pulumi-vault 6.2.0a1718998938__py3-none-any.whl → 6.3.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
pulumi_vault/_inputs.py CHANGED
@@ -1844,12 +1844,19 @@ class GetPolicyDocumentRuleAllowedParameterArgs:
1844
1844
  def __init__(__self__, *,
1845
1845
  key: str,
1846
1846
  values: Sequence[str]):
1847
+ """
1848
+ :param str key: name of permitted or denied parameter.
1849
+ :param Sequence[str] values: list of values what are permitted or denied by policy rule.
1850
+ """
1847
1851
  pulumi.set(__self__, "key", key)
1848
1852
  pulumi.set(__self__, "values", values)
1849
1853
 
1850
1854
  @property
1851
1855
  @pulumi.getter
1852
1856
  def key(self) -> str:
1857
+ """
1858
+ name of permitted or denied parameter.
1859
+ """
1853
1860
  return pulumi.get(self, "key")
1854
1861
 
1855
1862
  @key.setter
@@ -1859,6 +1866,9 @@ class GetPolicyDocumentRuleAllowedParameterArgs:
1859
1866
  @property
1860
1867
  @pulumi.getter
1861
1868
  def values(self) -> Sequence[str]:
1869
+ """
1870
+ list of values what are permitted or denied by policy rule.
1871
+ """
1862
1872
  return pulumi.get(self, "values")
1863
1873
 
1864
1874
  @values.setter
@@ -1871,12 +1881,19 @@ class GetPolicyDocumentRuleDeniedParameterArgs:
1871
1881
  def __init__(__self__, *,
1872
1882
  key: str,
1873
1883
  values: Sequence[str]):
1884
+ """
1885
+ :param str key: name of permitted or denied parameter.
1886
+ :param Sequence[str] values: list of values what are permitted or denied by policy rule.
1887
+ """
1874
1888
  pulumi.set(__self__, "key", key)
1875
1889
  pulumi.set(__self__, "values", values)
1876
1890
 
1877
1891
  @property
1878
1892
  @pulumi.getter
1879
1893
  def key(self) -> str:
1894
+ """
1895
+ name of permitted or denied parameter.
1896
+ """
1880
1897
  return pulumi.get(self, "key")
1881
1898
 
1882
1899
  @key.setter
@@ -1886,6 +1903,9 @@ class GetPolicyDocumentRuleDeniedParameterArgs:
1886
1903
  @property
1887
1904
  @pulumi.getter
1888
1905
  def values(self) -> Sequence[str]:
1906
+ """
1907
+ list of values what are permitted or denied by policy rule.
1908
+ """
1889
1909
  return pulumi.get(self, "values")
1890
1910
 
1891
1911
  @values.setter
@@ -4,6 +4,7 @@
4
4
 
5
5
 
6
6
  import asyncio
7
+ import functools
7
8
  import importlib.metadata
8
9
  import importlib.util
9
10
  import inspect
@@ -11,14 +12,19 @@ import json
11
12
  import os
12
13
  import sys
13
14
  import typing
15
+ import warnings
16
+ import base64
14
17
 
15
18
  import pulumi
16
19
  import pulumi.runtime
17
20
  from pulumi.runtime.sync_await import _sync_await
21
+ from pulumi.runtime.proto import resource_pb2
18
22
 
19
23
  from semver import VersionInfo as SemverVersion
20
24
  from parver import Version as PEP440Version
21
25
 
26
+ C = typing.TypeVar("C", bound=typing.Callable)
27
+
22
28
 
23
29
  def get_env(*args):
24
30
  for v in args:
@@ -96,10 +102,6 @@ def _get_semver_version():
96
102
  _version = _get_semver_version()
97
103
  _version_str = str(_version)
98
104
 
99
-
100
- def get_version():
101
- return _version_str
102
-
103
105
  def get_resource_opts_defaults() -> pulumi.ResourceOptions:
104
106
  return pulumi.ResourceOptions(
105
107
  version=get_version(),
@@ -287,5 +289,39 @@ async def _await_output(o: pulumi.Output[typing.Any]) -> typing.Tuple[object, bo
287
289
  await o._resources,
288
290
  )
289
291
 
292
+
293
+ # This is included to provide an upgrade path for users who are using a version
294
+ # of the Pulumi SDK (<3.121.0) that does not include the `deprecated` decorator.
295
+ def deprecated(message: str) -> typing.Callable[[C], C]:
296
+ """
297
+ Decorator to indicate a function is deprecated.
298
+
299
+ As well as inserting appropriate statements to indicate that the function is
300
+ deprecated, this decorator also tags the function with a special attribute
301
+ so that Pulumi code can detect that it is deprecated and react appropriately
302
+ in certain situations.
303
+
304
+ message is the deprecation message that should be printed if the function is called.
305
+ """
306
+
307
+ def decorator(fn: C) -> C:
308
+ if not callable(fn):
309
+ raise TypeError("Expected fn to be callable")
310
+
311
+ @functools.wraps(fn)
312
+ def deprecated_fn(*args, **kwargs):
313
+ warnings.warn(message)
314
+ pulumi.warn(f"{fn.__name__} is deprecated: {message}")
315
+
316
+ return fn(*args, **kwargs)
317
+
318
+ deprecated_fn.__dict__["_pulumi_deprecated_callable"] = fn
319
+ return typing.cast(C, deprecated_fn)
320
+
321
+ return decorator
322
+
290
323
  def get_plugin_download_url():
291
324
  return None
325
+
326
+ def get_version():
327
+ return _version_str
@@ -17,6 +17,7 @@ class SecretBackendRoleArgs:
17
17
  backend: pulumi.Input[str],
18
18
  credential_type: pulumi.Input[str],
19
19
  default_sts_ttl: Optional[pulumi.Input[int]] = None,
20
+ external_id: Optional[pulumi.Input[str]] = None,
20
21
  iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
21
22
  iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
22
23
  max_sts_ttl: Optional[pulumi.Input[int]] = None,
@@ -26,6 +27,7 @@ class SecretBackendRoleArgs:
26
27
  policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
27
28
  policy_document: Optional[pulumi.Input[str]] = None,
28
29
  role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
30
+ session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
29
31
  user_path: Optional[pulumi.Input[str]] = None):
30
32
  """
31
33
  The set of arguments for constructing a SecretBackendRole resource.
@@ -39,6 +41,8 @@ class SecretBackendRoleArgs:
39
41
  and a default TTL is specified on the role,
40
42
  then this default TTL will be used. Valid only when `credential_type` is one of
41
43
  `assumed_role` or `federation_token`.
44
+ :param pulumi.Input[str] external_id: External ID to set for assume role creds.
45
+ Valid only when `credential_type` is set to `assumed_role`.
42
46
  :param pulumi.Input[Sequence[pulumi.Input[str]]] iam_groups: A list of IAM group names. IAM users generated
43
47
  against this vault role will be added to these IAM Groups. For a credential
44
48
  type of `assumed_role` or `federation_token`, the policies sent to the
@@ -75,6 +79,9 @@ class SecretBackendRoleArgs:
75
79
  :param pulumi.Input[Sequence[pulumi.Input[str]]] role_arns: Specifies the ARNs of the AWS roles this Vault role
76
80
  is allowed to assume. Required when `credential_type` is `assumed_role` and
77
81
  prohibited otherwise.
82
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] session_tags: A map of strings representing key/value pairs to be set
83
+ during assume role creds creation. Valid only when `credential_type` is set to
84
+ `assumed_role`.
78
85
  :param pulumi.Input[str] user_path: The path for the user name. Valid only when
79
86
  `credential_type` is `iam_user`. Default is `/`.
80
87
  """
@@ -82,6 +89,8 @@ class SecretBackendRoleArgs:
82
89
  pulumi.set(__self__, "credential_type", credential_type)
83
90
  if default_sts_ttl is not None:
84
91
  pulumi.set(__self__, "default_sts_ttl", default_sts_ttl)
92
+ if external_id is not None:
93
+ pulumi.set(__self__, "external_id", external_id)
85
94
  if iam_groups is not None:
86
95
  pulumi.set(__self__, "iam_groups", iam_groups)
87
96
  if iam_tags is not None:
@@ -100,6 +109,8 @@ class SecretBackendRoleArgs:
100
109
  pulumi.set(__self__, "policy_document", policy_document)
101
110
  if role_arns is not None:
102
111
  pulumi.set(__self__, "role_arns", role_arns)
112
+ if session_tags is not None:
113
+ pulumi.set(__self__, "session_tags", session_tags)
103
114
  if user_path is not None:
104
115
  pulumi.set(__self__, "user_path", user_path)
105
116
 
@@ -146,6 +157,19 @@ class SecretBackendRoleArgs:
146
157
  def default_sts_ttl(self, value: Optional[pulumi.Input[int]]):
147
158
  pulumi.set(self, "default_sts_ttl", value)
148
159
 
160
+ @property
161
+ @pulumi.getter(name="externalId")
162
+ def external_id(self) -> Optional[pulumi.Input[str]]:
163
+ """
164
+ External ID to set for assume role creds.
165
+ Valid only when `credential_type` is set to `assumed_role`.
166
+ """
167
+ return pulumi.get(self, "external_id")
168
+
169
+ @external_id.setter
170
+ def external_id(self, value: Optional[pulumi.Input[str]]):
171
+ pulumi.set(self, "external_id", value)
172
+
149
173
  @property
150
174
  @pulumi.getter(name="iamGroups")
151
175
  def iam_groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
@@ -281,6 +305,20 @@ class SecretBackendRoleArgs:
281
305
  def role_arns(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
282
306
  pulumi.set(self, "role_arns", value)
283
307
 
308
+ @property
309
+ @pulumi.getter(name="sessionTags")
310
+ def session_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
311
+ """
312
+ A map of strings representing key/value pairs to be set
313
+ during assume role creds creation. Valid only when `credential_type` is set to
314
+ `assumed_role`.
315
+ """
316
+ return pulumi.get(self, "session_tags")
317
+
318
+ @session_tags.setter
319
+ def session_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
320
+ pulumi.set(self, "session_tags", value)
321
+
284
322
  @property
285
323
  @pulumi.getter(name="userPath")
286
324
  def user_path(self) -> Optional[pulumi.Input[str]]:
@@ -301,6 +339,7 @@ class _SecretBackendRoleState:
301
339
  backend: Optional[pulumi.Input[str]] = None,
302
340
  credential_type: Optional[pulumi.Input[str]] = None,
303
341
  default_sts_ttl: Optional[pulumi.Input[int]] = None,
342
+ external_id: Optional[pulumi.Input[str]] = None,
304
343
  iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
305
344
  iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
306
345
  max_sts_ttl: Optional[pulumi.Input[int]] = None,
@@ -310,6 +349,7 @@ class _SecretBackendRoleState:
310
349
  policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
311
350
  policy_document: Optional[pulumi.Input[str]] = None,
312
351
  role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
352
+ session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
313
353
  user_path: Optional[pulumi.Input[str]] = None):
314
354
  """
315
355
  Input properties used for looking up and filtering SecretBackendRole resources.
@@ -323,6 +363,8 @@ class _SecretBackendRoleState:
323
363
  and a default TTL is specified on the role,
324
364
  then this default TTL will be used. Valid only when `credential_type` is one of
325
365
  `assumed_role` or `federation_token`.
366
+ :param pulumi.Input[str] external_id: External ID to set for assume role creds.
367
+ Valid only when `credential_type` is set to `assumed_role`.
326
368
  :param pulumi.Input[Sequence[pulumi.Input[str]]] iam_groups: A list of IAM group names. IAM users generated
327
369
  against this vault role will be added to these IAM Groups. For a credential
328
370
  type of `assumed_role` or `federation_token`, the policies sent to the
@@ -359,6 +401,9 @@ class _SecretBackendRoleState:
359
401
  :param pulumi.Input[Sequence[pulumi.Input[str]]] role_arns: Specifies the ARNs of the AWS roles this Vault role
360
402
  is allowed to assume. Required when `credential_type` is `assumed_role` and
361
403
  prohibited otherwise.
404
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] session_tags: A map of strings representing key/value pairs to be set
405
+ during assume role creds creation. Valid only when `credential_type` is set to
406
+ `assumed_role`.
362
407
  :param pulumi.Input[str] user_path: The path for the user name. Valid only when
363
408
  `credential_type` is `iam_user`. Default is `/`.
364
409
  """
@@ -368,6 +413,8 @@ class _SecretBackendRoleState:
368
413
  pulumi.set(__self__, "credential_type", credential_type)
369
414
  if default_sts_ttl is not None:
370
415
  pulumi.set(__self__, "default_sts_ttl", default_sts_ttl)
416
+ if external_id is not None:
417
+ pulumi.set(__self__, "external_id", external_id)
371
418
  if iam_groups is not None:
372
419
  pulumi.set(__self__, "iam_groups", iam_groups)
373
420
  if iam_tags is not None:
@@ -386,6 +433,8 @@ class _SecretBackendRoleState:
386
433
  pulumi.set(__self__, "policy_document", policy_document)
387
434
  if role_arns is not None:
388
435
  pulumi.set(__self__, "role_arns", role_arns)
436
+ if session_tags is not None:
437
+ pulumi.set(__self__, "session_tags", session_tags)
389
438
  if user_path is not None:
390
439
  pulumi.set(__self__, "user_path", user_path)
391
440
 
@@ -432,6 +481,19 @@ class _SecretBackendRoleState:
432
481
  def default_sts_ttl(self, value: Optional[pulumi.Input[int]]):
433
482
  pulumi.set(self, "default_sts_ttl", value)
434
483
 
484
+ @property
485
+ @pulumi.getter(name="externalId")
486
+ def external_id(self) -> Optional[pulumi.Input[str]]:
487
+ """
488
+ External ID to set for assume role creds.
489
+ Valid only when `credential_type` is set to `assumed_role`.
490
+ """
491
+ return pulumi.get(self, "external_id")
492
+
493
+ @external_id.setter
494
+ def external_id(self, value: Optional[pulumi.Input[str]]):
495
+ pulumi.set(self, "external_id", value)
496
+
435
497
  @property
436
498
  @pulumi.getter(name="iamGroups")
437
499
  def iam_groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
@@ -567,6 +629,20 @@ class _SecretBackendRoleState:
567
629
  def role_arns(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
568
630
  pulumi.set(self, "role_arns", value)
569
631
 
632
+ @property
633
+ @pulumi.getter(name="sessionTags")
634
+ def session_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
635
+ """
636
+ A map of strings representing key/value pairs to be set
637
+ during assume role creds creation. Valid only when `credential_type` is set to
638
+ `assumed_role`.
639
+ """
640
+ return pulumi.get(self, "session_tags")
641
+
642
+ @session_tags.setter
643
+ def session_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
644
+ pulumi.set(self, "session_tags", value)
645
+
570
646
  @property
571
647
  @pulumi.getter(name="userPath")
572
648
  def user_path(self) -> Optional[pulumi.Input[str]]:
@@ -589,6 +665,7 @@ class SecretBackendRole(pulumi.CustomResource):
589
665
  backend: Optional[pulumi.Input[str]] = None,
590
666
  credential_type: Optional[pulumi.Input[str]] = None,
591
667
  default_sts_ttl: Optional[pulumi.Input[int]] = None,
668
+ external_id: Optional[pulumi.Input[str]] = None,
592
669
  iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
593
670
  iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
594
671
  max_sts_ttl: Optional[pulumi.Input[int]] = None,
@@ -598,6 +675,7 @@ class SecretBackendRole(pulumi.CustomResource):
598
675
  policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
599
676
  policy_document: Optional[pulumi.Input[str]] = None,
600
677
  role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
678
+ session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
601
679
  user_path: Optional[pulumi.Input[str]] = None,
602
680
  __props__=None):
603
681
  """
@@ -647,6 +725,8 @@ class SecretBackendRole(pulumi.CustomResource):
647
725
  and a default TTL is specified on the role,
648
726
  then this default TTL will be used. Valid only when `credential_type` is one of
649
727
  `assumed_role` or `federation_token`.
728
+ :param pulumi.Input[str] external_id: External ID to set for assume role creds.
729
+ Valid only when `credential_type` is set to `assumed_role`.
650
730
  :param pulumi.Input[Sequence[pulumi.Input[str]]] iam_groups: A list of IAM group names. IAM users generated
651
731
  against this vault role will be added to these IAM Groups. For a credential
652
732
  type of `assumed_role` or `federation_token`, the policies sent to the
@@ -683,6 +763,9 @@ class SecretBackendRole(pulumi.CustomResource):
683
763
  :param pulumi.Input[Sequence[pulumi.Input[str]]] role_arns: Specifies the ARNs of the AWS roles this Vault role
684
764
  is allowed to assume. Required when `credential_type` is `assumed_role` and
685
765
  prohibited otherwise.
766
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] session_tags: A map of strings representing key/value pairs to be set
767
+ during assume role creds creation. Valid only when `credential_type` is set to
768
+ `assumed_role`.
686
769
  :param pulumi.Input[str] user_path: The path for the user name. Valid only when
687
770
  `credential_type` is `iam_user`. Default is `/`.
688
771
  """
@@ -745,6 +828,7 @@ class SecretBackendRole(pulumi.CustomResource):
745
828
  backend: Optional[pulumi.Input[str]] = None,
746
829
  credential_type: Optional[pulumi.Input[str]] = None,
747
830
  default_sts_ttl: Optional[pulumi.Input[int]] = None,
831
+ external_id: Optional[pulumi.Input[str]] = None,
748
832
  iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
749
833
  iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
750
834
  max_sts_ttl: Optional[pulumi.Input[int]] = None,
@@ -754,6 +838,7 @@ class SecretBackendRole(pulumi.CustomResource):
754
838
  policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
755
839
  policy_document: Optional[pulumi.Input[str]] = None,
756
840
  role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
841
+ session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
757
842
  user_path: Optional[pulumi.Input[str]] = None,
758
843
  __props__=None):
759
844
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
@@ -771,6 +856,7 @@ class SecretBackendRole(pulumi.CustomResource):
771
856
  raise TypeError("Missing required property 'credential_type'")
772
857
  __props__.__dict__["credential_type"] = credential_type
773
858
  __props__.__dict__["default_sts_ttl"] = default_sts_ttl
859
+ __props__.__dict__["external_id"] = external_id
774
860
  __props__.__dict__["iam_groups"] = iam_groups
775
861
  __props__.__dict__["iam_tags"] = iam_tags
776
862
  __props__.__dict__["max_sts_ttl"] = max_sts_ttl
@@ -780,6 +866,7 @@ class SecretBackendRole(pulumi.CustomResource):
780
866
  __props__.__dict__["policy_arns"] = policy_arns
781
867
  __props__.__dict__["policy_document"] = policy_document
782
868
  __props__.__dict__["role_arns"] = role_arns
869
+ __props__.__dict__["session_tags"] = session_tags
783
870
  __props__.__dict__["user_path"] = user_path
784
871
  super(SecretBackendRole, __self__).__init__(
785
872
  'vault:aws/secretBackendRole:SecretBackendRole',
@@ -794,6 +881,7 @@ class SecretBackendRole(pulumi.CustomResource):
794
881
  backend: Optional[pulumi.Input[str]] = None,
795
882
  credential_type: Optional[pulumi.Input[str]] = None,
796
883
  default_sts_ttl: Optional[pulumi.Input[int]] = None,
884
+ external_id: Optional[pulumi.Input[str]] = None,
797
885
  iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
798
886
  iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
799
887
  max_sts_ttl: Optional[pulumi.Input[int]] = None,
@@ -803,6 +891,7 @@ class SecretBackendRole(pulumi.CustomResource):
803
891
  policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
804
892
  policy_document: Optional[pulumi.Input[str]] = None,
805
893
  role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
894
+ session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
806
895
  user_path: Optional[pulumi.Input[str]] = None) -> 'SecretBackendRole':
807
896
  """
808
897
  Get an existing SecretBackendRole resource's state with the given name, id, and optional extra
@@ -821,6 +910,8 @@ class SecretBackendRole(pulumi.CustomResource):
821
910
  and a default TTL is specified on the role,
822
911
  then this default TTL will be used. Valid only when `credential_type` is one of
823
912
  `assumed_role` or `federation_token`.
913
+ :param pulumi.Input[str] external_id: External ID to set for assume role creds.
914
+ Valid only when `credential_type` is set to `assumed_role`.
824
915
  :param pulumi.Input[Sequence[pulumi.Input[str]]] iam_groups: A list of IAM group names. IAM users generated
825
916
  against this vault role will be added to these IAM Groups. For a credential
826
917
  type of `assumed_role` or `federation_token`, the policies sent to the
@@ -857,6 +948,9 @@ class SecretBackendRole(pulumi.CustomResource):
857
948
  :param pulumi.Input[Sequence[pulumi.Input[str]]] role_arns: Specifies the ARNs of the AWS roles this Vault role
858
949
  is allowed to assume. Required when `credential_type` is `assumed_role` and
859
950
  prohibited otherwise.
951
+ :param pulumi.Input[Mapping[str, pulumi.Input[str]]] session_tags: A map of strings representing key/value pairs to be set
952
+ during assume role creds creation. Valid only when `credential_type` is set to
953
+ `assumed_role`.
860
954
  :param pulumi.Input[str] user_path: The path for the user name. Valid only when
861
955
  `credential_type` is `iam_user`. Default is `/`.
862
956
  """
@@ -867,6 +961,7 @@ class SecretBackendRole(pulumi.CustomResource):
867
961
  __props__.__dict__["backend"] = backend
868
962
  __props__.__dict__["credential_type"] = credential_type
869
963
  __props__.__dict__["default_sts_ttl"] = default_sts_ttl
964
+ __props__.__dict__["external_id"] = external_id
870
965
  __props__.__dict__["iam_groups"] = iam_groups
871
966
  __props__.__dict__["iam_tags"] = iam_tags
872
967
  __props__.__dict__["max_sts_ttl"] = max_sts_ttl
@@ -876,6 +971,7 @@ class SecretBackendRole(pulumi.CustomResource):
876
971
  __props__.__dict__["policy_arns"] = policy_arns
877
972
  __props__.__dict__["policy_document"] = policy_document
878
973
  __props__.__dict__["role_arns"] = role_arns
974
+ __props__.__dict__["session_tags"] = session_tags
879
975
  __props__.__dict__["user_path"] = user_path
880
976
  return SecretBackendRole(resource_name, opts=opts, __props__=__props__)
881
977
 
@@ -910,6 +1006,15 @@ class SecretBackendRole(pulumi.CustomResource):
910
1006
  """
911
1007
  return pulumi.get(self, "default_sts_ttl")
912
1008
 
1009
+ @property
1010
+ @pulumi.getter(name="externalId")
1011
+ def external_id(self) -> pulumi.Output[Optional[str]]:
1012
+ """
1013
+ External ID to set for assume role creds.
1014
+ Valid only when `credential_type` is set to `assumed_role`.
1015
+ """
1016
+ return pulumi.get(self, "external_id")
1017
+
913
1018
  @property
914
1019
  @pulumi.getter(name="iamGroups")
915
1020
  def iam_groups(self) -> pulumi.Output[Optional[Sequence[str]]]:
@@ -1009,6 +1114,16 @@ class SecretBackendRole(pulumi.CustomResource):
1009
1114
  """
1010
1115
  return pulumi.get(self, "role_arns")
1011
1116
 
1117
+ @property
1118
+ @pulumi.getter(name="sessionTags")
1119
+ def session_tags(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
1120
+ """
1121
+ A map of strings representing key/value pairs to be set
1122
+ during assume role creds creation. Valid only when `credential_type` is set to
1123
+ `assumed_role`.
1124
+ """
1125
+ return pulumi.get(self, "session_tags")
1126
+
1012
1127
  @property
1013
1128
  @pulumi.getter(name="userPath")
1014
1129
  def user_path(self) -> pulumi.Output[Optional[str]]:
@@ -231,13 +231,11 @@ class BackendArgs:
231
231
 
232
232
  @property
233
233
  @pulumi.getter(name="useMicrosoftGraphApi")
234
+ @_utilities.deprecated("""This field is not supported in Vault-1.12+ and is the default behavior. This field will be removed in future version of the provider.""")
234
235
  def use_microsoft_graph_api(self) -> Optional[pulumi.Input[bool]]:
235
236
  """
236
237
  Use the Microsoft Graph API. Should be set to true on vault-1.10+
237
238
  """
238
- warnings.warn("""This field is not supported in Vault-1.12+ and is the default behavior. This field will be removed in future version of the provider.""", DeprecationWarning)
239
- pulumi.log.warn("""use_microsoft_graph_api is deprecated: This field is not supported in Vault-1.12+ and is the default behavior. This field will be removed in future version of the provider.""")
240
-
241
239
  return pulumi.get(self, "use_microsoft_graph_api")
242
240
 
243
241
  @use_microsoft_graph_api.setter
@@ -467,13 +465,11 @@ class _BackendState:
467
465
 
468
466
  @property
469
467
  @pulumi.getter(name="useMicrosoftGraphApi")
468
+ @_utilities.deprecated("""This field is not supported in Vault-1.12+ and is the default behavior. This field will be removed in future version of the provider.""")
470
469
  def use_microsoft_graph_api(self) -> Optional[pulumi.Input[bool]]:
471
470
  """
472
471
  Use the Microsoft Graph API. Should be set to true on vault-1.10+
473
472
  """
474
- warnings.warn("""This field is not supported in Vault-1.12+ and is the default behavior. This field will be removed in future version of the provider.""", DeprecationWarning)
475
- pulumi.log.warn("""use_microsoft_graph_api is deprecated: This field is not supported in Vault-1.12+ and is the default behavior. This field will be removed in future version of the provider.""")
476
-
477
473
  return pulumi.get(self, "use_microsoft_graph_api")
478
474
 
479
475
  @use_microsoft_graph_api.setter
@@ -852,12 +848,10 @@ class Backend(pulumi.CustomResource):
852
848
 
853
849
  @property
854
850
  @pulumi.getter(name="useMicrosoftGraphApi")
851
+ @_utilities.deprecated("""This field is not supported in Vault-1.12+ and is the default behavior. This field will be removed in future version of the provider.""")
855
852
  def use_microsoft_graph_api(self) -> pulumi.Output[bool]:
856
853
  """
857
854
  Use the Microsoft Graph API. Should be set to true on vault-1.10+
858
855
  """
859
- warnings.warn("""This field is not supported in Vault-1.12+ and is the default behavior. This field will be removed in future version of the provider.""", DeprecationWarning)
860
- pulumi.log.warn("""use_microsoft_graph_api is deprecated: This field is not supported in Vault-1.12+ and is the default behavior. This field will be removed in future version of the provider.""")
861
-
862
856
  return pulumi.get(self, "use_microsoft_graph_api")
863
857
 
@@ -420,7 +420,7 @@ class Endpoint(pulumi.CustomResource):
420
420
  "password": "changeme"
421
421
  }
422
422
  \"\"\",
423
- opts=pulumi.ResourceOptions(depends_on=[userpass]))
423
+ opts = pulumi.ResourceOptions(depends_on=[userpass]))
424
424
  u1_token = vault.generic.Endpoint("u1_token",
425
425
  path="auth/userpass/login/u1",
426
426
  disable_read=True,
@@ -429,7 +429,7 @@ class Endpoint(pulumi.CustomResource):
429
429
  "password": "changeme"
430
430
  }
431
431
  \"\"\",
432
- opts=pulumi.ResourceOptions(depends_on=[u1]))
432
+ opts = pulumi.ResourceOptions(depends_on=[u1]))
433
433
  u1_entity = vault.generic.Endpoint("u1_entity",
434
434
  disable_read=True,
435
435
  disable_delete=True,
@@ -441,7 +441,7 @@ class Endpoint(pulumi.CustomResource):
441
441
  "alias_mount_accessor": vault_auth_backend.userpass.accessor
442
442
  }
443
443
  \"\"\",
444
- opts=pulumi.ResourceOptions(depends_on=[u1_token]))
444
+ opts = pulumi.ResourceOptions(depends_on=[u1_token]))
445
445
  pulumi.export("u1Id", u1_entity.write_data["id"])
446
446
  ```
447
447
 
@@ -513,7 +513,7 @@ class Endpoint(pulumi.CustomResource):
513
513
  "password": "changeme"
514
514
  }
515
515
  \"\"\",
516
- opts=pulumi.ResourceOptions(depends_on=[userpass]))
516
+ opts = pulumi.ResourceOptions(depends_on=[userpass]))
517
517
  u1_token = vault.generic.Endpoint("u1_token",
518
518
  path="auth/userpass/login/u1",
519
519
  disable_read=True,
@@ -522,7 +522,7 @@ class Endpoint(pulumi.CustomResource):
522
522
  "password": "changeme"
523
523
  }
524
524
  \"\"\",
525
- opts=pulumi.ResourceOptions(depends_on=[u1]))
525
+ opts = pulumi.ResourceOptions(depends_on=[u1]))
526
526
  u1_entity = vault.generic.Endpoint("u1_entity",
527
527
  disable_read=True,
528
528
  disable_delete=True,
@@ -534,7 +534,7 @@ class Endpoint(pulumi.CustomResource):
534
534
  "alias_mount_accessor": vault_auth_backend.userpass.accessor
535
535
  }
536
536
  \"\"\",
537
- opts=pulumi.ResourceOptions(depends_on=[u1_token]))
537
+ opts = pulumi.ResourceOptions(depends_on=[u1_token]))
538
538
  pulumi.export("u1Id", u1_entity.write_data["id"])
539
539
  ```
540
540
 
@@ -263,7 +263,7 @@ def get_entity(alias_id: Optional[str] = None,
263
263
 
264
264
  ## Required Vault Capabilities
265
265
 
266
- Use of this resource requires the `create` capability on `/identity/lookup/entity`.
266
+ Use of this resource requires the `update` capability on `/identity/lookup/entity`.
267
267
 
268
268
 
269
269
  :param str alias_id: ID of the alias.
@@ -333,7 +333,7 @@ def get_entity_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
333
333
 
334
334
  ## Required Vault Capabilities
335
335
 
336
- Use of this resource requires the `create` capability on `/identity/lookup/entity`.
336
+ Use of this resource requires the `update` capability on `/identity/lookup/entity`.
337
337
 
338
338
 
339
339
  :param str alias_id: ID of the alias.
pulumi_vault/mount.py CHANGED
@@ -49,7 +49,8 @@ class MountArgs:
49
49
  :param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
50
50
  :param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
51
51
  not provided, this will default to Vault's OIDC default key.
52
- :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
52
+ :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
53
+ listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
53
54
  :param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
54
55
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
55
56
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
@@ -240,7 +241,8 @@ class MountArgs:
240
241
  @pulumi.getter(name="listingVisibility")
241
242
  def listing_visibility(self) -> Optional[pulumi.Input[str]]:
242
243
  """
243
- Specifies whether to show this mount in the UI-specific listing endpoint
244
+ Specifies whether to show this mount in the UI-specific
245
+ listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
244
246
  """
245
247
  return pulumi.get(self, "listing_visibility")
246
248
 
@@ -377,7 +379,8 @@ class _MountState:
377
379
  :param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
378
380
  :param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
379
381
  not provided, this will default to Vault's OIDC default key.
380
- :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
382
+ :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
383
+ listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
381
384
  :param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
382
385
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
383
386
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
@@ -562,7 +565,8 @@ class _MountState:
562
565
  @pulumi.getter(name="listingVisibility")
563
566
  def listing_visibility(self) -> Optional[pulumi.Input[str]]:
564
567
  """
565
- Specifies whether to show this mount in the UI-specific listing endpoint
568
+ Specifies whether to show this mount in the UI-specific
569
+ listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
566
570
  """
567
571
  return pulumi.get(self, "listing_visibility")
568
572
 
@@ -786,7 +790,8 @@ class Mount(pulumi.CustomResource):
786
790
  :param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
787
791
  :param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
788
792
  not provided, this will default to Vault's OIDC default key.
789
- :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
793
+ :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
794
+ listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
790
795
  :param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
791
796
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
792
797
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
@@ -988,7 +993,8 @@ class Mount(pulumi.CustomResource):
988
993
  :param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
989
994
  :param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
990
995
  not provided, this will default to Vault's OIDC default key.
991
- :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
996
+ :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
997
+ listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
992
998
  :param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
993
999
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
994
1000
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
@@ -1118,7 +1124,8 @@ class Mount(pulumi.CustomResource):
1118
1124
  @pulumi.getter(name="listingVisibility")
1119
1125
  def listing_visibility(self) -> pulumi.Output[Optional[str]]:
1120
1126
  """
1121
- Specifies whether to show this mount in the UI-specific listing endpoint
1127
+ Specifies whether to show this mount in the UI-specific
1128
+ listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
1122
1129
  """
1123
1130
  return pulumi.get(self, "listing_visibility")
1124
1131
 
@@ -194,14 +194,12 @@ class AuthBackendArgs:
194
194
 
195
195
  @property
196
196
  @pulumi.getter(name="maxTtl")
197
+ @_utilities.deprecated("""Deprecated. Please use `token_max_ttl` instead.""")
197
198
  def max_ttl(self) -> Optional[pulumi.Input[str]]:
198
199
  """
199
200
  Maximum duration after which authentication will be expired
200
201
  [See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
201
202
  """
202
- warnings.warn("""Deprecated. Please use `token_max_ttl` instead.""", DeprecationWarning)
203
- pulumi.log.warn("""max_ttl is deprecated: Deprecated. Please use `token_max_ttl` instead.""")
204
-
205
203
  return pulumi.get(self, "max_ttl")
206
204
 
207
205
  @max_ttl.setter
@@ -358,14 +356,12 @@ class AuthBackendArgs:
358
356
 
359
357
  @property
360
358
  @pulumi.getter
359
+ @_utilities.deprecated("""Deprecated. Please use `token_ttl` instead.""")
361
360
  def ttl(self) -> Optional[pulumi.Input[str]]:
362
361
  """
363
362
  Duration after which authentication will be expired.
364
363
  [See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
365
364
  """
366
- warnings.warn("""Deprecated. Please use `token_ttl` instead.""", DeprecationWarning)
367
- pulumi.log.warn("""ttl is deprecated: Deprecated. Please use `token_ttl` instead.""")
368
-
369
365
  return pulumi.get(self, "ttl")
370
366
 
371
367
  @ttl.setter
@@ -572,14 +568,12 @@ class _AuthBackendState:
572
568
 
573
569
  @property
574
570
  @pulumi.getter(name="maxTtl")
571
+ @_utilities.deprecated("""Deprecated. Please use `token_max_ttl` instead.""")
575
572
  def max_ttl(self) -> Optional[pulumi.Input[str]]:
576
573
  """
577
574
  Maximum duration after which authentication will be expired
578
575
  [See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
579
576
  """
580
- warnings.warn("""Deprecated. Please use `token_max_ttl` instead.""", DeprecationWarning)
581
- pulumi.log.warn("""max_ttl is deprecated: Deprecated. Please use `token_max_ttl` instead.""")
582
-
583
577
  return pulumi.get(self, "max_ttl")
584
578
 
585
579
  @max_ttl.setter
@@ -748,14 +742,12 @@ class _AuthBackendState:
748
742
 
749
743
  @property
750
744
  @pulumi.getter
745
+ @_utilities.deprecated("""Deprecated. Please use `token_ttl` instead.""")
751
746
  def ttl(self) -> Optional[pulumi.Input[str]]:
752
747
  """
753
748
  Duration after which authentication will be expired.
754
749
  [See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
755
750
  """
756
- warnings.warn("""Deprecated. Please use `token_ttl` instead.""", DeprecationWarning)
757
- pulumi.log.warn("""ttl is deprecated: Deprecated. Please use `token_ttl` instead.""")
758
-
759
751
  return pulumi.get(self, "ttl")
760
752
 
761
753
  @ttl.setter
@@ -1134,14 +1126,12 @@ class AuthBackend(pulumi.CustomResource):
1134
1126
 
1135
1127
  @property
1136
1128
  @pulumi.getter(name="maxTtl")
1129
+ @_utilities.deprecated("""Deprecated. Please use `token_max_ttl` instead.""")
1137
1130
  def max_ttl(self) -> pulumi.Output[Optional[str]]:
1138
1131
  """
1139
1132
  Maximum duration after which authentication will be expired
1140
1133
  [See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
1141
1134
  """
1142
- warnings.warn("""Deprecated. Please use `token_max_ttl` instead.""", DeprecationWarning)
1143
- pulumi.log.warn("""max_ttl is deprecated: Deprecated. Please use `token_max_ttl` instead.""")
1144
-
1145
1135
  return pulumi.get(self, "max_ttl")
1146
1136
 
1147
1137
  @property
@@ -1254,14 +1244,12 @@ class AuthBackend(pulumi.CustomResource):
1254
1244
 
1255
1245
  @property
1256
1246
  @pulumi.getter
1247
+ @_utilities.deprecated("""Deprecated. Please use `token_ttl` instead.""")
1257
1248
  def ttl(self) -> pulumi.Output[Optional[str]]:
1258
1249
  """
1259
1250
  Duration after which authentication will be expired.
1260
1251
  [See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
1261
1252
  """
1262
- warnings.warn("""Deprecated. Please use `token_ttl` instead.""", DeprecationWarning)
1263
- pulumi.log.warn("""ttl is deprecated: Deprecated. Please use `token_ttl` instead.""")
1264
-
1265
1253
  return pulumi.get(self, "ttl")
1266
1254
 
1267
1255
  @property
pulumi_vault/outputs.py CHANGED
@@ -277,17 +277,27 @@ class GetPolicyDocumentRuleAllowedParameterResult(dict):
277
277
  def __init__(__self__, *,
278
278
  key: str,
279
279
  values: Sequence[str]):
280
+ """
281
+ :param str key: name of permitted or denied parameter.
282
+ :param Sequence[str] values: list of values what are permitted or denied by policy rule.
283
+ """
280
284
  pulumi.set(__self__, "key", key)
281
285
  pulumi.set(__self__, "values", values)
282
286
 
283
287
  @property
284
288
  @pulumi.getter
285
289
  def key(self) -> str:
290
+ """
291
+ name of permitted or denied parameter.
292
+ """
286
293
  return pulumi.get(self, "key")
287
294
 
288
295
  @property
289
296
  @pulumi.getter
290
297
  def values(self) -> Sequence[str]:
298
+ """
299
+ list of values what are permitted or denied by policy rule.
300
+ """
291
301
  return pulumi.get(self, "values")
292
302
 
293
303
 
@@ -296,17 +306,27 @@ class GetPolicyDocumentRuleDeniedParameterResult(dict):
296
306
  def __init__(__self__, *,
297
307
  key: str,
298
308
  values: Sequence[str]):
309
+ """
310
+ :param str key: name of permitted or denied parameter.
311
+ :param Sequence[str] values: list of values what are permitted or denied by policy rule.
312
+ """
299
313
  pulumi.set(__self__, "key", key)
300
314
  pulumi.set(__self__, "values", values)
301
315
 
302
316
  @property
303
317
  @pulumi.getter
304
318
  def key(self) -> str:
319
+ """
320
+ name of permitted or denied parameter.
321
+ """
305
322
  return pulumi.get(self, "key")
306
323
 
307
324
  @property
308
325
  @pulumi.getter
309
326
  def values(self) -> Sequence[str]:
327
+ """
328
+ list of values what are permitted or denied by policy rule.
329
+ """
310
330
  return pulumi.get(self, "values")
311
331
 
312
332
 
@@ -19,6 +19,10 @@ class BackendConfigEstAuthenticatorsArgs:
19
19
  def __init__(__self__, *,
20
20
  cert: Optional[pulumi.Input[Mapping[str, Any]]] = None,
21
21
  userpass: Optional[pulumi.Input[Mapping[str, Any]]] = None):
22
+ """
23
+ :param pulumi.Input[Mapping[str, Any]] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
24
+ :param pulumi.Input[Mapping[str, Any]] userpass: "The accessor (required) property for user pass auth backends".
25
+ """
22
26
  if cert is not None:
23
27
  pulumi.set(__self__, "cert", cert)
24
28
  if userpass is not None:
@@ -27,6 +31,9 @@ class BackendConfigEstAuthenticatorsArgs:
27
31
  @property
28
32
  @pulumi.getter
29
33
  def cert(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
34
+ """
35
+ "The accessor (required) and cert_role (optional) properties for cert auth backends".
36
+ """
30
37
  return pulumi.get(self, "cert")
31
38
 
32
39
  @cert.setter
@@ -36,6 +43,9 @@ class BackendConfigEstAuthenticatorsArgs:
36
43
  @property
37
44
  @pulumi.getter
38
45
  def userpass(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
46
+ """
47
+ "The accessor (required) property for user pass auth backends".
48
+ """
39
49
  return pulumi.get(self, "userpass")
40
50
 
41
51
  @userpass.setter
@@ -20,6 +20,10 @@ class BackendConfigEstAuthenticators(dict):
20
20
  def __init__(__self__, *,
21
21
  cert: Optional[Mapping[str, Any]] = None,
22
22
  userpass: Optional[Mapping[str, Any]] = None):
23
+ """
24
+ :param Mapping[str, Any] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
25
+ :param Mapping[str, Any] userpass: "The accessor (required) property for user pass auth backends".
26
+ """
23
27
  if cert is not None:
24
28
  pulumi.set(__self__, "cert", cert)
25
29
  if userpass is not None:
@@ -28,11 +32,17 @@ class BackendConfigEstAuthenticators(dict):
28
32
  @property
29
33
  @pulumi.getter
30
34
  def cert(self) -> Optional[Mapping[str, Any]]:
35
+ """
36
+ "The accessor (required) and cert_role (optional) properties for cert auth backends".
37
+ """
31
38
  return pulumi.get(self, "cert")
32
39
 
33
40
  @property
34
41
  @pulumi.getter
35
42
  def userpass(self) -> Optional[Mapping[str, Any]]:
43
+ """
44
+ "The accessor (required) property for user pass auth backends".
45
+ """
36
46
  return pulumi.get(self, "userpass")
37
47
 
38
48
 
@@ -743,7 +743,7 @@ class SecretBackendCert(pulumi.CustomResource):
743
743
  backend=intermediate["path"],
744
744
  name=test["name"],
745
745
  common_name="app.my.domain",
746
- opts=pulumi.ResourceOptions(depends_on=[admin]))
746
+ opts = pulumi.ResourceOptions(depends_on=[admin]))
747
747
  ```
748
748
 
749
749
  :param str resource_name: The name of the resource.
@@ -786,7 +786,7 @@ class SecretBackendCert(pulumi.CustomResource):
786
786
  backend=intermediate["path"],
787
787
  name=test["name"],
788
788
  common_name="app.my.domain",
789
- opts=pulumi.ResourceOptions(depends_on=[admin]))
789
+ opts = pulumi.ResourceOptions(depends_on=[admin]))
790
790
  ```
791
791
 
792
792
  :param str resource_name: The name of the resource.
@@ -200,7 +200,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
200
200
  MUR4qFxeUOW/GJGccMUd
201
201
  -----END CERTIFICATE-----
202
202
  \"\"\",
203
- opts=pulumi.ResourceOptions(depends_on=[intermediate_vault_mount]))
203
+ opts = pulumi.ResourceOptions(depends_on=[intermediate_vault_mount]))
204
204
  ```
205
205
 
206
206
  :param str resource_name: The name of the resource.
@@ -276,7 +276,7 @@ class SecretBackendConfigCa(pulumi.CustomResource):
276
276
  MUR4qFxeUOW/GJGccMUd
277
277
  -----END CERTIFICATE-----
278
278
  \"\"\",
279
- opts=pulumi.ResourceOptions(depends_on=[intermediate_vault_mount]))
279
+ opts = pulumi.ResourceOptions(depends_on=[intermediate_vault_mount]))
280
280
  ```
281
281
 
282
282
  :param str resource_name: The name of the resource.
@@ -970,7 +970,7 @@ class SecretBackendIntermediateCertRequest(pulumi.CustomResource):
970
970
  backend=pki["path"],
971
971
  type="internal",
972
972
  common_name="app.my.domain",
973
- opts=pulumi.ResourceOptions(depends_on=[pki]))
973
+ opts = pulumi.ResourceOptions(depends_on=[pki]))
974
974
  ```
975
975
 
976
976
  :param str resource_name: The name of the resource.
@@ -1028,7 +1028,7 @@ class SecretBackendIntermediateCertRequest(pulumi.CustomResource):
1028
1028
  backend=pki["path"],
1029
1029
  type="internal",
1030
1030
  common_name="app.my.domain",
1031
- opts=pulumi.ResourceOptions(depends_on=[pki]))
1031
+ opts = pulumi.ResourceOptions(depends_on=[pki]))
1032
1032
  ```
1033
1033
 
1034
1034
  :param str resource_name: The name of the resource.
@@ -1089,7 +1089,7 @@ class SecretBackendRootCert(pulumi.CustomResource):
1089
1089
  exclude_cn_from_sans=True,
1090
1090
  ou="My OU",
1091
1091
  organization="My organization",
1092
- opts=pulumi.ResourceOptions(depends_on=[pki]))
1092
+ opts = pulumi.ResourceOptions(depends_on=[pki]))
1093
1093
  ```
1094
1094
 
1095
1095
  :param str resource_name: The name of the resource.
@@ -1157,7 +1157,7 @@ class SecretBackendRootCert(pulumi.CustomResource):
1157
1157
  exclude_cn_from_sans=True,
1158
1158
  ou="My OU",
1159
1159
  organization="My organization",
1160
- opts=pulumi.ResourceOptions(depends_on=[pki]))
1160
+ opts = pulumi.ResourceOptions(depends_on=[pki]))
1161
1161
  ```
1162
1162
 
1163
1163
  :param str resource_name: The name of the resource.
@@ -911,7 +911,7 @@ class SecretBackendRootSignIntermediate(pulumi.CustomResource):
911
911
  exclude_cn_from_sans=True,
912
912
  ou="My OU",
913
913
  organization="My organization",
914
- opts=pulumi.ResourceOptions(depends_on=[intermediate]))
914
+ opts = pulumi.ResourceOptions(depends_on=[intermediate]))
915
915
  ```
916
916
 
917
917
  :param str resource_name: The name of the resource.
@@ -968,7 +968,7 @@ class SecretBackendRootSignIntermediate(pulumi.CustomResource):
968
968
  exclude_cn_from_sans=True,
969
969
  ou="My OU",
970
970
  organization="My organization",
971
- opts=pulumi.ResourceOptions(depends_on=[intermediate]))
971
+ opts = pulumi.ResourceOptions(depends_on=[intermediate]))
972
972
  ```
973
973
 
974
974
  :param str resource_name: The name of the resource.
@@ -684,7 +684,7 @@ class SecretBackendSign(pulumi.CustomResource):
684
684
  -----END CERTIFICATE REQUEST-----
685
685
  \"\"\",
686
686
  common_name="test.my.domain",
687
- opts=pulumi.ResourceOptions(depends_on=[admin]))
687
+ opts = pulumi.ResourceOptions(depends_on=[admin]))
688
688
  ```
689
689
 
690
690
  :param str resource_name: The name of the resource.
@@ -756,7 +756,7 @@ class SecretBackendSign(pulumi.CustomResource):
756
756
  -----END CERTIFICATE REQUEST-----
757
757
  \"\"\",
758
758
  common_name="test.my.domain",
759
- opts=pulumi.ResourceOptions(depends_on=[admin]))
759
+ opts = pulumi.ResourceOptions(depends_on=[admin]))
760
760
  ```
761
761
 
762
762
  :param str resource_name: The name of the resource.
pulumi_vault/provider.py CHANGED
@@ -349,13 +349,11 @@ class ProviderArgs:
349
349
 
350
350
  @property
351
351
  @pulumi.getter(name="clientAuth")
352
+ @_utilities.deprecated("""Use auth_login_cert instead""")
352
353
  def client_auth(self) -> Optional[pulumi.Input['ProviderClientAuthArgs']]:
353
354
  """
354
355
  Client authentication credentials.
355
356
  """
356
- warnings.warn("""Use auth_login_cert instead""", DeprecationWarning)
357
- pulumi.log.warn("""client_auth is deprecated: Use auth_login_cert instead""")
358
-
359
357
  return pulumi.get(self, "client_auth")
360
358
 
361
359
  @client_auth.setter
@@ -1,5 +1,5 @@
1
1
  {
2
2
  "resource": true,
3
3
  "name": "vault",
4
- "version": "6.2.0-alpha.1718998938"
4
+ "version": "6.3.0"
5
5
  }
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: pulumi_vault
3
- Version: 6.2.0a1718998938
3
+ Version: 6.3.0
4
4
  Summary: A Pulumi package for creating and managing HashiCorp Vault cloud resources.
5
5
  License: Apache-2.0
6
6
  Project-URL: Homepage, https://pulumi.io
@@ -1,6 +1,6 @@
1
1
  pulumi_vault/__init__.py,sha256=YyUZ3AwssRd84-MFiLiMsKlEs0Gl5dnqjoRlDWbWe70,31607
2
- pulumi_vault/_inputs.py,sha256=mjyuroOXUphjofRI4JeGJ2Q1ESCb9uJeiA4C48NHfNQ,72858
3
- pulumi_vault/_utilities.py,sha256=b6gJn0IIeM1t6Q7EVjqw3yhuGyP-uENQhtL5yp7aHR8,9248
2
+ pulumi_vault/_inputs.py,sha256=Q9weKCzZZ0f0tVbn8d3jxCbKRwRhRzvmBLbinoDTPns,73552
3
+ pulumi_vault/_utilities.py,sha256=aNnnaO6zRha3FhNHonuabR4fJLWGXANtK5dlh1Mz95k,10506
4
4
  pulumi_vault/audit.py,sha256=DlMWyovN9OrGVBpDgNvvtMRMpZRI_pC8YwqEaI9S6lk,20343
5
5
  pulumi_vault/audit_request_header.py,sha256=CHCfbFBwzX3mU6Fi34Havyl8cH9Mtzj5BDmKIc2tIno,10313
6
6
  pulumi_vault/auth_backend.py,sha256=v4dxfpqhg94wXTnSuKAJ8-qBC_TnUXneSa-ODx9NNoQ,23808
@@ -17,17 +17,17 @@ pulumi_vault/mfa_duo.py,sha256=LJzOnwcNhzbgogrW4cyvadUFnB7wasK-QQ4MbPU0eS4,28237
17
17
  pulumi_vault/mfa_okta.py,sha256=pA6n9k3BBMHXLvvyjOoSxTirgAznz5M0bWeXjHq8riU,29503
18
18
  pulumi_vault/mfa_pingid.py,sha256=h4W3TOvcUQK1gzwqiC6samirfBghCTIcBgd3KpyBGww,30972
19
19
  pulumi_vault/mfa_totp.py,sha256=J-c-GoVmO6FED6UDff2AtZJh5R8XlbnYY7CDeuPopI0,25344
20
- pulumi_vault/mount.py,sha256=bcvGRLfo5rYBpP72qfdYm7H90lsPb5vDDQR1Xhviifo,59240
20
+ pulumi_vault/mount.py,sha256=c1LAxLDySvex6kcEwzd4ZmRUBhWf3Saetpue9MLTiYs,59849
21
21
  pulumi_vault/namespace.py,sha256=QKY3lKdHIZpT_l0Ut6Fk_FarRPsEkLyxv1tmfgXXoU0,18077
22
22
  pulumi_vault/nomad_secret_backend.py,sha256=cmL2NkjNIZxu9a7NEMMHgojGi12I2tGDojFdMGSgj04,42018
23
23
  pulumi_vault/nomad_secret_role.py,sha256=47QltNPaM58oiCXt77Z6r1cXRVN79FhYWI7Iei5sQ3w,20146
24
- pulumi_vault/outputs.py,sha256=mcrrIhKLRFtb_JPFAdlsFxARGwRL_HPRFsP5x39EnVI,13066
24
+ pulumi_vault/outputs.py,sha256=88VJ3ypd_FjGNbSs30B5o6hAiAvWU2bx4SoCfTBGyIc,13760
25
25
  pulumi_vault/password_policy.py,sha256=sDU2lauo4-13snK35DOXtWbzn_bMJ5AZS-gS57T0aUw,12241
26
26
  pulumi_vault/plugin.py,sha256=0fBhSZDyQhzML9r1Udhy9ngHcfjwzi1BzvutsbKKUwU,23482
27
27
  pulumi_vault/plugin_pinned_version.py,sha256=mo62qPp_IwJRnv5t2p9ywInEjwHFsBunoyCDGc0bveg,10583
28
28
  pulumi_vault/policy.py,sha256=V6knAiqkzH97T72s6FB2qNjScDfKOAl3mox1h7vg0Ps,10935
29
- pulumi_vault/provider.py,sha256=mfFA88nxZdkVctKKkuqkJD9m9jwti5yrpuBca7ha9Kc,41810
30
- pulumi_vault/pulumi-plugin.json,sha256=saDZo9UYISp_0jPm8T1Sf5Khtz9gjmPR2OoXQbvWa2g,81
29
+ pulumi_vault/provider.py,sha256=gvnZj6hsMxMypnzizoolBed2LmtQPUCyMXlgGWpmLxY,41708
30
+ pulumi_vault/pulumi-plugin.json,sha256=j8R--JRVm5NAC9dzEru5GOAjDXh5eXuVXX3iv7h9Z4I,64
31
31
  pulumi_vault/py.typed,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
32
32
  pulumi_vault/quota_lease_count.py,sha256=w5CLQQjCk9PKSzX_XeLMEV87xre-poHJG9NfAGVVTjw,24898
33
33
  pulumi_vault/quota_rate_limit.py,sha256=hA0tDU-54VrfcTHCzbRU-TL32BLnPBxhl92faufEkZo,29503
@@ -60,13 +60,13 @@ pulumi_vault/aws/auth_backend_sts_role.py,sha256=yy2-_7dY4LEjFjo2ROE905-o-3uiHqL
60
60
  pulumi_vault/aws/get_access_credentials.py,sha256=AjYqLOhyucc98yNNh39DpTwBzTnSPgUeOgWAqiWZs9c,12282
61
61
  pulumi_vault/aws/get_static_access_credentials.py,sha256=65NLi7oDfPERU_XHaQC7kYkw-VngpesORVJ5B8ahPwo,4742
62
62
  pulumi_vault/aws/secret_backend.py,sha256=VoDgh8p5z7KC0jhBu5bh_oKcvYscPciTnEe00X3WaD8,49429
63
- pulumi_vault/aws/secret_backend_role.py,sha256=Vim6Vfq5SrC_oNajDFXv7TM9xlDP46ju7gBfuHQcyrM,50962
63
+ pulumi_vault/aws/secret_backend_role.py,sha256=mGJYeBEct69kdK9HfS7k7wQgrlatu93U-ZkFbgNUQck,56724
64
64
  pulumi_vault/aws/secret_backend_static_role.py,sha256=XB-cCvBxYf3G1yp8FUh1ecUDIHAc80pV8mokb3NS1HQ,17821
65
65
  pulumi_vault/azure/__init__.py,sha256=Ip6GcRxEn43qDXL93F4Jm2uYqW7HJlPK_dg1WrfwXBg,471
66
66
  pulumi_vault/azure/_inputs.py,sha256=uS9C0fl059lbaxHD8PiAwWbCrDahbgBcqztfYeTDaEo,2564
67
67
  pulumi_vault/azure/auth_backend_config.py,sha256=L7BYNzTzVvSpEwAcj-L5i72svSmN7vxbdSoyhNcGXqs,29998
68
68
  pulumi_vault/azure/auth_backend_role.py,sha256=WIsx6I1JGTLpc6L-OWNkLG2HrUFtjM1GK3KZ2ZZUIms,54712
69
- pulumi_vault/azure/backend.py,sha256=IQyUSBH33j1EabeTxvmkdj8WFMs9t7Gbh5buTqf6c1A,40434
69
+ pulumi_vault/azure/backend.py,sha256=VrAO8acNmopJ756h-yQtw1Of74Nu8Rjva8s3R7h5TF4,39774
70
70
  pulumi_vault/azure/backend_role.py,sha256=jttVdJcKQDTHMUTm9yA3K6ghgSC3Ubi_Sd38_U2NgPQ,39016
71
71
  pulumi_vault/azure/get_access_credentials.py,sha256=Mg39uwR4vmnoeVjQNhJ_SWLlxJIw3C66uo4gA-WGuy4,17803
72
72
  pulumi_vault/azure/outputs.py,sha256=YagOWiNzWojabE3fAvk4VvINp5R5IcBBr1Gmu6PbYNI,3097
@@ -97,7 +97,7 @@ pulumi_vault/gcp/secret_impersonated_account.py,sha256=dvpRVSEVLzBU_cGAlaJ-7Hecd
97
97
  pulumi_vault/gcp/secret_roleset.py,sha256=RomErefa7yXgVrBMBwMezWmOwrQEEp8jLPIS2vZw1rQ,25967
98
98
  pulumi_vault/gcp/secret_static_account.py,sha256=jkq1H-JpJq3UqBPNLFfvT0M9rvWvW7F_f7VD8vUw7yI,27271
99
99
  pulumi_vault/generic/__init__.py,sha256=sKMQ22SKTgwwj91ZVDPGiwt7EuLghz3p3bdX6oiTwZ0,341
100
- pulumi_vault/generic/endpoint.py,sha256=AKdi5_rSddJZRsWhMix6NwEif_C3dSpAvXMgQ8YWCfc,39069
100
+ pulumi_vault/generic/endpoint.py,sha256=JdeSmTe79jG7cTOlL8z2PwnddPlnh0MNqMexeNxihE4,39081
101
101
  pulumi_vault/generic/get_secret.py,sha256=HsfdXt5HHkoscA6cV4VRjO3NrETRPm2rg1IuZZh5H0Y,11244
102
102
  pulumi_vault/generic/secret.py,sha256=3hCZ9LrKPJ_2ek83OmQ3YMk-8ub3cn-d8Vcd9TbxscM,22847
103
103
  pulumi_vault/github/__init__.py,sha256=ZYCQvKsnIeVKx_BIqkC8IqGBS4TjXNeo8iZxHbmztGk,382
@@ -110,7 +110,7 @@ pulumi_vault/identity/__init__.py,sha256=0lwEIF5yG_HPzGj-VTGpnAPyd5zqwoLC0ltNaWW
110
110
  pulumi_vault/identity/entity.py,sha256=n0urur32RKQ4eEzU8TzkrsEr_iVU7CnjJu-GT2-igEU,19832
111
111
  pulumi_vault/identity/entity_alias.py,sha256=F6u_zADIe7DFrPem3FB11kU618b6VqMbJCEDqQ8Vqn0,18539
112
112
  pulumi_vault/identity/entity_policies.py,sha256=IVW9T5hHFcToSmM9DX0tYTZ7m5kMC-LF8hmsGVUSZkA,19927
113
- pulumi_vault/identity/get_entity.py,sha256=6tp6fyb26cnkkxi2dahnoIJaz5RVshhq0BJGKHmPDVY,14351
113
+ pulumi_vault/identity/get_entity.py,sha256=DuvhHx1ZpDhxdHYebh7DWOQ-iIY57F6OscJR4LPvpAU,14351
114
114
  pulumi_vault/identity/get_group.py,sha256=uD9KxGqQp2rOgExzehjgC1-AeIvY99QKRPS4EaC1_0Y,17956
115
115
  pulumi_vault/identity/get_oidc_client_creds.py,sha256=y8S0VLA_bVhqxmLHsMlBZrcRHBpjrTphPgVpU4FPgM0,5927
116
116
  pulumi_vault/identity/get_oidc_openid_config.py,sha256=B75fMH2x5QFtDUKO0hheszmMrM9EvRQ3JszpCWPiI7k,13482
@@ -181,12 +181,12 @@ pulumi_vault/mongodbatlas/secret_backend.py,sha256=AO34JvDA1RYZTstomWWIXdWWpKfGi
181
181
  pulumi_vault/mongodbatlas/secret_role.py,sha256=0OpKNxuX6l7OT3Ov5rEqetlaHWmu6oLNTiUxsxiVGjQ,33615
182
182
  pulumi_vault/okta/__init__.py,sha256=XjquFz2tppASPCFGZ9YE51_cVH69eGAiToFyehc0wcY,409
183
183
  pulumi_vault/okta/_inputs.py,sha256=LJ6EEWcEeLwVRZJYT0YRlH1oJH5pf_0nVf8Cu_uQf5E,3511
184
- pulumi_vault/okta/auth_backend.py,sha256=qho5B6LaeihL5cHTCscaTSVBsjbBHsRccJrHwoikL_0,60630
184
+ pulumi_vault/okta/auth_backend.py,sha256=bxVG-o09XHx5eeAgMpcqLz1poiDT3Ov0R72qFsNpBiQ,59946
185
185
  pulumi_vault/okta/auth_backend_group.py,sha256=5Sw2MK4d5AnVMXT3O1a8fMbiqDOP1gmaudY-KLDhRfo,14975
186
186
  pulumi_vault/okta/auth_backend_user.py,sha256=kiNHbdduI1R4XWbtnHWvdCIW8xR-UykSQGp1CLujeRk,16937
187
187
  pulumi_vault/okta/outputs.py,sha256=8IPwy3nKDVxvwT8wd9dyFm3hfPYd_FXZ4TcCkT9vUR4,3067
188
188
  pulumi_vault/pkisecret/__init__.py,sha256=Lwp_52rZJohEKOGZTENoaHtUcsrMDlAa87JRrMSrXcw,1103
189
- pulumi_vault/pkisecret/_inputs.py,sha256=SDVn0tXfYrSSVDZJ43CDY7yy4nhTzso3gmeNPefy2Zg,3094
189
+ pulumi_vault/pkisecret/_inputs.py,sha256=w-AtpcUpcZAI0q1yE_6E8MuYUWe7tKkxOinoCFrps-I,3592
190
190
  pulumi_vault/pkisecret/backend_config_cluster.py,sha256=gJDXjoh1qkAnXm6BAP65AXrDaY2q8aZpclglNBwCx2U,15929
191
191
  pulumi_vault/pkisecret/backend_config_est.py,sha256=NEhpisOocjL-_w3_b97Bw2kUz9lPxki1PGylh-1M0wQ,32409
192
192
  pulumi_vault/pkisecret/get_backend_config_est.py,sha256=pYeRNsK3RLeTmrPaU1rCi1pn8BC12kIvME6uHqniQps,9896
@@ -194,20 +194,20 @@ pulumi_vault/pkisecret/get_backend_issuer.py,sha256=098K4SWse6Xt5NCzqLqFFaqMHtuP
194
194
  pulumi_vault/pkisecret/get_backend_issuers.py,sha256=SQMnqHSCQzVBVNjHio7Pt3BQvYS1sNbgb75TeoClWoU,6398
195
195
  pulumi_vault/pkisecret/get_backend_key.py,sha256=NIjBO6CBmZ0gJ44wWnz510nQ4E47aQhuytFE-iSyhXY,6930
196
196
  pulumi_vault/pkisecret/get_backend_keys.py,sha256=Ke6ggiCEupZK3x1bvo1cPTLlKeOp4wVG09LyuldvL90,6303
197
- pulumi_vault/pkisecret/outputs.py,sha256=WbI2UNcZkEQbMyXzlQmHvqndGoa4e1uZXUASmsfmwdM,3409
198
- pulumi_vault/pkisecret/secret_backend_cert.py,sha256=pfs4qM3-ZAtAgvUAe_pPyCVcV7YjZtJvkdrp5S818R8,49695
199
- pulumi_vault/pkisecret/secret_backend_config_ca.py,sha256=ue_jncJRYwddzsPZNo_4nD0EoPkjc7zgjb82a-67RqY,18954
197
+ pulumi_vault/pkisecret/outputs.py,sha256=yPqzmnBbWgIR8K2_Bln9dE3ZNdxc6ns4cligGeEeJjE,3879
198
+ pulumi_vault/pkisecret/secret_backend_cert.py,sha256=arfvGLS6IEmMVdIAl7d5OTjPPt05VGtRKdYV7QhMSnc,49699
199
+ pulumi_vault/pkisecret/secret_backend_config_ca.py,sha256=8JIjvEqZ-2uCuK6sh7TwhVdU5RgakdsGjham4iRsKUg,18958
200
200
  pulumi_vault/pkisecret/secret_backend_config_issuers.py,sha256=Hrk1TZ-vIYlDE-lmBRPndL2dwTh9MZbDN1Q3AVA6IZ0,16978
201
201
  pulumi_vault/pkisecret/secret_backend_config_urls.py,sha256=rWkiZ4WZYw6i2zqyq0BK6J0gV8gWciUM_EDdgJJhW2c,22043
202
202
  pulumi_vault/pkisecret/secret_backend_crl_config.py,sha256=CfErn8n871l4dL3ZriMJno4zTIm7jGWHvZjcPjYFdwc,36811
203
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py,sha256=EqzQ9Pw9CKgcy0WylVhvQNEFx3b_aL8rulygTBYl9Lc,61789
203
+ pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py,sha256=MoWBzOHYCtF0uTywkZ-14dQuOi2iES0D7NdIMbzpnNI,61793
204
204
  pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py,sha256=VzfgaPaTkYOfrTD2m6KhkI6Odd1ioezzi33vhpv9ZnM,20048
205
205
  pulumi_vault/pkisecret/secret_backend_issuer.py,sha256=w8BHFPIuP9JywCIUBnbsoa8EzAaw0BMK6EpFJLb1tYU,36625
206
206
  pulumi_vault/pkisecret/secret_backend_key.py,sha256=XFjLUzMf1ssTfrlO0n-IABiAkiBMpGh4yBmn0TgIv3A,25523
207
207
  pulumi_vault/pkisecret/secret_backend_role.py,sha256=Jy_YC8WubYSnkhTNPy-RsDJloS0n_wkfzJ7Kuyq2cfs,116221
208
- pulumi_vault/pkisecret/secret_backend_root_cert.py,sha256=FynSVwKnhnVaM7YJTn2m_0n2XBStDAjvi8XuKWukdX8,68833
209
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py,sha256=jr_ExKJzyUtWedMbJUSC6TW0WaHH0mUesjHTPzHK10A,58420
210
- pulumi_vault/pkisecret/secret_backend_sign.py,sha256=EEVcb_adGJL4JzRxUAHSJKDQRwM76xDO8pb6-q4zx14,48576
208
+ pulumi_vault/pkisecret/secret_backend_root_cert.py,sha256=Qeosf1eYf7qjvkF7xLoVL1pCTcC7ZvH37bI2puIKYro,68837
209
+ pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py,sha256=AMxQpjkCBXc18gbup1i8RXhHIHSSeDqjpapy2OpCECg,58424
210
+ pulumi_vault/pkisecret/secret_backend_sign.py,sha256=QOPtCkvvIAU8tBO4bQNrDq_oHVgsEd9ysXqavAtDfoo,48580
211
211
  pulumi_vault/rabbitmq/__init__.py,sha256=8QnL4OBf123TwWNwxgf2zSsJVPuTixNLywif1gW1yII,379
212
212
  pulumi_vault/rabbitmq/_inputs.py,sha256=F2Cv6ny7hvCFdKWpRxP2LIVqc4pa7X7x1opydarlnfI,5281
213
213
  pulumi_vault/rabbitmq/outputs.py,sha256=0KZQuaiJ0oKjsGfuUordXRtsZxSeApHVIK-sI9k_7gg,3853
@@ -250,7 +250,7 @@ pulumi_vault/transit/get_decrypt.py,sha256=6rFzK4Ghf3tWRNJ_rSCs0yJsPynk9oeqZIJJq
250
250
  pulumi_vault/transit/get_encrypt.py,sha256=wz1GDrLP8JzDLCcjbU7tZM7vHNtBQ9PPpLHczy22uqY,5712
251
251
  pulumi_vault/transit/secret_backend_key.py,sha256=56to0JZaIFaCZVeiW5pNKER6azVhs2JXJoccgdVdtoI,53286
252
252
  pulumi_vault/transit/secret_cache_config.py,sha256=kSfKajNG2v5iPtoEnNLRXCIR5sRGUqTTxRW-tT0X_iM,12483
253
- pulumi_vault-6.2.0a1718998938.dist-info/METADATA,sha256=0ghMSIIdBKua-viCxAH3B5owhZm5YpxiS7aWvrtTROM,4860
254
- pulumi_vault-6.2.0a1718998938.dist-info/WHEEL,sha256=cpQTJ5IWu9CdaPViMhC9YzF8gZuS5-vlfoFihTBC86A,91
255
- pulumi_vault-6.2.0a1718998938.dist-info/top_level.txt,sha256=J7lAGvfexHc6T1EpDBGNKF0SXWURpmUhyzi9Nr5I61w,13
256
- pulumi_vault-6.2.0a1718998938.dist-info/RECORD,,
253
+ pulumi_vault-6.3.0.dist-info/METADATA,sha256=EAluMaciG4gKF2BjCluv6DF8x2Wdn5cX8v5sirQf6CQ,4849
254
+ pulumi_vault-6.3.0.dist-info/WHEEL,sha256=R0nc6qTxuoLk7ShA2_Y-UWkN8ZdfDBG2B6Eqpz2WXbs,91
255
+ pulumi_vault-6.3.0.dist-info/top_level.txt,sha256=J7lAGvfexHc6T1EpDBGNKF0SXWURpmUhyzi9Nr5I61w,13
256
+ pulumi_vault-6.3.0.dist-info/RECORD,,
@@ -1,5 +1,5 @@
1
1
  Wheel-Version: 1.0
2
- Generator: setuptools (70.1.0)
2
+ Generator: setuptools (72.1.0)
3
3
  Root-Is-Purelib: true
4
4
  Tag: py3-none-any
5
5