pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
pulumi_vault/pulumi-plugin.json
CHANGED
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,29 +19,29 @@ __all__ = ['QuotaLeaseCountArgs', 'QuotaLeaseCount']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class QuotaLeaseCountArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
max_leases: pulumi.Input[
|
24
|
-
inheritable: Optional[pulumi.Input[
|
25
|
-
name: Optional[pulumi.Input[
|
26
|
-
namespace: Optional[pulumi.Input[
|
27
|
-
path: Optional[pulumi.Input[
|
28
|
-
role: Optional[pulumi.Input[
|
22
|
+
max_leases: pulumi.Input[_builtins.int],
|
23
|
+
inheritable: Optional[pulumi.Input[_builtins.bool]] = None,
|
24
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
25
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
26
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
27
|
+
role: Optional[pulumi.Input[_builtins.str]] = None):
|
29
28
|
"""
|
30
29
|
The set of arguments for constructing a QuotaLeaseCount resource.
|
31
|
-
:param pulumi.Input[
|
30
|
+
:param pulumi.Input[_builtins.int] max_leases: The maximum number of leases to be allowed by the quota
|
32
31
|
rule. The `max_leases` must be positive.
|
33
|
-
:param pulumi.Input[
|
34
|
-
:param pulumi.Input[
|
35
|
-
:param pulumi.Input[
|
32
|
+
:param pulumi.Input[_builtins.bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
|
33
|
+
:param pulumi.Input[_builtins.str] name: Name of the rate limit quota
|
34
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
36
35
|
The value should not contain leading or trailing forward slashes.
|
37
36
|
The `namespace` is always relative to the provider's configured namespace.
|
38
37
|
*Available only for Vault Enterprise*.
|
39
|
-
:param pulumi.Input[
|
38
|
+
:param pulumi.Input[_builtins.str] path: Path of the mount or namespace to apply the quota. A blank path configures a
|
40
39
|
global rate limit quota. For example `namespace1/` adds a quota to a full namespace,
|
41
40
|
`namespace1/auth/userpass` adds a `quota` to `userpass` in `namespace1`.
|
42
41
|
Updating this field on an existing quota can have "moving" effects. For example, updating
|
43
42
|
`auth/userpass` to `namespace1/auth/userpass` moves this quota from being a global mount quota to
|
44
43
|
a namespace specific mount quota. **Note, namespaces are supported in Enterprise only.**
|
45
|
-
:param pulumi.Input[
|
44
|
+
:param pulumi.Input[_builtins.str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
|
46
45
|
"""
|
47
46
|
pulumi.set(__self__, "max_leases", max_leases)
|
48
47
|
if inheritable is not None:
|
@@ -56,9 +55,9 @@ class QuotaLeaseCountArgs:
|
|
56
55
|
if role is not None:
|
57
56
|
pulumi.set(__self__, "role", role)
|
58
57
|
|
59
|
-
@property
|
58
|
+
@_builtins.property
|
60
59
|
@pulumi.getter(name="maxLeases")
|
61
|
-
def max_leases(self) -> pulumi.Input[
|
60
|
+
def max_leases(self) -> pulumi.Input[_builtins.int]:
|
62
61
|
"""
|
63
62
|
The maximum number of leases to be allowed by the quota
|
64
63
|
rule. The `max_leases` must be positive.
|
@@ -66,36 +65,36 @@ class QuotaLeaseCountArgs:
|
|
66
65
|
return pulumi.get(self, "max_leases")
|
67
66
|
|
68
67
|
@max_leases.setter
|
69
|
-
def max_leases(self, value: pulumi.Input[
|
68
|
+
def max_leases(self, value: pulumi.Input[_builtins.int]):
|
70
69
|
pulumi.set(self, "max_leases", value)
|
71
70
|
|
72
|
-
@property
|
71
|
+
@_builtins.property
|
73
72
|
@pulumi.getter
|
74
|
-
def inheritable(self) -> Optional[pulumi.Input[
|
73
|
+
def inheritable(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
75
74
|
"""
|
76
75
|
If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
|
77
76
|
"""
|
78
77
|
return pulumi.get(self, "inheritable")
|
79
78
|
|
80
79
|
@inheritable.setter
|
81
|
-
def inheritable(self, value: Optional[pulumi.Input[
|
80
|
+
def inheritable(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
82
81
|
pulumi.set(self, "inheritable", value)
|
83
82
|
|
84
|
-
@property
|
83
|
+
@_builtins.property
|
85
84
|
@pulumi.getter
|
86
|
-
def name(self) -> Optional[pulumi.Input[
|
85
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
87
86
|
"""
|
88
87
|
Name of the rate limit quota
|
89
88
|
"""
|
90
89
|
return pulumi.get(self, "name")
|
91
90
|
|
92
91
|
@name.setter
|
93
|
-
def name(self, value: Optional[pulumi.Input[
|
92
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
94
93
|
pulumi.set(self, "name", value)
|
95
94
|
|
96
|
-
@property
|
95
|
+
@_builtins.property
|
97
96
|
@pulumi.getter
|
98
|
-
def namespace(self) -> Optional[pulumi.Input[
|
97
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
99
98
|
"""
|
100
99
|
The namespace to provision the resource in.
|
101
100
|
The value should not contain leading or trailing forward slashes.
|
@@ -105,12 +104,12 @@ class QuotaLeaseCountArgs:
|
|
105
104
|
return pulumi.get(self, "namespace")
|
106
105
|
|
107
106
|
@namespace.setter
|
108
|
-
def namespace(self, value: Optional[pulumi.Input[
|
107
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
109
108
|
pulumi.set(self, "namespace", value)
|
110
109
|
|
111
|
-
@property
|
110
|
+
@_builtins.property
|
112
111
|
@pulumi.getter
|
113
|
-
def path(self) -> Optional[pulumi.Input[
|
112
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
114
113
|
"""
|
115
114
|
Path of the mount or namespace to apply the quota. A blank path configures a
|
116
115
|
global rate limit quota. For example `namespace1/` adds a quota to a full namespace,
|
@@ -122,48 +121,48 @@ class QuotaLeaseCountArgs:
|
|
122
121
|
return pulumi.get(self, "path")
|
123
122
|
|
124
123
|
@path.setter
|
125
|
-
def path(self, value: Optional[pulumi.Input[
|
124
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
126
125
|
pulumi.set(self, "path", value)
|
127
126
|
|
128
|
-
@property
|
127
|
+
@_builtins.property
|
129
128
|
@pulumi.getter
|
130
|
-
def role(self) -> Optional[pulumi.Input[
|
129
|
+
def role(self) -> Optional[pulumi.Input[_builtins.str]]:
|
131
130
|
"""
|
132
131
|
If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
|
133
132
|
"""
|
134
133
|
return pulumi.get(self, "role")
|
135
134
|
|
136
135
|
@role.setter
|
137
|
-
def role(self, value: Optional[pulumi.Input[
|
136
|
+
def role(self, value: Optional[pulumi.Input[_builtins.str]]):
|
138
137
|
pulumi.set(self, "role", value)
|
139
138
|
|
140
139
|
|
141
140
|
@pulumi.input_type
|
142
141
|
class _QuotaLeaseCountState:
|
143
142
|
def __init__(__self__, *,
|
144
|
-
inheritable: Optional[pulumi.Input[
|
145
|
-
max_leases: Optional[pulumi.Input[
|
146
|
-
name: Optional[pulumi.Input[
|
147
|
-
namespace: Optional[pulumi.Input[
|
148
|
-
path: Optional[pulumi.Input[
|
149
|
-
role: Optional[pulumi.Input[
|
143
|
+
inheritable: Optional[pulumi.Input[_builtins.bool]] = None,
|
144
|
+
max_leases: Optional[pulumi.Input[_builtins.int]] = None,
|
145
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
146
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
147
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
148
|
+
role: Optional[pulumi.Input[_builtins.str]] = None):
|
150
149
|
"""
|
151
150
|
Input properties used for looking up and filtering QuotaLeaseCount resources.
|
152
|
-
:param pulumi.Input[
|
153
|
-
:param pulumi.Input[
|
151
|
+
:param pulumi.Input[_builtins.bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
|
152
|
+
:param pulumi.Input[_builtins.int] max_leases: The maximum number of leases to be allowed by the quota
|
154
153
|
rule. The `max_leases` must be positive.
|
155
|
-
:param pulumi.Input[
|
156
|
-
:param pulumi.Input[
|
154
|
+
:param pulumi.Input[_builtins.str] name: Name of the rate limit quota
|
155
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
157
156
|
The value should not contain leading or trailing forward slashes.
|
158
157
|
The `namespace` is always relative to the provider's configured namespace.
|
159
158
|
*Available only for Vault Enterprise*.
|
160
|
-
:param pulumi.Input[
|
159
|
+
:param pulumi.Input[_builtins.str] path: Path of the mount or namespace to apply the quota. A blank path configures a
|
161
160
|
global rate limit quota. For example `namespace1/` adds a quota to a full namespace,
|
162
161
|
`namespace1/auth/userpass` adds a `quota` to `userpass` in `namespace1`.
|
163
162
|
Updating this field on an existing quota can have "moving" effects. For example, updating
|
164
163
|
`auth/userpass` to `namespace1/auth/userpass` moves this quota from being a global mount quota to
|
165
164
|
a namespace specific mount quota. **Note, namespaces are supported in Enterprise only.**
|
166
|
-
:param pulumi.Input[
|
165
|
+
:param pulumi.Input[_builtins.str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
|
167
166
|
"""
|
168
167
|
if inheritable is not None:
|
169
168
|
pulumi.set(__self__, "inheritable", inheritable)
|
@@ -178,21 +177,21 @@ class _QuotaLeaseCountState:
|
|
178
177
|
if role is not None:
|
179
178
|
pulumi.set(__self__, "role", role)
|
180
179
|
|
181
|
-
@property
|
180
|
+
@_builtins.property
|
182
181
|
@pulumi.getter
|
183
|
-
def inheritable(self) -> Optional[pulumi.Input[
|
182
|
+
def inheritable(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
184
183
|
"""
|
185
184
|
If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
|
186
185
|
"""
|
187
186
|
return pulumi.get(self, "inheritable")
|
188
187
|
|
189
188
|
@inheritable.setter
|
190
|
-
def inheritable(self, value: Optional[pulumi.Input[
|
189
|
+
def inheritable(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
191
190
|
pulumi.set(self, "inheritable", value)
|
192
191
|
|
193
|
-
@property
|
192
|
+
@_builtins.property
|
194
193
|
@pulumi.getter(name="maxLeases")
|
195
|
-
def max_leases(self) -> Optional[pulumi.Input[
|
194
|
+
def max_leases(self) -> Optional[pulumi.Input[_builtins.int]]:
|
196
195
|
"""
|
197
196
|
The maximum number of leases to be allowed by the quota
|
198
197
|
rule. The `max_leases` must be positive.
|
@@ -200,24 +199,24 @@ class _QuotaLeaseCountState:
|
|
200
199
|
return pulumi.get(self, "max_leases")
|
201
200
|
|
202
201
|
@max_leases.setter
|
203
|
-
def max_leases(self, value: Optional[pulumi.Input[
|
202
|
+
def max_leases(self, value: Optional[pulumi.Input[_builtins.int]]):
|
204
203
|
pulumi.set(self, "max_leases", value)
|
205
204
|
|
206
|
-
@property
|
205
|
+
@_builtins.property
|
207
206
|
@pulumi.getter
|
208
|
-
def name(self) -> Optional[pulumi.Input[
|
207
|
+
def name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
209
208
|
"""
|
210
209
|
Name of the rate limit quota
|
211
210
|
"""
|
212
211
|
return pulumi.get(self, "name")
|
213
212
|
|
214
213
|
@name.setter
|
215
|
-
def name(self, value: Optional[pulumi.Input[
|
214
|
+
def name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
216
215
|
pulumi.set(self, "name", value)
|
217
216
|
|
218
|
-
@property
|
217
|
+
@_builtins.property
|
219
218
|
@pulumi.getter
|
220
|
-
def namespace(self) -> Optional[pulumi.Input[
|
219
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
221
220
|
"""
|
222
221
|
The namespace to provision the resource in.
|
223
222
|
The value should not contain leading or trailing forward slashes.
|
@@ -227,12 +226,12 @@ class _QuotaLeaseCountState:
|
|
227
226
|
return pulumi.get(self, "namespace")
|
228
227
|
|
229
228
|
@namespace.setter
|
230
|
-
def namespace(self, value: Optional[pulumi.Input[
|
229
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
231
230
|
pulumi.set(self, "namespace", value)
|
232
231
|
|
233
|
-
@property
|
232
|
+
@_builtins.property
|
234
233
|
@pulumi.getter
|
235
|
-
def path(self) -> Optional[pulumi.Input[
|
234
|
+
def path(self) -> Optional[pulumi.Input[_builtins.str]]:
|
236
235
|
"""
|
237
236
|
Path of the mount or namespace to apply the quota. A blank path configures a
|
238
237
|
global rate limit quota. For example `namespace1/` adds a quota to a full namespace,
|
@@ -244,19 +243,19 @@ class _QuotaLeaseCountState:
|
|
244
243
|
return pulumi.get(self, "path")
|
245
244
|
|
246
245
|
@path.setter
|
247
|
-
def path(self, value: Optional[pulumi.Input[
|
246
|
+
def path(self, value: Optional[pulumi.Input[_builtins.str]]):
|
248
247
|
pulumi.set(self, "path", value)
|
249
248
|
|
250
|
-
@property
|
249
|
+
@_builtins.property
|
251
250
|
@pulumi.getter
|
252
|
-
def role(self) -> Optional[pulumi.Input[
|
251
|
+
def role(self) -> Optional[pulumi.Input[_builtins.str]]:
|
253
252
|
"""
|
254
253
|
If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
|
255
254
|
"""
|
256
255
|
return pulumi.get(self, "role")
|
257
256
|
|
258
257
|
@role.setter
|
259
|
-
def role(self, value: Optional[pulumi.Input[
|
258
|
+
def role(self, value: Optional[pulumi.Input[_builtins.str]]):
|
260
259
|
pulumi.set(self, "role", value)
|
261
260
|
|
262
261
|
|
@@ -266,12 +265,12 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
266
265
|
def __init__(__self__,
|
267
266
|
resource_name: str,
|
268
267
|
opts: Optional[pulumi.ResourceOptions] = None,
|
269
|
-
inheritable: Optional[pulumi.Input[
|
270
|
-
max_leases: Optional[pulumi.Input[
|
271
|
-
name: Optional[pulumi.Input[
|
272
|
-
namespace: Optional[pulumi.Input[
|
273
|
-
path: Optional[pulumi.Input[
|
274
|
-
role: Optional[pulumi.Input[
|
268
|
+
inheritable: Optional[pulumi.Input[_builtins.bool]] = None,
|
269
|
+
max_leases: Optional[pulumi.Input[_builtins.int]] = None,
|
270
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
271
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
272
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
273
|
+
role: Optional[pulumi.Input[_builtins.str]] = None,
|
275
274
|
__props__=None):
|
276
275
|
"""
|
277
276
|
Manage lease count quotas which enforce the number of leases that can be created.
|
@@ -305,21 +304,21 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
305
304
|
|
306
305
|
:param str resource_name: The name of the resource.
|
307
306
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
308
|
-
:param pulumi.Input[
|
309
|
-
:param pulumi.Input[
|
307
|
+
:param pulumi.Input[_builtins.bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
|
308
|
+
:param pulumi.Input[_builtins.int] max_leases: The maximum number of leases to be allowed by the quota
|
310
309
|
rule. The `max_leases` must be positive.
|
311
|
-
:param pulumi.Input[
|
312
|
-
:param pulumi.Input[
|
310
|
+
:param pulumi.Input[_builtins.str] name: Name of the rate limit quota
|
311
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
313
312
|
The value should not contain leading or trailing forward slashes.
|
314
313
|
The `namespace` is always relative to the provider's configured namespace.
|
315
314
|
*Available only for Vault Enterprise*.
|
316
|
-
:param pulumi.Input[
|
315
|
+
:param pulumi.Input[_builtins.str] path: Path of the mount or namespace to apply the quota. A blank path configures a
|
317
316
|
global rate limit quota. For example `namespace1/` adds a quota to a full namespace,
|
318
317
|
`namespace1/auth/userpass` adds a `quota` to `userpass` in `namespace1`.
|
319
318
|
Updating this field on an existing quota can have "moving" effects. For example, updating
|
320
319
|
`auth/userpass` to `namespace1/auth/userpass` moves this quota from being a global mount quota to
|
321
320
|
a namespace specific mount quota. **Note, namespaces are supported in Enterprise only.**
|
322
|
-
:param pulumi.Input[
|
321
|
+
:param pulumi.Input[_builtins.str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
|
323
322
|
"""
|
324
323
|
...
|
325
324
|
@overload
|
@@ -372,12 +371,12 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
372
371
|
def _internal_init(__self__,
|
373
372
|
resource_name: str,
|
374
373
|
opts: Optional[pulumi.ResourceOptions] = None,
|
375
|
-
inheritable: Optional[pulumi.Input[
|
376
|
-
max_leases: Optional[pulumi.Input[
|
377
|
-
name: Optional[pulumi.Input[
|
378
|
-
namespace: Optional[pulumi.Input[
|
379
|
-
path: Optional[pulumi.Input[
|
380
|
-
role: Optional[pulumi.Input[
|
374
|
+
inheritable: Optional[pulumi.Input[_builtins.bool]] = None,
|
375
|
+
max_leases: Optional[pulumi.Input[_builtins.int]] = None,
|
376
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
377
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
378
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
379
|
+
role: Optional[pulumi.Input[_builtins.str]] = None,
|
381
380
|
__props__=None):
|
382
381
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
383
382
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -405,12 +404,12 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
405
404
|
def get(resource_name: str,
|
406
405
|
id: pulumi.Input[str],
|
407
406
|
opts: Optional[pulumi.ResourceOptions] = None,
|
408
|
-
inheritable: Optional[pulumi.Input[
|
409
|
-
max_leases: Optional[pulumi.Input[
|
410
|
-
name: Optional[pulumi.Input[
|
411
|
-
namespace: Optional[pulumi.Input[
|
412
|
-
path: Optional[pulumi.Input[
|
413
|
-
role: Optional[pulumi.Input[
|
407
|
+
inheritable: Optional[pulumi.Input[_builtins.bool]] = None,
|
408
|
+
max_leases: Optional[pulumi.Input[_builtins.int]] = None,
|
409
|
+
name: Optional[pulumi.Input[_builtins.str]] = None,
|
410
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
411
|
+
path: Optional[pulumi.Input[_builtins.str]] = None,
|
412
|
+
role: Optional[pulumi.Input[_builtins.str]] = None) -> 'QuotaLeaseCount':
|
414
413
|
"""
|
415
414
|
Get an existing QuotaLeaseCount resource's state with the given name, id, and optional extra
|
416
415
|
properties used to qualify the lookup.
|
@@ -418,21 +417,21 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
418
417
|
:param str resource_name: The unique name of the resulting resource.
|
419
418
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
420
419
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
421
|
-
:param pulumi.Input[
|
422
|
-
:param pulumi.Input[
|
420
|
+
:param pulumi.Input[_builtins.bool] inheritable: If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
|
421
|
+
:param pulumi.Input[_builtins.int] max_leases: The maximum number of leases to be allowed by the quota
|
423
422
|
rule. The `max_leases` must be positive.
|
424
|
-
:param pulumi.Input[
|
425
|
-
:param pulumi.Input[
|
423
|
+
:param pulumi.Input[_builtins.str] name: Name of the rate limit quota
|
424
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
426
425
|
The value should not contain leading or trailing forward slashes.
|
427
426
|
The `namespace` is always relative to the provider's configured namespace.
|
428
427
|
*Available only for Vault Enterprise*.
|
429
|
-
:param pulumi.Input[
|
428
|
+
:param pulumi.Input[_builtins.str] path: Path of the mount or namespace to apply the quota. A blank path configures a
|
430
429
|
global rate limit quota. For example `namespace1/` adds a quota to a full namespace,
|
431
430
|
`namespace1/auth/userpass` adds a `quota` to `userpass` in `namespace1`.
|
432
431
|
Updating this field on an existing quota can have "moving" effects. For example, updating
|
433
432
|
`auth/userpass` to `namespace1/auth/userpass` moves this quota from being a global mount quota to
|
434
433
|
a namespace specific mount quota. **Note, namespaces are supported in Enterprise only.**
|
435
|
-
:param pulumi.Input[
|
434
|
+
:param pulumi.Input[_builtins.str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
|
436
435
|
"""
|
437
436
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
438
437
|
|
@@ -446,34 +445,34 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
446
445
|
__props__.__dict__["role"] = role
|
447
446
|
return QuotaLeaseCount(resource_name, opts=opts, __props__=__props__)
|
448
447
|
|
449
|
-
@property
|
448
|
+
@_builtins.property
|
450
449
|
@pulumi.getter
|
451
|
-
def inheritable(self) -> pulumi.Output[Optional[
|
450
|
+
def inheritable(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
452
451
|
"""
|
453
452
|
If set to `true` on a quota where path is set to a namespace, the same quota will be cumulatively applied to all child namespace. The inheritable parameter cannot be set to `true` if the path does not specify a namespace. Only the quotas associated with the root namespace are inheritable by default. Requires Vault 1.15+.
|
454
453
|
"""
|
455
454
|
return pulumi.get(self, "inheritable")
|
456
455
|
|
457
|
-
@property
|
456
|
+
@_builtins.property
|
458
457
|
@pulumi.getter(name="maxLeases")
|
459
|
-
def max_leases(self) -> pulumi.Output[
|
458
|
+
def max_leases(self) -> pulumi.Output[_builtins.int]:
|
460
459
|
"""
|
461
460
|
The maximum number of leases to be allowed by the quota
|
462
461
|
rule. The `max_leases` must be positive.
|
463
462
|
"""
|
464
463
|
return pulumi.get(self, "max_leases")
|
465
464
|
|
466
|
-
@property
|
465
|
+
@_builtins.property
|
467
466
|
@pulumi.getter
|
468
|
-
def name(self) -> pulumi.Output[
|
467
|
+
def name(self) -> pulumi.Output[_builtins.str]:
|
469
468
|
"""
|
470
469
|
Name of the rate limit quota
|
471
470
|
"""
|
472
471
|
return pulumi.get(self, "name")
|
473
472
|
|
474
|
-
@property
|
473
|
+
@_builtins.property
|
475
474
|
@pulumi.getter
|
476
|
-
def namespace(self) -> pulumi.Output[Optional[
|
475
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
477
476
|
"""
|
478
477
|
The namespace to provision the resource in.
|
479
478
|
The value should not contain leading or trailing forward slashes.
|
@@ -482,9 +481,9 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
482
481
|
"""
|
483
482
|
return pulumi.get(self, "namespace")
|
484
483
|
|
485
|
-
@property
|
484
|
+
@_builtins.property
|
486
485
|
@pulumi.getter
|
487
|
-
def path(self) -> pulumi.Output[Optional[
|
486
|
+
def path(self) -> pulumi.Output[Optional[_builtins.str]]:
|
488
487
|
"""
|
489
488
|
Path of the mount or namespace to apply the quota. A blank path configures a
|
490
489
|
global rate limit quota. For example `namespace1/` adds a quota to a full namespace,
|
@@ -495,9 +494,9 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
495
494
|
"""
|
496
495
|
return pulumi.get(self, "path")
|
497
496
|
|
498
|
-
@property
|
497
|
+
@_builtins.property
|
499
498
|
@pulumi.getter
|
500
|
-
def role(self) -> pulumi.Output[Optional[
|
499
|
+
def role(self) -> pulumi.Output[Optional[_builtins.str]]:
|
501
500
|
"""
|
502
501
|
If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
|
503
502
|
"""
|