pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,1194 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+ from . import outputs
17
+ from ._inputs import *
18
+
19
+ __all__ = ['AuthBackendArgs', 'AuthBackend']
20
+
21
+ @pulumi.input_type
22
+ class AuthBackendArgs:
23
+ def __init__(__self__, *,
24
+ organization: pulumi.Input[_builtins.str],
25
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
26
+ base_url: Optional[pulumi.Input[_builtins.str]] = None,
27
+ description: Optional[pulumi.Input[_builtins.str]] = None,
28
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
29
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
30
+ organization_id: Optional[pulumi.Input[_builtins.int]] = None,
31
+ path: Optional[pulumi.Input[_builtins.str]] = None,
32
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
33
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
34
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
35
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
36
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
37
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
38
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
39
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
40
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
41
+ tune: Optional[pulumi.Input['AuthBackendTuneArgs']] = None):
42
+ """
43
+ The set of arguments for constructing a AuthBackend resource.
44
+ :param pulumi.Input[_builtins.str] organization: The organization configured users must be part of.
45
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: (Optional) The metadata to be tied to generated entity alias.
46
+ This should be a list or map containing the metadata in key value pairs.
47
+ :param pulumi.Input[_builtins.str] base_url: The API endpoint to use. Useful if you
48
+ are running GitHub Enterprise or an API-compatible authentication server.
49
+ :param pulumi.Input[_builtins.str] description: Specifies the description of the mount.
50
+ This overrides the current stored value, if any.
51
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
52
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
53
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
54
+ The value should not contain leading or trailing forward slashes.
55
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
56
+ *Available only for Vault Enterprise*.
57
+ :param pulumi.Input[_builtins.int] organization_id: The ID of the organization users must be part of.
58
+ Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
59
+ :param pulumi.Input[_builtins.str] path: Path where the auth backend is mounted. Defaults to `auth/github`
60
+ if not specified.
61
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: (Optional) List of CIDR blocks; if set, specifies blocks of IP
62
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
63
+ as well.
64
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: (Optional) If set, will encode an
65
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
66
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
67
+ `token_max_ttl` would otherwise allow a renewal.
68
+ :param pulumi.Input[_builtins.int] token_max_ttl: (Optional) The maximum lifetime for generated tokens in number of seconds.
69
+ Its current value will be referenced at renewal time.
70
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: (Optional) If set, the default policy will not be set on
71
+ generated tokens; otherwise it will be added to the policies set in token_policies.
72
+ :param pulumi.Input[_builtins.int] token_num_uses: (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
73
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
74
+ :param pulumi.Input[_builtins.int] token_period: (Optional) If set, indicates that the
75
+ token generated using this role should never expire. The token should be renewed within the
76
+ duration specified by this value. At each renewal, the token's TTL will be set to the
77
+ value of this field. Specified in seconds.
78
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: (Optional) List of policies to encode onto generated tokens. Depending
79
+ on the auth method, this list may be supplemented by user/group/other values.
80
+ :param pulumi.Input[_builtins.int] token_ttl: (Optional) The incremental lifetime for generated tokens in number of seconds.
81
+ Its current value will be referenced at renewal time.
82
+ :param pulumi.Input[_builtins.str] token_type: Specifies the type of tokens that should be returned by
83
+ the mount. Valid values are "default-service", "default-batch", "service", "batch".
84
+ :param pulumi.Input['AuthBackendTuneArgs'] tune: Extra configuration block. Structure is documented below.
85
+
86
+ The `tune` block is used to tune the auth backend:
87
+ """
88
+ pulumi.set(__self__, "organization", organization)
89
+ if alias_metadata is not None:
90
+ pulumi.set(__self__, "alias_metadata", alias_metadata)
91
+ if base_url is not None:
92
+ pulumi.set(__self__, "base_url", base_url)
93
+ if description is not None:
94
+ pulumi.set(__self__, "description", description)
95
+ if disable_remount is not None:
96
+ pulumi.set(__self__, "disable_remount", disable_remount)
97
+ if namespace is not None:
98
+ pulumi.set(__self__, "namespace", namespace)
99
+ if organization_id is not None:
100
+ pulumi.set(__self__, "organization_id", organization_id)
101
+ if path is not None:
102
+ pulumi.set(__self__, "path", path)
103
+ if token_bound_cidrs is not None:
104
+ pulumi.set(__self__, "token_bound_cidrs", token_bound_cidrs)
105
+ if token_explicit_max_ttl is not None:
106
+ pulumi.set(__self__, "token_explicit_max_ttl", token_explicit_max_ttl)
107
+ if token_max_ttl is not None:
108
+ pulumi.set(__self__, "token_max_ttl", token_max_ttl)
109
+ if token_no_default_policy is not None:
110
+ pulumi.set(__self__, "token_no_default_policy", token_no_default_policy)
111
+ if token_num_uses is not None:
112
+ pulumi.set(__self__, "token_num_uses", token_num_uses)
113
+ if token_period is not None:
114
+ pulumi.set(__self__, "token_period", token_period)
115
+ if token_policies is not None:
116
+ pulumi.set(__self__, "token_policies", token_policies)
117
+ if token_ttl is not None:
118
+ pulumi.set(__self__, "token_ttl", token_ttl)
119
+ if token_type is not None:
120
+ pulumi.set(__self__, "token_type", token_type)
121
+ if tune is not None:
122
+ pulumi.set(__self__, "tune", tune)
123
+
124
+ @_builtins.property
125
+ @pulumi.getter
126
+ def organization(self) -> pulumi.Input[_builtins.str]:
127
+ """
128
+ The organization configured users must be part of.
129
+ """
130
+ return pulumi.get(self, "organization")
131
+
132
+ @organization.setter
133
+ def organization(self, value: pulumi.Input[_builtins.str]):
134
+ pulumi.set(self, "organization", value)
135
+
136
+ @_builtins.property
137
+ @pulumi.getter(name="aliasMetadata")
138
+ def alias_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
139
+ """
140
+ (Optional) The metadata to be tied to generated entity alias.
141
+ This should be a list or map containing the metadata in key value pairs.
142
+ """
143
+ return pulumi.get(self, "alias_metadata")
144
+
145
+ @alias_metadata.setter
146
+ def alias_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
147
+ pulumi.set(self, "alias_metadata", value)
148
+
149
+ @_builtins.property
150
+ @pulumi.getter(name="baseUrl")
151
+ def base_url(self) -> Optional[pulumi.Input[_builtins.str]]:
152
+ """
153
+ The API endpoint to use. Useful if you
154
+ are running GitHub Enterprise or an API-compatible authentication server.
155
+ """
156
+ return pulumi.get(self, "base_url")
157
+
158
+ @base_url.setter
159
+ def base_url(self, value: Optional[pulumi.Input[_builtins.str]]):
160
+ pulumi.set(self, "base_url", value)
161
+
162
+ @_builtins.property
163
+ @pulumi.getter
164
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
165
+ """
166
+ Specifies the description of the mount.
167
+ This overrides the current stored value, if any.
168
+ """
169
+ return pulumi.get(self, "description")
170
+
171
+ @description.setter
172
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
173
+ pulumi.set(self, "description", value)
174
+
175
+ @_builtins.property
176
+ @pulumi.getter(name="disableRemount")
177
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
178
+ """
179
+ If set, opts out of mount migration on path updates.
180
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
181
+ """
182
+ return pulumi.get(self, "disable_remount")
183
+
184
+ @disable_remount.setter
185
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
186
+ pulumi.set(self, "disable_remount", value)
187
+
188
+ @_builtins.property
189
+ @pulumi.getter
190
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
191
+ """
192
+ The namespace to provision the resource in.
193
+ The value should not contain leading or trailing forward slashes.
194
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
195
+ *Available only for Vault Enterprise*.
196
+ """
197
+ return pulumi.get(self, "namespace")
198
+
199
+ @namespace.setter
200
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
201
+ pulumi.set(self, "namespace", value)
202
+
203
+ @_builtins.property
204
+ @pulumi.getter(name="organizationId")
205
+ def organization_id(self) -> Optional[pulumi.Input[_builtins.int]]:
206
+ """
207
+ The ID of the organization users must be part of.
208
+ Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
209
+ """
210
+ return pulumi.get(self, "organization_id")
211
+
212
+ @organization_id.setter
213
+ def organization_id(self, value: Optional[pulumi.Input[_builtins.int]]):
214
+ pulumi.set(self, "organization_id", value)
215
+
216
+ @_builtins.property
217
+ @pulumi.getter
218
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
219
+ """
220
+ Path where the auth backend is mounted. Defaults to `auth/github`
221
+ if not specified.
222
+ """
223
+ return pulumi.get(self, "path")
224
+
225
+ @path.setter
226
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
227
+ pulumi.set(self, "path", value)
228
+
229
+ @_builtins.property
230
+ @pulumi.getter(name="tokenBoundCidrs")
231
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
232
+ """
233
+ (Optional) List of CIDR blocks; if set, specifies blocks of IP
234
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
235
+ as well.
236
+ """
237
+ return pulumi.get(self, "token_bound_cidrs")
238
+
239
+ @token_bound_cidrs.setter
240
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
241
+ pulumi.set(self, "token_bound_cidrs", value)
242
+
243
+ @_builtins.property
244
+ @pulumi.getter(name="tokenExplicitMaxTtl")
245
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
246
+ """
247
+ (Optional) If set, will encode an
248
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
249
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
250
+ `token_max_ttl` would otherwise allow a renewal.
251
+ """
252
+ return pulumi.get(self, "token_explicit_max_ttl")
253
+
254
+ @token_explicit_max_ttl.setter
255
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
256
+ pulumi.set(self, "token_explicit_max_ttl", value)
257
+
258
+ @_builtins.property
259
+ @pulumi.getter(name="tokenMaxTtl")
260
+ def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
261
+ """
262
+ (Optional) The maximum lifetime for generated tokens in number of seconds.
263
+ Its current value will be referenced at renewal time.
264
+ """
265
+ return pulumi.get(self, "token_max_ttl")
266
+
267
+ @token_max_ttl.setter
268
+ def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
269
+ pulumi.set(self, "token_max_ttl", value)
270
+
271
+ @_builtins.property
272
+ @pulumi.getter(name="tokenNoDefaultPolicy")
273
+ def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
274
+ """
275
+ (Optional) If set, the default policy will not be set on
276
+ generated tokens; otherwise it will be added to the policies set in token_policies.
277
+ """
278
+ return pulumi.get(self, "token_no_default_policy")
279
+
280
+ @token_no_default_policy.setter
281
+ def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
282
+ pulumi.set(self, "token_no_default_policy", value)
283
+
284
+ @_builtins.property
285
+ @pulumi.getter(name="tokenNumUses")
286
+ def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
287
+ """
288
+ (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
289
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
290
+ """
291
+ return pulumi.get(self, "token_num_uses")
292
+
293
+ @token_num_uses.setter
294
+ def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
295
+ pulumi.set(self, "token_num_uses", value)
296
+
297
+ @_builtins.property
298
+ @pulumi.getter(name="tokenPeriod")
299
+ def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
300
+ """
301
+ (Optional) If set, indicates that the
302
+ token generated using this role should never expire. The token should be renewed within the
303
+ duration specified by this value. At each renewal, the token's TTL will be set to the
304
+ value of this field. Specified in seconds.
305
+ """
306
+ return pulumi.get(self, "token_period")
307
+
308
+ @token_period.setter
309
+ def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
310
+ pulumi.set(self, "token_period", value)
311
+
312
+ @_builtins.property
313
+ @pulumi.getter(name="tokenPolicies")
314
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
315
+ """
316
+ (Optional) List of policies to encode onto generated tokens. Depending
317
+ on the auth method, this list may be supplemented by user/group/other values.
318
+ """
319
+ return pulumi.get(self, "token_policies")
320
+
321
+ @token_policies.setter
322
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
323
+ pulumi.set(self, "token_policies", value)
324
+
325
+ @_builtins.property
326
+ @pulumi.getter(name="tokenTtl")
327
+ def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
328
+ """
329
+ (Optional) The incremental lifetime for generated tokens in number of seconds.
330
+ Its current value will be referenced at renewal time.
331
+ """
332
+ return pulumi.get(self, "token_ttl")
333
+
334
+ @token_ttl.setter
335
+ def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
336
+ pulumi.set(self, "token_ttl", value)
337
+
338
+ @_builtins.property
339
+ @pulumi.getter(name="tokenType")
340
+ def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
341
+ """
342
+ Specifies the type of tokens that should be returned by
343
+ the mount. Valid values are "default-service", "default-batch", "service", "batch".
344
+ """
345
+ return pulumi.get(self, "token_type")
346
+
347
+ @token_type.setter
348
+ def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
349
+ pulumi.set(self, "token_type", value)
350
+
351
+ @_builtins.property
352
+ @pulumi.getter
353
+ def tune(self) -> Optional[pulumi.Input['AuthBackendTuneArgs']]:
354
+ """
355
+ Extra configuration block. Structure is documented below.
356
+
357
+ The `tune` block is used to tune the auth backend:
358
+ """
359
+ return pulumi.get(self, "tune")
360
+
361
+ @tune.setter
362
+ def tune(self, value: Optional[pulumi.Input['AuthBackendTuneArgs']]):
363
+ pulumi.set(self, "tune", value)
364
+
365
+
366
+ @pulumi.input_type
367
+ class _AuthBackendState:
368
+ def __init__(__self__, *,
369
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
370
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
371
+ base_url: Optional[pulumi.Input[_builtins.str]] = None,
372
+ description: Optional[pulumi.Input[_builtins.str]] = None,
373
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
374
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
375
+ organization: Optional[pulumi.Input[_builtins.str]] = None,
376
+ organization_id: Optional[pulumi.Input[_builtins.int]] = None,
377
+ path: Optional[pulumi.Input[_builtins.str]] = None,
378
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
379
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
380
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
381
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
382
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
383
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
384
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
385
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
386
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
387
+ tune: Optional[pulumi.Input['AuthBackendTuneArgs']] = None):
388
+ """
389
+ Input properties used for looking up and filtering AuthBackend resources.
390
+ :param pulumi.Input[_builtins.str] accessor: The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
391
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: (Optional) The metadata to be tied to generated entity alias.
392
+ This should be a list or map containing the metadata in key value pairs.
393
+ :param pulumi.Input[_builtins.str] base_url: The API endpoint to use. Useful if you
394
+ are running GitHub Enterprise or an API-compatible authentication server.
395
+ :param pulumi.Input[_builtins.str] description: Specifies the description of the mount.
396
+ This overrides the current stored value, if any.
397
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
398
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
399
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
400
+ The value should not contain leading or trailing forward slashes.
401
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
402
+ *Available only for Vault Enterprise*.
403
+ :param pulumi.Input[_builtins.str] organization: The organization configured users must be part of.
404
+ :param pulumi.Input[_builtins.int] organization_id: The ID of the organization users must be part of.
405
+ Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
406
+ :param pulumi.Input[_builtins.str] path: Path where the auth backend is mounted. Defaults to `auth/github`
407
+ if not specified.
408
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: (Optional) List of CIDR blocks; if set, specifies blocks of IP
409
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
410
+ as well.
411
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: (Optional) If set, will encode an
412
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
413
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
414
+ `token_max_ttl` would otherwise allow a renewal.
415
+ :param pulumi.Input[_builtins.int] token_max_ttl: (Optional) The maximum lifetime for generated tokens in number of seconds.
416
+ Its current value will be referenced at renewal time.
417
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: (Optional) If set, the default policy will not be set on
418
+ generated tokens; otherwise it will be added to the policies set in token_policies.
419
+ :param pulumi.Input[_builtins.int] token_num_uses: (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
420
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
421
+ :param pulumi.Input[_builtins.int] token_period: (Optional) If set, indicates that the
422
+ token generated using this role should never expire. The token should be renewed within the
423
+ duration specified by this value. At each renewal, the token's TTL will be set to the
424
+ value of this field. Specified in seconds.
425
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: (Optional) List of policies to encode onto generated tokens. Depending
426
+ on the auth method, this list may be supplemented by user/group/other values.
427
+ :param pulumi.Input[_builtins.int] token_ttl: (Optional) The incremental lifetime for generated tokens in number of seconds.
428
+ Its current value will be referenced at renewal time.
429
+ :param pulumi.Input[_builtins.str] token_type: Specifies the type of tokens that should be returned by
430
+ the mount. Valid values are "default-service", "default-batch", "service", "batch".
431
+ :param pulumi.Input['AuthBackendTuneArgs'] tune: Extra configuration block. Structure is documented below.
432
+
433
+ The `tune` block is used to tune the auth backend:
434
+ """
435
+ if accessor is not None:
436
+ pulumi.set(__self__, "accessor", accessor)
437
+ if alias_metadata is not None:
438
+ pulumi.set(__self__, "alias_metadata", alias_metadata)
439
+ if base_url is not None:
440
+ pulumi.set(__self__, "base_url", base_url)
441
+ if description is not None:
442
+ pulumi.set(__self__, "description", description)
443
+ if disable_remount is not None:
444
+ pulumi.set(__self__, "disable_remount", disable_remount)
445
+ if namespace is not None:
446
+ pulumi.set(__self__, "namespace", namespace)
447
+ if organization is not None:
448
+ pulumi.set(__self__, "organization", organization)
449
+ if organization_id is not None:
450
+ pulumi.set(__self__, "organization_id", organization_id)
451
+ if path is not None:
452
+ pulumi.set(__self__, "path", path)
453
+ if token_bound_cidrs is not None:
454
+ pulumi.set(__self__, "token_bound_cidrs", token_bound_cidrs)
455
+ if token_explicit_max_ttl is not None:
456
+ pulumi.set(__self__, "token_explicit_max_ttl", token_explicit_max_ttl)
457
+ if token_max_ttl is not None:
458
+ pulumi.set(__self__, "token_max_ttl", token_max_ttl)
459
+ if token_no_default_policy is not None:
460
+ pulumi.set(__self__, "token_no_default_policy", token_no_default_policy)
461
+ if token_num_uses is not None:
462
+ pulumi.set(__self__, "token_num_uses", token_num_uses)
463
+ if token_period is not None:
464
+ pulumi.set(__self__, "token_period", token_period)
465
+ if token_policies is not None:
466
+ pulumi.set(__self__, "token_policies", token_policies)
467
+ if token_ttl is not None:
468
+ pulumi.set(__self__, "token_ttl", token_ttl)
469
+ if token_type is not None:
470
+ pulumi.set(__self__, "token_type", token_type)
471
+ if tune is not None:
472
+ pulumi.set(__self__, "tune", tune)
473
+
474
+ @_builtins.property
475
+ @pulumi.getter
476
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
477
+ """
478
+ The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
479
+ """
480
+ return pulumi.get(self, "accessor")
481
+
482
+ @accessor.setter
483
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
484
+ pulumi.set(self, "accessor", value)
485
+
486
+ @_builtins.property
487
+ @pulumi.getter(name="aliasMetadata")
488
+ def alias_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
489
+ """
490
+ (Optional) The metadata to be tied to generated entity alias.
491
+ This should be a list or map containing the metadata in key value pairs.
492
+ """
493
+ return pulumi.get(self, "alias_metadata")
494
+
495
+ @alias_metadata.setter
496
+ def alias_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
497
+ pulumi.set(self, "alias_metadata", value)
498
+
499
+ @_builtins.property
500
+ @pulumi.getter(name="baseUrl")
501
+ def base_url(self) -> Optional[pulumi.Input[_builtins.str]]:
502
+ """
503
+ The API endpoint to use. Useful if you
504
+ are running GitHub Enterprise or an API-compatible authentication server.
505
+ """
506
+ return pulumi.get(self, "base_url")
507
+
508
+ @base_url.setter
509
+ def base_url(self, value: Optional[pulumi.Input[_builtins.str]]):
510
+ pulumi.set(self, "base_url", value)
511
+
512
+ @_builtins.property
513
+ @pulumi.getter
514
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
515
+ """
516
+ Specifies the description of the mount.
517
+ This overrides the current stored value, if any.
518
+ """
519
+ return pulumi.get(self, "description")
520
+
521
+ @description.setter
522
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
523
+ pulumi.set(self, "description", value)
524
+
525
+ @_builtins.property
526
+ @pulumi.getter(name="disableRemount")
527
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
528
+ """
529
+ If set, opts out of mount migration on path updates.
530
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
531
+ """
532
+ return pulumi.get(self, "disable_remount")
533
+
534
+ @disable_remount.setter
535
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
536
+ pulumi.set(self, "disable_remount", value)
537
+
538
+ @_builtins.property
539
+ @pulumi.getter
540
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
541
+ """
542
+ The namespace to provision the resource in.
543
+ The value should not contain leading or trailing forward slashes.
544
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
545
+ *Available only for Vault Enterprise*.
546
+ """
547
+ return pulumi.get(self, "namespace")
548
+
549
+ @namespace.setter
550
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
551
+ pulumi.set(self, "namespace", value)
552
+
553
+ @_builtins.property
554
+ @pulumi.getter
555
+ def organization(self) -> Optional[pulumi.Input[_builtins.str]]:
556
+ """
557
+ The organization configured users must be part of.
558
+ """
559
+ return pulumi.get(self, "organization")
560
+
561
+ @organization.setter
562
+ def organization(self, value: Optional[pulumi.Input[_builtins.str]]):
563
+ pulumi.set(self, "organization", value)
564
+
565
+ @_builtins.property
566
+ @pulumi.getter(name="organizationId")
567
+ def organization_id(self) -> Optional[pulumi.Input[_builtins.int]]:
568
+ """
569
+ The ID of the organization users must be part of.
570
+ Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
571
+ """
572
+ return pulumi.get(self, "organization_id")
573
+
574
+ @organization_id.setter
575
+ def organization_id(self, value: Optional[pulumi.Input[_builtins.int]]):
576
+ pulumi.set(self, "organization_id", value)
577
+
578
+ @_builtins.property
579
+ @pulumi.getter
580
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
581
+ """
582
+ Path where the auth backend is mounted. Defaults to `auth/github`
583
+ if not specified.
584
+ """
585
+ return pulumi.get(self, "path")
586
+
587
+ @path.setter
588
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
589
+ pulumi.set(self, "path", value)
590
+
591
+ @_builtins.property
592
+ @pulumi.getter(name="tokenBoundCidrs")
593
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
594
+ """
595
+ (Optional) List of CIDR blocks; if set, specifies blocks of IP
596
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
597
+ as well.
598
+ """
599
+ return pulumi.get(self, "token_bound_cidrs")
600
+
601
+ @token_bound_cidrs.setter
602
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
603
+ pulumi.set(self, "token_bound_cidrs", value)
604
+
605
+ @_builtins.property
606
+ @pulumi.getter(name="tokenExplicitMaxTtl")
607
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
608
+ """
609
+ (Optional) If set, will encode an
610
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
611
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
612
+ `token_max_ttl` would otherwise allow a renewal.
613
+ """
614
+ return pulumi.get(self, "token_explicit_max_ttl")
615
+
616
+ @token_explicit_max_ttl.setter
617
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
618
+ pulumi.set(self, "token_explicit_max_ttl", value)
619
+
620
+ @_builtins.property
621
+ @pulumi.getter(name="tokenMaxTtl")
622
+ def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
623
+ """
624
+ (Optional) The maximum lifetime for generated tokens in number of seconds.
625
+ Its current value will be referenced at renewal time.
626
+ """
627
+ return pulumi.get(self, "token_max_ttl")
628
+
629
+ @token_max_ttl.setter
630
+ def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
631
+ pulumi.set(self, "token_max_ttl", value)
632
+
633
+ @_builtins.property
634
+ @pulumi.getter(name="tokenNoDefaultPolicy")
635
+ def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
636
+ """
637
+ (Optional) If set, the default policy will not be set on
638
+ generated tokens; otherwise it will be added to the policies set in token_policies.
639
+ """
640
+ return pulumi.get(self, "token_no_default_policy")
641
+
642
+ @token_no_default_policy.setter
643
+ def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
644
+ pulumi.set(self, "token_no_default_policy", value)
645
+
646
+ @_builtins.property
647
+ @pulumi.getter(name="tokenNumUses")
648
+ def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
649
+ """
650
+ (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
651
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
652
+ """
653
+ return pulumi.get(self, "token_num_uses")
654
+
655
+ @token_num_uses.setter
656
+ def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
657
+ pulumi.set(self, "token_num_uses", value)
658
+
659
+ @_builtins.property
660
+ @pulumi.getter(name="tokenPeriod")
661
+ def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
662
+ """
663
+ (Optional) If set, indicates that the
664
+ token generated using this role should never expire. The token should be renewed within the
665
+ duration specified by this value. At each renewal, the token's TTL will be set to the
666
+ value of this field. Specified in seconds.
667
+ """
668
+ return pulumi.get(self, "token_period")
669
+
670
+ @token_period.setter
671
+ def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
672
+ pulumi.set(self, "token_period", value)
673
+
674
+ @_builtins.property
675
+ @pulumi.getter(name="tokenPolicies")
676
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
677
+ """
678
+ (Optional) List of policies to encode onto generated tokens. Depending
679
+ on the auth method, this list may be supplemented by user/group/other values.
680
+ """
681
+ return pulumi.get(self, "token_policies")
682
+
683
+ @token_policies.setter
684
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
685
+ pulumi.set(self, "token_policies", value)
686
+
687
+ @_builtins.property
688
+ @pulumi.getter(name="tokenTtl")
689
+ def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
690
+ """
691
+ (Optional) The incremental lifetime for generated tokens in number of seconds.
692
+ Its current value will be referenced at renewal time.
693
+ """
694
+ return pulumi.get(self, "token_ttl")
695
+
696
+ @token_ttl.setter
697
+ def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
698
+ pulumi.set(self, "token_ttl", value)
699
+
700
+ @_builtins.property
701
+ @pulumi.getter(name="tokenType")
702
+ def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
703
+ """
704
+ Specifies the type of tokens that should be returned by
705
+ the mount. Valid values are "default-service", "default-batch", "service", "batch".
706
+ """
707
+ return pulumi.get(self, "token_type")
708
+
709
+ @token_type.setter
710
+ def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
711
+ pulumi.set(self, "token_type", value)
712
+
713
+ @_builtins.property
714
+ @pulumi.getter
715
+ def tune(self) -> Optional[pulumi.Input['AuthBackendTuneArgs']]:
716
+ """
717
+ Extra configuration block. Structure is documented below.
718
+
719
+ The `tune` block is used to tune the auth backend:
720
+ """
721
+ return pulumi.get(self, "tune")
722
+
723
+ @tune.setter
724
+ def tune(self, value: Optional[pulumi.Input['AuthBackendTuneArgs']]):
725
+ pulumi.set(self, "tune", value)
726
+
727
+
728
+ @pulumi.type_token("vault:github/authBackend:AuthBackend")
729
+ class AuthBackend(pulumi.CustomResource):
730
+ @overload
731
+ def __init__(__self__,
732
+ resource_name: str,
733
+ opts: Optional[pulumi.ResourceOptions] = None,
734
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
735
+ base_url: Optional[pulumi.Input[_builtins.str]] = None,
736
+ description: Optional[pulumi.Input[_builtins.str]] = None,
737
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
738
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
739
+ organization: Optional[pulumi.Input[_builtins.str]] = None,
740
+ organization_id: Optional[pulumi.Input[_builtins.int]] = None,
741
+ path: Optional[pulumi.Input[_builtins.str]] = None,
742
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
743
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
744
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
745
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
746
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
747
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
748
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
749
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
750
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
751
+ tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
752
+ __props__=None):
753
+ """
754
+ Manages a GitHub Auth mount in a Vault server. See the [Vault
755
+ documentation](https://www.vaultproject.io/docs/auth/github/) for more
756
+ information.
757
+
758
+ ## Example Usage
759
+
760
+ ```python
761
+ import pulumi
762
+ import pulumi_vault as vault
763
+
764
+ example = vault.github.AuthBackend("example", organization="myorg")
765
+ ```
766
+
767
+ ## Import
768
+
769
+ GitHub authentication mounts can be imported using the `path`, e.g.
770
+
771
+ ```sh
772
+ $ pulumi import vault:github/authBackend:AuthBackend example github
773
+ ```
774
+
775
+ :param str resource_name: The name of the resource.
776
+ :param pulumi.ResourceOptions opts: Options for the resource.
777
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: (Optional) The metadata to be tied to generated entity alias.
778
+ This should be a list or map containing the metadata in key value pairs.
779
+ :param pulumi.Input[_builtins.str] base_url: The API endpoint to use. Useful if you
780
+ are running GitHub Enterprise or an API-compatible authentication server.
781
+ :param pulumi.Input[_builtins.str] description: Specifies the description of the mount.
782
+ This overrides the current stored value, if any.
783
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
784
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
785
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
786
+ The value should not contain leading or trailing forward slashes.
787
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
788
+ *Available only for Vault Enterprise*.
789
+ :param pulumi.Input[_builtins.str] organization: The organization configured users must be part of.
790
+ :param pulumi.Input[_builtins.int] organization_id: The ID of the organization users must be part of.
791
+ Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
792
+ :param pulumi.Input[_builtins.str] path: Path where the auth backend is mounted. Defaults to `auth/github`
793
+ if not specified.
794
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: (Optional) List of CIDR blocks; if set, specifies blocks of IP
795
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
796
+ as well.
797
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: (Optional) If set, will encode an
798
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
799
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
800
+ `token_max_ttl` would otherwise allow a renewal.
801
+ :param pulumi.Input[_builtins.int] token_max_ttl: (Optional) The maximum lifetime for generated tokens in number of seconds.
802
+ Its current value will be referenced at renewal time.
803
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: (Optional) If set, the default policy will not be set on
804
+ generated tokens; otherwise it will be added to the policies set in token_policies.
805
+ :param pulumi.Input[_builtins.int] token_num_uses: (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
806
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
807
+ :param pulumi.Input[_builtins.int] token_period: (Optional) If set, indicates that the
808
+ token generated using this role should never expire. The token should be renewed within the
809
+ duration specified by this value. At each renewal, the token's TTL will be set to the
810
+ value of this field. Specified in seconds.
811
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: (Optional) List of policies to encode onto generated tokens. Depending
812
+ on the auth method, this list may be supplemented by user/group/other values.
813
+ :param pulumi.Input[_builtins.int] token_ttl: (Optional) The incremental lifetime for generated tokens in number of seconds.
814
+ Its current value will be referenced at renewal time.
815
+ :param pulumi.Input[_builtins.str] token_type: Specifies the type of tokens that should be returned by
816
+ the mount. Valid values are "default-service", "default-batch", "service", "batch".
817
+ :param pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']] tune: Extra configuration block. Structure is documented below.
818
+
819
+ The `tune` block is used to tune the auth backend:
820
+ """
821
+ ...
822
+ @overload
823
+ def __init__(__self__,
824
+ resource_name: str,
825
+ args: AuthBackendArgs,
826
+ opts: Optional[pulumi.ResourceOptions] = None):
827
+ """
828
+ Manages a GitHub Auth mount in a Vault server. See the [Vault
829
+ documentation](https://www.vaultproject.io/docs/auth/github/) for more
830
+ information.
831
+
832
+ ## Example Usage
833
+
834
+ ```python
835
+ import pulumi
836
+ import pulumi_vault as vault
837
+
838
+ example = vault.github.AuthBackend("example", organization="myorg")
839
+ ```
840
+
841
+ ## Import
842
+
843
+ GitHub authentication mounts can be imported using the `path`, e.g.
844
+
845
+ ```sh
846
+ $ pulumi import vault:github/authBackend:AuthBackend example github
847
+ ```
848
+
849
+ :param str resource_name: The name of the resource.
850
+ :param AuthBackendArgs args: The arguments to use to populate this resource's properties.
851
+ :param pulumi.ResourceOptions opts: Options for the resource.
852
+ """
853
+ ...
854
+ def __init__(__self__, resource_name: str, *args, **kwargs):
855
+ resource_args, opts = _utilities.get_resource_args_opts(AuthBackendArgs, pulumi.ResourceOptions, *args, **kwargs)
856
+ if resource_args is not None:
857
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
858
+ else:
859
+ __self__._internal_init(resource_name, *args, **kwargs)
860
+
861
+ def _internal_init(__self__,
862
+ resource_name: str,
863
+ opts: Optional[pulumi.ResourceOptions] = None,
864
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
865
+ base_url: Optional[pulumi.Input[_builtins.str]] = None,
866
+ description: Optional[pulumi.Input[_builtins.str]] = None,
867
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
868
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
869
+ organization: Optional[pulumi.Input[_builtins.str]] = None,
870
+ organization_id: Optional[pulumi.Input[_builtins.int]] = None,
871
+ path: Optional[pulumi.Input[_builtins.str]] = None,
872
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
873
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
874
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
875
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
876
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
877
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
878
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
879
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
880
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
881
+ tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
882
+ __props__=None):
883
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
884
+ if not isinstance(opts, pulumi.ResourceOptions):
885
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
886
+ if opts.id is None:
887
+ if __props__ is not None:
888
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
889
+ __props__ = AuthBackendArgs.__new__(AuthBackendArgs)
890
+
891
+ __props__.__dict__["alias_metadata"] = alias_metadata
892
+ __props__.__dict__["base_url"] = base_url
893
+ __props__.__dict__["description"] = description
894
+ __props__.__dict__["disable_remount"] = disable_remount
895
+ __props__.__dict__["namespace"] = namespace
896
+ if organization is None and not opts.urn:
897
+ raise TypeError("Missing required property 'organization'")
898
+ __props__.__dict__["organization"] = organization
899
+ __props__.__dict__["organization_id"] = organization_id
900
+ __props__.__dict__["path"] = path
901
+ __props__.__dict__["token_bound_cidrs"] = token_bound_cidrs
902
+ __props__.__dict__["token_explicit_max_ttl"] = token_explicit_max_ttl
903
+ __props__.__dict__["token_max_ttl"] = token_max_ttl
904
+ __props__.__dict__["token_no_default_policy"] = token_no_default_policy
905
+ __props__.__dict__["token_num_uses"] = token_num_uses
906
+ __props__.__dict__["token_period"] = token_period
907
+ __props__.__dict__["token_policies"] = token_policies
908
+ __props__.__dict__["token_ttl"] = token_ttl
909
+ __props__.__dict__["token_type"] = token_type
910
+ __props__.__dict__["tune"] = tune
911
+ __props__.__dict__["accessor"] = None
912
+ super(AuthBackend, __self__).__init__(
913
+ 'vault:github/authBackend:AuthBackend',
914
+ resource_name,
915
+ __props__,
916
+ opts)
917
+
918
+ @staticmethod
919
+ def get(resource_name: str,
920
+ id: pulumi.Input[str],
921
+ opts: Optional[pulumi.ResourceOptions] = None,
922
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
923
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
924
+ base_url: Optional[pulumi.Input[_builtins.str]] = None,
925
+ description: Optional[pulumi.Input[_builtins.str]] = None,
926
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
927
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
928
+ organization: Optional[pulumi.Input[_builtins.str]] = None,
929
+ organization_id: Optional[pulumi.Input[_builtins.int]] = None,
930
+ path: Optional[pulumi.Input[_builtins.str]] = None,
931
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
932
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
933
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
934
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
935
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
936
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
937
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
938
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
939
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
940
+ tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None) -> 'AuthBackend':
941
+ """
942
+ Get an existing AuthBackend resource's state with the given name, id, and optional extra
943
+ properties used to qualify the lookup.
944
+
945
+ :param str resource_name: The unique name of the resulting resource.
946
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
947
+ :param pulumi.ResourceOptions opts: Options for the resource.
948
+ :param pulumi.Input[_builtins.str] accessor: The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
949
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: (Optional) The metadata to be tied to generated entity alias.
950
+ This should be a list or map containing the metadata in key value pairs.
951
+ :param pulumi.Input[_builtins.str] base_url: The API endpoint to use. Useful if you
952
+ are running GitHub Enterprise or an API-compatible authentication server.
953
+ :param pulumi.Input[_builtins.str] description: Specifies the description of the mount.
954
+ This overrides the current stored value, if any.
955
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
956
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
957
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
958
+ The value should not contain leading or trailing forward slashes.
959
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
960
+ *Available only for Vault Enterprise*.
961
+ :param pulumi.Input[_builtins.str] organization: The organization configured users must be part of.
962
+ :param pulumi.Input[_builtins.int] organization_id: The ID of the organization users must be part of.
963
+ Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
964
+ :param pulumi.Input[_builtins.str] path: Path where the auth backend is mounted. Defaults to `auth/github`
965
+ if not specified.
966
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: (Optional) List of CIDR blocks; if set, specifies blocks of IP
967
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
968
+ as well.
969
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: (Optional) If set, will encode an
970
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
971
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
972
+ `token_max_ttl` would otherwise allow a renewal.
973
+ :param pulumi.Input[_builtins.int] token_max_ttl: (Optional) The maximum lifetime for generated tokens in number of seconds.
974
+ Its current value will be referenced at renewal time.
975
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: (Optional) If set, the default policy will not be set on
976
+ generated tokens; otherwise it will be added to the policies set in token_policies.
977
+ :param pulumi.Input[_builtins.int] token_num_uses: (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
978
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
979
+ :param pulumi.Input[_builtins.int] token_period: (Optional) If set, indicates that the
980
+ token generated using this role should never expire. The token should be renewed within the
981
+ duration specified by this value. At each renewal, the token's TTL will be set to the
982
+ value of this field. Specified in seconds.
983
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: (Optional) List of policies to encode onto generated tokens. Depending
984
+ on the auth method, this list may be supplemented by user/group/other values.
985
+ :param pulumi.Input[_builtins.int] token_ttl: (Optional) The incremental lifetime for generated tokens in number of seconds.
986
+ Its current value will be referenced at renewal time.
987
+ :param pulumi.Input[_builtins.str] token_type: Specifies the type of tokens that should be returned by
988
+ the mount. Valid values are "default-service", "default-batch", "service", "batch".
989
+ :param pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']] tune: Extra configuration block. Structure is documented below.
990
+
991
+ The `tune` block is used to tune the auth backend:
992
+ """
993
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
994
+
995
+ __props__ = _AuthBackendState.__new__(_AuthBackendState)
996
+
997
+ __props__.__dict__["accessor"] = accessor
998
+ __props__.__dict__["alias_metadata"] = alias_metadata
999
+ __props__.__dict__["base_url"] = base_url
1000
+ __props__.__dict__["description"] = description
1001
+ __props__.__dict__["disable_remount"] = disable_remount
1002
+ __props__.__dict__["namespace"] = namespace
1003
+ __props__.__dict__["organization"] = organization
1004
+ __props__.__dict__["organization_id"] = organization_id
1005
+ __props__.__dict__["path"] = path
1006
+ __props__.__dict__["token_bound_cidrs"] = token_bound_cidrs
1007
+ __props__.__dict__["token_explicit_max_ttl"] = token_explicit_max_ttl
1008
+ __props__.__dict__["token_max_ttl"] = token_max_ttl
1009
+ __props__.__dict__["token_no_default_policy"] = token_no_default_policy
1010
+ __props__.__dict__["token_num_uses"] = token_num_uses
1011
+ __props__.__dict__["token_period"] = token_period
1012
+ __props__.__dict__["token_policies"] = token_policies
1013
+ __props__.__dict__["token_ttl"] = token_ttl
1014
+ __props__.__dict__["token_type"] = token_type
1015
+ __props__.__dict__["tune"] = tune
1016
+ return AuthBackend(resource_name, opts=opts, __props__=__props__)
1017
+
1018
+ @_builtins.property
1019
+ @pulumi.getter
1020
+ def accessor(self) -> pulumi.Output[_builtins.str]:
1021
+ """
1022
+ The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
1023
+ """
1024
+ return pulumi.get(self, "accessor")
1025
+
1026
+ @_builtins.property
1027
+ @pulumi.getter(name="aliasMetadata")
1028
+ def alias_metadata(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
1029
+ """
1030
+ (Optional) The metadata to be tied to generated entity alias.
1031
+ This should be a list or map containing the metadata in key value pairs.
1032
+ """
1033
+ return pulumi.get(self, "alias_metadata")
1034
+
1035
+ @_builtins.property
1036
+ @pulumi.getter(name="baseUrl")
1037
+ def base_url(self) -> pulumi.Output[Optional[_builtins.str]]:
1038
+ """
1039
+ The API endpoint to use. Useful if you
1040
+ are running GitHub Enterprise or an API-compatible authentication server.
1041
+ """
1042
+ return pulumi.get(self, "base_url")
1043
+
1044
+ @_builtins.property
1045
+ @pulumi.getter
1046
+ def description(self) -> pulumi.Output[Optional[_builtins.str]]:
1047
+ """
1048
+ Specifies the description of the mount.
1049
+ This overrides the current stored value, if any.
1050
+ """
1051
+ return pulumi.get(self, "description")
1052
+
1053
+ @_builtins.property
1054
+ @pulumi.getter(name="disableRemount")
1055
+ def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
1056
+ """
1057
+ If set, opts out of mount migration on path updates.
1058
+ See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1059
+ """
1060
+ return pulumi.get(self, "disable_remount")
1061
+
1062
+ @_builtins.property
1063
+ @pulumi.getter
1064
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
1065
+ """
1066
+ The namespace to provision the resource in.
1067
+ The value should not contain leading or trailing forward slashes.
1068
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1069
+ *Available only for Vault Enterprise*.
1070
+ """
1071
+ return pulumi.get(self, "namespace")
1072
+
1073
+ @_builtins.property
1074
+ @pulumi.getter
1075
+ def organization(self) -> pulumi.Output[_builtins.str]:
1076
+ """
1077
+ The organization configured users must be part of.
1078
+ """
1079
+ return pulumi.get(self, "organization")
1080
+
1081
+ @_builtins.property
1082
+ @pulumi.getter(name="organizationId")
1083
+ def organization_id(self) -> pulumi.Output[_builtins.int]:
1084
+ """
1085
+ The ID of the organization users must be part of.
1086
+ Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
1087
+ """
1088
+ return pulumi.get(self, "organization_id")
1089
+
1090
+ @_builtins.property
1091
+ @pulumi.getter
1092
+ def path(self) -> pulumi.Output[Optional[_builtins.str]]:
1093
+ """
1094
+ Path where the auth backend is mounted. Defaults to `auth/github`
1095
+ if not specified.
1096
+ """
1097
+ return pulumi.get(self, "path")
1098
+
1099
+ @_builtins.property
1100
+ @pulumi.getter(name="tokenBoundCidrs")
1101
+ def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1102
+ """
1103
+ (Optional) List of CIDR blocks; if set, specifies blocks of IP
1104
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
1105
+ as well.
1106
+ """
1107
+ return pulumi.get(self, "token_bound_cidrs")
1108
+
1109
+ @_builtins.property
1110
+ @pulumi.getter(name="tokenExplicitMaxTtl")
1111
+ def token_explicit_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1112
+ """
1113
+ (Optional) If set, will encode an
1114
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1115
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1116
+ `token_max_ttl` would otherwise allow a renewal.
1117
+ """
1118
+ return pulumi.get(self, "token_explicit_max_ttl")
1119
+
1120
+ @_builtins.property
1121
+ @pulumi.getter(name="tokenMaxTtl")
1122
+ def token_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1123
+ """
1124
+ (Optional) The maximum lifetime for generated tokens in number of seconds.
1125
+ Its current value will be referenced at renewal time.
1126
+ """
1127
+ return pulumi.get(self, "token_max_ttl")
1128
+
1129
+ @_builtins.property
1130
+ @pulumi.getter(name="tokenNoDefaultPolicy")
1131
+ def token_no_default_policy(self) -> pulumi.Output[Optional[_builtins.bool]]:
1132
+ """
1133
+ (Optional) If set, the default policy will not be set on
1134
+ generated tokens; otherwise it will be added to the policies set in token_policies.
1135
+ """
1136
+ return pulumi.get(self, "token_no_default_policy")
1137
+
1138
+ @_builtins.property
1139
+ @pulumi.getter(name="tokenNumUses")
1140
+ def token_num_uses(self) -> pulumi.Output[Optional[_builtins.int]]:
1141
+ """
1142
+ (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
1143
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
1144
+ """
1145
+ return pulumi.get(self, "token_num_uses")
1146
+
1147
+ @_builtins.property
1148
+ @pulumi.getter(name="tokenPeriod")
1149
+ def token_period(self) -> pulumi.Output[Optional[_builtins.int]]:
1150
+ """
1151
+ (Optional) If set, indicates that the
1152
+ token generated using this role should never expire. The token should be renewed within the
1153
+ duration specified by this value. At each renewal, the token's TTL will be set to the
1154
+ value of this field. Specified in seconds.
1155
+ """
1156
+ return pulumi.get(self, "token_period")
1157
+
1158
+ @_builtins.property
1159
+ @pulumi.getter(name="tokenPolicies")
1160
+ def token_policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1161
+ """
1162
+ (Optional) List of policies to encode onto generated tokens. Depending
1163
+ on the auth method, this list may be supplemented by user/group/other values.
1164
+ """
1165
+ return pulumi.get(self, "token_policies")
1166
+
1167
+ @_builtins.property
1168
+ @pulumi.getter(name="tokenTtl")
1169
+ def token_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1170
+ """
1171
+ (Optional) The incremental lifetime for generated tokens in number of seconds.
1172
+ Its current value will be referenced at renewal time.
1173
+ """
1174
+ return pulumi.get(self, "token_ttl")
1175
+
1176
+ @_builtins.property
1177
+ @pulumi.getter(name="tokenType")
1178
+ def token_type(self) -> pulumi.Output[Optional[_builtins.str]]:
1179
+ """
1180
+ Specifies the type of tokens that should be returned by
1181
+ the mount. Valid values are "default-service", "default-batch", "service", "batch".
1182
+ """
1183
+ return pulumi.get(self, "token_type")
1184
+
1185
+ @_builtins.property
1186
+ @pulumi.getter
1187
+ def tune(self) -> pulumi.Output['outputs.AuthBackendTune']:
1188
+ """
1189
+ Extra configuration block. Structure is documented below.
1190
+
1191
+ The `tune` block is used to tune the auth backend:
1192
+ """
1193
+ return pulumi.get(self, "tune")
1194
+