pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,638 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['AuthBackendRoleTagArgs', 'AuthBackendRoleTag']
18
+
19
+ @pulumi.input_type
20
+ class AuthBackendRoleTagArgs:
21
+ def __init__(__self__, *,
22
+ role: pulumi.Input[_builtins.str],
23
+ allow_instance_migration: Optional[pulumi.Input[_builtins.bool]] = None,
24
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
25
+ disallow_reauthentication: Optional[pulumi.Input[_builtins.bool]] = None,
26
+ instance_id: Optional[pulumi.Input[_builtins.str]] = None,
27
+ max_ttl: Optional[pulumi.Input[_builtins.str]] = None,
28
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
29
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
30
+ """
31
+ The set of arguments for constructing a AuthBackendRoleTag resource.
32
+ :param pulumi.Input[_builtins.str] role: The name of the AWS auth backend role to read
33
+ role tags from, with no leading or trailing `/`s.
34
+ :param pulumi.Input[_builtins.bool] allow_instance_migration: If set, allows migration of the underlying instances where the client resides. Use with caution.
35
+ :param pulumi.Input[_builtins.str] backend: The path to the AWS auth backend to
36
+ read role tags from, with no leading or trailing `/`s. Defaults to "aws".
37
+ :param pulumi.Input[_builtins.bool] disallow_reauthentication: If set, only allows a single token to be granted per instance ID.
38
+ :param pulumi.Input[_builtins.str] instance_id: Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
39
+ :param pulumi.Input[_builtins.str] max_ttl: The maximum TTL of the tokens issued using this role.
40
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
41
+ The value should not contain leading or trailing forward slashes.
42
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
43
+ *Available only for Vault Enterprise*.
44
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: The policies to be associated with the tag. Must be a subset of the policies associated with the role.
45
+ """
46
+ pulumi.set(__self__, "role", role)
47
+ if allow_instance_migration is not None:
48
+ pulumi.set(__self__, "allow_instance_migration", allow_instance_migration)
49
+ if backend is not None:
50
+ pulumi.set(__self__, "backend", backend)
51
+ if disallow_reauthentication is not None:
52
+ pulumi.set(__self__, "disallow_reauthentication", disallow_reauthentication)
53
+ if instance_id is not None:
54
+ pulumi.set(__self__, "instance_id", instance_id)
55
+ if max_ttl is not None:
56
+ pulumi.set(__self__, "max_ttl", max_ttl)
57
+ if namespace is not None:
58
+ pulumi.set(__self__, "namespace", namespace)
59
+ if policies is not None:
60
+ pulumi.set(__self__, "policies", policies)
61
+
62
+ @_builtins.property
63
+ @pulumi.getter
64
+ def role(self) -> pulumi.Input[_builtins.str]:
65
+ """
66
+ The name of the AWS auth backend role to read
67
+ role tags from, with no leading or trailing `/`s.
68
+ """
69
+ return pulumi.get(self, "role")
70
+
71
+ @role.setter
72
+ def role(self, value: pulumi.Input[_builtins.str]):
73
+ pulumi.set(self, "role", value)
74
+
75
+ @_builtins.property
76
+ @pulumi.getter(name="allowInstanceMigration")
77
+ def allow_instance_migration(self) -> Optional[pulumi.Input[_builtins.bool]]:
78
+ """
79
+ If set, allows migration of the underlying instances where the client resides. Use with caution.
80
+ """
81
+ return pulumi.get(self, "allow_instance_migration")
82
+
83
+ @allow_instance_migration.setter
84
+ def allow_instance_migration(self, value: Optional[pulumi.Input[_builtins.bool]]):
85
+ pulumi.set(self, "allow_instance_migration", value)
86
+
87
+ @_builtins.property
88
+ @pulumi.getter
89
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
90
+ """
91
+ The path to the AWS auth backend to
92
+ read role tags from, with no leading or trailing `/`s. Defaults to "aws".
93
+ """
94
+ return pulumi.get(self, "backend")
95
+
96
+ @backend.setter
97
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
98
+ pulumi.set(self, "backend", value)
99
+
100
+ @_builtins.property
101
+ @pulumi.getter(name="disallowReauthentication")
102
+ def disallow_reauthentication(self) -> Optional[pulumi.Input[_builtins.bool]]:
103
+ """
104
+ If set, only allows a single token to be granted per instance ID.
105
+ """
106
+ return pulumi.get(self, "disallow_reauthentication")
107
+
108
+ @disallow_reauthentication.setter
109
+ def disallow_reauthentication(self, value: Optional[pulumi.Input[_builtins.bool]]):
110
+ pulumi.set(self, "disallow_reauthentication", value)
111
+
112
+ @_builtins.property
113
+ @pulumi.getter(name="instanceId")
114
+ def instance_id(self) -> Optional[pulumi.Input[_builtins.str]]:
115
+ """
116
+ Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
117
+ """
118
+ return pulumi.get(self, "instance_id")
119
+
120
+ @instance_id.setter
121
+ def instance_id(self, value: Optional[pulumi.Input[_builtins.str]]):
122
+ pulumi.set(self, "instance_id", value)
123
+
124
+ @_builtins.property
125
+ @pulumi.getter(name="maxTtl")
126
+ def max_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
127
+ """
128
+ The maximum TTL of the tokens issued using this role.
129
+ """
130
+ return pulumi.get(self, "max_ttl")
131
+
132
+ @max_ttl.setter
133
+ def max_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
134
+ pulumi.set(self, "max_ttl", value)
135
+
136
+ @_builtins.property
137
+ @pulumi.getter
138
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
139
+ """
140
+ The namespace to provision the resource in.
141
+ The value should not contain leading or trailing forward slashes.
142
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
143
+ *Available only for Vault Enterprise*.
144
+ """
145
+ return pulumi.get(self, "namespace")
146
+
147
+ @namespace.setter
148
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
149
+ pulumi.set(self, "namespace", value)
150
+
151
+ @_builtins.property
152
+ @pulumi.getter
153
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
154
+ """
155
+ The policies to be associated with the tag. Must be a subset of the policies associated with the role.
156
+ """
157
+ return pulumi.get(self, "policies")
158
+
159
+ @policies.setter
160
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
161
+ pulumi.set(self, "policies", value)
162
+
163
+
164
+ @pulumi.input_type
165
+ class _AuthBackendRoleTagState:
166
+ def __init__(__self__, *,
167
+ allow_instance_migration: Optional[pulumi.Input[_builtins.bool]] = None,
168
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
169
+ disallow_reauthentication: Optional[pulumi.Input[_builtins.bool]] = None,
170
+ instance_id: Optional[pulumi.Input[_builtins.str]] = None,
171
+ max_ttl: Optional[pulumi.Input[_builtins.str]] = None,
172
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
173
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
174
+ role: Optional[pulumi.Input[_builtins.str]] = None,
175
+ tag_key: Optional[pulumi.Input[_builtins.str]] = None,
176
+ tag_value: Optional[pulumi.Input[_builtins.str]] = None):
177
+ """
178
+ Input properties used for looking up and filtering AuthBackendRoleTag resources.
179
+ :param pulumi.Input[_builtins.bool] allow_instance_migration: If set, allows migration of the underlying instances where the client resides. Use with caution.
180
+ :param pulumi.Input[_builtins.str] backend: The path to the AWS auth backend to
181
+ read role tags from, with no leading or trailing `/`s. Defaults to "aws".
182
+ :param pulumi.Input[_builtins.bool] disallow_reauthentication: If set, only allows a single token to be granted per instance ID.
183
+ :param pulumi.Input[_builtins.str] instance_id: Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
184
+ :param pulumi.Input[_builtins.str] max_ttl: The maximum TTL of the tokens issued using this role.
185
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
186
+ The value should not contain leading or trailing forward slashes.
187
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
188
+ *Available only for Vault Enterprise*.
189
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: The policies to be associated with the tag. Must be a subset of the policies associated with the role.
190
+ :param pulumi.Input[_builtins.str] role: The name of the AWS auth backend role to read
191
+ role tags from, with no leading or trailing `/`s.
192
+ :param pulumi.Input[_builtins.str] tag_key: The key of the role tag.
193
+ :param pulumi.Input[_builtins.str] tag_value: The value to set the role key.
194
+ """
195
+ if allow_instance_migration is not None:
196
+ pulumi.set(__self__, "allow_instance_migration", allow_instance_migration)
197
+ if backend is not None:
198
+ pulumi.set(__self__, "backend", backend)
199
+ if disallow_reauthentication is not None:
200
+ pulumi.set(__self__, "disallow_reauthentication", disallow_reauthentication)
201
+ if instance_id is not None:
202
+ pulumi.set(__self__, "instance_id", instance_id)
203
+ if max_ttl is not None:
204
+ pulumi.set(__self__, "max_ttl", max_ttl)
205
+ if namespace is not None:
206
+ pulumi.set(__self__, "namespace", namespace)
207
+ if policies is not None:
208
+ pulumi.set(__self__, "policies", policies)
209
+ if role is not None:
210
+ pulumi.set(__self__, "role", role)
211
+ if tag_key is not None:
212
+ pulumi.set(__self__, "tag_key", tag_key)
213
+ if tag_value is not None:
214
+ pulumi.set(__self__, "tag_value", tag_value)
215
+
216
+ @_builtins.property
217
+ @pulumi.getter(name="allowInstanceMigration")
218
+ def allow_instance_migration(self) -> Optional[pulumi.Input[_builtins.bool]]:
219
+ """
220
+ If set, allows migration of the underlying instances where the client resides. Use with caution.
221
+ """
222
+ return pulumi.get(self, "allow_instance_migration")
223
+
224
+ @allow_instance_migration.setter
225
+ def allow_instance_migration(self, value: Optional[pulumi.Input[_builtins.bool]]):
226
+ pulumi.set(self, "allow_instance_migration", value)
227
+
228
+ @_builtins.property
229
+ @pulumi.getter
230
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
231
+ """
232
+ The path to the AWS auth backend to
233
+ read role tags from, with no leading or trailing `/`s. Defaults to "aws".
234
+ """
235
+ return pulumi.get(self, "backend")
236
+
237
+ @backend.setter
238
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
239
+ pulumi.set(self, "backend", value)
240
+
241
+ @_builtins.property
242
+ @pulumi.getter(name="disallowReauthentication")
243
+ def disallow_reauthentication(self) -> Optional[pulumi.Input[_builtins.bool]]:
244
+ """
245
+ If set, only allows a single token to be granted per instance ID.
246
+ """
247
+ return pulumi.get(self, "disallow_reauthentication")
248
+
249
+ @disallow_reauthentication.setter
250
+ def disallow_reauthentication(self, value: Optional[pulumi.Input[_builtins.bool]]):
251
+ pulumi.set(self, "disallow_reauthentication", value)
252
+
253
+ @_builtins.property
254
+ @pulumi.getter(name="instanceId")
255
+ def instance_id(self) -> Optional[pulumi.Input[_builtins.str]]:
256
+ """
257
+ Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
258
+ """
259
+ return pulumi.get(self, "instance_id")
260
+
261
+ @instance_id.setter
262
+ def instance_id(self, value: Optional[pulumi.Input[_builtins.str]]):
263
+ pulumi.set(self, "instance_id", value)
264
+
265
+ @_builtins.property
266
+ @pulumi.getter(name="maxTtl")
267
+ def max_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
268
+ """
269
+ The maximum TTL of the tokens issued using this role.
270
+ """
271
+ return pulumi.get(self, "max_ttl")
272
+
273
+ @max_ttl.setter
274
+ def max_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
275
+ pulumi.set(self, "max_ttl", value)
276
+
277
+ @_builtins.property
278
+ @pulumi.getter
279
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
280
+ """
281
+ The namespace to provision the resource in.
282
+ The value should not contain leading or trailing forward slashes.
283
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
284
+ *Available only for Vault Enterprise*.
285
+ """
286
+ return pulumi.get(self, "namespace")
287
+
288
+ @namespace.setter
289
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
290
+ pulumi.set(self, "namespace", value)
291
+
292
+ @_builtins.property
293
+ @pulumi.getter
294
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
295
+ """
296
+ The policies to be associated with the tag. Must be a subset of the policies associated with the role.
297
+ """
298
+ return pulumi.get(self, "policies")
299
+
300
+ @policies.setter
301
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
302
+ pulumi.set(self, "policies", value)
303
+
304
+ @_builtins.property
305
+ @pulumi.getter
306
+ def role(self) -> Optional[pulumi.Input[_builtins.str]]:
307
+ """
308
+ The name of the AWS auth backend role to read
309
+ role tags from, with no leading or trailing `/`s.
310
+ """
311
+ return pulumi.get(self, "role")
312
+
313
+ @role.setter
314
+ def role(self, value: Optional[pulumi.Input[_builtins.str]]):
315
+ pulumi.set(self, "role", value)
316
+
317
+ @_builtins.property
318
+ @pulumi.getter(name="tagKey")
319
+ def tag_key(self) -> Optional[pulumi.Input[_builtins.str]]:
320
+ """
321
+ The key of the role tag.
322
+ """
323
+ return pulumi.get(self, "tag_key")
324
+
325
+ @tag_key.setter
326
+ def tag_key(self, value: Optional[pulumi.Input[_builtins.str]]):
327
+ pulumi.set(self, "tag_key", value)
328
+
329
+ @_builtins.property
330
+ @pulumi.getter(name="tagValue")
331
+ def tag_value(self) -> Optional[pulumi.Input[_builtins.str]]:
332
+ """
333
+ The value to set the role key.
334
+ """
335
+ return pulumi.get(self, "tag_value")
336
+
337
+ @tag_value.setter
338
+ def tag_value(self, value: Optional[pulumi.Input[_builtins.str]]):
339
+ pulumi.set(self, "tag_value", value)
340
+
341
+
342
+ @pulumi.type_token("vault:aws/authBackendRoleTag:AuthBackendRoleTag")
343
+ class AuthBackendRoleTag(pulumi.CustomResource):
344
+ @overload
345
+ def __init__(__self__,
346
+ resource_name: str,
347
+ opts: Optional[pulumi.ResourceOptions] = None,
348
+ allow_instance_migration: Optional[pulumi.Input[_builtins.bool]] = None,
349
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
350
+ disallow_reauthentication: Optional[pulumi.Input[_builtins.bool]] = None,
351
+ instance_id: Optional[pulumi.Input[_builtins.str]] = None,
352
+ max_ttl: Optional[pulumi.Input[_builtins.str]] = None,
353
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
354
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
355
+ role: Optional[pulumi.Input[_builtins.str]] = None,
356
+ __props__=None):
357
+ """
358
+ Reads role tag information from an AWS auth backend in Vault.
359
+
360
+ ## Example Usage
361
+
362
+ ```python
363
+ import pulumi
364
+ import pulumi_vault as vault
365
+
366
+ aws = vault.AuthBackend("aws",
367
+ path="%s",
368
+ type="aws")
369
+ role = vault.aws.AuthBackendRole("role",
370
+ backend=aws.path,
371
+ role="%s",
372
+ auth_type="ec2",
373
+ bound_account_id="123456789012",
374
+ policies=[
375
+ "dev",
376
+ "prod",
377
+ "qa",
378
+ "test",
379
+ ],
380
+ role_tag="VaultRoleTag")
381
+ test = vault.aws.AuthBackendRoleTag("test",
382
+ backend=aws.path,
383
+ role=role.role,
384
+ policies=[
385
+ "prod",
386
+ "dev",
387
+ "test",
388
+ ],
389
+ max_ttl="1h",
390
+ instance_id="i-1234567")
391
+ ```
392
+
393
+ :param str resource_name: The name of the resource.
394
+ :param pulumi.ResourceOptions opts: Options for the resource.
395
+ :param pulumi.Input[_builtins.bool] allow_instance_migration: If set, allows migration of the underlying instances where the client resides. Use with caution.
396
+ :param pulumi.Input[_builtins.str] backend: The path to the AWS auth backend to
397
+ read role tags from, with no leading or trailing `/`s. Defaults to "aws".
398
+ :param pulumi.Input[_builtins.bool] disallow_reauthentication: If set, only allows a single token to be granted per instance ID.
399
+ :param pulumi.Input[_builtins.str] instance_id: Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
400
+ :param pulumi.Input[_builtins.str] max_ttl: The maximum TTL of the tokens issued using this role.
401
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
402
+ The value should not contain leading or trailing forward slashes.
403
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
404
+ *Available only for Vault Enterprise*.
405
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: The policies to be associated with the tag. Must be a subset of the policies associated with the role.
406
+ :param pulumi.Input[_builtins.str] role: The name of the AWS auth backend role to read
407
+ role tags from, with no leading or trailing `/`s.
408
+ """
409
+ ...
410
+ @overload
411
+ def __init__(__self__,
412
+ resource_name: str,
413
+ args: AuthBackendRoleTagArgs,
414
+ opts: Optional[pulumi.ResourceOptions] = None):
415
+ """
416
+ Reads role tag information from an AWS auth backend in Vault.
417
+
418
+ ## Example Usage
419
+
420
+ ```python
421
+ import pulumi
422
+ import pulumi_vault as vault
423
+
424
+ aws = vault.AuthBackend("aws",
425
+ path="%s",
426
+ type="aws")
427
+ role = vault.aws.AuthBackendRole("role",
428
+ backend=aws.path,
429
+ role="%s",
430
+ auth_type="ec2",
431
+ bound_account_id="123456789012",
432
+ policies=[
433
+ "dev",
434
+ "prod",
435
+ "qa",
436
+ "test",
437
+ ],
438
+ role_tag="VaultRoleTag")
439
+ test = vault.aws.AuthBackendRoleTag("test",
440
+ backend=aws.path,
441
+ role=role.role,
442
+ policies=[
443
+ "prod",
444
+ "dev",
445
+ "test",
446
+ ],
447
+ max_ttl="1h",
448
+ instance_id="i-1234567")
449
+ ```
450
+
451
+ :param str resource_name: The name of the resource.
452
+ :param AuthBackendRoleTagArgs args: The arguments to use to populate this resource's properties.
453
+ :param pulumi.ResourceOptions opts: Options for the resource.
454
+ """
455
+ ...
456
+ def __init__(__self__, resource_name: str, *args, **kwargs):
457
+ resource_args, opts = _utilities.get_resource_args_opts(AuthBackendRoleTagArgs, pulumi.ResourceOptions, *args, **kwargs)
458
+ if resource_args is not None:
459
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
460
+ else:
461
+ __self__._internal_init(resource_name, *args, **kwargs)
462
+
463
+ def _internal_init(__self__,
464
+ resource_name: str,
465
+ opts: Optional[pulumi.ResourceOptions] = None,
466
+ allow_instance_migration: Optional[pulumi.Input[_builtins.bool]] = None,
467
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
468
+ disallow_reauthentication: Optional[pulumi.Input[_builtins.bool]] = None,
469
+ instance_id: Optional[pulumi.Input[_builtins.str]] = None,
470
+ max_ttl: Optional[pulumi.Input[_builtins.str]] = None,
471
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
472
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
473
+ role: Optional[pulumi.Input[_builtins.str]] = None,
474
+ __props__=None):
475
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
476
+ if not isinstance(opts, pulumi.ResourceOptions):
477
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
478
+ if opts.id is None:
479
+ if __props__ is not None:
480
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
481
+ __props__ = AuthBackendRoleTagArgs.__new__(AuthBackendRoleTagArgs)
482
+
483
+ __props__.__dict__["allow_instance_migration"] = allow_instance_migration
484
+ __props__.__dict__["backend"] = backend
485
+ __props__.__dict__["disallow_reauthentication"] = disallow_reauthentication
486
+ __props__.__dict__["instance_id"] = instance_id
487
+ __props__.__dict__["max_ttl"] = max_ttl
488
+ __props__.__dict__["namespace"] = namespace
489
+ __props__.__dict__["policies"] = policies
490
+ if role is None and not opts.urn:
491
+ raise TypeError("Missing required property 'role'")
492
+ __props__.__dict__["role"] = role
493
+ __props__.__dict__["tag_key"] = None
494
+ __props__.__dict__["tag_value"] = None
495
+ super(AuthBackendRoleTag, __self__).__init__(
496
+ 'vault:aws/authBackendRoleTag:AuthBackendRoleTag',
497
+ resource_name,
498
+ __props__,
499
+ opts)
500
+
501
+ @staticmethod
502
+ def get(resource_name: str,
503
+ id: pulumi.Input[str],
504
+ opts: Optional[pulumi.ResourceOptions] = None,
505
+ allow_instance_migration: Optional[pulumi.Input[_builtins.bool]] = None,
506
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
507
+ disallow_reauthentication: Optional[pulumi.Input[_builtins.bool]] = None,
508
+ instance_id: Optional[pulumi.Input[_builtins.str]] = None,
509
+ max_ttl: Optional[pulumi.Input[_builtins.str]] = None,
510
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
511
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
512
+ role: Optional[pulumi.Input[_builtins.str]] = None,
513
+ tag_key: Optional[pulumi.Input[_builtins.str]] = None,
514
+ tag_value: Optional[pulumi.Input[_builtins.str]] = None) -> 'AuthBackendRoleTag':
515
+ """
516
+ Get an existing AuthBackendRoleTag resource's state with the given name, id, and optional extra
517
+ properties used to qualify the lookup.
518
+
519
+ :param str resource_name: The unique name of the resulting resource.
520
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
521
+ :param pulumi.ResourceOptions opts: Options for the resource.
522
+ :param pulumi.Input[_builtins.bool] allow_instance_migration: If set, allows migration of the underlying instances where the client resides. Use with caution.
523
+ :param pulumi.Input[_builtins.str] backend: The path to the AWS auth backend to
524
+ read role tags from, with no leading or trailing `/`s. Defaults to "aws".
525
+ :param pulumi.Input[_builtins.bool] disallow_reauthentication: If set, only allows a single token to be granted per instance ID.
526
+ :param pulumi.Input[_builtins.str] instance_id: Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
527
+ :param pulumi.Input[_builtins.str] max_ttl: The maximum TTL of the tokens issued using this role.
528
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
529
+ The value should not contain leading or trailing forward slashes.
530
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
531
+ *Available only for Vault Enterprise*.
532
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: The policies to be associated with the tag. Must be a subset of the policies associated with the role.
533
+ :param pulumi.Input[_builtins.str] role: The name of the AWS auth backend role to read
534
+ role tags from, with no leading or trailing `/`s.
535
+ :param pulumi.Input[_builtins.str] tag_key: The key of the role tag.
536
+ :param pulumi.Input[_builtins.str] tag_value: The value to set the role key.
537
+ """
538
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
539
+
540
+ __props__ = _AuthBackendRoleTagState.__new__(_AuthBackendRoleTagState)
541
+
542
+ __props__.__dict__["allow_instance_migration"] = allow_instance_migration
543
+ __props__.__dict__["backend"] = backend
544
+ __props__.__dict__["disallow_reauthentication"] = disallow_reauthentication
545
+ __props__.__dict__["instance_id"] = instance_id
546
+ __props__.__dict__["max_ttl"] = max_ttl
547
+ __props__.__dict__["namespace"] = namespace
548
+ __props__.__dict__["policies"] = policies
549
+ __props__.__dict__["role"] = role
550
+ __props__.__dict__["tag_key"] = tag_key
551
+ __props__.__dict__["tag_value"] = tag_value
552
+ return AuthBackendRoleTag(resource_name, opts=opts, __props__=__props__)
553
+
554
+ @_builtins.property
555
+ @pulumi.getter(name="allowInstanceMigration")
556
+ def allow_instance_migration(self) -> pulumi.Output[Optional[_builtins.bool]]:
557
+ """
558
+ If set, allows migration of the underlying instances where the client resides. Use with caution.
559
+ """
560
+ return pulumi.get(self, "allow_instance_migration")
561
+
562
+ @_builtins.property
563
+ @pulumi.getter
564
+ def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
565
+ """
566
+ The path to the AWS auth backend to
567
+ read role tags from, with no leading or trailing `/`s. Defaults to "aws".
568
+ """
569
+ return pulumi.get(self, "backend")
570
+
571
+ @_builtins.property
572
+ @pulumi.getter(name="disallowReauthentication")
573
+ def disallow_reauthentication(self) -> pulumi.Output[Optional[_builtins.bool]]:
574
+ """
575
+ If set, only allows a single token to be granted per instance ID.
576
+ """
577
+ return pulumi.get(self, "disallow_reauthentication")
578
+
579
+ @_builtins.property
580
+ @pulumi.getter(name="instanceId")
581
+ def instance_id(self) -> pulumi.Output[Optional[_builtins.str]]:
582
+ """
583
+ Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
584
+ """
585
+ return pulumi.get(self, "instance_id")
586
+
587
+ @_builtins.property
588
+ @pulumi.getter(name="maxTtl")
589
+ def max_ttl(self) -> pulumi.Output[Optional[_builtins.str]]:
590
+ """
591
+ The maximum TTL of the tokens issued using this role.
592
+ """
593
+ return pulumi.get(self, "max_ttl")
594
+
595
+ @_builtins.property
596
+ @pulumi.getter
597
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
598
+ """
599
+ The namespace to provision the resource in.
600
+ The value should not contain leading or trailing forward slashes.
601
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
602
+ *Available only for Vault Enterprise*.
603
+ """
604
+ return pulumi.get(self, "namespace")
605
+
606
+ @_builtins.property
607
+ @pulumi.getter
608
+ def policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
609
+ """
610
+ The policies to be associated with the tag. Must be a subset of the policies associated with the role.
611
+ """
612
+ return pulumi.get(self, "policies")
613
+
614
+ @_builtins.property
615
+ @pulumi.getter
616
+ def role(self) -> pulumi.Output[_builtins.str]:
617
+ """
618
+ The name of the AWS auth backend role to read
619
+ role tags from, with no leading or trailing `/`s.
620
+ """
621
+ return pulumi.get(self, "role")
622
+
623
+ @_builtins.property
624
+ @pulumi.getter(name="tagKey")
625
+ def tag_key(self) -> pulumi.Output[_builtins.str]:
626
+ """
627
+ The key of the role tag.
628
+ """
629
+ return pulumi.get(self, "tag_key")
630
+
631
+ @_builtins.property
632
+ @pulumi.getter(name="tagValue")
633
+ def tag_value(self) -> pulumi.Output[_builtins.str]:
634
+ """
635
+ The value to set the role key.
636
+ """
637
+ return pulumi.get(self, "tag_value")
638
+