pulumi-vault 6.2.0__py3-none-any.whl → 6.2.0a1712470779__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (192) hide show
  1. pulumi_vault/__init__.py +0 -26
  2. pulumi_vault/_inputs.py +20 -0
  3. pulumi_vault/ad/secret_backend.py +6 -2
  4. pulumi_vault/ad/secret_library.py +4 -2
  5. pulumi_vault/ad/secret_role.py +4 -0
  6. pulumi_vault/alicloud/auth_backend_role.py +192 -69
  7. pulumi_vault/approle/auth_backend_login.py +4 -0
  8. pulumi_vault/approle/auth_backend_role.py +186 -63
  9. pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
  10. pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
  11. pulumi_vault/audit.py +20 -12
  12. pulumi_vault/audit_request_header.py +6 -6
  13. pulumi_vault/auth_backend.py +0 -47
  14. pulumi_vault/aws/auth_backend_client.py +17 -253
  15. pulumi_vault/aws/auth_backend_config_identity.py +4 -0
  16. pulumi_vault/aws/auth_backend_identity_whitelist.py +10 -6
  17. pulumi_vault/aws/auth_backend_login.py +8 -0
  18. pulumi_vault/aws/auth_backend_role.py +186 -63
  19. pulumi_vault/aws/auth_backend_roletag_blacklist.py +10 -6
  20. pulumi_vault/aws/auth_backend_sts_role.py +4 -0
  21. pulumi_vault/aws/secret_backend_role.py +4 -56
  22. pulumi_vault/aws/secret_backend_static_role.py +4 -2
  23. pulumi_vault/azure/auth_backend_config.py +10 -139
  24. pulumi_vault/azure/auth_backend_role.py +186 -63
  25. pulumi_vault/azure/backend.py +22 -217
  26. pulumi_vault/azure/backend_role.py +18 -14
  27. pulumi_vault/azure/get_access_credentials.py +4 -0
  28. pulumi_vault/cert_auth_backend_role.py +208 -75
  29. pulumi_vault/consul/secret_backend.py +18 -10
  30. pulumi_vault/consul/secret_backend_role.py +4 -2
  31. pulumi_vault/database/_inputs.py +784 -522
  32. pulumi_vault/database/outputs.py +784 -522
  33. pulumi_vault/database/secret_backend_connection.py +4 -2
  34. pulumi_vault/database/secret_backend_role.py +4 -4
  35. pulumi_vault/database/secret_backend_static_role.py +8 -10
  36. pulumi_vault/database/secrets_mount.py +4 -286
  37. pulumi_vault/egp_policy.py +8 -4
  38. pulumi_vault/gcp/auth_backend.py +18 -226
  39. pulumi_vault/gcp/auth_backend_role.py +264 -63
  40. pulumi_vault/gcp/get_auth_backend_role.py +4 -0
  41. pulumi_vault/gcp/secret_backend.py +9 -275
  42. pulumi_vault/gcp/secret_impersonated_account.py +14 -12
  43. pulumi_vault/gcp/secret_roleset.py +6 -4
  44. pulumi_vault/gcp/secret_static_account.py +16 -14
  45. pulumi_vault/generic/endpoint.py +8 -4
  46. pulumi_vault/generic/get_secret.py +4 -40
  47. pulumi_vault/get_auth_backend.py +4 -0
  48. pulumi_vault/get_auth_backends.py +8 -0
  49. pulumi_vault/get_namespace.py +12 -0
  50. pulumi_vault/get_namespaces.py +12 -4
  51. pulumi_vault/get_nomad_access_token.py +4 -0
  52. pulumi_vault/get_policy_document.py +8 -8
  53. pulumi_vault/get_raft_autopilot_state.py +4 -0
  54. pulumi_vault/github/auth_backend.py +4 -0
  55. pulumi_vault/github/team.py +6 -2
  56. pulumi_vault/github/user.py +6 -2
  57. pulumi_vault/identity/entity.py +8 -6
  58. pulumi_vault/identity/entity_alias.py +8 -6
  59. pulumi_vault/identity/entity_policies.py +12 -12
  60. pulumi_vault/identity/get_entity.py +4 -0
  61. pulumi_vault/identity/get_group.py +4 -0
  62. pulumi_vault/identity/get_oidc_client_creds.py +4 -2
  63. pulumi_vault/identity/get_oidc_openid_config.py +6 -10
  64. pulumi_vault/identity/get_oidc_public_keys.py +6 -10
  65. pulumi_vault/identity/group.py +42 -38
  66. pulumi_vault/identity/group_alias.py +4 -2
  67. pulumi_vault/identity/group_member_entity_ids.py +16 -12
  68. pulumi_vault/identity/group_member_group_ids.py +20 -24
  69. pulumi_vault/identity/group_policies.py +8 -4
  70. pulumi_vault/identity/mfa_duo.py +8 -4
  71. pulumi_vault/identity/mfa_login_enforcement.py +8 -8
  72. pulumi_vault/identity/mfa_okta.py +8 -4
  73. pulumi_vault/identity/mfa_pingid.py +4 -0
  74. pulumi_vault/identity/mfa_totp.py +4 -0
  75. pulumi_vault/identity/oidc.py +4 -0
  76. pulumi_vault/identity/oidc_assignment.py +6 -10
  77. pulumi_vault/identity/oidc_client.py +10 -10
  78. pulumi_vault/identity/oidc_key.py +12 -16
  79. pulumi_vault/identity/oidc_key_allowed_client_id.py +12 -16
  80. pulumi_vault/identity/oidc_provider.py +16 -22
  81. pulumi_vault/identity/oidc_role.py +20 -28
  82. pulumi_vault/identity/oidc_scope.py +8 -6
  83. pulumi_vault/jwt/auth_backend.py +32 -20
  84. pulumi_vault/jwt/auth_backend_role.py +225 -91
  85. pulumi_vault/kmip/secret_backend.py +14 -10
  86. pulumi_vault/kmip/secret_role.py +4 -0
  87. pulumi_vault/kmip/secret_scope.py +4 -0
  88. pulumi_vault/kubernetes/auth_backend_config.py +4 -0
  89. pulumi_vault/kubernetes/auth_backend_role.py +172 -56
  90. pulumi_vault/kubernetes/get_service_account_token.py +8 -8
  91. pulumi_vault/kubernetes/secret_backend.py +8 -288
  92. pulumi_vault/kubernetes/secret_backend_role.py +24 -24
  93. pulumi_vault/kv/get_secret.py +4 -0
  94. pulumi_vault/kv/get_secret_subkeys_v2.py +6 -4
  95. pulumi_vault/kv/get_secret_v2.py +0 -58
  96. pulumi_vault/kv/get_secrets_list.py +8 -4
  97. pulumi_vault/kv/get_secrets_list_v2.py +12 -14
  98. pulumi_vault/kv/secret.py +4 -0
  99. pulumi_vault/kv/secret_backend_v2.py +4 -0
  100. pulumi_vault/kv/secret_v2.py +4 -2
  101. pulumi_vault/ldap/auth_backend.py +161 -66
  102. pulumi_vault/ldap/auth_backend_group.py +4 -0
  103. pulumi_vault/ldap/auth_backend_user.py +4 -0
  104. pulumi_vault/ldap/secret_backend.py +8 -286
  105. pulumi_vault/ldap/secret_backend_dynamic_role.py +4 -0
  106. pulumi_vault/ldap/secret_backend_library_set.py +4 -2
  107. pulumi_vault/ldap/secret_backend_static_role.py +4 -0
  108. pulumi_vault/managed/_inputs.py +132 -84
  109. pulumi_vault/managed/keys.py +28 -7
  110. pulumi_vault/managed/outputs.py +132 -84
  111. pulumi_vault/mfa_duo.py +6 -4
  112. pulumi_vault/mfa_okta.py +6 -4
  113. pulumi_vault/mfa_pingid.py +6 -4
  114. pulumi_vault/mfa_totp.py +12 -10
  115. pulumi_vault/mongodbatlas/secret_backend.py +4 -0
  116. pulumi_vault/mongodbatlas/secret_role.py +4 -2
  117. pulumi_vault/mount.py +42 -350
  118. pulumi_vault/nomad_secret_backend.py +8 -4
  119. pulumi_vault/nomad_secret_role.py +4 -0
  120. pulumi_vault/okta/_inputs.py +8 -8
  121. pulumi_vault/okta/auth_backend.py +10 -459
  122. pulumi_vault/okta/auth_backend_group.py +4 -0
  123. pulumi_vault/okta/auth_backend_user.py +4 -0
  124. pulumi_vault/okta/outputs.py +8 -8
  125. pulumi_vault/outputs.py +20 -0
  126. pulumi_vault/password_policy.py +8 -6
  127. pulumi_vault/pkisecret/__init__.py +0 -2
  128. pulumi_vault/pkisecret/_inputs.py +0 -30
  129. pulumi_vault/pkisecret/backend_config_cluster.py +4 -0
  130. pulumi_vault/pkisecret/get_backend_issuer.py +0 -36
  131. pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
  132. pulumi_vault/pkisecret/get_backend_key.py +6 -2
  133. pulumi_vault/pkisecret/get_backend_keys.py +4 -0
  134. pulumi_vault/pkisecret/outputs.py +0 -54
  135. pulumi_vault/pkisecret/secret_backend_cert.py +8 -6
  136. pulumi_vault/pkisecret/secret_backend_config_ca.py +8 -4
  137. pulumi_vault/pkisecret/secret_backend_config_issuers.py +4 -0
  138. pulumi_vault/pkisecret/secret_backend_config_urls.py +4 -0
  139. pulumi_vault/pkisecret/secret_backend_crl_config.py +6 -2
  140. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +8 -4
  141. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +14 -10
  142. pulumi_vault/pkisecret/secret_backend_issuer.py +4 -0
  143. pulumi_vault/pkisecret/secret_backend_role.py +4 -2
  144. pulumi_vault/pkisecret/secret_backend_root_cert.py +8 -4
  145. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +10 -6
  146. pulumi_vault/pkisecret/secret_backend_sign.py +8 -6
  147. pulumi_vault/provider.py +8 -0
  148. pulumi_vault/pulumi-plugin.json +1 -2
  149. pulumi_vault/quota_lease_count.py +8 -53
  150. pulumi_vault/quota_rate_limit.py +4 -49
  151. pulumi_vault/rabbitmq/secret_backend.py +8 -4
  152. pulumi_vault/rabbitmq/secret_backend_role.py +4 -2
  153. pulumi_vault/raft_autopilot.py +4 -0
  154. pulumi_vault/raft_snapshot_agent_config.py +304 -109
  155. pulumi_vault/rgp_policy.py +6 -2
  156. pulumi_vault/saml/auth_backend.py +12 -8
  157. pulumi_vault/saml/auth_backend_role.py +178 -64
  158. pulumi_vault/secrets/sync_association.py +10 -12
  159. pulumi_vault/secrets/sync_aws_destination.py +8 -6
  160. pulumi_vault/secrets/sync_azure_destination.py +12 -10
  161. pulumi_vault/secrets/sync_config.py +6 -2
  162. pulumi_vault/secrets/sync_gcp_destination.py +6 -6
  163. pulumi_vault/secrets/sync_gh_destination.py +8 -6
  164. pulumi_vault/secrets/sync_github_apps.py +8 -8
  165. pulumi_vault/secrets/sync_vercel_destination.py +8 -6
  166. pulumi_vault/ssh/_inputs.py +32 -6
  167. pulumi_vault/ssh/outputs.py +32 -6
  168. pulumi_vault/ssh/secret_backend_ca.py +4 -94
  169. pulumi_vault/ssh/secret_backend_role.py +4 -4
  170. pulumi_vault/terraformcloud/secret_backend.py +56 -0
  171. pulumi_vault/terraformcloud/secret_creds.py +17 -2
  172. pulumi_vault/terraformcloud/secret_role.py +69 -2
  173. pulumi_vault/token.py +18 -14
  174. pulumi_vault/tokenauth/auth_backend_role.py +180 -64
  175. pulumi_vault/transform/alphabet.py +6 -4
  176. pulumi_vault/transform/get_decode.py +4 -4
  177. pulumi_vault/transform/get_encode.py +4 -4
  178. pulumi_vault/transform/role.py +6 -4
  179. pulumi_vault/transform/template.py +4 -4
  180. pulumi_vault/transit/get_decrypt.py +20 -4
  181. pulumi_vault/transit/get_encrypt.py +14 -0
  182. pulumi_vault/transit/secret_backend_key.py +6 -6
  183. pulumi_vault/transit/secret_cache_config.py +4 -0
  184. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/METADATA +1 -1
  185. pulumi_vault-6.2.0a1712470779.dist-info/RECORD +252 -0
  186. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/WHEEL +1 -1
  187. pulumi_vault/pkisecret/backend_config_est.py +0 -614
  188. pulumi_vault/pkisecret/get_backend_config_est.py +0 -233
  189. pulumi_vault/plugin.py +0 -590
  190. pulumi_vault/plugin_pinned_version.py +0 -293
  191. pulumi_vault-6.2.0.dist-info/RECORD +0 -256
  192. {pulumi_vault-6.2.0.dist-info → pulumi_vault-6.2.0a1712470779.dist-info}/top_level.txt +0 -0
@@ -53,8 +53,9 @@ class AuthBackendRoleArgs:
53
53
  Required for OIDC roles
54
54
  :param pulumi.Input[str] backend: The unique name of the auth backend to configure.
55
55
  Defaults to `jwt`.
56
- :param pulumi.Input[Sequence[pulumi.Input[str]]] bound_audiences: (Required for roles of type `jwt`, optional for roles of
57
- type `oidc`) List of `aud` claims to match against. Any match is sufficient.
56
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] bound_audiences: (For "jwt" roles, at least one of `bound_audiences`, `bound_subject`, `bound_claims`
57
+ or `token_bound_cidrs` is required. Optional for "oidc" roles.) List of `aud` claims to match against.
58
+ Any match is sufficient.
58
59
  :param pulumi.Input[Mapping[str, Any]] bound_claims: If set, a map of claims to values to match against.
59
60
  A claim's value must be a string, which may contain one value or multiple
60
61
  comma-separated values, e.g. `"red"` or `"red,green,blue"`.
@@ -70,7 +71,7 @@ class AuthBackendRoleArgs:
70
71
  Only applicable with "jwt" roles.
71
72
  :param pulumi.Input[bool] disable_bound_claims_parsing: Disable bound claim value parsing. Useful when values contain commas.
72
73
  :param pulumi.Input[int] expiration_leeway: The amount of leeway to add to expiration (`exp`) claims to account for
73
- clock skew, in seconds. Defaults to `150` seconds if set to `0` and can be disabled if set to `-1`.
74
+ clock skew, in seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
74
75
  Only applicable with "jwt" roles.
75
76
  :param pulumi.Input[str] groups_claim: The claim to use to uniquely identify
76
77
  the set of groups to which the user belongs; this will be used as the names
@@ -83,20 +84,37 @@ class AuthBackendRoleArgs:
83
84
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
84
85
  *Available only for Vault Enterprise*.
85
86
  :param pulumi.Input[int] not_before_leeway: The amount of leeway to add to not before (`nbf`) claims to account for
86
- clock skew, in seconds. Defaults to `150` seconds if set to `0` and can be disabled if set to `-1`.
87
+ clock skew, in seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
87
88
  Only applicable with "jwt" roles.
88
89
  :param pulumi.Input[Sequence[pulumi.Input[str]]] oidc_scopes: If set, a list of OIDC scopes to be used with an OIDC role.
89
90
  The standard scope "openid" is automatically included and need not be specified.
90
91
  :param pulumi.Input[str] role_type: Type of role, either "oidc" (default) or "jwt".
91
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
92
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
93
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
94
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
95
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
96
- :param pulumi.Input[int] token_period: Generated Token's Period
97
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
98
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
99
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
92
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
93
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
94
+ as well.
95
+ :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
96
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
97
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
98
+ `token_max_ttl` would otherwise allow a renewal.
99
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
100
+ Its current value will be referenced at renewal time.
101
+ :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
102
+ generated tokens; otherwise it will be added to the policies set in token_policies.
103
+ :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/jwt#token_num_uses)
104
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
105
+ :param pulumi.Input[int] token_period: If set, indicates that the
106
+ token generated using this role should never expire. The token should be renewed within the
107
+ duration specified by this value. At each renewal, the token's TTL will be set to the
108
+ value of this field. Specified in seconds.
109
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
110
+ on the auth method, this list may be supplemented by user/group/other values.
111
+ :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
112
+ Its current value will be referenced at renewal time.
113
+ :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
114
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
115
+ `service` tokens). For token store roles, there are two additional possibilities:
116
+ `default-service` and `default-batch` which specify the type to return unless the client
117
+ requests a different type at generation time.
100
118
  :param pulumi.Input[bool] user_claim_json_pointer: Specifies if the `user_claim` value uses
101
119
  [JSON pointer](https://www.vaultproject.io/docs/auth/jwt#claim-specifications-and-json-pointer)
102
120
  syntax for referencing claims. By default, the `user_claim` value will not use JSON pointer.
@@ -218,8 +236,9 @@ class AuthBackendRoleArgs:
218
236
  @pulumi.getter(name="boundAudiences")
219
237
  def bound_audiences(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
220
238
  """
221
- (Required for roles of type `jwt`, optional for roles of
222
- type `oidc`) List of `aud` claims to match against. Any match is sufficient.
239
+ (For "jwt" roles, at least one of `bound_audiences`, `bound_subject`, `bound_claims`
240
+ or `token_bound_cidrs` is required. Optional for "oidc" roles.) List of `aud` claims to match against.
241
+ Any match is sufficient.
223
242
  """
224
243
  return pulumi.get(self, "bound_audiences")
225
244
 
@@ -312,7 +331,7 @@ class AuthBackendRoleArgs:
312
331
  def expiration_leeway(self) -> Optional[pulumi.Input[int]]:
313
332
  """
314
333
  The amount of leeway to add to expiration (`exp`) claims to account for
315
- clock skew, in seconds. Defaults to `150` seconds if set to `0` and can be disabled if set to `-1`.
334
+ clock skew, in seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
316
335
  Only applicable with "jwt" roles.
317
336
  """
318
337
  return pulumi.get(self, "expiration_leeway")
@@ -369,7 +388,7 @@ class AuthBackendRoleArgs:
369
388
  def not_before_leeway(self) -> Optional[pulumi.Input[int]]:
370
389
  """
371
390
  The amount of leeway to add to not before (`nbf`) claims to account for
372
- clock skew, in seconds. Defaults to `150` seconds if set to `0` and can be disabled if set to `-1`.
391
+ clock skew, in seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
373
392
  Only applicable with "jwt" roles.
374
393
  """
375
394
  return pulumi.get(self, "not_before_leeway")
@@ -407,7 +426,9 @@ class AuthBackendRoleArgs:
407
426
  @pulumi.getter(name="tokenBoundCidrs")
408
427
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
409
428
  """
410
- Specifies the blocks of IP addresses which are allowed to use the generated token
429
+ List of CIDR blocks; if set, specifies blocks of IP
430
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
431
+ as well.
411
432
  """
412
433
  return pulumi.get(self, "token_bound_cidrs")
413
434
 
@@ -419,7 +440,10 @@ class AuthBackendRoleArgs:
419
440
  @pulumi.getter(name="tokenExplicitMaxTtl")
420
441
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
421
442
  """
422
- Generated Token's Explicit Maximum TTL in seconds
443
+ If set, will encode an
444
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
445
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
446
+ `token_max_ttl` would otherwise allow a renewal.
423
447
  """
424
448
  return pulumi.get(self, "token_explicit_max_ttl")
425
449
 
@@ -431,7 +455,8 @@ class AuthBackendRoleArgs:
431
455
  @pulumi.getter(name="tokenMaxTtl")
432
456
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
433
457
  """
434
- The maximum lifetime of the generated token
458
+ The maximum lifetime for generated tokens in number of seconds.
459
+ Its current value will be referenced at renewal time.
435
460
  """
436
461
  return pulumi.get(self, "token_max_ttl")
437
462
 
@@ -443,7 +468,8 @@ class AuthBackendRoleArgs:
443
468
  @pulumi.getter(name="tokenNoDefaultPolicy")
444
469
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
445
470
  """
446
- If true, the 'default' policy will not automatically be added to generated tokens
471
+ If set, the default policy will not be set on
472
+ generated tokens; otherwise it will be added to the policies set in token_policies.
447
473
  """
448
474
  return pulumi.get(self, "token_no_default_policy")
449
475
 
@@ -455,7 +481,8 @@ class AuthBackendRoleArgs:
455
481
  @pulumi.getter(name="tokenNumUses")
456
482
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
457
483
  """
458
- The maximum number of times a token may be used, a value of zero means unlimited
484
+ The [maximum number](https://www.vaultproject.io/api-docs/jwt#token_num_uses)
485
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
459
486
  """
460
487
  return pulumi.get(self, "token_num_uses")
461
488
 
@@ -467,7 +494,10 @@ class AuthBackendRoleArgs:
467
494
  @pulumi.getter(name="tokenPeriod")
468
495
  def token_period(self) -> Optional[pulumi.Input[int]]:
469
496
  """
470
- Generated Token's Period
497
+ If set, indicates that the
498
+ token generated using this role should never expire. The token should be renewed within the
499
+ duration specified by this value. At each renewal, the token's TTL will be set to the
500
+ value of this field. Specified in seconds.
471
501
  """
472
502
  return pulumi.get(self, "token_period")
473
503
 
@@ -479,7 +509,8 @@ class AuthBackendRoleArgs:
479
509
  @pulumi.getter(name="tokenPolicies")
480
510
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
481
511
  """
482
- Generated Token's Policies
512
+ List of policies to encode onto generated tokens. Depending
513
+ on the auth method, this list may be supplemented by user/group/other values.
483
514
  """
484
515
  return pulumi.get(self, "token_policies")
485
516
 
@@ -491,7 +522,8 @@ class AuthBackendRoleArgs:
491
522
  @pulumi.getter(name="tokenTtl")
492
523
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
493
524
  """
494
- The initial ttl of the token to generate in seconds
525
+ The incremental lifetime for generated tokens in number of seconds.
526
+ Its current value will be referenced at renewal time.
495
527
  """
496
528
  return pulumi.get(self, "token_ttl")
497
529
 
@@ -503,7 +535,11 @@ class AuthBackendRoleArgs:
503
535
  @pulumi.getter(name="tokenType")
504
536
  def token_type(self) -> Optional[pulumi.Input[str]]:
505
537
  """
506
- The type of token to generate, service or batch
538
+ The type of token that should be generated. Can be `service`,
539
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
540
+ `service` tokens). For token store roles, there are two additional possibilities:
541
+ `default-service` and `default-batch` which specify the type to return unless the client
542
+ requests a different type at generation time.
507
543
  """
508
544
  return pulumi.get(self, "token_type")
509
545
 
@@ -579,8 +615,9 @@ class _AuthBackendRoleState:
579
615
  Required for OIDC roles
580
616
  :param pulumi.Input[str] backend: The unique name of the auth backend to configure.
581
617
  Defaults to `jwt`.
582
- :param pulumi.Input[Sequence[pulumi.Input[str]]] bound_audiences: (Required for roles of type `jwt`, optional for roles of
583
- type `oidc`) List of `aud` claims to match against. Any match is sufficient.
618
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] bound_audiences: (For "jwt" roles, at least one of `bound_audiences`, `bound_subject`, `bound_claims`
619
+ or `token_bound_cidrs` is required. Optional for "oidc" roles.) List of `aud` claims to match against.
620
+ Any match is sufficient.
584
621
  :param pulumi.Input[Mapping[str, Any]] bound_claims: If set, a map of claims to values to match against.
585
622
  A claim's value must be a string, which may contain one value or multiple
586
623
  comma-separated values, e.g. `"red"` or `"red,green,blue"`.
@@ -596,7 +633,7 @@ class _AuthBackendRoleState:
596
633
  Only applicable with "jwt" roles.
597
634
  :param pulumi.Input[bool] disable_bound_claims_parsing: Disable bound claim value parsing. Useful when values contain commas.
598
635
  :param pulumi.Input[int] expiration_leeway: The amount of leeway to add to expiration (`exp`) claims to account for
599
- clock skew, in seconds. Defaults to `150` seconds if set to `0` and can be disabled if set to `-1`.
636
+ clock skew, in seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
600
637
  Only applicable with "jwt" roles.
601
638
  :param pulumi.Input[str] groups_claim: The claim to use to uniquely identify
602
639
  the set of groups to which the user belongs; this will be used as the names
@@ -609,21 +646,38 @@ class _AuthBackendRoleState:
609
646
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
610
647
  *Available only for Vault Enterprise*.
611
648
  :param pulumi.Input[int] not_before_leeway: The amount of leeway to add to not before (`nbf`) claims to account for
612
- clock skew, in seconds. Defaults to `150` seconds if set to `0` and can be disabled if set to `-1`.
649
+ clock skew, in seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
613
650
  Only applicable with "jwt" roles.
614
651
  :param pulumi.Input[Sequence[pulumi.Input[str]]] oidc_scopes: If set, a list of OIDC scopes to be used with an OIDC role.
615
652
  The standard scope "openid" is automatically included and need not be specified.
616
653
  :param pulumi.Input[str] role_name: The name of the role.
617
654
  :param pulumi.Input[str] role_type: Type of role, either "oidc" (default) or "jwt".
618
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
619
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
620
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
621
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
622
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
623
- :param pulumi.Input[int] token_period: Generated Token's Period
624
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
625
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
626
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
655
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
656
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
657
+ as well.
658
+ :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
659
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
660
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
661
+ `token_max_ttl` would otherwise allow a renewal.
662
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
663
+ Its current value will be referenced at renewal time.
664
+ :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
665
+ generated tokens; otherwise it will be added to the policies set in token_policies.
666
+ :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/jwt#token_num_uses)
667
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
668
+ :param pulumi.Input[int] token_period: If set, indicates that the
669
+ token generated using this role should never expire. The token should be renewed within the
670
+ duration specified by this value. At each renewal, the token's TTL will be set to the
671
+ value of this field. Specified in seconds.
672
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
673
+ on the auth method, this list may be supplemented by user/group/other values.
674
+ :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
675
+ Its current value will be referenced at renewal time.
676
+ :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
677
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
678
+ `service` tokens). For token store roles, there are two additional possibilities:
679
+ `default-service` and `default-batch` which specify the type to return unless the client
680
+ requests a different type at generation time.
627
681
  :param pulumi.Input[str] user_claim: The claim to use to uniquely identify
628
682
  the user; this will be used as the name for the Identity entity alias created
629
683
  due to a successful login.
@@ -724,8 +778,9 @@ class _AuthBackendRoleState:
724
778
  @pulumi.getter(name="boundAudiences")
725
779
  def bound_audiences(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
726
780
  """
727
- (Required for roles of type `jwt`, optional for roles of
728
- type `oidc`) List of `aud` claims to match against. Any match is sufficient.
781
+ (For "jwt" roles, at least one of `bound_audiences`, `bound_subject`, `bound_claims`
782
+ or `token_bound_cidrs` is required. Optional for "oidc" roles.) List of `aud` claims to match against.
783
+ Any match is sufficient.
729
784
  """
730
785
  return pulumi.get(self, "bound_audiences")
731
786
 
@@ -818,7 +873,7 @@ class _AuthBackendRoleState:
818
873
  def expiration_leeway(self) -> Optional[pulumi.Input[int]]:
819
874
  """
820
875
  The amount of leeway to add to expiration (`exp`) claims to account for
821
- clock skew, in seconds. Defaults to `150` seconds if set to `0` and can be disabled if set to `-1`.
876
+ clock skew, in seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
822
877
  Only applicable with "jwt" roles.
823
878
  """
824
879
  return pulumi.get(self, "expiration_leeway")
@@ -875,7 +930,7 @@ class _AuthBackendRoleState:
875
930
  def not_before_leeway(self) -> Optional[pulumi.Input[int]]:
876
931
  """
877
932
  The amount of leeway to add to not before (`nbf`) claims to account for
878
- clock skew, in seconds. Defaults to `150` seconds if set to `0` and can be disabled if set to `-1`.
933
+ clock skew, in seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
879
934
  Only applicable with "jwt" roles.
880
935
  """
881
936
  return pulumi.get(self, "not_before_leeway")
@@ -925,7 +980,9 @@ class _AuthBackendRoleState:
925
980
  @pulumi.getter(name="tokenBoundCidrs")
926
981
  def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
927
982
  """
928
- Specifies the blocks of IP addresses which are allowed to use the generated token
983
+ List of CIDR blocks; if set, specifies blocks of IP
984
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
985
+ as well.
929
986
  """
930
987
  return pulumi.get(self, "token_bound_cidrs")
931
988
 
@@ -937,7 +994,10 @@ class _AuthBackendRoleState:
937
994
  @pulumi.getter(name="tokenExplicitMaxTtl")
938
995
  def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
939
996
  """
940
- Generated Token's Explicit Maximum TTL in seconds
997
+ If set, will encode an
998
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
999
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1000
+ `token_max_ttl` would otherwise allow a renewal.
941
1001
  """
942
1002
  return pulumi.get(self, "token_explicit_max_ttl")
943
1003
 
@@ -949,7 +1009,8 @@ class _AuthBackendRoleState:
949
1009
  @pulumi.getter(name="tokenMaxTtl")
950
1010
  def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
951
1011
  """
952
- The maximum lifetime of the generated token
1012
+ The maximum lifetime for generated tokens in number of seconds.
1013
+ Its current value will be referenced at renewal time.
953
1014
  """
954
1015
  return pulumi.get(self, "token_max_ttl")
955
1016
 
@@ -961,7 +1022,8 @@ class _AuthBackendRoleState:
961
1022
  @pulumi.getter(name="tokenNoDefaultPolicy")
962
1023
  def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
963
1024
  """
964
- If true, the 'default' policy will not automatically be added to generated tokens
1025
+ If set, the default policy will not be set on
1026
+ generated tokens; otherwise it will be added to the policies set in token_policies.
965
1027
  """
966
1028
  return pulumi.get(self, "token_no_default_policy")
967
1029
 
@@ -973,7 +1035,8 @@ class _AuthBackendRoleState:
973
1035
  @pulumi.getter(name="tokenNumUses")
974
1036
  def token_num_uses(self) -> Optional[pulumi.Input[int]]:
975
1037
  """
976
- The maximum number of times a token may be used, a value of zero means unlimited
1038
+ The [maximum number](https://www.vaultproject.io/api-docs/jwt#token_num_uses)
1039
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
977
1040
  """
978
1041
  return pulumi.get(self, "token_num_uses")
979
1042
 
@@ -985,7 +1048,10 @@ class _AuthBackendRoleState:
985
1048
  @pulumi.getter(name="tokenPeriod")
986
1049
  def token_period(self) -> Optional[pulumi.Input[int]]:
987
1050
  """
988
- Generated Token's Period
1051
+ If set, indicates that the
1052
+ token generated using this role should never expire. The token should be renewed within the
1053
+ duration specified by this value. At each renewal, the token's TTL will be set to the
1054
+ value of this field. Specified in seconds.
989
1055
  """
990
1056
  return pulumi.get(self, "token_period")
991
1057
 
@@ -997,7 +1063,8 @@ class _AuthBackendRoleState:
997
1063
  @pulumi.getter(name="tokenPolicies")
998
1064
  def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
999
1065
  """
1000
- Generated Token's Policies
1066
+ List of policies to encode onto generated tokens. Depending
1067
+ on the auth method, this list may be supplemented by user/group/other values.
1001
1068
  """
1002
1069
  return pulumi.get(self, "token_policies")
1003
1070
 
@@ -1009,7 +1076,8 @@ class _AuthBackendRoleState:
1009
1076
  @pulumi.getter(name="tokenTtl")
1010
1077
  def token_ttl(self) -> Optional[pulumi.Input[int]]:
1011
1078
  """
1012
- The initial ttl of the token to generate in seconds
1079
+ The incremental lifetime for generated tokens in number of seconds.
1080
+ Its current value will be referenced at renewal time.
1013
1081
  """
1014
1082
  return pulumi.get(self, "token_ttl")
1015
1083
 
@@ -1021,7 +1089,11 @@ class _AuthBackendRoleState:
1021
1089
  @pulumi.getter(name="tokenType")
1022
1090
  def token_type(self) -> Optional[pulumi.Input[str]]:
1023
1091
  """
1024
- The type of token to generate, service or batch
1092
+ The type of token that should be generated. Can be `service`,
1093
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
1094
+ `service` tokens). For token store roles, there are two additional possibilities:
1095
+ `default-service` and `default-batch` which specify the type to return unless the client
1096
+ requests a different type at generation time.
1025
1097
  """
1026
1098
  return pulumi.get(self, "token_type")
1027
1099
 
@@ -1117,6 +1189,7 @@ class AuthBackendRole(pulumi.CustomResource):
1117
1189
 
1118
1190
  Role for JWT backend:
1119
1191
 
1192
+ <!--Start PulumiCodeChooser -->
1120
1193
  ```python
1121
1194
  import pulumi
1122
1195
  import pulumi_vault as vault
@@ -1137,9 +1210,11 @@ class AuthBackendRole(pulumi.CustomResource):
1137
1210
  user_claim="https://vault/user",
1138
1211
  role_type="jwt")
1139
1212
  ```
1213
+ <!--End PulumiCodeChooser -->
1140
1214
 
1141
1215
  Role for OIDC backend:
1142
1216
 
1217
+ <!--Start PulumiCodeChooser -->
1143
1218
  ```python
1144
1219
  import pulumi
1145
1220
  import pulumi_vault as vault
@@ -1159,6 +1234,7 @@ class AuthBackendRole(pulumi.CustomResource):
1159
1234
  role_type="oidc",
1160
1235
  allowed_redirect_uris=["http://localhost:8200/ui/vault/auth/oidc/oidc/callback"])
1161
1236
  ```
1237
+ <!--End PulumiCodeChooser -->
1162
1238
 
1163
1239
  ## Import
1164
1240
 
@@ -1174,8 +1250,9 @@ class AuthBackendRole(pulumi.CustomResource):
1174
1250
  Required for OIDC roles
1175
1251
  :param pulumi.Input[str] backend: The unique name of the auth backend to configure.
1176
1252
  Defaults to `jwt`.
1177
- :param pulumi.Input[Sequence[pulumi.Input[str]]] bound_audiences: (Required for roles of type `jwt`, optional for roles of
1178
- type `oidc`) List of `aud` claims to match against. Any match is sufficient.
1253
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] bound_audiences: (For "jwt" roles, at least one of `bound_audiences`, `bound_subject`, `bound_claims`
1254
+ or `token_bound_cidrs` is required. Optional for "oidc" roles.) List of `aud` claims to match against.
1255
+ Any match is sufficient.
1179
1256
  :param pulumi.Input[Mapping[str, Any]] bound_claims: If set, a map of claims to values to match against.
1180
1257
  A claim's value must be a string, which may contain one value or multiple
1181
1258
  comma-separated values, e.g. `"red"` or `"red,green,blue"`.
@@ -1191,7 +1268,7 @@ class AuthBackendRole(pulumi.CustomResource):
1191
1268
  Only applicable with "jwt" roles.
1192
1269
  :param pulumi.Input[bool] disable_bound_claims_parsing: Disable bound claim value parsing. Useful when values contain commas.
1193
1270
  :param pulumi.Input[int] expiration_leeway: The amount of leeway to add to expiration (`exp`) claims to account for
1194
- clock skew, in seconds. Defaults to `150` seconds if set to `0` and can be disabled if set to `-1`.
1271
+ clock skew, in seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
1195
1272
  Only applicable with "jwt" roles.
1196
1273
  :param pulumi.Input[str] groups_claim: The claim to use to uniquely identify
1197
1274
  the set of groups to which the user belongs; this will be used as the names
@@ -1204,21 +1281,38 @@ class AuthBackendRole(pulumi.CustomResource):
1204
1281
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1205
1282
  *Available only for Vault Enterprise*.
1206
1283
  :param pulumi.Input[int] not_before_leeway: The amount of leeway to add to not before (`nbf`) claims to account for
1207
- clock skew, in seconds. Defaults to `150` seconds if set to `0` and can be disabled if set to `-1`.
1284
+ clock skew, in seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
1208
1285
  Only applicable with "jwt" roles.
1209
1286
  :param pulumi.Input[Sequence[pulumi.Input[str]]] oidc_scopes: If set, a list of OIDC scopes to be used with an OIDC role.
1210
1287
  The standard scope "openid" is automatically included and need not be specified.
1211
1288
  :param pulumi.Input[str] role_name: The name of the role.
1212
1289
  :param pulumi.Input[str] role_type: Type of role, either "oidc" (default) or "jwt".
1213
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
1214
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
1215
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
1216
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
1217
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
1218
- :param pulumi.Input[int] token_period: Generated Token's Period
1219
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
1220
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
1221
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
1290
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
1291
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
1292
+ as well.
1293
+ :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
1294
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1295
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1296
+ `token_max_ttl` would otherwise allow a renewal.
1297
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
1298
+ Its current value will be referenced at renewal time.
1299
+ :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
1300
+ generated tokens; otherwise it will be added to the policies set in token_policies.
1301
+ :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/jwt#token_num_uses)
1302
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
1303
+ :param pulumi.Input[int] token_period: If set, indicates that the
1304
+ token generated using this role should never expire. The token should be renewed within the
1305
+ duration specified by this value. At each renewal, the token's TTL will be set to the
1306
+ value of this field. Specified in seconds.
1307
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
1308
+ on the auth method, this list may be supplemented by user/group/other values.
1309
+ :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
1310
+ Its current value will be referenced at renewal time.
1311
+ :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
1312
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
1313
+ `service` tokens). For token store roles, there are two additional possibilities:
1314
+ `default-service` and `default-batch` which specify the type to return unless the client
1315
+ requests a different type at generation time.
1222
1316
  :param pulumi.Input[str] user_claim: The claim to use to uniquely identify
1223
1317
  the user; this will be used as the name for the Identity entity alias created
1224
1318
  due to a successful login.
@@ -1245,6 +1339,7 @@ class AuthBackendRole(pulumi.CustomResource):
1245
1339
 
1246
1340
  Role for JWT backend:
1247
1341
 
1342
+ <!--Start PulumiCodeChooser -->
1248
1343
  ```python
1249
1344
  import pulumi
1250
1345
  import pulumi_vault as vault
@@ -1265,9 +1360,11 @@ class AuthBackendRole(pulumi.CustomResource):
1265
1360
  user_claim="https://vault/user",
1266
1361
  role_type="jwt")
1267
1362
  ```
1363
+ <!--End PulumiCodeChooser -->
1268
1364
 
1269
1365
  Role for OIDC backend:
1270
1366
 
1367
+ <!--Start PulumiCodeChooser -->
1271
1368
  ```python
1272
1369
  import pulumi
1273
1370
  import pulumi_vault as vault
@@ -1287,6 +1384,7 @@ class AuthBackendRole(pulumi.CustomResource):
1287
1384
  role_type="oidc",
1288
1385
  allowed_redirect_uris=["http://localhost:8200/ui/vault/auth/oidc/oidc/callback"])
1289
1386
  ```
1387
+ <!--End PulumiCodeChooser -->
1290
1388
 
1291
1389
  ## Import
1292
1390
 
@@ -1432,8 +1530,9 @@ class AuthBackendRole(pulumi.CustomResource):
1432
1530
  Required for OIDC roles
1433
1531
  :param pulumi.Input[str] backend: The unique name of the auth backend to configure.
1434
1532
  Defaults to `jwt`.
1435
- :param pulumi.Input[Sequence[pulumi.Input[str]]] bound_audiences: (Required for roles of type `jwt`, optional for roles of
1436
- type `oidc`) List of `aud` claims to match against. Any match is sufficient.
1533
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] bound_audiences: (For "jwt" roles, at least one of `bound_audiences`, `bound_subject`, `bound_claims`
1534
+ or `token_bound_cidrs` is required. Optional for "oidc" roles.) List of `aud` claims to match against.
1535
+ Any match is sufficient.
1437
1536
  :param pulumi.Input[Mapping[str, Any]] bound_claims: If set, a map of claims to values to match against.
1438
1537
  A claim's value must be a string, which may contain one value or multiple
1439
1538
  comma-separated values, e.g. `"red"` or `"red,green,blue"`.
@@ -1449,7 +1548,7 @@ class AuthBackendRole(pulumi.CustomResource):
1449
1548
  Only applicable with "jwt" roles.
1450
1549
  :param pulumi.Input[bool] disable_bound_claims_parsing: Disable bound claim value parsing. Useful when values contain commas.
1451
1550
  :param pulumi.Input[int] expiration_leeway: The amount of leeway to add to expiration (`exp`) claims to account for
1452
- clock skew, in seconds. Defaults to `150` seconds if set to `0` and can be disabled if set to `-1`.
1551
+ clock skew, in seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
1453
1552
  Only applicable with "jwt" roles.
1454
1553
  :param pulumi.Input[str] groups_claim: The claim to use to uniquely identify
1455
1554
  the set of groups to which the user belongs; this will be used as the names
@@ -1462,21 +1561,38 @@ class AuthBackendRole(pulumi.CustomResource):
1462
1561
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1463
1562
  *Available only for Vault Enterprise*.
1464
1563
  :param pulumi.Input[int] not_before_leeway: The amount of leeway to add to not before (`nbf`) claims to account for
1465
- clock skew, in seconds. Defaults to `150` seconds if set to `0` and can be disabled if set to `-1`.
1564
+ clock skew, in seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
1466
1565
  Only applicable with "jwt" roles.
1467
1566
  :param pulumi.Input[Sequence[pulumi.Input[str]]] oidc_scopes: If set, a list of OIDC scopes to be used with an OIDC role.
1468
1567
  The standard scope "openid" is automatically included and need not be specified.
1469
1568
  :param pulumi.Input[str] role_name: The name of the role.
1470
1569
  :param pulumi.Input[str] role_type: Type of role, either "oidc" (default) or "jwt".
1471
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
1472
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
1473
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
1474
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
1475
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
1476
- :param pulumi.Input[int] token_period: Generated Token's Period
1477
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
1478
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
1479
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
1570
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
1571
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
1572
+ as well.
1573
+ :param pulumi.Input[int] token_explicit_max_ttl: If set, will encode an
1574
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1575
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1576
+ `token_max_ttl` would otherwise allow a renewal.
1577
+ :param pulumi.Input[int] token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
1578
+ Its current value will be referenced at renewal time.
1579
+ :param pulumi.Input[bool] token_no_default_policy: If set, the default policy will not be set on
1580
+ generated tokens; otherwise it will be added to the policies set in token_policies.
1581
+ :param pulumi.Input[int] token_num_uses: The [maximum number](https://www.vaultproject.io/api-docs/jwt#token_num_uses)
1582
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
1583
+ :param pulumi.Input[int] token_period: If set, indicates that the
1584
+ token generated using this role should never expire. The token should be renewed within the
1585
+ duration specified by this value. At each renewal, the token's TTL will be set to the
1586
+ value of this field. Specified in seconds.
1587
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: List of policies to encode onto generated tokens. Depending
1588
+ on the auth method, this list may be supplemented by user/group/other values.
1589
+ :param pulumi.Input[int] token_ttl: The incremental lifetime for generated tokens in number of seconds.
1590
+ Its current value will be referenced at renewal time.
1591
+ :param pulumi.Input[str] token_type: The type of token that should be generated. Can be `service`,
1592
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
1593
+ `service` tokens). For token store roles, there are two additional possibilities:
1594
+ `default-service` and `default-batch` which specify the type to return unless the client
1595
+ requests a different type at generation time.
1480
1596
  :param pulumi.Input[str] user_claim: The claim to use to uniquely identify
1481
1597
  the user; this will be used as the name for the Identity entity alias created
1482
1598
  due to a successful login.
@@ -1545,8 +1661,9 @@ class AuthBackendRole(pulumi.CustomResource):
1545
1661
  @pulumi.getter(name="boundAudiences")
1546
1662
  def bound_audiences(self) -> pulumi.Output[Optional[Sequence[str]]]:
1547
1663
  """
1548
- (Required for roles of type `jwt`, optional for roles of
1549
- type `oidc`) List of `aud` claims to match against. Any match is sufficient.
1664
+ (For "jwt" roles, at least one of `bound_audiences`, `bound_subject`, `bound_claims`
1665
+ or `token_bound_cidrs` is required. Optional for "oidc" roles.) List of `aud` claims to match against.
1666
+ Any match is sufficient.
1550
1667
  """
1551
1668
  return pulumi.get(self, "bound_audiences")
1552
1669
 
@@ -1611,7 +1728,7 @@ class AuthBackendRole(pulumi.CustomResource):
1611
1728
  def expiration_leeway(self) -> pulumi.Output[Optional[int]]:
1612
1729
  """
1613
1730
  The amount of leeway to add to expiration (`exp`) claims to account for
1614
- clock skew, in seconds. Defaults to `150` seconds if set to `0` and can be disabled if set to `-1`.
1731
+ clock skew, in seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
1615
1732
  Only applicable with "jwt" roles.
1616
1733
  """
1617
1734
  return pulumi.get(self, "expiration_leeway")
@@ -1652,7 +1769,7 @@ class AuthBackendRole(pulumi.CustomResource):
1652
1769
  def not_before_leeway(self) -> pulumi.Output[Optional[int]]:
1653
1770
  """
1654
1771
  The amount of leeway to add to not before (`nbf`) claims to account for
1655
- clock skew, in seconds. Defaults to `150` seconds if set to `0` and can be disabled if set to `-1`.
1772
+ clock skew, in seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
1656
1773
  Only applicable with "jwt" roles.
1657
1774
  """
1658
1775
  return pulumi.get(self, "not_before_leeway")
@@ -1686,7 +1803,9 @@ class AuthBackendRole(pulumi.CustomResource):
1686
1803
  @pulumi.getter(name="tokenBoundCidrs")
1687
1804
  def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
1688
1805
  """
1689
- Specifies the blocks of IP addresses which are allowed to use the generated token
1806
+ List of CIDR blocks; if set, specifies blocks of IP
1807
+ addresses which can authenticate successfully, and ties the resulting token to these blocks
1808
+ as well.
1690
1809
  """
1691
1810
  return pulumi.get(self, "token_bound_cidrs")
1692
1811
 
@@ -1694,7 +1813,10 @@ class AuthBackendRole(pulumi.CustomResource):
1694
1813
  @pulumi.getter(name="tokenExplicitMaxTtl")
1695
1814
  def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
1696
1815
  """
1697
- Generated Token's Explicit Maximum TTL in seconds
1816
+ If set, will encode an
1817
+ [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
1818
+ onto the token in number of seconds. This is a hard cap even if `token_ttl` and
1819
+ `token_max_ttl` would otherwise allow a renewal.
1698
1820
  """
1699
1821
  return pulumi.get(self, "token_explicit_max_ttl")
1700
1822
 
@@ -1702,7 +1824,8 @@ class AuthBackendRole(pulumi.CustomResource):
1702
1824
  @pulumi.getter(name="tokenMaxTtl")
1703
1825
  def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
1704
1826
  """
1705
- The maximum lifetime of the generated token
1827
+ The maximum lifetime for generated tokens in number of seconds.
1828
+ Its current value will be referenced at renewal time.
1706
1829
  """
1707
1830
  return pulumi.get(self, "token_max_ttl")
1708
1831
 
@@ -1710,7 +1833,8 @@ class AuthBackendRole(pulumi.CustomResource):
1710
1833
  @pulumi.getter(name="tokenNoDefaultPolicy")
1711
1834
  def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
1712
1835
  """
1713
- If true, the 'default' policy will not automatically be added to generated tokens
1836
+ If set, the default policy will not be set on
1837
+ generated tokens; otherwise it will be added to the policies set in token_policies.
1714
1838
  """
1715
1839
  return pulumi.get(self, "token_no_default_policy")
1716
1840
 
@@ -1718,7 +1842,8 @@ class AuthBackendRole(pulumi.CustomResource):
1718
1842
  @pulumi.getter(name="tokenNumUses")
1719
1843
  def token_num_uses(self) -> pulumi.Output[Optional[int]]:
1720
1844
  """
1721
- The maximum number of times a token may be used, a value of zero means unlimited
1845
+ The [maximum number](https://www.vaultproject.io/api-docs/jwt#token_num_uses)
1846
+ of times a generated token may be used (within its lifetime); 0 means unlimited.
1722
1847
  """
1723
1848
  return pulumi.get(self, "token_num_uses")
1724
1849
 
@@ -1726,7 +1851,10 @@ class AuthBackendRole(pulumi.CustomResource):
1726
1851
  @pulumi.getter(name="tokenPeriod")
1727
1852
  def token_period(self) -> pulumi.Output[Optional[int]]:
1728
1853
  """
1729
- Generated Token's Period
1854
+ If set, indicates that the
1855
+ token generated using this role should never expire. The token should be renewed within the
1856
+ duration specified by this value. At each renewal, the token's TTL will be set to the
1857
+ value of this field. Specified in seconds.
1730
1858
  """
1731
1859
  return pulumi.get(self, "token_period")
1732
1860
 
@@ -1734,7 +1862,8 @@ class AuthBackendRole(pulumi.CustomResource):
1734
1862
  @pulumi.getter(name="tokenPolicies")
1735
1863
  def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
1736
1864
  """
1737
- Generated Token's Policies
1865
+ List of policies to encode onto generated tokens. Depending
1866
+ on the auth method, this list may be supplemented by user/group/other values.
1738
1867
  """
1739
1868
  return pulumi.get(self, "token_policies")
1740
1869
 
@@ -1742,7 +1871,8 @@ class AuthBackendRole(pulumi.CustomResource):
1742
1871
  @pulumi.getter(name="tokenTtl")
1743
1872
  def token_ttl(self) -> pulumi.Output[Optional[int]]:
1744
1873
  """
1745
- The initial ttl of the token to generate in seconds
1874
+ The incremental lifetime for generated tokens in number of seconds.
1875
+ Its current value will be referenced at renewal time.
1746
1876
  """
1747
1877
  return pulumi.get(self, "token_ttl")
1748
1878
 
@@ -1750,7 +1880,11 @@ class AuthBackendRole(pulumi.CustomResource):
1750
1880
  @pulumi.getter(name="tokenType")
1751
1881
  def token_type(self) -> pulumi.Output[Optional[str]]:
1752
1882
  """
1753
- The type of token to generate, service or batch
1883
+ The type of token that should be generated. Can be `service`,
1884
+ `batch`, or `default` to use the mount's tuned default (which unless changed will be
1885
+ `service` tokens). For token store roles, there are two additional possibilities:
1886
+ `default-service` and `default-batch` which specify the type to return unless the client
1887
+ requests a different type at generation time.
1754
1888
  """
1755
1889
  return pulumi.get(self, "token_type")
1756
1890