pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,366 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['AuthBackendRoletagBlacklistArgs', 'AuthBackendRoletagBlacklist']
18
+
19
+ @pulumi.input_type
20
+ class AuthBackendRoletagBlacklistArgs:
21
+ def __init__(__self__, *,
22
+ backend: pulumi.Input[_builtins.str],
23
+ disable_periodic_tidy: Optional[pulumi.Input[_builtins.bool]] = None,
24
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
25
+ safety_buffer: Optional[pulumi.Input[_builtins.int]] = None):
26
+ """
27
+ The set of arguments for constructing a AuthBackendRoletagBlacklist resource.
28
+ :param pulumi.Input[_builtins.str] backend: The path the AWS auth backend being configured was
29
+ mounted at.
30
+ :param pulumi.Input[_builtins.bool] disable_periodic_tidy: If set to true, disables the periodic
31
+ tidying of the roletag blacklist entries. Defaults to false.
32
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
33
+ The value should not contain leading or trailing forward slashes.
34
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
35
+ *Available only for Vault Enterprise*.
36
+ :param pulumi.Input[_builtins.int] safety_buffer: The amount of extra time that must have passed
37
+ beyond the roletag expiration, before it is removed from the backend storage.
38
+ Defaults to 259,200 seconds, or 72 hours.
39
+ """
40
+ pulumi.set(__self__, "backend", backend)
41
+ if disable_periodic_tidy is not None:
42
+ pulumi.set(__self__, "disable_periodic_tidy", disable_periodic_tidy)
43
+ if namespace is not None:
44
+ pulumi.set(__self__, "namespace", namespace)
45
+ if safety_buffer is not None:
46
+ pulumi.set(__self__, "safety_buffer", safety_buffer)
47
+
48
+ @_builtins.property
49
+ @pulumi.getter
50
+ def backend(self) -> pulumi.Input[_builtins.str]:
51
+ """
52
+ The path the AWS auth backend being configured was
53
+ mounted at.
54
+ """
55
+ return pulumi.get(self, "backend")
56
+
57
+ @backend.setter
58
+ def backend(self, value: pulumi.Input[_builtins.str]):
59
+ pulumi.set(self, "backend", value)
60
+
61
+ @_builtins.property
62
+ @pulumi.getter(name="disablePeriodicTidy")
63
+ def disable_periodic_tidy(self) -> Optional[pulumi.Input[_builtins.bool]]:
64
+ """
65
+ If set to true, disables the periodic
66
+ tidying of the roletag blacklist entries. Defaults to false.
67
+ """
68
+ return pulumi.get(self, "disable_periodic_tidy")
69
+
70
+ @disable_periodic_tidy.setter
71
+ def disable_periodic_tidy(self, value: Optional[pulumi.Input[_builtins.bool]]):
72
+ pulumi.set(self, "disable_periodic_tidy", value)
73
+
74
+ @_builtins.property
75
+ @pulumi.getter
76
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
77
+ """
78
+ The namespace to provision the resource in.
79
+ The value should not contain leading or trailing forward slashes.
80
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
81
+ *Available only for Vault Enterprise*.
82
+ """
83
+ return pulumi.get(self, "namespace")
84
+
85
+ @namespace.setter
86
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
87
+ pulumi.set(self, "namespace", value)
88
+
89
+ @_builtins.property
90
+ @pulumi.getter(name="safetyBuffer")
91
+ def safety_buffer(self) -> Optional[pulumi.Input[_builtins.int]]:
92
+ """
93
+ The amount of extra time that must have passed
94
+ beyond the roletag expiration, before it is removed from the backend storage.
95
+ Defaults to 259,200 seconds, or 72 hours.
96
+ """
97
+ return pulumi.get(self, "safety_buffer")
98
+
99
+ @safety_buffer.setter
100
+ def safety_buffer(self, value: Optional[pulumi.Input[_builtins.int]]):
101
+ pulumi.set(self, "safety_buffer", value)
102
+
103
+
104
+ @pulumi.input_type
105
+ class _AuthBackendRoletagBlacklistState:
106
+ def __init__(__self__, *,
107
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
108
+ disable_periodic_tidy: Optional[pulumi.Input[_builtins.bool]] = None,
109
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
110
+ safety_buffer: Optional[pulumi.Input[_builtins.int]] = None):
111
+ """
112
+ Input properties used for looking up and filtering AuthBackendRoletagBlacklist resources.
113
+ :param pulumi.Input[_builtins.str] backend: The path the AWS auth backend being configured was
114
+ mounted at.
115
+ :param pulumi.Input[_builtins.bool] disable_periodic_tidy: If set to true, disables the periodic
116
+ tidying of the roletag blacklist entries. Defaults to false.
117
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
118
+ The value should not contain leading or trailing forward slashes.
119
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
120
+ *Available only for Vault Enterprise*.
121
+ :param pulumi.Input[_builtins.int] safety_buffer: The amount of extra time that must have passed
122
+ beyond the roletag expiration, before it is removed from the backend storage.
123
+ Defaults to 259,200 seconds, or 72 hours.
124
+ """
125
+ if backend is not None:
126
+ pulumi.set(__self__, "backend", backend)
127
+ if disable_periodic_tidy is not None:
128
+ pulumi.set(__self__, "disable_periodic_tidy", disable_periodic_tidy)
129
+ if namespace is not None:
130
+ pulumi.set(__self__, "namespace", namespace)
131
+ if safety_buffer is not None:
132
+ pulumi.set(__self__, "safety_buffer", safety_buffer)
133
+
134
+ @_builtins.property
135
+ @pulumi.getter
136
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
137
+ """
138
+ The path the AWS auth backend being configured was
139
+ mounted at.
140
+ """
141
+ return pulumi.get(self, "backend")
142
+
143
+ @backend.setter
144
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
145
+ pulumi.set(self, "backend", value)
146
+
147
+ @_builtins.property
148
+ @pulumi.getter(name="disablePeriodicTidy")
149
+ def disable_periodic_tidy(self) -> Optional[pulumi.Input[_builtins.bool]]:
150
+ """
151
+ If set to true, disables the periodic
152
+ tidying of the roletag blacklist entries. Defaults to false.
153
+ """
154
+ return pulumi.get(self, "disable_periodic_tidy")
155
+
156
+ @disable_periodic_tidy.setter
157
+ def disable_periodic_tidy(self, value: Optional[pulumi.Input[_builtins.bool]]):
158
+ pulumi.set(self, "disable_periodic_tidy", value)
159
+
160
+ @_builtins.property
161
+ @pulumi.getter
162
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
163
+ """
164
+ The namespace to provision the resource in.
165
+ The value should not contain leading or trailing forward slashes.
166
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
167
+ *Available only for Vault Enterprise*.
168
+ """
169
+ return pulumi.get(self, "namespace")
170
+
171
+ @namespace.setter
172
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
173
+ pulumi.set(self, "namespace", value)
174
+
175
+ @_builtins.property
176
+ @pulumi.getter(name="safetyBuffer")
177
+ def safety_buffer(self) -> Optional[pulumi.Input[_builtins.int]]:
178
+ """
179
+ The amount of extra time that must have passed
180
+ beyond the roletag expiration, before it is removed from the backend storage.
181
+ Defaults to 259,200 seconds, or 72 hours.
182
+ """
183
+ return pulumi.get(self, "safety_buffer")
184
+
185
+ @safety_buffer.setter
186
+ def safety_buffer(self, value: Optional[pulumi.Input[_builtins.int]]):
187
+ pulumi.set(self, "safety_buffer", value)
188
+
189
+
190
+ @pulumi.type_token("vault:aws/authBackendRoletagBlacklist:AuthBackendRoletagBlacklist")
191
+ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
192
+ @overload
193
+ def __init__(__self__,
194
+ resource_name: str,
195
+ opts: Optional[pulumi.ResourceOptions] = None,
196
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
197
+ disable_periodic_tidy: Optional[pulumi.Input[_builtins.bool]] = None,
198
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
199
+ safety_buffer: Optional[pulumi.Input[_builtins.int]] = None,
200
+ __props__=None):
201
+ """
202
+ Configures the periodic tidying operation of the blacklisted role tag entries.
203
+
204
+ ## Example Usage
205
+
206
+ ```python
207
+ import pulumi
208
+ import pulumi_vault as vault
209
+
210
+ example = vault.AuthBackend("example", type="aws")
211
+ example_auth_backend_roletag_blacklist = vault.aws.AuthBackendRoletagBlacklist("example",
212
+ backend=example.path,
213
+ safety_buffer=360)
214
+ ```
215
+
216
+ :param str resource_name: The name of the resource.
217
+ :param pulumi.ResourceOptions opts: Options for the resource.
218
+ :param pulumi.Input[_builtins.str] backend: The path the AWS auth backend being configured was
219
+ mounted at.
220
+ :param pulumi.Input[_builtins.bool] disable_periodic_tidy: If set to true, disables the periodic
221
+ tidying of the roletag blacklist entries. Defaults to false.
222
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
223
+ The value should not contain leading or trailing forward slashes.
224
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
225
+ *Available only for Vault Enterprise*.
226
+ :param pulumi.Input[_builtins.int] safety_buffer: The amount of extra time that must have passed
227
+ beyond the roletag expiration, before it is removed from the backend storage.
228
+ Defaults to 259,200 seconds, or 72 hours.
229
+ """
230
+ ...
231
+ @overload
232
+ def __init__(__self__,
233
+ resource_name: str,
234
+ args: AuthBackendRoletagBlacklistArgs,
235
+ opts: Optional[pulumi.ResourceOptions] = None):
236
+ """
237
+ Configures the periodic tidying operation of the blacklisted role tag entries.
238
+
239
+ ## Example Usage
240
+
241
+ ```python
242
+ import pulumi
243
+ import pulumi_vault as vault
244
+
245
+ example = vault.AuthBackend("example", type="aws")
246
+ example_auth_backend_roletag_blacklist = vault.aws.AuthBackendRoletagBlacklist("example",
247
+ backend=example.path,
248
+ safety_buffer=360)
249
+ ```
250
+
251
+ :param str resource_name: The name of the resource.
252
+ :param AuthBackendRoletagBlacklistArgs args: The arguments to use to populate this resource's properties.
253
+ :param pulumi.ResourceOptions opts: Options for the resource.
254
+ """
255
+ ...
256
+ def __init__(__self__, resource_name: str, *args, **kwargs):
257
+ resource_args, opts = _utilities.get_resource_args_opts(AuthBackendRoletagBlacklistArgs, pulumi.ResourceOptions, *args, **kwargs)
258
+ if resource_args is not None:
259
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
260
+ else:
261
+ __self__._internal_init(resource_name, *args, **kwargs)
262
+
263
+ def _internal_init(__self__,
264
+ resource_name: str,
265
+ opts: Optional[pulumi.ResourceOptions] = None,
266
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
267
+ disable_periodic_tidy: Optional[pulumi.Input[_builtins.bool]] = None,
268
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
269
+ safety_buffer: Optional[pulumi.Input[_builtins.int]] = None,
270
+ __props__=None):
271
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
272
+ if not isinstance(opts, pulumi.ResourceOptions):
273
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
274
+ if opts.id is None:
275
+ if __props__ is not None:
276
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
277
+ __props__ = AuthBackendRoletagBlacklistArgs.__new__(AuthBackendRoletagBlacklistArgs)
278
+
279
+ if backend is None and not opts.urn:
280
+ raise TypeError("Missing required property 'backend'")
281
+ __props__.__dict__["backend"] = backend
282
+ __props__.__dict__["disable_periodic_tidy"] = disable_periodic_tidy
283
+ __props__.__dict__["namespace"] = namespace
284
+ __props__.__dict__["safety_buffer"] = safety_buffer
285
+ super(AuthBackendRoletagBlacklist, __self__).__init__(
286
+ 'vault:aws/authBackendRoletagBlacklist:AuthBackendRoletagBlacklist',
287
+ resource_name,
288
+ __props__,
289
+ opts)
290
+
291
+ @staticmethod
292
+ def get(resource_name: str,
293
+ id: pulumi.Input[str],
294
+ opts: Optional[pulumi.ResourceOptions] = None,
295
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
296
+ disable_periodic_tidy: Optional[pulumi.Input[_builtins.bool]] = None,
297
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
298
+ safety_buffer: Optional[pulumi.Input[_builtins.int]] = None) -> 'AuthBackendRoletagBlacklist':
299
+ """
300
+ Get an existing AuthBackendRoletagBlacklist resource's state with the given name, id, and optional extra
301
+ properties used to qualify the lookup.
302
+
303
+ :param str resource_name: The unique name of the resulting resource.
304
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
305
+ :param pulumi.ResourceOptions opts: Options for the resource.
306
+ :param pulumi.Input[_builtins.str] backend: The path the AWS auth backend being configured was
307
+ mounted at.
308
+ :param pulumi.Input[_builtins.bool] disable_periodic_tidy: If set to true, disables the periodic
309
+ tidying of the roletag blacklist entries. Defaults to false.
310
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
311
+ The value should not contain leading or trailing forward slashes.
312
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
313
+ *Available only for Vault Enterprise*.
314
+ :param pulumi.Input[_builtins.int] safety_buffer: The amount of extra time that must have passed
315
+ beyond the roletag expiration, before it is removed from the backend storage.
316
+ Defaults to 259,200 seconds, or 72 hours.
317
+ """
318
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
319
+
320
+ __props__ = _AuthBackendRoletagBlacklistState.__new__(_AuthBackendRoletagBlacklistState)
321
+
322
+ __props__.__dict__["backend"] = backend
323
+ __props__.__dict__["disable_periodic_tidy"] = disable_periodic_tidy
324
+ __props__.__dict__["namespace"] = namespace
325
+ __props__.__dict__["safety_buffer"] = safety_buffer
326
+ return AuthBackendRoletagBlacklist(resource_name, opts=opts, __props__=__props__)
327
+
328
+ @_builtins.property
329
+ @pulumi.getter
330
+ def backend(self) -> pulumi.Output[_builtins.str]:
331
+ """
332
+ The path the AWS auth backend being configured was
333
+ mounted at.
334
+ """
335
+ return pulumi.get(self, "backend")
336
+
337
+ @_builtins.property
338
+ @pulumi.getter(name="disablePeriodicTidy")
339
+ def disable_periodic_tidy(self) -> pulumi.Output[Optional[_builtins.bool]]:
340
+ """
341
+ If set to true, disables the periodic
342
+ tidying of the roletag blacklist entries. Defaults to false.
343
+ """
344
+ return pulumi.get(self, "disable_periodic_tidy")
345
+
346
+ @_builtins.property
347
+ @pulumi.getter
348
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
349
+ """
350
+ The namespace to provision the resource in.
351
+ The value should not contain leading or trailing forward slashes.
352
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
353
+ *Available only for Vault Enterprise*.
354
+ """
355
+ return pulumi.get(self, "namespace")
356
+
357
+ @_builtins.property
358
+ @pulumi.getter(name="safetyBuffer")
359
+ def safety_buffer(self) -> pulumi.Output[Optional[_builtins.int]]:
360
+ """
361
+ The amount of extra time that must have passed
362
+ beyond the roletag expiration, before it is removed from the backend storage.
363
+ Defaults to 259,200 seconds, or 72 hours.
364
+ """
365
+ return pulumi.get(self, "safety_buffer")
366
+