pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,1068 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
18
+
19
+ @pulumi.input_type
20
+ class AuthBackendRoleArgs:
21
+ def __init__(__self__, *,
22
+ path: pulumi.Input[_builtins.str],
23
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
24
+ bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
25
+ bound_attributes_type: Optional[pulumi.Input[_builtins.str]] = None,
26
+ bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
+ bound_subjects_type: Optional[pulumi.Input[_builtins.str]] = None,
28
+ groups_attribute: Optional[pulumi.Input[_builtins.str]] = None,
29
+ name: Optional[pulumi.Input[_builtins.str]] = None,
30
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
31
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
32
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
33
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
34
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
35
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
36
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
37
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
38
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
39
+ token_type: Optional[pulumi.Input[_builtins.str]] = None):
40
+ """
41
+ The set of arguments for constructing a AuthBackendRole resource.
42
+ :param pulumi.Input[_builtins.str] path: Path where the auth backend is mounted.
43
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
44
+ This should be a list or map containing the metadata in key value pairs.
45
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] bound_attributes: Mapping of attribute names to values that are expected to
46
+ exist in the SAML assertion.
47
+ :param pulumi.Input[_builtins.str] bound_attributes_type: The type of matching assertion to perform on
48
+ `bound_attributes_type`.
49
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_subjects: List of subjects being asserted for SAML authentication.
50
+ :param pulumi.Input[_builtins.str] bound_subjects_type: The type of matching assertion to perform on `bound_subjects`.
51
+ :param pulumi.Input[_builtins.str] groups_attribute: The attribute to use to identify the set of groups to which the
52
+ user belongs.
53
+ :param pulumi.Input[_builtins.str] name: Unique name of the role.
54
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
55
+ The value should not contain leading or trailing forward slashes.
56
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
57
+ *Available only for Vault Enterprise*.
58
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
59
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
60
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
61
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
62
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
63
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
64
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
65
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
66
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
67
+ """
68
+ pulumi.set(__self__, "path", path)
69
+ if alias_metadata is not None:
70
+ pulumi.set(__self__, "alias_metadata", alias_metadata)
71
+ if bound_attributes is not None:
72
+ pulumi.set(__self__, "bound_attributes", bound_attributes)
73
+ if bound_attributes_type is not None:
74
+ pulumi.set(__self__, "bound_attributes_type", bound_attributes_type)
75
+ if bound_subjects is not None:
76
+ pulumi.set(__self__, "bound_subjects", bound_subjects)
77
+ if bound_subjects_type is not None:
78
+ pulumi.set(__self__, "bound_subjects_type", bound_subjects_type)
79
+ if groups_attribute is not None:
80
+ pulumi.set(__self__, "groups_attribute", groups_attribute)
81
+ if name is not None:
82
+ pulumi.set(__self__, "name", name)
83
+ if namespace is not None:
84
+ pulumi.set(__self__, "namespace", namespace)
85
+ if token_bound_cidrs is not None:
86
+ pulumi.set(__self__, "token_bound_cidrs", token_bound_cidrs)
87
+ if token_explicit_max_ttl is not None:
88
+ pulumi.set(__self__, "token_explicit_max_ttl", token_explicit_max_ttl)
89
+ if token_max_ttl is not None:
90
+ pulumi.set(__self__, "token_max_ttl", token_max_ttl)
91
+ if token_no_default_policy is not None:
92
+ pulumi.set(__self__, "token_no_default_policy", token_no_default_policy)
93
+ if token_num_uses is not None:
94
+ pulumi.set(__self__, "token_num_uses", token_num_uses)
95
+ if token_period is not None:
96
+ pulumi.set(__self__, "token_period", token_period)
97
+ if token_policies is not None:
98
+ pulumi.set(__self__, "token_policies", token_policies)
99
+ if token_ttl is not None:
100
+ pulumi.set(__self__, "token_ttl", token_ttl)
101
+ if token_type is not None:
102
+ pulumi.set(__self__, "token_type", token_type)
103
+
104
+ @_builtins.property
105
+ @pulumi.getter
106
+ def path(self) -> pulumi.Input[_builtins.str]:
107
+ """
108
+ Path where the auth backend is mounted.
109
+ """
110
+ return pulumi.get(self, "path")
111
+
112
+ @path.setter
113
+ def path(self, value: pulumi.Input[_builtins.str]):
114
+ pulumi.set(self, "path", value)
115
+
116
+ @_builtins.property
117
+ @pulumi.getter(name="aliasMetadata")
118
+ def alias_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
119
+ """
120
+ The metadata to be tied to generated entity alias.
121
+ This should be a list or map containing the metadata in key value pairs.
122
+ """
123
+ return pulumi.get(self, "alias_metadata")
124
+
125
+ @alias_metadata.setter
126
+ def alias_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
127
+ pulumi.set(self, "alias_metadata", value)
128
+
129
+ @_builtins.property
130
+ @pulumi.getter(name="boundAttributes")
131
+ def bound_attributes(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
132
+ """
133
+ Mapping of attribute names to values that are expected to
134
+ exist in the SAML assertion.
135
+ """
136
+ return pulumi.get(self, "bound_attributes")
137
+
138
+ @bound_attributes.setter
139
+ def bound_attributes(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
140
+ pulumi.set(self, "bound_attributes", value)
141
+
142
+ @_builtins.property
143
+ @pulumi.getter(name="boundAttributesType")
144
+ def bound_attributes_type(self) -> Optional[pulumi.Input[_builtins.str]]:
145
+ """
146
+ The type of matching assertion to perform on
147
+ `bound_attributes_type`.
148
+ """
149
+ return pulumi.get(self, "bound_attributes_type")
150
+
151
+ @bound_attributes_type.setter
152
+ def bound_attributes_type(self, value: Optional[pulumi.Input[_builtins.str]]):
153
+ pulumi.set(self, "bound_attributes_type", value)
154
+
155
+ @_builtins.property
156
+ @pulumi.getter(name="boundSubjects")
157
+ def bound_subjects(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
158
+ """
159
+ List of subjects being asserted for SAML authentication.
160
+ """
161
+ return pulumi.get(self, "bound_subjects")
162
+
163
+ @bound_subjects.setter
164
+ def bound_subjects(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
165
+ pulumi.set(self, "bound_subjects", value)
166
+
167
+ @_builtins.property
168
+ @pulumi.getter(name="boundSubjectsType")
169
+ def bound_subjects_type(self) -> Optional[pulumi.Input[_builtins.str]]:
170
+ """
171
+ The type of matching assertion to perform on `bound_subjects`.
172
+ """
173
+ return pulumi.get(self, "bound_subjects_type")
174
+
175
+ @bound_subjects_type.setter
176
+ def bound_subjects_type(self, value: Optional[pulumi.Input[_builtins.str]]):
177
+ pulumi.set(self, "bound_subjects_type", value)
178
+
179
+ @_builtins.property
180
+ @pulumi.getter(name="groupsAttribute")
181
+ def groups_attribute(self) -> Optional[pulumi.Input[_builtins.str]]:
182
+ """
183
+ The attribute to use to identify the set of groups to which the
184
+ user belongs.
185
+ """
186
+ return pulumi.get(self, "groups_attribute")
187
+
188
+ @groups_attribute.setter
189
+ def groups_attribute(self, value: Optional[pulumi.Input[_builtins.str]]):
190
+ pulumi.set(self, "groups_attribute", value)
191
+
192
+ @_builtins.property
193
+ @pulumi.getter
194
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
195
+ """
196
+ Unique name of the role.
197
+ """
198
+ return pulumi.get(self, "name")
199
+
200
+ @name.setter
201
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
202
+ pulumi.set(self, "name", value)
203
+
204
+ @_builtins.property
205
+ @pulumi.getter
206
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
207
+ """
208
+ The namespace to provision the resource in.
209
+ The value should not contain leading or trailing forward slashes.
210
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
211
+ *Available only for Vault Enterprise*.
212
+ """
213
+ return pulumi.get(self, "namespace")
214
+
215
+ @namespace.setter
216
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
217
+ pulumi.set(self, "namespace", value)
218
+
219
+ @_builtins.property
220
+ @pulumi.getter(name="tokenBoundCidrs")
221
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
222
+ """
223
+ Specifies the blocks of IP addresses which are allowed to use the generated token
224
+ """
225
+ return pulumi.get(self, "token_bound_cidrs")
226
+
227
+ @token_bound_cidrs.setter
228
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
229
+ pulumi.set(self, "token_bound_cidrs", value)
230
+
231
+ @_builtins.property
232
+ @pulumi.getter(name="tokenExplicitMaxTtl")
233
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
234
+ """
235
+ Generated Token's Explicit Maximum TTL in seconds
236
+ """
237
+ return pulumi.get(self, "token_explicit_max_ttl")
238
+
239
+ @token_explicit_max_ttl.setter
240
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
241
+ pulumi.set(self, "token_explicit_max_ttl", value)
242
+
243
+ @_builtins.property
244
+ @pulumi.getter(name="tokenMaxTtl")
245
+ def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
246
+ """
247
+ The maximum lifetime of the generated token
248
+ """
249
+ return pulumi.get(self, "token_max_ttl")
250
+
251
+ @token_max_ttl.setter
252
+ def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
253
+ pulumi.set(self, "token_max_ttl", value)
254
+
255
+ @_builtins.property
256
+ @pulumi.getter(name="tokenNoDefaultPolicy")
257
+ def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
258
+ """
259
+ If true, the 'default' policy will not automatically be added to generated tokens
260
+ """
261
+ return pulumi.get(self, "token_no_default_policy")
262
+
263
+ @token_no_default_policy.setter
264
+ def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
265
+ pulumi.set(self, "token_no_default_policy", value)
266
+
267
+ @_builtins.property
268
+ @pulumi.getter(name="tokenNumUses")
269
+ def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
270
+ """
271
+ The maximum number of times a token may be used, a value of zero means unlimited
272
+ """
273
+ return pulumi.get(self, "token_num_uses")
274
+
275
+ @token_num_uses.setter
276
+ def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
277
+ pulumi.set(self, "token_num_uses", value)
278
+
279
+ @_builtins.property
280
+ @pulumi.getter(name="tokenPeriod")
281
+ def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
282
+ """
283
+ Generated Token's Period
284
+ """
285
+ return pulumi.get(self, "token_period")
286
+
287
+ @token_period.setter
288
+ def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
289
+ pulumi.set(self, "token_period", value)
290
+
291
+ @_builtins.property
292
+ @pulumi.getter(name="tokenPolicies")
293
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
294
+ """
295
+ Generated Token's Policies
296
+ """
297
+ return pulumi.get(self, "token_policies")
298
+
299
+ @token_policies.setter
300
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
301
+ pulumi.set(self, "token_policies", value)
302
+
303
+ @_builtins.property
304
+ @pulumi.getter(name="tokenTtl")
305
+ def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
306
+ """
307
+ The initial ttl of the token to generate in seconds
308
+ """
309
+ return pulumi.get(self, "token_ttl")
310
+
311
+ @token_ttl.setter
312
+ def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
313
+ pulumi.set(self, "token_ttl", value)
314
+
315
+ @_builtins.property
316
+ @pulumi.getter(name="tokenType")
317
+ def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
318
+ """
319
+ The type of token to generate, service or batch
320
+ """
321
+ return pulumi.get(self, "token_type")
322
+
323
+ @token_type.setter
324
+ def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
325
+ pulumi.set(self, "token_type", value)
326
+
327
+
328
+ @pulumi.input_type
329
+ class _AuthBackendRoleState:
330
+ def __init__(__self__, *,
331
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
332
+ bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
333
+ bound_attributes_type: Optional[pulumi.Input[_builtins.str]] = None,
334
+ bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
335
+ bound_subjects_type: Optional[pulumi.Input[_builtins.str]] = None,
336
+ groups_attribute: Optional[pulumi.Input[_builtins.str]] = None,
337
+ name: Optional[pulumi.Input[_builtins.str]] = None,
338
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
339
+ path: Optional[pulumi.Input[_builtins.str]] = None,
340
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
341
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
342
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
343
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
344
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
345
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
346
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
347
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
348
+ token_type: Optional[pulumi.Input[_builtins.str]] = None):
349
+ """
350
+ Input properties used for looking up and filtering AuthBackendRole resources.
351
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
352
+ This should be a list or map containing the metadata in key value pairs.
353
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] bound_attributes: Mapping of attribute names to values that are expected to
354
+ exist in the SAML assertion.
355
+ :param pulumi.Input[_builtins.str] bound_attributes_type: The type of matching assertion to perform on
356
+ `bound_attributes_type`.
357
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_subjects: List of subjects being asserted for SAML authentication.
358
+ :param pulumi.Input[_builtins.str] bound_subjects_type: The type of matching assertion to perform on `bound_subjects`.
359
+ :param pulumi.Input[_builtins.str] groups_attribute: The attribute to use to identify the set of groups to which the
360
+ user belongs.
361
+ :param pulumi.Input[_builtins.str] name: Unique name of the role.
362
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
363
+ The value should not contain leading or trailing forward slashes.
364
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
365
+ *Available only for Vault Enterprise*.
366
+ :param pulumi.Input[_builtins.str] path: Path where the auth backend is mounted.
367
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
368
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
369
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
370
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
371
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
372
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
373
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
374
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
375
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
376
+ """
377
+ if alias_metadata is not None:
378
+ pulumi.set(__self__, "alias_metadata", alias_metadata)
379
+ if bound_attributes is not None:
380
+ pulumi.set(__self__, "bound_attributes", bound_attributes)
381
+ if bound_attributes_type is not None:
382
+ pulumi.set(__self__, "bound_attributes_type", bound_attributes_type)
383
+ if bound_subjects is not None:
384
+ pulumi.set(__self__, "bound_subjects", bound_subjects)
385
+ if bound_subjects_type is not None:
386
+ pulumi.set(__self__, "bound_subjects_type", bound_subjects_type)
387
+ if groups_attribute is not None:
388
+ pulumi.set(__self__, "groups_attribute", groups_attribute)
389
+ if name is not None:
390
+ pulumi.set(__self__, "name", name)
391
+ if namespace is not None:
392
+ pulumi.set(__self__, "namespace", namespace)
393
+ if path is not None:
394
+ pulumi.set(__self__, "path", path)
395
+ if token_bound_cidrs is not None:
396
+ pulumi.set(__self__, "token_bound_cidrs", token_bound_cidrs)
397
+ if token_explicit_max_ttl is not None:
398
+ pulumi.set(__self__, "token_explicit_max_ttl", token_explicit_max_ttl)
399
+ if token_max_ttl is not None:
400
+ pulumi.set(__self__, "token_max_ttl", token_max_ttl)
401
+ if token_no_default_policy is not None:
402
+ pulumi.set(__self__, "token_no_default_policy", token_no_default_policy)
403
+ if token_num_uses is not None:
404
+ pulumi.set(__self__, "token_num_uses", token_num_uses)
405
+ if token_period is not None:
406
+ pulumi.set(__self__, "token_period", token_period)
407
+ if token_policies is not None:
408
+ pulumi.set(__self__, "token_policies", token_policies)
409
+ if token_ttl is not None:
410
+ pulumi.set(__self__, "token_ttl", token_ttl)
411
+ if token_type is not None:
412
+ pulumi.set(__self__, "token_type", token_type)
413
+
414
+ @_builtins.property
415
+ @pulumi.getter(name="aliasMetadata")
416
+ def alias_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
417
+ """
418
+ The metadata to be tied to generated entity alias.
419
+ This should be a list or map containing the metadata in key value pairs.
420
+ """
421
+ return pulumi.get(self, "alias_metadata")
422
+
423
+ @alias_metadata.setter
424
+ def alias_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
425
+ pulumi.set(self, "alias_metadata", value)
426
+
427
+ @_builtins.property
428
+ @pulumi.getter(name="boundAttributes")
429
+ def bound_attributes(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
430
+ """
431
+ Mapping of attribute names to values that are expected to
432
+ exist in the SAML assertion.
433
+ """
434
+ return pulumi.get(self, "bound_attributes")
435
+
436
+ @bound_attributes.setter
437
+ def bound_attributes(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
438
+ pulumi.set(self, "bound_attributes", value)
439
+
440
+ @_builtins.property
441
+ @pulumi.getter(name="boundAttributesType")
442
+ def bound_attributes_type(self) -> Optional[pulumi.Input[_builtins.str]]:
443
+ """
444
+ The type of matching assertion to perform on
445
+ `bound_attributes_type`.
446
+ """
447
+ return pulumi.get(self, "bound_attributes_type")
448
+
449
+ @bound_attributes_type.setter
450
+ def bound_attributes_type(self, value: Optional[pulumi.Input[_builtins.str]]):
451
+ pulumi.set(self, "bound_attributes_type", value)
452
+
453
+ @_builtins.property
454
+ @pulumi.getter(name="boundSubjects")
455
+ def bound_subjects(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
456
+ """
457
+ List of subjects being asserted for SAML authentication.
458
+ """
459
+ return pulumi.get(self, "bound_subjects")
460
+
461
+ @bound_subjects.setter
462
+ def bound_subjects(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
463
+ pulumi.set(self, "bound_subjects", value)
464
+
465
+ @_builtins.property
466
+ @pulumi.getter(name="boundSubjectsType")
467
+ def bound_subjects_type(self) -> Optional[pulumi.Input[_builtins.str]]:
468
+ """
469
+ The type of matching assertion to perform on `bound_subjects`.
470
+ """
471
+ return pulumi.get(self, "bound_subjects_type")
472
+
473
+ @bound_subjects_type.setter
474
+ def bound_subjects_type(self, value: Optional[pulumi.Input[_builtins.str]]):
475
+ pulumi.set(self, "bound_subjects_type", value)
476
+
477
+ @_builtins.property
478
+ @pulumi.getter(name="groupsAttribute")
479
+ def groups_attribute(self) -> Optional[pulumi.Input[_builtins.str]]:
480
+ """
481
+ The attribute to use to identify the set of groups to which the
482
+ user belongs.
483
+ """
484
+ return pulumi.get(self, "groups_attribute")
485
+
486
+ @groups_attribute.setter
487
+ def groups_attribute(self, value: Optional[pulumi.Input[_builtins.str]]):
488
+ pulumi.set(self, "groups_attribute", value)
489
+
490
+ @_builtins.property
491
+ @pulumi.getter
492
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
493
+ """
494
+ Unique name of the role.
495
+ """
496
+ return pulumi.get(self, "name")
497
+
498
+ @name.setter
499
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
500
+ pulumi.set(self, "name", value)
501
+
502
+ @_builtins.property
503
+ @pulumi.getter
504
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
505
+ """
506
+ The namespace to provision the resource in.
507
+ The value should not contain leading or trailing forward slashes.
508
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
509
+ *Available only for Vault Enterprise*.
510
+ """
511
+ return pulumi.get(self, "namespace")
512
+
513
+ @namespace.setter
514
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
515
+ pulumi.set(self, "namespace", value)
516
+
517
+ @_builtins.property
518
+ @pulumi.getter
519
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
520
+ """
521
+ Path where the auth backend is mounted.
522
+ """
523
+ return pulumi.get(self, "path")
524
+
525
+ @path.setter
526
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
527
+ pulumi.set(self, "path", value)
528
+
529
+ @_builtins.property
530
+ @pulumi.getter(name="tokenBoundCidrs")
531
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
532
+ """
533
+ Specifies the blocks of IP addresses which are allowed to use the generated token
534
+ """
535
+ return pulumi.get(self, "token_bound_cidrs")
536
+
537
+ @token_bound_cidrs.setter
538
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
539
+ pulumi.set(self, "token_bound_cidrs", value)
540
+
541
+ @_builtins.property
542
+ @pulumi.getter(name="tokenExplicitMaxTtl")
543
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
544
+ """
545
+ Generated Token's Explicit Maximum TTL in seconds
546
+ """
547
+ return pulumi.get(self, "token_explicit_max_ttl")
548
+
549
+ @token_explicit_max_ttl.setter
550
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
551
+ pulumi.set(self, "token_explicit_max_ttl", value)
552
+
553
+ @_builtins.property
554
+ @pulumi.getter(name="tokenMaxTtl")
555
+ def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
556
+ """
557
+ The maximum lifetime of the generated token
558
+ """
559
+ return pulumi.get(self, "token_max_ttl")
560
+
561
+ @token_max_ttl.setter
562
+ def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
563
+ pulumi.set(self, "token_max_ttl", value)
564
+
565
+ @_builtins.property
566
+ @pulumi.getter(name="tokenNoDefaultPolicy")
567
+ def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
568
+ """
569
+ If true, the 'default' policy will not automatically be added to generated tokens
570
+ """
571
+ return pulumi.get(self, "token_no_default_policy")
572
+
573
+ @token_no_default_policy.setter
574
+ def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
575
+ pulumi.set(self, "token_no_default_policy", value)
576
+
577
+ @_builtins.property
578
+ @pulumi.getter(name="tokenNumUses")
579
+ def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
580
+ """
581
+ The maximum number of times a token may be used, a value of zero means unlimited
582
+ """
583
+ return pulumi.get(self, "token_num_uses")
584
+
585
+ @token_num_uses.setter
586
+ def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
587
+ pulumi.set(self, "token_num_uses", value)
588
+
589
+ @_builtins.property
590
+ @pulumi.getter(name="tokenPeriod")
591
+ def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
592
+ """
593
+ Generated Token's Period
594
+ """
595
+ return pulumi.get(self, "token_period")
596
+
597
+ @token_period.setter
598
+ def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
599
+ pulumi.set(self, "token_period", value)
600
+
601
+ @_builtins.property
602
+ @pulumi.getter(name="tokenPolicies")
603
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
604
+ """
605
+ Generated Token's Policies
606
+ """
607
+ return pulumi.get(self, "token_policies")
608
+
609
+ @token_policies.setter
610
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
611
+ pulumi.set(self, "token_policies", value)
612
+
613
+ @_builtins.property
614
+ @pulumi.getter(name="tokenTtl")
615
+ def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
616
+ """
617
+ The initial ttl of the token to generate in seconds
618
+ """
619
+ return pulumi.get(self, "token_ttl")
620
+
621
+ @token_ttl.setter
622
+ def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
623
+ pulumi.set(self, "token_ttl", value)
624
+
625
+ @_builtins.property
626
+ @pulumi.getter(name="tokenType")
627
+ def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
628
+ """
629
+ The type of token to generate, service or batch
630
+ """
631
+ return pulumi.get(self, "token_type")
632
+
633
+ @token_type.setter
634
+ def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
635
+ pulumi.set(self, "token_type", value)
636
+
637
+
638
+ @pulumi.type_token("vault:saml/authBackendRole:AuthBackendRole")
639
+ class AuthBackendRole(pulumi.CustomResource):
640
+ @overload
641
+ def __init__(__self__,
642
+ resource_name: str,
643
+ opts: Optional[pulumi.ResourceOptions] = None,
644
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
645
+ bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
646
+ bound_attributes_type: Optional[pulumi.Input[_builtins.str]] = None,
647
+ bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
648
+ bound_subjects_type: Optional[pulumi.Input[_builtins.str]] = None,
649
+ groups_attribute: Optional[pulumi.Input[_builtins.str]] = None,
650
+ name: Optional[pulumi.Input[_builtins.str]] = None,
651
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
652
+ path: Optional[pulumi.Input[_builtins.str]] = None,
653
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
654
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
655
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
656
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
657
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
658
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
659
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
660
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
661
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
662
+ __props__=None):
663
+ """
664
+ Manages an SAML auth backend role in a Vault server. See the [Vault
665
+ documentation](https://www.vaultproject.io/docs/auth/saml.html) for more
666
+ information.
667
+
668
+ ## Example Usage
669
+
670
+ ```python
671
+ import pulumi
672
+ import pulumi_vault as vault
673
+
674
+ example = vault.saml.AuthBackend("example",
675
+ path="saml",
676
+ idp_metadata_url="https://company.okta.com/app/abc123eb9xnIfzlaf697/sso/saml/metadata",
677
+ entity_id="https://my.vault/v1/auth/saml",
678
+ acs_urls=["https://my.vault.primary/v1/auth/saml/callback"],
679
+ default_role="default-role")
680
+ example_auth_backend_role = vault.saml.AuthBackendRole("example",
681
+ path=example.path,
682
+ name="my-role",
683
+ groups_attribute="groups",
684
+ bound_attributes={
685
+ "group": "admin",
686
+ },
687
+ bound_subjects=["*example.com"],
688
+ token_policies=["writer"],
689
+ token_ttl=86400)
690
+ ```
691
+
692
+ ## Import
693
+
694
+ SAML authentication backend roles can be imported using the `path`, e.g.
695
+
696
+ ```sh
697
+ $ pulumi import vault:saml/authBackendRole:AuthBackendRole example auth/saml/role/my-role
698
+ ```
699
+
700
+ :param str resource_name: The name of the resource.
701
+ :param pulumi.ResourceOptions opts: Options for the resource.
702
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
703
+ This should be a list or map containing the metadata in key value pairs.
704
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] bound_attributes: Mapping of attribute names to values that are expected to
705
+ exist in the SAML assertion.
706
+ :param pulumi.Input[_builtins.str] bound_attributes_type: The type of matching assertion to perform on
707
+ `bound_attributes_type`.
708
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_subjects: List of subjects being asserted for SAML authentication.
709
+ :param pulumi.Input[_builtins.str] bound_subjects_type: The type of matching assertion to perform on `bound_subjects`.
710
+ :param pulumi.Input[_builtins.str] groups_attribute: The attribute to use to identify the set of groups to which the
711
+ user belongs.
712
+ :param pulumi.Input[_builtins.str] name: Unique name of the role.
713
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
714
+ The value should not contain leading or trailing forward slashes.
715
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
716
+ *Available only for Vault Enterprise*.
717
+ :param pulumi.Input[_builtins.str] path: Path where the auth backend is mounted.
718
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
719
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
720
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
721
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
722
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
723
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
724
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
725
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
726
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
727
+ """
728
+ ...
729
+ @overload
730
+ def __init__(__self__,
731
+ resource_name: str,
732
+ args: AuthBackendRoleArgs,
733
+ opts: Optional[pulumi.ResourceOptions] = None):
734
+ """
735
+ Manages an SAML auth backend role in a Vault server. See the [Vault
736
+ documentation](https://www.vaultproject.io/docs/auth/saml.html) for more
737
+ information.
738
+
739
+ ## Example Usage
740
+
741
+ ```python
742
+ import pulumi
743
+ import pulumi_vault as vault
744
+
745
+ example = vault.saml.AuthBackend("example",
746
+ path="saml",
747
+ idp_metadata_url="https://company.okta.com/app/abc123eb9xnIfzlaf697/sso/saml/metadata",
748
+ entity_id="https://my.vault/v1/auth/saml",
749
+ acs_urls=["https://my.vault.primary/v1/auth/saml/callback"],
750
+ default_role="default-role")
751
+ example_auth_backend_role = vault.saml.AuthBackendRole("example",
752
+ path=example.path,
753
+ name="my-role",
754
+ groups_attribute="groups",
755
+ bound_attributes={
756
+ "group": "admin",
757
+ },
758
+ bound_subjects=["*example.com"],
759
+ token_policies=["writer"],
760
+ token_ttl=86400)
761
+ ```
762
+
763
+ ## Import
764
+
765
+ SAML authentication backend roles can be imported using the `path`, e.g.
766
+
767
+ ```sh
768
+ $ pulumi import vault:saml/authBackendRole:AuthBackendRole example auth/saml/role/my-role
769
+ ```
770
+
771
+ :param str resource_name: The name of the resource.
772
+ :param AuthBackendRoleArgs args: The arguments to use to populate this resource's properties.
773
+ :param pulumi.ResourceOptions opts: Options for the resource.
774
+ """
775
+ ...
776
+ def __init__(__self__, resource_name: str, *args, **kwargs):
777
+ resource_args, opts = _utilities.get_resource_args_opts(AuthBackendRoleArgs, pulumi.ResourceOptions, *args, **kwargs)
778
+ if resource_args is not None:
779
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
780
+ else:
781
+ __self__._internal_init(resource_name, *args, **kwargs)
782
+
783
+ def _internal_init(__self__,
784
+ resource_name: str,
785
+ opts: Optional[pulumi.ResourceOptions] = None,
786
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
787
+ bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
788
+ bound_attributes_type: Optional[pulumi.Input[_builtins.str]] = None,
789
+ bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
790
+ bound_subjects_type: Optional[pulumi.Input[_builtins.str]] = None,
791
+ groups_attribute: Optional[pulumi.Input[_builtins.str]] = None,
792
+ name: Optional[pulumi.Input[_builtins.str]] = None,
793
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
794
+ path: Optional[pulumi.Input[_builtins.str]] = None,
795
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
796
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
797
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
798
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
799
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
800
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
801
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
802
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
803
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
804
+ __props__=None):
805
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
806
+ if not isinstance(opts, pulumi.ResourceOptions):
807
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
808
+ if opts.id is None:
809
+ if __props__ is not None:
810
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
811
+ __props__ = AuthBackendRoleArgs.__new__(AuthBackendRoleArgs)
812
+
813
+ __props__.__dict__["alias_metadata"] = alias_metadata
814
+ __props__.__dict__["bound_attributes"] = bound_attributes
815
+ __props__.__dict__["bound_attributes_type"] = bound_attributes_type
816
+ __props__.__dict__["bound_subjects"] = bound_subjects
817
+ __props__.__dict__["bound_subjects_type"] = bound_subjects_type
818
+ __props__.__dict__["groups_attribute"] = groups_attribute
819
+ __props__.__dict__["name"] = name
820
+ __props__.__dict__["namespace"] = namespace
821
+ if path is None and not opts.urn:
822
+ raise TypeError("Missing required property 'path'")
823
+ __props__.__dict__["path"] = path
824
+ __props__.__dict__["token_bound_cidrs"] = token_bound_cidrs
825
+ __props__.__dict__["token_explicit_max_ttl"] = token_explicit_max_ttl
826
+ __props__.__dict__["token_max_ttl"] = token_max_ttl
827
+ __props__.__dict__["token_no_default_policy"] = token_no_default_policy
828
+ __props__.__dict__["token_num_uses"] = token_num_uses
829
+ __props__.__dict__["token_period"] = token_period
830
+ __props__.__dict__["token_policies"] = token_policies
831
+ __props__.__dict__["token_ttl"] = token_ttl
832
+ __props__.__dict__["token_type"] = token_type
833
+ super(AuthBackendRole, __self__).__init__(
834
+ 'vault:saml/authBackendRole:AuthBackendRole',
835
+ resource_name,
836
+ __props__,
837
+ opts)
838
+
839
+ @staticmethod
840
+ def get(resource_name: str,
841
+ id: pulumi.Input[str],
842
+ opts: Optional[pulumi.ResourceOptions] = None,
843
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
844
+ bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
845
+ bound_attributes_type: Optional[pulumi.Input[_builtins.str]] = None,
846
+ bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
847
+ bound_subjects_type: Optional[pulumi.Input[_builtins.str]] = None,
848
+ groups_attribute: Optional[pulumi.Input[_builtins.str]] = None,
849
+ name: Optional[pulumi.Input[_builtins.str]] = None,
850
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
851
+ path: Optional[pulumi.Input[_builtins.str]] = None,
852
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
853
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
854
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
855
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
856
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
857
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
858
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
859
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
860
+ token_type: Optional[pulumi.Input[_builtins.str]] = None) -> 'AuthBackendRole':
861
+ """
862
+ Get an existing AuthBackendRole resource's state with the given name, id, and optional extra
863
+ properties used to qualify the lookup.
864
+
865
+ :param str resource_name: The unique name of the resulting resource.
866
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
867
+ :param pulumi.ResourceOptions opts: Options for the resource.
868
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
869
+ This should be a list or map containing the metadata in key value pairs.
870
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] bound_attributes: Mapping of attribute names to values that are expected to
871
+ exist in the SAML assertion.
872
+ :param pulumi.Input[_builtins.str] bound_attributes_type: The type of matching assertion to perform on
873
+ `bound_attributes_type`.
874
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_subjects: List of subjects being asserted for SAML authentication.
875
+ :param pulumi.Input[_builtins.str] bound_subjects_type: The type of matching assertion to perform on `bound_subjects`.
876
+ :param pulumi.Input[_builtins.str] groups_attribute: The attribute to use to identify the set of groups to which the
877
+ user belongs.
878
+ :param pulumi.Input[_builtins.str] name: Unique name of the role.
879
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
880
+ The value should not contain leading or trailing forward slashes.
881
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
882
+ *Available only for Vault Enterprise*.
883
+ :param pulumi.Input[_builtins.str] path: Path where the auth backend is mounted.
884
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
885
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
886
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
887
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
888
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
889
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
890
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
891
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
892
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
893
+ """
894
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
895
+
896
+ __props__ = _AuthBackendRoleState.__new__(_AuthBackendRoleState)
897
+
898
+ __props__.__dict__["alias_metadata"] = alias_metadata
899
+ __props__.__dict__["bound_attributes"] = bound_attributes
900
+ __props__.__dict__["bound_attributes_type"] = bound_attributes_type
901
+ __props__.__dict__["bound_subjects"] = bound_subjects
902
+ __props__.__dict__["bound_subjects_type"] = bound_subjects_type
903
+ __props__.__dict__["groups_attribute"] = groups_attribute
904
+ __props__.__dict__["name"] = name
905
+ __props__.__dict__["namespace"] = namespace
906
+ __props__.__dict__["path"] = path
907
+ __props__.__dict__["token_bound_cidrs"] = token_bound_cidrs
908
+ __props__.__dict__["token_explicit_max_ttl"] = token_explicit_max_ttl
909
+ __props__.__dict__["token_max_ttl"] = token_max_ttl
910
+ __props__.__dict__["token_no_default_policy"] = token_no_default_policy
911
+ __props__.__dict__["token_num_uses"] = token_num_uses
912
+ __props__.__dict__["token_period"] = token_period
913
+ __props__.__dict__["token_policies"] = token_policies
914
+ __props__.__dict__["token_ttl"] = token_ttl
915
+ __props__.__dict__["token_type"] = token_type
916
+ return AuthBackendRole(resource_name, opts=opts, __props__=__props__)
917
+
918
+ @_builtins.property
919
+ @pulumi.getter(name="aliasMetadata")
920
+ def alias_metadata(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
921
+ """
922
+ The metadata to be tied to generated entity alias.
923
+ This should be a list or map containing the metadata in key value pairs.
924
+ """
925
+ return pulumi.get(self, "alias_metadata")
926
+
927
+ @_builtins.property
928
+ @pulumi.getter(name="boundAttributes")
929
+ def bound_attributes(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
930
+ """
931
+ Mapping of attribute names to values that are expected to
932
+ exist in the SAML assertion.
933
+ """
934
+ return pulumi.get(self, "bound_attributes")
935
+
936
+ @_builtins.property
937
+ @pulumi.getter(name="boundAttributesType")
938
+ def bound_attributes_type(self) -> pulumi.Output[_builtins.str]:
939
+ """
940
+ The type of matching assertion to perform on
941
+ `bound_attributes_type`.
942
+ """
943
+ return pulumi.get(self, "bound_attributes_type")
944
+
945
+ @_builtins.property
946
+ @pulumi.getter(name="boundSubjects")
947
+ def bound_subjects(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
948
+ """
949
+ List of subjects being asserted for SAML authentication.
950
+ """
951
+ return pulumi.get(self, "bound_subjects")
952
+
953
+ @_builtins.property
954
+ @pulumi.getter(name="boundSubjectsType")
955
+ def bound_subjects_type(self) -> pulumi.Output[_builtins.str]:
956
+ """
957
+ The type of matching assertion to perform on `bound_subjects`.
958
+ """
959
+ return pulumi.get(self, "bound_subjects_type")
960
+
961
+ @_builtins.property
962
+ @pulumi.getter(name="groupsAttribute")
963
+ def groups_attribute(self) -> pulumi.Output[Optional[_builtins.str]]:
964
+ """
965
+ The attribute to use to identify the set of groups to which the
966
+ user belongs.
967
+ """
968
+ return pulumi.get(self, "groups_attribute")
969
+
970
+ @_builtins.property
971
+ @pulumi.getter
972
+ def name(self) -> pulumi.Output[_builtins.str]:
973
+ """
974
+ Unique name of the role.
975
+ """
976
+ return pulumi.get(self, "name")
977
+
978
+ @_builtins.property
979
+ @pulumi.getter
980
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
981
+ """
982
+ The namespace to provision the resource in.
983
+ The value should not contain leading or trailing forward slashes.
984
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
985
+ *Available only for Vault Enterprise*.
986
+ """
987
+ return pulumi.get(self, "namespace")
988
+
989
+ @_builtins.property
990
+ @pulumi.getter
991
+ def path(self) -> pulumi.Output[_builtins.str]:
992
+ """
993
+ Path where the auth backend is mounted.
994
+ """
995
+ return pulumi.get(self, "path")
996
+
997
+ @_builtins.property
998
+ @pulumi.getter(name="tokenBoundCidrs")
999
+ def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1000
+ """
1001
+ Specifies the blocks of IP addresses which are allowed to use the generated token
1002
+ """
1003
+ return pulumi.get(self, "token_bound_cidrs")
1004
+
1005
+ @_builtins.property
1006
+ @pulumi.getter(name="tokenExplicitMaxTtl")
1007
+ def token_explicit_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1008
+ """
1009
+ Generated Token's Explicit Maximum TTL in seconds
1010
+ """
1011
+ return pulumi.get(self, "token_explicit_max_ttl")
1012
+
1013
+ @_builtins.property
1014
+ @pulumi.getter(name="tokenMaxTtl")
1015
+ def token_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1016
+ """
1017
+ The maximum lifetime of the generated token
1018
+ """
1019
+ return pulumi.get(self, "token_max_ttl")
1020
+
1021
+ @_builtins.property
1022
+ @pulumi.getter(name="tokenNoDefaultPolicy")
1023
+ def token_no_default_policy(self) -> pulumi.Output[Optional[_builtins.bool]]:
1024
+ """
1025
+ If true, the 'default' policy will not automatically be added to generated tokens
1026
+ """
1027
+ return pulumi.get(self, "token_no_default_policy")
1028
+
1029
+ @_builtins.property
1030
+ @pulumi.getter(name="tokenNumUses")
1031
+ def token_num_uses(self) -> pulumi.Output[Optional[_builtins.int]]:
1032
+ """
1033
+ The maximum number of times a token may be used, a value of zero means unlimited
1034
+ """
1035
+ return pulumi.get(self, "token_num_uses")
1036
+
1037
+ @_builtins.property
1038
+ @pulumi.getter(name="tokenPeriod")
1039
+ def token_period(self) -> pulumi.Output[Optional[_builtins.int]]:
1040
+ """
1041
+ Generated Token's Period
1042
+ """
1043
+ return pulumi.get(self, "token_period")
1044
+
1045
+ @_builtins.property
1046
+ @pulumi.getter(name="tokenPolicies")
1047
+ def token_policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1048
+ """
1049
+ Generated Token's Policies
1050
+ """
1051
+ return pulumi.get(self, "token_policies")
1052
+
1053
+ @_builtins.property
1054
+ @pulumi.getter(name="tokenTtl")
1055
+ def token_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1056
+ """
1057
+ The initial ttl of the token to generate in seconds
1058
+ """
1059
+ return pulumi.get(self, "token_ttl")
1060
+
1061
+ @_builtins.property
1062
+ @pulumi.getter(name="tokenType")
1063
+ def token_type(self) -> pulumi.Output[Optional[_builtins.str]]:
1064
+ """
1065
+ The type of token to generate, service or batch
1066
+ """
1067
+ return pulumi.get(self, "token_type")
1068
+