pulumi-vault 5.16.0a1694757730__tar.gz → 5.16.0a1697145324__tar.gz
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/PKG-INFO +1 -1
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/cert_auth_backend_role.py +7 -7
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/ldap/secret_backend.py +7 -7
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/quota_lease_count.py +50 -3
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/quota_rate_limit.py +50 -3
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault.egg-info/PKG-INFO +1 -1
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/setup.py +2 -2
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/README.md +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/__init__.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/_inputs.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/_utilities.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/ad/__init__.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/ad/get_access_credentials.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/ad/secret_backend.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/ad/secret_library.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/ad/secret_role.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/alicloud/__init__.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/alicloud/auth_backend_role.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/approle/__init__.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/approle/auth_backend_login.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/approle/auth_backend_role.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/approle/auth_backend_role_secret_id.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/approle/get_auth_backend_role_id.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/audit.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/audit_request_header.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/auth_backend.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/aws/__init__.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/aws/auth_backend_cert.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/aws/auth_backend_client.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/aws/auth_backend_config_identity.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/aws/auth_backend_identity_whitelist.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/aws/auth_backend_login.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/aws/auth_backend_role.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/aws/auth_backend_role_tag.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/aws/auth_backend_roletag_blacklist.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/aws/auth_backend_sts_role.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/aws/get_access_credentials.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/aws/secret_backend.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/aws/secret_backend_role.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/aws/secret_backend_static_role.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/azure/__init__.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/azure/_inputs.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/azure/auth_backend_config.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/azure/auth_backend_role.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/azure/backend.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/azure/backend_role.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/azure/get_access_credentials.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/azure/outputs.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/config/__init__.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/config/outputs.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/config/vars.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/consul/__init__.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/consul/secret_backend.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/consul/secret_backend_role.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/database/__init__.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/database/_inputs.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/database/outputs.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/database/secret_backend_connection.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/database/secret_backend_role.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/database/secret_backend_static_role.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/database/secrets_mount.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/egp_policy.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/gcp/__init__.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/gcp/_inputs.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/gcp/auth_backend.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/gcp/auth_backend_role.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/gcp/get_auth_backend_role.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/gcp/outputs.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/gcp/secret_backend.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/gcp/secret_impersonated_account.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/gcp/secret_roleset.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/gcp/secret_static_account.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/generic/__init__.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/generic/endpoint.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/generic/get_secret.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/generic/secret.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/get_auth_backend.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/get_nomad_access_token.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/get_policy_document.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/github/__init__.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/github/_inputs.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/github/auth_backend.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/github/outputs.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/github/team.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/github/user.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/__init__.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/entity.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/entity_alias.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/entity_policies.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/get_entity.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/get_group.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/get_oidc_client_creds.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/get_oidc_openid_config.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/get_oidc_public_keys.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/group.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/group_alias.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/group_member_entity_ids.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/group_member_group_ids.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/group_policies.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/mfa_duo.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/mfa_login_enforcement.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/mfa_okta.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/mfa_pingid.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/mfa_totp.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/oidc.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/oidc_assignment.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/oidc_client.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/oidc_key.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/oidc_key_allowed_client_id.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/oidc_provider.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/oidc_role.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/oidc_scope.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/identity/outputs.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/jwt/__init__.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/jwt/_inputs.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/jwt/auth_backend.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/jwt/auth_backend_role.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/jwt/outputs.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kmip/__init__.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kmip/secret_backend.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kmip/secret_role.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kmip/secret_scope.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kubernetes/__init__.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kubernetes/auth_backend_config.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kubernetes/auth_backend_role.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kubernetes/get_auth_backend_config.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kubernetes/get_auth_backend_role.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kubernetes/get_service_account_token.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kubernetes/secret_backend.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kubernetes/secret_backend_role.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kv/__init__.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kv/_inputs.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kv/get_secret.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kv/get_secret_subkeys_v2.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kv/get_secret_v2.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kv/get_secrets_list.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kv/get_secrets_list_v2.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kv/outputs.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kv/secret.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kv/secret_backend_v2.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/kv/secret_v2.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/ldap/__init__.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/ldap/auth_backend.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/ldap/auth_backend_group.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/ldap/auth_backend_user.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/ldap/secret_backend_dynamic_role.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/ldap/secret_backend_library_set.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/ldap/secret_backend_static_role.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/managed/__init__.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/managed/_inputs.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/managed/keys.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/managed/outputs.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/mfa_duo.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/mfa_okta.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/mfa_pingid.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/mfa_totp.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/mongodbatlas/__init__.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/mongodbatlas/secret_backend.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/mongodbatlas/secret_role.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/mount.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/namespace.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/nomad_secret_backend.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/nomad_secret_role.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/okta/__init__.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/okta/_inputs.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/okta/auth_backend.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/okta/auth_backend_group.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/okta/auth_backend_user.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/okta/outputs.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/outputs.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/password_policy.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/pkisecret/__init__.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/pkisecret/secret_backend_cert.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/pkisecret/secret_backend_config_ca.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/pkisecret/secret_backend_config_issuers.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/pkisecret/secret_backend_config_urls.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/pkisecret/secret_backend_crl_config.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/pkisecret/secret_backend_issuer.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/pkisecret/secret_backend_key.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/pkisecret/secret_backend_role.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/pkisecret/secret_backend_root_cert.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/pkisecret/secret_backend_sign.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/policy.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/provider.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/pulumi-plugin.json +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/py.typed +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/rabbitmq/__init__.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/rabbitmq/_inputs.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/rabbitmq/outputs.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/rabbitmq/secret_backend.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/rabbitmq/secret_backend_role.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/raft_autopilot.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/raft_snapshot_agent_config.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/rgp_policy.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/ssh/__init__.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/ssh/_inputs.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/ssh/outputs.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/ssh/secret_backend_ca.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/ssh/secret_backend_role.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/terraformcloud/__init__.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/terraformcloud/secret_backend.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/terraformcloud/secret_creds.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/terraformcloud/secret_role.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/token.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/tokenauth/__init__.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/tokenauth/auth_backend_role.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/transform/__init__.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/transform/alphabet.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/transform/get_decode.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/transform/get_encode.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/transform/role.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/transform/template.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/transform/transformation.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/transit/__init__.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/transit/get_decrypt.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/transit/get_encrypt.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/transit/secret_backend_key.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/transit/secret_cache_config.py +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault.egg-info/SOURCES.txt +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault.egg-info/dependency_links.txt +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault.egg-info/not-zip-safe +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault.egg-info/requires.txt +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault.egg-info/top_level.txt +0 -0
- {pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/setup.cfg +0 -0
@@ -42,7 +42,7 @@ class CertAuthBackendRoleArgs:
|
|
42
42
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_common_names: Allowed the common names for authenticated client certificates
|
43
43
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_dns_sans: Allowed alternative dns names for authenticated client certificates
|
44
44
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_email_sans: Allowed emails for authenticated client certificates
|
45
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_names: Allowed subject names for authenticated client certificates
|
45
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_names: DEPRECATED: Please use the individual `allowed_X_sans` parameters instead. Allowed subject names for authenticated client certificates
|
46
46
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_organizational_units: Allowed organization units for authenticated client certificates.
|
47
47
|
*In previous provider releases this field was incorrectly named `allowed_organization_units`, please update accordingly*
|
48
48
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_uri_sans: Allowed URIs for authenticated client certificates
|
@@ -180,7 +180,7 @@ class CertAuthBackendRoleArgs:
|
|
180
180
|
@pulumi.getter(name="allowedNames")
|
181
181
|
def allowed_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
182
182
|
"""
|
183
|
-
Allowed subject names for authenticated client certificates
|
183
|
+
DEPRECATED: Please use the individual `allowed_X_sans` parameters instead. Allowed subject names for authenticated client certificates
|
184
184
|
"""
|
185
185
|
return pulumi.get(self, "allowed_names")
|
186
186
|
|
@@ -441,7 +441,7 @@ class _CertAuthBackendRoleState:
|
|
441
441
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_common_names: Allowed the common names for authenticated client certificates
|
442
442
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_dns_sans: Allowed alternative dns names for authenticated client certificates
|
443
443
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_email_sans: Allowed emails for authenticated client certificates
|
444
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_names: Allowed subject names for authenticated client certificates
|
444
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_names: DEPRECATED: Please use the individual `allowed_X_sans` parameters instead. Allowed subject names for authenticated client certificates
|
445
445
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_organizational_units: Allowed organization units for authenticated client certificates.
|
446
446
|
*In previous provider releases this field was incorrectly named `allowed_organization_units`, please update accordingly*
|
447
447
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_uri_sans: Allowed URIs for authenticated client certificates
|
@@ -569,7 +569,7 @@ class _CertAuthBackendRoleState:
|
|
569
569
|
@pulumi.getter(name="allowedNames")
|
570
570
|
def allowed_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
571
571
|
"""
|
572
|
-
Allowed subject names for authenticated client certificates
|
572
|
+
DEPRECATED: Please use the individual `allowed_X_sans` parameters instead. Allowed subject names for authenticated client certificates
|
573
573
|
"""
|
574
574
|
return pulumi.get(self, "allowed_names")
|
575
575
|
|
@@ -869,7 +869,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
869
869
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_common_names: Allowed the common names for authenticated client certificates
|
870
870
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_dns_sans: Allowed alternative dns names for authenticated client certificates
|
871
871
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_email_sans: Allowed emails for authenticated client certificates
|
872
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_names: Allowed subject names for authenticated client certificates
|
872
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_names: DEPRECATED: Please use the individual `allowed_X_sans` parameters instead. Allowed subject names for authenticated client certificates
|
873
873
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_organizational_units: Allowed organization units for authenticated client certificates.
|
874
874
|
*In previous provider releases this field was incorrectly named `allowed_organization_units`, please update accordingly*
|
875
875
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_uri_sans: Allowed URIs for authenticated client certificates
|
@@ -1054,7 +1054,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1054
1054
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_common_names: Allowed the common names for authenticated client certificates
|
1055
1055
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_dns_sans: Allowed alternative dns names for authenticated client certificates
|
1056
1056
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_email_sans: Allowed emails for authenticated client certificates
|
1057
|
-
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_names: Allowed subject names for authenticated client certificates
|
1057
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_names: DEPRECATED: Please use the individual `allowed_X_sans` parameters instead. Allowed subject names for authenticated client certificates
|
1058
1058
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_organizational_units: Allowed organization units for authenticated client certificates.
|
1059
1059
|
*In previous provider releases this field was incorrectly named `allowed_organization_units`, please update accordingly*
|
1060
1060
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_uri_sans: Allowed URIs for authenticated client certificates
|
@@ -1150,7 +1150,7 @@ class CertAuthBackendRole(pulumi.CustomResource):
|
|
1150
1150
|
@pulumi.getter(name="allowedNames")
|
1151
1151
|
def allowed_names(self) -> pulumi.Output[Sequence[str]]:
|
1152
1152
|
"""
|
1153
|
-
Allowed subject names for authenticated client certificates
|
1153
|
+
DEPRECATED: Please use the individual `allowed_X_sans` parameters instead. Allowed subject names for authenticated client certificates
|
1154
1154
|
"""
|
1155
1155
|
return pulumi.get(self, "allowed_names")
|
1156
1156
|
|
@@ -77,7 +77,7 @@ class SecretBackendArgs:
|
|
77
77
|
not begin or end with a `/`. Defaults to `ldap`.
|
78
78
|
:param pulumi.Input[int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
|
79
79
|
before returning back an error.
|
80
|
-
:param pulumi.Input[str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include openldap
|
80
|
+
:param pulumi.Input[str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
|
81
81
|
:param pulumi.Input[bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
82
82
|
:param pulumi.Input[bool] starttls: Issue a StartTLS command after establishing unencrypted connection.
|
83
83
|
:param pulumi.Input[str] upndomain: Enables userPrincipalDomain login with [username]@UPNDomain.
|
@@ -424,7 +424,7 @@ class SecretBackendArgs:
|
|
424
424
|
@pulumi.getter
|
425
425
|
def schema(self) -> Optional[pulumi.Input[str]]:
|
426
426
|
"""
|
427
|
-
The LDAP schema to use when storing entry passwords. Valid schemas include openldap
|
427
|
+
The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
|
428
428
|
"""
|
429
429
|
return pulumi.get(self, "schema")
|
430
430
|
|
@@ -574,7 +574,7 @@ class _SecretBackendState:
|
|
574
574
|
not begin or end with a `/`. Defaults to `ldap`.
|
575
575
|
:param pulumi.Input[int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
|
576
576
|
before returning back an error.
|
577
|
-
:param pulumi.Input[str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include openldap
|
577
|
+
:param pulumi.Input[str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
|
578
578
|
:param pulumi.Input[bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
579
579
|
:param pulumi.Input[bool] starttls: Issue a StartTLS command after establishing unencrypted connection.
|
580
580
|
:param pulumi.Input[str] upndomain: Enables userPrincipalDomain login with [username]@UPNDomain.
|
@@ -937,7 +937,7 @@ class _SecretBackendState:
|
|
937
937
|
@pulumi.getter
|
938
938
|
def schema(self) -> Optional[pulumi.Input[str]]:
|
939
939
|
"""
|
940
|
-
The LDAP schema to use when storing entry passwords. Valid schemas include openldap
|
940
|
+
The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
|
941
941
|
"""
|
942
942
|
return pulumi.get(self, "schema")
|
943
943
|
|
@@ -1112,7 +1112,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1112
1112
|
not begin or end with a `/`. Defaults to `ldap`.
|
1113
1113
|
:param pulumi.Input[int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
|
1114
1114
|
before returning back an error.
|
1115
|
-
:param pulumi.Input[str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include openldap
|
1115
|
+
:param pulumi.Input[str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
|
1116
1116
|
:param pulumi.Input[bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1117
1117
|
:param pulumi.Input[bool] starttls: Issue a StartTLS command after establishing unencrypted connection.
|
1118
1118
|
:param pulumi.Input[str] upndomain: Enables userPrincipalDomain login with [username]@UPNDomain.
|
@@ -1323,7 +1323,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1323
1323
|
not begin or end with a `/`. Defaults to `ldap`.
|
1324
1324
|
:param pulumi.Input[int] request_timeout: Timeout, in seconds, for the connection when making requests against the server
|
1325
1325
|
before returning back an error.
|
1326
|
-
:param pulumi.Input[str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include openldap
|
1326
|
+
:param pulumi.Input[str] schema: The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
|
1327
1327
|
:param pulumi.Input[bool] seal_wrap: Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
|
1328
1328
|
:param pulumi.Input[bool] starttls: Issue a StartTLS command after establishing unencrypted connection.
|
1329
1329
|
:param pulumi.Input[str] upndomain: Enables userPrincipalDomain login with [username]@UPNDomain.
|
@@ -1566,7 +1566,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
1566
1566
|
@pulumi.getter
|
1567
1567
|
def schema(self) -> pulumi.Output[str]:
|
1568
1568
|
"""
|
1569
|
-
The LDAP schema to use when storing entry passwords. Valid schemas include openldap
|
1569
|
+
The LDAP schema to use when storing entry passwords. Valid schemas include `openldap`, `ad`, and `racf`. Default is `openldap`.
|
1570
1570
|
"""
|
1571
1571
|
return pulumi.get(self, "schema")
|
1572
1572
|
|
{pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/quota_lease_count.py
RENAMED
@@ -17,7 +17,8 @@ class QuotaLeaseCountArgs:
|
|
17
17
|
max_leases: pulumi.Input[int],
|
18
18
|
name: Optional[pulumi.Input[str]] = None,
|
19
19
|
namespace: Optional[pulumi.Input[str]] = None,
|
20
|
-
path: Optional[pulumi.Input[str]] = None
|
20
|
+
path: Optional[pulumi.Input[str]] = None,
|
21
|
+
role: Optional[pulumi.Input[str]] = None):
|
21
22
|
"""
|
22
23
|
The set of arguments for constructing a QuotaLeaseCount resource.
|
23
24
|
:param pulumi.Input[int] max_leases: The maximum number of leases to be allowed by the quota
|
@@ -33,6 +34,7 @@ class QuotaLeaseCountArgs:
|
|
33
34
|
Updating this field on an existing quota can have "moving" effects. For example, updating
|
34
35
|
`auth/userpass` to `namespace1/auth/userpass` moves this quota from being a global mount quota to
|
35
36
|
a namespace specific mount quota. **Note, namespaces are supported in Enterprise only.**
|
37
|
+
:param pulumi.Input[str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
|
36
38
|
"""
|
37
39
|
pulumi.set(__self__, "max_leases", max_leases)
|
38
40
|
if name is not None:
|
@@ -41,6 +43,8 @@ class QuotaLeaseCountArgs:
|
|
41
43
|
pulumi.set(__self__, "namespace", namespace)
|
42
44
|
if path is not None:
|
43
45
|
pulumi.set(__self__, "path", path)
|
46
|
+
if role is not None:
|
47
|
+
pulumi.set(__self__, "role", role)
|
44
48
|
|
45
49
|
@property
|
46
50
|
@pulumi.getter(name="maxLeases")
|
@@ -99,6 +103,18 @@ class QuotaLeaseCountArgs:
|
|
99
103
|
def path(self, value: Optional[pulumi.Input[str]]):
|
100
104
|
pulumi.set(self, "path", value)
|
101
105
|
|
106
|
+
@property
|
107
|
+
@pulumi.getter
|
108
|
+
def role(self) -> Optional[pulumi.Input[str]]:
|
109
|
+
"""
|
110
|
+
If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
|
111
|
+
"""
|
112
|
+
return pulumi.get(self, "role")
|
113
|
+
|
114
|
+
@role.setter
|
115
|
+
def role(self, value: Optional[pulumi.Input[str]]):
|
116
|
+
pulumi.set(self, "role", value)
|
117
|
+
|
102
118
|
|
103
119
|
@pulumi.input_type
|
104
120
|
class _QuotaLeaseCountState:
|
@@ -106,7 +122,8 @@ class _QuotaLeaseCountState:
|
|
106
122
|
max_leases: Optional[pulumi.Input[int]] = None,
|
107
123
|
name: Optional[pulumi.Input[str]] = None,
|
108
124
|
namespace: Optional[pulumi.Input[str]] = None,
|
109
|
-
path: Optional[pulumi.Input[str]] = None
|
125
|
+
path: Optional[pulumi.Input[str]] = None,
|
126
|
+
role: Optional[pulumi.Input[str]] = None):
|
110
127
|
"""
|
111
128
|
Input properties used for looking up and filtering QuotaLeaseCount resources.
|
112
129
|
:param pulumi.Input[int] max_leases: The maximum number of leases to be allowed by the quota
|
@@ -122,6 +139,7 @@ class _QuotaLeaseCountState:
|
|
122
139
|
Updating this field on an existing quota can have "moving" effects. For example, updating
|
123
140
|
`auth/userpass` to `namespace1/auth/userpass` moves this quota from being a global mount quota to
|
124
141
|
a namespace specific mount quota. **Note, namespaces are supported in Enterprise only.**
|
142
|
+
:param pulumi.Input[str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
|
125
143
|
"""
|
126
144
|
if max_leases is not None:
|
127
145
|
pulumi.set(__self__, "max_leases", max_leases)
|
@@ -131,6 +149,8 @@ class _QuotaLeaseCountState:
|
|
131
149
|
pulumi.set(__self__, "namespace", namespace)
|
132
150
|
if path is not None:
|
133
151
|
pulumi.set(__self__, "path", path)
|
152
|
+
if role is not None:
|
153
|
+
pulumi.set(__self__, "role", role)
|
134
154
|
|
135
155
|
@property
|
136
156
|
@pulumi.getter(name="maxLeases")
|
@@ -189,6 +209,18 @@ class _QuotaLeaseCountState:
|
|
189
209
|
def path(self, value: Optional[pulumi.Input[str]]):
|
190
210
|
pulumi.set(self, "path", value)
|
191
211
|
|
212
|
+
@property
|
213
|
+
@pulumi.getter
|
214
|
+
def role(self) -> Optional[pulumi.Input[str]]:
|
215
|
+
"""
|
216
|
+
If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
|
217
|
+
"""
|
218
|
+
return pulumi.get(self, "role")
|
219
|
+
|
220
|
+
@role.setter
|
221
|
+
def role(self, value: Optional[pulumi.Input[str]]):
|
222
|
+
pulumi.set(self, "role", value)
|
223
|
+
|
192
224
|
|
193
225
|
class QuotaLeaseCount(pulumi.CustomResource):
|
194
226
|
@overload
|
@@ -199,6 +231,7 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
199
231
|
name: Optional[pulumi.Input[str]] = None,
|
200
232
|
namespace: Optional[pulumi.Input[str]] = None,
|
201
233
|
path: Optional[pulumi.Input[str]] = None,
|
234
|
+
role: Optional[pulumi.Input[str]] = None,
|
202
235
|
__props__=None):
|
203
236
|
"""
|
204
237
|
Manage lease count quotas which enforce the number of leases that can be created.
|
@@ -244,6 +277,7 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
244
277
|
Updating this field on an existing quota can have "moving" effects. For example, updating
|
245
278
|
`auth/userpass` to `namespace1/auth/userpass` moves this quota from being a global mount quota to
|
246
279
|
a namespace specific mount quota. **Note, namespaces are supported in Enterprise only.**
|
280
|
+
:param pulumi.Input[str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
|
247
281
|
"""
|
248
282
|
...
|
249
283
|
@overload
|
@@ -299,6 +333,7 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
299
333
|
name: Optional[pulumi.Input[str]] = None,
|
300
334
|
namespace: Optional[pulumi.Input[str]] = None,
|
301
335
|
path: Optional[pulumi.Input[str]] = None,
|
336
|
+
role: Optional[pulumi.Input[str]] = None,
|
302
337
|
__props__=None):
|
303
338
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
304
339
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -314,6 +349,7 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
314
349
|
__props__.__dict__["name"] = name
|
315
350
|
__props__.__dict__["namespace"] = namespace
|
316
351
|
__props__.__dict__["path"] = path
|
352
|
+
__props__.__dict__["role"] = role
|
317
353
|
super(QuotaLeaseCount, __self__).__init__(
|
318
354
|
'vault:index/quotaLeaseCount:QuotaLeaseCount',
|
319
355
|
resource_name,
|
@@ -327,7 +363,8 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
327
363
|
max_leases: Optional[pulumi.Input[int]] = None,
|
328
364
|
name: Optional[pulumi.Input[str]] = None,
|
329
365
|
namespace: Optional[pulumi.Input[str]] = None,
|
330
|
-
path: Optional[pulumi.Input[str]] = None
|
366
|
+
path: Optional[pulumi.Input[str]] = None,
|
367
|
+
role: Optional[pulumi.Input[str]] = None) -> 'QuotaLeaseCount':
|
331
368
|
"""
|
332
369
|
Get an existing QuotaLeaseCount resource's state with the given name, id, and optional extra
|
333
370
|
properties used to qualify the lookup.
|
@@ -348,6 +385,7 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
348
385
|
Updating this field on an existing quota can have "moving" effects. For example, updating
|
349
386
|
`auth/userpass` to `namespace1/auth/userpass` moves this quota from being a global mount quota to
|
350
387
|
a namespace specific mount quota. **Note, namespaces are supported in Enterprise only.**
|
388
|
+
:param pulumi.Input[str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
|
351
389
|
"""
|
352
390
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
353
391
|
|
@@ -357,6 +395,7 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
357
395
|
__props__.__dict__["name"] = name
|
358
396
|
__props__.__dict__["namespace"] = namespace
|
359
397
|
__props__.__dict__["path"] = path
|
398
|
+
__props__.__dict__["role"] = role
|
360
399
|
return QuotaLeaseCount(resource_name, opts=opts, __props__=__props__)
|
361
400
|
|
362
401
|
@property
|
@@ -400,3 +439,11 @@ class QuotaLeaseCount(pulumi.CustomResource):
|
|
400
439
|
"""
|
401
440
|
return pulumi.get(self, "path")
|
402
441
|
|
442
|
+
@property
|
443
|
+
@pulumi.getter
|
444
|
+
def role(self) -> pulumi.Output[Optional[str]]:
|
445
|
+
"""
|
446
|
+
If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
|
447
|
+
"""
|
448
|
+
return pulumi.get(self, "role")
|
449
|
+
|
{pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/quota_rate_limit.py
RENAMED
@@ -19,7 +19,8 @@ class QuotaRateLimitArgs:
|
|
19
19
|
interval: Optional[pulumi.Input[int]] = None,
|
20
20
|
name: Optional[pulumi.Input[str]] = None,
|
21
21
|
namespace: Optional[pulumi.Input[str]] = None,
|
22
|
-
path: Optional[pulumi.Input[str]] = None
|
22
|
+
path: Optional[pulumi.Input[str]] = None,
|
23
|
+
role: Optional[pulumi.Input[str]] = None):
|
23
24
|
"""
|
24
25
|
The set of arguments for constructing a QuotaRateLimit resource.
|
25
26
|
:param pulumi.Input[float] rate: The maximum number of requests at any given second to be allowed by the quota
|
@@ -38,6 +39,7 @@ class QuotaRateLimitArgs:
|
|
38
39
|
Updating this field on an existing quota can have "moving" effects. For example, updating
|
39
40
|
`auth/userpass` to `namespace1/auth/userpass` moves this quota from being a global mount quota to
|
40
41
|
a namespace specific mount quota. **Note, namespaces are supported in Enterprise only.**
|
42
|
+
:param pulumi.Input[str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
|
41
43
|
"""
|
42
44
|
pulumi.set(__self__, "rate", rate)
|
43
45
|
if block_interval is not None:
|
@@ -50,6 +52,8 @@ class QuotaRateLimitArgs:
|
|
50
52
|
pulumi.set(__self__, "namespace", namespace)
|
51
53
|
if path is not None:
|
52
54
|
pulumi.set(__self__, "path", path)
|
55
|
+
if role is not None:
|
56
|
+
pulumi.set(__self__, "role", role)
|
53
57
|
|
54
58
|
@property
|
55
59
|
@pulumi.getter
|
@@ -133,6 +137,18 @@ class QuotaRateLimitArgs:
|
|
133
137
|
def path(self, value: Optional[pulumi.Input[str]]):
|
134
138
|
pulumi.set(self, "path", value)
|
135
139
|
|
140
|
+
@property
|
141
|
+
@pulumi.getter
|
142
|
+
def role(self) -> Optional[pulumi.Input[str]]:
|
143
|
+
"""
|
144
|
+
If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
|
145
|
+
"""
|
146
|
+
return pulumi.get(self, "role")
|
147
|
+
|
148
|
+
@role.setter
|
149
|
+
def role(self, value: Optional[pulumi.Input[str]]):
|
150
|
+
pulumi.set(self, "role", value)
|
151
|
+
|
136
152
|
|
137
153
|
@pulumi.input_type
|
138
154
|
class _QuotaRateLimitState:
|
@@ -142,7 +158,8 @@ class _QuotaRateLimitState:
|
|
142
158
|
name: Optional[pulumi.Input[str]] = None,
|
143
159
|
namespace: Optional[pulumi.Input[str]] = None,
|
144
160
|
path: Optional[pulumi.Input[str]] = None,
|
145
|
-
rate: Optional[pulumi.Input[float]] = None
|
161
|
+
rate: Optional[pulumi.Input[float]] = None,
|
162
|
+
role: Optional[pulumi.Input[str]] = None):
|
146
163
|
"""
|
147
164
|
Input properties used for looking up and filtering QuotaRateLimit resources.
|
148
165
|
:param pulumi.Input[int] block_interval: If set, when a client reaches a rate limit threshold, the client will
|
@@ -161,6 +178,7 @@ class _QuotaRateLimitState:
|
|
161
178
|
a namespace specific mount quota. **Note, namespaces are supported in Enterprise only.**
|
162
179
|
:param pulumi.Input[float] rate: The maximum number of requests at any given second to be allowed by the quota
|
163
180
|
rule. The `rate` must be positive.
|
181
|
+
:param pulumi.Input[str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
|
164
182
|
"""
|
165
183
|
if block_interval is not None:
|
166
184
|
pulumi.set(__self__, "block_interval", block_interval)
|
@@ -174,6 +192,8 @@ class _QuotaRateLimitState:
|
|
174
192
|
pulumi.set(__self__, "path", path)
|
175
193
|
if rate is not None:
|
176
194
|
pulumi.set(__self__, "rate", rate)
|
195
|
+
if role is not None:
|
196
|
+
pulumi.set(__self__, "role", role)
|
177
197
|
|
178
198
|
@property
|
179
199
|
@pulumi.getter(name="blockInterval")
|
@@ -257,6 +277,18 @@ class _QuotaRateLimitState:
|
|
257
277
|
def rate(self, value: Optional[pulumi.Input[float]]):
|
258
278
|
pulumi.set(self, "rate", value)
|
259
279
|
|
280
|
+
@property
|
281
|
+
@pulumi.getter
|
282
|
+
def role(self) -> Optional[pulumi.Input[str]]:
|
283
|
+
"""
|
284
|
+
If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
|
285
|
+
"""
|
286
|
+
return pulumi.get(self, "role")
|
287
|
+
|
288
|
+
@role.setter
|
289
|
+
def role(self, value: Optional[pulumi.Input[str]]):
|
290
|
+
pulumi.set(self, "role", value)
|
291
|
+
|
260
292
|
|
261
293
|
class QuotaRateLimit(pulumi.CustomResource):
|
262
294
|
@overload
|
@@ -269,6 +301,7 @@ class QuotaRateLimit(pulumi.CustomResource):
|
|
269
301
|
namespace: Optional[pulumi.Input[str]] = None,
|
270
302
|
path: Optional[pulumi.Input[str]] = None,
|
271
303
|
rate: Optional[pulumi.Input[float]] = None,
|
304
|
+
role: Optional[pulumi.Input[str]] = None,
|
272
305
|
__props__=None):
|
273
306
|
"""
|
274
307
|
Manage rate limit quotas which enforce API rate limiting using a token bucket algorithm.
|
@@ -315,6 +348,7 @@ class QuotaRateLimit(pulumi.CustomResource):
|
|
315
348
|
a namespace specific mount quota. **Note, namespaces are supported in Enterprise only.**
|
316
349
|
:param pulumi.Input[float] rate: The maximum number of requests at any given second to be allowed by the quota
|
317
350
|
rule. The `rate` must be positive.
|
351
|
+
:param pulumi.Input[str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
|
318
352
|
"""
|
319
353
|
...
|
320
354
|
@overload
|
@@ -370,6 +404,7 @@ class QuotaRateLimit(pulumi.CustomResource):
|
|
370
404
|
namespace: Optional[pulumi.Input[str]] = None,
|
371
405
|
path: Optional[pulumi.Input[str]] = None,
|
372
406
|
rate: Optional[pulumi.Input[float]] = None,
|
407
|
+
role: Optional[pulumi.Input[str]] = None,
|
373
408
|
__props__=None):
|
374
409
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
375
410
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -387,6 +422,7 @@ class QuotaRateLimit(pulumi.CustomResource):
|
|
387
422
|
if rate is None and not opts.urn:
|
388
423
|
raise TypeError("Missing required property 'rate'")
|
389
424
|
__props__.__dict__["rate"] = rate
|
425
|
+
__props__.__dict__["role"] = role
|
390
426
|
super(QuotaRateLimit, __self__).__init__(
|
391
427
|
'vault:index/quotaRateLimit:QuotaRateLimit',
|
392
428
|
resource_name,
|
@@ -402,7 +438,8 @@ class QuotaRateLimit(pulumi.CustomResource):
|
|
402
438
|
name: Optional[pulumi.Input[str]] = None,
|
403
439
|
namespace: Optional[pulumi.Input[str]] = None,
|
404
440
|
path: Optional[pulumi.Input[str]] = None,
|
405
|
-
rate: Optional[pulumi.Input[float]] = None
|
441
|
+
rate: Optional[pulumi.Input[float]] = None,
|
442
|
+
role: Optional[pulumi.Input[str]] = None) -> 'QuotaRateLimit':
|
406
443
|
"""
|
407
444
|
Get an existing QuotaRateLimit resource's state with the given name, id, and optional extra
|
408
445
|
properties used to qualify the lookup.
|
@@ -426,6 +463,7 @@ class QuotaRateLimit(pulumi.CustomResource):
|
|
426
463
|
a namespace specific mount quota. **Note, namespaces are supported in Enterprise only.**
|
427
464
|
:param pulumi.Input[float] rate: The maximum number of requests at any given second to be allowed by the quota
|
428
465
|
rule. The `rate` must be positive.
|
466
|
+
:param pulumi.Input[str] role: If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
|
429
467
|
"""
|
430
468
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
431
469
|
|
@@ -437,6 +475,7 @@ class QuotaRateLimit(pulumi.CustomResource):
|
|
437
475
|
__props__.__dict__["namespace"] = namespace
|
438
476
|
__props__.__dict__["path"] = path
|
439
477
|
__props__.__dict__["rate"] = rate
|
478
|
+
__props__.__dict__["role"] = role
|
440
479
|
return QuotaRateLimit(resource_name, opts=opts, __props__=__props__)
|
441
480
|
|
442
481
|
@property
|
@@ -497,3 +536,11 @@ class QuotaRateLimit(pulumi.CustomResource):
|
|
497
536
|
"""
|
498
537
|
return pulumi.get(self, "rate")
|
499
538
|
|
539
|
+
@property
|
540
|
+
@pulumi.getter
|
541
|
+
def role(self) -> pulumi.Output[Optional[str]]:
|
542
|
+
"""
|
543
|
+
If set on a quota where `path` is set to an auth mount with a concept of roles (such as /auth/approle/), this will make the quota restrict login requests to that mount that are made with the specified role.
|
544
|
+
"""
|
545
|
+
return pulumi.get(self, "role")
|
546
|
+
|
@@ -8,8 +8,8 @@ from setuptools.command.install import install
|
|
8
8
|
from subprocess import check_call
|
9
9
|
|
10
10
|
|
11
|
-
VERSION = "5.16.
|
12
|
-
PLUGIN_VERSION = "5.16.0-alpha.
|
11
|
+
VERSION = "5.16.0a1697145324"
|
12
|
+
PLUGIN_VERSION = "5.16.0-alpha.1697145324+c8f36fe1"
|
13
13
|
|
14
14
|
class InstallPluginCommand(install):
|
15
15
|
def run(self):
|
File without changes
|
File without changes
|
File without changes
|
{pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/_utilities.py
RENAMED
File without changes
|
{pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/ad/__init__.py
RENAMED
File without changes
|
File without changes
|
{pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/ad/secret_backend.py
RENAMED
File without changes
|
{pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/ad/secret_library.py
RENAMED
File without changes
|
{pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/ad/secret_role.py
RENAMED
File without changes
|
{pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/alicloud/__init__.py
RENAMED
File without changes
|
File without changes
|
{pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/approle/__init__.py
RENAMED
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
{pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/auth_backend.py
RENAMED
File without changes
|
{pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/aws/__init__.py
RENAMED
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
{pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/aws/secret_backend.py
RENAMED
File without changes
|
File without changes
|
File without changes
|
{pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/azure/__init__.py
RENAMED
File without changes
|
{pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/azure/_inputs.py
RENAMED
File without changes
|
File without changes
|
File without changes
|
{pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/azure/backend.py
RENAMED
File without changes
|
{pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/azure/backend_role.py
RENAMED
File without changes
|
File without changes
|
{pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/azure/outputs.py
RENAMED
File without changes
|
{pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/config/__init__.py
RENAMED
File without changes
|
{pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/config/outputs.py
RENAMED
File without changes
|
{pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/config/vars.py
RENAMED
File without changes
|
{pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/consul/__init__.py
RENAMED
File without changes
|
File without changes
|
File without changes
|
{pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/database/__init__.py
RENAMED
File without changes
|
{pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/database/_inputs.py
RENAMED
File without changes
|
{pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/database/outputs.py
RENAMED
File without changes
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|
{pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/egp_policy.py
RENAMED
File without changes
|
{pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/gcp/__init__.py
RENAMED
File without changes
|
{pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/gcp/_inputs.py
RENAMED
File without changes
|
{pulumi_vault-5.16.0a1694757730 → pulumi_vault-5.16.0a1697145324}/pulumi_vault/gcp/auth_backend.py
RENAMED
File without changes
|
File without changes
|