pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,1031 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
18
+
19
+ @pulumi.input_type
20
+ class AuthBackendRoleArgs:
21
+ def __init__(__self__, *,
22
+ bound_service_account_names: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]],
23
+ bound_service_account_namespaces: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]],
24
+ role_name: pulumi.Input[_builtins.str],
25
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
26
+ alias_name_source: Optional[pulumi.Input[_builtins.str]] = None,
27
+ audience: Optional[pulumi.Input[_builtins.str]] = None,
28
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
29
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
30
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
31
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
32
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
33
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
34
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
35
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
36
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
37
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
38
+ token_type: Optional[pulumi.Input[_builtins.str]] = None):
39
+ """
40
+ The set of arguments for constructing a AuthBackendRole resource.
41
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_names: List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*".
42
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_namespaces: List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
43
+ :param pulumi.Input[_builtins.str] role_name: Name of the role.
44
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
45
+ This should be a list or map containing the metadata in key value pairs.
46
+ :param pulumi.Input[_builtins.str] alias_name_source: Configures how identity aliases are generated.
47
+ Valid choices are: `serviceaccount_uid`, `serviceaccount_name`. (vault-1.9+)
48
+ :param pulumi.Input[_builtins.str] audience: Audience claim to verify in the JWT.
49
+
50
+ > Please see [alias_name_source](https://www.vaultproject.io/api-docs/auth/kubernetes#alias_name_source)
51
+ before setting this to something other its default value. There are **important** security
52
+ implications to be aware of.
53
+ :param pulumi.Input[_builtins.str] backend: Unique name of the kubernetes backend to configure.
54
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
55
+ The value should not contain leading or trailing forward slashes.
56
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
57
+ *Available only for Vault Enterprise*.
58
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
59
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
60
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
61
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
62
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
63
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
64
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
65
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
66
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
67
+ """
68
+ pulumi.set(__self__, "bound_service_account_names", bound_service_account_names)
69
+ pulumi.set(__self__, "bound_service_account_namespaces", bound_service_account_namespaces)
70
+ pulumi.set(__self__, "role_name", role_name)
71
+ if alias_metadata is not None:
72
+ pulumi.set(__self__, "alias_metadata", alias_metadata)
73
+ if alias_name_source is not None:
74
+ pulumi.set(__self__, "alias_name_source", alias_name_source)
75
+ if audience is not None:
76
+ pulumi.set(__self__, "audience", audience)
77
+ if backend is not None:
78
+ pulumi.set(__self__, "backend", backend)
79
+ if namespace is not None:
80
+ pulumi.set(__self__, "namespace", namespace)
81
+ if token_bound_cidrs is not None:
82
+ pulumi.set(__self__, "token_bound_cidrs", token_bound_cidrs)
83
+ if token_explicit_max_ttl is not None:
84
+ pulumi.set(__self__, "token_explicit_max_ttl", token_explicit_max_ttl)
85
+ if token_max_ttl is not None:
86
+ pulumi.set(__self__, "token_max_ttl", token_max_ttl)
87
+ if token_no_default_policy is not None:
88
+ pulumi.set(__self__, "token_no_default_policy", token_no_default_policy)
89
+ if token_num_uses is not None:
90
+ pulumi.set(__self__, "token_num_uses", token_num_uses)
91
+ if token_period is not None:
92
+ pulumi.set(__self__, "token_period", token_period)
93
+ if token_policies is not None:
94
+ pulumi.set(__self__, "token_policies", token_policies)
95
+ if token_ttl is not None:
96
+ pulumi.set(__self__, "token_ttl", token_ttl)
97
+ if token_type is not None:
98
+ pulumi.set(__self__, "token_type", token_type)
99
+
100
+ @_builtins.property
101
+ @pulumi.getter(name="boundServiceAccountNames")
102
+ def bound_service_account_names(self) -> pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]:
103
+ """
104
+ List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*".
105
+ """
106
+ return pulumi.get(self, "bound_service_account_names")
107
+
108
+ @bound_service_account_names.setter
109
+ def bound_service_account_names(self, value: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]):
110
+ pulumi.set(self, "bound_service_account_names", value)
111
+
112
+ @_builtins.property
113
+ @pulumi.getter(name="boundServiceAccountNamespaces")
114
+ def bound_service_account_namespaces(self) -> pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]:
115
+ """
116
+ List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
117
+ """
118
+ return pulumi.get(self, "bound_service_account_namespaces")
119
+
120
+ @bound_service_account_namespaces.setter
121
+ def bound_service_account_namespaces(self, value: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]):
122
+ pulumi.set(self, "bound_service_account_namespaces", value)
123
+
124
+ @_builtins.property
125
+ @pulumi.getter(name="roleName")
126
+ def role_name(self) -> pulumi.Input[_builtins.str]:
127
+ """
128
+ Name of the role.
129
+ """
130
+ return pulumi.get(self, "role_name")
131
+
132
+ @role_name.setter
133
+ def role_name(self, value: pulumi.Input[_builtins.str]):
134
+ pulumi.set(self, "role_name", value)
135
+
136
+ @_builtins.property
137
+ @pulumi.getter(name="aliasMetadata")
138
+ def alias_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
139
+ """
140
+ The metadata to be tied to generated entity alias.
141
+ This should be a list or map containing the metadata in key value pairs.
142
+ """
143
+ return pulumi.get(self, "alias_metadata")
144
+
145
+ @alias_metadata.setter
146
+ def alias_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
147
+ pulumi.set(self, "alias_metadata", value)
148
+
149
+ @_builtins.property
150
+ @pulumi.getter(name="aliasNameSource")
151
+ def alias_name_source(self) -> Optional[pulumi.Input[_builtins.str]]:
152
+ """
153
+ Configures how identity aliases are generated.
154
+ Valid choices are: `serviceaccount_uid`, `serviceaccount_name`. (vault-1.9+)
155
+ """
156
+ return pulumi.get(self, "alias_name_source")
157
+
158
+ @alias_name_source.setter
159
+ def alias_name_source(self, value: Optional[pulumi.Input[_builtins.str]]):
160
+ pulumi.set(self, "alias_name_source", value)
161
+
162
+ @_builtins.property
163
+ @pulumi.getter
164
+ def audience(self) -> Optional[pulumi.Input[_builtins.str]]:
165
+ """
166
+ Audience claim to verify in the JWT.
167
+
168
+ > Please see [alias_name_source](https://www.vaultproject.io/api-docs/auth/kubernetes#alias_name_source)
169
+ before setting this to something other its default value. There are **important** security
170
+ implications to be aware of.
171
+ """
172
+ return pulumi.get(self, "audience")
173
+
174
+ @audience.setter
175
+ def audience(self, value: Optional[pulumi.Input[_builtins.str]]):
176
+ pulumi.set(self, "audience", value)
177
+
178
+ @_builtins.property
179
+ @pulumi.getter
180
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
181
+ """
182
+ Unique name of the kubernetes backend to configure.
183
+ """
184
+ return pulumi.get(self, "backend")
185
+
186
+ @backend.setter
187
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
188
+ pulumi.set(self, "backend", value)
189
+
190
+ @_builtins.property
191
+ @pulumi.getter
192
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
193
+ """
194
+ The namespace to provision the resource in.
195
+ The value should not contain leading or trailing forward slashes.
196
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
197
+ *Available only for Vault Enterprise*.
198
+ """
199
+ return pulumi.get(self, "namespace")
200
+
201
+ @namespace.setter
202
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
203
+ pulumi.set(self, "namespace", value)
204
+
205
+ @_builtins.property
206
+ @pulumi.getter(name="tokenBoundCidrs")
207
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
208
+ """
209
+ Specifies the blocks of IP addresses which are allowed to use the generated token
210
+ """
211
+ return pulumi.get(self, "token_bound_cidrs")
212
+
213
+ @token_bound_cidrs.setter
214
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
215
+ pulumi.set(self, "token_bound_cidrs", value)
216
+
217
+ @_builtins.property
218
+ @pulumi.getter(name="tokenExplicitMaxTtl")
219
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
220
+ """
221
+ Generated Token's Explicit Maximum TTL in seconds
222
+ """
223
+ return pulumi.get(self, "token_explicit_max_ttl")
224
+
225
+ @token_explicit_max_ttl.setter
226
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
227
+ pulumi.set(self, "token_explicit_max_ttl", value)
228
+
229
+ @_builtins.property
230
+ @pulumi.getter(name="tokenMaxTtl")
231
+ def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
232
+ """
233
+ The maximum lifetime of the generated token
234
+ """
235
+ return pulumi.get(self, "token_max_ttl")
236
+
237
+ @token_max_ttl.setter
238
+ def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
239
+ pulumi.set(self, "token_max_ttl", value)
240
+
241
+ @_builtins.property
242
+ @pulumi.getter(name="tokenNoDefaultPolicy")
243
+ def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
244
+ """
245
+ If true, the 'default' policy will not automatically be added to generated tokens
246
+ """
247
+ return pulumi.get(self, "token_no_default_policy")
248
+
249
+ @token_no_default_policy.setter
250
+ def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
251
+ pulumi.set(self, "token_no_default_policy", value)
252
+
253
+ @_builtins.property
254
+ @pulumi.getter(name="tokenNumUses")
255
+ def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
256
+ """
257
+ The maximum number of times a token may be used, a value of zero means unlimited
258
+ """
259
+ return pulumi.get(self, "token_num_uses")
260
+
261
+ @token_num_uses.setter
262
+ def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
263
+ pulumi.set(self, "token_num_uses", value)
264
+
265
+ @_builtins.property
266
+ @pulumi.getter(name="tokenPeriod")
267
+ def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
268
+ """
269
+ Generated Token's Period
270
+ """
271
+ return pulumi.get(self, "token_period")
272
+
273
+ @token_period.setter
274
+ def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
275
+ pulumi.set(self, "token_period", value)
276
+
277
+ @_builtins.property
278
+ @pulumi.getter(name="tokenPolicies")
279
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
280
+ """
281
+ Generated Token's Policies
282
+ """
283
+ return pulumi.get(self, "token_policies")
284
+
285
+ @token_policies.setter
286
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
287
+ pulumi.set(self, "token_policies", value)
288
+
289
+ @_builtins.property
290
+ @pulumi.getter(name="tokenTtl")
291
+ def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
292
+ """
293
+ The initial ttl of the token to generate in seconds
294
+ """
295
+ return pulumi.get(self, "token_ttl")
296
+
297
+ @token_ttl.setter
298
+ def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
299
+ pulumi.set(self, "token_ttl", value)
300
+
301
+ @_builtins.property
302
+ @pulumi.getter(name="tokenType")
303
+ def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
304
+ """
305
+ The type of token to generate, service or batch
306
+ """
307
+ return pulumi.get(self, "token_type")
308
+
309
+ @token_type.setter
310
+ def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
311
+ pulumi.set(self, "token_type", value)
312
+
313
+
314
+ @pulumi.input_type
315
+ class _AuthBackendRoleState:
316
+ def __init__(__self__, *,
317
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
318
+ alias_name_source: Optional[pulumi.Input[_builtins.str]] = None,
319
+ audience: Optional[pulumi.Input[_builtins.str]] = None,
320
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
321
+ bound_service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
322
+ bound_service_account_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
323
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
324
+ role_name: Optional[pulumi.Input[_builtins.str]] = None,
325
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
326
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
327
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
328
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
329
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
330
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
331
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
332
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
333
+ token_type: Optional[pulumi.Input[_builtins.str]] = None):
334
+ """
335
+ Input properties used for looking up and filtering AuthBackendRole resources.
336
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
337
+ This should be a list or map containing the metadata in key value pairs.
338
+ :param pulumi.Input[_builtins.str] alias_name_source: Configures how identity aliases are generated.
339
+ Valid choices are: `serviceaccount_uid`, `serviceaccount_name`. (vault-1.9+)
340
+ :param pulumi.Input[_builtins.str] audience: Audience claim to verify in the JWT.
341
+
342
+ > Please see [alias_name_source](https://www.vaultproject.io/api-docs/auth/kubernetes#alias_name_source)
343
+ before setting this to something other its default value. There are **important** security
344
+ implications to be aware of.
345
+ :param pulumi.Input[_builtins.str] backend: Unique name of the kubernetes backend to configure.
346
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_names: List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*".
347
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_namespaces: List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
348
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
349
+ The value should not contain leading or trailing forward slashes.
350
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
351
+ *Available only for Vault Enterprise*.
352
+ :param pulumi.Input[_builtins.str] role_name: Name of the role.
353
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
354
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
355
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
356
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
357
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
358
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
359
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
360
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
361
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
362
+ """
363
+ if alias_metadata is not None:
364
+ pulumi.set(__self__, "alias_metadata", alias_metadata)
365
+ if alias_name_source is not None:
366
+ pulumi.set(__self__, "alias_name_source", alias_name_source)
367
+ if audience is not None:
368
+ pulumi.set(__self__, "audience", audience)
369
+ if backend is not None:
370
+ pulumi.set(__self__, "backend", backend)
371
+ if bound_service_account_names is not None:
372
+ pulumi.set(__self__, "bound_service_account_names", bound_service_account_names)
373
+ if bound_service_account_namespaces is not None:
374
+ pulumi.set(__self__, "bound_service_account_namespaces", bound_service_account_namespaces)
375
+ if namespace is not None:
376
+ pulumi.set(__self__, "namespace", namespace)
377
+ if role_name is not None:
378
+ pulumi.set(__self__, "role_name", role_name)
379
+ if token_bound_cidrs is not None:
380
+ pulumi.set(__self__, "token_bound_cidrs", token_bound_cidrs)
381
+ if token_explicit_max_ttl is not None:
382
+ pulumi.set(__self__, "token_explicit_max_ttl", token_explicit_max_ttl)
383
+ if token_max_ttl is not None:
384
+ pulumi.set(__self__, "token_max_ttl", token_max_ttl)
385
+ if token_no_default_policy is not None:
386
+ pulumi.set(__self__, "token_no_default_policy", token_no_default_policy)
387
+ if token_num_uses is not None:
388
+ pulumi.set(__self__, "token_num_uses", token_num_uses)
389
+ if token_period is not None:
390
+ pulumi.set(__self__, "token_period", token_period)
391
+ if token_policies is not None:
392
+ pulumi.set(__self__, "token_policies", token_policies)
393
+ if token_ttl is not None:
394
+ pulumi.set(__self__, "token_ttl", token_ttl)
395
+ if token_type is not None:
396
+ pulumi.set(__self__, "token_type", token_type)
397
+
398
+ @_builtins.property
399
+ @pulumi.getter(name="aliasMetadata")
400
+ def alias_metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
401
+ """
402
+ The metadata to be tied to generated entity alias.
403
+ This should be a list or map containing the metadata in key value pairs.
404
+ """
405
+ return pulumi.get(self, "alias_metadata")
406
+
407
+ @alias_metadata.setter
408
+ def alias_metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
409
+ pulumi.set(self, "alias_metadata", value)
410
+
411
+ @_builtins.property
412
+ @pulumi.getter(name="aliasNameSource")
413
+ def alias_name_source(self) -> Optional[pulumi.Input[_builtins.str]]:
414
+ """
415
+ Configures how identity aliases are generated.
416
+ Valid choices are: `serviceaccount_uid`, `serviceaccount_name`. (vault-1.9+)
417
+ """
418
+ return pulumi.get(self, "alias_name_source")
419
+
420
+ @alias_name_source.setter
421
+ def alias_name_source(self, value: Optional[pulumi.Input[_builtins.str]]):
422
+ pulumi.set(self, "alias_name_source", value)
423
+
424
+ @_builtins.property
425
+ @pulumi.getter
426
+ def audience(self) -> Optional[pulumi.Input[_builtins.str]]:
427
+ """
428
+ Audience claim to verify in the JWT.
429
+
430
+ > Please see [alias_name_source](https://www.vaultproject.io/api-docs/auth/kubernetes#alias_name_source)
431
+ before setting this to something other its default value. There are **important** security
432
+ implications to be aware of.
433
+ """
434
+ return pulumi.get(self, "audience")
435
+
436
+ @audience.setter
437
+ def audience(self, value: Optional[pulumi.Input[_builtins.str]]):
438
+ pulumi.set(self, "audience", value)
439
+
440
+ @_builtins.property
441
+ @pulumi.getter
442
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
443
+ """
444
+ Unique name of the kubernetes backend to configure.
445
+ """
446
+ return pulumi.get(self, "backend")
447
+
448
+ @backend.setter
449
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
450
+ pulumi.set(self, "backend", value)
451
+
452
+ @_builtins.property
453
+ @pulumi.getter(name="boundServiceAccountNames")
454
+ def bound_service_account_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
455
+ """
456
+ List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*".
457
+ """
458
+ return pulumi.get(self, "bound_service_account_names")
459
+
460
+ @bound_service_account_names.setter
461
+ def bound_service_account_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
462
+ pulumi.set(self, "bound_service_account_names", value)
463
+
464
+ @_builtins.property
465
+ @pulumi.getter(name="boundServiceAccountNamespaces")
466
+ def bound_service_account_namespaces(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
467
+ """
468
+ List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
469
+ """
470
+ return pulumi.get(self, "bound_service_account_namespaces")
471
+
472
+ @bound_service_account_namespaces.setter
473
+ def bound_service_account_namespaces(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
474
+ pulumi.set(self, "bound_service_account_namespaces", value)
475
+
476
+ @_builtins.property
477
+ @pulumi.getter
478
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
479
+ """
480
+ The namespace to provision the resource in.
481
+ The value should not contain leading or trailing forward slashes.
482
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
483
+ *Available only for Vault Enterprise*.
484
+ """
485
+ return pulumi.get(self, "namespace")
486
+
487
+ @namespace.setter
488
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
489
+ pulumi.set(self, "namespace", value)
490
+
491
+ @_builtins.property
492
+ @pulumi.getter(name="roleName")
493
+ def role_name(self) -> Optional[pulumi.Input[_builtins.str]]:
494
+ """
495
+ Name of the role.
496
+ """
497
+ return pulumi.get(self, "role_name")
498
+
499
+ @role_name.setter
500
+ def role_name(self, value: Optional[pulumi.Input[_builtins.str]]):
501
+ pulumi.set(self, "role_name", value)
502
+
503
+ @_builtins.property
504
+ @pulumi.getter(name="tokenBoundCidrs")
505
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
506
+ """
507
+ Specifies the blocks of IP addresses which are allowed to use the generated token
508
+ """
509
+ return pulumi.get(self, "token_bound_cidrs")
510
+
511
+ @token_bound_cidrs.setter
512
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
513
+ pulumi.set(self, "token_bound_cidrs", value)
514
+
515
+ @_builtins.property
516
+ @pulumi.getter(name="tokenExplicitMaxTtl")
517
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
518
+ """
519
+ Generated Token's Explicit Maximum TTL in seconds
520
+ """
521
+ return pulumi.get(self, "token_explicit_max_ttl")
522
+
523
+ @token_explicit_max_ttl.setter
524
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
525
+ pulumi.set(self, "token_explicit_max_ttl", value)
526
+
527
+ @_builtins.property
528
+ @pulumi.getter(name="tokenMaxTtl")
529
+ def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
530
+ """
531
+ The maximum lifetime of the generated token
532
+ """
533
+ return pulumi.get(self, "token_max_ttl")
534
+
535
+ @token_max_ttl.setter
536
+ def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
537
+ pulumi.set(self, "token_max_ttl", value)
538
+
539
+ @_builtins.property
540
+ @pulumi.getter(name="tokenNoDefaultPolicy")
541
+ def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
542
+ """
543
+ If true, the 'default' policy will not automatically be added to generated tokens
544
+ """
545
+ return pulumi.get(self, "token_no_default_policy")
546
+
547
+ @token_no_default_policy.setter
548
+ def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
549
+ pulumi.set(self, "token_no_default_policy", value)
550
+
551
+ @_builtins.property
552
+ @pulumi.getter(name="tokenNumUses")
553
+ def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
554
+ """
555
+ The maximum number of times a token may be used, a value of zero means unlimited
556
+ """
557
+ return pulumi.get(self, "token_num_uses")
558
+
559
+ @token_num_uses.setter
560
+ def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
561
+ pulumi.set(self, "token_num_uses", value)
562
+
563
+ @_builtins.property
564
+ @pulumi.getter(name="tokenPeriod")
565
+ def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
566
+ """
567
+ Generated Token's Period
568
+ """
569
+ return pulumi.get(self, "token_period")
570
+
571
+ @token_period.setter
572
+ def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
573
+ pulumi.set(self, "token_period", value)
574
+
575
+ @_builtins.property
576
+ @pulumi.getter(name="tokenPolicies")
577
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
578
+ """
579
+ Generated Token's Policies
580
+ """
581
+ return pulumi.get(self, "token_policies")
582
+
583
+ @token_policies.setter
584
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
585
+ pulumi.set(self, "token_policies", value)
586
+
587
+ @_builtins.property
588
+ @pulumi.getter(name="tokenTtl")
589
+ def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
590
+ """
591
+ The initial ttl of the token to generate in seconds
592
+ """
593
+ return pulumi.get(self, "token_ttl")
594
+
595
+ @token_ttl.setter
596
+ def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
597
+ pulumi.set(self, "token_ttl", value)
598
+
599
+ @_builtins.property
600
+ @pulumi.getter(name="tokenType")
601
+ def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
602
+ """
603
+ The type of token to generate, service or batch
604
+ """
605
+ return pulumi.get(self, "token_type")
606
+
607
+ @token_type.setter
608
+ def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
609
+ pulumi.set(self, "token_type", value)
610
+
611
+
612
+ @pulumi.type_token("vault:kubernetes/authBackendRole:AuthBackendRole")
613
+ class AuthBackendRole(pulumi.CustomResource):
614
+ @overload
615
+ def __init__(__self__,
616
+ resource_name: str,
617
+ opts: Optional[pulumi.ResourceOptions] = None,
618
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
619
+ alias_name_source: Optional[pulumi.Input[_builtins.str]] = None,
620
+ audience: Optional[pulumi.Input[_builtins.str]] = None,
621
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
622
+ bound_service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
623
+ bound_service_account_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
624
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
625
+ role_name: Optional[pulumi.Input[_builtins.str]] = None,
626
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
627
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
628
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
629
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
630
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
631
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
632
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
633
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
634
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
635
+ __props__=None):
636
+ """
637
+ Manages an Kubernetes auth backend role in a Vault server. See the [Vault
638
+ documentation](https://www.vaultproject.io/docs/auth/kubernetes.html) for more
639
+ information.
640
+
641
+ ## Example Usage
642
+
643
+ ```python
644
+ import pulumi
645
+ import pulumi_vault as vault
646
+
647
+ kubernetes = vault.AuthBackend("kubernetes", type="kubernetes")
648
+ example = vault.kubernetes.AuthBackendRole("example",
649
+ backend=kubernetes.path,
650
+ role_name="example-role",
651
+ bound_service_account_names=["example"],
652
+ bound_service_account_namespaces=["example"],
653
+ token_ttl=3600,
654
+ token_policies=[
655
+ "default",
656
+ "dev",
657
+ "prod",
658
+ ],
659
+ audience="vault")
660
+ ```
661
+
662
+ ## Import
663
+
664
+ Kubernetes auth backend role can be imported using the `path`, e.g.
665
+
666
+ ```sh
667
+ $ pulumi import vault:kubernetes/authBackendRole:AuthBackendRole foo auth/kubernetes/role/foo
668
+ ```
669
+
670
+ :param str resource_name: The name of the resource.
671
+ :param pulumi.ResourceOptions opts: Options for the resource.
672
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
673
+ This should be a list or map containing the metadata in key value pairs.
674
+ :param pulumi.Input[_builtins.str] alias_name_source: Configures how identity aliases are generated.
675
+ Valid choices are: `serviceaccount_uid`, `serviceaccount_name`. (vault-1.9+)
676
+ :param pulumi.Input[_builtins.str] audience: Audience claim to verify in the JWT.
677
+
678
+ > Please see [alias_name_source](https://www.vaultproject.io/api-docs/auth/kubernetes#alias_name_source)
679
+ before setting this to something other its default value. There are **important** security
680
+ implications to be aware of.
681
+ :param pulumi.Input[_builtins.str] backend: Unique name of the kubernetes backend to configure.
682
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_names: List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*".
683
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_namespaces: List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
684
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
685
+ The value should not contain leading or trailing forward slashes.
686
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
687
+ *Available only for Vault Enterprise*.
688
+ :param pulumi.Input[_builtins.str] role_name: Name of the role.
689
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
690
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
691
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
692
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
693
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
694
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
695
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
696
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
697
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
698
+ """
699
+ ...
700
+ @overload
701
+ def __init__(__self__,
702
+ resource_name: str,
703
+ args: AuthBackendRoleArgs,
704
+ opts: Optional[pulumi.ResourceOptions] = None):
705
+ """
706
+ Manages an Kubernetes auth backend role in a Vault server. See the [Vault
707
+ documentation](https://www.vaultproject.io/docs/auth/kubernetes.html) for more
708
+ information.
709
+
710
+ ## Example Usage
711
+
712
+ ```python
713
+ import pulumi
714
+ import pulumi_vault as vault
715
+
716
+ kubernetes = vault.AuthBackend("kubernetes", type="kubernetes")
717
+ example = vault.kubernetes.AuthBackendRole("example",
718
+ backend=kubernetes.path,
719
+ role_name="example-role",
720
+ bound_service_account_names=["example"],
721
+ bound_service_account_namespaces=["example"],
722
+ token_ttl=3600,
723
+ token_policies=[
724
+ "default",
725
+ "dev",
726
+ "prod",
727
+ ],
728
+ audience="vault")
729
+ ```
730
+
731
+ ## Import
732
+
733
+ Kubernetes auth backend role can be imported using the `path`, e.g.
734
+
735
+ ```sh
736
+ $ pulumi import vault:kubernetes/authBackendRole:AuthBackendRole foo auth/kubernetes/role/foo
737
+ ```
738
+
739
+ :param str resource_name: The name of the resource.
740
+ :param AuthBackendRoleArgs args: The arguments to use to populate this resource's properties.
741
+ :param pulumi.ResourceOptions opts: Options for the resource.
742
+ """
743
+ ...
744
+ def __init__(__self__, resource_name: str, *args, **kwargs):
745
+ resource_args, opts = _utilities.get_resource_args_opts(AuthBackendRoleArgs, pulumi.ResourceOptions, *args, **kwargs)
746
+ if resource_args is not None:
747
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
748
+ else:
749
+ __self__._internal_init(resource_name, *args, **kwargs)
750
+
751
+ def _internal_init(__self__,
752
+ resource_name: str,
753
+ opts: Optional[pulumi.ResourceOptions] = None,
754
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
755
+ alias_name_source: Optional[pulumi.Input[_builtins.str]] = None,
756
+ audience: Optional[pulumi.Input[_builtins.str]] = None,
757
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
758
+ bound_service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
759
+ bound_service_account_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
760
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
761
+ role_name: Optional[pulumi.Input[_builtins.str]] = None,
762
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
763
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
764
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
765
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
766
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
767
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
768
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
769
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
770
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
771
+ __props__=None):
772
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
773
+ if not isinstance(opts, pulumi.ResourceOptions):
774
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
775
+ if opts.id is None:
776
+ if __props__ is not None:
777
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
778
+ __props__ = AuthBackendRoleArgs.__new__(AuthBackendRoleArgs)
779
+
780
+ __props__.__dict__["alias_metadata"] = alias_metadata
781
+ __props__.__dict__["alias_name_source"] = alias_name_source
782
+ __props__.__dict__["audience"] = audience
783
+ __props__.__dict__["backend"] = backend
784
+ if bound_service_account_names is None and not opts.urn:
785
+ raise TypeError("Missing required property 'bound_service_account_names'")
786
+ __props__.__dict__["bound_service_account_names"] = bound_service_account_names
787
+ if bound_service_account_namespaces is None and not opts.urn:
788
+ raise TypeError("Missing required property 'bound_service_account_namespaces'")
789
+ __props__.__dict__["bound_service_account_namespaces"] = bound_service_account_namespaces
790
+ __props__.__dict__["namespace"] = namespace
791
+ if role_name is None and not opts.urn:
792
+ raise TypeError("Missing required property 'role_name'")
793
+ __props__.__dict__["role_name"] = role_name
794
+ __props__.__dict__["token_bound_cidrs"] = token_bound_cidrs
795
+ __props__.__dict__["token_explicit_max_ttl"] = token_explicit_max_ttl
796
+ __props__.__dict__["token_max_ttl"] = token_max_ttl
797
+ __props__.__dict__["token_no_default_policy"] = token_no_default_policy
798
+ __props__.__dict__["token_num_uses"] = token_num_uses
799
+ __props__.__dict__["token_period"] = token_period
800
+ __props__.__dict__["token_policies"] = token_policies
801
+ __props__.__dict__["token_ttl"] = token_ttl
802
+ __props__.__dict__["token_type"] = token_type
803
+ super(AuthBackendRole, __self__).__init__(
804
+ 'vault:kubernetes/authBackendRole:AuthBackendRole',
805
+ resource_name,
806
+ __props__,
807
+ opts)
808
+
809
+ @staticmethod
810
+ def get(resource_name: str,
811
+ id: pulumi.Input[str],
812
+ opts: Optional[pulumi.ResourceOptions] = None,
813
+ alias_metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
814
+ alias_name_source: Optional[pulumi.Input[_builtins.str]] = None,
815
+ audience: Optional[pulumi.Input[_builtins.str]] = None,
816
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
817
+ bound_service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
818
+ bound_service_account_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
819
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
820
+ role_name: Optional[pulumi.Input[_builtins.str]] = None,
821
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
822
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
823
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
824
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
825
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
826
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
827
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
828
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
829
+ token_type: Optional[pulumi.Input[_builtins.str]] = None) -> 'AuthBackendRole':
830
+ """
831
+ Get an existing AuthBackendRole resource's state with the given name, id, and optional extra
832
+ properties used to qualify the lookup.
833
+
834
+ :param str resource_name: The unique name of the resulting resource.
835
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
836
+ :param pulumi.ResourceOptions opts: Options for the resource.
837
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] alias_metadata: The metadata to be tied to generated entity alias.
838
+ This should be a list or map containing the metadata in key value pairs.
839
+ :param pulumi.Input[_builtins.str] alias_name_source: Configures how identity aliases are generated.
840
+ Valid choices are: `serviceaccount_uid`, `serviceaccount_name`. (vault-1.9+)
841
+ :param pulumi.Input[_builtins.str] audience: Audience claim to verify in the JWT.
842
+
843
+ > Please see [alias_name_source](https://www.vaultproject.io/api-docs/auth/kubernetes#alias_name_source)
844
+ before setting this to something other its default value. There are **important** security
845
+ implications to be aware of.
846
+ :param pulumi.Input[_builtins.str] backend: Unique name of the kubernetes backend to configure.
847
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_names: List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*".
848
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_service_account_namespaces: List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
849
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
850
+ The value should not contain leading or trailing forward slashes.
851
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
852
+ *Available only for Vault Enterprise*.
853
+ :param pulumi.Input[_builtins.str] role_name: Name of the role.
854
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
855
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
856
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
857
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
858
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
859
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
860
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
861
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
862
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
863
+ """
864
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
865
+
866
+ __props__ = _AuthBackendRoleState.__new__(_AuthBackendRoleState)
867
+
868
+ __props__.__dict__["alias_metadata"] = alias_metadata
869
+ __props__.__dict__["alias_name_source"] = alias_name_source
870
+ __props__.__dict__["audience"] = audience
871
+ __props__.__dict__["backend"] = backend
872
+ __props__.__dict__["bound_service_account_names"] = bound_service_account_names
873
+ __props__.__dict__["bound_service_account_namespaces"] = bound_service_account_namespaces
874
+ __props__.__dict__["namespace"] = namespace
875
+ __props__.__dict__["role_name"] = role_name
876
+ __props__.__dict__["token_bound_cidrs"] = token_bound_cidrs
877
+ __props__.__dict__["token_explicit_max_ttl"] = token_explicit_max_ttl
878
+ __props__.__dict__["token_max_ttl"] = token_max_ttl
879
+ __props__.__dict__["token_no_default_policy"] = token_no_default_policy
880
+ __props__.__dict__["token_num_uses"] = token_num_uses
881
+ __props__.__dict__["token_period"] = token_period
882
+ __props__.__dict__["token_policies"] = token_policies
883
+ __props__.__dict__["token_ttl"] = token_ttl
884
+ __props__.__dict__["token_type"] = token_type
885
+ return AuthBackendRole(resource_name, opts=opts, __props__=__props__)
886
+
887
+ @_builtins.property
888
+ @pulumi.getter(name="aliasMetadata")
889
+ def alias_metadata(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
890
+ """
891
+ The metadata to be tied to generated entity alias.
892
+ This should be a list or map containing the metadata in key value pairs.
893
+ """
894
+ return pulumi.get(self, "alias_metadata")
895
+
896
+ @_builtins.property
897
+ @pulumi.getter(name="aliasNameSource")
898
+ def alias_name_source(self) -> pulumi.Output[_builtins.str]:
899
+ """
900
+ Configures how identity aliases are generated.
901
+ Valid choices are: `serviceaccount_uid`, `serviceaccount_name`. (vault-1.9+)
902
+ """
903
+ return pulumi.get(self, "alias_name_source")
904
+
905
+ @_builtins.property
906
+ @pulumi.getter
907
+ def audience(self) -> pulumi.Output[Optional[_builtins.str]]:
908
+ """
909
+ Audience claim to verify in the JWT.
910
+
911
+ > Please see [alias_name_source](https://www.vaultproject.io/api-docs/auth/kubernetes#alias_name_source)
912
+ before setting this to something other its default value. There are **important** security
913
+ implications to be aware of.
914
+ """
915
+ return pulumi.get(self, "audience")
916
+
917
+ @_builtins.property
918
+ @pulumi.getter
919
+ def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
920
+ """
921
+ Unique name of the kubernetes backend to configure.
922
+ """
923
+ return pulumi.get(self, "backend")
924
+
925
+ @_builtins.property
926
+ @pulumi.getter(name="boundServiceAccountNames")
927
+ def bound_service_account_names(self) -> pulumi.Output[Sequence[_builtins.str]]:
928
+ """
929
+ List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and bound_service_account_namespaces can not be "*".
930
+ """
931
+ return pulumi.get(self, "bound_service_account_names")
932
+
933
+ @_builtins.property
934
+ @pulumi.getter(name="boundServiceAccountNamespaces")
935
+ def bound_service_account_namespaces(self) -> pulumi.Output[Sequence[_builtins.str]]:
936
+ """
937
+ List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and bound_service_account_names can not be set to "*".
938
+ """
939
+ return pulumi.get(self, "bound_service_account_namespaces")
940
+
941
+ @_builtins.property
942
+ @pulumi.getter
943
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
944
+ """
945
+ The namespace to provision the resource in.
946
+ The value should not contain leading or trailing forward slashes.
947
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
948
+ *Available only for Vault Enterprise*.
949
+ """
950
+ return pulumi.get(self, "namespace")
951
+
952
+ @_builtins.property
953
+ @pulumi.getter(name="roleName")
954
+ def role_name(self) -> pulumi.Output[_builtins.str]:
955
+ """
956
+ Name of the role.
957
+ """
958
+ return pulumi.get(self, "role_name")
959
+
960
+ @_builtins.property
961
+ @pulumi.getter(name="tokenBoundCidrs")
962
+ def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
963
+ """
964
+ Specifies the blocks of IP addresses which are allowed to use the generated token
965
+ """
966
+ return pulumi.get(self, "token_bound_cidrs")
967
+
968
+ @_builtins.property
969
+ @pulumi.getter(name="tokenExplicitMaxTtl")
970
+ def token_explicit_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
971
+ """
972
+ Generated Token's Explicit Maximum TTL in seconds
973
+ """
974
+ return pulumi.get(self, "token_explicit_max_ttl")
975
+
976
+ @_builtins.property
977
+ @pulumi.getter(name="tokenMaxTtl")
978
+ def token_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
979
+ """
980
+ The maximum lifetime of the generated token
981
+ """
982
+ return pulumi.get(self, "token_max_ttl")
983
+
984
+ @_builtins.property
985
+ @pulumi.getter(name="tokenNoDefaultPolicy")
986
+ def token_no_default_policy(self) -> pulumi.Output[Optional[_builtins.bool]]:
987
+ """
988
+ If true, the 'default' policy will not automatically be added to generated tokens
989
+ """
990
+ return pulumi.get(self, "token_no_default_policy")
991
+
992
+ @_builtins.property
993
+ @pulumi.getter(name="tokenNumUses")
994
+ def token_num_uses(self) -> pulumi.Output[Optional[_builtins.int]]:
995
+ """
996
+ The maximum number of times a token may be used, a value of zero means unlimited
997
+ """
998
+ return pulumi.get(self, "token_num_uses")
999
+
1000
+ @_builtins.property
1001
+ @pulumi.getter(name="tokenPeriod")
1002
+ def token_period(self) -> pulumi.Output[Optional[_builtins.int]]:
1003
+ """
1004
+ Generated Token's Period
1005
+ """
1006
+ return pulumi.get(self, "token_period")
1007
+
1008
+ @_builtins.property
1009
+ @pulumi.getter(name="tokenPolicies")
1010
+ def token_policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1011
+ """
1012
+ Generated Token's Policies
1013
+ """
1014
+ return pulumi.get(self, "token_policies")
1015
+
1016
+ @_builtins.property
1017
+ @pulumi.getter(name="tokenTtl")
1018
+ def token_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1019
+ """
1020
+ The initial ttl of the token to generate in seconds
1021
+ """
1022
+ return pulumi.get(self, "token_ttl")
1023
+
1024
+ @_builtins.property
1025
+ @pulumi.getter(name="tokenType")
1026
+ def token_type(self) -> pulumi.Output[Optional[_builtins.str]]:
1027
+ """
1028
+ The type of token to generate, service or batch
1029
+ """
1030
+ return pulumi.get(self, "token_type")
1031
+