumi_vault/transit/secret_cache_config.py +52 -53
  265. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
  266. pulumi_vault-7.2.0.dist-info/RECORD +270 -0
  267. pulumi_vault-7.1.0.dist-info/RECORD +0 -268
  268. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
  269. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,798 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from . import _utilities
16
+
17
+ __all__ = ['OciAuthBackendRoleArgs', 'OciAuthBackendRole']
18
+
19
+ @pulumi.input_type
20
+ class OciAuthBackendRoleArgs:
21
+ def __init__(__self__, *,
22
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
23
+ name: Optional[pulumi.Input[_builtins.str]] = None,
24
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
25
+ ocid_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
28
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
29
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
30
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
31
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
32
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
33
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
34
+ token_type: Optional[pulumi.Input[_builtins.str]] = None):
35
+ """
36
+ The set of arguments for constructing a OciAuthBackendRole resource.
37
+ :param pulumi.Input[_builtins.str] backend: Unique name of the auth backend to configure.
38
+ :param pulumi.Input[_builtins.str] name: The name of the role.
39
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
40
+ The value should not contain leading or trailing forward slashes.
41
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
42
+ *Available only for Vault Enterprise*.
43
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ocid_lists: The list of Group or Dynamic Group OCIDs that can take this role.
44
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
45
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
46
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
47
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
48
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
49
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
50
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
51
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
52
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
53
+ """
54
+ if backend is not None:
55
+ pulumi.set(__self__, "backend", backend)
56
+ if name is not None:
57
+ pulumi.set(__self__, "name", name)
58
+ if namespace is not None:
59
+ pulumi.set(__self__, "namespace", namespace)
60
+ if ocid_lists is not None:
61
+ pulumi.set(__self__, "ocid_lists", ocid_lists)
62
+ if token_bound_cidrs is not None:
63
+ pulumi.set(__self__, "token_bound_cidrs", token_bound_cidrs)
64
+ if token_explicit_max_ttl is not None:
65
+ pulumi.set(__self__, "token_explicit_max_ttl", token_explicit_max_ttl)
66
+ if token_max_ttl is not None:
67
+ pulumi.set(__self__, "token_max_ttl", token_max_ttl)
68
+ if token_no_default_policy is not None:
69
+ pulumi.set(__self__, "token_no_default_policy", token_no_default_policy)
70
+ if token_num_uses is not None:
71
+ pulumi.set(__self__, "token_num_uses", token_num_uses)
72
+ if token_period is not None:
73
+ pulumi.set(__self__, "token_period", token_period)
74
+ if token_policies is not None:
75
+ pulumi.set(__self__, "token_policies", token_policies)
76
+ if token_ttl is not None:
77
+ pulumi.set(__self__, "token_ttl", token_ttl)
78
+ if token_type is not None:
79
+ pulumi.set(__self__, "token_type", token_type)
80
+
81
+ @_builtins.property
82
+ @pulumi.getter
83
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
84
+ """
85
+ Unique name of the auth backend to configure.
86
+ """
87
+ return pulumi.get(self, "backend")
88
+
89
+ @backend.setter
90
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
91
+ pulumi.set(self, "backend", value)
92
+
93
+ @_builtins.property
94
+ @pulumi.getter
95
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
96
+ """
97
+ The name of the role.
98
+ """
99
+ return pulumi.get(self, "name")
100
+
101
+ @name.setter
102
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
103
+ pulumi.set(self, "name", value)
104
+
105
+ @_builtins.property
106
+ @pulumi.getter
107
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
108
+ """
109
+ The namespace to provision the resource in.
110
+ The value should not contain leading or trailing forward slashes.
111
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
112
+ *Available only for Vault Enterprise*.
113
+ """
114
+ return pulumi.get(self, "namespace")
115
+
116
+ @namespace.setter
117
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
118
+ pulumi.set(self, "namespace", value)
119
+
120
+ @_builtins.property
121
+ @pulumi.getter(name="ocidLists")
122
+ def ocid_lists(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
123
+ """
124
+ The list of Group or Dynamic Group OCIDs that can take this role.
125
+ """
126
+ return pulumi.get(self, "ocid_lists")
127
+
128
+ @ocid_lists.setter
129
+ def ocid_lists(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
130
+ pulumi.set(self, "ocid_lists", value)
131
+
132
+ @_builtins.property
133
+ @pulumi.getter(name="tokenBoundCidrs")
134
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
135
+ """
136
+ Specifies the blocks of IP addresses which are allowed to use the generated token
137
+ """
138
+ return pulumi.get(self, "token_bound_cidrs")
139
+
140
+ @token_bound_cidrs.setter
141
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
142
+ pulumi.set(self, "token_bound_cidrs", value)
143
+
144
+ @_builtins.property
145
+ @pulumi.getter(name="tokenExplicitMaxTtl")
146
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
147
+ """
148
+ Generated Token's Explicit Maximum TTL in seconds
149
+ """
150
+ return pulumi.get(self, "token_explicit_max_ttl")
151
+
152
+ @token_explicit_max_ttl.setter
153
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
154
+ pulumi.set(self, "token_explicit_max_ttl", value)
155
+
156
+ @_builtins.property
157
+ @pulumi.getter(name="tokenMaxTtl")
158
+ def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
159
+ """
160
+ The maximum lifetime of the generated token
161
+ """
162
+ return pulumi.get(self, "token_max_ttl")
163
+
164
+ @token_max_ttl.setter
165
+ def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
166
+ pulumi.set(self, "token_max_ttl", value)
167
+
168
+ @_builtins.property
169
+ @pulumi.getter(name="tokenNoDefaultPolicy")
170
+ def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
171
+ """
172
+ If true, the 'default' policy will not automatically be added to generated tokens
173
+ """
174
+ return pulumi.get(self, "token_no_default_policy")
175
+
176
+ @token_no_default_policy.setter
177
+ def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
178
+ pulumi.set(self, "token_no_default_policy", value)
179
+
180
+ @_builtins.property
181
+ @pulumi.getter(name="tokenNumUses")
182
+ def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
183
+ """
184
+ The maximum number of times a token may be used, a value of zero means unlimited
185
+ """
186
+ return pulumi.get(self, "token_num_uses")
187
+
188
+ @token_num_uses.setter
189
+ def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
190
+ pulumi.set(self, "token_num_uses", value)
191
+
192
+ @_builtins.property
193
+ @pulumi.getter(name="tokenPeriod")
194
+ def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
195
+ """
196
+ Generated Token's Period
197
+ """
198
+ return pulumi.get(self, "token_period")
199
+
200
+ @token_period.setter
201
+ def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
202
+ pulumi.set(self, "token_period", value)
203
+
204
+ @_builtins.property
205
+ @pulumi.getter(name="tokenPolicies")
206
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
207
+ """
208
+ Generated Token's Policies
209
+ """
210
+ return pulumi.get(self, "token_policies")
211
+
212
+ @token_policies.setter
213
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
214
+ pulumi.set(self, "token_policies", value)
215
+
216
+ @_builtins.property
217
+ @pulumi.getter(name="tokenTtl")
218
+ def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
219
+ """
220
+ The initial ttl of the token to generate in seconds
221
+ """
222
+ return pulumi.get(self, "token_ttl")
223
+
224
+ @token_ttl.setter
225
+ def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
226
+ pulumi.set(self, "token_ttl", value)
227
+
228
+ @_builtins.property
229
+ @pulumi.getter(name="tokenType")
230
+ def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
231
+ """
232
+ The type of token to generate, service or batch
233
+ """
234
+ return pulumi.get(self, "token_type")
235
+
236
+ @token_type.setter
237
+ def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
238
+ pulumi.set(self, "token_type", value)
239
+
240
+
241
+ @pulumi.input_type
242
+ class _OciAuthBackendRoleState:
243
+ def __init__(__self__, *,
244
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
245
+ name: Optional[pulumi.Input[_builtins.str]] = None,
246
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
247
+ ocid_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
248
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
249
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
250
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
251
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
252
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
253
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
254
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
255
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
256
+ token_type: Optional[pulumi.Input[_builtins.str]] = None):
257
+ """
258
+ Input properties used for looking up and filtering OciAuthBackendRole resources.
259
+ :param pulumi.Input[_builtins.str] backend: Unique name of the auth backend to configure.
260
+ :param pulumi.Input[_builtins.str] name: The name of the role.
261
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
262
+ The value should not contain leading or trailing forward slashes.
263
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
264
+ *Available only for Vault Enterprise*.
265
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ocid_lists: The list of Group or Dynamic Group OCIDs that can take this role.
266
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
267
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
268
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
269
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
270
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
271
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
272
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
273
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
274
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
275
+ """
276
+ if backend is not None:
277
+ pulumi.set(__self__, "backend", backend)
278
+ if name is not None:
279
+ pulumi.set(__self__, "name", name)
280
+ if namespace is not None:
281
+ pulumi.set(__self__, "namespace", namespace)
282
+ if ocid_lists is not None:
283
+ pulumi.set(__self__, "ocid_lists", ocid_lists)
284
+ if token_bound_cidrs is not None:
285
+ pulumi.set(__self__, "token_bound_cidrs", token_bound_cidrs)
286
+ if token_explicit_max_ttl is not None:
287
+ pulumi.set(__self__, "token_explicit_max_ttl", token_explicit_max_ttl)
288
+ if token_max_ttl is not None:
289
+ pulumi.set(__self__, "token_max_ttl", token_max_ttl)
290
+ if token_no_default_policy is not None:
291
+ pulumi.set(__self__, "token_no_default_policy", token_no_default_policy)
292
+ if token_num_uses is not None:
293
+ pulumi.set(__self__, "token_num_uses", token_num_uses)
294
+ if token_period is not None:
295
+ pulumi.set(__self__, "token_period", token_period)
296
+ if token_policies is not None:
297
+ pulumi.set(__self__, "token_policies", token_policies)
298
+ if token_ttl is not None:
299
+ pulumi.set(__self__, "token_ttl", token_ttl)
300
+ if token_type is not None:
301
+ pulumi.set(__self__, "token_type", token_type)
302
+
303
+ @_builtins.property
304
+ @pulumi.getter
305
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
306
+ """
307
+ Unique name of the auth backend to configure.
308
+ """
309
+ return pulumi.get(self, "backend")
310
+
311
+ @backend.setter
312
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
313
+ pulumi.set(self, "backend", value)
314
+
315
+ @_builtins.property
316
+ @pulumi.getter
317
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
318
+ """
319
+ The name of the role.
320
+ """
321
+ return pulumi.get(self, "name")
322
+
323
+ @name.setter
324
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
325
+ pulumi.set(self, "name", value)
326
+
327
+ @_builtins.property
328
+ @pulumi.getter
329
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
330
+ """
331
+ The namespace to provision the resource in.
332
+ The value should not contain leading or trailing forward slashes.
333
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
334
+ *Available only for Vault Enterprise*.
335
+ """
336
+ return pulumi.get(self, "namespace")
337
+
338
+ @namespace.setter
339
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
340
+ pulumi.set(self, "namespace", value)
341
+
342
+ @_builtins.property
343
+ @pulumi.getter(name="ocidLists")
344
+ def ocid_lists(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
345
+ """
346
+ The list of Group or Dynamic Group OCIDs that can take this role.
347
+ """
348
+ return pulumi.get(self, "ocid_lists")
349
+
350
+ @ocid_lists.setter
351
+ def ocid_lists(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
352
+ pulumi.set(self, "ocid_lists", value)
353
+
354
+ @_builtins.property
355
+ @pulumi.getter(name="tokenBoundCidrs")
356
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
357
+ """
358
+ Specifies the blocks of IP addresses which are allowed to use the generated token
359
+ """
360
+ return pulumi.get(self, "token_bound_cidrs")
361
+
362
+ @token_bound_cidrs.setter
363
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
364
+ pulumi.set(self, "token_bound_cidrs", value)
365
+
366
+ @_builtins.property
367
+ @pulumi.getter(name="tokenExplicitMaxTtl")
368
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
369
+ """
370
+ Generated Token's Explicit Maximum TTL in seconds
371
+ """
372
+ return pulumi.get(self, "token_explicit_max_ttl")
373
+
374
+ @token_explicit_max_ttl.setter
375
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
376
+ pulumi.set(self, "token_explicit_max_ttl", value)
377
+
378
+ @_builtins.property
379
+ @pulumi.getter(name="tokenMaxTtl")
380
+ def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
381
+ """
382
+ The maximum lifetime of the generated token
383
+ """
384
+ return pulumi.get(self, "token_max_ttl")
385
+
386
+ @token_max_ttl.setter
387
+ def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
388
+ pulumi.set(self, "token_max_ttl", value)
389
+
390
+ @_builtins.property
391
+ @pulumi.getter(name="tokenNoDefaultPolicy")
392
+ def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
393
+ """
394
+ If true, the 'default' policy will not automatically be added to generated tokens
395
+ """
396
+ return pulumi.get(self, "token_no_default_policy")
397
+
398
+ @token_no_default_policy.setter
399
+ def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
400
+ pulumi.set(self, "token_no_default_policy", value)
401
+
402
+ @_builtins.property
403
+ @pulumi.getter(name="tokenNumUses")
404
+ def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
405
+ """
406
+ The maximum number of times a token may be used, a value of zero means unlimited
407
+ """
408
+ return pulumi.get(self, "token_num_uses")
409
+
410
+ @token_num_uses.setter
411
+ def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
412
+ pulumi.set(self, "token_num_uses", value)
413
+
414
+ @_builtins.property
415
+ @pulumi.getter(name="tokenPeriod")
416
+ def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
417
+ """
418
+ Generated Token's Period
419
+ """
420
+ return pulumi.get(self, "token_period")
421
+
422
+ @token_period.setter
423
+ def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
424
+ pulumi.set(self, "token_period", value)
425
+
426
+ @_builtins.property
427
+ @pulumi.getter(name="tokenPolicies")
428
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
429
+ """
430
+ Generated Token's Policies
431
+ """
432
+ return pulumi.get(self, "token_policies")
433
+
434
+ @token_policies.setter
435
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
436
+ pulumi.set(self, "token_policies", value)
437
+
438
+ @_builtins.property
439
+ @pulumi.getter(name="tokenTtl")
440
+ def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
441
+ """
442
+ The initial ttl of the token to generate in seconds
443
+ """
444
+ return pulumi.get(self, "token_ttl")
445
+
446
+ @token_ttl.setter
447
+ def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
448
+ pulumi.set(self, "token_ttl", value)
449
+
450
+ @_builtins.property
451
+ @pulumi.getter(name="tokenType")
452
+ def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
453
+ """
454
+ The type of token to generate, service or batch
455
+ """
456
+ return pulumi.get(self, "token_type")
457
+
458
+ @token_type.setter
459
+ def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
460
+ pulumi.set(self, "token_type", value)
461
+
462
+
463
+ @pulumi.type_token("vault:index/ociAuthBackendRole:OciAuthBackendRole")
464
+ class OciAuthBackendRole(pulumi.CustomResource):
465
+ @overload
466
+ def __init__(__self__,
467
+ resource_name: str,
468
+ opts: Optional[pulumi.ResourceOptions] = None,
469
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
470
+ name: Optional[pulumi.Input[_builtins.str]] = None,
471
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
472
+ ocid_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
473
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
474
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
475
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
476
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
477
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
478
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
479
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
480
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
481
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
482
+ __props__=None):
483
+ """
484
+ ## Example Usage
485
+
486
+ ```python
487
+ import pulumi
488
+ import pulumi_vault as vault
489
+
490
+ oci = vault.OciAuthBackend("oci",
491
+ path="oci",
492
+ home_tenancy_id="ocid1.tenancy.oc1..aaaaaaaah7zkvaffv26pzyauoe2zbnionqvhvsexamplee557wakiofi4ysgqq")
493
+ example = vault.OciAuthBackendRole("example",
494
+ backend=oci.path,
495
+ name="test-role",
496
+ ocid_lists=[
497
+ "ocid1.group.oc1..aaaaaaaabmyiinfq32y5aha3r2yo4exampleo4yg3fjk2sbne4567tropaa",
498
+ "ocid1.dynamicgroup.oc1..aaaaaaaabvfwct33xri5examplegov4zyjp3rd5d7sk9jjdggxijhco56hrq",
499
+ ],
500
+ token_ttl=60,
501
+ token_max_ttl=120,
502
+ token_policies=[
503
+ "default",
504
+ "dev",
505
+ "prod",
506
+ ])
507
+ ```
508
+
509
+ ## Import
510
+
511
+ OCI auth backend roles can be imported using `auth/`, the `backend` path, `/role/`, and the `role` name e.g.
512
+
513
+ ```sh
514
+ $ pulumi import vault:index/ociAuthBackendRole:OciAuthBackendRole example auth/oci/role/test-role
515
+ ```
516
+
517
+ :param str resource_name: The name of the resource.
518
+ :param pulumi.ResourceOptions opts: Options for the resource.
519
+ :param pulumi.Input[_builtins.str] backend: Unique name of the auth backend to configure.
520
+ :param pulumi.Input[_builtins.str] name: The name of the role.
521
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
522
+ The value should not contain leading or trailing forward slashes.
523
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
524
+ *Available only for Vault Enterprise*.
525
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ocid_lists: The list of Group or Dynamic Group OCIDs that can take this role.
526
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
527
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
528
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
529
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
530
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
531
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
532
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
533
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
534
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
535
+ """
536
+ ...
537
+ @overload
538
+ def __init__(__self__,
539
+ resource_name: str,
540
+ args: Optional[OciAuthBackendRoleArgs] = None,
541
+ opts: Optional[pulumi.ResourceOptions] = None):
542
+ """
543
+ ## Example Usage
544
+
545
+ ```python
546
+ import pulumi
547
+ import pulumi_vault as vault
548
+
549
+ oci = vault.OciAuthBackend("oci",
550
+ path="oci",
551
+ home_tenancy_id="ocid1.tenancy.oc1..aaaaaaaah7zkvaffv26pzyauoe2zbnionqvhvsexamplee557wakiofi4ysgqq")
552
+ example = vault.OciAuthBackendRole("example",
553
+ backend=oci.path,
554
+ name="test-role",
555
+ ocid_lists=[
556
+ "ocid1.group.oc1..aaaaaaaabmyiinfq32y5aha3r2yo4exampleo4yg3fjk2sbne4567tropaa",
557
+ "ocid1.dynamicgroup.oc1..aaaaaaaabvfwct33xri5examplegov4zyjp3rd5d7sk9jjdggxijhco56hrq",
558
+ ],
559
+ token_ttl=60,
560
+ token_max_ttl=120,
561
+ token_policies=[
562
+ "default",
563
+ "dev",
564
+ "prod",
565
+ ])
566
+ ```
567
+
568
+ ## Import
569
+
570
+ OCI auth backend roles can be imported using `auth/`, the `backend` path, `/role/`, and the `role` name e.g.
571
+
572
+ ```sh
573
+ $ pulumi import vault:index/ociAuthBackendRole:OciAuthBackendRole example auth/oci/role/test-role
574
+ ```
575
+
576
+ :param str resource_name: The name of the resource.
577
+ :param OciAuthBackendRoleArgs args: The arguments to use to populate this resource's properties.
578
+ :param pulumi.ResourceOptions opts: Options for the resource.
579
+ """
580
+ ...
581
+ def __init__(__self__, resource_name: str, *args, **kwargs):
582
+ resource_args, opts = _utilities.get_resource_args_opts(OciAuthBackendRoleArgs, pulumi.ResourceOptions, *args, **kwargs)
583
+ if resource_args is not None:
584
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
585
+ else:
586
+ __self__._internal_init(resource_name, *args, **kwargs)
587
+
588
+ def _internal_init(__self__,
589
+ resource_name: str,
590
+ opts: Optional[pulumi.ResourceOptions] = None,
591
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
592
+ name: Optional[pulumi.Input[_builtins.str]] = None,
593
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
594
+ ocid_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
595
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
596
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
597
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
598
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
599
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
600
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
601
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
602
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
603
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
604
+ __props__=None):
605
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
606
+ if not isinstance(opts, pulumi.ResourceOptions):
607
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
608
+ if opts.id is None:
609
+ if __props__ is not None:
610
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
611
+ __props__ = OciAuthBackendRoleArgs.__new__(OciAuthBackendRoleArgs)
612
+
613
+ __props__.__dict__["backend"] = backend
614
+ __props__.__dict__["name"] = name
615
+ __props__.__dict__["namespace"] = namespace
616
+ __props__.__dict__["ocid_lists"] = ocid_lists
617
+ __props__.__dict__["token_bound_cidrs"] = token_bound_cidrs
618
+ __props__.__dict__["token_explicit_max_ttl"] = token_explicit_max_ttl
619
+ __props__.__dict__["token_max_ttl"] = token_max_ttl
620
+ __props__.__dict__["token_no_default_policy"] = token_no_default_policy
621
+ __props__.__dict__["token_num_uses"] = token_num_uses
622
+ __props__.__dict__["token_period"] = token_period
623
+ __props__.__dict__["token_policies"] = token_policies
624
+ __props__.__dict__["token_ttl"] = token_ttl
625
+ __props__.__dict__["token_type"] = token_type
626
+ super(OciAuthBackendRole, __self__).__init__(
627
+ 'vault:index/ociAuthBackendRole:OciAuthBackendRole',
628
+ resource_name,
629
+ __props__,
630
+ opts)
631
+
632
+ @staticmethod
633
+ def get(resource_name: str,
634
+ id: pulumi.Input[str],
635
+ opts: Optional[pulumi.ResourceOptions] = None,
636
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
637
+ name: Optional[pulumi.Input[_builtins.str]] = None,
638
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
639
+ ocid_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
640
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
641
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
642
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
643
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
644
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
645
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
646
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
647
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
648
+ token_type: Optional[pulumi.Input[_builtins.str]] = None) -> 'OciAuthBackendRole':
649
+ """
650
+ Get an existing OciAuthBackendRole resource's state with the given name, id, and optional extra
651
+ properties used to qualify the lookup.
652
+
653
+ :param str resource_name: The unique name of the resulting resource.
654
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
655
+ :param pulumi.ResourceOptions opts: Options for the resource.
656
+ :param pulumi.Input[_builtins.str] backend: Unique name of the auth backend to configure.
657
+ :param pulumi.Input[_builtins.str] name: The name of the role.
658
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
659
+ The value should not contain leading or trailing forward slashes.
660
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
661
+ *Available only for Vault Enterprise*.
662
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ocid_lists: The list of Group or Dynamic Group OCIDs that can take this role.
663
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
664
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
665
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
666
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
667
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
668
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
669
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
670
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
671
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
672
+ """
673
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
674
+
675
+ __props__ = _OciAuthBackendRoleState.__new__(_OciAuthBackendRoleState)
676
+
677
+ __props__.__dict__["backend"] = backend
678
+ __props__.__dict__["name"] = name
679
+ __props__.__dict__["namespace"] = namespace
680
+ __props__.__dict__["ocid_lists"] = ocid_lists
681
+ __props__.__dict__["token_bound_cidrs"] = token_bound_cidrs
682
+ __props__.__dict__["token_explicit_max_ttl"] = token_explicit_max_ttl
683
+ __props__.__dict__["token_max_ttl"] = token_max_ttl
684
+ __props__.__dict__["token_no_default_policy"] = token_no_default_policy
685
+ __props__.__dict__["token_num_uses"] = token_num_uses
686
+ __props__.__dict__["token_period"] = token_period
687
+ __props__.__dict__["token_policies"] = token_policies
688
+ __props__.__dict__["token_ttl"] = token_ttl
689
+ __props__.__dict__["token_type"] = token_type
690
+ return OciAuthBackendRole(resource_name, opts=opts, __props__=__props__)
691
+
692
+ @_builtins.property
693
+ @pulumi.getter
694
+ def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
695
+ """
696
+ Unique name of the auth backend to configure.
697
+ """
698
+ return pulumi.get(self, "backend")
699
+
700
+ @_builtins.property
701
+ @pulumi.getter
702
+ def name(self) -> pulumi.Output[_builtins.str]:
703
+ """
704
+ The name of the role.
705
+ """
706
+ return pulumi.get(self, "name")
707
+
708
+ @_builtins.property
709
+ @pulumi.getter
710
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
711
+ """
712
+ The namespace to provision the resource in.
713
+ The value should not contain leading or trailing forward slashes.
714
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
715
+ *Available only for Vault Enterprise*.
716
+ """
717
+ return pulumi.get(self, "namespace")
718
+
719
+ @_builtins.property
720
+ @pulumi.getter(name="ocidLists")
721
+ def ocid_lists(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
722
+ """
723
+ The list of Group or Dynamic Group OCIDs that can take this role.
724
+ """
725
+ return pulumi.get(self, "ocid_lists")
726
+
727
+ @_builtins.property
728
+ @pulumi.getter(name="tokenBoundCidrs")
729
+ def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
730
+ """
731
+ Specifies the blocks of IP addresses which are allowed to use the generated token
732
+ """
733
+ return pulumi.get(self, "token_bound_cidrs")
734
+
735
+ @_builtins.property
736
+ @pulumi.getter(name="tokenExplicitMaxTtl")
737
+ def token_explicit_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
738
+ """
739
+ Generated Token's Explicit Maximum TTL in seconds
740
+ """
741
+ return pulumi.get(self, "token_explicit_max_ttl")
742
+
743
+ @_builtins.property
744
+ @pulumi.getter(name="tokenMaxTtl")
745
+ def token_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
746
+ """
747
+ The maximum lifetime of the generated token
748
+ """
749
+ return pulumi.get(self, "token_max_ttl")
750
+
751
+ @_builtins.property
752
+ @pulumi.getter(name="tokenNoDefaultPolicy")
753
+ def token_no_default_policy(self) -> pulumi.Output[Optional[_builtins.bool]]:
754
+ """
755
+ If true, the 'default' policy will not automatically be added to generated tokens
756
+ """
757
+ return pulumi.get(self, "token_no_default_policy")
758
+
759
+ @_builtins.property
760
+ @pulumi.getter(name="tokenNumUses")
761
+ def token_num_uses(self) -> pulumi.Output[Optional[_builtins.int]]:
762
+ """
763
+ The maximum number of times a token may be used, a value of zero means unlimited
764
+ """
765
+ return pulumi.get(self, "token_num_uses")
766
+
767
+ @_builtins.property
768
+ @pulumi.getter(name="tokenPeriod")
769
+ def token_period(self) -> pulumi.Output[Optional[_builtins.int]]:
770
+ """
771
+ Generated Token's Period
772
+ """
773
+ return pulumi.get(self, "token_period")
774
+
775
+ @_builtins.property
776
+ @pulumi.getter(name="tokenPolicies")
777
+ def token_policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
778
+ """
779
+ Generated Token's Policies
780
+ """
781
+ return pulumi.get(self, "token_policies")
782
+
783
+ @_builtins.property
784
+ @pulumi.getter(name="tokenTtl")
785
+ def token_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
786
+ """
787
+ The initial ttl of the token to generate in seconds
788
+ """
789
+ return pulumi.get(self, "token_ttl")
790
+
791
+ @_builtins.property
792
+ @pulumi.getter(name="tokenType")
793
+ def token_type(self) -> pulumi.Output[Optional[_builtins.str]]:
794
+ """
795
+ The type of token to generate, service or batch
796
+ """
797
+ return pulumi.get(self, "token_type")
798
+