pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,1135 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
18
+
19
+ @pulumi.input_type
20
+ class AuthBackendRoleArgs:
21
+ def __init__(__self__, *,
22
+ role_name: pulumi.Input[_builtins.str],
23
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
24
+ allowed_entity_aliases: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
25
+ allowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ allowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
+ disallowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
28
+ disallowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
29
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
30
+ orphan: Optional[pulumi.Input[_builtins.bool]] = None,
31
+ path_suffix: Optional[pulumi.Input[_builtins.str]] = None,
32
+ renewable: Optional[pulumi.Input[_builtins.bool]] = None,
33
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
34
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
35
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
36
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
37
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
38
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
39
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
40
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
41
+ token_type: Optional[pulumi.Input[_builtins.str]] = None):
42
+ """
43
+ The set of arguments for constructing a AuthBackendRole resource.
44
+ :param pulumi.Input[_builtins.str] role_name: The name of the role.
45
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
46
+ This should be a list or map containing the metadata in key value pairs.
47
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_entity_aliases: List of allowed entity aliases.
48
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_policies: List of allowed policies for given role.
49
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_policies_globs: Set of allowed policies with glob match for given role.
50
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] disallowed_policies: List of disallowed policies for given role.
51
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] disallowed_policies_globs: Set of disallowed policies with glob match for given role.
52
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
53
+ The value should not contain leading or trailing forward slashes.
54
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
55
+ *Available only for Vault Enterprise*.
56
+ :param pulumi.Input[_builtins.bool] orphan: If true, tokens created against this policy will be orphan tokens.
57
+ :param pulumi.Input[_builtins.str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
58
+ :param pulumi.Input[_builtins.bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
59
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
60
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
61
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
62
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
63
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
64
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
65
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
66
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
67
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
68
+ """
69
+ pulumi.set(__self__, "role_name", role_name)
70
+ if alias_metadata is not None:
71
+ pulumi.set(__self__, "alias_metadata", alias_metadata)
72
+ if allowed_entity_aliases is not None:
73
+ pulumi.set(__self__, "allowed_entity_aliases", allowed_entity_aliases)
74
+ if allowed_policies is not None:
75
+ pulumi.set(__self__, "allowed_policies", allowed_policies)
76
+ if allowed_policies_globs is not None:
77
+ pulumi.set(__self__, "allowed_policies_globs", allowed_policies_globs)
78
+ if disallowed_policies is not None:
79
+ pulumi.set(__self__, "disallowed_policies", disallowed_policies)
80
+ if disallowed_policies_globs is not None:
81
+ pulumi.set(__self__, "disallowed_policies_globs", disallowed_policies_globs)
82
+ if namespace is not None:
83
+ pulumi.set(__self__, "namespace", namespace)
84
+ if orphan is not None:
85
+ pulumi.set(__self__, "orphan", orphan)
86
+ if path_suffix is not None:
87
+ pulumi.set(__self__, "path_suffix", path_suffix)
88
+ if renewable is not None:
89
+ pulumi.set(__self__, "renewable", renewable)
90
+ if token_bound_cidrs is not None:
91
+ pulumi.set(__self__, "token_bound_cidrs", token_bound_cidrs)
92
+ if token_explicit_max_ttl is not None:
93
+ pulumi.set(__self__, "token_explicit_max_ttl", token_explicit_max_ttl)
94
+ if token_max_ttl is not None:
95
+ pulumi.set(__self__, "token_max_ttl", token_max_ttl)
96
+ if token_no_default_policy is not None:
97
+ pulumi.set(__self__, "token_no_default_policy", token_no_default_policy)
98
+ if token_num_uses is not None:
99
+ pulumi.set(__self__, "token_num_uses", token_num_uses)
100
+ if token_period is not None:
101
+ pulumi.set(__self__, "token_period", token_period)
102
+ if token_policies is not None:
103
+ pulumi.set(__self__, "token_policies", token_policies)
104
+ if token_ttl is not None:
105
+ pulumi.set(__self__, "token_ttl", token_ttl)
106
+ if token_type is not None:
107
+ pulumi.set(__self__, "token_type", token_type)
108
+
109
+ @_builtins.property
110
+ @pulumi.getter(name="roleName")
111
+ def role_name(self) -> pulumi.Input[_builtins.str]:
112
+ """
113
+ The name of the role.
114
+ """
115
+ return pulumi.get(self, "role_name")
116
+
117
+ @role_name.setter
118
+ def role_name(self, value: pulumi.Input[_builtins.str]):
119
+ pulumi.set(self, "role_name", value)
120
+
121
+ @_builtins.property
122
+ @pulumi.getter(name="aliasMetadata")
123
+ def alias_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
124
+ """
125
+ The metadata to be tied to generated entity alias.
126
+ This should be a list or map containing the metadata in key value pairs.
127
+ """
128
+ return pulumi.get(self, "alias_metadata")
129
+
130
+ @alias_metadata.setter
131
+ def alias_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
132
+ pulumi.set(self, "alias_metadata", value)
133
+
134
+ @_builtins.property
135
+ @pulumi.getter(name="allowedEntityAliases")
136
+ def allowed_entity_aliases(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
137
+ """
138
+ List of allowed entity aliases.
139
+ """
140
+ return pulumi.get(self, "allowed_entity_aliases")
141
+
142
+ @allowed_entity_aliases.setter
143
+ def allowed_entity_aliases(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
144
+ pulumi.set(self, "allowed_entity_aliases", value)
145
+
146
+ @_builtins.property
147
+ @pulumi.getter(name="allowedPolicies")
148
+ def allowed_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
149
+ """
150
+ List of allowed policies for given role.
151
+ """
152
+ return pulumi.get(self, "allowed_policies")
153
+
154
+ @allowed_policies.setter
155
+ def allowed_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
156
+ pulumi.set(self, "allowed_policies", value)
157
+
158
+ @_builtins.property
159
+ @pulumi.getter(name="allowedPoliciesGlobs")
160
+ def allowed_policies_globs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
161
+ """
162
+ Set of allowed policies with glob match for given role.
163
+ """
164
+ return pulumi.get(self, "allowed_policies_globs")
165
+
166
+ @allowed_policies_globs.setter
167
+ def allowed_policies_globs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
168
+ pulumi.set(self, "allowed_policies_globs", value)
169
+
170
+ @_builtins.property
171
+ @pulumi.getter(name="disallowedPolicies")
172
+ def disallowed_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
173
+ """
174
+ List of disallowed policies for given role.
175
+ """
176
+ return pulumi.get(self, "disallowed_policies")
177
+
178
+ @disallowed_policies.setter
179
+ def disallowed_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
180
+ pulumi.set(self, "disallowed_policies", value)
181
+
182
+ @_builtins.property
183
+ @pulumi.getter(name="disallowedPoliciesGlobs")
184
+ def disallowed_policies_globs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
185
+ """
186
+ Set of disallowed policies with glob match for given role.
187
+ """
188
+ return pulumi.get(self, "disallowed_policies_globs")
189
+
190
+ @disallowed_policies_globs.setter
191
+ def disallowed_policies_globs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
192
+ pulumi.set(self, "disallowed_policies_globs", value)
193
+
194
+ @_builtins.property
195
+ @pulumi.getter
196
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
197
+ """
198
+ The namespace to provision the resource in.
199
+ The value should not contain leading or trailing forward slashes.
200
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
201
+ *Available only for Vault Enterprise*.
202
+ """
203
+ return pulumi.get(self, "namespace")
204
+
205
+ @namespace.setter
206
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
207
+ pulumi.set(self, "namespace", value)
208
+
209
+ @_builtins.property
210
+ @pulumi.getter
211
+ def orphan(self) -> Optional[pulumi.Input[_builtins.bool]]:
212
+ """
213
+ If true, tokens created against this policy will be orphan tokens.
214
+ """
215
+ return pulumi.get(self, "orphan")
216
+
217
+ @orphan.setter
218
+ def orphan(self, value: Optional[pulumi.Input[_builtins.bool]]):
219
+ pulumi.set(self, "orphan", value)
220
+
221
+ @_builtins.property
222
+ @pulumi.getter(name="pathSuffix")
223
+ def path_suffix(self) -> Optional[pulumi.Input[_builtins.str]]:
224
+ """
225
+ Tokens created against this role will have the given suffix as part of their path in addition to the role name.
226
+ """
227
+ return pulumi.get(self, "path_suffix")
228
+
229
+ @path_suffix.setter
230
+ def path_suffix(self, value: Optional[pulumi.Input[_builtins.str]]):
231
+ pulumi.set(self, "path_suffix", value)
232
+
233
+ @_builtins.property
234
+ @pulumi.getter
235
+ def renewable(self) -> Optional[pulumi.Input[_builtins.bool]]:
236
+ """
237
+ Whether to disable the ability of the token to be renewed past its initial TTL.
238
+ """
239
+ return pulumi.get(self, "renewable")
240
+
241
+ @renewable.setter
242
+ def renewable(self, value: Optional[pulumi.Input[_builtins.bool]]):
243
+ pulumi.set(self, "renewable", value)
244
+
245
+ @_builtins.property
246
+ @pulumi.getter(name="tokenBoundCidrs")
247
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
248
+ """
249
+ Specifies the blocks of IP addresses which are allowed to use the generated token
250
+ """
251
+ return pulumi.get(self, "token_bound_cidrs")
252
+
253
+ @token_bound_cidrs.setter
254
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
255
+ pulumi.set(self, "token_bound_cidrs", value)
256
+
257
+ @_builtins.property
258
+ @pulumi.getter(name="tokenExplicitMaxTtl")
259
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
260
+ """
261
+ Generated Token's Explicit Maximum TTL in seconds
262
+ """
263
+ return pulumi.get(self, "token_explicit_max_ttl")
264
+
265
+ @token_explicit_max_ttl.setter
266
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
267
+ pulumi.set(self, "token_explicit_max_ttl", value)
268
+
269
+ @_builtins.property
270
+ @pulumi.getter(name="tokenMaxTtl")
271
+ def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
272
+ """
273
+ The maximum lifetime of the generated token
274
+ """
275
+ return pulumi.get(self, "token_max_ttl")
276
+
277
+ @token_max_ttl.setter
278
+ def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
279
+ pulumi.set(self, "token_max_ttl", value)
280
+
281
+ @_builtins.property
282
+ @pulumi.getter(name="tokenNoDefaultPolicy")
283
+ def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
284
+ """
285
+ If true, the 'default' policy will not automatically be added to generated tokens
286
+ """
287
+ return pulumi.get(self, "token_no_default_policy")
288
+
289
+ @token_no_default_policy.setter
290
+ def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
291
+ pulumi.set(self, "token_no_default_policy", value)
292
+
293
+ @_builtins.property
294
+ @pulumi.getter(name="tokenNumUses")
295
+ def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
296
+ """
297
+ The maximum number of times a token may be used, a value of zero means unlimited
298
+ """
299
+ return pulumi.get(self, "token_num_uses")
300
+
301
+ @token_num_uses.setter
302
+ def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
303
+ pulumi.set(self, "token_num_uses", value)
304
+
305
+ @_builtins.property
306
+ @pulumi.getter(name="tokenPeriod")
307
+ def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
308
+ """
309
+ Generated Token's Period
310
+ """
311
+ return pulumi.get(self, "token_period")
312
+
313
+ @token_period.setter
314
+ def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
315
+ pulumi.set(self, "token_period", value)
316
+
317
+ @_builtins.property
318
+ @pulumi.getter(name="tokenPolicies")
319
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
320
+ """
321
+ Generated Token's Policies
322
+ """
323
+ return pulumi.get(self, "token_policies")
324
+
325
+ @token_policies.setter
326
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
327
+ pulumi.set(self, "token_policies", value)
328
+
329
+ @_builtins.property
330
+ @pulumi.getter(name="tokenTtl")
331
+ def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
332
+ """
333
+ The initial ttl of the token to generate in seconds
334
+ """
335
+ return pulumi.get(self, "token_ttl")
336
+
337
+ @token_ttl.setter
338
+ def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
339
+ pulumi.set(self, "token_ttl", value)
340
+
341
+ @_builtins.property
342
+ @pulumi.getter(name="tokenType")
343
+ def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
344
+ """
345
+ The type of token to generate, service or batch
346
+ """
347
+ return pulumi.get(self, "token_type")
348
+
349
+ @token_type.setter
350
+ def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
351
+ pulumi.set(self, "token_type", value)
352
+
353
+
354
+ @pulumi.input_type
355
+ class _AuthBackendRoleState:
356
+ def __init__(__self__, *,
357
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
358
+ allowed_entity_aliases: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
359
+ allowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
360
+ allowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
361
+ disallowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
362
+ disallowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
363
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
364
+ orphan: Optional[pulumi.Input[_builtins.bool]] = None,
365
+ path_suffix: Optional[pulumi.Input[_builtins.str]] = None,
366
+ renewable: Optional[pulumi.Input[_builtins.bool]] = None,
367
+ role_name: Optional[pulumi.Input[_builtins.str]] = None,
368
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
369
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
370
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
371
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
372
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
373
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
374
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
375
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
376
+ token_type: Optional[pulumi.Input[_builtins.str]] = None):
377
+ """
378
+ Input properties used for looking up and filtering AuthBackendRole resources.
379
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
380
+ This should be a list or map containing the metadata in key value pairs.
381
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_entity_aliases: List of allowed entity aliases.
382
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_policies: List of allowed policies for given role.
383
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_policies_globs: Set of allowed policies with glob match for given role.
384
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] disallowed_policies: List of disallowed policies for given role.
385
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] disallowed_policies_globs: Set of disallowed policies with glob match for given role.
386
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
387
+ The value should not contain leading or trailing forward slashes.
388
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
389
+ *Available only for Vault Enterprise*.
390
+ :param pulumi.Input[_builtins.bool] orphan: If true, tokens created against this policy will be orphan tokens.
391
+ :param pulumi.Input[_builtins.str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
392
+ :param pulumi.Input[_builtins.bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
393
+ :param pulumi.Input[_builtins.str] role_name: The name of the role.
394
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
395
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
396
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
397
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
398
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
399
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
400
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
401
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
402
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
403
+ """
404
+ if alias_metadata is not None:
405
+ pulumi.set(__self__, "alias_metadata", alias_metadata)
406
+ if allowed_entity_aliases is not None:
407
+ pulumi.set(__self__, "allowed_entity_aliases", allowed_entity_aliases)
408
+ if allowed_policies is not None:
409
+ pulumi.set(__self__, "allowed_policies", allowed_policies)
410
+ if allowed_policies_globs is not None:
411
+ pulumi.set(__self__, "allowed_policies_globs", allowed_policies_globs)
412
+ if disallowed_policies is not None:
413
+ pulumi.set(__self__, "disallowed_policies", disallowed_policies)
414
+ if disallowed_policies_globs is not None:
415
+ pulumi.set(__self__, "disallowed_policies_globs", disallowed_policies_globs)
416
+ if namespace is not None:
417
+ pulumi.set(__self__, "namespace", namespace)
418
+ if orphan is not None:
419
+ pulumi.set(__self__, "orphan", orphan)
420
+ if path_suffix is not None:
421
+ pulumi.set(__self__, "path_suffix", path_suffix)
422
+ if renewable is not None:
423
+ pulumi.set(__self__, "renewable", renewable)
424
+ if role_name is not None:
425
+ pulumi.set(__self__, "role_name", role_name)
426
+ if token_bound_cidrs is not None:
427
+ pulumi.set(__self__, "token_bound_cidrs", token_bound_cidrs)
428
+ if token_explicit_max_ttl is not None:
429
+ pulumi.set(__self__, "token_explicit_max_ttl", token_explicit_max_ttl)
430
+ if token_max_ttl is not None:
431
+ pulumi.set(__self__, "token_max_ttl", token_max_ttl)
432
+ if token_no_default_policy is not None:
433
+ pulumi.set(__self__, "token_no_default_policy", token_no_default_policy)
434
+ if token_num_uses is not None:
435
+ pulumi.set(__self__, "token_num_uses", token_num_uses)
436
+ if token_period is not None:
437
+ pulumi.set(__self__, "token_period", token_period)
438
+ if token_policies is not None:
439
+ pulumi.set(__self__, "token_policies", token_policies)
440
+ if token_ttl is not None:
441
+ pulumi.set(__self__, "token_ttl", token_ttl)
442
+ if token_type is not None:
443
+ pulumi.set(__self__, "token_type", token_type)
444
+
445
+ @_builtins.property
446
+ @pulumi.getter(name="aliasMetadata")
447
+ def alias_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
448
+ """
449
+ The metadata to be tied to generated entity alias.
450
+ This should be a list or map containing the metadata in key value pairs.
451
+ """
452
+ return pulumi.get(self, "alias_metadata")
453
+
454
+ @alias_metadata.setter
455
+ def alias_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
456
+ pulumi.set(self, "alias_metadata", value)
457
+
458
+ @_builtins.property
459
+ @pulumi.getter(name="allowedEntityAliases")
460
+ def allowed_entity_aliases(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
461
+ """
462
+ List of allowed entity aliases.
463
+ """
464
+ return pulumi.get(self, "allowed_entity_aliases")
465
+
466
+ @allowed_entity_aliases.setter
467
+ def allowed_entity_aliases(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
468
+ pulumi.set(self, "allowed_entity_aliases", value)
469
+
470
+ @_builtins.property
471
+ @pulumi.getter(name="allowedPolicies")
472
+ def allowed_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
473
+ """
474
+ List of allowed policies for given role.
475
+ """
476
+ return pulumi.get(self, "allowed_policies")
477
+
478
+ @allowed_policies.setter
479
+ def allowed_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
480
+ pulumi.set(self, "allowed_policies", value)
481
+
482
+ @_builtins.property
483
+ @pulumi.getter(name="allowedPoliciesGlobs")
484
+ def allowed_policies_globs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
485
+ """
486
+ Set of allowed policies with glob match for given role.
487
+ """
488
+ return pulumi.get(self, "allowed_policies_globs")
489
+
490
+ @allowed_policies_globs.setter
491
+ def allowed_policies_globs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
492
+ pulumi.set(self, "allowed_policies_globs", value)
493
+
494
+ @_builtins.property
495
+ @pulumi.getter(name="disallowedPolicies")
496
+ def disallowed_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
497
+ """
498
+ List of disallowed policies for given role.
499
+ """
500
+ return pulumi.get(self, "disallowed_policies")
501
+
502
+ @disallowed_policies.setter
503
+ def disallowed_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
504
+ pulumi.set(self, "disallowed_policies", value)
505
+
506
+ @_builtins.property
507
+ @pulumi.getter(name="disallowedPoliciesGlobs")
508
+ def disallowed_policies_globs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
509
+ """
510
+ Set of disallowed policies with glob match for given role.
511
+ """
512
+ return pulumi.get(self, "disallowed_policies_globs")
513
+
514
+ @disallowed_policies_globs.setter
515
+ def disallowed_policies_globs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
516
+ pulumi.set(self, "disallowed_policies_globs", value)
517
+
518
+ @_builtins.property
519
+ @pulumi.getter
520
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
521
+ """
522
+ The namespace to provision the resource in.
523
+ The value should not contain leading or trailing forward slashes.
524
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
525
+ *Available only for Vault Enterprise*.
526
+ """
527
+ return pulumi.get(self, "namespace")
528
+
529
+ @namespace.setter
530
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
531
+ pulumi.set(self, "namespace", value)
532
+
533
+ @_builtins.property
534
+ @pulumi.getter
535
+ def orphan(self) -> Optional[pulumi.Input[_builtins.bool]]:
536
+ """
537
+ If true, tokens created against this policy will be orphan tokens.
538
+ """
539
+ return pulumi.get(self, "orphan")
540
+
541
+ @orphan.setter
542
+ def orphan(self, value: Optional[pulumi.Input[_builtins.bool]]):
543
+ pulumi.set(self, "orphan", value)
544
+
545
+ @_builtins.property
546
+ @pulumi.getter(name="pathSuffix")
547
+ def path_suffix(self) -> Optional[pulumi.Input[_builtins.str]]:
548
+ """
549
+ Tokens created against this role will have the given suffix as part of their path in addition to the role name.
550
+ """
551
+ return pulumi.get(self, "path_suffix")
552
+
553
+ @path_suffix.setter
554
+ def path_suffix(self, value: Optional[pulumi.Input[_builtins.str]]):
555
+ pulumi.set(self, "path_suffix", value)
556
+
557
+ @_builtins.property
558
+ @pulumi.getter
559
+ def renewable(self) -> Optional[pulumi.Input[_builtins.bool]]:
560
+ """
561
+ Whether to disable the ability of the token to be renewed past its initial TTL.
562
+ """
563
+ return pulumi.get(self, "renewable")
564
+
565
+ @renewable.setter
566
+ def renewable(self, value: Optional[pulumi.Input[_builtins.bool]]):
567
+ pulumi.set(self, "renewable", value)
568
+
569
+ @_builtins.property
570
+ @pulumi.getter(name="roleName")
571
+ def role_name(self) -> Optional[pulumi.Input[_builtins.str]]:
572
+ """
573
+ The name of the role.
574
+ """
575
+ return pulumi.get(self, "role_name")
576
+
577
+ @role_name.setter
578
+ def role_name(self, value: Optional[pulumi.Input[_builtins.str]]):
579
+ pulumi.set(self, "role_name", value)
580
+
581
+ @_builtins.property
582
+ @pulumi.getter(name="tokenBoundCidrs")
583
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
584
+ """
585
+ Specifies the blocks of IP addresses which are allowed to use the generated token
586
+ """
587
+ return pulumi.get(self, "token_bound_cidrs")
588
+
589
+ @token_bound_cidrs.setter
590
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
591
+ pulumi.set(self, "token_bound_cidrs", value)
592
+
593
+ @_builtins.property
594
+ @pulumi.getter(name="tokenExplicitMaxTtl")
595
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
596
+ """
597
+ Generated Token's Explicit Maximum TTL in seconds
598
+ """
599
+ return pulumi.get(self, "token_explicit_max_ttl")
600
+
601
+ @token_explicit_max_ttl.setter
602
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
603
+ pulumi.set(self, "token_explicit_max_ttl", value)
604
+
605
+ @_builtins.property
606
+ @pulumi.getter(name="tokenMaxTtl")
607
+ def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
608
+ """
609
+ The maximum lifetime of the generated token
610
+ """
611
+ return pulumi.get(self, "token_max_ttl")
612
+
613
+ @token_max_ttl.setter
614
+ def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
615
+ pulumi.set(self, "token_max_ttl", value)
616
+
617
+ @_builtins.property
618
+ @pulumi.getter(name="tokenNoDefaultPolicy")
619
+ def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
620
+ """
621
+ If true, the 'default' policy will not automatically be added to generated tokens
622
+ """
623
+ return pulumi.get(self, "token_no_default_policy")
624
+
625
+ @token_no_default_policy.setter
626
+ def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
627
+ pulumi.set(self, "token_no_default_policy", value)
628
+
629
+ @_builtins.property
630
+ @pulumi.getter(name="tokenNumUses")
631
+ def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
632
+ """
633
+ The maximum number of times a token may be used, a value of zero means unlimited
634
+ """
635
+ return pulumi.get(self, "token_num_uses")
636
+
637
+ @token_num_uses.setter
638
+ def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
639
+ pulumi.set(self, "token_num_uses", value)
640
+
641
+ @_builtins.property
642
+ @pulumi.getter(name="tokenPeriod")
643
+ def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
644
+ """
645
+ Generated Token's Period
646
+ """
647
+ return pulumi.get(self, "token_period")
648
+
649
+ @token_period.setter
650
+ def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
651
+ pulumi.set(self, "token_period", value)
652
+
653
+ @_builtins.property
654
+ @pulumi.getter(name="tokenPolicies")
655
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
656
+ """
657
+ Generated Token's Policies
658
+ """
659
+ return pulumi.get(self, "token_policies")
660
+
661
+ @token_policies.setter
662
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
663
+ pulumi.set(self, "token_policies", value)
664
+
665
+ @_builtins.property
666
+ @pulumi.getter(name="tokenTtl")
667
+ def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
668
+ """
669
+ The initial ttl of the token to generate in seconds
670
+ """
671
+ return pulumi.get(self, "token_ttl")
672
+
673
+ @token_ttl.setter
674
+ def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
675
+ pulumi.set(self, "token_ttl", value)
676
+
677
+ @_builtins.property
678
+ @pulumi.getter(name="tokenType")
679
+ def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
680
+ """
681
+ The type of token to generate, service or batch
682
+ """
683
+ return pulumi.get(self, "token_type")
684
+
685
+ @token_type.setter
686
+ def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
687
+ pulumi.set(self, "token_type", value)
688
+
689
+
690
+ @pulumi.type_token("vault:tokenauth/authBackendRole:AuthBackendRole")
691
+ class AuthBackendRole(pulumi.CustomResource):
692
+ @overload
693
+ def __init__(__self__,
694
+ resource_name: str,
695
+ opts: Optional[pulumi.ResourceOptions] = None,
696
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
697
+ allowed_entity_aliases: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
698
+ allowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
699
+ allowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
700
+ disallowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
701
+ disallowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
702
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
703
+ orphan: Optional[pulumi.Input[_builtins.bool]] = None,
704
+ path_suffix: Optional[pulumi.Input[_builtins.str]] = None,
705
+ renewable: Optional[pulumi.Input[_builtins.bool]] = None,
706
+ role_name: Optional[pulumi.Input[_builtins.str]] = None,
707
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
708
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
709
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
710
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
711
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
712
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
713
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
714
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
715
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
716
+ __props__=None):
717
+ """
718
+ Manages Token auth backend role in a Vault server. See the [Vault
719
+ documentation](https://www.vaultproject.io/docs/auth/token.html) for more
720
+ information.
721
+
722
+ ## Example Usage
723
+
724
+ ```python
725
+ import pulumi
726
+ import pulumi_vault as vault
727
+
728
+ example = vault.tokenauth.AuthBackendRole("example",
729
+ role_name="my-role",
730
+ allowed_policies=[
731
+ "dev",
732
+ "test",
733
+ ],
734
+ disallowed_policies=["default"],
735
+ allowed_entity_aliases=["test_entity"],
736
+ orphan=True,
737
+ token_period=86400,
738
+ renewable=True,
739
+ token_explicit_max_ttl=115200,
740
+ path_suffix="path-suffix")
741
+ ```
742
+
743
+ ## Import
744
+
745
+ Token auth backend roles can be imported with `auth/token/roles/` followed by the `role_name`, e.g.
746
+
747
+ ```sh
748
+ $ pulumi import vault:tokenauth/authBackendRole:AuthBackendRole example auth/token/roles/my-role
749
+ ```
750
+
751
+ :param str resource_name: The name of the resource.
752
+ :param pulumi.ResourceOptions opts: Options for the resource.
753
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
754
+ This should be a list or map containing the metadata in key value pairs.
755
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_entity_aliases: List of allowed entity aliases.
756
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_policies: List of allowed policies for given role.
757
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_policies_globs: Set of allowed policies with glob match for given role.
758
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] disallowed_policies: List of disallowed policies for given role.
759
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] disallowed_policies_globs: Set of disallowed policies with glob match for given role.
760
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
761
+ The value should not contain leading or trailing forward slashes.
762
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
763
+ *Available only for Vault Enterprise*.
764
+ :param pulumi.Input[_builtins.bool] orphan: If true, tokens created against this policy will be orphan tokens.
765
+ :param pulumi.Input[_builtins.str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
766
+ :param pulumi.Input[_builtins.bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
767
+ :param pulumi.Input[_builtins.str] role_name: The name of the role.
768
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
769
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
770
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
771
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
772
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
773
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
774
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
775
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
776
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
777
+ """
778
+ ...
779
+ @overload
780
+ def __init__(__self__,
781
+ resource_name: str,
782
+ args: AuthBackendRoleArgs,
783
+ opts: Optional[pulumi.ResourceOptions] = None):
784
+ """
785
+ Manages Token auth backend role in a Vault server. See the [Vault
786
+ documentation](https://www.vaultproject.io/docs/auth/token.html) for more
787
+ information.
788
+
789
+ ## Example Usage
790
+
791
+ ```python
792
+ import pulumi
793
+ import pulumi_vault as vault
794
+
795
+ example = vault.tokenauth.AuthBackendRole("example",
796
+ role_name="my-role",
797
+ allowed_policies=[
798
+ "dev",
799
+ "test",
800
+ ],
801
+ disallowed_policies=["default"],
802
+ allowed_entity_aliases=["test_entity"],
803
+ orphan=True,
804
+ token_period=86400,
805
+ renewable=True,
806
+ token_explicit_max_ttl=115200,
807
+ path_suffix="path-suffix")
808
+ ```
809
+
810
+ ## Import
811
+
812
+ Token auth backend roles can be imported with `auth/token/roles/` followed by the `role_name`, e.g.
813
+
814
+ ```sh
815
+ $ pulumi import vault:tokenauth/authBackendRole:AuthBackendRole example auth/token/roles/my-role
816
+ ```
817
+
818
+ :param str resource_name: The name of the resource.
819
+ :param AuthBackendRoleArgs args: The arguments to use to populate this resource's properties.
820
+ :param pulumi.ResourceOptions opts: Options for the resource.
821
+ """
822
+ ...
823
+ def __init__(__self__, resource_name: str, *args, **kwargs):
824
+ resource_args, opts = _utilities.get_resource_args_opts(AuthBackendRoleArgs, pulumi.ResourceOptions, *args, **kwargs)
825
+ if resource_args is not None:
826
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
827
+ else:
828
+ __self__._internal_init(resource_name, *args, **kwargs)
829
+
830
+ def _internal_init(__self__,
831
+ resource_name: str,
832
+ opts: Optional[pulumi.ResourceOptions] = None,
833
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
834
+ allowed_entity_aliases: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
835
+ allowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
836
+ allowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
837
+ disallowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
838
+ disallowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
839
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
840
+ orphan: Optional[pulumi.Input[_builtins.bool]] = None,
841
+ path_suffix: Optional[pulumi.Input[_builtins.str]] = None,
842
+ renewable: Optional[pulumi.Input[_builtins.bool]] = None,
843
+ role_name: Optional[pulumi.Input[_builtins.str]] = None,
844
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
845
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
846
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
847
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
848
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
849
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
850
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
851
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
852
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
853
+ __props__=None):
854
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
855
+ if not isinstance(opts, pulumi.ResourceOptions):
856
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
857
+ if opts.id is None:
858
+ if __props__ is not None:
859
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
860
+ __props__ = AuthBackendRoleArgs.__new__(AuthBackendRoleArgs)
861
+
862
+ __props__.__dict__["alias_metadata"] = alias_metadata
863
+ __props__.__dict__["allowed_entity_aliases"] = allowed_entity_aliases
864
+ __props__.__dict__["allowed_policies"] = allowed_policies
865
+ __props__.__dict__["allowed_policies_globs"] = allowed_policies_globs
866
+ __props__.__dict__["disallowed_policies"] = disallowed_policies
867
+ __props__.__dict__["disallowed_policies_globs"] = disallowed_policies_globs
868
+ __props__.__dict__["namespace"] = namespace
869
+ __props__.__dict__["orphan"] = orphan
870
+ __props__.__dict__["path_suffix"] = path_suffix
871
+ __props__.__dict__["renewable"] = renewable
872
+ if role_name is None and not opts.urn:
873
+ raise TypeError("Missing required property 'role_name'")
874
+ __props__.__dict__["role_name"] = role_name
875
+ __props__.__dict__["token_bound_cidrs"] = token_bound_cidrs
876
+ __props__.__dict__["token_explicit_max_ttl"] = token_explicit_max_ttl
877
+ __props__.__dict__["token_max_ttl"] = token_max_ttl
878
+ __props__.__dict__["token_no_default_policy"] = token_no_default_policy
879
+ __props__.__dict__["token_num_uses"] = token_num_uses
880
+ __props__.__dict__["token_period"] = token_period
881
+ __props__.__dict__["token_policies"] = token_policies
882
+ __props__.__dict__["token_ttl"] = token_ttl
883
+ __props__.__dict__["token_type"] = token_type
884
+ super(AuthBackendRole, __self__).__init__(
885
+ 'vault:tokenauth/authBackendRole:AuthBackendRole',
886
+ resource_name,
887
+ __props__,
888
+ opts)
889
+
890
+ @staticmethod
891
+ def get(resource_name: str,
892
+ id: pulumi.Input[str],
893
+ opts: Optional[pulumi.ResourceOptions] = None,
894
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
895
+ allowed_entity_aliases: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
896
+ allowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
897
+ allowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
898
+ disallowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
899
+ disallowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
900
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
901
+ orphan: Optional[pulumi.Input[_builtins.bool]] = None,
902
+ path_suffix: Optional[pulumi.Input[_builtins.str]] = None,
903
+ renewable: Optional[pulumi.Input[_builtins.bool]] = None,
904
+ role_name: Optional[pulumi.Input[_builtins.str]] = None,
905
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
906
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
907
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
908
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
909
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
910
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
911
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
912
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
913
+ token_type: Optional[pulumi.Input[_builtins.str]] = None) -> 'AuthBackendRole':
914
+ """
915
+ Get an existing AuthBackendRole resource's state with the given name, id, and optional extra
916
+ properties used to qualify the lookup.
917
+
918
+ :param str resource_name: The unique name of the resulting resource.
919
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
920
+ :param pulumi.ResourceOptions opts: Options for the resource.
921
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
922
+ This should be a list or map containing the metadata in key value pairs.
923
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_entity_aliases: List of allowed entity aliases.
924
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_policies: List of allowed policies for given role.
925
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_policies_globs: Set of allowed policies with glob match for given role.
926
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] disallowed_policies: List of disallowed policies for given role.
927
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] disallowed_policies_globs: Set of disallowed policies with glob match for given role.
928
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
929
+ The value should not contain leading or trailing forward slashes.
930
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
931
+ *Available only for Vault Enterprise*.
932
+ :param pulumi.Input[_builtins.bool] orphan: If true, tokens created against this policy will be orphan tokens.
933
+ :param pulumi.Input[_builtins.str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
934
+ :param pulumi.Input[_builtins.bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
935
+ :param pulumi.Input[_builtins.str] role_name: The name of the role.
936
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
937
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
938
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
939
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
940
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
941
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
942
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
943
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
944
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
945
+ """
946
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
947
+
948
+ __props__ = _AuthBackendRoleState.__new__(_AuthBackendRoleState)
949
+
950
+ __props__.__dict__["alias_metadata"] = alias_metadata
951
+ __props__.__dict__["allowed_entity_aliases"] = allowed_entity_aliases
952
+ __props__.__dict__["allowed_policies"] = allowed_policies
953
+ __props__.__dict__["allowed_policies_globs"] = allowed_policies_globs
954
+ __props__.__dict__["disallowed_policies"] = disallowed_policies
955
+ __props__.__dict__["disallowed_policies_globs"] = disallowed_policies_globs
956
+ __props__.__dict__["namespace"] = namespace
957
+ __props__.__dict__["orphan"] = orphan
958
+ __props__.__dict__["path_suffix"] = path_suffix
959
+ __props__.__dict__["renewable"] = renewable
960
+ __props__.__dict__["role_name"] = role_name
961
+ __props__.__dict__["token_bound_cidrs"] = token_bound_cidrs
962
+ __props__.__dict__["token_explicit_max_ttl"] = token_explicit_max_ttl
963
+ __props__.__dict__["token_max_ttl"] = token_max_ttl
964
+ __props__.__dict__["token_no_default_policy"] = token_no_default_policy
965
+ __props__.__dict__["token_num_uses"] = token_num_uses
966
+ __props__.__dict__["token_period"] = token_period
967
+ __props__.__dict__["token_policies"] = token_policies
968
+ __props__.__dict__["token_ttl"] = token_ttl
969
+ __props__.__dict__["token_type"] = token_type
970
+ return AuthBackendRole(resource_name, opts=opts, __props__=__props__)
971
+
972
+ @_builtins.property
973
+ @pulumi.getter(name="aliasMetadata")
974
+ def alias_metadata(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
975
+ """
976
+ The metadata to be tied to generated entity alias.
977
+ This should be a list or map containing the metadata in key value pairs.
978
+ """
979
+ return pulumi.get(self, "alias_metadata")
980
+
981
+ @_builtins.property
982
+ @pulumi.getter(name="allowedEntityAliases")
983
+ def allowed_entity_aliases(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
984
+ """
985
+ List of allowed entity aliases.
986
+ """
987
+ return pulumi.get(self, "allowed_entity_aliases")
988
+
989
+ @_builtins.property
990
+ @pulumi.getter(name="allowedPolicies")
991
+ def allowed_policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
992
+ """
993
+ List of allowed policies for given role.
994
+ """
995
+ return pulumi.get(self, "allowed_policies")
996
+
997
+ @_builtins.property
998
+ @pulumi.getter(name="allowedPoliciesGlobs")
999
+ def allowed_policies_globs(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1000
+ """
1001
+ Set of allowed policies with glob match for given role.
1002
+ """
1003
+ return pulumi.get(self, "allowed_policies_globs")
1004
+
1005
+ @_builtins.property
1006
+ @pulumi.getter(name="disallowedPolicies")
1007
+ def disallowed_policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1008
+ """
1009
+ List of disallowed policies for given role.
1010
+ """
1011
+ return pulumi.get(self, "disallowed_policies")
1012
+
1013
+ @_builtins.property
1014
+ @pulumi.getter(name="disallowedPoliciesGlobs")
1015
+ def disallowed_policies_globs(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1016
+ """
1017
+ Set of disallowed policies with glob match for given role.
1018
+ """
1019
+ return pulumi.get(self, "disallowed_policies_globs")
1020
+
1021
+ @_builtins.property
1022
+ @pulumi.getter
1023
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
1024
+ """
1025
+ The namespace to provision the resource in.
1026
+ The value should not contain leading or trailing forward slashes.
1027
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1028
+ *Available only for Vault Enterprise*.
1029
+ """
1030
+ return pulumi.get(self, "namespace")
1031
+
1032
+ @_builtins.property
1033
+ @pulumi.getter
1034
+ def orphan(self) -> pulumi.Output[Optional[_builtins.bool]]:
1035
+ """
1036
+ If true, tokens created against this policy will be orphan tokens.
1037
+ """
1038
+ return pulumi.get(self, "orphan")
1039
+
1040
+ @_builtins.property
1041
+ @pulumi.getter(name="pathSuffix")
1042
+ def path_suffix(self) -> pulumi.Output[Optional[_builtins.str]]:
1043
+ """
1044
+ Tokens created against this role will have the given suffix as part of their path in addition to the role name.
1045
+ """
1046
+ return pulumi.get(self, "path_suffix")
1047
+
1048
+ @_builtins.property
1049
+ @pulumi.getter
1050
+ def renewable(self) -> pulumi.Output[Optional[_builtins.bool]]:
1051
+ """
1052
+ Whether to disable the ability of the token to be renewed past its initial TTL.
1053
+ """
1054
+ return pulumi.get(self, "renewable")
1055
+
1056
+ @_builtins.property
1057
+ @pulumi.getter(name="roleName")
1058
+ def role_name(self) -> pulumi.Output[_builtins.str]:
1059
+ """
1060
+ The name of the role.
1061
+ """
1062
+ return pulumi.get(self, "role_name")
1063
+
1064
+ @_builtins.property
1065
+ @pulumi.getter(name="tokenBoundCidrs")
1066
+ def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1067
+ """
1068
+ Specifies the blocks of IP addresses which are allowed to use the generated token
1069
+ """
1070
+ return pulumi.get(self, "token_bound_cidrs")
1071
+
1072
+ @_builtins.property
1073
+ @pulumi.getter(name="tokenExplicitMaxTtl")
1074
+ def token_explicit_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1075
+ """
1076
+ Generated Token's Explicit Maximum TTL in seconds
1077
+ """
1078
+ return pulumi.get(self, "token_explicit_max_ttl")
1079
+
1080
+ @_builtins.property
1081
+ @pulumi.getter(name="tokenMaxTtl")
1082
+ def token_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1083
+ """
1084
+ The maximum lifetime of the generated token
1085
+ """
1086
+ return pulumi.get(self, "token_max_ttl")
1087
+
1088
+ @_builtins.property
1089
+ @pulumi.getter(name="tokenNoDefaultPolicy")
1090
+ def token_no_default_policy(self) -> pulumi.Output[Optional[_builtins.bool]]:
1091
+ """
1092
+ If true, the 'default' policy will not automatically be added to generated tokens
1093
+ """
1094
+ return pulumi.get(self, "token_no_default_policy")
1095
+
1096
+ @_builtins.property
1097
+ @pulumi.getter(name="tokenNumUses")
1098
+ def token_num_uses(self) -> pulumi.Output[Optional[_builtins.int]]:
1099
+ """
1100
+ The maximum number of times a token may be used, a value of zero means unlimited
1101
+ """
1102
+ return pulumi.get(self, "token_num_uses")
1103
+
1104
+ @_builtins.property
1105
+ @pulumi.getter(name="tokenPeriod")
1106
+ def token_period(self) -> pulumi.Output[Optional[_builtins.int]]:
1107
+ """
1108
+ Generated Token's Period
1109
+ """
1110
+ return pulumi.get(self, "token_period")
1111
+
1112
+ @_builtins.property
1113
+ @pulumi.getter(name="tokenPolicies")
1114
+ def token_policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1115
+ """
1116
+ Generated Token's Policies
1117
+ """
1118
+ return pulumi.get(self, "token_policies")
1119
+
1120
+ @_builtins.property
1121
+ @pulumi.getter(name="tokenTtl")
1122
+ def token_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1123
+ """
1124
+ The initial ttl of the token to generate in seconds
1125
+ """
1126
+ return pulumi.get(self, "token_ttl")
1127
+
1128
+ @_builtins.property
1129
+ @pulumi.getter(name="tokenType")
1130
+ def token_type(self) -> pulumi.Output[Optional[_builtins.str]]:
1131
+ """
1132
+ The type of token to generate, service or batch
1133
+ """
1134
+ return pulumi.get(self, "token_type")
1135
+