pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,514 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = [
18
+ 'GetAuthBackendRoleResult',
19
+ 'AwaitableGetAuthBackendRoleResult',
20
+ 'get_auth_backend_role',
21
+ 'get_auth_backend_role_output',
22
+ ]
23
+
24
+ @pulumi.output_type
25
+ class GetAuthBackendRoleResult:
26
+ """
27
+ A collection of values returned by getAuthBackendRole.
28
+ """
29
+ def __init__(__self__, alias_metadata=None, backend=None, bound_instance_groups=None, bound_labels=None, bound_projects=None, bound_regions=None, bound_service_accounts=None, bound_zones=None, id=None, namespace=None, role_id=None, role_name=None, token_bound_cidrs=None, token_explicit_max_ttl=None, token_max_ttl=None, token_no_default_policy=None, token_num_uses=None, token_period=None, token_policies=None, token_ttl=None, token_type=None, type=None):
30
+ if alias_metadata and not isinstance(alias_metadata, dict):
31
+ raise TypeError("Expected argument 'alias_metadata' to be a dict")
32
+ pulumi.set(__self__, "alias_metadata", alias_metadata)
33
+ if backend and not isinstance(backend, str):
34
+ raise TypeError("Expected argument 'backend' to be a str")
35
+ pulumi.set(__self__, "backend", backend)
36
+ if bound_instance_groups and not isinstance(bound_instance_groups, list):
37
+ raise TypeError("Expected argument 'bound_instance_groups' to be a list")
38
+ pulumi.set(__self__, "bound_instance_groups", bound_instance_groups)
39
+ if bound_labels and not isinstance(bound_labels, list):
40
+ raise TypeError("Expected argument 'bound_labels' to be a list")
41
+ pulumi.set(__self__, "bound_labels", bound_labels)
42
+ if bound_projects and not isinstance(bound_projects, list):
43
+ raise TypeError("Expected argument 'bound_projects' to be a list")
44
+ pulumi.set(__self__, "bound_projects", bound_projects)
45
+ if bound_regions and not isinstance(bound_regions, list):
46
+ raise TypeError("Expected argument 'bound_regions' to be a list")
47
+ pulumi.set(__self__, "bound_regions", bound_regions)
48
+ if bound_service_accounts and not isinstance(bound_service_accounts, list):
49
+ raise TypeError("Expected argument 'bound_service_accounts' to be a list")
50
+ pulumi.set(__self__, "bound_service_accounts", bound_service_accounts)
51
+ if bound_zones and not isinstance(bound_zones, list):
52
+ raise TypeError("Expected argument 'bound_zones' to be a list")
53
+ pulumi.set(__self__, "bound_zones", bound_zones)
54
+ if id and not isinstance(id, str):
55
+ raise TypeError("Expected argument 'id' to be a str")
56
+ pulumi.set(__self__, "id", id)
57
+ if namespace and not isinstance(namespace, str):
58
+ raise TypeError("Expected argument 'namespace' to be a str")
59
+ pulumi.set(__self__, "namespace", namespace)
60
+ if role_id and not isinstance(role_id, str):
61
+ raise TypeError("Expected argument 'role_id' to be a str")
62
+ pulumi.set(__self__, "role_id", role_id)
63
+ if role_name and not isinstance(role_name, str):
64
+ raise TypeError("Expected argument 'role_name' to be a str")
65
+ pulumi.set(__self__, "role_name", role_name)
66
+ if token_bound_cidrs and not isinstance(token_bound_cidrs, list):
67
+ raise TypeError("Expected argument 'token_bound_cidrs' to be a list")
68
+ pulumi.set(__self__, "token_bound_cidrs", token_bound_cidrs)
69
+ if token_explicit_max_ttl and not isinstance(token_explicit_max_ttl, int):
70
+ raise TypeError("Expected argument 'token_explicit_max_ttl' to be a int")
71
+ pulumi.set(__self__, "token_explicit_max_ttl", token_explicit_max_ttl)
72
+ if token_max_ttl and not isinstance(token_max_ttl, int):
73
+ raise TypeError("Expected argument 'token_max_ttl' to be a int")
74
+ pulumi.set(__self__, "token_max_ttl", token_max_ttl)
75
+ if token_no_default_policy and not isinstance(token_no_default_policy, bool):
76
+ raise TypeError("Expected argument 'token_no_default_policy' to be a bool")
77
+ pulumi.set(__self__, "token_no_default_policy", token_no_default_policy)
78
+ if token_num_uses and not isinstance(token_num_uses, int):
79
+ raise TypeError("Expected argument 'token_num_uses' to be a int")
80
+ pulumi.set(__self__, "token_num_uses", token_num_uses)
81
+ if token_period and not isinstance(token_period, int):
82
+ raise TypeError("Expected argument 'token_period' to be a int")
83
+ pulumi.set(__self__, "token_period", token_period)
84
+ if token_policies and not isinstance(token_policies, list):
85
+ raise TypeError("Expected argument 'token_policies' to be a list")
86
+ pulumi.set(__self__, "token_policies", token_policies)
87
+ if token_ttl and not isinstance(token_ttl, int):
88
+ raise TypeError("Expected argument 'token_ttl' to be a int")
89
+ pulumi.set(__self__, "token_ttl", token_ttl)
90
+ if token_type and not isinstance(token_type, str):
91
+ raise TypeError("Expected argument 'token_type' to be a str")
92
+ pulumi.set(__self__, "token_type", token_type)
93
+ if type and not isinstance(type, str):
94
+ raise TypeError("Expected argument 'type' to be a str")
95
+ pulumi.set(__self__, "type", type)
96
+
97
+ @_builtins.property
98
+ @pulumi.getter(name="aliasMetadata")
99
+ def alias_metadata(self) -> Optional[Mapping[str, _builtins.str]]:
100
+ return pulumi.get(self, "alias_metadata")
101
+
102
+ @_builtins.property
103
+ @pulumi.getter
104
+ def backend(self) -> Optional[_builtins.str]:
105
+ return pulumi.get(self, "backend")
106
+
107
+ @_builtins.property
108
+ @pulumi.getter(name="boundInstanceGroups")
109
+ def bound_instance_groups(self) -> Sequence[_builtins.str]:
110
+ """
111
+ GCP regions bound to the role. Returned when `type` is `gce`.
112
+ """
113
+ return pulumi.get(self, "bound_instance_groups")
114
+
115
+ @_builtins.property
116
+ @pulumi.getter(name="boundLabels")
117
+ def bound_labels(self) -> Sequence[_builtins.str]:
118
+ """
119
+ GCP labels bound to the role. Returned when `type` is `gce`.
120
+ """
121
+ return pulumi.get(self, "bound_labels")
122
+
123
+ @_builtins.property
124
+ @pulumi.getter(name="boundProjects")
125
+ def bound_projects(self) -> Sequence[_builtins.str]:
126
+ """
127
+ GCP projects bound to the role.
128
+ """
129
+ return pulumi.get(self, "bound_projects")
130
+
131
+ @_builtins.property
132
+ @pulumi.getter(name="boundRegions")
133
+ def bound_regions(self) -> Sequence[_builtins.str]:
134
+ """
135
+ GCP regions bound to the role. Returned when `type` is `gce`.
136
+ """
137
+ return pulumi.get(self, "bound_regions")
138
+
139
+ @_builtins.property
140
+ @pulumi.getter(name="boundServiceAccounts")
141
+ def bound_service_accounts(self) -> Sequence[_builtins.str]:
142
+ """
143
+ GCP service accounts bound to the role. Returned when `type` is `iam`.
144
+ """
145
+ return pulumi.get(self, "bound_service_accounts")
146
+
147
+ @_builtins.property
148
+ @pulumi.getter(name="boundZones")
149
+ def bound_zones(self) -> Sequence[_builtins.str]:
150
+ """
151
+ GCP zones bound to the role. Returned when `type` is `gce`.
152
+ """
153
+ return pulumi.get(self, "bound_zones")
154
+
155
+ @_builtins.property
156
+ @pulumi.getter
157
+ def id(self) -> _builtins.str:
158
+ """
159
+ The provider-assigned unique ID for this managed resource.
160
+ """
161
+ return pulumi.get(self, "id")
162
+
163
+ @_builtins.property
164
+ @pulumi.getter
165
+ def namespace(self) -> Optional[_builtins.str]:
166
+ return pulumi.get(self, "namespace")
167
+
168
+ @_builtins.property
169
+ @pulumi.getter(name="roleId")
170
+ def role_id(self) -> _builtins.str:
171
+ """
172
+ The RoleID of the GCP role.
173
+ """
174
+ return pulumi.get(self, "role_id")
175
+
176
+ @_builtins.property
177
+ @pulumi.getter(name="roleName")
178
+ def role_name(self) -> _builtins.str:
179
+ return pulumi.get(self, "role_name")
180
+
181
+ @_builtins.property
182
+ @pulumi.getter(name="tokenBoundCidrs")
183
+ def token_bound_cidrs(self) -> Optional[Sequence[_builtins.str]]:
184
+ """
185
+ List of CIDR blocks; if set, specifies blocks of IP
186
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
187
+ as well.
188
+ """
189
+ return pulumi.get(self, "token_bound_cidrs")
190
+
191
+ @_builtins.property
192
+ @pulumi.getter(name="tokenExplicitMaxTtl")
193
+ def token_explicit_max_ttl(self) -> Optional[_builtins.int]:
194
+ """
195
+ If set, will encode an
196
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
197
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
198
+ `token_max_ttl` would otherwise allow a renewal.
199
+ """
200
+ return pulumi.get(self, "token_explicit_max_ttl")
201
+
202
+ @_builtins.property
203
+ @pulumi.getter(name="tokenMaxTtl")
204
+ def token_max_ttl(self) -> Optional[_builtins.int]:
205
+ """
206
+ The maximum lifetime for generated tokens in number of seconds.
207
+ Its current value will be referenced at renewal time.
208
+ """
209
+ return pulumi.get(self, "token_max_ttl")
210
+
211
+ @_builtins.property
212
+ @pulumi.getter(name="tokenNoDefaultPolicy")
213
+ def token_no_default_policy(self) -> Optional[_builtins.bool]:
214
+ """
215
+ If set, the default policy will not be set on
216
+ generated tokens; otherwise it will be added to the policies set in token_policies.
217
+ """
218
+ return pulumi.get(self, "token_no_default_policy")
219
+
220
+ @_builtins.property
221
+ @pulumi.getter(name="tokenNumUses")
222
+ def token_num_uses(self) -> Optional[_builtins.int]:
223
+ """
224
+ The
225
+ [period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
226
+ if any, in number of seconds to set on the token.
227
+ """
228
+ return pulumi.get(self, "token_num_uses")
229
+
230
+ @_builtins.property
231
+ @pulumi.getter(name="tokenPeriod")
232
+ def token_period(self) -> Optional[_builtins.int]:
233
+ """
234
+ (Optional) If set, indicates that the
235
+ token generated using this role should never expire. The token should be renewed within the
236
+ duration specified by this value. At each renewal, the token's TTL will be set to the
237
+ value of this field. Specified in seconds.
238
+ """
239
+ return pulumi.get(self, "token_period")
240
+
241
+ @_builtins.property
242
+ @pulumi.getter(name="tokenPolicies")
243
+ def token_policies(self) -> Optional[Sequence[_builtins.str]]:
244
+ """
245
+ List of policies to encode onto generated tokens. Depending
246
+ on the auth method, this list may be supplemented by user/group/other values.
247
+ """
248
+ return pulumi.get(self, "token_policies")
249
+
250
+ @_builtins.property
251
+ @pulumi.getter(name="tokenTtl")
252
+ def token_ttl(self) -> Optional[_builtins.int]:
253
+ """
254
+ The incremental lifetime for generated tokens in number of seconds.
255
+ Its current value will be referenced at renewal time.
256
+ """
257
+ return pulumi.get(self, "token_ttl")
258
+
259
+ @_builtins.property
260
+ @pulumi.getter(name="tokenType")
261
+ def token_type(self) -> Optional[_builtins.str]:
262
+ """
263
+ The type of token that should be generated. Can be `service`,
264
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
265
+ `service` tokens). For token store roles, there are two additional possibilities:
266
+ `default-service` and `default-batch` which specify the type to return unless the client
267
+ requests a different type at generation time.
268
+ """
269
+ return pulumi.get(self, "token_type")
270
+
271
+ @_builtins.property
272
+ @pulumi.getter
273
+ def type(self) -> _builtins.str:
274
+ """
275
+ Type of GCP role. Expected values are `iam` or `gce`.
276
+ """
277
+ return pulumi.get(self, "type")
278
+
279
+
280
+ class AwaitableGetAuthBackendRoleResult(GetAuthBackendRoleResult):
281
+ # pylint: disable=using-constant-test
282
+ def __await__(self):
283
+ if False:
284
+ yield self
285
+ return GetAuthBackendRoleResult(
286
+ alias_metadata=self.alias_metadata,
287
+ backend=self.backend,
288
+ bound_instance_groups=self.bound_instance_groups,
289
+ bound_labels=self.bound_labels,
290
+ bound_projects=self.bound_projects,
291
+ bound_regions=self.bound_regions,
292
+ bound_service_accounts=self.bound_service_accounts,
293
+ bound_zones=self.bound_zones,
294
+ id=self.id,
295
+ namespace=self.namespace,
296
+ role_id=self.role_id,
297
+ role_name=self.role_name,
298
+ token_bound_cidrs=self.token_bound_cidrs,
299
+ token_explicit_max_ttl=self.token_explicit_max_ttl,
300
+ token_max_ttl=self.token_max_ttl,
301
+ token_no_default_policy=self.token_no_default_policy,
302
+ token_num_uses=self.token_num_uses,
303
+ token_period=self.token_period,
304
+ token_policies=self.token_policies,
305
+ token_ttl=self.token_ttl,
306
+ token_type=self.token_type,
307
+ type=self.type)
308
+
309
+
310
+ def get_auth_backend_role(alias_metadata: Optional[Mapping[str, _builtins.str]] = None,
311
+ backend: Optional[_builtins.str] = None,
312
+ namespace: Optional[_builtins.str] = None,
313
+ role_name: Optional[_builtins.str] = None,
314
+ token_bound_cidrs: Optional[Sequence[_builtins.str]] = None,
315
+ token_explicit_max_ttl: Optional[_builtins.int] = None,
316
+ token_max_ttl: Optional[_builtins.int] = None,
317
+ token_no_default_policy: Optional[_builtins.bool] = None,
318
+ token_num_uses: Optional[_builtins.int] = None,
319
+ token_period: Optional[_builtins.int] = None,
320
+ token_policies: Optional[Sequence[_builtins.str]] = None,
321
+ token_ttl: Optional[_builtins.int] = None,
322
+ token_type: Optional[_builtins.str] = None,
323
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetAuthBackendRoleResult:
324
+ """
325
+ Reads a GCP auth role from a Vault server.
326
+
327
+ ## Example Usage
328
+
329
+ ```python
330
+ import pulumi
331
+ import pulumi_vault as vault
332
+
333
+ role = vault.gcp.get_auth_backend_role(backend="my-gcp-backend",
334
+ role_name="my-role")
335
+ pulumi.export("role-id", role.role_id)
336
+ ```
337
+
338
+
339
+ :param _builtins.str backend: The unique name for the GCP backend from which to fetch the role. Defaults to "gcp".
340
+ :param _builtins.str namespace: The namespace of the target resource.
341
+ The value should not contain leading or trailing forward slashes.
342
+ The `namespace` is always relative to the provider's configured namespace.
343
+ *Available only for Vault Enterprise*.
344
+ :param _builtins.str role_name: The name of the role to retrieve the Role ID for.
345
+ :param Sequence[_builtins.str] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
346
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
347
+ as well.
348
+ :param _builtins.int token_explicit_max_ttl: If set, will encode an
349
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
350
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
351
+ `token_max_ttl` would otherwise allow a renewal.
352
+ :param _builtins.int token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
353
+ Its current value will be referenced at renewal time.
354
+ :param _builtins.bool token_no_default_policy: If set, the default policy will not be set on
355
+ generated tokens; otherwise it will be added to the policies set in token_policies.
356
+ :param _builtins.int token_num_uses: The
357
+ [period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
358
+ if any, in number of seconds to set on the token.
359
+ :param _builtins.int token_period: (Optional) If set, indicates that the
360
+ token generated using this role should never expire. The token should be renewed within the
361
+ duration specified by this value. At each renewal, the token's TTL will be set to the
362
+ value of this field. Specified in seconds.
363
+ :param Sequence[_builtins.str] token_policies: List of policies to encode onto generated tokens. Depending
364
+ on the auth method, this list may be supplemented by user/group/other values.
365
+ :param _builtins.int token_ttl: The incremental lifetime for generated tokens in number of seconds.
366
+ Its current value will be referenced at renewal time.
367
+ :param _builtins.str token_type: The type of token that should be generated. Can be `service`,
368
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
369
+ `service` tokens). For token store roles, there are two additional possibilities:
370
+ `default-service` and `default-batch` which specify the type to return unless the client
371
+ requests a different type at generation time.
372
+ """
373
+ __args__ = dict()
374
+ __args__['aliasMetadata'] = alias_metadata
375
+ __args__['backend'] = backend
376
+ __args__['namespace'] = namespace
377
+ __args__['roleName'] = role_name
378
+ __args__['tokenBoundCidrs'] = token_bound_cidrs
379
+ __args__['tokenExplicitMaxTtl'] = token_explicit_max_ttl
380
+ __args__['tokenMaxTtl'] = token_max_ttl
381
+ __args__['tokenNoDefaultPolicy'] = token_no_default_policy
382
+ __args__['tokenNumUses'] = token_num_uses
383
+ __args__['tokenPeriod'] = token_period
384
+ __args__['tokenPolicies'] = token_policies
385
+ __args__['tokenTtl'] = token_ttl
386
+ __args__['tokenType'] = token_type
387
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
388
+ __ret__ = pulumi.runtime.invoke('vault:gcp/getAuthBackendRole:getAuthBackendRole', __args__, opts=opts, typ=GetAuthBackendRoleResult).value
389
+
390
+ return AwaitableGetAuthBackendRoleResult(
391
+ alias_metadata=pulumi.get(__ret__, 'alias_metadata'),
392
+ backend=pulumi.get(__ret__, 'backend'),
393
+ bound_instance_groups=pulumi.get(__ret__, 'bound_instance_groups'),
394
+ bound_labels=pulumi.get(__ret__, 'bound_labels'),
395
+ bound_projects=pulumi.get(__ret__, 'bound_projects'),
396
+ bound_regions=pulumi.get(__ret__, 'bound_regions'),
397
+ bound_service_accounts=pulumi.get(__ret__, 'bound_service_accounts'),
398
+ bound_zones=pulumi.get(__ret__, 'bound_zones'),
399
+ id=pulumi.get(__ret__, 'id'),
400
+ namespace=pulumi.get(__ret__, 'namespace'),
401
+ role_id=pulumi.get(__ret__, 'role_id'),
402
+ role_name=pulumi.get(__ret__, 'role_name'),
403
+ token_bound_cidrs=pulumi.get(__ret__, 'token_bound_cidrs'),
404
+ token_explicit_max_ttl=pulumi.get(__ret__, 'token_explicit_max_ttl'),
405
+ token_max_ttl=pulumi.get(__ret__, 'token_max_ttl'),
406
+ token_no_default_policy=pulumi.get(__ret__, 'token_no_default_policy'),
407
+ token_num_uses=pulumi.get(__ret__, 'token_num_uses'),
408
+ token_period=pulumi.get(__ret__, 'token_period'),
409
+ token_policies=pulumi.get(__ret__, 'token_policies'),
410
+ token_ttl=pulumi.get(__ret__, 'token_ttl'),
411
+ token_type=pulumi.get(__ret__, 'token_type'),
412
+ type=pulumi.get(__ret__, 'type'))
413
+ def get_auth_backend_role_output(alias_metadata: Optional[pulumi.Input[Optional[Mapping[str, _builtins.str]]]] = None,
414
+ backend: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
415
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
416
+ role_name: Optional[pulumi.Input[_builtins.str]] = None,
417
+ token_bound_cidrs: Optional[pulumi.Input[Optional[Sequence[_builtins.str]]]] = None,
418
+ token_explicit_max_ttl: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
419
+ token_max_ttl: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
420
+ token_no_default_policy: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
421
+ token_num_uses: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
422
+ token_period: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
423
+ token_policies: Optional[pulumi.Input[Optional[Sequence[_builtins.str]]]] = None,
424
+ token_ttl: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
425
+ token_type: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
426
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAuthBackendRoleResult]:
427
+ """
428
+ Reads a GCP auth role from a Vault server.
429
+
430
+ ## Example Usage
431
+
432
+ ```python
433
+ import pulumi
434
+ import pulumi_vault as vault
435
+
436
+ role = vault.gcp.get_auth_backend_role(backend="my-gcp-backend",
437
+ role_name="my-role")
438
+ pulumi.export("role-id", role.role_id)
439
+ ```
440
+
441
+
442
+ :param _builtins.str backend: The unique name for the GCP backend from which to fetch the role. Defaults to "gcp".
443
+ :param _builtins.str namespace: The namespace of the target resource.
444
+ The value should not contain leading or trailing forward slashes.
445
+ The `namespace` is always relative to the provider's configured namespace.
446
+ *Available only for Vault Enterprise*.
447
+ :param _builtins.str role_name: The name of the role to retrieve the Role ID for.
448
+ :param Sequence[_builtins.str] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
449
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
450
+ as well.
451
+ :param _builtins.int token_explicit_max_ttl: If set, will encode an
452
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
453
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
454
+ `token_max_ttl` would otherwise allow a renewal.
455
+ :param _builtins.int token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
456
+ Its current value will be referenced at renewal time.
457
+ :param _builtins.bool token_no_default_policy: If set, the default policy will not be set on
458
+ generated tokens; otherwise it will be added to the policies set in token_policies.
459
+ :param _builtins.int token_num_uses: The
460
+ [period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
461
+ if any, in number of seconds to set on the token.
462
+ :param _builtins.int token_period: (Optional) If set, indicates that the
463
+ token generated using this role should never expire. The token should be renewed within the
464
+ duration specified by this value. At each renewal, the token's TTL will be set to the
465
+ value of this field. Specified in seconds.
466
+ :param Sequence[_builtins.str] token_policies: List of policies to encode onto generated tokens. Depending
467
+ on the auth method, this list may be supplemented by user/group/other values.
468
+ :param _builtins.int token_ttl: The incremental lifetime for generated tokens in number of seconds.
469
+ Its current value will be referenced at renewal time.
470
+ :param _builtins.str token_type: The type of token that should be generated. Can be `service`,
471
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
472
+ `service` tokens). For token store roles, there are two additional possibilities:
473
+ `default-service` and `default-batch` which specify the type to return unless the client
474
+ requests a different type at generation time.
475
+ """
476
+ __args__ = dict()
477
+ __args__['aliasMetadata'] = alias_metadata
478
+ __args__['backend'] = backend
479
+ __args__['namespace'] = namespace
480
+ __args__['roleName'] = role_name
481
+ __args__['tokenBoundCidrs'] = token_bound_cidrs
482
+ __args__['tokenExplicitMaxTtl'] = token_explicit_max_ttl
483
+ __args__['tokenMaxTtl'] = token_max_ttl
484
+ __args__['tokenNoDefaultPolicy'] = token_no_default_policy
485
+ __args__['tokenNumUses'] = token_num_uses
486
+ __args__['tokenPeriod'] = token_period
487
+ __args__['tokenPolicies'] = token_policies
488
+ __args__['tokenTtl'] = token_ttl
489
+ __args__['tokenType'] = token_type
490
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
491
+ __ret__ = pulumi.runtime.invoke_output('vault:gcp/getAuthBackendRole:getAuthBackendRole', __args__, opts=opts, typ=GetAuthBackendRoleResult)
492
+ return __ret__.apply(lambda __response__: GetAuthBackendRoleResult(
493
+ alias_metadata=pulumi.get(__response__, 'alias_metadata'),
494
+ backend=pulumi.get(__response__, 'backend'),
495
+ bound_instance_groups=pulumi.get(__response__, 'bound_instance_groups'),
496
+ bound_labels=pulumi.get(__response__, 'bound_labels'),
497
+ bound_projects=pulumi.get(__response__, 'bound_projects'),
498
+ bound_regions=pulumi.get(__response__, 'bound_regions'),
499
+ bound_service_accounts=pulumi.get(__response__, 'bound_service_accounts'),
500
+ bound_zones=pulumi.get(__response__, 'bound_zones'),
501
+ id=pulumi.get(__response__, 'id'),
502
+ namespace=pulumi.get(__response__, 'namespace'),
503
+ role_id=pulumi.get(__response__, 'role_id'),
504
+ role_name=pulumi.get(__response__, 'role_name'),
505
+ token_bound_cidrs=pulumi.get(__response__, 'token_bound_cidrs'),
506
+ token_explicit_max_ttl=pulumi.get(__response__, 'token_explicit_max_ttl'),
507
+ token_max_ttl=pulumi.get(__response__, 'token_max_ttl'),
508
+ token_no_default_policy=pulumi.get(__response__, 'token_no_default_policy'),
509
+ token_num_uses=pulumi.get(__response__, 'token_num_uses'),
510
+ token_period=pulumi.get(__response__, 'token_period'),
511
+ token_policies=pulumi.get(__response__, 'token_policies'),
512
+ token_ttl=pulumi.get(__response__, 'token_ttl'),
513
+ token_type=pulumi.get(__response__, 'token_type'),
514
+ type=pulumi.get(__response__, 'type')))