pulumi-vault 6.1.1__py3-none-any.whl → 6.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +26 -0
- pulumi_vault/auth_backend.py +47 -0
- pulumi_vault/aws/auth_backend_client.py +247 -7
- pulumi_vault/aws/secret_backend_role.py +54 -0
- pulumi_vault/azure/auth_backend_config.py +133 -0
- pulumi_vault/azure/backend.py +203 -0
- pulumi_vault/database/secrets_mount.py +282 -0
- pulumi_vault/gcp/auth_backend.py +244 -0
- pulumi_vault/gcp/secret_backend.py +271 -3
- pulumi_vault/jwt/auth_backend_role.py +28 -35
- pulumi_vault/kubernetes/secret_backend.py +282 -0
- pulumi_vault/ldap/secret_backend.py +282 -0
- pulumi_vault/mount.py +324 -0
- pulumi_vault/okta/auth_backend.py +453 -0
- pulumi_vault/pkisecret/__init__.py +2 -0
- pulumi_vault/pkisecret/_inputs.py +30 -0
- pulumi_vault/pkisecret/backend_config_est.py +614 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +233 -0
- pulumi_vault/pkisecret/outputs.py +54 -0
- pulumi_vault/plugin.py +590 -0
- pulumi_vault/plugin_pinned_version.py +293 -0
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +47 -0
- pulumi_vault/quota_rate_limit.py +47 -0
- pulumi_vault/ssh/secret_backend_ca.py +94 -0
- {pulumi_vault-6.1.1.dist-info → pulumi_vault-6.2.0.dist-info}/METADATA +1 -1
- {pulumi_vault-6.1.1.dist-info → pulumi_vault-6.2.0.dist-info}/RECORD +29 -25
- {pulumi_vault-6.1.1.dist-info → pulumi_vault-6.2.0.dist-info}/WHEEL +1 -1
- {pulumi_vault-6.1.1.dist-info → pulumi_vault-6.2.0.dist-info}/top_level.txt +0 -0
@@ -16,6 +16,8 @@ class SecretBackendCaArgs:
|
|
16
16
|
def __init__(__self__, *,
|
17
17
|
backend: Optional[pulumi.Input[str]] = None,
|
18
18
|
generate_signing_key: Optional[pulumi.Input[bool]] = None,
|
19
|
+
key_bits: Optional[pulumi.Input[int]] = None,
|
20
|
+
key_type: Optional[pulumi.Input[str]] = None,
|
19
21
|
namespace: Optional[pulumi.Input[str]] = None,
|
20
22
|
private_key: Optional[pulumi.Input[str]] = None,
|
21
23
|
public_key: Optional[pulumi.Input[str]] = None):
|
@@ -23,6 +25,8 @@ class SecretBackendCaArgs:
|
|
23
25
|
The set of arguments for constructing a SecretBackendCa resource.
|
24
26
|
:param pulumi.Input[str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
|
25
27
|
:param pulumi.Input[bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
|
28
|
+
:param pulumi.Input[int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
29
|
+
:param pulumi.Input[str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
26
30
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
27
31
|
The value should not contain leading or trailing forward slashes.
|
28
32
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
@@ -34,6 +38,10 @@ class SecretBackendCaArgs:
|
|
34
38
|
pulumi.set(__self__, "backend", backend)
|
35
39
|
if generate_signing_key is not None:
|
36
40
|
pulumi.set(__self__, "generate_signing_key", generate_signing_key)
|
41
|
+
if key_bits is not None:
|
42
|
+
pulumi.set(__self__, "key_bits", key_bits)
|
43
|
+
if key_type is not None:
|
44
|
+
pulumi.set(__self__, "key_type", key_type)
|
37
45
|
if namespace is not None:
|
38
46
|
pulumi.set(__self__, "namespace", namespace)
|
39
47
|
if private_key is not None:
|
@@ -65,6 +73,30 @@ class SecretBackendCaArgs:
|
|
65
73
|
def generate_signing_key(self, value: Optional[pulumi.Input[bool]]):
|
66
74
|
pulumi.set(self, "generate_signing_key", value)
|
67
75
|
|
76
|
+
@property
|
77
|
+
@pulumi.getter(name="keyBits")
|
78
|
+
def key_bits(self) -> Optional[pulumi.Input[int]]:
|
79
|
+
"""
|
80
|
+
Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
81
|
+
"""
|
82
|
+
return pulumi.get(self, "key_bits")
|
83
|
+
|
84
|
+
@key_bits.setter
|
85
|
+
def key_bits(self, value: Optional[pulumi.Input[int]]):
|
86
|
+
pulumi.set(self, "key_bits", value)
|
87
|
+
|
88
|
+
@property
|
89
|
+
@pulumi.getter(name="keyType")
|
90
|
+
def key_type(self) -> Optional[pulumi.Input[str]]:
|
91
|
+
"""
|
92
|
+
Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
93
|
+
"""
|
94
|
+
return pulumi.get(self, "key_type")
|
95
|
+
|
96
|
+
@key_type.setter
|
97
|
+
def key_type(self, value: Optional[pulumi.Input[str]]):
|
98
|
+
pulumi.set(self, "key_type", value)
|
99
|
+
|
68
100
|
@property
|
69
101
|
@pulumi.getter
|
70
102
|
def namespace(self) -> Optional[pulumi.Input[str]]:
|
@@ -110,6 +142,8 @@ class _SecretBackendCaState:
|
|
110
142
|
def __init__(__self__, *,
|
111
143
|
backend: Optional[pulumi.Input[str]] = None,
|
112
144
|
generate_signing_key: Optional[pulumi.Input[bool]] = None,
|
145
|
+
key_bits: Optional[pulumi.Input[int]] = None,
|
146
|
+
key_type: Optional[pulumi.Input[str]] = None,
|
113
147
|
namespace: Optional[pulumi.Input[str]] = None,
|
114
148
|
private_key: Optional[pulumi.Input[str]] = None,
|
115
149
|
public_key: Optional[pulumi.Input[str]] = None):
|
@@ -117,6 +151,8 @@ class _SecretBackendCaState:
|
|
117
151
|
Input properties used for looking up and filtering SecretBackendCa resources.
|
118
152
|
:param pulumi.Input[str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
|
119
153
|
:param pulumi.Input[bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
|
154
|
+
:param pulumi.Input[int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
155
|
+
:param pulumi.Input[str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
120
156
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
121
157
|
The value should not contain leading or trailing forward slashes.
|
122
158
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
@@ -128,6 +164,10 @@ class _SecretBackendCaState:
|
|
128
164
|
pulumi.set(__self__, "backend", backend)
|
129
165
|
if generate_signing_key is not None:
|
130
166
|
pulumi.set(__self__, "generate_signing_key", generate_signing_key)
|
167
|
+
if key_bits is not None:
|
168
|
+
pulumi.set(__self__, "key_bits", key_bits)
|
169
|
+
if key_type is not None:
|
170
|
+
pulumi.set(__self__, "key_type", key_type)
|
131
171
|
if namespace is not None:
|
132
172
|
pulumi.set(__self__, "namespace", namespace)
|
133
173
|
if private_key is not None:
|
@@ -159,6 +199,30 @@ class _SecretBackendCaState:
|
|
159
199
|
def generate_signing_key(self, value: Optional[pulumi.Input[bool]]):
|
160
200
|
pulumi.set(self, "generate_signing_key", value)
|
161
201
|
|
202
|
+
@property
|
203
|
+
@pulumi.getter(name="keyBits")
|
204
|
+
def key_bits(self) -> Optional[pulumi.Input[int]]:
|
205
|
+
"""
|
206
|
+
Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
207
|
+
"""
|
208
|
+
return pulumi.get(self, "key_bits")
|
209
|
+
|
210
|
+
@key_bits.setter
|
211
|
+
def key_bits(self, value: Optional[pulumi.Input[int]]):
|
212
|
+
pulumi.set(self, "key_bits", value)
|
213
|
+
|
214
|
+
@property
|
215
|
+
@pulumi.getter(name="keyType")
|
216
|
+
def key_type(self) -> Optional[pulumi.Input[str]]:
|
217
|
+
"""
|
218
|
+
Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
219
|
+
"""
|
220
|
+
return pulumi.get(self, "key_type")
|
221
|
+
|
222
|
+
@key_type.setter
|
223
|
+
def key_type(self, value: Optional[pulumi.Input[str]]):
|
224
|
+
pulumi.set(self, "key_type", value)
|
225
|
+
|
162
226
|
@property
|
163
227
|
@pulumi.getter
|
164
228
|
def namespace(self) -> Optional[pulumi.Input[str]]:
|
@@ -206,6 +270,8 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
206
270
|
opts: Optional[pulumi.ResourceOptions] = None,
|
207
271
|
backend: Optional[pulumi.Input[str]] = None,
|
208
272
|
generate_signing_key: Optional[pulumi.Input[bool]] = None,
|
273
|
+
key_bits: Optional[pulumi.Input[int]] = None,
|
274
|
+
key_type: Optional[pulumi.Input[str]] = None,
|
209
275
|
namespace: Optional[pulumi.Input[str]] = None,
|
210
276
|
private_key: Optional[pulumi.Input[str]] = None,
|
211
277
|
public_key: Optional[pulumi.Input[str]] = None,
|
@@ -236,6 +302,8 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
236
302
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
237
303
|
:param pulumi.Input[str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
|
238
304
|
:param pulumi.Input[bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
|
305
|
+
:param pulumi.Input[int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
306
|
+
:param pulumi.Input[str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
239
307
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
240
308
|
The value should not contain leading or trailing forward slashes.
|
241
309
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
@@ -288,6 +356,8 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
288
356
|
opts: Optional[pulumi.ResourceOptions] = None,
|
289
357
|
backend: Optional[pulumi.Input[str]] = None,
|
290
358
|
generate_signing_key: Optional[pulumi.Input[bool]] = None,
|
359
|
+
key_bits: Optional[pulumi.Input[int]] = None,
|
360
|
+
key_type: Optional[pulumi.Input[str]] = None,
|
291
361
|
namespace: Optional[pulumi.Input[str]] = None,
|
292
362
|
private_key: Optional[pulumi.Input[str]] = None,
|
293
363
|
public_key: Optional[pulumi.Input[str]] = None,
|
@@ -302,6 +372,8 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
302
372
|
|
303
373
|
__props__.__dict__["backend"] = backend
|
304
374
|
__props__.__dict__["generate_signing_key"] = generate_signing_key
|
375
|
+
__props__.__dict__["key_bits"] = key_bits
|
376
|
+
__props__.__dict__["key_type"] = key_type
|
305
377
|
__props__.__dict__["namespace"] = namespace
|
306
378
|
__props__.__dict__["private_key"] = None if private_key is None else pulumi.Output.secret(private_key)
|
307
379
|
__props__.__dict__["public_key"] = public_key
|
@@ -319,6 +391,8 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
319
391
|
opts: Optional[pulumi.ResourceOptions] = None,
|
320
392
|
backend: Optional[pulumi.Input[str]] = None,
|
321
393
|
generate_signing_key: Optional[pulumi.Input[bool]] = None,
|
394
|
+
key_bits: Optional[pulumi.Input[int]] = None,
|
395
|
+
key_type: Optional[pulumi.Input[str]] = None,
|
322
396
|
namespace: Optional[pulumi.Input[str]] = None,
|
323
397
|
private_key: Optional[pulumi.Input[str]] = None,
|
324
398
|
public_key: Optional[pulumi.Input[str]] = None) -> 'SecretBackendCa':
|
@@ -331,6 +405,8 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
331
405
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
332
406
|
:param pulumi.Input[str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
|
333
407
|
:param pulumi.Input[bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
|
408
|
+
:param pulumi.Input[int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
409
|
+
:param pulumi.Input[str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
334
410
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
335
411
|
The value should not contain leading or trailing forward slashes.
|
336
412
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
@@ -344,6 +420,8 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
344
420
|
|
345
421
|
__props__.__dict__["backend"] = backend
|
346
422
|
__props__.__dict__["generate_signing_key"] = generate_signing_key
|
423
|
+
__props__.__dict__["key_bits"] = key_bits
|
424
|
+
__props__.__dict__["key_type"] = key_type
|
347
425
|
__props__.__dict__["namespace"] = namespace
|
348
426
|
__props__.__dict__["private_key"] = private_key
|
349
427
|
__props__.__dict__["public_key"] = public_key
|
@@ -365,6 +443,22 @@ class SecretBackendCa(pulumi.CustomResource):
|
|
365
443
|
"""
|
366
444
|
return pulumi.get(self, "generate_signing_key")
|
367
445
|
|
446
|
+
@property
|
447
|
+
@pulumi.getter(name="keyBits")
|
448
|
+
def key_bits(self) -> pulumi.Output[Optional[int]]:
|
449
|
+
"""
|
450
|
+
Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
451
|
+
"""
|
452
|
+
return pulumi.get(self, "key_bits")
|
453
|
+
|
454
|
+
@property
|
455
|
+
@pulumi.getter(name="keyType")
|
456
|
+
def key_type(self) -> pulumi.Output[Optional[str]]:
|
457
|
+
"""
|
458
|
+
Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
|
459
|
+
"""
|
460
|
+
return pulumi.get(self, "key_type")
|
461
|
+
|
368
462
|
@property
|
369
463
|
@pulumi.getter
|
370
464
|
def namespace(self) -> pulumi.Output[Optional[str]]:
|
@@ -1,9 +1,9 @@
|
|
1
|
-
pulumi_vault/__init__.py,sha256=
|
1
|
+
pulumi_vault/__init__.py,sha256=YyUZ3AwssRd84-MFiLiMsKlEs0Gl5dnqjoRlDWbWe70,31607
|
2
2
|
pulumi_vault/_inputs.py,sha256=mjyuroOXUphjofRI4JeGJ2Q1ESCb9uJeiA4C48NHfNQ,72858
|
3
3
|
pulumi_vault/_utilities.py,sha256=b6gJn0IIeM1t6Q7EVjqw3yhuGyP-uENQhtL5yp7aHR8,9248
|
4
4
|
pulumi_vault/audit.py,sha256=DlMWyovN9OrGVBpDgNvvtMRMpZRI_pC8YwqEaI9S6lk,20343
|
5
5
|
pulumi_vault/audit_request_header.py,sha256=CHCfbFBwzX3mU6Fi34Havyl8cH9Mtzj5BDmKIc2tIno,10313
|
6
|
-
pulumi_vault/auth_backend.py,sha256=
|
6
|
+
pulumi_vault/auth_backend.py,sha256=v4dxfpqhg94wXTnSuKAJ8-qBC_TnUXneSa-ODx9NNoQ,23808
|
7
7
|
pulumi_vault/cert_auth_backend_role.py,sha256=u439tS_eIgQIK_GbOD-f7kNlcIIq1Vcd6zvlsFgjKW0,72069
|
8
8
|
pulumi_vault/egp_policy.py,sha256=dkMcmp_7CJBSOCBE1BK8cNpZIe6BxGtVHFUty-6OV9A,16599
|
9
9
|
pulumi_vault/get_auth_backend.py,sha256=ux17Tq0ReoiBHgdsthi1SIhNJT88t8inL_fQCG5yc1U,7757
|
@@ -17,18 +17,20 @@ pulumi_vault/mfa_duo.py,sha256=LJzOnwcNhzbgogrW4cyvadUFnB7wasK-QQ4MbPU0eS4,28237
|
|
17
17
|
pulumi_vault/mfa_okta.py,sha256=pA6n9k3BBMHXLvvyjOoSxTirgAznz5M0bWeXjHq8riU,29503
|
18
18
|
pulumi_vault/mfa_pingid.py,sha256=h4W3TOvcUQK1gzwqiC6samirfBghCTIcBgd3KpyBGww,30972
|
19
19
|
pulumi_vault/mfa_totp.py,sha256=J-c-GoVmO6FED6UDff2AtZJh5R8XlbnYY7CDeuPopI0,25344
|
20
|
-
pulumi_vault/mount.py,sha256=
|
20
|
+
pulumi_vault/mount.py,sha256=bcvGRLfo5rYBpP72qfdYm7H90lsPb5vDDQR1Xhviifo,59240
|
21
21
|
pulumi_vault/namespace.py,sha256=QKY3lKdHIZpT_l0Ut6Fk_FarRPsEkLyxv1tmfgXXoU0,18077
|
22
22
|
pulumi_vault/nomad_secret_backend.py,sha256=cmL2NkjNIZxu9a7NEMMHgojGi12I2tGDojFdMGSgj04,42018
|
23
23
|
pulumi_vault/nomad_secret_role.py,sha256=47QltNPaM58oiCXt77Z6r1cXRVN79FhYWI7Iei5sQ3w,20146
|
24
24
|
pulumi_vault/outputs.py,sha256=mcrrIhKLRFtb_JPFAdlsFxARGwRL_HPRFsP5x39EnVI,13066
|
25
25
|
pulumi_vault/password_policy.py,sha256=sDU2lauo4-13snK35DOXtWbzn_bMJ5AZS-gS57T0aUw,12241
|
26
|
+
pulumi_vault/plugin.py,sha256=0fBhSZDyQhzML9r1Udhy9ngHcfjwzi1BzvutsbKKUwU,23482
|
27
|
+
pulumi_vault/plugin_pinned_version.py,sha256=mo62qPp_IwJRnv5t2p9ywInEjwHFsBunoyCDGc0bveg,10583
|
26
28
|
pulumi_vault/policy.py,sha256=V6knAiqkzH97T72s6FB2qNjScDfKOAl3mox1h7vg0Ps,10935
|
27
29
|
pulumi_vault/provider.py,sha256=mfFA88nxZdkVctKKkuqkJD9m9jwti5yrpuBca7ha9Kc,41810
|
28
|
-
pulumi_vault/pulumi-plugin.json,sha256=
|
30
|
+
pulumi_vault/pulumi-plugin.json,sha256=JLzGTDrNA6G6IyjTuXS0auf_-Kz1clK6aT96iYmJpys,64
|
29
31
|
pulumi_vault/py.typed,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
30
|
-
pulumi_vault/quota_lease_count.py,sha256=
|
31
|
-
pulumi_vault/quota_rate_limit.py,sha256=
|
32
|
+
pulumi_vault/quota_lease_count.py,sha256=w5CLQQjCk9PKSzX_XeLMEV87xre-poHJG9NfAGVVTjw,24898
|
33
|
+
pulumi_vault/quota_rate_limit.py,sha256=hA0tDU-54VrfcTHCzbRU-TL32BLnPBxhl92faufEkZo,29503
|
32
34
|
pulumi_vault/raft_autopilot.py,sha256=wpjg28e8-Z01jG7vgwQzKw4F23qVqNQHqbszp3ukhQo,30059
|
33
35
|
pulumi_vault/raft_snapshot_agent_config.py,sha256=zMpwB8WwZDCR2JjT-A56EXrx9LVmAgG0ZdYYO1lohmA,74915
|
34
36
|
pulumi_vault/rgp_policy.py,sha256=4JJBQtQidTwrtyVvyrmcehZTo3BqtpL_d1nZvqquNiQ,14396
|
@@ -47,7 +49,7 @@ pulumi_vault/approle/auth_backend_role_secret_id.py,sha256=CXNqy4ro0HirxM7k-vEPC
|
|
47
49
|
pulumi_vault/approle/get_auth_backend_role_id.py,sha256=Fh9yDJAEpc52XnvyJovBAXmZhobSp4bgD-SB2vykKc0,5776
|
48
50
|
pulumi_vault/aws/__init__.py,sha256=0IbkDTvlbFtL-UyRoqQHLIxCm5ZVs-KOodxg9WO46tI,805
|
49
51
|
pulumi_vault/aws/auth_backend_cert.py,sha256=N6ptGXlQ9eMEiXlqisjTPGwEtYaZZigzUfXVoVM01nE,18369
|
50
|
-
pulumi_vault/aws/auth_backend_client.py,sha256=
|
52
|
+
pulumi_vault/aws/auth_backend_client.py,sha256=A2ofHZ9tIMyZ0Ms3ibhAq8OoujdQ6Olxts462ZGYUoU,44846
|
51
53
|
pulumi_vault/aws/auth_backend_config_identity.py,sha256=Oov2g84mh1NGuSlsg-OIQUxHzLpo1xxSg6ur_bIEVwA,23132
|
52
54
|
pulumi_vault/aws/auth_backend_identity_whitelist.py,sha256=l4WIvov1_SuKA5Bo3iEyCLAazEK2YDk5tQPDTU767JE,16940
|
53
55
|
pulumi_vault/aws/auth_backend_login.py,sha256=U8x9ifU-mqxOLuMAuxgQPuiUE9bkUb7NaQb_0LOuGWQ,42509
|
@@ -58,13 +60,13 @@ pulumi_vault/aws/auth_backend_sts_role.py,sha256=yy2-_7dY4LEjFjo2ROE905-o-3uiHqL
|
|
58
60
|
pulumi_vault/aws/get_access_credentials.py,sha256=AjYqLOhyucc98yNNh39DpTwBzTnSPgUeOgWAqiWZs9c,12282
|
59
61
|
pulumi_vault/aws/get_static_access_credentials.py,sha256=65NLi7oDfPERU_XHaQC7kYkw-VngpesORVJ5B8ahPwo,4742
|
60
62
|
pulumi_vault/aws/secret_backend.py,sha256=VoDgh8p5z7KC0jhBu5bh_oKcvYscPciTnEe00X3WaD8,49429
|
61
|
-
pulumi_vault/aws/secret_backend_role.py,sha256=
|
63
|
+
pulumi_vault/aws/secret_backend_role.py,sha256=Vim6Vfq5SrC_oNajDFXv7TM9xlDP46ju7gBfuHQcyrM,50962
|
62
64
|
pulumi_vault/aws/secret_backend_static_role.py,sha256=XB-cCvBxYf3G1yp8FUh1ecUDIHAc80pV8mokb3NS1HQ,17821
|
63
65
|
pulumi_vault/azure/__init__.py,sha256=Ip6GcRxEn43qDXL93F4Jm2uYqW7HJlPK_dg1WrfwXBg,471
|
64
66
|
pulumi_vault/azure/_inputs.py,sha256=uS9C0fl059lbaxHD8PiAwWbCrDahbgBcqztfYeTDaEo,2564
|
65
|
-
pulumi_vault/azure/auth_backend_config.py,sha256=
|
67
|
+
pulumi_vault/azure/auth_backend_config.py,sha256=L7BYNzTzVvSpEwAcj-L5i72svSmN7vxbdSoyhNcGXqs,29998
|
66
68
|
pulumi_vault/azure/auth_backend_role.py,sha256=WIsx6I1JGTLpc6L-OWNkLG2HrUFtjM1GK3KZ2ZZUIms,54712
|
67
|
-
pulumi_vault/azure/backend.py,sha256=
|
69
|
+
pulumi_vault/azure/backend.py,sha256=IQyUSBH33j1EabeTxvmkdj8WFMs9t7Gbh5buTqf6c1A,40434
|
68
70
|
pulumi_vault/azure/backend_role.py,sha256=jttVdJcKQDTHMUTm9yA3K6ghgSC3Ubi_Sd38_U2NgPQ,39016
|
69
71
|
pulumi_vault/azure/get_access_credentials.py,sha256=Mg39uwR4vmnoeVjQNhJ_SWLlxJIw3C66uo4gA-WGuy4,17803
|
70
72
|
pulumi_vault/azure/outputs.py,sha256=YagOWiNzWojabE3fAvk4VvINp5R5IcBBr1Gmu6PbYNI,3097
|
@@ -83,14 +85,14 @@ pulumi_vault/database/outputs.py,sha256=FQukRCzqMJNYIFQufscO1DlFzA34EL_VAy9DHkOj
|
|
83
85
|
pulumi_vault/database/secret_backend_connection.py,sha256=dcFd937fwdIUUMqNYusKaiu6bPYk889QsTXn9bx9LyE,73181
|
84
86
|
pulumi_vault/database/secret_backend_role.py,sha256=qr2gMBP8SJPiS4i80lSeOM0IzTCBAFL3w2MmGok6kTs,36862
|
85
87
|
pulumi_vault/database/secret_backend_static_role.py,sha256=dOf2oBQeIJbjCVCyQI3Wm5hn0lk4n7RrNmivHAG963g,30781
|
86
|
-
pulumi_vault/database/secrets_mount.py,sha256=
|
88
|
+
pulumi_vault/database/secrets_mount.py,sha256=KxRr1FMgj-7WG6fBGl4rE2AkIt-G6AmzIwXi5Dr6VSI,113752
|
87
89
|
pulumi_vault/gcp/__init__.py,sha256=C0xixHwpaTovKTJEMFd1P6NitNgdlYCfCFY4aPbbI68,552
|
88
90
|
pulumi_vault/gcp/_inputs.py,sha256=Xe5X3dDX0fWR2FNo5SYApMrvR2szsuuEL4Gpiao9nP8,14698
|
89
|
-
pulumi_vault/gcp/auth_backend.py,sha256=
|
91
|
+
pulumi_vault/gcp/auth_backend.py,sha256=zeca8tTDu5-87_HDXbJ-OqwRLQ2RXnbkFrHz8T1Dwpw,51087
|
90
92
|
pulumi_vault/gcp/auth_backend_role.py,sha256=x0VkI4VcAL_UfvLqeclAtuvFUZmNUGY9gPx93qJAlqs,51908
|
91
93
|
pulumi_vault/gcp/get_auth_backend_role.py,sha256=JnRjaeoMzM6pun_VNhfwpMQ0L6fjk5PCJmxyVsbvD6U,22796
|
92
94
|
pulumi_vault/gcp/outputs.py,sha256=1koBeJ0JDW_k4pot9IvXhYC_aVEiAoO6SAmitoBwnWE,12613
|
93
|
-
pulumi_vault/gcp/secret_backend.py,sha256=
|
95
|
+
pulumi_vault/gcp/secret_backend.py,sha256=84ON9marudaexU38Um8DUVKDoajm5dsDnwCfjrIJS_c,39405
|
94
96
|
pulumi_vault/gcp/secret_impersonated_account.py,sha256=dvpRVSEVLzBU_cGAlaJ-7HecdWWJfC7SXcGvj8a0etA,18823
|
95
97
|
pulumi_vault/gcp/secret_roleset.py,sha256=RomErefa7yXgVrBMBwMezWmOwrQEEp8jLPIS2vZw1rQ,25967
|
96
98
|
pulumi_vault/gcp/secret_static_account.py,sha256=jkq1H-JpJq3UqBPNLFfvT0M9rvWvW7F_f7VD8vUw7yI,27271
|
@@ -135,7 +137,7 @@ pulumi_vault/identity/outputs.py,sha256=NNd_dZOsI590p6_r3d_QrAYVuUkrGaYZJ4hwmNvt
|
|
135
137
|
pulumi_vault/jwt/__init__.py,sha256=VSAnoMgVIUlS_5ofpyuo8lZkK_ZWPIaQit88yJUulpc,375
|
136
138
|
pulumi_vault/jwt/_inputs.py,sha256=IWTJA4vCsWY0qINVvYyi9rYDfmAkJNxFquvsR7Fg2q4,8032
|
137
139
|
pulumi_vault/jwt/auth_backend.py,sha256=NehdjxIzlxTxZKAsCZREuAa5xSwaQezdN_eLIxid1Ec,66052
|
138
|
-
pulumi_vault/jwt/auth_backend_role.py,sha256=
|
140
|
+
pulumi_vault/jwt/auth_backend_role.py,sha256=m2FboRK8CVreyDbS2XWUy6sg2jn8g3RpeS8W9vSfyLk,86720
|
139
141
|
pulumi_vault/jwt/outputs.py,sha256=5CzU14sb4gtLnqhXZfESAEQEcVKdiDOxYIbH33ovJOk,7320
|
140
142
|
pulumi_vault/kmip/__init__.py,sha256=iT5_oJBCN1Mr7rwkKXtb4ab_w8GFXCr9RcXaTCFPcEk,354
|
141
143
|
pulumi_vault/kmip/secret_backend.py,sha256=ycFCBQmT54SjkaJUvfOQVxaLcbQ1epD5eYN0XIM4LNs,37775
|
@@ -147,7 +149,7 @@ pulumi_vault/kubernetes/auth_backend_role.py,sha256=vdXjAPPvVDgX6Yy2q0lGqA4La_2z
|
|
147
149
|
pulumi_vault/kubernetes/get_auth_backend_config.py,sha256=-B9KKJOJD4Zl9ztTOt5uQ0dhFRuOtZKlEamkZOta0zs,10609
|
148
150
|
pulumi_vault/kubernetes/get_auth_backend_role.py,sha256=Zv58F4W8UPq3xNr7WbldlEQOndvYG-geGaW1VAp8W9o,21357
|
149
151
|
pulumi_vault/kubernetes/get_service_account_token.py,sha256=NL7c01y9ZnC-eENg99ZLIRzdpmxqFUGG92HWWa8Y_fU,13805
|
150
|
-
pulumi_vault/kubernetes/secret_backend.py,sha256=
|
152
|
+
pulumi_vault/kubernetes/secret_backend.py,sha256=BdIo_I8ZoHGARlKg_gqMEr4LsoFvz53Zbliw9kWVLOM,66394
|
151
153
|
pulumi_vault/kubernetes/secret_backend_role.py,sha256=NSeLuQz9Li4Yy73HdSd5os3qElk3aPoYtaayDCE9Wug,55709
|
152
154
|
pulumi_vault/kv/__init__.py,sha256=dF29_Z4F3d4CnpcCvjG4CWZx6VkI272d4zFV9fgX_xY,553
|
153
155
|
pulumi_vault/kv/_inputs.py,sha256=n--n3d7nkYYifFXynV5hFOGK2iNbGdTIKuGup9BptSo,3628
|
@@ -166,7 +168,7 @@ pulumi_vault/ldap/auth_backend_group.py,sha256=qz3-mcwcVBE-ky1uCUsmhVecZtbti4Z-P
|
|
166
168
|
pulumi_vault/ldap/auth_backend_user.py,sha256=5_dV0WTpXKqSVG2iKQutrw6SXh6_4cR1PjxGtbPSmGg,18489
|
167
169
|
pulumi_vault/ldap/get_dynamic_credentials.py,sha256=7SEtcWfowEFQCQy8ZDCnTEkrx3exwDW1Pf5_cNyWH_Q,6535
|
168
170
|
pulumi_vault/ldap/get_static_credentials.py,sha256=3_itUINQ2wMoeKbZ-8ahzV3Nm8gyKntVrQ1o8MgwjM8,6722
|
169
|
-
pulumi_vault/ldap/secret_backend.py,sha256=
|
171
|
+
pulumi_vault/ldap/secret_backend.py,sha256=ptSwMspTPv7LQOC4PPGfvMw_PYoxVnrRvCcF72_Adbg,93153
|
170
172
|
pulumi_vault/ldap/secret_backend_dynamic_role.py,sha256=rhHdj49ygcHHjjZKVsaDsxP6DVh4xDOiW0_nO5ydm44,37797
|
171
173
|
pulumi_vault/ldap/secret_backend_library_set.py,sha256=BIJESsXsPQ3goKvE98ncx7CbVpEbf2VKgbReSOGStv0,23928
|
172
174
|
pulumi_vault/ldap/secret_backend_static_role.py,sha256=61ii3cvtHzS0PEMxDGoST7b1lgh3Tz1soS29e7IojKw,23975
|
@@ -179,18 +181,20 @@ pulumi_vault/mongodbatlas/secret_backend.py,sha256=AO34JvDA1RYZTstomWWIXdWWpKfGi
|
|
179
181
|
pulumi_vault/mongodbatlas/secret_role.py,sha256=0OpKNxuX6l7OT3Ov5rEqetlaHWmu6oLNTiUxsxiVGjQ,33615
|
180
182
|
pulumi_vault/okta/__init__.py,sha256=XjquFz2tppASPCFGZ9YE51_cVH69eGAiToFyehc0wcY,409
|
181
183
|
pulumi_vault/okta/_inputs.py,sha256=LJ6EEWcEeLwVRZJYT0YRlH1oJH5pf_0nVf8Cu_uQf5E,3511
|
182
|
-
pulumi_vault/okta/auth_backend.py,sha256=
|
184
|
+
pulumi_vault/okta/auth_backend.py,sha256=qho5B6LaeihL5cHTCscaTSVBsjbBHsRccJrHwoikL_0,60630
|
183
185
|
pulumi_vault/okta/auth_backend_group.py,sha256=5Sw2MK4d5AnVMXT3O1a8fMbiqDOP1gmaudY-KLDhRfo,14975
|
184
186
|
pulumi_vault/okta/auth_backend_user.py,sha256=kiNHbdduI1R4XWbtnHWvdCIW8xR-UykSQGp1CLujeRk,16937
|
185
187
|
pulumi_vault/okta/outputs.py,sha256=8IPwy3nKDVxvwT8wd9dyFm3hfPYd_FXZ4TcCkT9vUR4,3067
|
186
|
-
pulumi_vault/pkisecret/__init__.py,sha256=
|
187
|
-
pulumi_vault/pkisecret/_inputs.py,sha256=
|
188
|
+
pulumi_vault/pkisecret/__init__.py,sha256=Lwp_52rZJohEKOGZTENoaHtUcsrMDlAa87JRrMSrXcw,1103
|
189
|
+
pulumi_vault/pkisecret/_inputs.py,sha256=SDVn0tXfYrSSVDZJ43CDY7yy4nhTzso3gmeNPefy2Zg,3094
|
188
190
|
pulumi_vault/pkisecret/backend_config_cluster.py,sha256=gJDXjoh1qkAnXm6BAP65AXrDaY2q8aZpclglNBwCx2U,15929
|
191
|
+
pulumi_vault/pkisecret/backend_config_est.py,sha256=NEhpisOocjL-_w3_b97Bw2kUz9lPxki1PGylh-1M0wQ,32409
|
192
|
+
pulumi_vault/pkisecret/get_backend_config_est.py,sha256=pYeRNsK3RLeTmrPaU1rCi1pn8BC12kIvME6uHqniQps,9896
|
189
193
|
pulumi_vault/pkisecret/get_backend_issuer.py,sha256=098K4SWse6Xt5NCzqLqFFaqMHtuPHlrJ6PjgJjIj698,9909
|
190
194
|
pulumi_vault/pkisecret/get_backend_issuers.py,sha256=SQMnqHSCQzVBVNjHio7Pt3BQvYS1sNbgb75TeoClWoU,6398
|
191
195
|
pulumi_vault/pkisecret/get_backend_key.py,sha256=NIjBO6CBmZ0gJ44wWnz510nQ4E47aQhuytFE-iSyhXY,6930
|
192
196
|
pulumi_vault/pkisecret/get_backend_keys.py,sha256=Ke6ggiCEupZK3x1bvo1cPTLlKeOp4wVG09LyuldvL90,6303
|
193
|
-
pulumi_vault/pkisecret/outputs.py,sha256=
|
197
|
+
pulumi_vault/pkisecret/outputs.py,sha256=WbI2UNcZkEQbMyXzlQmHvqndGoa4e1uZXUASmsfmwdM,3409
|
194
198
|
pulumi_vault/pkisecret/secret_backend_cert.py,sha256=pfs4qM3-ZAtAgvUAe_pPyCVcV7YjZtJvkdrp5S818R8,49695
|
195
199
|
pulumi_vault/pkisecret/secret_backend_config_ca.py,sha256=ue_jncJRYwddzsPZNo_4nD0EoPkjc7zgjb82a-67RqY,18954
|
196
200
|
pulumi_vault/pkisecret/secret_backend_config_issuers.py,sha256=Hrk1TZ-vIYlDE-lmBRPndL2dwTh9MZbDN1Q3AVA6IZ0,16978
|
@@ -226,7 +230,7 @@ pulumi_vault/secrets/sync_vercel_destination.py,sha256=B8arlRQKsFdnbGRSX7kRc9L1i
|
|
226
230
|
pulumi_vault/ssh/__init__.py,sha256=kSaEW40BMdCU_LlCcy8YIBYROxHLbXfyHdaMRDm76i0,382
|
227
231
|
pulumi_vault/ssh/_inputs.py,sha256=zzFLYpXF1He2rAw0MhNFIjIeNu_vYl9g66lgEDAE7mo,1814
|
228
232
|
pulumi_vault/ssh/outputs.py,sha256=a0189oQadVTUrNWG0Hmcop5grRmHp54DWlIsFGi-Njs,1446
|
229
|
-
pulumi_vault/ssh/secret_backend_ca.py,sha256=
|
233
|
+
pulumi_vault/ssh/secret_backend_ca.py,sha256=S8CwJzCulU1JF0ucX3CyXVIaTyGleasM73eRzn7OJPI,22475
|
230
234
|
pulumi_vault/ssh/secret_backend_role.py,sha256=Nj8EeYNBjguNMD5xhp2kc0lRNdvVQ5xmu4VD9yaDWDw,72399
|
231
235
|
pulumi_vault/terraformcloud/__init__.py,sha256=sNst-XlgbdicqCgFwaD4FZQ1Qbpf3mMh6Q5Fn1J4Arg,354
|
232
236
|
pulumi_vault/terraformcloud/secret_backend.py,sha256=XrRZcRglDbb0jmEToX7EFY8FtyyN4v_VvGpus40kJeo,23277
|
@@ -246,7 +250,7 @@ pulumi_vault/transit/get_decrypt.py,sha256=6rFzK4Ghf3tWRNJ_rSCs0yJsPynk9oeqZIJJq
|
|
246
250
|
pulumi_vault/transit/get_encrypt.py,sha256=wz1GDrLP8JzDLCcjbU7tZM7vHNtBQ9PPpLHczy22uqY,5712
|
247
251
|
pulumi_vault/transit/secret_backend_key.py,sha256=56to0JZaIFaCZVeiW5pNKER6azVhs2JXJoccgdVdtoI,53286
|
248
252
|
pulumi_vault/transit/secret_cache_config.py,sha256=kSfKajNG2v5iPtoEnNLRXCIR5sRGUqTTxRW-tT0X_iM,12483
|
249
|
-
pulumi_vault-6.
|
250
|
-
pulumi_vault-6.
|
251
|
-
pulumi_vault-6.
|
252
|
-
pulumi_vault-6.
|
253
|
+
pulumi_vault-6.2.0.dist-info/METADATA,sha256=jiv5_ax6XOPELBL6VDCXNYaei9TwPnnMb82OwQLIgOE,4849
|
254
|
+
pulumi_vault-6.2.0.dist-info/WHEEL,sha256=cpQTJ5IWu9CdaPViMhC9YzF8gZuS5-vlfoFihTBC86A,91
|
255
|
+
pulumi_vault-6.2.0.dist-info/top_level.txt,sha256=J7lAGvfexHc6T1EpDBGNKF0SXWURpmUhyzi9Nr5I61w,13
|
256
|
+
pulumi_vault-6.2.0.dist-info/RECORD,,
|
File without changes
|