pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,852 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from . import _utilities
16
+
17
+ __all__ = ['OciAuthBackendRoleArgs', 'OciAuthBackendRole']
18
+
19
+ @pulumi.input_type
20
+ class OciAuthBackendRoleArgs:
21
+ def __init__(__self__, *,
22
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
23
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
24
+ name: Optional[pulumi.Input[_builtins.str]] = None,
25
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
26
+ ocid_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
28
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
29
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
30
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
31
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
32
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
33
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
34
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
35
+ token_type: Optional[pulumi.Input[_builtins.str]] = None):
36
+ """
37
+ The set of arguments for constructing a OciAuthBackendRole resource.
38
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
39
+ This should be a list or map containing the metadata in key value pairs.
40
+ :param pulumi.Input[_builtins.str] backend: Unique name of the auth backend to configure.
41
+ :param pulumi.Input[_builtins.str] name: The name of the role.
42
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
43
+ The value should not contain leading or trailing forward slashes.
44
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
45
+ *Available only for Vault Enterprise*.
46
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ocid_lists: The list of Group or Dynamic Group OCIDs that can take this role.
47
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
48
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
49
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
50
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
51
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
52
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
53
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
54
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
55
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
56
+ """
57
+ if alias_metadata is not None:
58
+ pulumi.set(__self__, "alias_metadata", alias_metadata)
59
+ if backend is not None:
60
+ pulumi.set(__self__, "backend", backend)
61
+ if name is not None:
62
+ pulumi.set(__self__, "name", name)
63
+ if namespace is not None:
64
+ pulumi.set(__self__, "namespace", namespace)
65
+ if ocid_lists is not None:
66
+ pulumi.set(__self__, "ocid_lists", ocid_lists)
67
+ if token_bound_cidrs is not None:
68
+ pulumi.set(__self__, "token_bound_cidrs", token_bound_cidrs)
69
+ if token_explicit_max_ttl is not None:
70
+ pulumi.set(__self__, "token_explicit_max_ttl", token_explicit_max_ttl)
71
+ if token_max_ttl is not None:
72
+ pulumi.set(__self__, "token_max_ttl", token_max_ttl)
73
+ if token_no_default_policy is not None:
74
+ pulumi.set(__self__, "token_no_default_policy", token_no_default_policy)
75
+ if token_num_uses is not None:
76
+ pulumi.set(__self__, "token_num_uses", token_num_uses)
77
+ if token_period is not None:
78
+ pulumi.set(__self__, "token_period", token_period)
79
+ if token_policies is not None:
80
+ pulumi.set(__self__, "token_policies", token_policies)
81
+ if token_ttl is not None:
82
+ pulumi.set(__self__, "token_ttl", token_ttl)
83
+ if token_type is not None:
84
+ pulumi.set(__self__, "token_type", token_type)
85
+
86
+ @_builtins.property
87
+ @pulumi.getter(name="aliasMetadata")
88
+ def alias_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
89
+ """
90
+ The metadata to be tied to generated entity alias.
91
+ This should be a list or map containing the metadata in key value pairs.
92
+ """
93
+ return pulumi.get(self, "alias_metadata")
94
+
95
+ @alias_metadata.setter
96
+ def alias_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
97
+ pulumi.set(self, "alias_metadata", value)
98
+
99
+ @_builtins.property
100
+ @pulumi.getter
101
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
102
+ """
103
+ Unique name of the auth backend to configure.
104
+ """
105
+ return pulumi.get(self, "backend")
106
+
107
+ @backend.setter
108
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
109
+ pulumi.set(self, "backend", value)
110
+
111
+ @_builtins.property
112
+ @pulumi.getter
113
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
114
+ """
115
+ The name of the role.
116
+ """
117
+ return pulumi.get(self, "name")
118
+
119
+ @name.setter
120
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
121
+ pulumi.set(self, "name", value)
122
+
123
+ @_builtins.property
124
+ @pulumi.getter
125
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
126
+ """
127
+ The namespace to provision the resource in.
128
+ The value should not contain leading or trailing forward slashes.
129
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
130
+ *Available only for Vault Enterprise*.
131
+ """
132
+ return pulumi.get(self, "namespace")
133
+
134
+ @namespace.setter
135
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
136
+ pulumi.set(self, "namespace", value)
137
+
138
+ @_builtins.property
139
+ @pulumi.getter(name="ocidLists")
140
+ def ocid_lists(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
141
+ """
142
+ The list of Group or Dynamic Group OCIDs that can take this role.
143
+ """
144
+ return pulumi.get(self, "ocid_lists")
145
+
146
+ @ocid_lists.setter
147
+ def ocid_lists(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
148
+ pulumi.set(self, "ocid_lists", value)
149
+
150
+ @_builtins.property
151
+ @pulumi.getter(name="tokenBoundCidrs")
152
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
153
+ """
154
+ Specifies the blocks of IP addresses which are allowed to use the generated token
155
+ """
156
+ return pulumi.get(self, "token_bound_cidrs")
157
+
158
+ @token_bound_cidrs.setter
159
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
160
+ pulumi.set(self, "token_bound_cidrs", value)
161
+
162
+ @_builtins.property
163
+ @pulumi.getter(name="tokenExplicitMaxTtl")
164
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
165
+ """
166
+ Generated Token's Explicit Maximum TTL in seconds
167
+ """
168
+ return pulumi.get(self, "token_explicit_max_ttl")
169
+
170
+ @token_explicit_max_ttl.setter
171
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
172
+ pulumi.set(self, "token_explicit_max_ttl", value)
173
+
174
+ @_builtins.property
175
+ @pulumi.getter(name="tokenMaxTtl")
176
+ def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
177
+ """
178
+ The maximum lifetime of the generated token
179
+ """
180
+ return pulumi.get(self, "token_max_ttl")
181
+
182
+ @token_max_ttl.setter
183
+ def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
184
+ pulumi.set(self, "token_max_ttl", value)
185
+
186
+ @_builtins.property
187
+ @pulumi.getter(name="tokenNoDefaultPolicy")
188
+ def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
189
+ """
190
+ If true, the 'default' policy will not automatically be added to generated tokens
191
+ """
192
+ return pulumi.get(self, "token_no_default_policy")
193
+
194
+ @token_no_default_policy.setter
195
+ def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
196
+ pulumi.set(self, "token_no_default_policy", value)
197
+
198
+ @_builtins.property
199
+ @pulumi.getter(name="tokenNumUses")
200
+ def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
201
+ """
202
+ The maximum number of times a token may be used, a value of zero means unlimited
203
+ """
204
+ return pulumi.get(self, "token_num_uses")
205
+
206
+ @token_num_uses.setter
207
+ def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
208
+ pulumi.set(self, "token_num_uses", value)
209
+
210
+ @_builtins.property
211
+ @pulumi.getter(name="tokenPeriod")
212
+ def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
213
+ """
214
+ Generated Token's Period
215
+ """
216
+ return pulumi.get(self, "token_period")
217
+
218
+ @token_period.setter
219
+ def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
220
+ pulumi.set(self, "token_period", value)
221
+
222
+ @_builtins.property
223
+ @pulumi.getter(name="tokenPolicies")
224
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
225
+ """
226
+ Generated Token's Policies
227
+ """
228
+ return pulumi.get(self, "token_policies")
229
+
230
+ @token_policies.setter
231
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
232
+ pulumi.set(self, "token_policies", value)
233
+
234
+ @_builtins.property
235
+ @pulumi.getter(name="tokenTtl")
236
+ def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
237
+ """
238
+ The initial ttl of the token to generate in seconds
239
+ """
240
+ return pulumi.get(self, "token_ttl")
241
+
242
+ @token_ttl.setter
243
+ def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
244
+ pulumi.set(self, "token_ttl", value)
245
+
246
+ @_builtins.property
247
+ @pulumi.getter(name="tokenType")
248
+ def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
249
+ """
250
+ The type of token to generate, service or batch
251
+ """
252
+ return pulumi.get(self, "token_type")
253
+
254
+ @token_type.setter
255
+ def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
256
+ pulumi.set(self, "token_type", value)
257
+
258
+
259
+ @pulumi.input_type
260
+ class _OciAuthBackendRoleState:
261
+ def __init__(__self__, *,
262
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
263
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
264
+ name: Optional[pulumi.Input[_builtins.str]] = None,
265
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
266
+ ocid_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
267
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
268
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
269
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
270
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
271
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
272
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
273
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
274
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
275
+ token_type: Optional[pulumi.Input[_builtins.str]] = None):
276
+ """
277
+ Input properties used for looking up and filtering OciAuthBackendRole resources.
278
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
279
+ This should be a list or map containing the metadata in key value pairs.
280
+ :param pulumi.Input[_builtins.str] backend: Unique name of the auth backend to configure.
281
+ :param pulumi.Input[_builtins.str] name: The name of the role.
282
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
283
+ The value should not contain leading or trailing forward slashes.
284
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
285
+ *Available only for Vault Enterprise*.
286
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ocid_lists: The list of Group or Dynamic Group OCIDs that can take this role.
287
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
288
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
289
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
290
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
291
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
292
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
293
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
294
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
295
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
296
+ """
297
+ if alias_metadata is not None:
298
+ pulumi.set(__self__, "alias_metadata", alias_metadata)
299
+ if backend is not None:
300
+ pulumi.set(__self__, "backend", backend)
301
+ if name is not None:
302
+ pulumi.set(__self__, "name", name)
303
+ if namespace is not None:
304
+ pulumi.set(__self__, "namespace", namespace)
305
+ if ocid_lists is not None:
306
+ pulumi.set(__self__, "ocid_lists", ocid_lists)
307
+ if token_bound_cidrs is not None:
308
+ pulumi.set(__self__, "token_bound_cidrs", token_bound_cidrs)
309
+ if token_explicit_max_ttl is not None:
310
+ pulumi.set(__self__, "token_explicit_max_ttl", token_explicit_max_ttl)
311
+ if token_max_ttl is not None:
312
+ pulumi.set(__self__, "token_max_ttl", token_max_ttl)
313
+ if token_no_default_policy is not None:
314
+ pulumi.set(__self__, "token_no_default_policy", token_no_default_policy)
315
+ if token_num_uses is not None:
316
+ pulumi.set(__self__, "token_num_uses", token_num_uses)
317
+ if token_period is not None:
318
+ pulumi.set(__self__, "token_period", token_period)
319
+ if token_policies is not None:
320
+ pulumi.set(__self__, "token_policies", token_policies)
321
+ if token_ttl is not None:
322
+ pulumi.set(__self__, "token_ttl", token_ttl)
323
+ if token_type is not None:
324
+ pulumi.set(__self__, "token_type", token_type)
325
+
326
+ @_builtins.property
327
+ @pulumi.getter(name="aliasMetadata")
328
+ def alias_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
329
+ """
330
+ The metadata to be tied to generated entity alias.
331
+ This should be a list or map containing the metadata in key value pairs.
332
+ """
333
+ return pulumi.get(self, "alias_metadata")
334
+
335
+ @alias_metadata.setter
336
+ def alias_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
337
+ pulumi.set(self, "alias_metadata", value)
338
+
339
+ @_builtins.property
340
+ @pulumi.getter
341
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
342
+ """
343
+ Unique name of the auth backend to configure.
344
+ """
345
+ return pulumi.get(self, "backend")
346
+
347
+ @backend.setter
348
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
349
+ pulumi.set(self, "backend", value)
350
+
351
+ @_builtins.property
352
+ @pulumi.getter
353
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
354
+ """
355
+ The name of the role.
356
+ """
357
+ return pulumi.get(self, "name")
358
+
359
+ @name.setter
360
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
361
+ pulumi.set(self, "name", value)
362
+
363
+ @_builtins.property
364
+ @pulumi.getter
365
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
366
+ """
367
+ The namespace to provision the resource in.
368
+ The value should not contain leading or trailing forward slashes.
369
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
370
+ *Available only for Vault Enterprise*.
371
+ """
372
+ return pulumi.get(self, "namespace")
373
+
374
+ @namespace.setter
375
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
376
+ pulumi.set(self, "namespace", value)
377
+
378
+ @_builtins.property
379
+ @pulumi.getter(name="ocidLists")
380
+ def ocid_lists(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
381
+ """
382
+ The list of Group or Dynamic Group OCIDs that can take this role.
383
+ """
384
+ return pulumi.get(self, "ocid_lists")
385
+
386
+ @ocid_lists.setter
387
+ def ocid_lists(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
388
+ pulumi.set(self, "ocid_lists", value)
389
+
390
+ @_builtins.property
391
+ @pulumi.getter(name="tokenBoundCidrs")
392
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
393
+ """
394
+ Specifies the blocks of IP addresses which are allowed to use the generated token
395
+ """
396
+ return pulumi.get(self, "token_bound_cidrs")
397
+
398
+ @token_bound_cidrs.setter
399
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
400
+ pulumi.set(self, "token_bound_cidrs", value)
401
+
402
+ @_builtins.property
403
+ @pulumi.getter(name="tokenExplicitMaxTtl")
404
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
405
+ """
406
+ Generated Token's Explicit Maximum TTL in seconds
407
+ """
408
+ return pulumi.get(self, "token_explicit_max_ttl")
409
+
410
+ @token_explicit_max_ttl.setter
411
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
412
+ pulumi.set(self, "token_explicit_max_ttl", value)
413
+
414
+ @_builtins.property
415
+ @pulumi.getter(name="tokenMaxTtl")
416
+ def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
417
+ """
418
+ The maximum lifetime of the generated token
419
+ """
420
+ return pulumi.get(self, "token_max_ttl")
421
+
422
+ @token_max_ttl.setter
423
+ def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
424
+ pulumi.set(self, "token_max_ttl", value)
425
+
426
+ @_builtins.property
427
+ @pulumi.getter(name="tokenNoDefaultPolicy")
428
+ def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
429
+ """
430
+ If true, the 'default' policy will not automatically be added to generated tokens
431
+ """
432
+ return pulumi.get(self, "token_no_default_policy")
433
+
434
+ @token_no_default_policy.setter
435
+ def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
436
+ pulumi.set(self, "token_no_default_policy", value)
437
+
438
+ @_builtins.property
439
+ @pulumi.getter(name="tokenNumUses")
440
+ def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
441
+ """
442
+ The maximum number of times a token may be used, a value of zero means unlimited
443
+ """
444
+ return pulumi.get(self, "token_num_uses")
445
+
446
+ @token_num_uses.setter
447
+ def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
448
+ pulumi.set(self, "token_num_uses", value)
449
+
450
+ @_builtins.property
451
+ @pulumi.getter(name="tokenPeriod")
452
+ def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
453
+ """
454
+ Generated Token's Period
455
+ """
456
+ return pulumi.get(self, "token_period")
457
+
458
+ @token_period.setter
459
+ def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
460
+ pulumi.set(self, "token_period", value)
461
+
462
+ @_builtins.property
463
+ @pulumi.getter(name="tokenPolicies")
464
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
465
+ """
466
+ Generated Token's Policies
467
+ """
468
+ return pulumi.get(self, "token_policies")
469
+
470
+ @token_policies.setter
471
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
472
+ pulumi.set(self, "token_policies", value)
473
+
474
+ @_builtins.property
475
+ @pulumi.getter(name="tokenTtl")
476
+ def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
477
+ """
478
+ The initial ttl of the token to generate in seconds
479
+ """
480
+ return pulumi.get(self, "token_ttl")
481
+
482
+ @token_ttl.setter
483
+ def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
484
+ pulumi.set(self, "token_ttl", value)
485
+
486
+ @_builtins.property
487
+ @pulumi.getter(name="tokenType")
488
+ def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
489
+ """
490
+ The type of token to generate, service or batch
491
+ """
492
+ return pulumi.get(self, "token_type")
493
+
494
+ @token_type.setter
495
+ def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
496
+ pulumi.set(self, "token_type", value)
497
+
498
+
499
+ @pulumi.type_token("vault:index/ociAuthBackendRole:OciAuthBackendRole")
500
+ class OciAuthBackendRole(pulumi.CustomResource):
501
+ @overload
502
+ def __init__(__self__,
503
+ resource_name: str,
504
+ opts: Optional[pulumi.ResourceOptions] = None,
505
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
506
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
507
+ name: Optional[pulumi.Input[_builtins.str]] = None,
508
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
509
+ ocid_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
510
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
511
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
512
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
513
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
514
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
515
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
516
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
517
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
518
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
519
+ __props__=None):
520
+ """
521
+ ## Example Usage
522
+
523
+ ```python
524
+ import pulumi
525
+ import pulumi_vault as vault
526
+
527
+ oci = vault.OciAuthBackend("oci",
528
+ path="oci",
529
+ home_tenancy_id="ocid1.tenancy.oc1..aaaaaaaah7zkvaffv26pzyauoe2zbnionqvhvsexamplee557wakiofi4ysgqq")
530
+ example = vault.OciAuthBackendRole("example",
531
+ backend=oci.path,
532
+ name="test-role",
533
+ ocid_lists=[
534
+ "ocid1.group.oc1..aaaaaaaabmyiinfq32y5aha3r2yo4exampleo4yg3fjk2sbne4567tropaa",
535
+ "ocid1.dynamicgroup.oc1..aaaaaaaabvfwct33xri5examplegov4zyjp3rd5d7sk9jjdggxijhco56hrq",
536
+ ],
537
+ token_ttl=60,
538
+ token_max_ttl=120,
539
+ token_policies=[
540
+ "default",
541
+ "dev",
542
+ "prod",
543
+ ])
544
+ ```
545
+
546
+ ## Import
547
+
548
+ OCI auth backend roles can be imported using `auth/`, the `backend` path, `/role/`, and the `role` name e.g.
549
+
550
+ ```sh
551
+ $ pulumi import vault:index/ociAuthBackendRole:OciAuthBackendRole example auth/oci/role/test-role
552
+ ```
553
+
554
+ :param str resource_name: The name of the resource.
555
+ :param pulumi.ResourceOptions opts: Options for the resource.
556
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
557
+ This should be a list or map containing the metadata in key value pairs.
558
+ :param pulumi.Input[_builtins.str] backend: Unique name of the auth backend to configure.
559
+ :param pulumi.Input[_builtins.str] name: The name of the role.
560
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
561
+ The value should not contain leading or trailing forward slashes.
562
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
563
+ *Available only for Vault Enterprise*.
564
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ocid_lists: The list of Group or Dynamic Group OCIDs that can take this role.
565
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
566
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
567
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
568
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
569
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
570
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
571
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
572
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
573
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
574
+ """
575
+ ...
576
+ @overload
577
+ def __init__(__self__,
578
+ resource_name: str,
579
+ args: Optional[OciAuthBackendRoleArgs] = None,
580
+ opts: Optional[pulumi.ResourceOptions] = None):
581
+ """
582
+ ## Example Usage
583
+
584
+ ```python
585
+ import pulumi
586
+ import pulumi_vault as vault
587
+
588
+ oci = vault.OciAuthBackend("oci",
589
+ path="oci",
590
+ home_tenancy_id="ocid1.tenancy.oc1..aaaaaaaah7zkvaffv26pzyauoe2zbnionqvhvsexamplee557wakiofi4ysgqq")
591
+ example = vault.OciAuthBackendRole("example",
592
+ backend=oci.path,
593
+ name="test-role",
594
+ ocid_lists=[
595
+ "ocid1.group.oc1..aaaaaaaabmyiinfq32y5aha3r2yo4exampleo4yg3fjk2sbne4567tropaa",
596
+ "ocid1.dynamicgroup.oc1..aaaaaaaabvfwct33xri5examplegov4zyjp3rd5d7sk9jjdggxijhco56hrq",
597
+ ],
598
+ token_ttl=60,
599
+ token_max_ttl=120,
600
+ token_policies=[
601
+ "default",
602
+ "dev",
603
+ "prod",
604
+ ])
605
+ ```
606
+
607
+ ## Import
608
+
609
+ OCI auth backend roles can be imported using `auth/`, the `backend` path, `/role/`, and the `role` name e.g.
610
+
611
+ ```sh
612
+ $ pulumi import vault:index/ociAuthBackendRole:OciAuthBackendRole example auth/oci/role/test-role
613
+ ```
614
+
615
+ :param str resource_name: The name of the resource.
616
+ :param OciAuthBackendRoleArgs args: The arguments to use to populate this resource's properties.
617
+ :param pulumi.ResourceOptions opts: Options for the resource.
618
+ """
619
+ ...
620
+ def __init__(__self__, resource_name: str, *args, **kwargs):
621
+ resource_args, opts = _utilities.get_resource_args_opts(OciAuthBackendRoleArgs, pulumi.ResourceOptions, *args, **kwargs)
622
+ if resource_args is not None:
623
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
624
+ else:
625
+ __self__._internal_init(resource_name, *args, **kwargs)
626
+
627
+ def _internal_init(__self__,
628
+ resource_name: str,
629
+ opts: Optional[pulumi.ResourceOptions] = None,
630
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
631
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
632
+ name: Optional[pulumi.Input[_builtins.str]] = None,
633
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
634
+ ocid_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
635
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
636
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
637
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
638
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
639
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
640
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
641
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
642
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
643
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
644
+ __props__=None):
645
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
646
+ if not isinstance(opts, pulumi.ResourceOptions):
647
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
648
+ if opts.id is None:
649
+ if __props__ is not None:
650
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
651
+ __props__ = OciAuthBackendRoleArgs.__new__(OciAuthBackendRoleArgs)
652
+
653
+ __props__.__dict__["alias_metadata"] = alias_metadata
654
+ __props__.__dict__["backend"] = backend
655
+ __props__.__dict__["name"] = name
656
+ __props__.__dict__["namespace"] = namespace
657
+ __props__.__dict__["ocid_lists"] = ocid_lists
658
+ __props__.__dict__["token_bound_cidrs"] = token_bound_cidrs
659
+ __props__.__dict__["token_explicit_max_ttl"] = token_explicit_max_ttl
660
+ __props__.__dict__["token_max_ttl"] = token_max_ttl
661
+ __props__.__dict__["token_no_default_policy"] = token_no_default_policy
662
+ __props__.__dict__["token_num_uses"] = token_num_uses
663
+ __props__.__dict__["token_period"] = token_period
664
+ __props__.__dict__["token_policies"] = token_policies
665
+ __props__.__dict__["token_ttl"] = token_ttl
666
+ __props__.__dict__["token_type"] = token_type
667
+ super(OciAuthBackendRole, __self__).__init__(
668
+ 'vault:index/ociAuthBackendRole:OciAuthBackendRole',
669
+ resource_name,
670
+ __props__,
671
+ opts)
672
+
673
+ @staticmethod
674
+ def get(resource_name: str,
675
+ id: pulumi.Input[str],
676
+ opts: Optional[pulumi.ResourceOptions] = None,
677
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
678
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
679
+ name: Optional[pulumi.Input[_builtins.str]] = None,
680
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
681
+ ocid_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
682
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
683
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
684
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
685
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
686
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
687
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
688
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
689
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
690
+ token_type: Optional[pulumi.Input[_builtins.str]] = None) -> 'OciAuthBackendRole':
691
+ """
692
+ Get an existing OciAuthBackendRole resource's state with the given name, id, and optional extra
693
+ properties used to qualify the lookup.
694
+
695
+ :param str resource_name: The unique name of the resulting resource.
696
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
697
+ :param pulumi.ResourceOptions opts: Options for the resource.
698
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
699
+ This should be a list or map containing the metadata in key value pairs.
700
+ :param pulumi.Input[_builtins.str] backend: Unique name of the auth backend to configure.
701
+ :param pulumi.Input[_builtins.str] name: The name of the role.
702
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
703
+ The value should not contain leading or trailing forward slashes.
704
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
705
+ *Available only for Vault Enterprise*.
706
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ocid_lists: The list of Group or Dynamic Group OCIDs that can take this role.
707
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
708
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
709
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
710
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
711
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
712
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
713
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
714
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
715
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
716
+ """
717
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
718
+
719
+ __props__ = _OciAuthBackendRoleState.__new__(_OciAuthBackendRoleState)
720
+
721
+ __props__.__dict__["alias_metadata"] = alias_metadata
722
+ __props__.__dict__["backend"] = backend
723
+ __props__.__dict__["name"] = name
724
+ __props__.__dict__["namespace"] = namespace
725
+ __props__.__dict__["ocid_lists"] = ocid_lists
726
+ __props__.__dict__["token_bound_cidrs"] = token_bound_cidrs
727
+ __props__.__dict__["token_explicit_max_ttl"] = token_explicit_max_ttl
728
+ __props__.__dict__["token_max_ttl"] = token_max_ttl
729
+ __props__.__dict__["token_no_default_policy"] = token_no_default_policy
730
+ __props__.__dict__["token_num_uses"] = token_num_uses
731
+ __props__.__dict__["token_period"] = token_period
732
+ __props__.__dict__["token_policies"] = token_policies
733
+ __props__.__dict__["token_ttl"] = token_ttl
734
+ __props__.__dict__["token_type"] = token_type
735
+ return OciAuthBackendRole(resource_name, opts=opts, __props__=__props__)
736
+
737
+ @_builtins.property
738
+ @pulumi.getter(name="aliasMetadata")
739
+ def alias_metadata(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
740
+ """
741
+ The metadata to be tied to generated entity alias.
742
+ This should be a list or map containing the metadata in key value pairs.
743
+ """
744
+ return pulumi.get(self, "alias_metadata")
745
+
746
+ @_builtins.property
747
+ @pulumi.getter
748
+ def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
749
+ """
750
+ Unique name of the auth backend to configure.
751
+ """
752
+ return pulumi.get(self, "backend")
753
+
754
+ @_builtins.property
755
+ @pulumi.getter
756
+ def name(self) -> pulumi.Output[_builtins.str]:
757
+ """
758
+ The name of the role.
759
+ """
760
+ return pulumi.get(self, "name")
761
+
762
+ @_builtins.property
763
+ @pulumi.getter
764
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
765
+ """
766
+ The namespace to provision the resource in.
767
+ The value should not contain leading or trailing forward slashes.
768
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
769
+ *Available only for Vault Enterprise*.
770
+ """
771
+ return pulumi.get(self, "namespace")
772
+
773
+ @_builtins.property
774
+ @pulumi.getter(name="ocidLists")
775
+ def ocid_lists(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
776
+ """
777
+ The list of Group or Dynamic Group OCIDs that can take this role.
778
+ """
779
+ return pulumi.get(self, "ocid_lists")
780
+
781
+ @_builtins.property
782
+ @pulumi.getter(name="tokenBoundCidrs")
783
+ def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
784
+ """
785
+ Specifies the blocks of IP addresses which are allowed to use the generated token
786
+ """
787
+ return pulumi.get(self, "token_bound_cidrs")
788
+
789
+ @_builtins.property
790
+ @pulumi.getter(name="tokenExplicitMaxTtl")
791
+ def token_explicit_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
792
+ """
793
+ Generated Token's Explicit Maximum TTL in seconds
794
+ """
795
+ return pulumi.get(self, "token_explicit_max_ttl")
796
+
797
+ @_builtins.property
798
+ @pulumi.getter(name="tokenMaxTtl")
799
+ def token_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
800
+ """
801
+ The maximum lifetime of the generated token
802
+ """
803
+ return pulumi.get(self, "token_max_ttl")
804
+
805
+ @_builtins.property
806
+ @pulumi.getter(name="tokenNoDefaultPolicy")
807
+ def token_no_default_policy(self) -> pulumi.Output[Optional[_builtins.bool]]:
808
+ """
809
+ If true, the 'default' policy will not automatically be added to generated tokens
810
+ """
811
+ return pulumi.get(self, "token_no_default_policy")
812
+
813
+ @_builtins.property
814
+ @pulumi.getter(name="tokenNumUses")
815
+ def token_num_uses(self) -> pulumi.Output[Optional[_builtins.int]]:
816
+ """
817
+ The maximum number of times a token may be used, a value of zero means unlimited
818
+ """
819
+ return pulumi.get(self, "token_num_uses")
820
+
821
+ @_builtins.property
822
+ @pulumi.getter(name="tokenPeriod")
823
+ def token_period(self) -> pulumi.Output[Optional[_builtins.int]]:
824
+ """
825
+ Generated Token's Period
826
+ """
827
+ return pulumi.get(self, "token_period")
828
+
829
+ @_builtins.property
830
+ @pulumi.getter(name="tokenPolicies")
831
+ def token_policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
832
+ """
833
+ Generated Token's Policies
834
+ """
835
+ return pulumi.get(self, "token_policies")
836
+
837
+ @_builtins.property
838
+ @pulumi.getter(name="tokenTtl")
839
+ def token_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
840
+ """
841
+ The initial ttl of the token to generate in seconds
842
+ """
843
+ return pulumi.get(self, "token_ttl")
844
+
845
+ @_builtins.property
846
+ @pulumi.getter(name="tokenType")
847
+ def token_type(self) -> pulumi.Output[Optional[_builtins.str]]:
848
+ """
849
+ The type of token to generate, service or batch
850
+ """
851
+ return pulumi.get(self, "token_type")
852
+