pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,908 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from . import _utilities
16
+
17
+ __all__ = ['ScepAuthBackendRoleArgs', 'ScepAuthBackendRole']
18
+
19
+ @pulumi.input_type
20
+ class ScepAuthBackendRoleArgs:
21
+ def __init__(__self__, *,
22
+ auth_type: pulumi.Input[_builtins.str],
23
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
24
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
25
+ challenge: Optional[pulumi.Input[_builtins.str]] = None,
26
+ display_name: Optional[pulumi.Input[_builtins.str]] = None,
27
+ name: Optional[pulumi.Input[_builtins.str]] = None,
28
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
29
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
30
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
31
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
32
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
33
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
34
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
35
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
36
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
37
+ token_type: Optional[pulumi.Input[_builtins.str]] = None):
38
+ """
39
+ The set of arguments for constructing a ScepAuthBackendRole resource.
40
+ :param pulumi.Input[_builtins.str] auth_type: The authentication type to use. This can be either "static-challenge" or "intune".
41
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
42
+ This should be a list or map containing the metadata in key value pairs.
43
+ :param pulumi.Input[_builtins.str] backend: Path to the mounted SCEP auth backend.
44
+ :param pulumi.Input[_builtins.str] challenge: The static challenge to use if auth_type is "static-challenge", not used for other auth types.
45
+ :param pulumi.Input[_builtins.str] name: Name of the role.
46
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
47
+ The value should not contain leading or trailing forward slashes.
48
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
49
+ *Available only for Vault Enterprise*.
50
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
51
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
52
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
53
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
54
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
55
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
56
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
57
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
58
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
59
+ """
60
+ pulumi.set(__self__, "auth_type", auth_type)
61
+ if alias_metadata is not None:
62
+ pulumi.set(__self__, "alias_metadata", alias_metadata)
63
+ if backend is not None:
64
+ pulumi.set(__self__, "backend", backend)
65
+ if challenge is not None:
66
+ pulumi.set(__self__, "challenge", challenge)
67
+ if display_name is not None:
68
+ pulumi.set(__self__, "display_name", display_name)
69
+ if name is not None:
70
+ pulumi.set(__self__, "name", name)
71
+ if namespace is not None:
72
+ pulumi.set(__self__, "namespace", namespace)
73
+ if token_bound_cidrs is not None:
74
+ pulumi.set(__self__, "token_bound_cidrs", token_bound_cidrs)
75
+ if token_explicit_max_ttl is not None:
76
+ pulumi.set(__self__, "token_explicit_max_ttl", token_explicit_max_ttl)
77
+ if token_max_ttl is not None:
78
+ pulumi.set(__self__, "token_max_ttl", token_max_ttl)
79
+ if token_no_default_policy is not None:
80
+ pulumi.set(__self__, "token_no_default_policy", token_no_default_policy)
81
+ if token_num_uses is not None:
82
+ pulumi.set(__self__, "token_num_uses", token_num_uses)
83
+ if token_period is not None:
84
+ pulumi.set(__self__, "token_period", token_period)
85
+ if token_policies is not None:
86
+ pulumi.set(__self__, "token_policies", token_policies)
87
+ if token_ttl is not None:
88
+ pulumi.set(__self__, "token_ttl", token_ttl)
89
+ if token_type is not None:
90
+ pulumi.set(__self__, "token_type", token_type)
91
+
92
+ @_builtins.property
93
+ @pulumi.getter(name="authType")
94
+ def auth_type(self) -> pulumi.Input[_builtins.str]:
95
+ """
96
+ The authentication type to use. This can be either "static-challenge" or "intune".
97
+ """
98
+ return pulumi.get(self, "auth_type")
99
+
100
+ @auth_type.setter
101
+ def auth_type(self, value: pulumi.Input[_builtins.str]):
102
+ pulumi.set(self, "auth_type", value)
103
+
104
+ @_builtins.property
105
+ @pulumi.getter(name="aliasMetadata")
106
+ def alias_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
107
+ """
108
+ The metadata to be tied to generated entity alias.
109
+ This should be a list or map containing the metadata in key value pairs.
110
+ """
111
+ return pulumi.get(self, "alias_metadata")
112
+
113
+ @alias_metadata.setter
114
+ def alias_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
115
+ pulumi.set(self, "alias_metadata", value)
116
+
117
+ @_builtins.property
118
+ @pulumi.getter
119
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
120
+ """
121
+ Path to the mounted SCEP auth backend.
122
+ """
123
+ return pulumi.get(self, "backend")
124
+
125
+ @backend.setter
126
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
127
+ pulumi.set(self, "backend", value)
128
+
129
+ @_builtins.property
130
+ @pulumi.getter
131
+ def challenge(self) -> Optional[pulumi.Input[_builtins.str]]:
132
+ """
133
+ The static challenge to use if auth_type is "static-challenge", not used for other auth types.
134
+ """
135
+ return pulumi.get(self, "challenge")
136
+
137
+ @challenge.setter
138
+ def challenge(self, value: Optional[pulumi.Input[_builtins.str]]):
139
+ pulumi.set(self, "challenge", value)
140
+
141
+ @_builtins.property
142
+ @pulumi.getter(name="displayName")
143
+ def display_name(self) -> Optional[pulumi.Input[_builtins.str]]:
144
+ return pulumi.get(self, "display_name")
145
+
146
+ @display_name.setter
147
+ def display_name(self, value: Optional[pulumi.Input[_builtins.str]]):
148
+ pulumi.set(self, "display_name", value)
149
+
150
+ @_builtins.property
151
+ @pulumi.getter
152
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
153
+ """
154
+ Name of the role.
155
+ """
156
+ return pulumi.get(self, "name")
157
+
158
+ @name.setter
159
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
160
+ pulumi.set(self, "name", value)
161
+
162
+ @_builtins.property
163
+ @pulumi.getter
164
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
165
+ """
166
+ The namespace to provision the resource in.
167
+ The value should not contain leading or trailing forward slashes.
168
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
169
+ *Available only for Vault Enterprise*.
170
+ """
171
+ return pulumi.get(self, "namespace")
172
+
173
+ @namespace.setter
174
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
175
+ pulumi.set(self, "namespace", value)
176
+
177
+ @_builtins.property
178
+ @pulumi.getter(name="tokenBoundCidrs")
179
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
180
+ """
181
+ Specifies the blocks of IP addresses which are allowed to use the generated token
182
+ """
183
+ return pulumi.get(self, "token_bound_cidrs")
184
+
185
+ @token_bound_cidrs.setter
186
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
187
+ pulumi.set(self, "token_bound_cidrs", value)
188
+
189
+ @_builtins.property
190
+ @pulumi.getter(name="tokenExplicitMaxTtl")
191
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
192
+ """
193
+ Generated Token's Explicit Maximum TTL in seconds
194
+ """
195
+ return pulumi.get(self, "token_explicit_max_ttl")
196
+
197
+ @token_explicit_max_ttl.setter
198
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
199
+ pulumi.set(self, "token_explicit_max_ttl", value)
200
+
201
+ @_builtins.property
202
+ @pulumi.getter(name="tokenMaxTtl")
203
+ def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
204
+ """
205
+ The maximum lifetime of the generated token
206
+ """
207
+ return pulumi.get(self, "token_max_ttl")
208
+
209
+ @token_max_ttl.setter
210
+ def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
211
+ pulumi.set(self, "token_max_ttl", value)
212
+
213
+ @_builtins.property
214
+ @pulumi.getter(name="tokenNoDefaultPolicy")
215
+ def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
216
+ """
217
+ If true, the 'default' policy will not automatically be added to generated tokens
218
+ """
219
+ return pulumi.get(self, "token_no_default_policy")
220
+
221
+ @token_no_default_policy.setter
222
+ def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
223
+ pulumi.set(self, "token_no_default_policy", value)
224
+
225
+ @_builtins.property
226
+ @pulumi.getter(name="tokenNumUses")
227
+ def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
228
+ """
229
+ The maximum number of times a token may be used, a value of zero means unlimited
230
+ """
231
+ return pulumi.get(self, "token_num_uses")
232
+
233
+ @token_num_uses.setter
234
+ def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
235
+ pulumi.set(self, "token_num_uses", value)
236
+
237
+ @_builtins.property
238
+ @pulumi.getter(name="tokenPeriod")
239
+ def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
240
+ """
241
+ Generated Token's Period
242
+ """
243
+ return pulumi.get(self, "token_period")
244
+
245
+ @token_period.setter
246
+ def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
247
+ pulumi.set(self, "token_period", value)
248
+
249
+ @_builtins.property
250
+ @pulumi.getter(name="tokenPolicies")
251
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
252
+ """
253
+ Generated Token's Policies
254
+ """
255
+ return pulumi.get(self, "token_policies")
256
+
257
+ @token_policies.setter
258
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
259
+ pulumi.set(self, "token_policies", value)
260
+
261
+ @_builtins.property
262
+ @pulumi.getter(name="tokenTtl")
263
+ def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
264
+ """
265
+ The initial ttl of the token to generate in seconds
266
+ """
267
+ return pulumi.get(self, "token_ttl")
268
+
269
+ @token_ttl.setter
270
+ def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
271
+ pulumi.set(self, "token_ttl", value)
272
+
273
+ @_builtins.property
274
+ @pulumi.getter(name="tokenType")
275
+ def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
276
+ """
277
+ The type of token to generate, service or batch
278
+ """
279
+ return pulumi.get(self, "token_type")
280
+
281
+ @token_type.setter
282
+ def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
283
+ pulumi.set(self, "token_type", value)
284
+
285
+
286
+ @pulumi.input_type
287
+ class _ScepAuthBackendRoleState:
288
+ def __init__(__self__, *,
289
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
290
+ auth_type: Optional[pulumi.Input[_builtins.str]] = None,
291
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
292
+ challenge: Optional[pulumi.Input[_builtins.str]] = None,
293
+ display_name: Optional[pulumi.Input[_builtins.str]] = None,
294
+ name: Optional[pulumi.Input[_builtins.str]] = None,
295
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
296
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
297
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
298
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
299
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
300
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
301
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
302
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
303
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
304
+ token_type: Optional[pulumi.Input[_builtins.str]] = None):
305
+ """
306
+ Input properties used for looking up and filtering ScepAuthBackendRole resources.
307
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
308
+ This should be a list or map containing the metadata in key value pairs.
309
+ :param pulumi.Input[_builtins.str] auth_type: The authentication type to use. This can be either "static-challenge" or "intune".
310
+ :param pulumi.Input[_builtins.str] backend: Path to the mounted SCEP auth backend.
311
+ :param pulumi.Input[_builtins.str] challenge: The static challenge to use if auth_type is "static-challenge", not used for other auth types.
312
+ :param pulumi.Input[_builtins.str] name: Name of the role.
313
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
314
+ The value should not contain leading or trailing forward slashes.
315
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
316
+ *Available only for Vault Enterprise*.
317
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
318
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
319
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
320
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
321
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
322
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
323
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
324
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
325
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
326
+ """
327
+ if alias_metadata is not None:
328
+ pulumi.set(__self__, "alias_metadata", alias_metadata)
329
+ if auth_type is not None:
330
+ pulumi.set(__self__, "auth_type", auth_type)
331
+ if backend is not None:
332
+ pulumi.set(__self__, "backend", backend)
333
+ if challenge is not None:
334
+ pulumi.set(__self__, "challenge", challenge)
335
+ if display_name is not None:
336
+ pulumi.set(__self__, "display_name", display_name)
337
+ if name is not None:
338
+ pulumi.set(__self__, "name", name)
339
+ if namespace is not None:
340
+ pulumi.set(__self__, "namespace", namespace)
341
+ if token_bound_cidrs is not None:
342
+ pulumi.set(__self__, "token_bound_cidrs", token_bound_cidrs)
343
+ if token_explicit_max_ttl is not None:
344
+ pulumi.set(__self__, "token_explicit_max_ttl", token_explicit_max_ttl)
345
+ if token_max_ttl is not None:
346
+ pulumi.set(__self__, "token_max_ttl", token_max_ttl)
347
+ if token_no_default_policy is not None:
348
+ pulumi.set(__self__, "token_no_default_policy", token_no_default_policy)
349
+ if token_num_uses is not None:
350
+ pulumi.set(__self__, "token_num_uses", token_num_uses)
351
+ if token_period is not None:
352
+ pulumi.set(__self__, "token_period", token_period)
353
+ if token_policies is not None:
354
+ pulumi.set(__self__, "token_policies", token_policies)
355
+ if token_ttl is not None:
356
+ pulumi.set(__self__, "token_ttl", token_ttl)
357
+ if token_type is not None:
358
+ pulumi.set(__self__, "token_type", token_type)
359
+
360
+ @_builtins.property
361
+ @pulumi.getter(name="aliasMetadata")
362
+ def alias_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
363
+ """
364
+ The metadata to be tied to generated entity alias.
365
+ This should be a list or map containing the metadata in key value pairs.
366
+ """
367
+ return pulumi.get(self, "alias_metadata")
368
+
369
+ @alias_metadata.setter
370
+ def alias_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
371
+ pulumi.set(self, "alias_metadata", value)
372
+
373
+ @_builtins.property
374
+ @pulumi.getter(name="authType")
375
+ def auth_type(self) -> Optional[pulumi.Input[_builtins.str]]:
376
+ """
377
+ The authentication type to use. This can be either "static-challenge" or "intune".
378
+ """
379
+ return pulumi.get(self, "auth_type")
380
+
381
+ @auth_type.setter
382
+ def auth_type(self, value: Optional[pulumi.Input[_builtins.str]]):
383
+ pulumi.set(self, "auth_type", value)
384
+
385
+ @_builtins.property
386
+ @pulumi.getter
387
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
388
+ """
389
+ Path to the mounted SCEP auth backend.
390
+ """
391
+ return pulumi.get(self, "backend")
392
+
393
+ @backend.setter
394
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
395
+ pulumi.set(self, "backend", value)
396
+
397
+ @_builtins.property
398
+ @pulumi.getter
399
+ def challenge(self) -> Optional[pulumi.Input[_builtins.str]]:
400
+ """
401
+ The static challenge to use if auth_type is "static-challenge", not used for other auth types.
402
+ """
403
+ return pulumi.get(self, "challenge")
404
+
405
+ @challenge.setter
406
+ def challenge(self, value: Optional[pulumi.Input[_builtins.str]]):
407
+ pulumi.set(self, "challenge", value)
408
+
409
+ @_builtins.property
410
+ @pulumi.getter(name="displayName")
411
+ def display_name(self) -> Optional[pulumi.Input[_builtins.str]]:
412
+ return pulumi.get(self, "display_name")
413
+
414
+ @display_name.setter
415
+ def display_name(self, value: Optional[pulumi.Input[_builtins.str]]):
416
+ pulumi.set(self, "display_name", value)
417
+
418
+ @_builtins.property
419
+ @pulumi.getter
420
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
421
+ """
422
+ Name of the role.
423
+ """
424
+ return pulumi.get(self, "name")
425
+
426
+ @name.setter
427
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
428
+ pulumi.set(self, "name", value)
429
+
430
+ @_builtins.property
431
+ @pulumi.getter
432
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
433
+ """
434
+ The namespace to provision the resource in.
435
+ The value should not contain leading or trailing forward slashes.
436
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
437
+ *Available only for Vault Enterprise*.
438
+ """
439
+ return pulumi.get(self, "namespace")
440
+
441
+ @namespace.setter
442
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
443
+ pulumi.set(self, "namespace", value)
444
+
445
+ @_builtins.property
446
+ @pulumi.getter(name="tokenBoundCidrs")
447
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
448
+ """
449
+ Specifies the blocks of IP addresses which are allowed to use the generated token
450
+ """
451
+ return pulumi.get(self, "token_bound_cidrs")
452
+
453
+ @token_bound_cidrs.setter
454
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
455
+ pulumi.set(self, "token_bound_cidrs", value)
456
+
457
+ @_builtins.property
458
+ @pulumi.getter(name="tokenExplicitMaxTtl")
459
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
460
+ """
461
+ Generated Token's Explicit Maximum TTL in seconds
462
+ """
463
+ return pulumi.get(self, "token_explicit_max_ttl")
464
+
465
+ @token_explicit_max_ttl.setter
466
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
467
+ pulumi.set(self, "token_explicit_max_ttl", value)
468
+
469
+ @_builtins.property
470
+ @pulumi.getter(name="tokenMaxTtl")
471
+ def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
472
+ """
473
+ The maximum lifetime of the generated token
474
+ """
475
+ return pulumi.get(self, "token_max_ttl")
476
+
477
+ @token_max_ttl.setter
478
+ def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
479
+ pulumi.set(self, "token_max_ttl", value)
480
+
481
+ @_builtins.property
482
+ @pulumi.getter(name="tokenNoDefaultPolicy")
483
+ def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
484
+ """
485
+ If true, the 'default' policy will not automatically be added to generated tokens
486
+ """
487
+ return pulumi.get(self, "token_no_default_policy")
488
+
489
+ @token_no_default_policy.setter
490
+ def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
491
+ pulumi.set(self, "token_no_default_policy", value)
492
+
493
+ @_builtins.property
494
+ @pulumi.getter(name="tokenNumUses")
495
+ def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
496
+ """
497
+ The maximum number of times a token may be used, a value of zero means unlimited
498
+ """
499
+ return pulumi.get(self, "token_num_uses")
500
+
501
+ @token_num_uses.setter
502
+ def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
503
+ pulumi.set(self, "token_num_uses", value)
504
+
505
+ @_builtins.property
506
+ @pulumi.getter(name="tokenPeriod")
507
+ def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
508
+ """
509
+ Generated Token's Period
510
+ """
511
+ return pulumi.get(self, "token_period")
512
+
513
+ @token_period.setter
514
+ def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
515
+ pulumi.set(self, "token_period", value)
516
+
517
+ @_builtins.property
518
+ @pulumi.getter(name="tokenPolicies")
519
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
520
+ """
521
+ Generated Token's Policies
522
+ """
523
+ return pulumi.get(self, "token_policies")
524
+
525
+ @token_policies.setter
526
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
527
+ pulumi.set(self, "token_policies", value)
528
+
529
+ @_builtins.property
530
+ @pulumi.getter(name="tokenTtl")
531
+ def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
532
+ """
533
+ The initial ttl of the token to generate in seconds
534
+ """
535
+ return pulumi.get(self, "token_ttl")
536
+
537
+ @token_ttl.setter
538
+ def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
539
+ pulumi.set(self, "token_ttl", value)
540
+
541
+ @_builtins.property
542
+ @pulumi.getter(name="tokenType")
543
+ def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
544
+ """
545
+ The type of token to generate, service or batch
546
+ """
547
+ return pulumi.get(self, "token_type")
548
+
549
+ @token_type.setter
550
+ def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
551
+ pulumi.set(self, "token_type", value)
552
+
553
+
554
+ @pulumi.type_token("vault:index/scepAuthBackendRole:ScepAuthBackendRole")
555
+ class ScepAuthBackendRole(pulumi.CustomResource):
556
+ @overload
557
+ def __init__(__self__,
558
+ resource_name: str,
559
+ opts: Optional[pulumi.ResourceOptions] = None,
560
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
561
+ auth_type: Optional[pulumi.Input[_builtins.str]] = None,
562
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
563
+ challenge: Optional[pulumi.Input[_builtins.str]] = None,
564
+ display_name: Optional[pulumi.Input[_builtins.str]] = None,
565
+ name: Optional[pulumi.Input[_builtins.str]] = None,
566
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
567
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
568
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
569
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
570
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
571
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
572
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
573
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
574
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
575
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
576
+ __props__=None):
577
+ """
578
+ ## Example Usage
579
+
580
+ ```python
581
+ import pulumi
582
+ import pulumi_vault as vault
583
+
584
+ scep = vault.AuthBackend("scep",
585
+ path="scep",
586
+ type="scep")
587
+ scep_scep_auth_backend_role = vault.ScepAuthBackendRole("scep",
588
+ backend=scep.path,
589
+ name="scep_challenge",
590
+ auth_type="static-challenge",
591
+ challenge="well known secret",
592
+ token_type="batch",
593
+ token_ttl=300,
594
+ token_max_ttl=600,
595
+ token_policies=["scep-clients"])
596
+ ```
597
+
598
+ :param str resource_name: The name of the resource.
599
+ :param pulumi.ResourceOptions opts: Options for the resource.
600
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
601
+ This should be a list or map containing the metadata in key value pairs.
602
+ :param pulumi.Input[_builtins.str] auth_type: The authentication type to use. This can be either "static-challenge" or "intune".
603
+ :param pulumi.Input[_builtins.str] backend: Path to the mounted SCEP auth backend.
604
+ :param pulumi.Input[_builtins.str] challenge: The static challenge to use if auth_type is "static-challenge", not used for other auth types.
605
+ :param pulumi.Input[_builtins.str] name: Name of the role.
606
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
607
+ The value should not contain leading or trailing forward slashes.
608
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
609
+ *Available only for Vault Enterprise*.
610
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
611
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
612
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
613
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
614
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
615
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
616
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
617
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
618
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
619
+ """
620
+ ...
621
+ @overload
622
+ def __init__(__self__,
623
+ resource_name: str,
624
+ args: ScepAuthBackendRoleArgs,
625
+ opts: Optional[pulumi.ResourceOptions] = None):
626
+ """
627
+ ## Example Usage
628
+
629
+ ```python
630
+ import pulumi
631
+ import pulumi_vault as vault
632
+
633
+ scep = vault.AuthBackend("scep",
634
+ path="scep",
635
+ type="scep")
636
+ scep_scep_auth_backend_role = vault.ScepAuthBackendRole("scep",
637
+ backend=scep.path,
638
+ name="scep_challenge",
639
+ auth_type="static-challenge",
640
+ challenge="well known secret",
641
+ token_type="batch",
642
+ token_ttl=300,
643
+ token_max_ttl=600,
644
+ token_policies=["scep-clients"])
645
+ ```
646
+
647
+ :param str resource_name: The name of the resource.
648
+ :param ScepAuthBackendRoleArgs args: The arguments to use to populate this resource's properties.
649
+ :param pulumi.ResourceOptions opts: Options for the resource.
650
+ """
651
+ ...
652
+ def __init__(__self__, resource_name: str, *args, **kwargs):
653
+ resource_args, opts = _utilities.get_resource_args_opts(ScepAuthBackendRoleArgs, pulumi.ResourceOptions, *args, **kwargs)
654
+ if resource_args is not None:
655
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
656
+ else:
657
+ __self__._internal_init(resource_name, *args, **kwargs)
658
+
659
+ def _internal_init(__self__,
660
+ resource_name: str,
661
+ opts: Optional[pulumi.ResourceOptions] = None,
662
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
663
+ auth_type: Optional[pulumi.Input[_builtins.str]] = None,
664
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
665
+ challenge: Optional[pulumi.Input[_builtins.str]] = None,
666
+ display_name: Optional[pulumi.Input[_builtins.str]] = None,
667
+ name: Optional[pulumi.Input[_builtins.str]] = None,
668
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
669
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
670
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
671
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
672
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
673
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
674
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
675
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
676
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
677
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
678
+ __props__=None):
679
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
680
+ if not isinstance(opts, pulumi.ResourceOptions):
681
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
682
+ if opts.id is None:
683
+ if __props__ is not None:
684
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
685
+ __props__ = ScepAuthBackendRoleArgs.__new__(ScepAuthBackendRoleArgs)
686
+
687
+ __props__.__dict__["alias_metadata"] = alias_metadata
688
+ if auth_type is None and not opts.urn:
689
+ raise TypeError("Missing required property 'auth_type'")
690
+ __props__.__dict__["auth_type"] = auth_type
691
+ __props__.__dict__["backend"] = backend
692
+ __props__.__dict__["challenge"] = challenge
693
+ __props__.__dict__["display_name"] = display_name
694
+ __props__.__dict__["name"] = name
695
+ __props__.__dict__["namespace"] = namespace
696
+ __props__.__dict__["token_bound_cidrs"] = token_bound_cidrs
697
+ __props__.__dict__["token_explicit_max_ttl"] = token_explicit_max_ttl
698
+ __props__.__dict__["token_max_ttl"] = token_max_ttl
699
+ __props__.__dict__["token_no_default_policy"] = token_no_default_policy
700
+ __props__.__dict__["token_num_uses"] = token_num_uses
701
+ __props__.__dict__["token_period"] = token_period
702
+ __props__.__dict__["token_policies"] = token_policies
703
+ __props__.__dict__["token_ttl"] = token_ttl
704
+ __props__.__dict__["token_type"] = token_type
705
+ super(ScepAuthBackendRole, __self__).__init__(
706
+ 'vault:index/scepAuthBackendRole:ScepAuthBackendRole',
707
+ resource_name,
708
+ __props__,
709
+ opts)
710
+
711
+ @staticmethod
712
+ def get(resource_name: str,
713
+ id: pulumi.Input[str],
714
+ opts: Optional[pulumi.ResourceOptions] = None,
715
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
716
+ auth_type: Optional[pulumi.Input[_builtins.str]] = None,
717
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
718
+ challenge: Optional[pulumi.Input[_builtins.str]] = None,
719
+ display_name: Optional[pulumi.Input[_builtins.str]] = None,
720
+ name: Optional[pulumi.Input[_builtins.str]] = None,
721
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
722
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
723
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
724
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
725
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
726
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
727
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
728
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
729
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
730
+ token_type: Optional[pulumi.Input[_builtins.str]] = None) -> 'ScepAuthBackendRole':
731
+ """
732
+ Get an existing ScepAuthBackendRole resource's state with the given name, id, and optional extra
733
+ properties used to qualify the lookup.
734
+
735
+ :param str resource_name: The unique name of the resulting resource.
736
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
737
+ :param pulumi.ResourceOptions opts: Options for the resource.
738
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
739
+ This should be a list or map containing the metadata in key value pairs.
740
+ :param pulumi.Input[_builtins.str] auth_type: The authentication type to use. This can be either "static-challenge" or "intune".
741
+ :param pulumi.Input[_builtins.str] backend: Path to the mounted SCEP auth backend.
742
+ :param pulumi.Input[_builtins.str] challenge: The static challenge to use if auth_type is "static-challenge", not used for other auth types.
743
+ :param pulumi.Input[_builtins.str] name: Name of the role.
744
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
745
+ The value should not contain leading or trailing forward slashes.
746
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
747
+ *Available only for Vault Enterprise*.
748
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
749
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
750
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
751
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
752
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
753
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
754
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
755
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
756
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
757
+ """
758
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
759
+
760
+ __props__ = _ScepAuthBackendRoleState.__new__(_ScepAuthBackendRoleState)
761
+
762
+ __props__.__dict__["alias_metadata"] = alias_metadata
763
+ __props__.__dict__["auth_type"] = auth_type
764
+ __props__.__dict__["backend"] = backend
765
+ __props__.__dict__["challenge"] = challenge
766
+ __props__.__dict__["display_name"] = display_name
767
+ __props__.__dict__["name"] = name
768
+ __props__.__dict__["namespace"] = namespace
769
+ __props__.__dict__["token_bound_cidrs"] = token_bound_cidrs
770
+ __props__.__dict__["token_explicit_max_ttl"] = token_explicit_max_ttl
771
+ __props__.__dict__["token_max_ttl"] = token_max_ttl
772
+ __props__.__dict__["token_no_default_policy"] = token_no_default_policy
773
+ __props__.__dict__["token_num_uses"] = token_num_uses
774
+ __props__.__dict__["token_period"] = token_period
775
+ __props__.__dict__["token_policies"] = token_policies
776
+ __props__.__dict__["token_ttl"] = token_ttl
777
+ __props__.__dict__["token_type"] = token_type
778
+ return ScepAuthBackendRole(resource_name, opts=opts, __props__=__props__)
779
+
780
+ @_builtins.property
781
+ @pulumi.getter(name="aliasMetadata")
782
+ def alias_metadata(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
783
+ """
784
+ The metadata to be tied to generated entity alias.
785
+ This should be a list or map containing the metadata in key value pairs.
786
+ """
787
+ return pulumi.get(self, "alias_metadata")
788
+
789
+ @_builtins.property
790
+ @pulumi.getter(name="authType")
791
+ def auth_type(self) -> pulumi.Output[_builtins.str]:
792
+ """
793
+ The authentication type to use. This can be either "static-challenge" or "intune".
794
+ """
795
+ return pulumi.get(self, "auth_type")
796
+
797
+ @_builtins.property
798
+ @pulumi.getter
799
+ def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
800
+ """
801
+ Path to the mounted SCEP auth backend.
802
+ """
803
+ return pulumi.get(self, "backend")
804
+
805
+ @_builtins.property
806
+ @pulumi.getter
807
+ def challenge(self) -> pulumi.Output[Optional[_builtins.str]]:
808
+ """
809
+ The static challenge to use if auth_type is "static-challenge", not used for other auth types.
810
+ """
811
+ return pulumi.get(self, "challenge")
812
+
813
+ @_builtins.property
814
+ @pulumi.getter(name="displayName")
815
+ def display_name(self) -> pulumi.Output[_builtins.str]:
816
+ return pulumi.get(self, "display_name")
817
+
818
+ @_builtins.property
819
+ @pulumi.getter
820
+ def name(self) -> pulumi.Output[_builtins.str]:
821
+ """
822
+ Name of the role.
823
+ """
824
+ return pulumi.get(self, "name")
825
+
826
+ @_builtins.property
827
+ @pulumi.getter
828
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
829
+ """
830
+ The namespace to provision the resource in.
831
+ The value should not contain leading or trailing forward slashes.
832
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
833
+ *Available only for Vault Enterprise*.
834
+ """
835
+ return pulumi.get(self, "namespace")
836
+
837
+ @_builtins.property
838
+ @pulumi.getter(name="tokenBoundCidrs")
839
+ def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
840
+ """
841
+ Specifies the blocks of IP addresses which are allowed to use the generated token
842
+ """
843
+ return pulumi.get(self, "token_bound_cidrs")
844
+
845
+ @_builtins.property
846
+ @pulumi.getter(name="tokenExplicitMaxTtl")
847
+ def token_explicit_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
848
+ """
849
+ Generated Token's Explicit Maximum TTL in seconds
850
+ """
851
+ return pulumi.get(self, "token_explicit_max_ttl")
852
+
853
+ @_builtins.property
854
+ @pulumi.getter(name="tokenMaxTtl")
855
+ def token_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
856
+ """
857
+ The maximum lifetime of the generated token
858
+ """
859
+ return pulumi.get(self, "token_max_ttl")
860
+
861
+ @_builtins.property
862
+ @pulumi.getter(name="tokenNoDefaultPolicy")
863
+ def token_no_default_policy(self) -> pulumi.Output[Optional[_builtins.bool]]:
864
+ """
865
+ If true, the 'default' policy will not automatically be added to generated tokens
866
+ """
867
+ return pulumi.get(self, "token_no_default_policy")
868
+
869
+ @_builtins.property
870
+ @pulumi.getter(name="tokenNumUses")
871
+ def token_num_uses(self) -> pulumi.Output[Optional[_builtins.int]]:
872
+ """
873
+ The maximum number of times a token may be used, a value of zero means unlimited
874
+ """
875
+ return pulumi.get(self, "token_num_uses")
876
+
877
+ @_builtins.property
878
+ @pulumi.getter(name="tokenPeriod")
879
+ def token_period(self) -> pulumi.Output[Optional[_builtins.int]]:
880
+ """
881
+ Generated Token's Period
882
+ """
883
+ return pulumi.get(self, "token_period")
884
+
885
+ @_builtins.property
886
+ @pulumi.getter(name="tokenPolicies")
887
+ def token_policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
888
+ """
889
+ Generated Token's Policies
890
+ """
891
+ return pulumi.get(self, "token_policies")
892
+
893
+ @_builtins.property
894
+ @pulumi.getter(name="tokenTtl")
895
+ def token_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
896
+ """
897
+ The initial ttl of the token to generate in seconds
898
+ """
899
+ return pulumi.get(self, "token_ttl")
900
+
901
+ @_builtins.property
902
+ @pulumi.getter(name="tokenType")
903
+ def token_type(self) -> pulumi.Output[Optional[_builtins.str]]:
904
+ """
905
+ The type of token to generate, service or batch
906
+ """
907
+ return pulumi.get(self, "token_type")
908
+