pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,866 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
18
+
19
+ @pulumi.input_type
20
+ class AuthBackendRoleArgs:
21
+ def __init__(__self__, *,
22
+ arn: pulumi.Input[_builtins.str],
23
+ role: pulumi.Input[_builtins.str],
24
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
25
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
26
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
27
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
28
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
29
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
30
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
31
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
32
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
33
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
34
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
35
+ token_type: Optional[pulumi.Input[_builtins.str]] = None):
36
+ """
37
+ The set of arguments for constructing a AuthBackendRole resource.
38
+ :param pulumi.Input[_builtins.str] arn: The role's arn.
39
+ :param pulumi.Input[_builtins.str] role: Name of the role. Must correspond with the name of
40
+ the role reflected in the arn.
41
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
42
+ This should be a list or map containing the metadata in key value pairs.
43
+ :param pulumi.Input[_builtins.str] backend: Path to the mounted AliCloud auth backend.
44
+ Defaults to `alicloud`
45
+
46
+ For more details on the usage of each argument consult the [Vault AliCloud API documentation](https://www.vaultproject.io/api-docs/auth/alicloud).
47
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
48
+ The value should not contain leading or trailing forward slashes.
49
+ The `namespace` is always relative to the provider's configured namespace.
50
+ *Available only for Vault Enterprise*.
51
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
52
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
53
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
54
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
55
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
56
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
57
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
58
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
59
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
60
+ """
61
+ pulumi.set(__self__, "arn", arn)
62
+ pulumi.set(__self__, "role", role)
63
+ if alias_metadata is not None:
64
+ pulumi.set(__self__, "alias_metadata", alias_metadata)
65
+ if backend is not None:
66
+ pulumi.set(__self__, "backend", backend)
67
+ if namespace is not None:
68
+ pulumi.set(__self__, "namespace", namespace)
69
+ if token_bound_cidrs is not None:
70
+ pulumi.set(__self__, "token_bound_cidrs", token_bound_cidrs)
71
+ if token_explicit_max_ttl is not None:
72
+ pulumi.set(__self__, "token_explicit_max_ttl", token_explicit_max_ttl)
73
+ if token_max_ttl is not None:
74
+ pulumi.set(__self__, "token_max_ttl", token_max_ttl)
75
+ if token_no_default_policy is not None:
76
+ pulumi.set(__self__, "token_no_default_policy", token_no_default_policy)
77
+ if token_num_uses is not None:
78
+ pulumi.set(__self__, "token_num_uses", token_num_uses)
79
+ if token_period is not None:
80
+ pulumi.set(__self__, "token_period", token_period)
81
+ if token_policies is not None:
82
+ pulumi.set(__self__, "token_policies", token_policies)
83
+ if token_ttl is not None:
84
+ pulumi.set(__self__, "token_ttl", token_ttl)
85
+ if token_type is not None:
86
+ pulumi.set(__self__, "token_type", token_type)
87
+
88
+ @_builtins.property
89
+ @pulumi.getter
90
+ def arn(self) -> pulumi.Input[_builtins.str]:
91
+ """
92
+ The role's arn.
93
+ """
94
+ return pulumi.get(self, "arn")
95
+
96
+ @arn.setter
97
+ def arn(self, value: pulumi.Input[_builtins.str]):
98
+ pulumi.set(self, "arn", value)
99
+
100
+ @_builtins.property
101
+ @pulumi.getter
102
+ def role(self) -> pulumi.Input[_builtins.str]:
103
+ """
104
+ Name of the role. Must correspond with the name of
105
+ the role reflected in the arn.
106
+ """
107
+ return pulumi.get(self, "role")
108
+
109
+ @role.setter
110
+ def role(self, value: pulumi.Input[_builtins.str]):
111
+ pulumi.set(self, "role", value)
112
+
113
+ @_builtins.property
114
+ @pulumi.getter(name="aliasMetadata")
115
+ def alias_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
116
+ """
117
+ The metadata to be tied to generated entity alias.
118
+ This should be a list or map containing the metadata in key value pairs.
119
+ """
120
+ return pulumi.get(self, "alias_metadata")
121
+
122
+ @alias_metadata.setter
123
+ def alias_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
124
+ pulumi.set(self, "alias_metadata", value)
125
+
126
+ @_builtins.property
127
+ @pulumi.getter
128
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
129
+ """
130
+ Path to the mounted AliCloud auth backend.
131
+ Defaults to `alicloud`
132
+
133
+ For more details on the usage of each argument consult the [Vault AliCloud API documentation](https://www.vaultproject.io/api-docs/auth/alicloud).
134
+ """
135
+ return pulumi.get(self, "backend")
136
+
137
+ @backend.setter
138
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
139
+ pulumi.set(self, "backend", value)
140
+
141
+ @_builtins.property
142
+ @pulumi.getter
143
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
144
+ """
145
+ The namespace to provision the resource in.
146
+ The value should not contain leading or trailing forward slashes.
147
+ The `namespace` is always relative to the provider's configured namespace.
148
+ *Available only for Vault Enterprise*.
149
+ """
150
+ return pulumi.get(self, "namespace")
151
+
152
+ @namespace.setter
153
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
154
+ pulumi.set(self, "namespace", value)
155
+
156
+ @_builtins.property
157
+ @pulumi.getter(name="tokenBoundCidrs")
158
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
159
+ """
160
+ Specifies the blocks of IP addresses which are allowed to use the generated token
161
+ """
162
+ return pulumi.get(self, "token_bound_cidrs")
163
+
164
+ @token_bound_cidrs.setter
165
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
166
+ pulumi.set(self, "token_bound_cidrs", value)
167
+
168
+ @_builtins.property
169
+ @pulumi.getter(name="tokenExplicitMaxTtl")
170
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
171
+ """
172
+ Generated Token's Explicit Maximum TTL in seconds
173
+ """
174
+ return pulumi.get(self, "token_explicit_max_ttl")
175
+
176
+ @token_explicit_max_ttl.setter
177
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
178
+ pulumi.set(self, "token_explicit_max_ttl", value)
179
+
180
+ @_builtins.property
181
+ @pulumi.getter(name="tokenMaxTtl")
182
+ def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
183
+ """
184
+ The maximum lifetime of the generated token
185
+ """
186
+ return pulumi.get(self, "token_max_ttl")
187
+
188
+ @token_max_ttl.setter
189
+ def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
190
+ pulumi.set(self, "token_max_ttl", value)
191
+
192
+ @_builtins.property
193
+ @pulumi.getter(name="tokenNoDefaultPolicy")
194
+ def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
195
+ """
196
+ If true, the 'default' policy will not automatically be added to generated tokens
197
+ """
198
+ return pulumi.get(self, "token_no_default_policy")
199
+
200
+ @token_no_default_policy.setter
201
+ def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
202
+ pulumi.set(self, "token_no_default_policy", value)
203
+
204
+ @_builtins.property
205
+ @pulumi.getter(name="tokenNumUses")
206
+ def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
207
+ """
208
+ The maximum number of times a token may be used, a value of zero means unlimited
209
+ """
210
+ return pulumi.get(self, "token_num_uses")
211
+
212
+ @token_num_uses.setter
213
+ def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
214
+ pulumi.set(self, "token_num_uses", value)
215
+
216
+ @_builtins.property
217
+ @pulumi.getter(name="tokenPeriod")
218
+ def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
219
+ """
220
+ Generated Token's Period
221
+ """
222
+ return pulumi.get(self, "token_period")
223
+
224
+ @token_period.setter
225
+ def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
226
+ pulumi.set(self, "token_period", value)
227
+
228
+ @_builtins.property
229
+ @pulumi.getter(name="tokenPolicies")
230
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
231
+ """
232
+ Generated Token's Policies
233
+ """
234
+ return pulumi.get(self, "token_policies")
235
+
236
+ @token_policies.setter
237
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
238
+ pulumi.set(self, "token_policies", value)
239
+
240
+ @_builtins.property
241
+ @pulumi.getter(name="tokenTtl")
242
+ def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
243
+ """
244
+ The initial ttl of the token to generate in seconds
245
+ """
246
+ return pulumi.get(self, "token_ttl")
247
+
248
+ @token_ttl.setter
249
+ def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
250
+ pulumi.set(self, "token_ttl", value)
251
+
252
+ @_builtins.property
253
+ @pulumi.getter(name="tokenType")
254
+ def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
255
+ """
256
+ The type of token to generate, service or batch
257
+ """
258
+ return pulumi.get(self, "token_type")
259
+
260
+ @token_type.setter
261
+ def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
262
+ pulumi.set(self, "token_type", value)
263
+
264
+
265
+ @pulumi.input_type
266
+ class _AuthBackendRoleState:
267
+ def __init__(__self__, *,
268
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
269
+ arn: Optional[pulumi.Input[_builtins.str]] = None,
270
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
271
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
272
+ role: Optional[pulumi.Input[_builtins.str]] = None,
273
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
274
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
275
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
276
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
277
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
278
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
279
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
280
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
281
+ token_type: Optional[pulumi.Input[_builtins.str]] = None):
282
+ """
283
+ Input properties used for looking up and filtering AuthBackendRole resources.
284
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
285
+ This should be a list or map containing the metadata in key value pairs.
286
+ :param pulumi.Input[_builtins.str] arn: The role's arn.
287
+ :param pulumi.Input[_builtins.str] backend: Path to the mounted AliCloud auth backend.
288
+ Defaults to `alicloud`
289
+
290
+ For more details on the usage of each argument consult the [Vault AliCloud API documentation](https://www.vaultproject.io/api-docs/auth/alicloud).
291
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
292
+ The value should not contain leading or trailing forward slashes.
293
+ The `namespace` is always relative to the provider's configured namespace.
294
+ *Available only for Vault Enterprise*.
295
+ :param pulumi.Input[_builtins.str] role: Name of the role. Must correspond with the name of
296
+ the role reflected in the arn.
297
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
298
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
299
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
300
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
301
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
302
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
303
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
304
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
305
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
306
+ """
307
+ if alias_metadata is not None:
308
+ pulumi.set(__self__, "alias_metadata", alias_metadata)
309
+ if arn is not None:
310
+ pulumi.set(__self__, "arn", arn)
311
+ if backend is not None:
312
+ pulumi.set(__self__, "backend", backend)
313
+ if namespace is not None:
314
+ pulumi.set(__self__, "namespace", namespace)
315
+ if role is not None:
316
+ pulumi.set(__self__, "role", role)
317
+ if token_bound_cidrs is not None:
318
+ pulumi.set(__self__, "token_bound_cidrs", token_bound_cidrs)
319
+ if token_explicit_max_ttl is not None:
320
+ pulumi.set(__self__, "token_explicit_max_ttl", token_explicit_max_ttl)
321
+ if token_max_ttl is not None:
322
+ pulumi.set(__self__, "token_max_ttl", token_max_ttl)
323
+ if token_no_default_policy is not None:
324
+ pulumi.set(__self__, "token_no_default_policy", token_no_default_policy)
325
+ if token_num_uses is not None:
326
+ pulumi.set(__self__, "token_num_uses", token_num_uses)
327
+ if token_period is not None:
328
+ pulumi.set(__self__, "token_period", token_period)
329
+ if token_policies is not None:
330
+ pulumi.set(__self__, "token_policies", token_policies)
331
+ if token_ttl is not None:
332
+ pulumi.set(__self__, "token_ttl", token_ttl)
333
+ if token_type is not None:
334
+ pulumi.set(__self__, "token_type", token_type)
335
+
336
+ @_builtins.property
337
+ @pulumi.getter(name="aliasMetadata")
338
+ def alias_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
339
+ """
340
+ The metadata to be tied to generated entity alias.
341
+ This should be a list or map containing the metadata in key value pairs.
342
+ """
343
+ return pulumi.get(self, "alias_metadata")
344
+
345
+ @alias_metadata.setter
346
+ def alias_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
347
+ pulumi.set(self, "alias_metadata", value)
348
+
349
+ @_builtins.property
350
+ @pulumi.getter
351
+ def arn(self) -> Optional[pulumi.Input[_builtins.str]]:
352
+ """
353
+ The role's arn.
354
+ """
355
+ return pulumi.get(self, "arn")
356
+
357
+ @arn.setter
358
+ def arn(self, value: Optional[pulumi.Input[_builtins.str]]):
359
+ pulumi.set(self, "arn", value)
360
+
361
+ @_builtins.property
362
+ @pulumi.getter
363
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
364
+ """
365
+ Path to the mounted AliCloud auth backend.
366
+ Defaults to `alicloud`
367
+
368
+ For more details on the usage of each argument consult the [Vault AliCloud API documentation](https://www.vaultproject.io/api-docs/auth/alicloud).
369
+ """
370
+ return pulumi.get(self, "backend")
371
+
372
+ @backend.setter
373
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
374
+ pulumi.set(self, "backend", value)
375
+
376
+ @_builtins.property
377
+ @pulumi.getter
378
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
379
+ """
380
+ The namespace to provision the resource in.
381
+ The value should not contain leading or trailing forward slashes.
382
+ The `namespace` is always relative to the provider's configured namespace.
383
+ *Available only for Vault Enterprise*.
384
+ """
385
+ return pulumi.get(self, "namespace")
386
+
387
+ @namespace.setter
388
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
389
+ pulumi.set(self, "namespace", value)
390
+
391
+ @_builtins.property
392
+ @pulumi.getter
393
+ def role(self) -> Optional[pulumi.Input[_builtins.str]]:
394
+ """
395
+ Name of the role. Must correspond with the name of
396
+ the role reflected in the arn.
397
+ """
398
+ return pulumi.get(self, "role")
399
+
400
+ @role.setter
401
+ def role(self, value: Optional[pulumi.Input[_builtins.str]]):
402
+ pulumi.set(self, "role", value)
403
+
404
+ @_builtins.property
405
+ @pulumi.getter(name="tokenBoundCidrs")
406
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
407
+ """
408
+ Specifies the blocks of IP addresses which are allowed to use the generated token
409
+ """
410
+ return pulumi.get(self, "token_bound_cidrs")
411
+
412
+ @token_bound_cidrs.setter
413
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
414
+ pulumi.set(self, "token_bound_cidrs", value)
415
+
416
+ @_builtins.property
417
+ @pulumi.getter(name="tokenExplicitMaxTtl")
418
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
419
+ """
420
+ Generated Token's Explicit Maximum TTL in seconds
421
+ """
422
+ return pulumi.get(self, "token_explicit_max_ttl")
423
+
424
+ @token_explicit_max_ttl.setter
425
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
426
+ pulumi.set(self, "token_explicit_max_ttl", value)
427
+
428
+ @_builtins.property
429
+ @pulumi.getter(name="tokenMaxTtl")
430
+ def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
431
+ """
432
+ The maximum lifetime of the generated token
433
+ """
434
+ return pulumi.get(self, "token_max_ttl")
435
+
436
+ @token_max_ttl.setter
437
+ def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
438
+ pulumi.set(self, "token_max_ttl", value)
439
+
440
+ @_builtins.property
441
+ @pulumi.getter(name="tokenNoDefaultPolicy")
442
+ def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
443
+ """
444
+ If true, the 'default' policy will not automatically be added to generated tokens
445
+ """
446
+ return pulumi.get(self, "token_no_default_policy")
447
+
448
+ @token_no_default_policy.setter
449
+ def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
450
+ pulumi.set(self, "token_no_default_policy", value)
451
+
452
+ @_builtins.property
453
+ @pulumi.getter(name="tokenNumUses")
454
+ def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
455
+ """
456
+ The maximum number of times a token may be used, a value of zero means unlimited
457
+ """
458
+ return pulumi.get(self, "token_num_uses")
459
+
460
+ @token_num_uses.setter
461
+ def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
462
+ pulumi.set(self, "token_num_uses", value)
463
+
464
+ @_builtins.property
465
+ @pulumi.getter(name="tokenPeriod")
466
+ def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
467
+ """
468
+ Generated Token's Period
469
+ """
470
+ return pulumi.get(self, "token_period")
471
+
472
+ @token_period.setter
473
+ def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
474
+ pulumi.set(self, "token_period", value)
475
+
476
+ @_builtins.property
477
+ @pulumi.getter(name="tokenPolicies")
478
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
479
+ """
480
+ Generated Token's Policies
481
+ """
482
+ return pulumi.get(self, "token_policies")
483
+
484
+ @token_policies.setter
485
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
486
+ pulumi.set(self, "token_policies", value)
487
+
488
+ @_builtins.property
489
+ @pulumi.getter(name="tokenTtl")
490
+ def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
491
+ """
492
+ The initial ttl of the token to generate in seconds
493
+ """
494
+ return pulumi.get(self, "token_ttl")
495
+
496
+ @token_ttl.setter
497
+ def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
498
+ pulumi.set(self, "token_ttl", value)
499
+
500
+ @_builtins.property
501
+ @pulumi.getter(name="tokenType")
502
+ def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
503
+ """
504
+ The type of token to generate, service or batch
505
+ """
506
+ return pulumi.get(self, "token_type")
507
+
508
+ @token_type.setter
509
+ def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
510
+ pulumi.set(self, "token_type", value)
511
+
512
+
513
+ @pulumi.type_token("vault:alicloud/authBackendRole:AuthBackendRole")
514
+ class AuthBackendRole(pulumi.CustomResource):
515
+ @overload
516
+ def __init__(__self__,
517
+ resource_name: str,
518
+ opts: Optional[pulumi.ResourceOptions] = None,
519
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
520
+ arn: Optional[pulumi.Input[_builtins.str]] = None,
521
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
522
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
523
+ role: Optional[pulumi.Input[_builtins.str]] = None,
524
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
525
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
526
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
527
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
528
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
529
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
530
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
531
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
532
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
533
+ __props__=None):
534
+ """
535
+ Provides a resource to create a role in an [AliCloud auth backend within Vault](https://www.vaultproject.io/docs/auth/alicloud.html).
536
+
537
+ ## Example Usage
538
+
539
+ ```python
540
+ import pulumi
541
+ import pulumi_vault as vault
542
+
543
+ alicloud = vault.AuthBackend("alicloud",
544
+ type="alicloud",
545
+ path="alicloud")
546
+ alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("alicloud",
547
+ backend=alicloud.path,
548
+ role="example",
549
+ arn="acs:ram:123456:tf:role/foobar")
550
+ ```
551
+
552
+ ## Import
553
+
554
+ Alicloud authentication roles can be imported using the `path`, e.g.
555
+
556
+ ```sh
557
+ $ pulumi import vault:alicloud/authBackendRole:AuthBackendRole my_role auth/alicloud/role/my_role
558
+ ```
559
+
560
+ :param str resource_name: The name of the resource.
561
+ :param pulumi.ResourceOptions opts: Options for the resource.
562
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
563
+ This should be a list or map containing the metadata in key value pairs.
564
+ :param pulumi.Input[_builtins.str] arn: The role's arn.
565
+ :param pulumi.Input[_builtins.str] backend: Path to the mounted AliCloud auth backend.
566
+ Defaults to `alicloud`
567
+
568
+ For more details on the usage of each argument consult the [Vault AliCloud API documentation](https://www.vaultproject.io/api-docs/auth/alicloud).
569
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
570
+ The value should not contain leading or trailing forward slashes.
571
+ The `namespace` is always relative to the provider's configured namespace.
572
+ *Available only for Vault Enterprise*.
573
+ :param pulumi.Input[_builtins.str] role: Name of the role. Must correspond with the name of
574
+ the role reflected in the arn.
575
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
576
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
577
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
578
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
579
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
580
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
581
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
582
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
583
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
584
+ """
585
+ ...
586
+ @overload
587
+ def __init__(__self__,
588
+ resource_name: str,
589
+ args: AuthBackendRoleArgs,
590
+ opts: Optional[pulumi.ResourceOptions] = None):
591
+ """
592
+ Provides a resource to create a role in an [AliCloud auth backend within Vault](https://www.vaultproject.io/docs/auth/alicloud.html).
593
+
594
+ ## Example Usage
595
+
596
+ ```python
597
+ import pulumi
598
+ import pulumi_vault as vault
599
+
600
+ alicloud = vault.AuthBackend("alicloud",
601
+ type="alicloud",
602
+ path="alicloud")
603
+ alicloud_auth_backend_role = vault.alicloud.AuthBackendRole("alicloud",
604
+ backend=alicloud.path,
605
+ role="example",
606
+ arn="acs:ram:123456:tf:role/foobar")
607
+ ```
608
+
609
+ ## Import
610
+
611
+ Alicloud authentication roles can be imported using the `path`, e.g.
612
+
613
+ ```sh
614
+ $ pulumi import vault:alicloud/authBackendRole:AuthBackendRole my_role auth/alicloud/role/my_role
615
+ ```
616
+
617
+ :param str resource_name: The name of the resource.
618
+ :param AuthBackendRoleArgs args: The arguments to use to populate this resource's properties.
619
+ :param pulumi.ResourceOptions opts: Options for the resource.
620
+ """
621
+ ...
622
+ def __init__(__self__, resource_name: str, *args, **kwargs):
623
+ resource_args, opts = _utilities.get_resource_args_opts(AuthBackendRoleArgs, pulumi.ResourceOptions, *args, **kwargs)
624
+ if resource_args is not None:
625
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
626
+ else:
627
+ __self__._internal_init(resource_name, *args, **kwargs)
628
+
629
+ def _internal_init(__self__,
630
+ resource_name: str,
631
+ opts: Optional[pulumi.ResourceOptions] = None,
632
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
633
+ arn: Optional[pulumi.Input[_builtins.str]] = None,
634
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
635
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
636
+ role: Optional[pulumi.Input[_builtins.str]] = None,
637
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
638
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
639
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
640
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
641
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
642
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
643
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
644
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
645
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
646
+ __props__=None):
647
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
648
+ if not isinstance(opts, pulumi.ResourceOptions):
649
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
650
+ if opts.id is None:
651
+ if __props__ is not None:
652
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
653
+ __props__ = AuthBackendRoleArgs.__new__(AuthBackendRoleArgs)
654
+
655
+ __props__.__dict__["alias_metadata"] = alias_metadata
656
+ if arn is None and not opts.urn:
657
+ raise TypeError("Missing required property 'arn'")
658
+ __props__.__dict__["arn"] = arn
659
+ __props__.__dict__["backend"] = backend
660
+ __props__.__dict__["namespace"] = namespace
661
+ if role is None and not opts.urn:
662
+ raise TypeError("Missing required property 'role'")
663
+ __props__.__dict__["role"] = role
664
+ __props__.__dict__["token_bound_cidrs"] = token_bound_cidrs
665
+ __props__.__dict__["token_explicit_max_ttl"] = token_explicit_max_ttl
666
+ __props__.__dict__["token_max_ttl"] = token_max_ttl
667
+ __props__.__dict__["token_no_default_policy"] = token_no_default_policy
668
+ __props__.__dict__["token_num_uses"] = token_num_uses
669
+ __props__.__dict__["token_period"] = token_period
670
+ __props__.__dict__["token_policies"] = token_policies
671
+ __props__.__dict__["token_ttl"] = token_ttl
672
+ __props__.__dict__["token_type"] = token_type
673
+ super(AuthBackendRole, __self__).__init__(
674
+ 'vault:alicloud/authBackendRole:AuthBackendRole',
675
+ resource_name,
676
+ __props__,
677
+ opts)
678
+
679
+ @staticmethod
680
+ def get(resource_name: str,
681
+ id: pulumi.Input[str],
682
+ opts: Optional[pulumi.ResourceOptions] = None,
683
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
684
+ arn: Optional[pulumi.Input[_builtins.str]] = None,
685
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
686
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
687
+ role: Optional[pulumi.Input[_builtins.str]] = None,
688
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
689
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
690
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
691
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
692
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
693
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
694
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
695
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
696
+ token_type: Optional[pulumi.Input[_builtins.str]] = None) -> 'AuthBackendRole':
697
+ """
698
+ Get an existing AuthBackendRole resource's state with the given name, id, and optional extra
699
+ properties used to qualify the lookup.
700
+
701
+ :param str resource_name: The unique name of the resulting resource.
702
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
703
+ :param pulumi.ResourceOptions opts: Options for the resource.
704
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
705
+ This should be a list or map containing the metadata in key value pairs.
706
+ :param pulumi.Input[_builtins.str] arn: The role's arn.
707
+ :param pulumi.Input[_builtins.str] backend: Path to the mounted AliCloud auth backend.
708
+ Defaults to `alicloud`
709
+
710
+ For more details on the usage of each argument consult the [Vault AliCloud API documentation](https://www.vaultproject.io/api-docs/auth/alicloud).
711
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
712
+ The value should not contain leading or trailing forward slashes.
713
+ The `namespace` is always relative to the provider's configured namespace.
714
+ *Available only for Vault Enterprise*.
715
+ :param pulumi.Input[_builtins.str] role: Name of the role. Must correspond with the name of
716
+ the role reflected in the arn.
717
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
718
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
719
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
720
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
721
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
722
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
723
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
724
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
725
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
726
+ """
727
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
728
+
729
+ __props__ = _AuthBackendRoleState.__new__(_AuthBackendRoleState)
730
+
731
+ __props__.__dict__["alias_metadata"] = alias_metadata
732
+ __props__.__dict__["arn"] = arn
733
+ __props__.__dict__["backend"] = backend
734
+ __props__.__dict__["namespace"] = namespace
735
+ __props__.__dict__["role"] = role
736
+ __props__.__dict__["token_bound_cidrs"] = token_bound_cidrs
737
+ __props__.__dict__["token_explicit_max_ttl"] = token_explicit_max_ttl
738
+ __props__.__dict__["token_max_ttl"] = token_max_ttl
739
+ __props__.__dict__["token_no_default_policy"] = token_no_default_policy
740
+ __props__.__dict__["token_num_uses"] = token_num_uses
741
+ __props__.__dict__["token_period"] = token_period
742
+ __props__.__dict__["token_policies"] = token_policies
743
+ __props__.__dict__["token_ttl"] = token_ttl
744
+ __props__.__dict__["token_type"] = token_type
745
+ return AuthBackendRole(resource_name, opts=opts, __props__=__props__)
746
+
747
+ @_builtins.property
748
+ @pulumi.getter(name="aliasMetadata")
749
+ def alias_metadata(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
750
+ """
751
+ The metadata to be tied to generated entity alias.
752
+ This should be a list or map containing the metadata in key value pairs.
753
+ """
754
+ return pulumi.get(self, "alias_metadata")
755
+
756
+ @_builtins.property
757
+ @pulumi.getter
758
+ def arn(self) -> pulumi.Output[_builtins.str]:
759
+ """
760
+ The role's arn.
761
+ """
762
+ return pulumi.get(self, "arn")
763
+
764
+ @_builtins.property
765
+ @pulumi.getter
766
+ def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
767
+ """
768
+ Path to the mounted AliCloud auth backend.
769
+ Defaults to `alicloud`
770
+
771
+ For more details on the usage of each argument consult the [Vault AliCloud API documentation](https://www.vaultproject.io/api-docs/auth/alicloud).
772
+ """
773
+ return pulumi.get(self, "backend")
774
+
775
+ @_builtins.property
776
+ @pulumi.getter
777
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
778
+ """
779
+ The namespace to provision the resource in.
780
+ The value should not contain leading or trailing forward slashes.
781
+ The `namespace` is always relative to the provider's configured namespace.
782
+ *Available only for Vault Enterprise*.
783
+ """
784
+ return pulumi.get(self, "namespace")
785
+
786
+ @_builtins.property
787
+ @pulumi.getter
788
+ def role(self) -> pulumi.Output[_builtins.str]:
789
+ """
790
+ Name of the role. Must correspond with the name of
791
+ the role reflected in the arn.
792
+ """
793
+ return pulumi.get(self, "role")
794
+
795
+ @_builtins.property
796
+ @pulumi.getter(name="tokenBoundCidrs")
797
+ def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
798
+ """
799
+ Specifies the blocks of IP addresses which are allowed to use the generated token
800
+ """
801
+ return pulumi.get(self, "token_bound_cidrs")
802
+
803
+ @_builtins.property
804
+ @pulumi.getter(name="tokenExplicitMaxTtl")
805
+ def token_explicit_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
806
+ """
807
+ Generated Token's Explicit Maximum TTL in seconds
808
+ """
809
+ return pulumi.get(self, "token_explicit_max_ttl")
810
+
811
+ @_builtins.property
812
+ @pulumi.getter(name="tokenMaxTtl")
813
+ def token_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
814
+ """
815
+ The maximum lifetime of the generated token
816
+ """
817
+ return pulumi.get(self, "token_max_ttl")
818
+
819
+ @_builtins.property
820
+ @pulumi.getter(name="tokenNoDefaultPolicy")
821
+ def token_no_default_policy(self) -> pulumi.Output[Optional[_builtins.bool]]:
822
+ """
823
+ If true, the 'default' policy will not automatically be added to generated tokens
824
+ """
825
+ return pulumi.get(self, "token_no_default_policy")
826
+
827
+ @_builtins.property
828
+ @pulumi.getter(name="tokenNumUses")
829
+ def token_num_uses(self) -> pulumi.Output[Optional[_builtins.int]]:
830
+ """
831
+ The maximum number of times a token may be used, a value of zero means unlimited
832
+ """
833
+ return pulumi.get(self, "token_num_uses")
834
+
835
+ @_builtins.property
836
+ @pulumi.getter(name="tokenPeriod")
837
+ def token_period(self) -> pulumi.Output[Optional[_builtins.int]]:
838
+ """
839
+ Generated Token's Period
840
+ """
841
+ return pulumi.get(self, "token_period")
842
+
843
+ @_builtins.property
844
+ @pulumi.getter(name="tokenPolicies")
845
+ def token_policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
846
+ """
847
+ Generated Token's Policies
848
+ """
849
+ return pulumi.get(self, "token_policies")
850
+
851
+ @_builtins.property
852
+ @pulumi.getter(name="tokenTtl")
853
+ def token_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
854
+ """
855
+ The initial ttl of the token to generate in seconds
856
+ """
857
+ return pulumi.get(self, "token_ttl")
858
+
859
+ @_builtins.property
860
+ @pulumi.getter(name="tokenType")
861
+ def token_type(self) -> pulumi.Output[Optional[_builtins.str]]:
862
+ """
863
+ The type of token to generate, service or batch
864
+ """
865
+ return pulumi.get(self, "token_type")
866
+