pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,1082 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
18
+
19
+ @pulumi.input_type
20
+ class AuthBackendRoleArgs:
21
+ def __init__(__self__, *,
22
+ role_name: pulumi.Input[_builtins.str],
23
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
24
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
25
+ bind_secret_id: Optional[pulumi.Input[_builtins.bool]] = None,
26
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
27
+ role_id: Optional[pulumi.Input[_builtins.str]] = None,
28
+ secret_id_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
29
+ secret_id_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
30
+ secret_id_ttl: Optional[pulumi.Input[_builtins.int]] = None,
31
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
32
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
33
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
34
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
35
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
36
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
37
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
38
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
39
+ token_type: Optional[pulumi.Input[_builtins.str]] = None):
40
+ """
41
+ The set of arguments for constructing a AuthBackendRole resource.
42
+ :param pulumi.Input[_builtins.str] role_name: The name of the role.
43
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
44
+ This should be a list or map containing the metadata in key value pairs.
45
+ :param pulumi.Input[_builtins.str] backend: The unique name of the auth backend to configure.
46
+ Defaults to `approle`.
47
+ :param pulumi.Input[_builtins.bool] bind_secret_id: Whether or not to require `secret_id` to be
48
+ presented when logging in using this AppRole. Defaults to `true`.
49
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
50
+ The value should not contain leading or trailing forward slashes.
51
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
52
+ *Available only for Vault Enterprise*.
53
+ :param pulumi.Input[_builtins.str] role_id: The RoleID of this role. If not specified, one will be
54
+ auto-generated.
55
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] secret_id_bound_cidrs: If set,
56
+ specifies blocks of IP addresses which can perform the login operation.
57
+ :param pulumi.Input[_builtins.int] secret_id_num_uses: The number of times any particular SecretID
58
+ can be used to fetch a token from this AppRole, after which the SecretID will
59
+ expire. A value of zero will allow unlimited uses.
60
+ :param pulumi.Input[_builtins.int] secret_id_ttl: The number of seconds after which any SecretID
61
+ expires.
62
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
63
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
64
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
65
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
66
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
67
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
68
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
69
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
70
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
71
+ """
72
+ pulumi.set(__self__, "role_name", role_name)
73
+ if alias_metadata is not None:
74
+ pulumi.set(__self__, "alias_metadata", alias_metadata)
75
+ if backend is not None:
76
+ pulumi.set(__self__, "backend", backend)
77
+ if bind_secret_id is not None:
78
+ pulumi.set(__self__, "bind_secret_id", bind_secret_id)
79
+ if namespace is not None:
80
+ pulumi.set(__self__, "namespace", namespace)
81
+ if role_id is not None:
82
+ pulumi.set(__self__, "role_id", role_id)
83
+ if secret_id_bound_cidrs is not None:
84
+ pulumi.set(__self__, "secret_id_bound_cidrs", secret_id_bound_cidrs)
85
+ if secret_id_num_uses is not None:
86
+ pulumi.set(__self__, "secret_id_num_uses", secret_id_num_uses)
87
+ if secret_id_ttl is not None:
88
+ pulumi.set(__self__, "secret_id_ttl", secret_id_ttl)
89
+ if token_bound_cidrs is not None:
90
+ pulumi.set(__self__, "token_bound_cidrs", token_bound_cidrs)
91
+ if token_explicit_max_ttl is not None:
92
+ pulumi.set(__self__, "token_explicit_max_ttl", token_explicit_max_ttl)
93
+ if token_max_ttl is not None:
94
+ pulumi.set(__self__, "token_max_ttl", token_max_ttl)
95
+ if token_no_default_policy is not None:
96
+ pulumi.set(__self__, "token_no_default_policy", token_no_default_policy)
97
+ if token_num_uses is not None:
98
+ pulumi.set(__self__, "token_num_uses", token_num_uses)
99
+ if token_period is not None:
100
+ pulumi.set(__self__, "token_period", token_period)
101
+ if token_policies is not None:
102
+ pulumi.set(__self__, "token_policies", token_policies)
103
+ if token_ttl is not None:
104
+ pulumi.set(__self__, "token_ttl", token_ttl)
105
+ if token_type is not None:
106
+ pulumi.set(__self__, "token_type", token_type)
107
+
108
+ @_builtins.property
109
+ @pulumi.getter(name="roleName")
110
+ def role_name(self) -> pulumi.Input[_builtins.str]:
111
+ """
112
+ The name of the role.
113
+ """
114
+ return pulumi.get(self, "role_name")
115
+
116
+ @role_name.setter
117
+ def role_name(self, value: pulumi.Input[_builtins.str]):
118
+ pulumi.set(self, "role_name", value)
119
+
120
+ @_builtins.property
121
+ @pulumi.getter(name="aliasMetadata")
122
+ def alias_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
123
+ """
124
+ The metadata to be tied to generated entity alias.
125
+ This should be a list or map containing the metadata in key value pairs.
126
+ """
127
+ return pulumi.get(self, "alias_metadata")
128
+
129
+ @alias_metadata.setter
130
+ def alias_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
131
+ pulumi.set(self, "alias_metadata", value)
132
+
133
+ @_builtins.property
134
+ @pulumi.getter
135
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
136
+ """
137
+ The unique name of the auth backend to configure.
138
+ Defaults to `approle`.
139
+ """
140
+ return pulumi.get(self, "backend")
141
+
142
+ @backend.setter
143
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
144
+ pulumi.set(self, "backend", value)
145
+
146
+ @_builtins.property
147
+ @pulumi.getter(name="bindSecretId")
148
+ def bind_secret_id(self) -> Optional[pulumi.Input[_builtins.bool]]:
149
+ """
150
+ Whether or not to require `secret_id` to be
151
+ presented when logging in using this AppRole. Defaults to `true`.
152
+ """
153
+ return pulumi.get(self, "bind_secret_id")
154
+
155
+ @bind_secret_id.setter
156
+ def bind_secret_id(self, value: Optional[pulumi.Input[_builtins.bool]]):
157
+ pulumi.set(self, "bind_secret_id", value)
158
+
159
+ @_builtins.property
160
+ @pulumi.getter
161
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
162
+ """
163
+ The namespace to provision the resource in.
164
+ The value should not contain leading or trailing forward slashes.
165
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
166
+ *Available only for Vault Enterprise*.
167
+ """
168
+ return pulumi.get(self, "namespace")
169
+
170
+ @namespace.setter
171
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
172
+ pulumi.set(self, "namespace", value)
173
+
174
+ @_builtins.property
175
+ @pulumi.getter(name="roleId")
176
+ def role_id(self) -> Optional[pulumi.Input[_builtins.str]]:
177
+ """
178
+ The RoleID of this role. If not specified, one will be
179
+ auto-generated.
180
+ """
181
+ return pulumi.get(self, "role_id")
182
+
183
+ @role_id.setter
184
+ def role_id(self, value: Optional[pulumi.Input[_builtins.str]]):
185
+ pulumi.set(self, "role_id", value)
186
+
187
+ @_builtins.property
188
+ @pulumi.getter(name="secretIdBoundCidrs")
189
+ def secret_id_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
190
+ """
191
+ If set,
192
+ specifies blocks of IP addresses which can perform the login operation.
193
+ """
194
+ return pulumi.get(self, "secret_id_bound_cidrs")
195
+
196
+ @secret_id_bound_cidrs.setter
197
+ def secret_id_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
198
+ pulumi.set(self, "secret_id_bound_cidrs", value)
199
+
200
+ @_builtins.property
201
+ @pulumi.getter(name="secretIdNumUses")
202
+ def secret_id_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
203
+ """
204
+ The number of times any particular SecretID
205
+ can be used to fetch a token from this AppRole, after which the SecretID will
206
+ expire. A value of zero will allow unlimited uses.
207
+ """
208
+ return pulumi.get(self, "secret_id_num_uses")
209
+
210
+ @secret_id_num_uses.setter
211
+ def secret_id_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
212
+ pulumi.set(self, "secret_id_num_uses", value)
213
+
214
+ @_builtins.property
215
+ @pulumi.getter(name="secretIdTtl")
216
+ def secret_id_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
217
+ """
218
+ The number of seconds after which any SecretID
219
+ expires.
220
+ """
221
+ return pulumi.get(self, "secret_id_ttl")
222
+
223
+ @secret_id_ttl.setter
224
+ def secret_id_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
225
+ pulumi.set(self, "secret_id_ttl", value)
226
+
227
+ @_builtins.property
228
+ @pulumi.getter(name="tokenBoundCidrs")
229
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
230
+ """
231
+ Specifies the blocks of IP addresses which are allowed to use the generated token
232
+ """
233
+ return pulumi.get(self, "token_bound_cidrs")
234
+
235
+ @token_bound_cidrs.setter
236
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
237
+ pulumi.set(self, "token_bound_cidrs", value)
238
+
239
+ @_builtins.property
240
+ @pulumi.getter(name="tokenExplicitMaxTtl")
241
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
242
+ """
243
+ Generated Token's Explicit Maximum TTL in seconds
244
+ """
245
+ return pulumi.get(self, "token_explicit_max_ttl")
246
+
247
+ @token_explicit_max_ttl.setter
248
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
249
+ pulumi.set(self, "token_explicit_max_ttl", value)
250
+
251
+ @_builtins.property
252
+ @pulumi.getter(name="tokenMaxTtl")
253
+ def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
254
+ """
255
+ The maximum lifetime of the generated token
256
+ """
257
+ return pulumi.get(self, "token_max_ttl")
258
+
259
+ @token_max_ttl.setter
260
+ def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
261
+ pulumi.set(self, "token_max_ttl", value)
262
+
263
+ @_builtins.property
264
+ @pulumi.getter(name="tokenNoDefaultPolicy")
265
+ def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
266
+ """
267
+ If true, the 'default' policy will not automatically be added to generated tokens
268
+ """
269
+ return pulumi.get(self, "token_no_default_policy")
270
+
271
+ @token_no_default_policy.setter
272
+ def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
273
+ pulumi.set(self, "token_no_default_policy", value)
274
+
275
+ @_builtins.property
276
+ @pulumi.getter(name="tokenNumUses")
277
+ def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
278
+ """
279
+ The maximum number of times a token may be used, a value of zero means unlimited
280
+ """
281
+ return pulumi.get(self, "token_num_uses")
282
+
283
+ @token_num_uses.setter
284
+ def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
285
+ pulumi.set(self, "token_num_uses", value)
286
+
287
+ @_builtins.property
288
+ @pulumi.getter(name="tokenPeriod")
289
+ def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
290
+ """
291
+ Generated Token's Period
292
+ """
293
+ return pulumi.get(self, "token_period")
294
+
295
+ @token_period.setter
296
+ def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
297
+ pulumi.set(self, "token_period", value)
298
+
299
+ @_builtins.property
300
+ @pulumi.getter(name="tokenPolicies")
301
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
302
+ """
303
+ Generated Token's Policies
304
+ """
305
+ return pulumi.get(self, "token_policies")
306
+
307
+ @token_policies.setter
308
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
309
+ pulumi.set(self, "token_policies", value)
310
+
311
+ @_builtins.property
312
+ @pulumi.getter(name="tokenTtl")
313
+ def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
314
+ """
315
+ The initial ttl of the token to generate in seconds
316
+ """
317
+ return pulumi.get(self, "token_ttl")
318
+
319
+ @token_ttl.setter
320
+ def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
321
+ pulumi.set(self, "token_ttl", value)
322
+
323
+ @_builtins.property
324
+ @pulumi.getter(name="tokenType")
325
+ def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
326
+ """
327
+ The type of token to generate, service or batch
328
+ """
329
+ return pulumi.get(self, "token_type")
330
+
331
+ @token_type.setter
332
+ def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
333
+ pulumi.set(self, "token_type", value)
334
+
335
+
336
+ @pulumi.input_type
337
+ class _AuthBackendRoleState:
338
+ def __init__(__self__, *,
339
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
340
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
341
+ bind_secret_id: Optional[pulumi.Input[_builtins.bool]] = None,
342
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
343
+ role_id: Optional[pulumi.Input[_builtins.str]] = None,
344
+ role_name: Optional[pulumi.Input[_builtins.str]] = None,
345
+ secret_id_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
346
+ secret_id_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
347
+ secret_id_ttl: Optional[pulumi.Input[_builtins.int]] = None,
348
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
349
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
350
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
351
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
352
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
353
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
354
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
355
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
356
+ token_type: Optional[pulumi.Input[_builtins.str]] = None):
357
+ """
358
+ Input properties used for looking up and filtering AuthBackendRole resources.
359
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
360
+ This should be a list or map containing the metadata in key value pairs.
361
+ :param pulumi.Input[_builtins.str] backend: The unique name of the auth backend to configure.
362
+ Defaults to `approle`.
363
+ :param pulumi.Input[_builtins.bool] bind_secret_id: Whether or not to require `secret_id` to be
364
+ presented when logging in using this AppRole. Defaults to `true`.
365
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
366
+ The value should not contain leading or trailing forward slashes.
367
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
368
+ *Available only for Vault Enterprise*.
369
+ :param pulumi.Input[_builtins.str] role_id: The RoleID of this role. If not specified, one will be
370
+ auto-generated.
371
+ :param pulumi.Input[_builtins.str] role_name: The name of the role.
372
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] secret_id_bound_cidrs: If set,
373
+ specifies blocks of IP addresses which can perform the login operation.
374
+ :param pulumi.Input[_builtins.int] secret_id_num_uses: The number of times any particular SecretID
375
+ can be used to fetch a token from this AppRole, after which the SecretID will
376
+ expire. A value of zero will allow unlimited uses.
377
+ :param pulumi.Input[_builtins.int] secret_id_ttl: The number of seconds after which any SecretID
378
+ expires.
379
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
380
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
381
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
382
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
383
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
384
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
385
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
386
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
387
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
388
+ """
389
+ if alias_metadata is not None:
390
+ pulumi.set(__self__, "alias_metadata", alias_metadata)
391
+ if backend is not None:
392
+ pulumi.set(__self__, "backend", backend)
393
+ if bind_secret_id is not None:
394
+ pulumi.set(__self__, "bind_secret_id", bind_secret_id)
395
+ if namespace is not None:
396
+ pulumi.set(__self__, "namespace", namespace)
397
+ if role_id is not None:
398
+ pulumi.set(__self__, "role_id", role_id)
399
+ if role_name is not None:
400
+ pulumi.set(__self__, "role_name", role_name)
401
+ if secret_id_bound_cidrs is not None:
402
+ pulumi.set(__self__, "secret_id_bound_cidrs", secret_id_bound_cidrs)
403
+ if secret_id_num_uses is not None:
404
+ pulumi.set(__self__, "secret_id_num_uses", secret_id_num_uses)
405
+ if secret_id_ttl is not None:
406
+ pulumi.set(__self__, "secret_id_ttl", secret_id_ttl)
407
+ if token_bound_cidrs is not None:
408
+ pulumi.set(__self__, "token_bound_cidrs", token_bound_cidrs)
409
+ if token_explicit_max_ttl is not None:
410
+ pulumi.set(__self__, "token_explicit_max_ttl", token_explicit_max_ttl)
411
+ if token_max_ttl is not None:
412
+ pulumi.set(__self__, "token_max_ttl", token_max_ttl)
413
+ if token_no_default_policy is not None:
414
+ pulumi.set(__self__, "token_no_default_policy", token_no_default_policy)
415
+ if token_num_uses is not None:
416
+ pulumi.set(__self__, "token_num_uses", token_num_uses)
417
+ if token_period is not None:
418
+ pulumi.set(__self__, "token_period", token_period)
419
+ if token_policies is not None:
420
+ pulumi.set(__self__, "token_policies", token_policies)
421
+ if token_ttl is not None:
422
+ pulumi.set(__self__, "token_ttl", token_ttl)
423
+ if token_type is not None:
424
+ pulumi.set(__self__, "token_type", token_type)
425
+
426
+ @_builtins.property
427
+ @pulumi.getter(name="aliasMetadata")
428
+ def alias_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
429
+ """
430
+ The metadata to be tied to generated entity alias.
431
+ This should be a list or map containing the metadata in key value pairs.
432
+ """
433
+ return pulumi.get(self, "alias_metadata")
434
+
435
+ @alias_metadata.setter
436
+ def alias_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
437
+ pulumi.set(self, "alias_metadata", value)
438
+
439
+ @_builtins.property
440
+ @pulumi.getter
441
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
442
+ """
443
+ The unique name of the auth backend to configure.
444
+ Defaults to `approle`.
445
+ """
446
+ return pulumi.get(self, "backend")
447
+
448
+ @backend.setter
449
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
450
+ pulumi.set(self, "backend", value)
451
+
452
+ @_builtins.property
453
+ @pulumi.getter(name="bindSecretId")
454
+ def bind_secret_id(self) -> Optional[pulumi.Input[_builtins.bool]]:
455
+ """
456
+ Whether or not to require `secret_id` to be
457
+ presented when logging in using this AppRole. Defaults to `true`.
458
+ """
459
+ return pulumi.get(self, "bind_secret_id")
460
+
461
+ @bind_secret_id.setter
462
+ def bind_secret_id(self, value: Optional[pulumi.Input[_builtins.bool]]):
463
+ pulumi.set(self, "bind_secret_id", value)
464
+
465
+ @_builtins.property
466
+ @pulumi.getter
467
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
468
+ """
469
+ The namespace to provision the resource in.
470
+ The value should not contain leading or trailing forward slashes.
471
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
472
+ *Available only for Vault Enterprise*.
473
+ """
474
+ return pulumi.get(self, "namespace")
475
+
476
+ @namespace.setter
477
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
478
+ pulumi.set(self, "namespace", value)
479
+
480
+ @_builtins.property
481
+ @pulumi.getter(name="roleId")
482
+ def role_id(self) -> Optional[pulumi.Input[_builtins.str]]:
483
+ """
484
+ The RoleID of this role. If not specified, one will be
485
+ auto-generated.
486
+ """
487
+ return pulumi.get(self, "role_id")
488
+
489
+ @role_id.setter
490
+ def role_id(self, value: Optional[pulumi.Input[_builtins.str]]):
491
+ pulumi.set(self, "role_id", value)
492
+
493
+ @_builtins.property
494
+ @pulumi.getter(name="roleName")
495
+ def role_name(self) -> Optional[pulumi.Input[_builtins.str]]:
496
+ """
497
+ The name of the role.
498
+ """
499
+ return pulumi.get(self, "role_name")
500
+
501
+ @role_name.setter
502
+ def role_name(self, value: Optional[pulumi.Input[_builtins.str]]):
503
+ pulumi.set(self, "role_name", value)
504
+
505
+ @_builtins.property
506
+ @pulumi.getter(name="secretIdBoundCidrs")
507
+ def secret_id_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
508
+ """
509
+ If set,
510
+ specifies blocks of IP addresses which can perform the login operation.
511
+ """
512
+ return pulumi.get(self, "secret_id_bound_cidrs")
513
+
514
+ @secret_id_bound_cidrs.setter
515
+ def secret_id_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
516
+ pulumi.set(self, "secret_id_bound_cidrs", value)
517
+
518
+ @_builtins.property
519
+ @pulumi.getter(name="secretIdNumUses")
520
+ def secret_id_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
521
+ """
522
+ The number of times any particular SecretID
523
+ can be used to fetch a token from this AppRole, after which the SecretID will
524
+ expire. A value of zero will allow unlimited uses.
525
+ """
526
+ return pulumi.get(self, "secret_id_num_uses")
527
+
528
+ @secret_id_num_uses.setter
529
+ def secret_id_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
530
+ pulumi.set(self, "secret_id_num_uses", value)
531
+
532
+ @_builtins.property
533
+ @pulumi.getter(name="secretIdTtl")
534
+ def secret_id_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
535
+ """
536
+ The number of seconds after which any SecretID
537
+ expires.
538
+ """
539
+ return pulumi.get(self, "secret_id_ttl")
540
+
541
+ @secret_id_ttl.setter
542
+ def secret_id_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
543
+ pulumi.set(self, "secret_id_ttl", value)
544
+
545
+ @_builtins.property
546
+ @pulumi.getter(name="tokenBoundCidrs")
547
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
548
+ """
549
+ Specifies the blocks of IP addresses which are allowed to use the generated token
550
+ """
551
+ return pulumi.get(self, "token_bound_cidrs")
552
+
553
+ @token_bound_cidrs.setter
554
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
555
+ pulumi.set(self, "token_bound_cidrs", value)
556
+
557
+ @_builtins.property
558
+ @pulumi.getter(name="tokenExplicitMaxTtl")
559
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
560
+ """
561
+ Generated Token's Explicit Maximum TTL in seconds
562
+ """
563
+ return pulumi.get(self, "token_explicit_max_ttl")
564
+
565
+ @token_explicit_max_ttl.setter
566
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
567
+ pulumi.set(self, "token_explicit_max_ttl", value)
568
+
569
+ @_builtins.property
570
+ @pulumi.getter(name="tokenMaxTtl")
571
+ def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
572
+ """
573
+ The maximum lifetime of the generated token
574
+ """
575
+ return pulumi.get(self, "token_max_ttl")
576
+
577
+ @token_max_ttl.setter
578
+ def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
579
+ pulumi.set(self, "token_max_ttl", value)
580
+
581
+ @_builtins.property
582
+ @pulumi.getter(name="tokenNoDefaultPolicy")
583
+ def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
584
+ """
585
+ If true, the 'default' policy will not automatically be added to generated tokens
586
+ """
587
+ return pulumi.get(self, "token_no_default_policy")
588
+
589
+ @token_no_default_policy.setter
590
+ def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
591
+ pulumi.set(self, "token_no_default_policy", value)
592
+
593
+ @_builtins.property
594
+ @pulumi.getter(name="tokenNumUses")
595
+ def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
596
+ """
597
+ The maximum number of times a token may be used, a value of zero means unlimited
598
+ """
599
+ return pulumi.get(self, "token_num_uses")
600
+
601
+ @token_num_uses.setter
602
+ def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
603
+ pulumi.set(self, "token_num_uses", value)
604
+
605
+ @_builtins.property
606
+ @pulumi.getter(name="tokenPeriod")
607
+ def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
608
+ """
609
+ Generated Token's Period
610
+ """
611
+ return pulumi.get(self, "token_period")
612
+
613
+ @token_period.setter
614
+ def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
615
+ pulumi.set(self, "token_period", value)
616
+
617
+ @_builtins.property
618
+ @pulumi.getter(name="tokenPolicies")
619
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
620
+ """
621
+ Generated Token's Policies
622
+ """
623
+ return pulumi.get(self, "token_policies")
624
+
625
+ @token_policies.setter
626
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
627
+ pulumi.set(self, "token_policies", value)
628
+
629
+ @_builtins.property
630
+ @pulumi.getter(name="tokenTtl")
631
+ def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
632
+ """
633
+ The initial ttl of the token to generate in seconds
634
+ """
635
+ return pulumi.get(self, "token_ttl")
636
+
637
+ @token_ttl.setter
638
+ def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
639
+ pulumi.set(self, "token_ttl", value)
640
+
641
+ @_builtins.property
642
+ @pulumi.getter(name="tokenType")
643
+ def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
644
+ """
645
+ The type of token to generate, service or batch
646
+ """
647
+ return pulumi.get(self, "token_type")
648
+
649
+ @token_type.setter
650
+ def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
651
+ pulumi.set(self, "token_type", value)
652
+
653
+
654
+ @pulumi.type_token("vault:appRole/authBackendRole:AuthBackendRole")
655
+ class AuthBackendRole(pulumi.CustomResource):
656
+ @overload
657
+ def __init__(__self__,
658
+ resource_name: str,
659
+ opts: Optional[pulumi.ResourceOptions] = None,
660
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
661
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
662
+ bind_secret_id: Optional[pulumi.Input[_builtins.bool]] = None,
663
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
664
+ role_id: Optional[pulumi.Input[_builtins.str]] = None,
665
+ role_name: Optional[pulumi.Input[_builtins.str]] = None,
666
+ secret_id_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
667
+ secret_id_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
668
+ secret_id_ttl: Optional[pulumi.Input[_builtins.int]] = None,
669
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
670
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
671
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
672
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
673
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
674
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
675
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
676
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
677
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
678
+ __props__=None):
679
+ """
680
+ Manages an AppRole auth backend role in a Vault server. See the [Vault
681
+ documentation](https://www.vaultproject.io/docs/auth/approle) for more
682
+ information.
683
+
684
+ ## Example Usage
685
+
686
+ ```python
687
+ import pulumi
688
+ import pulumi_vault as vault
689
+
690
+ approle = vault.AuthBackend("approle", type="approle")
691
+ example = vault.approle.AuthBackendRole("example",
692
+ backend=approle.path,
693
+ role_name="test-role",
694
+ token_policies=[
695
+ "default",
696
+ "dev",
697
+ "prod",
698
+ ])
699
+ ```
700
+
701
+ ## Import
702
+
703
+ AppRole authentication backend roles can be imported using the `path`, e.g.
704
+
705
+ ```sh
706
+ $ pulumi import vault:appRole/authBackendRole:AuthBackendRole example auth/approle/role/test-role
707
+ ```
708
+
709
+ :param str resource_name: The name of the resource.
710
+ :param pulumi.ResourceOptions opts: Options for the resource.
711
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
712
+ This should be a list or map containing the metadata in key value pairs.
713
+ :param pulumi.Input[_builtins.str] backend: The unique name of the auth backend to configure.
714
+ Defaults to `approle`.
715
+ :param pulumi.Input[_builtins.bool] bind_secret_id: Whether or not to require `secret_id` to be
716
+ presented when logging in using this AppRole. Defaults to `true`.
717
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
718
+ The value should not contain leading or trailing forward slashes.
719
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
720
+ *Available only for Vault Enterprise*.
721
+ :param pulumi.Input[_builtins.str] role_id: The RoleID of this role. If not specified, one will be
722
+ auto-generated.
723
+ :param pulumi.Input[_builtins.str] role_name: The name of the role.
724
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] secret_id_bound_cidrs: If set,
725
+ specifies blocks of IP addresses which can perform the login operation.
726
+ :param pulumi.Input[_builtins.int] secret_id_num_uses: The number of times any particular SecretID
727
+ can be used to fetch a token from this AppRole, after which the SecretID will
728
+ expire. A value of zero will allow unlimited uses.
729
+ :param pulumi.Input[_builtins.int] secret_id_ttl: The number of seconds after which any SecretID
730
+ expires.
731
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
732
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
733
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
734
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
735
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
736
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
737
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
738
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
739
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
740
+ """
741
+ ...
742
+ @overload
743
+ def __init__(__self__,
744
+ resource_name: str,
745
+ args: AuthBackendRoleArgs,
746
+ opts: Optional[pulumi.ResourceOptions] = None):
747
+ """
748
+ Manages an AppRole auth backend role in a Vault server. See the [Vault
749
+ documentation](https://www.vaultproject.io/docs/auth/approle) for more
750
+ information.
751
+
752
+ ## Example Usage
753
+
754
+ ```python
755
+ import pulumi
756
+ import pulumi_vault as vault
757
+
758
+ approle = vault.AuthBackend("approle", type="approle")
759
+ example = vault.approle.AuthBackendRole("example",
760
+ backend=approle.path,
761
+ role_name="test-role",
762
+ token_policies=[
763
+ "default",
764
+ "dev",
765
+ "prod",
766
+ ])
767
+ ```
768
+
769
+ ## Import
770
+
771
+ AppRole authentication backend roles can be imported using the `path`, e.g.
772
+
773
+ ```sh
774
+ $ pulumi import vault:appRole/authBackendRole:AuthBackendRole example auth/approle/role/test-role
775
+ ```
776
+
777
+ :param str resource_name: The name of the resource.
778
+ :param AuthBackendRoleArgs args: The arguments to use to populate this resource's properties.
779
+ :param pulumi.ResourceOptions opts: Options for the resource.
780
+ """
781
+ ...
782
+ def __init__(__self__, resource_name: str, *args, **kwargs):
783
+ resource_args, opts = _utilities.get_resource_args_opts(AuthBackendRoleArgs, pulumi.ResourceOptions, *args, **kwargs)
784
+ if resource_args is not None:
785
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
786
+ else:
787
+ __self__._internal_init(resource_name, *args, **kwargs)
788
+
789
+ def _internal_init(__self__,
790
+ resource_name: str,
791
+ opts: Optional[pulumi.ResourceOptions] = None,
792
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
793
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
794
+ bind_secret_id: Optional[pulumi.Input[_builtins.bool]] = None,
795
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
796
+ role_id: Optional[pulumi.Input[_builtins.str]] = None,
797
+ role_name: Optional[pulumi.Input[_builtins.str]] = None,
798
+ secret_id_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
799
+ secret_id_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
800
+ secret_id_ttl: Optional[pulumi.Input[_builtins.int]] = None,
801
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
802
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
803
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
804
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
805
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
806
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
807
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
808
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
809
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
810
+ __props__=None):
811
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
812
+ if not isinstance(opts, pulumi.ResourceOptions):
813
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
814
+ if opts.id is None:
815
+ if __props__ is not None:
816
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
817
+ __props__ = AuthBackendRoleArgs.__new__(AuthBackendRoleArgs)
818
+
819
+ __props__.__dict__["alias_metadata"] = alias_metadata
820
+ __props__.__dict__["backend"] = backend
821
+ __props__.__dict__["bind_secret_id"] = bind_secret_id
822
+ __props__.__dict__["namespace"] = namespace
823
+ __props__.__dict__["role_id"] = role_id
824
+ if role_name is None and not opts.urn:
825
+ raise TypeError("Missing required property 'role_name'")
826
+ __props__.__dict__["role_name"] = role_name
827
+ __props__.__dict__["secret_id_bound_cidrs"] = secret_id_bound_cidrs
828
+ __props__.__dict__["secret_id_num_uses"] = secret_id_num_uses
829
+ __props__.__dict__["secret_id_ttl"] = secret_id_ttl
830
+ __props__.__dict__["token_bound_cidrs"] = token_bound_cidrs
831
+ __props__.__dict__["token_explicit_max_ttl"] = token_explicit_max_ttl
832
+ __props__.__dict__["token_max_ttl"] = token_max_ttl
833
+ __props__.__dict__["token_no_default_policy"] = token_no_default_policy
834
+ __props__.__dict__["token_num_uses"] = token_num_uses
835
+ __props__.__dict__["token_period"] = token_period
836
+ __props__.__dict__["token_policies"] = token_policies
837
+ __props__.__dict__["token_ttl"] = token_ttl
838
+ __props__.__dict__["token_type"] = token_type
839
+ super(AuthBackendRole, __self__).__init__(
840
+ 'vault:appRole/authBackendRole:AuthBackendRole',
841
+ resource_name,
842
+ __props__,
843
+ opts)
844
+
845
+ @staticmethod
846
+ def get(resource_name: str,
847
+ id: pulumi.Input[str],
848
+ opts: Optional[pulumi.ResourceOptions] = None,
849
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
850
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
851
+ bind_secret_id: Optional[pulumi.Input[_builtins.bool]] = None,
852
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
853
+ role_id: Optional[pulumi.Input[_builtins.str]] = None,
854
+ role_name: Optional[pulumi.Input[_builtins.str]] = None,
855
+ secret_id_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
856
+ secret_id_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
857
+ secret_id_ttl: Optional[pulumi.Input[_builtins.int]] = None,
858
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
859
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
860
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
861
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
862
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
863
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
864
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
865
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
866
+ token_type: Optional[pulumi.Input[_builtins.str]] = None) -> 'AuthBackendRole':
867
+ """
868
+ Get an existing AuthBackendRole resource's state with the given name, id, and optional extra
869
+ properties used to qualify the lookup.
870
+
871
+ :param str resource_name: The unique name of the resulting resource.
872
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
873
+ :param pulumi.ResourceOptions opts: Options for the resource.
874
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
875
+ This should be a list or map containing the metadata in key value pairs.
876
+ :param pulumi.Input[_builtins.str] backend: The unique name of the auth backend to configure.
877
+ Defaults to `approle`.
878
+ :param pulumi.Input[_builtins.bool] bind_secret_id: Whether or not to require `secret_id` to be
879
+ presented when logging in using this AppRole. Defaults to `true`.
880
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
881
+ The value should not contain leading or trailing forward slashes.
882
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
883
+ *Available only for Vault Enterprise*.
884
+ :param pulumi.Input[_builtins.str] role_id: The RoleID of this role. If not specified, one will be
885
+ auto-generated.
886
+ :param pulumi.Input[_builtins.str] role_name: The name of the role.
887
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] secret_id_bound_cidrs: If set,
888
+ specifies blocks of IP addresses which can perform the login operation.
889
+ :param pulumi.Input[_builtins.int] secret_id_num_uses: The number of times any particular SecretID
890
+ can be used to fetch a token from this AppRole, after which the SecretID will
891
+ expire. A value of zero will allow unlimited uses.
892
+ :param pulumi.Input[_builtins.int] secret_id_ttl: The number of seconds after which any SecretID
893
+ expires.
894
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
895
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
896
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
897
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
898
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
899
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
900
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
901
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
902
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
903
+ """
904
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
905
+
906
+ __props__ = _AuthBackendRoleState.__new__(_AuthBackendRoleState)
907
+
908
+ __props__.__dict__["alias_metadata"] = alias_metadata
909
+ __props__.__dict__["backend"] = backend
910
+ __props__.__dict__["bind_secret_id"] = bind_secret_id
911
+ __props__.__dict__["namespace"] = namespace
912
+ __props__.__dict__["role_id"] = role_id
913
+ __props__.__dict__["role_name"] = role_name
914
+ __props__.__dict__["secret_id_bound_cidrs"] = secret_id_bound_cidrs
915
+ __props__.__dict__["secret_id_num_uses"] = secret_id_num_uses
916
+ __props__.__dict__["secret_id_ttl"] = secret_id_ttl
917
+ __props__.__dict__["token_bound_cidrs"] = token_bound_cidrs
918
+ __props__.__dict__["token_explicit_max_ttl"] = token_explicit_max_ttl
919
+ __props__.__dict__["token_max_ttl"] = token_max_ttl
920
+ __props__.__dict__["token_no_default_policy"] = token_no_default_policy
921
+ __props__.__dict__["token_num_uses"] = token_num_uses
922
+ __props__.__dict__["token_period"] = token_period
923
+ __props__.__dict__["token_policies"] = token_policies
924
+ __props__.__dict__["token_ttl"] = token_ttl
925
+ __props__.__dict__["token_type"] = token_type
926
+ return AuthBackendRole(resource_name, opts=opts, __props__=__props__)
927
+
928
+ @_builtins.property
929
+ @pulumi.getter(name="aliasMetadata")
930
+ def alias_metadata(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
931
+ """
932
+ The metadata to be tied to generated entity alias.
933
+ This should be a list or map containing the metadata in key value pairs.
934
+ """
935
+ return pulumi.get(self, "alias_metadata")
936
+
937
+ @_builtins.property
938
+ @pulumi.getter
939
+ def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
940
+ """
941
+ The unique name of the auth backend to configure.
942
+ Defaults to `approle`.
943
+ """
944
+ return pulumi.get(self, "backend")
945
+
946
+ @_builtins.property
947
+ @pulumi.getter(name="bindSecretId")
948
+ def bind_secret_id(self) -> pulumi.Output[Optional[_builtins.bool]]:
949
+ """
950
+ Whether or not to require `secret_id` to be
951
+ presented when logging in using this AppRole. Defaults to `true`.
952
+ """
953
+ return pulumi.get(self, "bind_secret_id")
954
+
955
+ @_builtins.property
956
+ @pulumi.getter
957
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
958
+ """
959
+ The namespace to provision the resource in.
960
+ The value should not contain leading or trailing forward slashes.
961
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
962
+ *Available only for Vault Enterprise*.
963
+ """
964
+ return pulumi.get(self, "namespace")
965
+
966
+ @_builtins.property
967
+ @pulumi.getter(name="roleId")
968
+ def role_id(self) -> pulumi.Output[_builtins.str]:
969
+ """
970
+ The RoleID of this role. If not specified, one will be
971
+ auto-generated.
972
+ """
973
+ return pulumi.get(self, "role_id")
974
+
975
+ @_builtins.property
976
+ @pulumi.getter(name="roleName")
977
+ def role_name(self) -> pulumi.Output[_builtins.str]:
978
+ """
979
+ The name of the role.
980
+ """
981
+ return pulumi.get(self, "role_name")
982
+
983
+ @_builtins.property
984
+ @pulumi.getter(name="secretIdBoundCidrs")
985
+ def secret_id_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
986
+ """
987
+ If set,
988
+ specifies blocks of IP addresses which can perform the login operation.
989
+ """
990
+ return pulumi.get(self, "secret_id_bound_cidrs")
991
+
992
+ @_builtins.property
993
+ @pulumi.getter(name="secretIdNumUses")
994
+ def secret_id_num_uses(self) -> pulumi.Output[Optional[_builtins.int]]:
995
+ """
996
+ The number of times any particular SecretID
997
+ can be used to fetch a token from this AppRole, after which the SecretID will
998
+ expire. A value of zero will allow unlimited uses.
999
+ """
1000
+ return pulumi.get(self, "secret_id_num_uses")
1001
+
1002
+ @_builtins.property
1003
+ @pulumi.getter(name="secretIdTtl")
1004
+ def secret_id_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1005
+ """
1006
+ The number of seconds after which any SecretID
1007
+ expires.
1008
+ """
1009
+ return pulumi.get(self, "secret_id_ttl")
1010
+
1011
+ @_builtins.property
1012
+ @pulumi.getter(name="tokenBoundCidrs")
1013
+ def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1014
+ """
1015
+ Specifies the blocks of IP addresses which are allowed to use the generated token
1016
+ """
1017
+ return pulumi.get(self, "token_bound_cidrs")
1018
+
1019
+ @_builtins.property
1020
+ @pulumi.getter(name="tokenExplicitMaxTtl")
1021
+ def token_explicit_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1022
+ """
1023
+ Generated Token's Explicit Maximum TTL in seconds
1024
+ """
1025
+ return pulumi.get(self, "token_explicit_max_ttl")
1026
+
1027
+ @_builtins.property
1028
+ @pulumi.getter(name="tokenMaxTtl")
1029
+ def token_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1030
+ """
1031
+ The maximum lifetime of the generated token
1032
+ """
1033
+ return pulumi.get(self, "token_max_ttl")
1034
+
1035
+ @_builtins.property
1036
+ @pulumi.getter(name="tokenNoDefaultPolicy")
1037
+ def token_no_default_policy(self) -> pulumi.Output[Optional[_builtins.bool]]:
1038
+ """
1039
+ If true, the 'default' policy will not automatically be added to generated tokens
1040
+ """
1041
+ return pulumi.get(self, "token_no_default_policy")
1042
+
1043
+ @_builtins.property
1044
+ @pulumi.getter(name="tokenNumUses")
1045
+ def token_num_uses(self) -> pulumi.Output[Optional[_builtins.int]]:
1046
+ """
1047
+ The maximum number of times a token may be used, a value of zero means unlimited
1048
+ """
1049
+ return pulumi.get(self, "token_num_uses")
1050
+
1051
+ @_builtins.property
1052
+ @pulumi.getter(name="tokenPeriod")
1053
+ def token_period(self) -> pulumi.Output[Optional[_builtins.int]]:
1054
+ """
1055
+ Generated Token's Period
1056
+ """
1057
+ return pulumi.get(self, "token_period")
1058
+
1059
+ @_builtins.property
1060
+ @pulumi.getter(name="tokenPolicies")
1061
+ def token_policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1062
+ """
1063
+ Generated Token's Policies
1064
+ """
1065
+ return pulumi.get(self, "token_policies")
1066
+
1067
+ @_builtins.property
1068
+ @pulumi.getter(name="tokenTtl")
1069
+ def token_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1070
+ """
1071
+ The initial ttl of the token to generate in seconds
1072
+ """
1073
+ return pulumi.get(self, "token_ttl")
1074
+
1075
+ @_builtins.property
1076
+ @pulumi.getter(name="tokenType")
1077
+ def token_type(self) -> pulumi.Output[Optional[_builtins.str]]:
1078
+ """
1079
+ The type of token to generate, service or batch
1080
+ """
1081
+ return pulumi.get(self, "token_type")
1082
+