pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,1176 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
18
+
19
+ @pulumi.input_type
20
+ class AuthBackendRoleArgs:
21
+ def __init__(__self__, *,
22
+ role: pulumi.Input[_builtins.str],
23
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
24
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
25
+ bound_group_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ bound_locations: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
+ bound_resource_groups: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
28
+ bound_scale_sets: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
29
+ bound_service_principal_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
30
+ bound_subscription_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
31
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
32
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
33
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
34
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
35
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
36
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
37
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
38
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
39
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
40
+ token_type: Optional[pulumi.Input[_builtins.str]] = None):
41
+ """
42
+ The set of arguments for constructing a AuthBackendRole resource.
43
+ :param pulumi.Input[_builtins.str] role: The name of the role.
44
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
45
+ This should be a list or map containing the metadata in key value pairs.
46
+ :param pulumi.Input[_builtins.str] backend: Unique name of the auth backend to configure.
47
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_group_ids: If set, defines a constraint on the groups
48
+ that can perform the login operation that they should be using the group
49
+ ID specified by this field.
50
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_locations: If set, defines a constraint on the virtual machines
51
+ that can perform the login operation that the location in their identity
52
+ document must match the one specified by this field.
53
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_resource_groups: If set, defines a constraint on the virtual
54
+ machines that can perform the login operation that they be associated with
55
+ the resource group that matches the value specified by this field.
56
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_scale_sets: If set, defines a constraint on the virtual
57
+ machines that can perform the login operation that they must match the scale set
58
+ specified by this field.
59
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_principal_ids: If set, defines a constraint on the
60
+ service principals that can perform the login operation that they should be possess
61
+ the ids specified by this field.
62
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_subscription_ids: If set, defines a constraint on the subscriptions
63
+ that can perform the login operation to ones which matches the value specified by this
64
+ field.
65
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
66
+ The value should not contain leading or trailing forward slashes.
67
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
68
+ *Available only for Vault Enterprise*.
69
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
70
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
71
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
72
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
73
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
74
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
75
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
76
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
77
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
78
+ """
79
+ pulumi.set(__self__, "role", role)
80
+ if alias_metadata is not None:
81
+ pulumi.set(__self__, "alias_metadata", alias_metadata)
82
+ if backend is not None:
83
+ pulumi.set(__self__, "backend", backend)
84
+ if bound_group_ids is not None:
85
+ pulumi.set(__self__, "bound_group_ids", bound_group_ids)
86
+ if bound_locations is not None:
87
+ pulumi.set(__self__, "bound_locations", bound_locations)
88
+ if bound_resource_groups is not None:
89
+ pulumi.set(__self__, "bound_resource_groups", bound_resource_groups)
90
+ if bound_scale_sets is not None:
91
+ pulumi.set(__self__, "bound_scale_sets", bound_scale_sets)
92
+ if bound_service_principal_ids is not None:
93
+ pulumi.set(__self__, "bound_service_principal_ids", bound_service_principal_ids)
94
+ if bound_subscription_ids is not None:
95
+ pulumi.set(__self__, "bound_subscription_ids", bound_subscription_ids)
96
+ if namespace is not None:
97
+ pulumi.set(__self__, "namespace", namespace)
98
+ if token_bound_cidrs is not None:
99
+ pulumi.set(__self__, "token_bound_cidrs", token_bound_cidrs)
100
+ if token_explicit_max_ttl is not None:
101
+ pulumi.set(__self__, "token_explicit_max_ttl", token_explicit_max_ttl)
102
+ if token_max_ttl is not None:
103
+ pulumi.set(__self__, "token_max_ttl", token_max_ttl)
104
+ if token_no_default_policy is not None:
105
+ pulumi.set(__self__, "token_no_default_policy", token_no_default_policy)
106
+ if token_num_uses is not None:
107
+ pulumi.set(__self__, "token_num_uses", token_num_uses)
108
+ if token_period is not None:
109
+ pulumi.set(__self__, "token_period", token_period)
110
+ if token_policies is not None:
111
+ pulumi.set(__self__, "token_policies", token_policies)
112
+ if token_ttl is not None:
113
+ pulumi.set(__self__, "token_ttl", token_ttl)
114
+ if token_type is not None:
115
+ pulumi.set(__self__, "token_type", token_type)
116
+
117
+ @_builtins.property
118
+ @pulumi.getter
119
+ def role(self) -> pulumi.Input[_builtins.str]:
120
+ """
121
+ The name of the role.
122
+ """
123
+ return pulumi.get(self, "role")
124
+
125
+ @role.setter
126
+ def role(self, value: pulumi.Input[_builtins.str]):
127
+ pulumi.set(self, "role", value)
128
+
129
+ @_builtins.property
130
+ @pulumi.getter(name="aliasMetadata")
131
+ def alias_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
132
+ """
133
+ The metadata to be tied to generated entity alias.
134
+ This should be a list or map containing the metadata in key value pairs.
135
+ """
136
+ return pulumi.get(self, "alias_metadata")
137
+
138
+ @alias_metadata.setter
139
+ def alias_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
140
+ pulumi.set(self, "alias_metadata", value)
141
+
142
+ @_builtins.property
143
+ @pulumi.getter
144
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
145
+ """
146
+ Unique name of the auth backend to configure.
147
+ """
148
+ return pulumi.get(self, "backend")
149
+
150
+ @backend.setter
151
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
152
+ pulumi.set(self, "backend", value)
153
+
154
+ @_builtins.property
155
+ @pulumi.getter(name="boundGroupIds")
156
+ def bound_group_ids(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
157
+ """
158
+ If set, defines a constraint on the groups
159
+ that can perform the login operation that they should be using the group
160
+ ID specified by this field.
161
+ """
162
+ return pulumi.get(self, "bound_group_ids")
163
+
164
+ @bound_group_ids.setter
165
+ def bound_group_ids(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
166
+ pulumi.set(self, "bound_group_ids", value)
167
+
168
+ @_builtins.property
169
+ @pulumi.getter(name="boundLocations")
170
+ def bound_locations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
171
+ """
172
+ If set, defines a constraint on the virtual machines
173
+ that can perform the login operation that the location in their identity
174
+ document must match the one specified by this field.
175
+ """
176
+ return pulumi.get(self, "bound_locations")
177
+
178
+ @bound_locations.setter
179
+ def bound_locations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
180
+ pulumi.set(self, "bound_locations", value)
181
+
182
+ @_builtins.property
183
+ @pulumi.getter(name="boundResourceGroups")
184
+ def bound_resource_groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
185
+ """
186
+ If set, defines a constraint on the virtual
187
+ machines that can perform the login operation that they be associated with
188
+ the resource group that matches the value specified by this field.
189
+ """
190
+ return pulumi.get(self, "bound_resource_groups")
191
+
192
+ @bound_resource_groups.setter
193
+ def bound_resource_groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
194
+ pulumi.set(self, "bound_resource_groups", value)
195
+
196
+ @_builtins.property
197
+ @pulumi.getter(name="boundScaleSets")
198
+ def bound_scale_sets(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
199
+ """
200
+ If set, defines a constraint on the virtual
201
+ machines that can perform the login operation that they must match the scale set
202
+ specified by this field.
203
+ """
204
+ return pulumi.get(self, "bound_scale_sets")
205
+
206
+ @bound_scale_sets.setter
207
+ def bound_scale_sets(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
208
+ pulumi.set(self, "bound_scale_sets", value)
209
+
210
+ @_builtins.property
211
+ @pulumi.getter(name="boundServicePrincipalIds")
212
+ def bound_service_principal_ids(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
213
+ """
214
+ If set, defines a constraint on the
215
+ service principals that can perform the login operation that they should be possess
216
+ the ids specified by this field.
217
+ """
218
+ return pulumi.get(self, "bound_service_principal_ids")
219
+
220
+ @bound_service_principal_ids.setter
221
+ def bound_service_principal_ids(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
222
+ pulumi.set(self, "bound_service_principal_ids", value)
223
+
224
+ @_builtins.property
225
+ @pulumi.getter(name="boundSubscriptionIds")
226
+ def bound_subscription_ids(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
227
+ """
228
+ If set, defines a constraint on the subscriptions
229
+ that can perform the login operation to ones which matches the value specified by this
230
+ field.
231
+ """
232
+ return pulumi.get(self, "bound_subscription_ids")
233
+
234
+ @bound_subscription_ids.setter
235
+ def bound_subscription_ids(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
236
+ pulumi.set(self, "bound_subscription_ids", value)
237
+
238
+ @_builtins.property
239
+ @pulumi.getter
240
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
241
+ """
242
+ The namespace to provision the resource in.
243
+ The value should not contain leading or trailing forward slashes.
244
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
245
+ *Available only for Vault Enterprise*.
246
+ """
247
+ return pulumi.get(self, "namespace")
248
+
249
+ @namespace.setter
250
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
251
+ pulumi.set(self, "namespace", value)
252
+
253
+ @_builtins.property
254
+ @pulumi.getter(name="tokenBoundCidrs")
255
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
256
+ """
257
+ Specifies the blocks of IP addresses which are allowed to use the generated token
258
+ """
259
+ return pulumi.get(self, "token_bound_cidrs")
260
+
261
+ @token_bound_cidrs.setter
262
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
263
+ pulumi.set(self, "token_bound_cidrs", value)
264
+
265
+ @_builtins.property
266
+ @pulumi.getter(name="tokenExplicitMaxTtl")
267
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
268
+ """
269
+ Generated Token's Explicit Maximum TTL in seconds
270
+ """
271
+ return pulumi.get(self, "token_explicit_max_ttl")
272
+
273
+ @token_explicit_max_ttl.setter
274
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
275
+ pulumi.set(self, "token_explicit_max_ttl", value)
276
+
277
+ @_builtins.property
278
+ @pulumi.getter(name="tokenMaxTtl")
279
+ def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
280
+ """
281
+ The maximum lifetime of the generated token
282
+ """
283
+ return pulumi.get(self, "token_max_ttl")
284
+
285
+ @token_max_ttl.setter
286
+ def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
287
+ pulumi.set(self, "token_max_ttl", value)
288
+
289
+ @_builtins.property
290
+ @pulumi.getter(name="tokenNoDefaultPolicy")
291
+ def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
292
+ """
293
+ If true, the 'default' policy will not automatically be added to generated tokens
294
+ """
295
+ return pulumi.get(self, "token_no_default_policy")
296
+
297
+ @token_no_default_policy.setter
298
+ def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
299
+ pulumi.set(self, "token_no_default_policy", value)
300
+
301
+ @_builtins.property
302
+ @pulumi.getter(name="tokenNumUses")
303
+ def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
304
+ """
305
+ The maximum number of times a token may be used, a value of zero means unlimited
306
+ """
307
+ return pulumi.get(self, "token_num_uses")
308
+
309
+ @token_num_uses.setter
310
+ def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
311
+ pulumi.set(self, "token_num_uses", value)
312
+
313
+ @_builtins.property
314
+ @pulumi.getter(name="tokenPeriod")
315
+ def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
316
+ """
317
+ Generated Token's Period
318
+ """
319
+ return pulumi.get(self, "token_period")
320
+
321
+ @token_period.setter
322
+ def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
323
+ pulumi.set(self, "token_period", value)
324
+
325
+ @_builtins.property
326
+ @pulumi.getter(name="tokenPolicies")
327
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
328
+ """
329
+ Generated Token's Policies
330
+ """
331
+ return pulumi.get(self, "token_policies")
332
+
333
+ @token_policies.setter
334
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
335
+ pulumi.set(self, "token_policies", value)
336
+
337
+ @_builtins.property
338
+ @pulumi.getter(name="tokenTtl")
339
+ def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
340
+ """
341
+ The initial ttl of the token to generate in seconds
342
+ """
343
+ return pulumi.get(self, "token_ttl")
344
+
345
+ @token_ttl.setter
346
+ def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
347
+ pulumi.set(self, "token_ttl", value)
348
+
349
+ @_builtins.property
350
+ @pulumi.getter(name="tokenType")
351
+ def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
352
+ """
353
+ The type of token to generate, service or batch
354
+ """
355
+ return pulumi.get(self, "token_type")
356
+
357
+ @token_type.setter
358
+ def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
359
+ pulumi.set(self, "token_type", value)
360
+
361
+
362
+ @pulumi.input_type
363
+ class _AuthBackendRoleState:
364
+ def __init__(__self__, *,
365
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
366
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
367
+ bound_group_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
368
+ bound_locations: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
369
+ bound_resource_groups: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
370
+ bound_scale_sets: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
371
+ bound_service_principal_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
372
+ bound_subscription_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
373
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
374
+ role: Optional[pulumi.Input[_builtins.str]] = None,
375
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
376
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
377
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
378
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
379
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
380
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
381
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
382
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
383
+ token_type: Optional[pulumi.Input[_builtins.str]] = None):
384
+ """
385
+ Input properties used for looking up and filtering AuthBackendRole resources.
386
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
387
+ This should be a list or map containing the metadata in key value pairs.
388
+ :param pulumi.Input[_builtins.str] backend: Unique name of the auth backend to configure.
389
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_group_ids: If set, defines a constraint on the groups
390
+ that can perform the login operation that they should be using the group
391
+ ID specified by this field.
392
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_locations: If set, defines a constraint on the virtual machines
393
+ that can perform the login operation that the location in their identity
394
+ document must match the one specified by this field.
395
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_resource_groups: If set, defines a constraint on the virtual
396
+ machines that can perform the login operation that they be associated with
397
+ the resource group that matches the value specified by this field.
398
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_scale_sets: If set, defines a constraint on the virtual
399
+ machines that can perform the login operation that they must match the scale set
400
+ specified by this field.
401
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_principal_ids: If set, defines a constraint on the
402
+ service principals that can perform the login operation that they should be possess
403
+ the ids specified by this field.
404
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_subscription_ids: If set, defines a constraint on the subscriptions
405
+ that can perform the login operation to ones which matches the value specified by this
406
+ field.
407
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
408
+ The value should not contain leading or trailing forward slashes.
409
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
410
+ *Available only for Vault Enterprise*.
411
+ :param pulumi.Input[_builtins.str] role: The name of the role.
412
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
413
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
414
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
415
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
416
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
417
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
418
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
419
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
420
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
421
+ """
422
+ if alias_metadata is not None:
423
+ pulumi.set(__self__, "alias_metadata", alias_metadata)
424
+ if backend is not None:
425
+ pulumi.set(__self__, "backend", backend)
426
+ if bound_group_ids is not None:
427
+ pulumi.set(__self__, "bound_group_ids", bound_group_ids)
428
+ if bound_locations is not None:
429
+ pulumi.set(__self__, "bound_locations", bound_locations)
430
+ if bound_resource_groups is not None:
431
+ pulumi.set(__self__, "bound_resource_groups", bound_resource_groups)
432
+ if bound_scale_sets is not None:
433
+ pulumi.set(__self__, "bound_scale_sets", bound_scale_sets)
434
+ if bound_service_principal_ids is not None:
435
+ pulumi.set(__self__, "bound_service_principal_ids", bound_service_principal_ids)
436
+ if bound_subscription_ids is not None:
437
+ pulumi.set(__self__, "bound_subscription_ids", bound_subscription_ids)
438
+ if namespace is not None:
439
+ pulumi.set(__self__, "namespace", namespace)
440
+ if role is not None:
441
+ pulumi.set(__self__, "role", role)
442
+ if token_bound_cidrs is not None:
443
+ pulumi.set(__self__, "token_bound_cidrs", token_bound_cidrs)
444
+ if token_explicit_max_ttl is not None:
445
+ pulumi.set(__self__, "token_explicit_max_ttl", token_explicit_max_ttl)
446
+ if token_max_ttl is not None:
447
+ pulumi.set(__self__, "token_max_ttl", token_max_ttl)
448
+ if token_no_default_policy is not None:
449
+ pulumi.set(__self__, "token_no_default_policy", token_no_default_policy)
450
+ if token_num_uses is not None:
451
+ pulumi.set(__self__, "token_num_uses", token_num_uses)
452
+ if token_period is not None:
453
+ pulumi.set(__self__, "token_period", token_period)
454
+ if token_policies is not None:
455
+ pulumi.set(__self__, "token_policies", token_policies)
456
+ if token_ttl is not None:
457
+ pulumi.set(__self__, "token_ttl", token_ttl)
458
+ if token_type is not None:
459
+ pulumi.set(__self__, "token_type", token_type)
460
+
461
+ @_builtins.property
462
+ @pulumi.getter(name="aliasMetadata")
463
+ def alias_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
464
+ """
465
+ The metadata to be tied to generated entity alias.
466
+ This should be a list or map containing the metadata in key value pairs.
467
+ """
468
+ return pulumi.get(self, "alias_metadata")
469
+
470
+ @alias_metadata.setter
471
+ def alias_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
472
+ pulumi.set(self, "alias_metadata", value)
473
+
474
+ @_builtins.property
475
+ @pulumi.getter
476
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
477
+ """
478
+ Unique name of the auth backend to configure.
479
+ """
480
+ return pulumi.get(self, "backend")
481
+
482
+ @backend.setter
483
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
484
+ pulumi.set(self, "backend", value)
485
+
486
+ @_builtins.property
487
+ @pulumi.getter(name="boundGroupIds")
488
+ def bound_group_ids(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
489
+ """
490
+ If set, defines a constraint on the groups
491
+ that can perform the login operation that they should be using the group
492
+ ID specified by this field.
493
+ """
494
+ return pulumi.get(self, "bound_group_ids")
495
+
496
+ @bound_group_ids.setter
497
+ def bound_group_ids(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
498
+ pulumi.set(self, "bound_group_ids", value)
499
+
500
+ @_builtins.property
501
+ @pulumi.getter(name="boundLocations")
502
+ def bound_locations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
503
+ """
504
+ If set, defines a constraint on the virtual machines
505
+ that can perform the login operation that the location in their identity
506
+ document must match the one specified by this field.
507
+ """
508
+ return pulumi.get(self, "bound_locations")
509
+
510
+ @bound_locations.setter
511
+ def bound_locations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
512
+ pulumi.set(self, "bound_locations", value)
513
+
514
+ @_builtins.property
515
+ @pulumi.getter(name="boundResourceGroups")
516
+ def bound_resource_groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
517
+ """
518
+ If set, defines a constraint on the virtual
519
+ machines that can perform the login operation that they be associated with
520
+ the resource group that matches the value specified by this field.
521
+ """
522
+ return pulumi.get(self, "bound_resource_groups")
523
+
524
+ @bound_resource_groups.setter
525
+ def bound_resource_groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
526
+ pulumi.set(self, "bound_resource_groups", value)
527
+
528
+ @_builtins.property
529
+ @pulumi.getter(name="boundScaleSets")
530
+ def bound_scale_sets(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
531
+ """
532
+ If set, defines a constraint on the virtual
533
+ machines that can perform the login operation that they must match the scale set
534
+ specified by this field.
535
+ """
536
+ return pulumi.get(self, "bound_scale_sets")
537
+
538
+ @bound_scale_sets.setter
539
+ def bound_scale_sets(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
540
+ pulumi.set(self, "bound_scale_sets", value)
541
+
542
+ @_builtins.property
543
+ @pulumi.getter(name="boundServicePrincipalIds")
544
+ def bound_service_principal_ids(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
545
+ """
546
+ If set, defines a constraint on the
547
+ service principals that can perform the login operation that they should be possess
548
+ the ids specified by this field.
549
+ """
550
+ return pulumi.get(self, "bound_service_principal_ids")
551
+
552
+ @bound_service_principal_ids.setter
553
+ def bound_service_principal_ids(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
554
+ pulumi.set(self, "bound_service_principal_ids", value)
555
+
556
+ @_builtins.property
557
+ @pulumi.getter(name="boundSubscriptionIds")
558
+ def bound_subscription_ids(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
559
+ """
560
+ If set, defines a constraint on the subscriptions
561
+ that can perform the login operation to ones which matches the value specified by this
562
+ field.
563
+ """
564
+ return pulumi.get(self, "bound_subscription_ids")
565
+
566
+ @bound_subscription_ids.setter
567
+ def bound_subscription_ids(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
568
+ pulumi.set(self, "bound_subscription_ids", value)
569
+
570
+ @_builtins.property
571
+ @pulumi.getter
572
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
573
+ """
574
+ The namespace to provision the resource in.
575
+ The value should not contain leading or trailing forward slashes.
576
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
577
+ *Available only for Vault Enterprise*.
578
+ """
579
+ return pulumi.get(self, "namespace")
580
+
581
+ @namespace.setter
582
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
583
+ pulumi.set(self, "namespace", value)
584
+
585
+ @_builtins.property
586
+ @pulumi.getter
587
+ def role(self) -> Optional[pulumi.Input[_builtins.str]]:
588
+ """
589
+ The name of the role.
590
+ """
591
+ return pulumi.get(self, "role")
592
+
593
+ @role.setter
594
+ def role(self, value: Optional[pulumi.Input[_builtins.str]]):
595
+ pulumi.set(self, "role", value)
596
+
597
+ @_builtins.property
598
+ @pulumi.getter(name="tokenBoundCidrs")
599
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
600
+ """
601
+ Specifies the blocks of IP addresses which are allowed to use the generated token
602
+ """
603
+ return pulumi.get(self, "token_bound_cidrs")
604
+
605
+ @token_bound_cidrs.setter
606
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
607
+ pulumi.set(self, "token_bound_cidrs", value)
608
+
609
+ @_builtins.property
610
+ @pulumi.getter(name="tokenExplicitMaxTtl")
611
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
612
+ """
613
+ Generated Token's Explicit Maximum TTL in seconds
614
+ """
615
+ return pulumi.get(self, "token_explicit_max_ttl")
616
+
617
+ @token_explicit_max_ttl.setter
618
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
619
+ pulumi.set(self, "token_explicit_max_ttl", value)
620
+
621
+ @_builtins.property
622
+ @pulumi.getter(name="tokenMaxTtl")
623
+ def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
624
+ """
625
+ The maximum lifetime of the generated token
626
+ """
627
+ return pulumi.get(self, "token_max_ttl")
628
+
629
+ @token_max_ttl.setter
630
+ def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
631
+ pulumi.set(self, "token_max_ttl", value)
632
+
633
+ @_builtins.property
634
+ @pulumi.getter(name="tokenNoDefaultPolicy")
635
+ def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
636
+ """
637
+ If true, the 'default' policy will not automatically be added to generated tokens
638
+ """
639
+ return pulumi.get(self, "token_no_default_policy")
640
+
641
+ @token_no_default_policy.setter
642
+ def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
643
+ pulumi.set(self, "token_no_default_policy", value)
644
+
645
+ @_builtins.property
646
+ @pulumi.getter(name="tokenNumUses")
647
+ def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
648
+ """
649
+ The maximum number of times a token may be used, a value of zero means unlimited
650
+ """
651
+ return pulumi.get(self, "token_num_uses")
652
+
653
+ @token_num_uses.setter
654
+ def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
655
+ pulumi.set(self, "token_num_uses", value)
656
+
657
+ @_builtins.property
658
+ @pulumi.getter(name="tokenPeriod")
659
+ def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
660
+ """
661
+ Generated Token's Period
662
+ """
663
+ return pulumi.get(self, "token_period")
664
+
665
+ @token_period.setter
666
+ def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
667
+ pulumi.set(self, "token_period", value)
668
+
669
+ @_builtins.property
670
+ @pulumi.getter(name="tokenPolicies")
671
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
672
+ """
673
+ Generated Token's Policies
674
+ """
675
+ return pulumi.get(self, "token_policies")
676
+
677
+ @token_policies.setter
678
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
679
+ pulumi.set(self, "token_policies", value)
680
+
681
+ @_builtins.property
682
+ @pulumi.getter(name="tokenTtl")
683
+ def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
684
+ """
685
+ The initial ttl of the token to generate in seconds
686
+ """
687
+ return pulumi.get(self, "token_ttl")
688
+
689
+ @token_ttl.setter
690
+ def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
691
+ pulumi.set(self, "token_ttl", value)
692
+
693
+ @_builtins.property
694
+ @pulumi.getter(name="tokenType")
695
+ def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
696
+ """
697
+ The type of token to generate, service or batch
698
+ """
699
+ return pulumi.get(self, "token_type")
700
+
701
+ @token_type.setter
702
+ def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
703
+ pulumi.set(self, "token_type", value)
704
+
705
+
706
+ @pulumi.type_token("vault:azure/authBackendRole:AuthBackendRole")
707
+ class AuthBackendRole(pulumi.CustomResource):
708
+ @overload
709
+ def __init__(__self__,
710
+ resource_name: str,
711
+ opts: Optional[pulumi.ResourceOptions] = None,
712
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
713
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
714
+ bound_group_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
715
+ bound_locations: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
716
+ bound_resource_groups: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
717
+ bound_scale_sets: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
718
+ bound_service_principal_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
719
+ bound_subscription_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
720
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
721
+ role: Optional[pulumi.Input[_builtins.str]] = None,
722
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
723
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
724
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
725
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
726
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
727
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
728
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
729
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
730
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
731
+ __props__=None):
732
+ """
733
+ Manages an Azure auth backend role in a Vault server. Roles constrain the
734
+ instances or principals that can perform the login operation against the
735
+ backend. See the [Vault
736
+ documentation](https://www.vaultproject.io/docs/auth/azure.html) for more
737
+ information.
738
+
739
+ ## Example Usage
740
+
741
+ ```python
742
+ import pulumi
743
+ import pulumi_vault as vault
744
+
745
+ azure = vault.AuthBackend("azure", type="azure")
746
+ example = vault.azure.AuthBackendRole("example",
747
+ backend=azure.path,
748
+ role="test-role",
749
+ bound_subscription_ids=["11111111-2222-3333-4444-555555555555"],
750
+ bound_resource_groups=["123456789012"],
751
+ token_ttl=60,
752
+ token_max_ttl=120,
753
+ token_policies=[
754
+ "default",
755
+ "dev",
756
+ "prod",
757
+ ])
758
+ ```
759
+
760
+ ## Import
761
+
762
+ Azure auth backend roles can be imported using `auth/`, the `backend` path, `/role/`, and the `role` name e.g.
763
+
764
+ ```sh
765
+ $ pulumi import vault:azure/authBackendRole:AuthBackendRole example auth/azure/role/test-role
766
+ ```
767
+
768
+ :param str resource_name: The name of the resource.
769
+ :param pulumi.ResourceOptions opts: Options for the resource.
770
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
771
+ This should be a list or map containing the metadata in key value pairs.
772
+ :param pulumi.Input[_builtins.str] backend: Unique name of the auth backend to configure.
773
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_group_ids: If set, defines a constraint on the groups
774
+ that can perform the login operation that they should be using the group
775
+ ID specified by this field.
776
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_locations: If set, defines a constraint on the virtual machines
777
+ that can perform the login operation that the location in their identity
778
+ document must match the one specified by this field.
779
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_resource_groups: If set, defines a constraint on the virtual
780
+ machines that can perform the login operation that they be associated with
781
+ the resource group that matches the value specified by this field.
782
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_scale_sets: If set, defines a constraint on the virtual
783
+ machines that can perform the login operation that they must match the scale set
784
+ specified by this field.
785
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_principal_ids: If set, defines a constraint on the
786
+ service principals that can perform the login operation that they should be possess
787
+ the ids specified by this field.
788
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_subscription_ids: If set, defines a constraint on the subscriptions
789
+ that can perform the login operation to ones which matches the value specified by this
790
+ field.
791
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
792
+ The value should not contain leading or trailing forward slashes.
793
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
794
+ *Available only for Vault Enterprise*.
795
+ :param pulumi.Input[_builtins.str] role: The name of the role.
796
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
797
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
798
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
799
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
800
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
801
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
802
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
803
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
804
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
805
+ """
806
+ ...
807
+ @overload
808
+ def __init__(__self__,
809
+ resource_name: str,
810
+ args: AuthBackendRoleArgs,
811
+ opts: Optional[pulumi.ResourceOptions] = None):
812
+ """
813
+ Manages an Azure auth backend role in a Vault server. Roles constrain the
814
+ instances or principals that can perform the login operation against the
815
+ backend. See the [Vault
816
+ documentation](https://www.vaultproject.io/docs/auth/azure.html) for more
817
+ information.
818
+
819
+ ## Example Usage
820
+
821
+ ```python
822
+ import pulumi
823
+ import pulumi_vault as vault
824
+
825
+ azure = vault.AuthBackend("azure", type="azure")
826
+ example = vault.azure.AuthBackendRole("example",
827
+ backend=azure.path,
828
+ role="test-role",
829
+ bound_subscription_ids=["11111111-2222-3333-4444-555555555555"],
830
+ bound_resource_groups=["123456789012"],
831
+ token_ttl=60,
832
+ token_max_ttl=120,
833
+ token_policies=[
834
+ "default",
835
+ "dev",
836
+ "prod",
837
+ ])
838
+ ```
839
+
840
+ ## Import
841
+
842
+ Azure auth backend roles can be imported using `auth/`, the `backend` path, `/role/`, and the `role` name e.g.
843
+
844
+ ```sh
845
+ $ pulumi import vault:azure/authBackendRole:AuthBackendRole example auth/azure/role/test-role
846
+ ```
847
+
848
+ :param str resource_name: The name of the resource.
849
+ :param AuthBackendRoleArgs args: The arguments to use to populate this resource's properties.
850
+ :param pulumi.ResourceOptions opts: Options for the resource.
851
+ """
852
+ ...
853
+ def __init__(__self__, resource_name: str, *args, **kwargs):
854
+ resource_args, opts = _utilities.get_resource_args_opts(AuthBackendRoleArgs, pulumi.ResourceOptions, *args, **kwargs)
855
+ if resource_args is not None:
856
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
857
+ else:
858
+ __self__._internal_init(resource_name, *args, **kwargs)
859
+
860
+ def _internal_init(__self__,
861
+ resource_name: str,
862
+ opts: Optional[pulumi.ResourceOptions] = None,
863
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
864
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
865
+ bound_group_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
866
+ bound_locations: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
867
+ bound_resource_groups: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
868
+ bound_scale_sets: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
869
+ bound_service_principal_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
870
+ bound_subscription_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
871
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
872
+ role: Optional[pulumi.Input[_builtins.str]] = None,
873
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
874
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
875
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
876
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
877
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
878
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
879
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
880
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
881
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
882
+ __props__=None):
883
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
884
+ if not isinstance(opts, pulumi.ResourceOptions):
885
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
886
+ if opts.id is None:
887
+ if __props__ is not None:
888
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
889
+ __props__ = AuthBackendRoleArgs.__new__(AuthBackendRoleArgs)
890
+
891
+ __props__.__dict__["alias_metadata"] = alias_metadata
892
+ __props__.__dict__["backend"] = backend
893
+ __props__.__dict__["bound_group_ids"] = bound_group_ids
894
+ __props__.__dict__["bound_locations"] = bound_locations
895
+ __props__.__dict__["bound_resource_groups"] = bound_resource_groups
896
+ __props__.__dict__["bound_scale_sets"] = bound_scale_sets
897
+ __props__.__dict__["bound_service_principal_ids"] = bound_service_principal_ids
898
+ __props__.__dict__["bound_subscription_ids"] = bound_subscription_ids
899
+ __props__.__dict__["namespace"] = namespace
900
+ if role is None and not opts.urn:
901
+ raise TypeError("Missing required property 'role'")
902
+ __props__.__dict__["role"] = role
903
+ __props__.__dict__["token_bound_cidrs"] = token_bound_cidrs
904
+ __props__.__dict__["token_explicit_max_ttl"] = token_explicit_max_ttl
905
+ __props__.__dict__["token_max_ttl"] = token_max_ttl
906
+ __props__.__dict__["token_no_default_policy"] = token_no_default_policy
907
+ __props__.__dict__["token_num_uses"] = token_num_uses
908
+ __props__.__dict__["token_period"] = token_period
909
+ __props__.__dict__["token_policies"] = token_policies
910
+ __props__.__dict__["token_ttl"] = token_ttl
911
+ __props__.__dict__["token_type"] = token_type
912
+ super(AuthBackendRole, __self__).__init__(
913
+ 'vault:azure/authBackendRole:AuthBackendRole',
914
+ resource_name,
915
+ __props__,
916
+ opts)
917
+
918
+ @staticmethod
919
+ def get(resource_name: str,
920
+ id: pulumi.Input[str],
921
+ opts: Optional[pulumi.ResourceOptions] = None,
922
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
923
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
924
+ bound_group_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
925
+ bound_locations: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
926
+ bound_resource_groups: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
927
+ bound_scale_sets: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
928
+ bound_service_principal_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
929
+ bound_subscription_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
930
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
931
+ role: Optional[pulumi.Input[_builtins.str]] = None,
932
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
933
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
934
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
935
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
936
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
937
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
938
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
939
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
940
+ token_type: Optional[pulumi.Input[_builtins.str]] = None) -> 'AuthBackendRole':
941
+ """
942
+ Get an existing AuthBackendRole resource's state with the given name, id, and optional extra
943
+ properties used to qualify the lookup.
944
+
945
+ :param str resource_name: The unique name of the resulting resource.
946
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
947
+ :param pulumi.ResourceOptions opts: Options for the resource.
948
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
949
+ This should be a list or map containing the metadata in key value pairs.
950
+ :param pulumi.Input[_builtins.str] backend: Unique name of the auth backend to configure.
951
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_group_ids: If set, defines a constraint on the groups
952
+ that can perform the login operation that they should be using the group
953
+ ID specified by this field.
954
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_locations: If set, defines a constraint on the virtual machines
955
+ that can perform the login operation that the location in their identity
956
+ document must match the one specified by this field.
957
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_resource_groups: If set, defines a constraint on the virtual
958
+ machines that can perform the login operation that they be associated with
959
+ the resource group that matches the value specified by this field.
960
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_scale_sets: If set, defines a constraint on the virtual
961
+ machines that can perform the login operation that they must match the scale set
962
+ specified by this field.
963
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_principal_ids: If set, defines a constraint on the
964
+ service principals that can perform the login operation that they should be possess
965
+ the ids specified by this field.
966
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_subscription_ids: If set, defines a constraint on the subscriptions
967
+ that can perform the login operation to ones which matches the value specified by this
968
+ field.
969
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
970
+ The value should not contain leading or trailing forward slashes.
971
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
972
+ *Available only for Vault Enterprise*.
973
+ :param pulumi.Input[_builtins.str] role: The name of the role.
974
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
975
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
976
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
977
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
978
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
979
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
980
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
981
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
982
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
983
+ """
984
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
985
+
986
+ __props__ = _AuthBackendRoleState.__new__(_AuthBackendRoleState)
987
+
988
+ __props__.__dict__["alias_metadata"] = alias_metadata
989
+ __props__.__dict__["backend"] = backend
990
+ __props__.__dict__["bound_group_ids"] = bound_group_ids
991
+ __props__.__dict__["bound_locations"] = bound_locations
992
+ __props__.__dict__["bound_resource_groups"] = bound_resource_groups
993
+ __props__.__dict__["bound_scale_sets"] = bound_scale_sets
994
+ __props__.__dict__["bound_service_principal_ids"] = bound_service_principal_ids
995
+ __props__.__dict__["bound_subscription_ids"] = bound_subscription_ids
996
+ __props__.__dict__["namespace"] = namespace
997
+ __props__.__dict__["role"] = role
998
+ __props__.__dict__["token_bound_cidrs"] = token_bound_cidrs
999
+ __props__.__dict__["token_explicit_max_ttl"] = token_explicit_max_ttl
1000
+ __props__.__dict__["token_max_ttl"] = token_max_ttl
1001
+ __props__.__dict__["token_no_default_policy"] = token_no_default_policy
1002
+ __props__.__dict__["token_num_uses"] = token_num_uses
1003
+ __props__.__dict__["token_period"] = token_period
1004
+ __props__.__dict__["token_policies"] = token_policies
1005
+ __props__.__dict__["token_ttl"] = token_ttl
1006
+ __props__.__dict__["token_type"] = token_type
1007
+ return AuthBackendRole(resource_name, opts=opts, __props__=__props__)
1008
+
1009
+ @_builtins.property
1010
+ @pulumi.getter(name="aliasMetadata")
1011
+ def alias_metadata(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
1012
+ """
1013
+ The metadata to be tied to generated entity alias.
1014
+ This should be a list or map containing the metadata in key value pairs.
1015
+ """
1016
+ return pulumi.get(self, "alias_metadata")
1017
+
1018
+ @_builtins.property
1019
+ @pulumi.getter
1020
+ def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
1021
+ """
1022
+ Unique name of the auth backend to configure.
1023
+ """
1024
+ return pulumi.get(self, "backend")
1025
+
1026
+ @_builtins.property
1027
+ @pulumi.getter(name="boundGroupIds")
1028
+ def bound_group_ids(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1029
+ """
1030
+ If set, defines a constraint on the groups
1031
+ that can perform the login operation that they should be using the group
1032
+ ID specified by this field.
1033
+ """
1034
+ return pulumi.get(self, "bound_group_ids")
1035
+
1036
+ @_builtins.property
1037
+ @pulumi.getter(name="boundLocations")
1038
+ def bound_locations(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1039
+ """
1040
+ If set, defines a constraint on the virtual machines
1041
+ that can perform the login operation that the location in their identity
1042
+ document must match the one specified by this field.
1043
+ """
1044
+ return pulumi.get(self, "bound_locations")
1045
+
1046
+ @_builtins.property
1047
+ @pulumi.getter(name="boundResourceGroups")
1048
+ def bound_resource_groups(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1049
+ """
1050
+ If set, defines a constraint on the virtual
1051
+ machines that can perform the login operation that they be associated with
1052
+ the resource group that matches the value specified by this field.
1053
+ """
1054
+ return pulumi.get(self, "bound_resource_groups")
1055
+
1056
+ @_builtins.property
1057
+ @pulumi.getter(name="boundScaleSets")
1058
+ def bound_scale_sets(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1059
+ """
1060
+ If set, defines a constraint on the virtual
1061
+ machines that can perform the login operation that they must match the scale set
1062
+ specified by this field.
1063
+ """
1064
+ return pulumi.get(self, "bound_scale_sets")
1065
+
1066
+ @_builtins.property
1067
+ @pulumi.getter(name="boundServicePrincipalIds")
1068
+ def bound_service_principal_ids(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1069
+ """
1070
+ If set, defines a constraint on the
1071
+ service principals that can perform the login operation that they should be possess
1072
+ the ids specified by this field.
1073
+ """
1074
+ return pulumi.get(self, "bound_service_principal_ids")
1075
+
1076
+ @_builtins.property
1077
+ @pulumi.getter(name="boundSubscriptionIds")
1078
+ def bound_subscription_ids(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1079
+ """
1080
+ If set, defines a constraint on the subscriptions
1081
+ that can perform the login operation to ones which matches the value specified by this
1082
+ field.
1083
+ """
1084
+ return pulumi.get(self, "bound_subscription_ids")
1085
+
1086
+ @_builtins.property
1087
+ @pulumi.getter
1088
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
1089
+ """
1090
+ The namespace to provision the resource in.
1091
+ The value should not contain leading or trailing forward slashes.
1092
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1093
+ *Available only for Vault Enterprise*.
1094
+ """
1095
+ return pulumi.get(self, "namespace")
1096
+
1097
+ @_builtins.property
1098
+ @pulumi.getter
1099
+ def role(self) -> pulumi.Output[_builtins.str]:
1100
+ """
1101
+ The name of the role.
1102
+ """
1103
+ return pulumi.get(self, "role")
1104
+
1105
+ @_builtins.property
1106
+ @pulumi.getter(name="tokenBoundCidrs")
1107
+ def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1108
+ """
1109
+ Specifies the blocks of IP addresses which are allowed to use the generated token
1110
+ """
1111
+ return pulumi.get(self, "token_bound_cidrs")
1112
+
1113
+ @_builtins.property
1114
+ @pulumi.getter(name="tokenExplicitMaxTtl")
1115
+ def token_explicit_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1116
+ """
1117
+ Generated Token's Explicit Maximum TTL in seconds
1118
+ """
1119
+ return pulumi.get(self, "token_explicit_max_ttl")
1120
+
1121
+ @_builtins.property
1122
+ @pulumi.getter(name="tokenMaxTtl")
1123
+ def token_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1124
+ """
1125
+ The maximum lifetime of the generated token
1126
+ """
1127
+ return pulumi.get(self, "token_max_ttl")
1128
+
1129
+ @_builtins.property
1130
+ @pulumi.getter(name="tokenNoDefaultPolicy")
1131
+ def token_no_default_policy(self) -> pulumi.Output[Optional[_builtins.bool]]:
1132
+ """
1133
+ If true, the 'default' policy will not automatically be added to generated tokens
1134
+ """
1135
+ return pulumi.get(self, "token_no_default_policy")
1136
+
1137
+ @_builtins.property
1138
+ @pulumi.getter(name="tokenNumUses")
1139
+ def token_num_uses(self) -> pulumi.Output[Optional[_builtins.int]]:
1140
+ """
1141
+ The maximum number of times a token may be used, a value of zero means unlimited
1142
+ """
1143
+ return pulumi.get(self, "token_num_uses")
1144
+
1145
+ @_builtins.property
1146
+ @pulumi.getter(name="tokenPeriod")
1147
+ def token_period(self) -> pulumi.Output[Optional[_builtins.int]]:
1148
+ """
1149
+ Generated Token's Period
1150
+ """
1151
+ return pulumi.get(self, "token_period")
1152
+
1153
+ @_builtins.property
1154
+ @pulumi.getter(name="tokenPolicies")
1155
+ def token_policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1156
+ """
1157
+ Generated Token's Policies
1158
+ """
1159
+ return pulumi.get(self, "token_policies")
1160
+
1161
+ @_builtins.property
1162
+ @pulumi.getter(name="tokenTtl")
1163
+ def token_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1164
+ """
1165
+ The initial ttl of the token to generate in seconds
1166
+ """
1167
+ return pulumi.get(self, "token_ttl")
1168
+
1169
+ @_builtins.property
1170
+ @pulumi.getter(name="tokenType")
1171
+ def token_type(self) -> pulumi.Output[Optional[_builtins.str]]:
1172
+ """
1173
+ The type of token to generate, service or batch
1174
+ """
1175
+ return pulumi.get(self, "token_type")
1176
+