pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -0
- pulumi_vault/_inputs.py +554 -553
- pulumi_vault/ad/__init__.py +1 -0
- pulumi_vault/ad/get_access_credentials.py +20 -19
- pulumi_vault/ad/secret_backend.py +477 -476
- pulumi_vault/ad/secret_library.py +99 -98
- pulumi_vault/ad/secret_role.py +85 -84
- pulumi_vault/alicloud/__init__.py +1 -0
- pulumi_vault/alicloud/auth_backend_role.py +183 -182
- pulumi_vault/approle/__init__.py +1 -0
- pulumi_vault/approle/auth_backend_login.py +106 -105
- pulumi_vault/approle/auth_backend_role.py +239 -238
- pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
- pulumi_vault/audit.py +85 -84
- pulumi_vault/audit_request_header.py +43 -42
- pulumi_vault/auth_backend.py +106 -105
- pulumi_vault/aws/__init__.py +1 -0
- pulumi_vault/aws/auth_backend_cert.py +71 -70
- pulumi_vault/aws/auth_backend_client.py +253 -252
- pulumi_vault/aws/auth_backend_config_identity.py +85 -84
- pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
- pulumi_vault/aws/auth_backend_login.py +209 -208
- pulumi_vault/aws/auth_backend_role.py +400 -399
- pulumi_vault/aws/auth_backend_role_tag.py +127 -126
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
- pulumi_vault/aws/auth_backend_sts_role.py +71 -70
- pulumi_vault/aws/get_access_credentials.py +44 -43
- pulumi_vault/aws/get_static_access_credentials.py +13 -12
- pulumi_vault/aws/secret_backend.py +337 -336
- pulumi_vault/aws/secret_backend_role.py +211 -210
- pulumi_vault/aws/secret_backend_static_role.py +113 -112
- pulumi_vault/azure/__init__.py +1 -0
- pulumi_vault/azure/_inputs.py +21 -20
- pulumi_vault/azure/auth_backend_config.py +183 -182
- pulumi_vault/azure/auth_backend_role.py +253 -252
- pulumi_vault/azure/backend.py +239 -238
- pulumi_vault/azure/backend_role.py +141 -140
- pulumi_vault/azure/get_access_credentials.py +58 -57
- pulumi_vault/azure/outputs.py +11 -10
- pulumi_vault/cert_auth_backend_role.py +365 -364
- pulumi_vault/config/__init__.py +1 -0
- pulumi_vault/config/__init__.pyi +1 -0
- pulumi_vault/config/_inputs.py +11 -10
- pulumi_vault/config/outputs.py +287 -286
- pulumi_vault/config/ui_custom_message.py +113 -112
- pulumi_vault/config/vars.py +1 -0
- pulumi_vault/consul/__init__.py +1 -0
- pulumi_vault/consul/secret_backend.py +197 -196
- pulumi_vault/consul/secret_backend_role.py +183 -182
- pulumi_vault/database/__init__.py +1 -0
- pulumi_vault/database/_inputs.py +2525 -2524
- pulumi_vault/database/outputs.py +1529 -1528
- pulumi_vault/database/secret_backend_connection.py +169 -168
- pulumi_vault/database/secret_backend_role.py +169 -168
- pulumi_vault/database/secret_backend_static_role.py +179 -178
- pulumi_vault/database/secrets_mount.py +267 -266
- pulumi_vault/egp_policy.py +71 -70
- pulumi_vault/gcp/__init__.py +1 -0
- pulumi_vault/gcp/_inputs.py +82 -81
- pulumi_vault/gcp/auth_backend.py +260 -259
- pulumi_vault/gcp/auth_backend_role.py +281 -280
- pulumi_vault/gcp/get_auth_backend_role.py +70 -69
- pulumi_vault/gcp/outputs.py +50 -49
- pulumi_vault/gcp/secret_backend.py +232 -231
- pulumi_vault/gcp/secret_impersonated_account.py +92 -91
- pulumi_vault/gcp/secret_roleset.py +92 -91
- pulumi_vault/gcp/secret_static_account.py +92 -91
- pulumi_vault/generic/__init__.py +1 -0
- pulumi_vault/generic/endpoint.py +113 -112
- pulumi_vault/generic/get_secret.py +28 -27
- pulumi_vault/generic/secret.py +78 -77
- pulumi_vault/get_auth_backend.py +19 -18
- pulumi_vault/get_auth_backends.py +14 -13
- pulumi_vault/get_namespace.py +15 -14
- pulumi_vault/get_namespaces.py +8 -7
- pulumi_vault/get_nomad_access_token.py +19 -18
- pulumi_vault/get_policy_document.py +6 -5
- pulumi_vault/get_raft_autopilot_state.py +18 -17
- pulumi_vault/github/__init__.py +1 -0
- pulumi_vault/github/_inputs.py +42 -41
- pulumi_vault/github/auth_backend.py +232 -231
- pulumi_vault/github/outputs.py +26 -25
- pulumi_vault/github/team.py +57 -56
- pulumi_vault/github/user.py +57 -56
- pulumi_vault/identity/__init__.py +1 -0
- pulumi_vault/identity/entity.py +85 -84
- pulumi_vault/identity/entity_alias.py +71 -70
- pulumi_vault/identity/entity_policies.py +64 -63
- pulumi_vault/identity/get_entity.py +43 -42
- pulumi_vault/identity/get_group.py +50 -49
- pulumi_vault/identity/get_oidc_client_creds.py +14 -13
- pulumi_vault/identity/get_oidc_openid_config.py +24 -23
- pulumi_vault/identity/get_oidc_public_keys.py +13 -12
- pulumi_vault/identity/group.py +141 -140
- pulumi_vault/identity/group_alias.py +57 -56
- pulumi_vault/identity/group_member_entity_ids.py +57 -56
- pulumi_vault/identity/group_member_group_ids.py +57 -56
- pulumi_vault/identity/group_policies.py +64 -63
- pulumi_vault/identity/mfa_duo.py +148 -147
- pulumi_vault/identity/mfa_login_enforcement.py +120 -119
- pulumi_vault/identity/mfa_okta.py +134 -133
- pulumi_vault/identity/mfa_pingid.py +127 -126
- pulumi_vault/identity/mfa_totp.py +176 -175
- pulumi_vault/identity/oidc.py +29 -28
- pulumi_vault/identity/oidc_assignment.py +57 -56
- pulumi_vault/identity/oidc_client.py +127 -126
- pulumi_vault/identity/oidc_key.py +85 -84
- pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
- pulumi_vault/identity/oidc_provider.py +92 -91
- pulumi_vault/identity/oidc_role.py +85 -84
- pulumi_vault/identity/oidc_scope.py +57 -56
- pulumi_vault/identity/outputs.py +32 -31
- pulumi_vault/jwt/__init__.py +1 -0
- pulumi_vault/jwt/_inputs.py +42 -41
- pulumi_vault/jwt/auth_backend.py +288 -287
- pulumi_vault/jwt/auth_backend_role.py +407 -406
- pulumi_vault/jwt/outputs.py +26 -25
- pulumi_vault/kmip/__init__.py +1 -0
- pulumi_vault/kmip/secret_backend.py +183 -182
- pulumi_vault/kmip/secret_role.py +295 -294
- pulumi_vault/kmip/secret_scope.py +57 -56
- pulumi_vault/kubernetes/__init__.py +1 -0
- pulumi_vault/kubernetes/auth_backend_config.py +141 -140
- pulumi_vault/kubernetes/auth_backend_role.py +225 -224
- pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
- pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
- pulumi_vault/kubernetes/get_service_account_token.py +38 -37
- pulumi_vault/kubernetes/secret_backend.py +316 -315
- pulumi_vault/kubernetes/secret_backend_role.py +197 -196
- pulumi_vault/kv/__init__.py +1 -0
- pulumi_vault/kv/_inputs.py +21 -20
- pulumi_vault/kv/get_secret.py +17 -16
- pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
- pulumi_vault/kv/get_secret_v2.py +29 -28
- pulumi_vault/kv/get_secrets_list.py +13 -12
- pulumi_vault/kv/get_secrets_list_v2.py +19 -18
- pulumi_vault/kv/outputs.py +13 -12
- pulumi_vault/kv/secret.py +50 -49
- pulumi_vault/kv/secret_backend_v2.py +71 -70
- pulumi_vault/kv/secret_v2.py +134 -133
- pulumi_vault/ldap/__init__.py +1 -0
- pulumi_vault/ldap/auth_backend.py +588 -587
- pulumi_vault/ldap/auth_backend_group.py +57 -56
- pulumi_vault/ldap/auth_backend_user.py +71 -70
- pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
- pulumi_vault/ldap/get_static_credentials.py +18 -17
- pulumi_vault/ldap/secret_backend.py +554 -553
- pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
- pulumi_vault/ldap/secret_backend_library_set.py +99 -98
- pulumi_vault/ldap/secret_backend_static_role.py +99 -98
- pulumi_vault/managed/__init__.py +1 -0
- pulumi_vault/managed/_inputs.py +229 -228
- pulumi_vault/managed/keys.py +15 -14
- pulumi_vault/managed/outputs.py +139 -138
- pulumi_vault/mfa_duo.py +113 -112
- pulumi_vault/mfa_okta.py +113 -112
- pulumi_vault/mfa_pingid.py +120 -119
- pulumi_vault/mfa_totp.py +127 -126
- pulumi_vault/mongodbatlas/__init__.py +1 -0
- pulumi_vault/mongodbatlas/secret_backend.py +64 -63
- pulumi_vault/mongodbatlas/secret_role.py +155 -154
- pulumi_vault/mount.py +274 -273
- pulumi_vault/namespace.py +64 -63
- pulumi_vault/nomad_secret_backend.py +211 -210
- pulumi_vault/nomad_secret_role.py +85 -84
- pulumi_vault/okta/__init__.py +1 -0
- pulumi_vault/okta/_inputs.py +26 -25
- pulumi_vault/okta/auth_backend.py +274 -273
- pulumi_vault/okta/auth_backend_group.py +57 -56
- pulumi_vault/okta/auth_backend_user.py +71 -70
- pulumi_vault/okta/outputs.py +16 -15
- pulumi_vault/outputs.py +56 -55
- pulumi_vault/password_policy.py +43 -42
- pulumi_vault/pkisecret/__init__.py +1 -0
- pulumi_vault/pkisecret/_inputs.py +31 -30
- pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
- pulumi_vault/pkisecret/backend_config_acme.py +141 -140
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
- pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
- pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
- pulumi_vault/pkisecret/backend_config_est.py +120 -119
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
- pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
- pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
- pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
- pulumi_vault/pkisecret/get_backend_key.py +20 -19
- pulumi_vault/pkisecret/get_backend_keys.py +15 -14
- pulumi_vault/pkisecret/outputs.py +28 -27
- pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
- pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
- pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
- pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
- pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
- pulumi_vault/pkisecret/secret_backend_key.py +120 -119
- pulumi_vault/pkisecret/secret_backend_role.py +715 -714
- pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
- pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
- pulumi_vault/plugin.py +127 -126
- pulumi_vault/plugin_pinned_version.py +43 -42
- pulumi_vault/policy.py +43 -42
- pulumi_vault/provider.py +120 -119
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +85 -84
- pulumi_vault/quota_rate_limit.py +113 -112
- pulumi_vault/rabbitmq/__init__.py +1 -0
- pulumi_vault/rabbitmq/_inputs.py +41 -40
- pulumi_vault/rabbitmq/outputs.py +25 -24
- pulumi_vault/rabbitmq/secret_backend.py +169 -168
- pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
- pulumi_vault/raft_autopilot.py +113 -112
- pulumi_vault/raft_snapshot_agent_config.py +393 -392
- pulumi_vault/rgp_policy.py +57 -56
- pulumi_vault/saml/__init__.py +1 -0
- pulumi_vault/saml/auth_backend.py +155 -154
- pulumi_vault/saml/auth_backend_role.py +239 -238
- pulumi_vault/secrets/__init__.py +1 -0
- pulumi_vault/secrets/_inputs.py +16 -15
- pulumi_vault/secrets/outputs.py +10 -9
- pulumi_vault/secrets/sync_association.py +71 -70
- pulumi_vault/secrets/sync_aws_destination.py +148 -147
- pulumi_vault/secrets/sync_azure_destination.py +148 -147
- pulumi_vault/secrets/sync_config.py +43 -42
- pulumi_vault/secrets/sync_gcp_destination.py +106 -105
- pulumi_vault/secrets/sync_gh_destination.py +134 -133
- pulumi_vault/secrets/sync_github_apps.py +64 -63
- pulumi_vault/secrets/sync_vercel_destination.py +120 -119
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/_inputs.py +11 -10
- pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
- pulumi_vault/ssh/outputs.py +7 -6
- pulumi_vault/ssh/secret_backend_ca.py +99 -98
- pulumi_vault/ssh/secret_backend_role.py +365 -364
- pulumi_vault/terraformcloud/__init__.py +1 -0
- pulumi_vault/terraformcloud/secret_backend.py +111 -110
- pulumi_vault/terraformcloud/secret_creds.py +74 -73
- pulumi_vault/terraformcloud/secret_role.py +93 -92
- pulumi_vault/token.py +246 -245
- pulumi_vault/tokenauth/__init__.py +1 -0
- pulumi_vault/tokenauth/auth_backend_role.py +267 -266
- pulumi_vault/transform/__init__.py +1 -0
- pulumi_vault/transform/alphabet.py +57 -56
- pulumi_vault/transform/get_decode.py +47 -46
- pulumi_vault/transform/get_encode.py +47 -46
- pulumi_vault/transform/role.py +57 -56
- pulumi_vault/transform/template.py +113 -112
- pulumi_vault/transform/transformation.py +141 -140
- pulumi_vault/transit/__init__.py +1 -0
- pulumi_vault/transit/get_decrypt.py +18 -17
- pulumi_vault/transit/get_encrypt.py +21 -20
- pulumi_vault/transit/get_sign.py +54 -53
- pulumi_vault/transit/get_verify.py +60 -59
- pulumi_vault/transit/secret_backend_key.py +274 -273
- pulumi_vault/transit/secret_cache_config.py +43 -42
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
- pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
- pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
- {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
+
import builtins
|
5
6
|
import copy
|
6
7
|
import warnings
|
7
8
|
import sys
|
@@ -19,29 +20,29 @@ __all__ = ['QuotaLeaseCountArgs', 'QuotaLeaseCount']
|
|
19
20
|
@pulumi.input_type
|
20
21
|
class QuotaLeaseCountArgs:
|
21
22
|
def __init__(__self__, *,
|
22
|
-
max_leases: pulumi.Input[int],
|
23
|
-
inheritable: Optional[pulumi.Input[bool]] = None,
|
24
|
-
name: Optional[pulumi.Input[str]] = None,
|
25
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
26
|
-
path: Optional[pulumi.Input[str]] = None,
|
27
|
-
role: Optional[pulumi.Input[str]] = None):
|
23
|
+
max_leases: pulumi.Input[builtins.int],
|
24
|
+
inheritable: Optional[pulumi.Input[builtins.bool]] = None,
|
25
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
26
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
27
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
28
|
+
role: Optional[pulumi.Input[builtins.str]] = None):
|
28
29
|
"""
|
29
30
|
The set of arguments for constructing a QuotaLeaseCount resource.
|
30
|
-
:param pulumi.Input[int] max_leases: The maximum number of leases to be allowed by the quota
|
31
|
+
:param pulumi.Input[builtins.int] max_leases: The maximum number of leases to be allowed by the quota
|
31
32
|
rule. The `max_leases` must be positive.
|
32
|
-
:param pulumi.Input[bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
|
33
|
-
:param pulumi.Input[str] name: Name of the rate limit quota
|
34
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
33
|
+
:param pulumi.Input[builtins.bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
|
34
|
+
:param pulumi.Input[builtins.str] name: Name of the rate limit quota
|
35
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
35
36
|
The value should not contain leading or trailing forward slashes.
|
36
37
|
The `namespace` is always relative to the provider's configured namespace.
|
37
38
|
*Available only for Vault Enterprise*.
|
38
|
-
:param pulumi.Input[str] path: Path of the mount or namespace to apply the quota. A blank path configures a
|
39
|
+
:param pulumi.Input[builtins.str] path: Path of the mount or namespace to apply the quota. A blank path configures a
|
39
40
|
global rate limit quota. For example `namespace1/` adds a quota to a full namespace,
|
40
41
|
`namespace1/auth/userpass` adds a `quota` to `userpass` in `namespace1`.
|
41
42
|
Updating this field on an existing quota can have "moving" effects. For example, updating
|
42
43
|
`auth/userpass` to `namespace1/auth/userpass` moves this quota from being a global mount quota to
|
43
44
|
a namespace specific mount quota. **Note, namespaces are supported in Enterprise only.**
|
44
|
-
:param pulumi.Input[str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
|
45
|
+
:param pulumi.Input[builtins.str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
|
45
46
|
"""
|
46
47
|
pulumi.set(__self__, "max_leases", max_leases)
|
47
48
|
if inheritable is not None:
|
@@ -57,7 +58,7 @@ class QuotaLeaseCountArgs:
|
|
57
58
|
|
58
59
|
@property
|
59
60
|
@pulumi.getter(name="maxLeases")
|
60
|
-
def max_leases(self) -> pulumi.Input[int]:
|
61
|
+
def max_leases(self) -> pulumi.Input[builtins.int]:
|
61
62
|
"""
|
62
63
|
The maximum number of leases to be allowed by the quota
|
63
64
|
rule. The `max_leases` must be positive.
|
@@ -65,36 +66,36 @@ class QuotaLeaseCountArgs:
|
|
65
66
|
return pulumi.get(self, "max_leases")
|
66
67
|
|
67
68
|
@max_leases.setter
|
68
|
-
def max_leases(self, value: pulumi.Input[int]):
|
69
|
+
def max_leases(self, value: pulumi.Input[builtins.int]):
|
69
70
|
pulumi.set(self, "max_leases", value)
|
70
71
|
|
71
72
|
@property
|
72
73
|
@pulumi.getter
|
73
|
-
def inheritable(self) -> Optional[pulumi.Input[bool]]:
|
74
|
+
def inheritable(self) -> Optional[pulumi.Input[builtins.bool]]:
|
74
75
|
"""
|
75
76
|
If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
|
76
77
|
"""
|
77
78
|
return pulumi.get(self, "inheritable")
|
78
79
|
|
79
80
|
@inheritable.setter
|
80
|
-
def inheritable(self, value: Optional[pulumi.Input[bool]]):
|
81
|
+
def inheritable(self, value: Optional[pulumi.Input[builtins.bool]]):
|
81
82
|
pulumi.set(self, "inheritable", value)
|
82
83
|
|
83
84
|
@property
|
84
85
|
@pulumi.getter
|
85
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
86
|
+
def name(self) -> Optional[pulumi.Input[builtins.str]]:
|
86
87
|
"""
|
87
88
|
Name of the rate limit quota
|
88
89
|
"""
|
89
90
|
return pulumi.get(self, "name")
|
90
91
|
|
91
92
|
@name.setter
|
92
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
93
|
+
def name(self, value: Optional[pulumi.Input[builtins.str]]):
|
93
94
|
pulumi.set(self, "name", value)
|
94
95
|
|
95
96
|
@property
|
96
97
|
@pulumi.getter
|
97
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
98
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
98
99
|
"""
|
99
100
|
The namespace to provision the resource in.
|
100
101
|
The value should not contain leading or trailing forward slashes.
|
@@ -104,12 +105,12 @@ class QuotaLeaseCountArgs:
|
|
104
105
|
return pulumi.get(self, "namespace")
|
105
106
|
|
106
107
|
@namespace.setter
|
107
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
108
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
108
109
|
pulumi.set(self, "namespace", value)
|
109
110
|
|
110
111
|
@property
|
111
112
|
@pulumi.getter
|
112
|
-
def path(self) -> Optional[pulumi.Input[str]]:
|
113
|
+
def path(self) -> Optional[pulumi.Input[builtins.str]]:
|
113
114
|
"""
|
114
115
|
Path of the mount or namespace to apply the quota. A blank path configures a
|
115
116
|
global rate limit quota. For example `namespace1/` adds a quota to a full namespace,
|
@@ -121,48 +122,48 @@ class QuotaLeaseCountArgs:
|
|
121
122
|
return pulumi.get(self, "path")
|
122
123
|
|
123
124
|
@path.setter
|
124
|
-
def path(self, value: Optional[pulumi.Input[str]]):
|
125
|
+
def path(self, value: Optional[pulumi.Input[builtins.str]]):
|
125
126
|
pulumi.set(self, "path", value)
|
126
127
|
|
127
128
|
@property
|
128
129
|
@pulumi.getter
|
129
|
-
def role(self) -> Optional[pulumi.Input[str]]:
|
130
|
+
def role(self) -> Optional[pulumi.Input[builtins.str]]:
|
130
131
|
"""
|
131
132
|
If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
|
132
133
|
"""
|
133
134
|
return pulumi.get(self, "role")
|
134
135
|
|
135
136
|
@role.setter
|
136
|
-
def role(self, value: Optional[pulumi.Input[str]]):
|
137
|
+
def role(self, value: Optional[pulumi.Input[builtins.str]]):
|
137
138
|
pulumi.set(self, "role", value)
|
138
139
|
|
139
140
|
|
140
141
|
@pulumi.input_type
|
141
142
|
class _QuotaLeaseCountState:
|
142
143
|
def __init__(__self__, *,
|
143
|
-
inheritable: Optional[pulumi.Input[bool]] = None,
|
144
|
-
max_leases: Optional[pulumi.Input[int]] = None,
|
145
|
-
name: Optional[pulumi.Input[str]] = None,
|
146
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
147
|
-
path: Optional[pulumi.Input[str]] = None,
|
148
|
-
role: Optional[pulumi.Input[str]] = None):
|
144
|
+
inheritable: Optional[pulumi.Input[builtins.bool]] = None,
|
145
|
+
max_leases: Optional[pulumi.Input[builtins.int]] = None,
|
146
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
147
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
148
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
149
|
+
role: Optional[pulumi.Input[builtins.str]] = None):
|
149
150
|
"""
|
150
151
|
Input properties used for looking up and filtering QuotaLeaseCount resources.
|
151
|
-
:param pulumi.Input[bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
|
152
|
-
:param pulumi.Input[int] max_leases: The maximum number of leases to be allowed by the quota
|
152
|
+
:param pulumi.Input[builtins.bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
|
153
|
+
:param pulumi.Input[builtins.int] max_leases: The maximum number of leases to be allowed by the quota
|
153
154
|
rule. The `max_leases` must be positive.
|
154
|
-
:param pulumi.Input[str] name: Name of the rate limit quota
|
155
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
155
|
+
:param pulumi.Input[builtins.str] name: Name of the rate limit quota
|
156
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
156
157
|
The value should not contain leading or trailing forward slashes.
|
157
158
|
The `namespace` is always relative to the provider's configured namespace.
|
158
159
|
*Available only for Vault Enterprise*.
|
159
|
-
:param pulumi.Input[str] path: Path of the mount or namespace to apply the quota. A blank path configures a
|
160
|
+
:param pulumi.Input[builtins.str] path: Path of the mount or namespace to apply the quota. A blank path configures a
|
160
161
|
global rate limit quota. For example `namespace1/` adds a quota to a full namespace,
|
161
162
|
`namespace1/auth/userpass` adds a `quota` to `userpass` in `namespace1`.
|
162
163
|
Updating this field on an existing quota can have "moving" effects. For example, updating
|
163
164
|
`auth/userpass` to `namespace1/auth/userpass` moves this quota from being a global mount quota to
|
164
165
|
a namespace specific mount quota. **Note, namespaces are supported in Enterprise only.**
|
165
|
-
:param pulumi.Input[str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
|
166
|
+
:param pulumi.Input[builtins.str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
|
166
167
|
"""
|
167
168
|
if inheritable is not None:
|
168
169
|
pulumi.set(__self__, "inheritable", inheritable)
|
@@ -179,19 +180,19 @@ class _QuotaLeaseCountState:
|
|
179
180
|
|
180
181
|
@property
|
181
182
|
@pulumi.getter
|
182
|
-
def inheritable(self) -> Optional[pulumi.Input[bool]]:
|
183
|
+
def inheritable(self) -> Optional[pulumi.Input[builtins.bool]]:
|
183
184
|
"""
|
184
185
|
If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
|
185
186
|
"""
|
186
187
|
return pulumi.get(self, "inheritable")
|
187
188
|
|
188
189
|
@inheritable.setter
|
189
|
-
def inheritable(self, value: Optional[pulumi.Input[bool]]):
|
190
|
+
def inheritable(self, value: Optional[pulumi.Input[builtins.bool]]):
|
190
191
|
pulumi.set(self, "inheritable", value)
|
191
192
|
|
192
193
|
@property
|
193
194
|
@pulumi.getter(name="maxLeases")
|
194
|
-
def max_leases(self) -> Optional[pulumi.Input[int]]:
|
195
|
+
def max_leases(self) -> Optional[pulumi.Input[builtins.int]]:
|
195
196
|
"""
|
196
197
|
The maximum number of leases to be allowed by the quota
|
197
198
|
rule. The `max_leases` must be positive.
|
@@ -199,24 +200,24 @@ class _QuotaLeaseCountState:
|
|
199
200
|
return pulumi.get(self, "max_leases")
|
200
201
|
|
201
202
|
@max_leases.setter
|
202
|
-
def max_leases(self, value: Optional[pulumi.Input[int]]):
|
203
|
+
def max_leases(self, value: Optional[pulumi.Input[builtins.int]]):
|
203
204
|
pulumi.set(self, "max_leases", value)
|
204
205
|
|
205
206
|
@property
|
206
207
|
@pulumi.getter
|
207
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
208
|
+
def name(self) -> Optional[pulumi.Input[builtins.str]]:
|
208
209
|
"""
|
209
210
|
Name of the rate limit quota
|
210
211
|
"""
|
211
212
|
return pulumi.get(self, "name")
|
212
213
|
|
213
214
|
@name.setter
|
214
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
215
|
+
def name(self, value: Optional[pulumi.Input[builtins.str]]):
|
215
216
|
pulumi.set(self, "name", value)
|
216
217
|
|
217
218
|
@property
|
218
219
|
@pulumi.getter
|
219
|
-
def namespace(self) -> Optional[pulumi.Input[str]]:
|
220
|
+
def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
|
220
221
|
"""
|
221
222
|
The namespace to provision the resource in.
|
222
223
|
The value should not contain leading or trailing forward slashes.
|
@@ -226,12 +227,12 @@ class _QuotaLeaseCountState:
|
|
226
227
|
return pulumi.get(self, "namespace")
|
227
228
|
|
228
229
|
@namespace.setter
|
229
|
-
def namespace(self, value: Optional[pulumi.Input[str]]):
|
230
|
+
def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
|
230
231
|
pulumi.set(self, "namespace", value)
|
231
232
|
|
232
233
|
@property
|
233
234
|
@pulumi.getter
|
234
|
-
def path(self) -> Optional[pulumi.Input[str]]:
|
235
|
+
def path(self) -> Optional[pulumi.Input[builtins.str]]:
|
235
236
|
"""
|
236
237
|
Path of the mount or namespace to apply the quota. A blank path configures a
|
237
238
|
global rate limit quota. For example `namespace1/` adds a quota to a full namespace,
|
@@ -243,19 +244,19 @@ class _QuotaLeaseCountState:
|
|
243
244
|
return pulumi.get(self, "path")
|
244
245
|
|
245
246
|
@path.setter
|
246
|
-
def path(self, value: Optional[pulumi.Input[str]]):
|
247
|
+
def path(self, value: Optional[pulumi.Input[builtins.str]]):
|
247
248
|
pulumi.set(self, "path", value)
|
248
249
|
|
249
250
|
@property
|
250
251
|
@pulumi.getter
|
251
|
-
def role(self) -> Optional[pulumi.Input[str]]:
|
252
|
+
def role(self) -> Optional[pulumi.Input[builtins.str]]:
|
252
253
|
"""
|
253
254
|
If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
|
254
255
|
"""
|
255
256
|
return pulumi.get(self, "role")
|
256
257
|
|
257
258
|
@role.setter
|
258
|
-
def role(self, value: Optional[pulumi.Input[str]]):
|
259
|
+
def role(self, value: Optional[pulumi.Input[builtins.str]]):
|
259
260
|
pulumi.set(self, "role", value)
|
260
261
|
|
261
262
|
|
@@ -264,12 +265,12 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
264
265
|
def __init__(__self__,
|
265
266
|
resource_name: str,
|
266
267
|
opts: Optional[pulumi.ResourceOptions] = None,
|
267
|
-
inheritable: Optional[pulumi.Input[bool]] = None,
|
268
|
-
max_leases: Optional[pulumi.Input[int]] = None,
|
269
|
-
name: Optional[pulumi.Input[str]] = None,
|
270
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
271
|
-
path: Optional[pulumi.Input[str]] = None,
|
272
|
-
role: Optional[pulumi.Input[str]] = None,
|
268
|
+
inheritable: Optional[pulumi.Input[builtins.bool]] = None,
|
269
|
+
max_leases: Optional[pulumi.Input[builtins.int]] = None,
|
270
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
271
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
272
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
273
|
+
role: Optional[pulumi.Input[builtins.str]] = None,
|
273
274
|
__props__=None):
|
274
275
|
"""
|
275
276
|
Manage lease count quotas which enforce the number of leases that can be created.
|
@@ -303,21 +304,21 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
303
304
|
|
304
305
|
:param str resource_name: The name of the resource.
|
305
306
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
306
|
-
:param pulumi.Input[bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
|
307
|
-
:param pulumi.Input[int] max_leases: The maximum number of leases to be allowed by the quota
|
307
|
+
:param pulumi.Input[builtins.bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
|
308
|
+
:param pulumi.Input[builtins.int] max_leases: The maximum number of leases to be allowed by the quota
|
308
309
|
rule. The `max_leases` must be positive.
|
309
|
-
:param pulumi.Input[str] name: Name of the rate limit quota
|
310
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
310
|
+
:param pulumi.Input[builtins.str] name: Name of the rate limit quota
|
311
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
311
312
|
The value should not contain leading or trailing forward slashes.
|
312
313
|
The `namespace` is always relative to the provider's configured namespace.
|
313
314
|
*Available only for Vault Enterprise*.
|
314
|
-
:param pulumi.Input[str] path: Path of the mount or namespace to apply the quota. A blank path configures a
|
315
|
+
:param pulumi.Input[builtins.str] path: Path of the mount or namespace to apply the quota. A blank path configures a
|
315
316
|
global rate limit quota. For example `namespace1/` adds a quota to a full namespace,
|
316
317
|
`namespace1/auth/userpass` adds a `quota` to `userpass` in `namespace1`.
|
317
318
|
Updating this field on an existing quota can have "moving" effects. For example, updating
|
318
319
|
`auth/userpass` to `namespace1/auth/userpass` moves this quota from being a global mount quota to
|
319
320
|
a namespace specific mount quota. **Note, namespaces are supported in Enterprise only.**
|
320
|
-
:param pulumi.Input[str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
|
321
|
+
:param pulumi.Input[builtins.str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
|
321
322
|
"""
|
322
323
|
...
|
323
324
|
@overload
|
@@ -370,12 +371,12 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
370
371
|
def _internal_init(__self__,
|
371
372
|
resource_name: str,
|
372
373
|
opts: Optional[pulumi.ResourceOptions] = None,
|
373
|
-
inheritable: Optional[pulumi.Input[bool]] = None,
|
374
|
-
max_leases: Optional[pulumi.Input[int]] = None,
|
375
|
-
name: Optional[pulumi.Input[str]] = None,
|
376
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
377
|
-
path: Optional[pulumi.Input[str]] = None,
|
378
|
-
role: Optional[pulumi.Input[str]] = None,
|
374
|
+
inheritable: Optional[pulumi.Input[builtins.bool]] = None,
|
375
|
+
max_leases: Optional[pulumi.Input[builtins.int]] = None,
|
376
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
377
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
378
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
379
|
+
role: Optional[pulumi.Input[builtins.str]] = None,
|
379
380
|
__props__=None):
|
380
381
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
381
382
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -403,12 +404,12 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
403
404
|
def get(resource_name: str,
|
404
405
|
id: pulumi.Input[str],
|
405
406
|
opts: Optional[pulumi.ResourceOptions] = None,
|
406
|
-
inheritable: Optional[pulumi.Input[bool]] = None,
|
407
|
-
max_leases: Optional[pulumi.Input[int]] = None,
|
408
|
-
name: Optional[pulumi.Input[str]] = None,
|
409
|
-
namespace: Optional[pulumi.Input[str]] = None,
|
410
|
-
path: Optional[pulumi.Input[str]] = None,
|
411
|
-
role: Optional[pulumi.Input[str]] = None) -> 'QuotaLeaseCount':
|
407
|
+
inheritable: Optional[pulumi.Input[builtins.bool]] = None,
|
408
|
+
max_leases: Optional[pulumi.Input[builtins.int]] = None,
|
409
|
+
name: Optional[pulumi.Input[builtins.str]] = None,
|
410
|
+
namespace: Optional[pulumi.Input[builtins.str]] = None,
|
411
|
+
path: Optional[pulumi.Input[builtins.str]] = None,
|
412
|
+
role: Optional[pulumi.Input[builtins.str]] = None) -> 'QuotaLeaseCount':
|
412
413
|
"""
|
413
414
|
Get an existing QuotaLeaseCount resource's state with the given name, id, and optional extra
|
414
415
|
properties used to qualify the lookup.
|
@@ -416,21 +417,21 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
416
417
|
:param str resource_name: The unique name of the resulting resource.
|
417
418
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
418
419
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
419
|
-
:param pulumi.Input[bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
|
420
|
-
:param pulumi.Input[int] max_leases: The maximum number of leases to be allowed by the quota
|
420
|
+
:param pulumi.Input[builtins.bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
|
421
|
+
:param pulumi.Input[builtins.int] max_leases: The maximum number of leases to be allowed by the quota
|
421
422
|
rule. The `max_leases` must be positive.
|
422
|
-
:param pulumi.Input[str] name: Name of the rate limit quota
|
423
|
-
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
423
|
+
:param pulumi.Input[builtins.str] name: Name of the rate limit quota
|
424
|
+
:param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
|
424
425
|
The value should not contain leading or trailing forward slashes.
|
425
426
|
The `namespace` is always relative to the provider's configured namespace.
|
426
427
|
*Available only for Vault Enterprise*.
|
427
|
-
:param pulumi.Input[str] path: Path of the mount or namespace to apply the quota. A blank path configures a
|
428
|
+
:param pulumi.Input[builtins.str] path: Path of the mount or namespace to apply the quota. A blank path configures a
|
428
429
|
global rate limit quota. For example `namespace1/` adds a quota to a full namespace,
|
429
430
|
`namespace1/auth/userpass` adds a `quota` to `userpass` in `namespace1`.
|
430
431
|
Updating this field on an existing quota can have "moving" effects. For example, updating
|
431
432
|
`auth/userpass` to `namespace1/auth/userpass` moves this quota from being a global mount quota to
|
432
433
|
a namespace specific mount quota. **Note, namespaces are supported in Enterprise only.**
|
433
|
-
:param pulumi.Input[str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
|
434
|
+
:param pulumi.Input[builtins.str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
|
434
435
|
"""
|
435
436
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
436
437
|
|
@@ -446,7 +447,7 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
446
447
|
|
447
448
|
@property
|
448
449
|
@pulumi.getter
|
449
|
-
def inheritable(self) -> pulumi.Output[Optional[bool]]:
|
450
|
+
def inheritable(self) -> pulumi.Output[Optional[builtins.bool]]:
|
450
451
|
"""
|
451
452
|
If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
|
452
453
|
"""
|
@@ -454,7 +455,7 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
454
455
|
|
455
456
|
@property
|
456
457
|
@pulumi.getter(name="maxLeases")
|
457
|
-
def max_leases(self) -> pulumi.Output[int]:
|
458
|
+
def max_leases(self) -> pulumi.Output[builtins.int]:
|
458
459
|
"""
|
459
460
|
The maximum number of leases to be allowed by the quota
|
460
461
|
rule. The `max_leases` must be positive.
|
@@ -463,7 +464,7 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
463
464
|
|
464
465
|
@property
|
465
466
|
@pulumi.getter
|
466
|
-
def name(self) -> pulumi.Output[str]:
|
467
|
+
def name(self) -> pulumi.Output[builtins.str]:
|
467
468
|
"""
|
468
469
|
Name of the rate limit quota
|
469
470
|
"""
|
@@ -471,7 +472,7 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
471
472
|
|
472
473
|
@property
|
473
474
|
@pulumi.getter
|
474
|
-
def namespace(self) -> pulumi.Output[Optional[str]]:
|
475
|
+
def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
|
475
476
|
"""
|
476
477
|
The namespace to provision the resource in.
|
477
478
|
The value should not contain leading or trailing forward slashes.
|
@@ -482,7 +483,7 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
482
483
|
|
483
484
|
@property
|
484
485
|
@pulumi.getter
|
485
|
-
def path(self) -> pulumi.Output[Optional[str]]:
|
486
|
+
def path(self) -> pulumi.Output[Optional[builtins.str]]:
|
486
487
|
"""
|
487
488
|
Path of the mount or namespace to apply the quota. A blank path configures a
|
488
489
|
global rate limit quota. For example `namespace1/` adds a quota to a full namespace,
|
@@ -495,7 +496,7 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
495
496
|
|
496
497
|
@property
|
497
498
|
@pulumi.getter
|
498
|
-
def role(self) -> pulumi.Output[Optional[str]]:
|
499
|
+
def role(self) -> pulumi.Output[Optional[builtins.str]]:
|
499
500
|
"""
|
500
501
|
If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
|
501
502
|
"""
|