pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -19,34 +20,34 @@ __all__ = ['QuotaRateLimitArgs', 'QuotaRateLimit']
19
20
  @pulumi.input_type
20
21
  class QuotaRateLimitArgs:
21
22
  def __init__(__self__, *,
22
- rate: pulumi.Input[float],
23
- block_interval: Optional[pulumi.Input[int]] = None,
24
- inheritable: Optional[pulumi.Input[bool]] = None,
25
- interval: Optional[pulumi.Input[int]] = None,
26
- name: Optional[pulumi.Input[str]] = None,
27
- namespace: Optional[pulumi.Input[str]] = None,
28
- path: Optional[pulumi.Input[str]] = None,
29
- role: Optional[pulumi.Input[str]] = None):
23
+ rate: pulumi.Input[builtins.float],
24
+ block_interval: Optional[pulumi.Input[builtins.int]] = None,
25
+ inheritable: Optional[pulumi.Input[builtins.bool]] = None,
26
+ interval: Optional[pulumi.Input[builtins.int]] = None,
27
+ name: Optional[pulumi.Input[builtins.str]] = None,
28
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
29
+ path: Optional[pulumi.Input[builtins.str]] = None,
30
+ role: Optional[pulumi.Input[builtins.str]] = None):
30
31
  """
31
32
  The set of arguments for constructing a QuotaRateLimit resource.
32
- :param pulumi.Input[float] rate: The maximum number of requests at any given second to be allowed by the quota
33
+ :param pulumi.Input[builtins.float] rate: The maximum number of requests at any given second to be allowed by the quota
33
34
  rule. The `rate` must be positive.
34
- :param pulumi.Input[int] block_interval: If set, when a client reaches a rate limit threshold, the client will
35
+ :param pulumi.Input[builtins.int] block_interval: If set, when a client reaches a rate limit threshold, the client will
35
36
  be prohibited from any further requests until after the 'block_interval' in seconds has elapsed.
36
- :param pulumi.Input[bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
37
- :param pulumi.Input[int] interval: The duration in seconds to enforce rate limiting for.
38
- :param pulumi.Input[str] name: Name of the rate limit quota
39
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
37
+ :param pulumi.Input[builtins.bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
38
+ :param pulumi.Input[builtins.int] interval: The duration in seconds to enforce rate limiting for.
39
+ :param pulumi.Input[builtins.str] name: Name of the rate limit quota
40
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
40
41
  The value should not contain leading or trailing forward slashes.
41
42
  The `namespace` is always relative to the provider's configured namespace.
42
43
  *Available only for Vault Enterprise*.
43
- :param pulumi.Input[str] path: Path of the mount or namespace to apply the quota. A blank path configures a
44
+ :param pulumi.Input[builtins.str] path: Path of the mount or namespace to apply the quota. A blank path configures a
44
45
  global rate limit quota. For example `namespace1/` adds a quota to a full namespace,
45
46
  `namespace1/auth/userpass` adds a `quota` to `userpass` in `namespace1`.
46
47
  Updating this field on an existing quota can have "moving" effects. For example, updating
47
48
  `auth/userpass` to `namespace1/auth/userpass` moves this quota from being a global mount quota to
48
49
  a namespace specific mount quota. **Note, namespaces are supported in Enterprise only.**
49
- :param pulumi.Input[str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
50
+ :param pulumi.Input[builtins.str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
50
51
  """
51
52
  pulumi.set(__self__, "rate", rate)
52
53
  if block_interval is not None:
@@ -66,7 +67,7 @@ class QuotaRateLimitArgs:
66
67
 
67
68
  @property
68
69
  @pulumi.getter
69
- def rate(self) -> pulumi.Input[float]:
70
+ def rate(self) -> pulumi.Input[builtins.float]:
70
71
  """
71
72
  The maximum number of requests at any given second to be allowed by the quota
72
73
  rule. The `rate` must be positive.
@@ -74,12 +75,12 @@ class QuotaRateLimitArgs:
74
75
  return pulumi.get(self, "rate")
75
76
 
76
77
  @rate.setter
77
- def rate(self, value: pulumi.Input[float]):
78
+ def rate(self, value: pulumi.Input[builtins.float]):
78
79
  pulumi.set(self, "rate", value)
79
80
 
80
81
  @property
81
82
  @pulumi.getter(name="blockInterval")
82
- def block_interval(self) -> Optional[pulumi.Input[int]]:
83
+ def block_interval(self) -> Optional[pulumi.Input[builtins.int]]:
83
84
  """
84
85
  If set, when a client reaches a rate limit threshold, the client will
85
86
  be prohibited from any further requests until after the 'block_interval' in seconds has elapsed.
@@ -87,48 +88,48 @@ class QuotaRateLimitArgs:
87
88
  return pulumi.get(self, "block_interval")
88
89
 
89
90
  @block_interval.setter
90
- def block_interval(self, value: Optional[pulumi.Input[int]]):
91
+ def block_interval(self, value: Optional[pulumi.Input[builtins.int]]):
91
92
  pulumi.set(self, "block_interval", value)
92
93
 
93
94
  @property
94
95
  @pulumi.getter
95
- def inheritable(self) -> Optional[pulumi.Input[bool]]:
96
+ def inheritable(self) -> Optional[pulumi.Input[builtins.bool]]:
96
97
  """
97
98
  If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
98
99
  """
99
100
  return pulumi.get(self, "inheritable")
100
101
 
101
102
  @inheritable.setter
102
- def inheritable(self, value: Optional[pulumi.Input[bool]]):
103
+ def inheritable(self, value: Optional[pulumi.Input[builtins.bool]]):
103
104
  pulumi.set(self, "inheritable", value)
104
105
 
105
106
  @property
106
107
  @pulumi.getter
107
- def interval(self) -> Optional[pulumi.Input[int]]:
108
+ def interval(self) -> Optional[pulumi.Input[builtins.int]]:
108
109
  """
109
110
  The duration in seconds to enforce rate limiting for.
110
111
  """
111
112
  return pulumi.get(self, "interval")
112
113
 
113
114
  @interval.setter
114
- def interval(self, value: Optional[pulumi.Input[int]]):
115
+ def interval(self, value: Optional[pulumi.Input[builtins.int]]):
115
116
  pulumi.set(self, "interval", value)
116
117
 
117
118
  @property
118
119
  @pulumi.getter
119
- def name(self) -> Optional[pulumi.Input[str]]:
120
+ def name(self) -> Optional[pulumi.Input[builtins.str]]:
120
121
  """
121
122
  Name of the rate limit quota
122
123
  """
123
124
  return pulumi.get(self, "name")
124
125
 
125
126
  @name.setter
126
- def name(self, value: Optional[pulumi.Input[str]]):
127
+ def name(self, value: Optional[pulumi.Input[builtins.str]]):
127
128
  pulumi.set(self, "name", value)
128
129
 
129
130
  @property
130
131
  @pulumi.getter
131
- def namespace(self) -> Optional[pulumi.Input[str]]:
132
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
132
133
  """
133
134
  The namespace to provision the resource in.
134
135
  The value should not contain leading or trailing forward slashes.
@@ -138,12 +139,12 @@ class QuotaRateLimitArgs:
138
139
  return pulumi.get(self, "namespace")
139
140
 
140
141
  @namespace.setter
141
- def namespace(self, value: Optional[pulumi.Input[str]]):
142
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
142
143
  pulumi.set(self, "namespace", value)
143
144
 
144
145
  @property
145
146
  @pulumi.getter
146
- def path(self) -> Optional[pulumi.Input[str]]:
147
+ def path(self) -> Optional[pulumi.Input[builtins.str]]:
147
148
  """
148
149
  Path of the mount or namespace to apply the quota. A blank path configures a
149
150
  global rate limit quota. For example `namespace1/` adds a quota to a full namespace,
@@ -155,53 +156,53 @@ class QuotaRateLimitArgs:
155
156
  return pulumi.get(self, "path")
156
157
 
157
158
  @path.setter
158
- def path(self, value: Optional[pulumi.Input[str]]):
159
+ def path(self, value: Optional[pulumi.Input[builtins.str]]):
159
160
  pulumi.set(self, "path", value)
160
161
 
161
162
  @property
162
163
  @pulumi.getter
163
- def role(self) -> Optional[pulumi.Input[str]]:
164
+ def role(self) -> Optional[pulumi.Input[builtins.str]]:
164
165
  """
165
166
  If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
166
167
  """
167
168
  return pulumi.get(self, "role")
168
169
 
169
170
  @role.setter
170
- def role(self, value: Optional[pulumi.Input[str]]):
171
+ def role(self, value: Optional[pulumi.Input[builtins.str]]):
171
172
  pulumi.set(self, "role", value)
172
173
 
173
174
 
174
175
  @pulumi.input_type
175
176
  class _QuotaRateLimitState:
176
177
  def __init__(__self__, *,
177
- block_interval: Optional[pulumi.Input[int]] = None,
178
- inheritable: Optional[pulumi.Input[bool]] = None,
179
- interval: Optional[pulumi.Input[int]] = None,
180
- name: Optional[pulumi.Input[str]] = None,
181
- namespace: Optional[pulumi.Input[str]] = None,
182
- path: Optional[pulumi.Input[str]] = None,
183
- rate: Optional[pulumi.Input[float]] = None,
184
- role: Optional[pulumi.Input[str]] = None):
178
+ block_interval: Optional[pulumi.Input[builtins.int]] = None,
179
+ inheritable: Optional[pulumi.Input[builtins.bool]] = None,
180
+ interval: Optional[pulumi.Input[builtins.int]] = None,
181
+ name: Optional[pulumi.Input[builtins.str]] = None,
182
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
183
+ path: Optional[pulumi.Input[builtins.str]] = None,
184
+ rate: Optional[pulumi.Input[builtins.float]] = None,
185
+ role: Optional[pulumi.Input[builtins.str]] = None):
185
186
  """
186
187
  Input properties used for looking up and filtering QuotaRateLimit resources.
187
- :param pulumi.Input[int] block_interval: If set, when a client reaches a rate limit threshold, the client will
188
+ :param pulumi.Input[builtins.int] block_interval: If set, when a client reaches a rate limit threshold, the client will
188
189
  be prohibited from any further requests until after the 'block_interval' in seconds has elapsed.
189
- :param pulumi.Input[bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
190
- :param pulumi.Input[int] interval: The duration in seconds to enforce rate limiting for.
191
- :param pulumi.Input[str] name: Name of the rate limit quota
192
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
190
+ :param pulumi.Input[builtins.bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
191
+ :param pulumi.Input[builtins.int] interval: The duration in seconds to enforce rate limiting for.
192
+ :param pulumi.Input[builtins.str] name: Name of the rate limit quota
193
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
193
194
  The value should not contain leading or trailing forward slashes.
194
195
  The `namespace` is always relative to the provider's configured namespace.
195
196
  *Available only for Vault Enterprise*.
196
- :param pulumi.Input[str] path: Path of the mount or namespace to apply the quota. A blank path configures a
197
+ :param pulumi.Input[builtins.str] path: Path of the mount or namespace to apply the quota. A blank path configures a
197
198
  global rate limit quota. For example `namespace1/` adds a quota to a full namespace,
198
199
  `namespace1/auth/userpass` adds a `quota` to `userpass` in `namespace1`.
199
200
  Updating this field on an existing quota can have "moving" effects. For example, updating
200
201
  `auth/userpass` to `namespace1/auth/userpass` moves this quota from being a global mount quota to
201
202
  a namespace specific mount quota. **Note, namespaces are supported in Enterprise only.**
202
- :param pulumi.Input[float] rate: The maximum number of requests at any given second to be allowed by the quota
203
+ :param pulumi.Input[builtins.float] rate: The maximum number of requests at any given second to be allowed by the quota
203
204
  rule. The `rate` must be positive.
204
- :param pulumi.Input[str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
205
+ :param pulumi.Input[builtins.str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
205
206
  """
206
207
  if block_interval is not None:
207
208
  pulumi.set(__self__, "block_interval", block_interval)
@@ -222,7 +223,7 @@ class _QuotaRateLimitState:
222
223
 
223
224
  @property
224
225
  @pulumi.getter(name="blockInterval")
225
- def block_interval(self) -> Optional[pulumi.Input[int]]:
226
+ def block_interval(self) -> Optional[pulumi.Input[builtins.int]]:
226
227
  """
227
228
  If set, when a client reaches a rate limit threshold, the client will
228
229
  be prohibited from any further requests until after the 'block_interval' in seconds has elapsed.
@@ -230,48 +231,48 @@ class _QuotaRateLimitState:
230
231
  return pulumi.get(self, "block_interval")
231
232
 
232
233
  @block_interval.setter
233
- def block_interval(self, value: Optional[pulumi.Input[int]]):
234
+ def block_interval(self, value: Optional[pulumi.Input[builtins.int]]):
234
235
  pulumi.set(self, "block_interval", value)
235
236
 
236
237
  @property
237
238
  @pulumi.getter
238
- def inheritable(self) -> Optional[pulumi.Input[bool]]:
239
+ def inheritable(self) -> Optional[pulumi.Input[builtins.bool]]:
239
240
  """
240
241
  If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
241
242
  """
242
243
  return pulumi.get(self, "inheritable")
243
244
 
244
245
  @inheritable.setter
245
- def inheritable(self, value: Optional[pulumi.Input[bool]]):
246
+ def inheritable(self, value: Optional[pulumi.Input[builtins.bool]]):
246
247
  pulumi.set(self, "inheritable", value)
247
248
 
248
249
  @property
249
250
  @pulumi.getter
250
- def interval(self) -> Optional[pulumi.Input[int]]:
251
+ def interval(self) -> Optional[pulumi.Input[builtins.int]]:
251
252
  """
252
253
  The duration in seconds to enforce rate limiting for.
253
254
  """
254
255
  return pulumi.get(self, "interval")
255
256
 
256
257
  @interval.setter
257
- def interval(self, value: Optional[pulumi.Input[int]]):
258
+ def interval(self, value: Optional[pulumi.Input[builtins.int]]):
258
259
  pulumi.set(self, "interval", value)
259
260
 
260
261
  @property
261
262
  @pulumi.getter
262
- def name(self) -> Optional[pulumi.Input[str]]:
263
+ def name(self) -> Optional[pulumi.Input[builtins.str]]:
263
264
  """
264
265
  Name of the rate limit quota
265
266
  """
266
267
  return pulumi.get(self, "name")
267
268
 
268
269
  @name.setter
269
- def name(self, value: Optional[pulumi.Input[str]]):
270
+ def name(self, value: Optional[pulumi.Input[builtins.str]]):
270
271
  pulumi.set(self, "name", value)
271
272
 
272
273
  @property
273
274
  @pulumi.getter
274
- def namespace(self) -> Optional[pulumi.Input[str]]:
275
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
275
276
  """
276
277
  The namespace to provision the resource in.
277
278
  The value should not contain leading or trailing forward slashes.
@@ -281,12 +282,12 @@ class _QuotaRateLimitState:
281
282
  return pulumi.get(self, "namespace")
282
283
 
283
284
  @namespace.setter
284
- def namespace(self, value: Optional[pulumi.Input[str]]):
285
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
285
286
  pulumi.set(self, "namespace", value)
286
287
 
287
288
  @property
288
289
  @pulumi.getter
289
- def path(self) -> Optional[pulumi.Input[str]]:
290
+ def path(self) -> Optional[pulumi.Input[builtins.str]]:
290
291
  """
291
292
  Path of the mount or namespace to apply the quota. A blank path configures a
292
293
  global rate limit quota. For example `namespace1/` adds a quota to a full namespace,
@@ -298,12 +299,12 @@ class _QuotaRateLimitState:
298
299
  return pulumi.get(self, "path")
299
300
 
300
301
  @path.setter
301
- def path(self, value: Optional[pulumi.Input[str]]):
302
+ def path(self, value: Optional[pulumi.Input[builtins.str]]):
302
303
  pulumi.set(self, "path", value)
303
304
 
304
305
  @property
305
306
  @pulumi.getter
306
- def rate(self) -> Optional[pulumi.Input[float]]:
307
+ def rate(self) -> Optional[pulumi.Input[builtins.float]]:
307
308
  """
308
309
  The maximum number of requests at any given second to be allowed by the quota
309
310
  rule. The `rate` must be positive.
@@ -311,19 +312,19 @@ class _QuotaRateLimitState:
311
312
  return pulumi.get(self, "rate")
312
313
 
313
314
  @rate.setter
314
- def rate(self, value: Optional[pulumi.Input[float]]):
315
+ def rate(self, value: Optional[pulumi.Input[builtins.float]]):
315
316
  pulumi.set(self, "rate", value)
316
317
 
317
318
  @property
318
319
  @pulumi.getter
319
- def role(self) -> Optional[pulumi.Input[str]]:
320
+ def role(self) -> Optional[pulumi.Input[builtins.str]]:
320
321
  """
321
322
  If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
322
323
  """
323
324
  return pulumi.get(self, "role")
324
325
 
325
326
  @role.setter
326
- def role(self, value: Optional[pulumi.Input[str]]):
327
+ def role(self, value: Optional[pulumi.Input[builtins.str]]):
327
328
  pulumi.set(self, "role", value)
328
329
 
329
330
 
@@ -332,14 +333,14 @@ class QuotaRateLimit(pulumi.CustomResource):
332
333
  def __init__(__self__,
333
334
  resource_name: str,
334
335
  opts: Optional[pulumi.ResourceOptions] = None,
335
- block_interval: Optional[pulumi.Input[int]] = None,
336
- inheritable: Optional[pulumi.Input[bool]] = None,
337
- interval: Optional[pulumi.Input[int]] = None,
338
- name: Optional[pulumi.Input[str]] = None,
339
- namespace: Optional[pulumi.Input[str]] = None,
340
- path: Optional[pulumi.Input[str]] = None,
341
- rate: Optional[pulumi.Input[float]] = None,
342
- role: Optional[pulumi.Input[str]] = None,
336
+ block_interval: Optional[pulumi.Input[builtins.int]] = None,
337
+ inheritable: Optional[pulumi.Input[builtins.bool]] = None,
338
+ interval: Optional[pulumi.Input[builtins.int]] = None,
339
+ name: Optional[pulumi.Input[builtins.str]] = None,
340
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
341
+ path: Optional[pulumi.Input[builtins.str]] = None,
342
+ rate: Optional[pulumi.Input[builtins.float]] = None,
343
+ role: Optional[pulumi.Input[builtins.str]] = None,
343
344
  __props__=None):
344
345
  """
345
346
  Manage rate limit quotas which enforce API rate limiting using a token bucket algorithm.
@@ -371,24 +372,24 @@ class QuotaRateLimit(pulumi.CustomResource):
371
372
 
372
373
  :param str resource_name: The name of the resource.
373
374
  :param pulumi.ResourceOptions opts: Options for the resource.
374
- :param pulumi.Input[int] block_interval: If set, when a client reaches a rate limit threshold, the client will
375
+ :param pulumi.Input[builtins.int] block_interval: If set, when a client reaches a rate limit threshold, the client will
375
376
  be prohibited from any further requests until after the 'block_interval' in seconds has elapsed.
376
- :param pulumi.Input[bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
377
- :param pulumi.Input[int] interval: The duration in seconds to enforce rate limiting for.
378
- :param pulumi.Input[str] name: Name of the rate limit quota
379
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
377
+ :param pulumi.Input[builtins.bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
378
+ :param pulumi.Input[builtins.int] interval: The duration in seconds to enforce rate limiting for.
379
+ :param pulumi.Input[builtins.str] name: Name of the rate limit quota
380
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
380
381
  The value should not contain leading or trailing forward slashes.
381
382
  The `namespace` is always relative to the provider's configured namespace.
382
383
  *Available only for Vault Enterprise*.
383
- :param pulumi.Input[str] path: Path of the mount or namespace to apply the quota. A blank path configures a
384
+ :param pulumi.Input[builtins.str] path: Path of the mount or namespace to apply the quota. A blank path configures a
384
385
  global rate limit quota. For example `namespace1/` adds a quota to a full namespace,
385
386
  `namespace1/auth/userpass` adds a `quota` to `userpass` in `namespace1`.
386
387
  Updating this field on an existing quota can have "moving" effects. For example, updating
387
388
  `auth/userpass` to `namespace1/auth/userpass` moves this quota from being a global mount quota to
388
389
  a namespace specific mount quota. **Note, namespaces are supported in Enterprise only.**
389
- :param pulumi.Input[float] rate: The maximum number of requests at any given second to be allowed by the quota
390
+ :param pulumi.Input[builtins.float] rate: The maximum number of requests at any given second to be allowed by the quota
390
391
  rule. The `rate` must be positive.
391
- :param pulumi.Input[str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
392
+ :param pulumi.Input[builtins.str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
392
393
  """
393
394
  ...
394
395
  @overload
@@ -439,14 +440,14 @@ class QuotaRateLimit(pulumi.CustomResource):
439
440
  def _internal_init(__self__,
440
441
  resource_name: str,
441
442
  opts: Optional[pulumi.ResourceOptions] = None,
442
- block_interval: Optional[pulumi.Input[int]] = None,
443
- inheritable: Optional[pulumi.Input[bool]] = None,
444
- interval: Optional[pulumi.Input[int]] = None,
445
- name: Optional[pulumi.Input[str]] = None,
446
- namespace: Optional[pulumi.Input[str]] = None,
447
- path: Optional[pulumi.Input[str]] = None,
448
- rate: Optional[pulumi.Input[float]] = None,
449
- role: Optional[pulumi.Input[str]] = None,
443
+ block_interval: Optional[pulumi.Input[builtins.int]] = None,
444
+ inheritable: Optional[pulumi.Input[builtins.bool]] = None,
445
+ interval: Optional[pulumi.Input[builtins.int]] = None,
446
+ name: Optional[pulumi.Input[builtins.str]] = None,
447
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
448
+ path: Optional[pulumi.Input[builtins.str]] = None,
449
+ rate: Optional[pulumi.Input[builtins.float]] = None,
450
+ role: Optional[pulumi.Input[builtins.str]] = None,
450
451
  __props__=None):
451
452
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
452
453
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -476,14 +477,14 @@ class QuotaRateLimit(pulumi.CustomResource):
476
477
  def get(resource_name: str,
477
478
  id: pulumi.Input[str],
478
479
  opts: Optional[pulumi.ResourceOptions] = None,
479
- block_interval: Optional[pulumi.Input[int]] = None,
480
- inheritable: Optional[pulumi.Input[bool]] = None,
481
- interval: Optional[pulumi.Input[int]] = None,
482
- name: Optional[pulumi.Input[str]] = None,
483
- namespace: Optional[pulumi.Input[str]] = None,
484
- path: Optional[pulumi.Input[str]] = None,
485
- rate: Optional[pulumi.Input[float]] = None,
486
- role: Optional[pulumi.Input[str]] = None) -> 'QuotaRateLimit':
480
+ block_interval: Optional[pulumi.Input[builtins.int]] = None,
481
+ inheritable: Optional[pulumi.Input[builtins.bool]] = None,
482
+ interval: Optional[pulumi.Input[builtins.int]] = None,
483
+ name: Optional[pulumi.Input[builtins.str]] = None,
484
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
485
+ path: Optional[pulumi.Input[builtins.str]] = None,
486
+ rate: Optional[pulumi.Input[builtins.float]] = None,
487
+ role: Optional[pulumi.Input[builtins.str]] = None) -> 'QuotaRateLimit':
487
488
  """
488
489
  Get an existing QuotaRateLimit resource's state with the given name, id, and optional extra
489
490
  properties used to qualify the lookup.
@@ -491,24 +492,24 @@ class QuotaRateLimit(pulumi.CustomResource):
491
492
  :param str resource_name: The unique name of the resulting resource.
492
493
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
493
494
  :param pulumi.ResourceOptions opts: Options for the resource.
494
- :param pulumi.Input[int] block_interval: If set, when a client reaches a rate limit threshold, the client will
495
+ :param pulumi.Input[builtins.int] block_interval: If set, when a client reaches a rate limit threshold, the client will
495
496
  be prohibited from any further requests until after the 'block_interval' in seconds has elapsed.
496
- :param pulumi.Input[bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
497
- :param pulumi.Input[int] interval: The duration in seconds to enforce rate limiting for.
498
- :param pulumi.Input[str] name: Name of the rate limit quota
499
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
497
+ :param pulumi.Input[builtins.bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
498
+ :param pulumi.Input[builtins.int] interval: The duration in seconds to enforce rate limiting for.
499
+ :param pulumi.Input[builtins.str] name: Name of the rate limit quota
500
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
500
501
  The value should not contain leading or trailing forward slashes.
501
502
  The `namespace` is always relative to the provider's configured namespace.
502
503
  *Available only for Vault Enterprise*.
503
- :param pulumi.Input[str] path: Path of the mount or namespace to apply the quota. A blank path configures a
504
+ :param pulumi.Input[builtins.str] path: Path of the mount or namespace to apply the quota. A blank path configures a
504
505
  global rate limit quota. For example `namespace1/` adds a quota to a full namespace,
505
506
  `namespace1/auth/userpass` adds a `quota` to `userpass` in `namespace1`.
506
507
  Updating this field on an existing quota can have "moving" effects. For example, updating
507
508
  `auth/userpass` to `namespace1/auth/userpass` moves this quota from being a global mount quota to
508
509
  a namespace specific mount quota. **Note, namespaces are supported in Enterprise only.**
509
- :param pulumi.Input[float] rate: The maximum number of requests at any given second to be allowed by the quota
510
+ :param pulumi.Input[builtins.float] rate: The maximum number of requests at any given second to be allowed by the quota
510
511
  rule. The `rate` must be positive.
511
- :param pulumi.Input[str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
512
+ :param pulumi.Input[builtins.str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
512
513
  """
513
514
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
514
515
 
@@ -526,7 +527,7 @@ class QuotaRateLimit(pulumi.CustomResource):
526
527
 
527
528
  @property
528
529
  @pulumi.getter(name="blockInterval")
529
- def block_interval(self) -> pulumi.Output[Optional[int]]:
530
+ def block_interval(self) -> pulumi.Output[Optional[builtins.int]]:
530
531
  """
531
532
  If set, when a client reaches a rate limit threshold, the client will
532
533
  be prohibited from any further requests until after the 'block_interval' in seconds has elapsed.
@@ -535,7 +536,7 @@ class QuotaRateLimit(pulumi.CustomResource):
535
536
 
536
537
  @property
537
538
  @pulumi.getter
538
- def inheritable(self) -> pulumi.Output[Optional[bool]]:
539
+ def inheritable(self) -> pulumi.Output[Optional[builtins.bool]]:
539
540
  """
540
541
  If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
541
542
  """
@@ -543,7 +544,7 @@ class QuotaRateLimit(pulumi.CustomResource):
543
544
 
544
545
  @property
545
546
  @pulumi.getter
546
- def interval(self) -> pulumi.Output[int]:
547
+ def interval(self) -> pulumi.Output[builtins.int]:
547
548
  """
548
549
  The duration in seconds to enforce rate limiting for.
549
550
  """
@@ -551,7 +552,7 @@ class QuotaRateLimit(pulumi.CustomResource):
551
552
 
552
553
  @property
553
554
  @pulumi.getter
554
- def name(self) -> pulumi.Output[str]:
555
+ def name(self) -> pulumi.Output[builtins.str]:
555
556
  """
556
557
  Name of the rate limit quota
557
558
  """
@@ -559,7 +560,7 @@ class QuotaRateLimit(pulumi.CustomResource):
559
560
 
560
561
  @property
561
562
  @pulumi.getter
562
- def namespace(self) -> pulumi.Output[Optional[str]]:
563
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
563
564
  """
564
565
  The namespace to provision the resource in.
565
566
  The value should not contain leading or trailing forward slashes.
@@ -570,7 +571,7 @@ class QuotaRateLimit(pulumi.CustomResource):
570
571
 
571
572
  @property
572
573
  @pulumi.getter
573
- def path(self) -> pulumi.Output[Optional[str]]:
574
+ def path(self) -> pulumi.Output[Optional[builtins.str]]:
574
575
  """
575
576
  Path of the mount or namespace to apply the quota. A blank path configures a
576
577
  global rate limit quota. For example `namespace1/` adds a quota to a full namespace,
@@ -583,7 +584,7 @@ class QuotaRateLimit(pulumi.CustomResource):
583
584
 
584
585
  @property
585
586
  @pulumi.getter
586
- def rate(self) -> pulumi.Output[float]:
587
+ def rate(self) -> pulumi.Output[builtins.float]:
587
588
  """
588
589
  The maximum number of requests at any given second to be allowed by the quota
589
590
  rule. The `rate` must be positive.
@@ -592,7 +593,7 @@ class QuotaRateLimit(pulumi.CustomResource):
592
593
 
593
594
  @property
594
595
  @pulumi.getter
595
- def role(self) -> pulumi.Output[Optional[str]]:
596
+ def role(self) -> pulumi.Output[Optional[builtins.str]]:
596
597
  """
597
598
  If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
598
599
  """
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  from .. import _utilities
6
7
  import typing
7
8
  # Export this package's modules as members: