pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -19,29 +20,29 @@ __all__ = ['QuotaLeaseCountArgs', 'QuotaLeaseCount']
19
20
  @pulumi.input_type
20
21
  class QuotaLeaseCountArgs:
21
22
  def __init__(__self__, *,
22
- max_leases: pulumi.Input[int],
23
- inheritable: Optional[pulumi.Input[bool]] = None,
24
- name: Optional[pulumi.Input[str]] = None,
25
- namespace: Optional[pulumi.Input[str]] = None,
26
- path: Optional[pulumi.Input[str]] = None,
27
- role: Optional[pulumi.Input[str]] = None):
23
+ max_leases: pulumi.Input[builtins.int],
24
+ inheritable: Optional[pulumi.Input[builtins.bool]] = None,
25
+ name: Optional[pulumi.Input[builtins.str]] = None,
26
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
27
+ path: Optional[pulumi.Input[builtins.str]] = None,
28
+ role: Optional[pulumi.Input[builtins.str]] = None):
28
29
  """
29
30
  The set of arguments for constructing a QuotaLeaseCount resource.
30
- :param pulumi.Input[int] max_leases: The maximum number of leases to be allowed by the quota
31
+ :param pulumi.Input[builtins.int] max_leases: The maximum number of leases to be allowed by the quota
31
32
  rule. The `max_leases` must be positive.
32
- :param pulumi.Input[bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
33
- :param pulumi.Input[str] name: Name of the rate limit quota
34
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
33
+ :param pulumi.Input[builtins.bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
34
+ :param pulumi.Input[builtins.str] name: Name of the rate limit quota
35
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
35
36
  The value should not contain leading or trailing forward slashes.
36
37
  The `namespace` is always relative to the provider's configured namespace.
37
38
  *Available only for Vault Enterprise*.
38
- :param pulumi.Input[str] path: Path of the mount or namespace to apply the quota. A blank path configures a
39
+ :param pulumi.Input[builtins.str] path: Path of the mount or namespace to apply the quota. A blank path configures a
39
40
  global rate limit quota. For example `namespace1/` adds a quota to a full namespace,
40
41
  `namespace1/auth/userpass` adds a `quota` to `userpass` in `namespace1`.
41
42
  Updating this field on an existing quota can have "moving" effects. For example, updating
42
43
  `auth/userpass` to `namespace1/auth/userpass` moves this quota from being a global mount quota to
43
44
  a namespace specific mount quota. **Note, namespaces are supported in Enterprise only.**
44
- :param pulumi.Input[str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
45
+ :param pulumi.Input[builtins.str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
45
46
  """
46
47
  pulumi.set(__self__, "max_leases", max_leases)
47
48
  if inheritable is not None:
@@ -57,7 +58,7 @@ class QuotaLeaseCountArgs:
57
58
 
58
59
  @property
59
60
  @pulumi.getter(name="maxLeases")
60
- def max_leases(self) -> pulumi.Input[int]:
61
+ def max_leases(self) -> pulumi.Input[builtins.int]:
61
62
  """
62
63
  The maximum number of leases to be allowed by the quota
63
64
  rule. The `max_leases` must be positive.
@@ -65,36 +66,36 @@ class QuotaLeaseCountArgs:
65
66
  return pulumi.get(self, "max_leases")
66
67
 
67
68
  @max_leases.setter
68
- def max_leases(self, value: pulumi.Input[int]):
69
+ def max_leases(self, value: pulumi.Input[builtins.int]):
69
70
  pulumi.set(self, "max_leases", value)
70
71
 
71
72
  @property
72
73
  @pulumi.getter
73
- def inheritable(self) -> Optional[pulumi.Input[bool]]:
74
+ def inheritable(self) -> Optional[pulumi.Input[builtins.bool]]:
74
75
  """
75
76
  If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
76
77
  """
77
78
  return pulumi.get(self, "inheritable")
78
79
 
79
80
  @inheritable.setter
80
- def inheritable(self, value: Optional[pulumi.Input[bool]]):
81
+ def inheritable(self, value: Optional[pulumi.Input[builtins.bool]]):
81
82
  pulumi.set(self, "inheritable", value)
82
83
 
83
84
  @property
84
85
  @pulumi.getter
85
- def name(self) -> Optional[pulumi.Input[str]]:
86
+ def name(self) -> Optional[pulumi.Input[builtins.str]]:
86
87
  """
87
88
  Name of the rate limit quota
88
89
  """
89
90
  return pulumi.get(self, "name")
90
91
 
91
92
  @name.setter
92
- def name(self, value: Optional[pulumi.Input[str]]):
93
+ def name(self, value: Optional[pulumi.Input[builtins.str]]):
93
94
  pulumi.set(self, "name", value)
94
95
 
95
96
  @property
96
97
  @pulumi.getter
97
- def namespace(self) -> Optional[pulumi.Input[str]]:
98
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
98
99
  """
99
100
  The namespace to provision the resource in.
100
101
  The value should not contain leading or trailing forward slashes.
@@ -104,12 +105,12 @@ class QuotaLeaseCountArgs:
104
105
  return pulumi.get(self, "namespace")
105
106
 
106
107
  @namespace.setter
107
- def namespace(self, value: Optional[pulumi.Input[str]]):
108
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
108
109
  pulumi.set(self, "namespace", value)
109
110
 
110
111
  @property
111
112
  @pulumi.getter
112
- def path(self) -> Optional[pulumi.Input[str]]:
113
+ def path(self) -> Optional[pulumi.Input[builtins.str]]:
113
114
  """
114
115
  Path of the mount or namespace to apply the quota. A blank path configures a
115
116
  global rate limit quota. For example `namespace1/` adds a quota to a full namespace,
@@ -121,48 +122,48 @@ class QuotaLeaseCountArgs:
121
122
  return pulumi.get(self, "path")
122
123
 
123
124
  @path.setter
124
- def path(self, value: Optional[pulumi.Input[str]]):
125
+ def path(self, value: Optional[pulumi.Input[builtins.str]]):
125
126
  pulumi.set(self, "path", value)
126
127
 
127
128
  @property
128
129
  @pulumi.getter
129
- def role(self) -> Optional[pulumi.Input[str]]:
130
+ def role(self) -> Optional[pulumi.Input[builtins.str]]:
130
131
  """
131
132
  If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
132
133
  """
133
134
  return pulumi.get(self, "role")
134
135
 
135
136
  @role.setter
136
- def role(self, value: Optional[pulumi.Input[str]]):
137
+ def role(self, value: Optional[pulumi.Input[builtins.str]]):
137
138
  pulumi.set(self, "role", value)
138
139
 
139
140
 
140
141
  @pulumi.input_type
141
142
  class _QuotaLeaseCountState:
142
143
  def __init__(__self__, *,
143
- inheritable: Optional[pulumi.Input[bool]] = None,
144
- max_leases: Optional[pulumi.Input[int]] = None,
145
- name: Optional[pulumi.Input[str]] = None,
146
- namespace: Optional[pulumi.Input[str]] = None,
147
- path: Optional[pulumi.Input[str]] = None,
148
- role: Optional[pulumi.Input[str]] = None):
144
+ inheritable: Optional[pulumi.Input[builtins.bool]] = None,
145
+ max_leases: Optional[pulumi.Input[builtins.int]] = None,
146
+ name: Optional[pulumi.Input[builtins.str]] = None,
147
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
148
+ path: Optional[pulumi.Input[builtins.str]] = None,
149
+ role: Optional[pulumi.Input[builtins.str]] = None):
149
150
  """
150
151
  Input properties used for looking up and filtering QuotaLeaseCount resources.
151
- :param pulumi.Input[bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
152
- :param pulumi.Input[int] max_leases: The maximum number of leases to be allowed by the quota
152
+ :param pulumi.Input[builtins.bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
153
+ :param pulumi.Input[builtins.int] max_leases: The maximum number of leases to be allowed by the quota
153
154
  rule. The `max_leases` must be positive.
154
- :param pulumi.Input[str] name: Name of the rate limit quota
155
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
155
+ :param pulumi.Input[builtins.str] name: Name of the rate limit quota
156
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
156
157
  The value should not contain leading or trailing forward slashes.
157
158
  The `namespace` is always relative to the provider's configured namespace.
158
159
  *Available only for Vault Enterprise*.
159
- :param pulumi.Input[str] path: Path of the mount or namespace to apply the quota. A blank path configures a
160
+ :param pulumi.Input[builtins.str] path: Path of the mount or namespace to apply the quota. A blank path configures a
160
161
  global rate limit quota. For example `namespace1/` adds a quota to a full namespace,
161
162
  `namespace1/auth/userpass` adds a `quota` to `userpass` in `namespace1`.
162
163
  Updating this field on an existing quota can have "moving" effects. For example, updating
163
164
  `auth/userpass` to `namespace1/auth/userpass` moves this quota from being a global mount quota to
164
165
  a namespace specific mount quota. **Note, namespaces are supported in Enterprise only.**
165
- :param pulumi.Input[str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
166
+ :param pulumi.Input[builtins.str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
166
167
  """
167
168
  if inheritable is not None:
168
169
  pulumi.set(__self__, "inheritable", inheritable)
@@ -179,19 +180,19 @@ class _QuotaLeaseCountState:
179
180
 
180
181
  @property
181
182
  @pulumi.getter
182
- def inheritable(self) -> Optional[pulumi.Input[bool]]:
183
+ def inheritable(self) -> Optional[pulumi.Input[builtins.bool]]:
183
184
  """
184
185
  If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
185
186
  """
186
187
  return pulumi.get(self, "inheritable")
187
188
 
188
189
  @inheritable.setter
189
- def inheritable(self, value: Optional[pulumi.Input[bool]]):
190
+ def inheritable(self, value: Optional[pulumi.Input[builtins.bool]]):
190
191
  pulumi.set(self, "inheritable", value)
191
192
 
192
193
  @property
193
194
  @pulumi.getter(name="maxLeases")
194
- def max_leases(self) -> Optional[pulumi.Input[int]]:
195
+ def max_leases(self) -> Optional[pulumi.Input[builtins.int]]:
195
196
  """
196
197
  The maximum number of leases to be allowed by the quota
197
198
  rule. The `max_leases` must be positive.
@@ -199,24 +200,24 @@ class _QuotaLeaseCountState:
199
200
  return pulumi.get(self, "max_leases")
200
201
 
201
202
  @max_leases.setter
202
- def max_leases(self, value: Optional[pulumi.Input[int]]):
203
+ def max_leases(self, value: Optional[pulumi.Input[builtins.int]]):
203
204
  pulumi.set(self, "max_leases", value)
204
205
 
205
206
  @property
206
207
  @pulumi.getter
207
- def name(self) -> Optional[pulumi.Input[str]]:
208
+ def name(self) -> Optional[pulumi.Input[builtins.str]]:
208
209
  """
209
210
  Name of the rate limit quota
210
211
  """
211
212
  return pulumi.get(self, "name")
212
213
 
213
214
  @name.setter
214
- def name(self, value: Optional[pulumi.Input[str]]):
215
+ def name(self, value: Optional[pulumi.Input[builtins.str]]):
215
216
  pulumi.set(self, "name", value)
216
217
 
217
218
  @property
218
219
  @pulumi.getter
219
- def namespace(self) -> Optional[pulumi.Input[str]]:
220
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
220
221
  """
221
222
  The namespace to provision the resource in.
222
223
  The value should not contain leading or trailing forward slashes.
@@ -226,12 +227,12 @@ class _QuotaLeaseCountState:
226
227
  return pulumi.get(self, "namespace")
227
228
 
228
229
  @namespace.setter
229
- def namespace(self, value: Optional[pulumi.Input[str]]):
230
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
230
231
  pulumi.set(self, "namespace", value)
231
232
 
232
233
  @property
233
234
  @pulumi.getter
234
- def path(self) -> Optional[pulumi.Input[str]]:
235
+ def path(self) -> Optional[pulumi.Input[builtins.str]]:
235
236
  """
236
237
  Path of the mount or namespace to apply the quota. A blank path configures a
237
238
  global rate limit quota. For example `namespace1/` adds a quota to a full namespace,
@@ -243,19 +244,19 @@ class _QuotaLeaseCountState:
243
244
  return pulumi.get(self, "path")
244
245
 
245
246
  @path.setter
246
- def path(self, value: Optional[pulumi.Input[str]]):
247
+ def path(self, value: Optional[pulumi.Input[builtins.str]]):
247
248
  pulumi.set(self, "path", value)
248
249
 
249
250
  @property
250
251
  @pulumi.getter
251
- def role(self) -> Optional[pulumi.Input[str]]:
252
+ def role(self) -> Optional[pulumi.Input[builtins.str]]:
252
253
  """
253
254
  If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
254
255
  """
255
256
  return pulumi.get(self, "role")
256
257
 
257
258
  @role.setter
258
- def role(self, value: Optional[pulumi.Input[str]]):
259
+ def role(self, value: Optional[pulumi.Input[builtins.str]]):
259
260
  pulumi.set(self, "role", value)
260
261
 
261
262
 
@@ -264,12 +265,12 @@ class QuotaLeaseCount(pulumi.CustomResource):
264
265
  def __init__(__self__,
265
266
  resource_name: str,
266
267
  opts: Optional[pulumi.ResourceOptions] = None,
267
- inheritable: Optional[pulumi.Input[bool]] = None,
268
- max_leases: Optional[pulumi.Input[int]] = None,
269
- name: Optional[pulumi.Input[str]] = None,
270
- namespace: Optional[pulumi.Input[str]] = None,
271
- path: Optional[pulumi.Input[str]] = None,
272
- role: Optional[pulumi.Input[str]] = None,
268
+ inheritable: Optional[pulumi.Input[builtins.bool]] = None,
269
+ max_leases: Optional[pulumi.Input[builtins.int]] = None,
270
+ name: Optional[pulumi.Input[builtins.str]] = None,
271
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
272
+ path: Optional[pulumi.Input[builtins.str]] = None,
273
+ role: Optional[pulumi.Input[builtins.str]] = None,
273
274
  __props__=None):
274
275
  """
275
276
  Manage lease count quotas which enforce the number of leases that can be created.
@@ -303,21 +304,21 @@ class QuotaLeaseCount(pulumi.CustomResource):
303
304
 
304
305
  :param str resource_name: The name of the resource.
305
306
  :param pulumi.ResourceOptions opts: Options for the resource.
306
- :param pulumi.Input[bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
307
- :param pulumi.Input[int] max_leases: The maximum number of leases to be allowed by the quota
307
+ :param pulumi.Input[builtins.bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
308
+ :param pulumi.Input[builtins.int] max_leases: The maximum number of leases to be allowed by the quota
308
309
  rule. The `max_leases` must be positive.
309
- :param pulumi.Input[str] name: Name of the rate limit quota
310
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
310
+ :param pulumi.Input[builtins.str] name: Name of the rate limit quota
311
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
311
312
  The value should not contain leading or trailing forward slashes.
312
313
  The `namespace` is always relative to the provider's configured namespace.
313
314
  *Available only for Vault Enterprise*.
314
- :param pulumi.Input[str] path: Path of the mount or namespace to apply the quota. A blank path configures a
315
+ :param pulumi.Input[builtins.str] path: Path of the mount or namespace to apply the quota. A blank path configures a
315
316
  global rate limit quota. For example `namespace1/` adds a quota to a full namespace,
316
317
  `namespace1/auth/userpass` adds a `quota` to `userpass` in `namespace1`.
317
318
  Updating this field on an existing quota can have "moving" effects. For example, updating
318
319
  `auth/userpass` to `namespace1/auth/userpass` moves this quota from being a global mount quota to
319
320
  a namespace specific mount quota. **Note, namespaces are supported in Enterprise only.**
320
- :param pulumi.Input[str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
321
+ :param pulumi.Input[builtins.str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
321
322
  """
322
323
  ...
323
324
  @overload
@@ -370,12 +371,12 @@ class QuotaLeaseCount(pulumi.CustomResource):
370
371
  def _internal_init(__self__,
371
372
  resource_name: str,
372
373
  opts: Optional[pulumi.ResourceOptions] = None,
373
- inheritable: Optional[pulumi.Input[bool]] = None,
374
- max_leases: Optional[pulumi.Input[int]] = None,
375
- name: Optional[pulumi.Input[str]] = None,
376
- namespace: Optional[pulumi.Input[str]] = None,
377
- path: Optional[pulumi.Input[str]] = None,
378
- role: Optional[pulumi.Input[str]] = None,
374
+ inheritable: Optional[pulumi.Input[builtins.bool]] = None,
375
+ max_leases: Optional[pulumi.Input[builtins.int]] = None,
376
+ name: Optional[pulumi.Input[builtins.str]] = None,
377
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
378
+ path: Optional[pulumi.Input[builtins.str]] = None,
379
+ role: Optional[pulumi.Input[builtins.str]] = None,
379
380
  __props__=None):
380
381
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
381
382
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -403,12 +404,12 @@ class QuotaLeaseCount(pulumi.CustomResource):
403
404
  def get(resource_name: str,
404
405
  id: pulumi.Input[str],
405
406
  opts: Optional[pulumi.ResourceOptions] = None,
406
- inheritable: Optional[pulumi.Input[bool]] = None,
407
- max_leases: Optional[pulumi.Input[int]] = None,
408
- name: Optional[pulumi.Input[str]] = None,
409
- namespace: Optional[pulumi.Input[str]] = None,
410
- path: Optional[pulumi.Input[str]] = None,
411
- role: Optional[pulumi.Input[str]] = None) -> 'QuotaLeaseCount':
407
+ inheritable: Optional[pulumi.Input[builtins.bool]] = None,
408
+ max_leases: Optional[pulumi.Input[builtins.int]] = None,
409
+ name: Optional[pulumi.Input[builtins.str]] = None,
410
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
411
+ path: Optional[pulumi.Input[builtins.str]] = None,
412
+ role: Optional[pulumi.Input[builtins.str]] = None) -> 'QuotaLeaseCount':
412
413
  """
413
414
  Get an existing QuotaLeaseCount resource's state with the given name, id, and optional extra
414
415
  properties used to qualify the lookup.
@@ -416,21 +417,21 @@ class QuotaLeaseCount(pulumi.CustomResource):
416
417
  :param str resource_name: The unique name of the resulting resource.
417
418
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
418
419
  :param pulumi.ResourceOptions opts: Options for the resource.
419
- :param pulumi.Input[bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
420
- :param pulumi.Input[int] max_leases: The maximum number of leases to be allowed by the quota
420
+ :param pulumi.Input[builtins.bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
421
+ :param pulumi.Input[builtins.int] max_leases: The maximum number of leases to be allowed by the quota
421
422
  rule. The `max_leases` must be positive.
422
- :param pulumi.Input[str] name: Name of the rate limit quota
423
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
423
+ :param pulumi.Input[builtins.str] name: Name of the rate limit quota
424
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
424
425
  The value should not contain leading or trailing forward slashes.
425
426
  The `namespace` is always relative to the provider's configured namespace.
426
427
  *Available only for Vault Enterprise*.
427
- :param pulumi.Input[str] path: Path of the mount or namespace to apply the quota. A blank path configures a
428
+ :param pulumi.Input[builtins.str] path: Path of the mount or namespace to apply the quota. A blank path configures a
428
429
  global rate limit quota. For example `namespace1/` adds a quota to a full namespace,
429
430
  `namespace1/auth/userpass` adds a `quota` to `userpass` in `namespace1`.
430
431
  Updating this field on an existing quota can have "moving" effects. For example, updating
431
432
  `auth/userpass` to `namespace1/auth/userpass` moves this quota from being a global mount quota to
432
433
  a namespace specific mount quota. **Note, namespaces are supported in Enterprise only.**
433
- :param pulumi.Input[str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
434
+ :param pulumi.Input[builtins.str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
434
435
  """
435
436
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
436
437
 
@@ -446,7 +447,7 @@ class QuotaLeaseCount(pulumi.CustomResource):
446
447
 
447
448
  @property
448
449
  @pulumi.getter
449
- def inheritable(self) -> pulumi.Output[Optional[bool]]:
450
+ def inheritable(self) -> pulumi.Output[Optional[builtins.bool]]:
450
451
  """
451
452
  If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
452
453
  """
@@ -454,7 +455,7 @@ class QuotaLeaseCount(pulumi.CustomResource):
454
455
 
455
456
  @property
456
457
  @pulumi.getter(name="maxLeases")
457
- def max_leases(self) -> pulumi.Output[int]:
458
+ def max_leases(self) -> pulumi.Output[builtins.int]:
458
459
  """
459
460
  The maximum number of leases to be allowed by the quota
460
461
  rule. The `max_leases` must be positive.
@@ -463,7 +464,7 @@ class QuotaLeaseCount(pulumi.CustomResource):
463
464
 
464
465
  @property
465
466
  @pulumi.getter
466
- def name(self) -> pulumi.Output[str]:
467
+ def name(self) -> pulumi.Output[builtins.str]:
467
468
  """
468
469
  Name of the rate limit quota
469
470
  """
@@ -471,7 +472,7 @@ class QuotaLeaseCount(pulumi.CustomResource):
471
472
 
472
473
  @property
473
474
  @pulumi.getter
474
- def namespace(self) -> pulumi.Output[Optional[str]]:
475
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
475
476
  """
476
477
  The namespace to provision the resource in.
477
478
  The value should not contain leading or trailing forward slashes.
@@ -482,7 +483,7 @@ class QuotaLeaseCount(pulumi.CustomResource):
482
483
 
483
484
  @property
484
485
  @pulumi.getter
485
- def path(self) -> pulumi.Output[Optional[str]]:
486
+ def path(self) -> pulumi.Output[Optional[builtins.str]]:
486
487
  """
487
488
  Path of the mount or namespace to apply the quota. A blank path configures a
488
489
  global rate limit quota. For example `namespace1/` adds a quota to a full namespace,
@@ -495,7 +496,7 @@ class QuotaLeaseCount(pulumi.CustomResource):
495
496
 
496
497
  @property
497
498
  @pulumi.getter
498
- def role(self) -> pulumi.Output[Optional[str]]:
499
+ def role(self) -> pulumi.Output[Optional[builtins.str]]:
499
500
  """
500
501
  If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
501
502
  """