com.pulumi.aws.iam.inputs.GetPolicyDocumentStatementNotPrincipalArgs Maven / Gradle / Ivy
// *** WARNING: this file was generated by pulumi-java-gen. ***
// *** Do not edit by hand unless you're certain you know what you are doing! ***
package com.pulumi.aws.iam.inputs;
import com.pulumi.core.Output;
import com.pulumi.core.annotations.Import;
import com.pulumi.exceptions.MissingRequiredPropertyException;
import java.lang.String;
import java.util.List;
import java.util.Objects;
public final class GetPolicyDocumentStatementNotPrincipalArgs extends com.pulumi.resources.ResourceArgs {
public static final GetPolicyDocumentStatementNotPrincipalArgs Empty = new GetPolicyDocumentStatementNotPrincipalArgs();
/**
* List of identifiers for principals. When `type` is `AWS`, these are IAM principal ARNs, e.g., `arn:aws:iam::12345678901:role/yak-role`. When `type` is `Service`, these are AWS Service roles, e.g., `lambda.amazonaws.com`. When `type` is `Federated`, these are web identity users or SAML provider ARNs, e.g., `accounts.google.com` or `arn:aws:iam::12345678901:saml-provider/yak-saml-provider`. When `type` is `CanonicalUser`, these are [canonical user IDs](https://docs.aws.amazon.com/general/latest/gr/acct-identifiers.html#FindingCanonicalId), e.g., `79a59df900b949e55d96a1e698fbacedfd6e09d98eacf8f8d5218e7cd47ef2be`.
*
*/
@Import(name="identifiers", required=true)
private Output> identifiers;
/**
* @return List of identifiers for principals. When `type` is `AWS`, these are IAM principal ARNs, e.g., `arn:aws:iam::12345678901:role/yak-role`. When `type` is `Service`, these are AWS Service roles, e.g., `lambda.amazonaws.com`. When `type` is `Federated`, these are web identity users or SAML provider ARNs, e.g., `accounts.google.com` or `arn:aws:iam::12345678901:saml-provider/yak-saml-provider`. When `type` is `CanonicalUser`, these are [canonical user IDs](https://docs.aws.amazon.com/general/latest/gr/acct-identifiers.html#FindingCanonicalId), e.g., `79a59df900b949e55d96a1e698fbacedfd6e09d98eacf8f8d5218e7cd47ef2be`.
*
*/
public Output> identifiers() {
return this.identifiers;
}
/**
* Type of principal. Valid values include `AWS`, `Service`, `Federated`, `CanonicalUser` and `*`.
*
*/
@Import(name="type", required=true)
private Output type;
/**
* @return Type of principal. Valid values include `AWS`, `Service`, `Federated`, `CanonicalUser` and `*`.
*
*/
public Output type() {
return this.type;
}
private GetPolicyDocumentStatementNotPrincipalArgs() {}
private GetPolicyDocumentStatementNotPrincipalArgs(GetPolicyDocumentStatementNotPrincipalArgs $) {
this.identifiers = $.identifiers;
this.type = $.type;
}
public static Builder builder() {
return new Builder();
}
public static Builder builder(GetPolicyDocumentStatementNotPrincipalArgs defaults) {
return new Builder(defaults);
}
public static final class Builder {
private GetPolicyDocumentStatementNotPrincipalArgs $;
public Builder() {
$ = new GetPolicyDocumentStatementNotPrincipalArgs();
}
public Builder(GetPolicyDocumentStatementNotPrincipalArgs defaults) {
$ = new GetPolicyDocumentStatementNotPrincipalArgs(Objects.requireNonNull(defaults));
}
/**
* @param identifiers List of identifiers for principals. When `type` is `AWS`, these are IAM principal ARNs, e.g., `arn:aws:iam::12345678901:role/yak-role`. When `type` is `Service`, these are AWS Service roles, e.g., `lambda.amazonaws.com`. When `type` is `Federated`, these are web identity users or SAML provider ARNs, e.g., `accounts.google.com` or `arn:aws:iam::12345678901:saml-provider/yak-saml-provider`. When `type` is `CanonicalUser`, these are [canonical user IDs](https://docs.aws.amazon.com/general/latest/gr/acct-identifiers.html#FindingCanonicalId), e.g., `79a59df900b949e55d96a1e698fbacedfd6e09d98eacf8f8d5218e7cd47ef2be`.
*
* @return builder
*
*/
public Builder identifiers(Output> identifiers) {
$.identifiers = identifiers;
return this;
}
/**
* @param identifiers List of identifiers for principals. When `type` is `AWS`, these are IAM principal ARNs, e.g., `arn:aws:iam::12345678901:role/yak-role`. When `type` is `Service`, these are AWS Service roles, e.g., `lambda.amazonaws.com`. When `type` is `Federated`, these are web identity users or SAML provider ARNs, e.g., `accounts.google.com` or `arn:aws:iam::12345678901:saml-provider/yak-saml-provider`. When `type` is `CanonicalUser`, these are [canonical user IDs](https://docs.aws.amazon.com/general/latest/gr/acct-identifiers.html#FindingCanonicalId), e.g., `79a59df900b949e55d96a1e698fbacedfd6e09d98eacf8f8d5218e7cd47ef2be`.
*
* @return builder
*
*/
public Builder identifiers(List identifiers) {
return identifiers(Output.of(identifiers));
}
/**
* @param identifiers List of identifiers for principals. When `type` is `AWS`, these are IAM principal ARNs, e.g., `arn:aws:iam::12345678901:role/yak-role`. When `type` is `Service`, these are AWS Service roles, e.g., `lambda.amazonaws.com`. When `type` is `Federated`, these are web identity users or SAML provider ARNs, e.g., `accounts.google.com` or `arn:aws:iam::12345678901:saml-provider/yak-saml-provider`. When `type` is `CanonicalUser`, these are [canonical user IDs](https://docs.aws.amazon.com/general/latest/gr/acct-identifiers.html#FindingCanonicalId), e.g., `79a59df900b949e55d96a1e698fbacedfd6e09d98eacf8f8d5218e7cd47ef2be`.
*
* @return builder
*
*/
public Builder identifiers(String... identifiers) {
return identifiers(List.of(identifiers));
}
/**
* @param type Type of principal. Valid values include `AWS`, `Service`, `Federated`, `CanonicalUser` and `*`.
*
* @return builder
*
*/
public Builder type(Output type) {
$.type = type;
return this;
}
/**
* @param type Type of principal. Valid values include `AWS`, `Service`, `Federated`, `CanonicalUser` and `*`.
*
* @return builder
*
*/
public Builder type(String type) {
return type(Output.of(type));
}
public GetPolicyDocumentStatementNotPrincipalArgs build() {
if ($.identifiers == null) {
throw new MissingRequiredPropertyException("GetPolicyDocumentStatementNotPrincipalArgs", "identifiers");
}
if ($.type == null) {
throw new MissingRequiredPropertyException("GetPolicyDocumentStatementNotPrincipalArgs", "type");
}
return $;
}
}
}
© 2015 - 2025 Weber Informatics LLC | Privacy Policy