pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -1,5 +1,5 @@
1
1
  {
2
2
  "resource": true,
3
3
  "name": "vault",
4
- "version": "7.2.0-alpha.1752907825"
4
+ "version": "7.2.0-alpha.1753398491"
5
5
  }
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,29 +19,29 @@ __all__ = ['QuotaLeaseCountArgs', 'QuotaLeaseCount']
20
19
  @pulumi.input_type
21
20
  class QuotaLeaseCountArgs:
22
21
  def __init__(__self__, *,
23
- max_leases: pulumi.Input[builtins.int],
24
- inheritable: Optional[pulumi.Input[builtins.bool]] = None,
25
- name: Optional[pulumi.Input[builtins.str]] = None,
26
- namespace: Optional[pulumi.Input[builtins.str]] = None,
27
- path: Optional[pulumi.Input[builtins.str]] = None,
28
- role: Optional[pulumi.Input[builtins.str]] = None):
22
+ max_leases: pulumi.Input[_builtins.int],
23
+ inheritable: Optional[pulumi.Input[_builtins.bool]] = None,
24
+ name: Optional[pulumi.Input[_builtins.str]] = None,
25
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
26
+ path: Optional[pulumi.Input[_builtins.str]] = None,
27
+ role: Optional[pulumi.Input[_builtins.str]] = None):
29
28
  """
30
29
  The set of arguments for constructing a QuotaLeaseCount resource.
31
- :param pulumi.Input[builtins.int] max_leases: The maximum number of leases to be allowed by the quota
30
+ :param pulumi.Input[_builtins.int] max_leases: The maximum number of leases to be allowed by the quota
32
31
  rule. The `max_leases` must be positive.
33
- :param pulumi.Input[builtins.bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
34
- :param pulumi.Input[builtins.str] name: Name of the rate limit quota
35
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
32
+ :param pulumi.Input[_builtins.bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
33
+ :param pulumi.Input[_builtins.str] name: Name of the rate limit quota
34
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
36
35
  The value should not contain leading or trailing forward slashes.
37
36
  The `namespace` is always relative to the provider's configured namespace.
38
37
  *Available only for Vault Enterprise*.
39
- :param pulumi.Input[builtins.str] path: Path of the mount or namespace to apply the quota. A blank path configures a
38
+ :param pulumi.Input[_builtins.str] path: Path of the mount or namespace to apply the quota. A blank path configures a
40
39
  global rate limit quota. For example `namespace1/` adds a quota to a full namespace,
41
40
  `namespace1/auth/userpass` adds a `quota` to `userpass` in `namespace1`.
42
41
  Updating this field on an existing quota can have "moving" effects. For example, updating
43
42
  `auth/userpass` to `namespace1/auth/userpass` moves this quota from being a global mount quota to
44
43
  a namespace specific mount quota. **Note, namespaces are supported in Enterprise only.**
45
- :param pulumi.Input[builtins.str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
44
+ :param pulumi.Input[_builtins.str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
46
45
  """
47
46
  pulumi.set(__self__, "max_leases", max_leases)
48
47
  if inheritable is not None:
@@ -56,9 +55,9 @@ class QuotaLeaseCountArgs:
56
55
  if role is not None:
57
56
  pulumi.set(__self__, "role", role)
58
57
 
59
- @property
58
+ @_builtins.property
60
59
  @pulumi.getter(name="maxLeases")
61
- def max_leases(self) -> pulumi.Input[builtins.int]:
60
+ def max_leases(self) -> pulumi.Input[_builtins.int]:
62
61
  """
63
62
  The maximum number of leases to be allowed by the quota
64
63
  rule. The `max_leases` must be positive.
@@ -66,36 +65,36 @@ class QuotaLeaseCountArgs:
66
65
  return pulumi.get(self, "max_leases")
67
66
 
68
67
  @max_leases.setter
69
- def max_leases(self, value: pulumi.Input[builtins.int]):
68
+ def max_leases(self, value: pulumi.Input[_builtins.int]):
70
69
  pulumi.set(self, "max_leases", value)
71
70
 
72
- @property
71
+ @_builtins.property
73
72
  @pulumi.getter
74
- def inheritable(self) -> Optional[pulumi.Input[builtins.bool]]:
73
+ def inheritable(self) -> Optional[pulumi.Input[_builtins.bool]]:
75
74
  """
76
75
  If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
77
76
  """
78
77
  return pulumi.get(self, "inheritable")
79
78
 
80
79
  @inheritable.setter
81
- def inheritable(self, value: Optional[pulumi.Input[builtins.bool]]):
80
+ def inheritable(self, value: Optional[pulumi.Input[_builtins.bool]]):
82
81
  pulumi.set(self, "inheritable", value)
83
82
 
84
- @property
83
+ @_builtins.property
85
84
  @pulumi.getter
86
- def name(self) -> Optional[pulumi.Input[builtins.str]]:
85
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
87
86
  """
88
87
  Name of the rate limit quota
89
88
  """
90
89
  return pulumi.get(self, "name")
91
90
 
92
91
  @name.setter
93
- def name(self, value: Optional[pulumi.Input[builtins.str]]):
92
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
94
93
  pulumi.set(self, "name", value)
95
94
 
96
- @property
95
+ @_builtins.property
97
96
  @pulumi.getter
98
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
97
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
99
98
  """
100
99
  The namespace to provision the resource in.
101
100
  The value should not contain leading or trailing forward slashes.
@@ -105,12 +104,12 @@ class QuotaLeaseCountArgs:
105
104
  return pulumi.get(self, "namespace")
106
105
 
107
106
  @namespace.setter
108
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
107
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
109
108
  pulumi.set(self, "namespace", value)
110
109
 
111
- @property
110
+ @_builtins.property
112
111
  @pulumi.getter
113
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
112
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
114
113
  """
115
114
  Path of the mount or namespace to apply the quota. A blank path configures a
116
115
  global rate limit quota. For example `namespace1/` adds a quota to a full namespace,
@@ -122,48 +121,48 @@ class QuotaLeaseCountArgs:
122
121
  return pulumi.get(self, "path")
123
122
 
124
123
  @path.setter
125
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
124
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
126
125
  pulumi.set(self, "path", value)
127
126
 
128
- @property
127
+ @_builtins.property
129
128
  @pulumi.getter
130
- def role(self) -> Optional[pulumi.Input[builtins.str]]:
129
+ def role(self) -> Optional[pulumi.Input[_builtins.str]]:
131
130
  """
132
131
  If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
133
132
  """
134
133
  return pulumi.get(self, "role")
135
134
 
136
135
  @role.setter
137
- def role(self, value: Optional[pulumi.Input[builtins.str]]):
136
+ def role(self, value: Optional[pulumi.Input[_builtins.str]]):
138
137
  pulumi.set(self, "role", value)
139
138
 
140
139
 
141
140
  @pulumi.input_type
142
141
  class _QuotaLeaseCountState:
143
142
  def __init__(__self__, *,
144
- inheritable: Optional[pulumi.Input[builtins.bool]] = None,
145
- max_leases: Optional[pulumi.Input[builtins.int]] = None,
146
- name: Optional[pulumi.Input[builtins.str]] = None,
147
- namespace: Optional[pulumi.Input[builtins.str]] = None,
148
- path: Optional[pulumi.Input[builtins.str]] = None,
149
- role: Optional[pulumi.Input[builtins.str]] = None):
143
+ inheritable: Optional[pulumi.Input[_builtins.bool]] = None,
144
+ max_leases: Optional[pulumi.Input[_builtins.int]] = None,
145
+ name: Optional[pulumi.Input[_builtins.str]] = None,
146
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
147
+ path: Optional[pulumi.Input[_builtins.str]] = None,
148
+ role: Optional[pulumi.Input[_builtins.str]] = None):
150
149
  """
151
150
  Input properties used for looking up and filtering QuotaLeaseCount resources.
152
- :param pulumi.Input[builtins.bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
153
- :param pulumi.Input[builtins.int] max_leases: The maximum number of leases to be allowed by the quota
151
+ :param pulumi.Input[_builtins.bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
152
+ :param pulumi.Input[_builtins.int] max_leases: The maximum number of leases to be allowed by the quota
154
153
  rule. The `max_leases` must be positive.
155
- :param pulumi.Input[builtins.str] name: Name of the rate limit quota
156
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
154
+ :param pulumi.Input[_builtins.str] name: Name of the rate limit quota
155
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
157
156
  The value should not contain leading or trailing forward slashes.
158
157
  The `namespace` is always relative to the provider's configured namespace.
159
158
  *Available only for Vault Enterprise*.
160
- :param pulumi.Input[builtins.str] path: Path of the mount or namespace to apply the quota. A blank path configures a
159
+ :param pulumi.Input[_builtins.str] path: Path of the mount or namespace to apply the quota. A blank path configures a
161
160
  global rate limit quota. For example `namespace1/` adds a quota to a full namespace,
162
161
  `namespace1/auth/userpass` adds a `quota` to `userpass` in `namespace1`.
163
162
  Updating this field on an existing quota can have "moving" effects. For example, updating
164
163
  `auth/userpass` to `namespace1/auth/userpass` moves this quota from being a global mount quota to
165
164
  a namespace specific mount quota. **Note, namespaces are supported in Enterprise only.**
166
- :param pulumi.Input[builtins.str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
165
+ :param pulumi.Input[_builtins.str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
167
166
  """
168
167
  if inheritable is not None:
169
168
  pulumi.set(__self__, "inheritable", inheritable)
@@ -178,21 +177,21 @@ class _QuotaLeaseCountState:
178
177
  if role is not None:
179
178
  pulumi.set(__self__, "role", role)
180
179
 
181
- @property
180
+ @_builtins.property
182
181
  @pulumi.getter
183
- def inheritable(self) -> Optional[pulumi.Input[builtins.bool]]:
182
+ def inheritable(self) -> Optional[pulumi.Input[_builtins.bool]]:
184
183
  """
185
184
  If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
186
185
  """
187
186
  return pulumi.get(self, "inheritable")
188
187
 
189
188
  @inheritable.setter
190
- def inheritable(self, value: Optional[pulumi.Input[builtins.bool]]):
189
+ def inheritable(self, value: Optional[pulumi.Input[_builtins.bool]]):
191
190
  pulumi.set(self, "inheritable", value)
192
191
 
193
- @property
192
+ @_builtins.property
194
193
  @pulumi.getter(name="maxLeases")
195
- def max_leases(self) -> Optional[pulumi.Input[builtins.int]]:
194
+ def max_leases(self) -> Optional[pulumi.Input[_builtins.int]]:
196
195
  """
197
196
  The maximum number of leases to be allowed by the quota
198
197
  rule. The `max_leases` must be positive.
@@ -200,24 +199,24 @@ class _QuotaLeaseCountState:
200
199
  return pulumi.get(self, "max_leases")
201
200
 
202
201
  @max_leases.setter
203
- def max_leases(self, value: Optional[pulumi.Input[builtins.int]]):
202
+ def max_leases(self, value: Optional[pulumi.Input[_builtins.int]]):
204
203
  pulumi.set(self, "max_leases", value)
205
204
 
206
- @property
205
+ @_builtins.property
207
206
  @pulumi.getter
208
- def name(self) -> Optional[pulumi.Input[builtins.str]]:
207
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
209
208
  """
210
209
  Name of the rate limit quota
211
210
  """
212
211
  return pulumi.get(self, "name")
213
212
 
214
213
  @name.setter
215
- def name(self, value: Optional[pulumi.Input[builtins.str]]):
214
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
216
215
  pulumi.set(self, "name", value)
217
216
 
218
- @property
217
+ @_builtins.property
219
218
  @pulumi.getter
220
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
219
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
221
220
  """
222
221
  The namespace to provision the resource in.
223
222
  The value should not contain leading or trailing forward slashes.
@@ -227,12 +226,12 @@ class _QuotaLeaseCountState:
227
226
  return pulumi.get(self, "namespace")
228
227
 
229
228
  @namespace.setter
230
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
229
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
231
230
  pulumi.set(self, "namespace", value)
232
231
 
233
- @property
232
+ @_builtins.property
234
233
  @pulumi.getter
235
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
234
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
236
235
  """
237
236
  Path of the mount or namespace to apply the quota. A blank path configures a
238
237
  global rate limit quota. For example `namespace1/` adds a quota to a full namespace,
@@ -244,19 +243,19 @@ class _QuotaLeaseCountState:
244
243
  return pulumi.get(self, "path")
245
244
 
246
245
  @path.setter
247
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
246
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
248
247
  pulumi.set(self, "path", value)
249
248
 
250
- @property
249
+ @_builtins.property
251
250
  @pulumi.getter
252
- def role(self) -> Optional[pulumi.Input[builtins.str]]:
251
+ def role(self) -> Optional[pulumi.Input[_builtins.str]]:
253
252
  """
254
253
  If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
255
254
  """
256
255
  return pulumi.get(self, "role")
257
256
 
258
257
  @role.setter
259
- def role(self, value: Optional[pulumi.Input[builtins.str]]):
258
+ def role(self, value: Optional[pulumi.Input[_builtins.str]]):
260
259
  pulumi.set(self, "role", value)
261
260
 
262
261
 
@@ -266,12 +265,12 @@ class QuotaLeaseCount(pulumi.CustomResource):
266
265
  def __init__(__self__,
267
266
  resource_name: str,
268
267
  opts: Optional[pulumi.ResourceOptions] = None,
269
- inheritable: Optional[pulumi.Input[builtins.bool]] = None,
270
- max_leases: Optional[pulumi.Input[builtins.int]] = None,
271
- name: Optional[pulumi.Input[builtins.str]] = None,
272
- namespace: Optional[pulumi.Input[builtins.str]] = None,
273
- path: Optional[pulumi.Input[builtins.str]] = None,
274
- role: Optional[pulumi.Input[builtins.str]] = None,
268
+ inheritable: Optional[pulumi.Input[_builtins.bool]] = None,
269
+ max_leases: Optional[pulumi.Input[_builtins.int]] = None,
270
+ name: Optional[pulumi.Input[_builtins.str]] = None,
271
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
272
+ path: Optional[pulumi.Input[_builtins.str]] = None,
273
+ role: Optional[pulumi.Input[_builtins.str]] = None,
275
274
  __props__=None):
276
275
  """
277
276
  Manage lease count quotas which enforce the number of leases that can be created.
@@ -305,21 +304,21 @@ class QuotaLeaseCount(pulumi.CustomResource):
305
304
 
306
305
  :param str resource_name: The name of the resource.
307
306
  :param pulumi.ResourceOptions opts: Options for the resource.
308
- :param pulumi.Input[builtins.bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
309
- :param pulumi.Input[builtins.int] max_leases: The maximum number of leases to be allowed by the quota
307
+ :param pulumi.Input[_builtins.bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
308
+ :param pulumi.Input[_builtins.int] max_leases: The maximum number of leases to be allowed by the quota
310
309
  rule. The `max_leases` must be positive.
311
- :param pulumi.Input[builtins.str] name: Name of the rate limit quota
312
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
310
+ :param pulumi.Input[_builtins.str] name: Name of the rate limit quota
311
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
313
312
  The value should not contain leading or trailing forward slashes.
314
313
  The `namespace` is always relative to the provider's configured namespace.
315
314
  *Available only for Vault Enterprise*.
316
- :param pulumi.Input[builtins.str] path: Path of the mount or namespace to apply the quota. A blank path configures a
315
+ :param pulumi.Input[_builtins.str] path: Path of the mount or namespace to apply the quota. A blank path configures a
317
316
  global rate limit quota. For example `namespace1/` adds a quota to a full namespace,
318
317
  `namespace1/auth/userpass` adds a `quota` to `userpass` in `namespace1`.
319
318
  Updating this field on an existing quota can have "moving" effects. For example, updating
320
319
  `auth/userpass` to `namespace1/auth/userpass` moves this quota from being a global mount quota to
321
320
  a namespace specific mount quota. **Note, namespaces are supported in Enterprise only.**
322
- :param pulumi.Input[builtins.str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
321
+ :param pulumi.Input[_builtins.str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
323
322
  """
324
323
  ...
325
324
  @overload
@@ -372,12 +371,12 @@ class QuotaLeaseCount(pulumi.CustomResource):
372
371
  def _internal_init(__self__,
373
372
  resource_name: str,
374
373
  opts: Optional[pulumi.ResourceOptions] = None,
375
- inheritable: Optional[pulumi.Input[builtins.bool]] = None,
376
- max_leases: Optional[pulumi.Input[builtins.int]] = None,
377
- name: Optional[pulumi.Input[builtins.str]] = None,
378
- namespace: Optional[pulumi.Input[builtins.str]] = None,
379
- path: Optional[pulumi.Input[builtins.str]] = None,
380
- role: Optional[pulumi.Input[builtins.str]] = None,
374
+ inheritable: Optional[pulumi.Input[_builtins.bool]] = None,
375
+ max_leases: Optional[pulumi.Input[_builtins.int]] = None,
376
+ name: Optional[pulumi.Input[_builtins.str]] = None,
377
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
378
+ path: Optional[pulumi.Input[_builtins.str]] = None,
379
+ role: Optional[pulumi.Input[_builtins.str]] = None,
381
380
  __props__=None):
382
381
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
383
382
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -405,12 +404,12 @@ class QuotaLeaseCount(pulumi.CustomResource):
405
404
  def get(resource_name: str,
406
405
  id: pulumi.Input[str],
407
406
  opts: Optional[pulumi.ResourceOptions] = None,
408
- inheritable: Optional[pulumi.Input[builtins.bool]] = None,
409
- max_leases: Optional[pulumi.Input[builtins.int]] = None,
410
- name: Optional[pulumi.Input[builtins.str]] = None,
411
- namespace: Optional[pulumi.Input[builtins.str]] = None,
412
- path: Optional[pulumi.Input[builtins.str]] = None,
413
- role: Optional[pulumi.Input[builtins.str]] = None) -> 'QuotaLeaseCount':
407
+ inheritable: Optional[pulumi.Input[_builtins.bool]] = None,
408
+ max_leases: Optional[pulumi.Input[_builtins.int]] = None,
409
+ name: Optional[pulumi.Input[_builtins.str]] = None,
410
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
411
+ path: Optional[pulumi.Input[_builtins.str]] = None,
412
+ role: Optional[pulumi.Input[_builtins.str]] = None) -> 'QuotaLeaseCount':
414
413
  """
415
414
  Get an existing QuotaLeaseCount resource's state with the given name, id, and optional extra
416
415
  properties used to qualify the lookup.
@@ -418,21 +417,21 @@ class QuotaLeaseCount(pulumi.CustomResource):
418
417
  :param str resource_name: The unique name of the resulting resource.
419
418
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
420
419
  :param pulumi.ResourceOptions opts: Options for the resource.
421
- :param pulumi.Input[builtins.bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
422
- :param pulumi.Input[builtins.int] max_leases: The maximum number of leases to be allowed by the quota
420
+ :param pulumi.Input[_builtins.bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
421
+ :param pulumi.Input[_builtins.int] max_leases: The maximum number of leases to be allowed by the quota
423
422
  rule. The `max_leases` must be positive.
424
- :param pulumi.Input[builtins.str] name: Name of the rate limit quota
425
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
423
+ :param pulumi.Input[_builtins.str] name: Name of the rate limit quota
424
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
426
425
  The value should not contain leading or trailing forward slashes.
427
426
  The `namespace` is always relative to the provider's configured namespace.
428
427
  *Available only for Vault Enterprise*.
429
- :param pulumi.Input[builtins.str] path: Path of the mount or namespace to apply the quota. A blank path configures a
428
+ :param pulumi.Input[_builtins.str] path: Path of the mount or namespace to apply the quota. A blank path configures a
430
429
  global rate limit quota. For example `namespace1/` adds a quota to a full namespace,
431
430
  `namespace1/auth/userpass` adds a `quota` to `userpass` in `namespace1`.
432
431
  Updating this field on an existing quota can have "moving" effects. For example, updating
433
432
  `auth/userpass` to `namespace1/auth/userpass` moves this quota from being a global mount quota to
434
433
  a namespace specific mount quota. **Note, namespaces are supported in Enterprise only.**
435
- :param pulumi.Input[builtins.str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
434
+ :param pulumi.Input[_builtins.str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
436
435
  """
437
436
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
438
437
 
@@ -446,34 +445,34 @@ class QuotaLeaseCount(pulumi.CustomResource):
446
445
  __props__.__dict__["role"] = role
447
446
  return QuotaLeaseCount(resource_name, opts=opts, __props__=__props__)
448
447
 
449
- @property
448
+ @_builtins.property
450
449
  @pulumi.getter
451
- def inheritable(self) -> pulumi.Output[Optional[builtins.bool]]:
450
+ def inheritable(self) -> pulumi.Output[Optional[_builtins.bool]]:
452
451
  """
453
452
  If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
454
453
  """
455
454
  return pulumi.get(self, "inheritable")
456
455
 
457
- @property
456
+ @_builtins.property
458
457
  @pulumi.getter(name="maxLeases")
459
- def max_leases(self) -> pulumi.Output[builtins.int]:
458
+ def max_leases(self) -> pulumi.Output[_builtins.int]:
460
459
  """
461
460
  The maximum number of leases to be allowed by the quota
462
461
  rule. The `max_leases` must be positive.
463
462
  """
464
463
  return pulumi.get(self, "max_leases")
465
464
 
466
- @property
465
+ @_builtins.property
467
466
  @pulumi.getter
468
- def name(self) -> pulumi.Output[builtins.str]:
467
+ def name(self) -> pulumi.Output[_builtins.str]:
469
468
  """
470
469
  Name of the rate limit quota
471
470
  """
472
471
  return pulumi.get(self, "name")
473
472
 
474
- @property
473
+ @_builtins.property
475
474
  @pulumi.getter
476
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
475
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
477
476
  """
478
477
  The namespace to provision the resource in.
479
478
  The value should not contain leading or trailing forward slashes.
@@ -482,9 +481,9 @@ class QuotaLeaseCount(pulumi.CustomResource):
482
481
  """
483
482
  return pulumi.get(self, "namespace")
484
483
 
485
- @property
484
+ @_builtins.property
486
485
  @pulumi.getter
487
- def path(self) -> pulumi.Output[Optional[builtins.str]]:
486
+ def path(self) -> pulumi.Output[Optional[_builtins.str]]:
488
487
  """
489
488
  Path of the mount or namespace to apply the quota. A blank path configures a
490
489
  global rate limit quota. For example `namespace1/` adds a quota to a full namespace,
@@ -495,9 +494,9 @@ class QuotaLeaseCount(pulumi.CustomResource):
495
494
  """
496
495
  return pulumi.get(self, "path")
497
496
 
498
- @property
497
+ @_builtins.property
499
498
  @pulumi.getter
500
- def role(self) -> pulumi.Output[Optional[builtins.str]]:
499
+ def role(self) -> pulumi.Output[Optional[_builtins.str]]:
501
500
  """
502
501
  If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
503
502
  """