pulumi-vault 6.3.0__py3-none-any.whl → 6.3.0a1719265746__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/_inputs.py +0 -20
- pulumi_vault/_utilities.py +4 -5
- pulumi_vault/aws/secret_backend_role.py +0 -115
- pulumi_vault/identity/get_entity.py +2 -2
- pulumi_vault/mount.py +7 -14
- pulumi_vault/outputs.py +0 -20
- pulumi_vault/pkisecret/_inputs.py +0 -10
- pulumi_vault/pkisecret/outputs.py +0 -10
- pulumi_vault/pulumi-plugin.json +1 -1
- {pulumi_vault-6.3.0.dist-info → pulumi_vault-6.3.0a1719265746.dist-info}/METADATA +1 -1
- {pulumi_vault-6.3.0.dist-info → pulumi_vault-6.3.0a1719265746.dist-info}/RECORD +13 -13
- {pulumi_vault-6.3.0.dist-info → pulumi_vault-6.3.0a1719265746.dist-info}/WHEEL +1 -1
- {pulumi_vault-6.3.0.dist-info → pulumi_vault-6.3.0a1719265746.dist-info}/top_level.txt +0 -0
pulumi_vault/_inputs.py
CHANGED
@@ -1844,19 +1844,12 @@ class GetPolicyDocumentRuleAllowedParameterArgs:
|
|
1844
1844
|
def __init__(__self__, *,
|
1845
1845
|
key: str,
|
1846
1846
|
values: Sequence[str]):
|
1847
|
-
"""
|
1848
|
-
:param str key: name of permitted or denied parameter.
|
1849
|
-
:param Sequence[str] values: list of values what are permitted or denied by policy rule.
|
1850
|
-
"""
|
1851
1847
|
pulumi.set(__self__, "key", key)
|
1852
1848
|
pulumi.set(__self__, "values", values)
|
1853
1849
|
|
1854
1850
|
@property
|
1855
1851
|
@pulumi.getter
|
1856
1852
|
def key(self) -> str:
|
1857
|
-
"""
|
1858
|
-
name of permitted or denied parameter.
|
1859
|
-
"""
|
1860
1853
|
return pulumi.get(self, "key")
|
1861
1854
|
|
1862
1855
|
@key.setter
|
@@ -1866,9 +1859,6 @@ class GetPolicyDocumentRuleAllowedParameterArgs:
|
|
1866
1859
|
@property
|
1867
1860
|
@pulumi.getter
|
1868
1861
|
def values(self) -> Sequence[str]:
|
1869
|
-
"""
|
1870
|
-
list of values what are permitted or denied by policy rule.
|
1871
|
-
"""
|
1872
1862
|
return pulumi.get(self, "values")
|
1873
1863
|
|
1874
1864
|
@values.setter
|
@@ -1881,19 +1871,12 @@ class GetPolicyDocumentRuleDeniedParameterArgs:
|
|
1881
1871
|
def __init__(__self__, *,
|
1882
1872
|
key: str,
|
1883
1873
|
values: Sequence[str]):
|
1884
|
-
"""
|
1885
|
-
:param str key: name of permitted or denied parameter.
|
1886
|
-
:param Sequence[str] values: list of values what are permitted or denied by policy rule.
|
1887
|
-
"""
|
1888
1874
|
pulumi.set(__self__, "key", key)
|
1889
1875
|
pulumi.set(__self__, "values", values)
|
1890
1876
|
|
1891
1877
|
@property
|
1892
1878
|
@pulumi.getter
|
1893
1879
|
def key(self) -> str:
|
1894
|
-
"""
|
1895
|
-
name of permitted or denied parameter.
|
1896
|
-
"""
|
1897
1880
|
return pulumi.get(self, "key")
|
1898
1881
|
|
1899
1882
|
@key.setter
|
@@ -1903,9 +1886,6 @@ class GetPolicyDocumentRuleDeniedParameterArgs:
|
|
1903
1886
|
@property
|
1904
1887
|
@pulumi.getter
|
1905
1888
|
def values(self) -> Sequence[str]:
|
1906
|
-
"""
|
1907
|
-
list of values what are permitted or denied by policy rule.
|
1908
|
-
"""
|
1909
1889
|
return pulumi.get(self, "values")
|
1910
1890
|
|
1911
1891
|
@values.setter
|
pulumi_vault/_utilities.py
CHANGED
@@ -13,12 +13,10 @@ import os
|
|
13
13
|
import sys
|
14
14
|
import typing
|
15
15
|
import warnings
|
16
|
-
import base64
|
17
16
|
|
18
17
|
import pulumi
|
19
18
|
import pulumi.runtime
|
20
19
|
from pulumi.runtime.sync_await import _sync_await
|
21
|
-
from pulumi.runtime.proto import resource_pb2
|
22
20
|
|
23
21
|
from semver import VersionInfo as SemverVersion
|
24
22
|
from parver import Version as PEP440Version
|
@@ -102,6 +100,10 @@ def _get_semver_version():
|
|
102
100
|
_version = _get_semver_version()
|
103
101
|
_version_str = str(_version)
|
104
102
|
|
103
|
+
|
104
|
+
def get_version():
|
105
|
+
return _version_str
|
106
|
+
|
105
107
|
def get_resource_opts_defaults() -> pulumi.ResourceOptions:
|
106
108
|
return pulumi.ResourceOptions(
|
107
109
|
version=get_version(),
|
@@ -322,6 +324,3 @@ def deprecated(message: str) -> typing.Callable[[C], C]:
|
|
322
324
|
|
323
325
|
def get_plugin_download_url():
|
324
326
|
return None
|
325
|
-
|
326
|
-
def get_version():
|
327
|
-
return _version_str
|
@@ -17,7 +17,6 @@ class SecretBackendRoleArgs:
|
|
17
17
|
backend: pulumi.Input[str],
|
18
18
|
credential_type: pulumi.Input[str],
|
19
19
|
default_sts_ttl: Optional[pulumi.Input[int]] = None,
|
20
|
-
external_id: Optional[pulumi.Input[str]] = None,
|
21
20
|
iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
22
21
|
iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
23
22
|
max_sts_ttl: Optional[pulumi.Input[int]] = None,
|
@@ -27,7 +26,6 @@ class SecretBackendRoleArgs:
|
|
27
26
|
policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
28
27
|
policy_document: Optional[pulumi.Input[str]] = None,
|
29
28
|
role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
30
|
-
session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
31
29
|
user_path: Optional[pulumi.Input[str]] = None):
|
32
30
|
"""
|
33
31
|
The set of arguments for constructing a SecretBackendRole resource.
|
@@ -41,8 +39,6 @@ class SecretBackendRoleArgs:
|
|
41
39
|
and a default TTL is specified on the role,
|
42
40
|
then this default TTL will be used. Valid only when `credential_type` is one of
|
43
41
|
`assumed_role` or `federation_token`.
|
44
|
-
:param pulumi.Input[str] external_id: External ID to set for assume role creds.
|
45
|
-
Valid only when `credential_type` is set to `assumed_role`.
|
46
42
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] iam_groups: A list of IAM group names. IAM users generated
|
47
43
|
against this vault role will be added to these IAM Groups. For a credential
|
48
44
|
type of `assumed_role` or `federation_token`, the policies sent to the
|
@@ -79,9 +75,6 @@ class SecretBackendRoleArgs:
|
|
79
75
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] role_arns: Specifies the ARNs of the AWS roles this Vault role
|
80
76
|
is allowed to assume. Required when `credential_type` is `assumed_role` and
|
81
77
|
prohibited otherwise.
|
82
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] session_tags: A map of strings representing key/value pairs to be set
|
83
|
-
during assume role creds creation. Valid only when `credential_type` is set to
|
84
|
-
`assumed_role`.
|
85
78
|
:param pulumi.Input[str] user_path: The path for the user name. Valid only when
|
86
79
|
`credential_type` is `iam_user`. Default is `/`.
|
87
80
|
"""
|
@@ -89,8 +82,6 @@ class SecretBackendRoleArgs:
|
|
89
82
|
pulumi.set(__self__, "credential_type", credential_type)
|
90
83
|
if default_sts_ttl is not None:
|
91
84
|
pulumi.set(__self__, "default_sts_ttl", default_sts_ttl)
|
92
|
-
if external_id is not None:
|
93
|
-
pulumi.set(__self__, "external_id", external_id)
|
94
85
|
if iam_groups is not None:
|
95
86
|
pulumi.set(__self__, "iam_groups", iam_groups)
|
96
87
|
if iam_tags is not None:
|
@@ -109,8 +100,6 @@ class SecretBackendRoleArgs:
|
|
109
100
|
pulumi.set(__self__, "policy_document", policy_document)
|
110
101
|
if role_arns is not None:
|
111
102
|
pulumi.set(__self__, "role_arns", role_arns)
|
112
|
-
if session_tags is not None:
|
113
|
-
pulumi.set(__self__, "session_tags", session_tags)
|
114
103
|
if user_path is not None:
|
115
104
|
pulumi.set(__self__, "user_path", user_path)
|
116
105
|
|
@@ -157,19 +146,6 @@ class SecretBackendRoleArgs:
|
|
157
146
|
def default_sts_ttl(self, value: Optional[pulumi.Input[int]]):
|
158
147
|
pulumi.set(self, "default_sts_ttl", value)
|
159
148
|
|
160
|
-
@property
|
161
|
-
@pulumi.getter(name="externalId")
|
162
|
-
def external_id(self) -> Optional[pulumi.Input[str]]:
|
163
|
-
"""
|
164
|
-
External ID to set for assume role creds.
|
165
|
-
Valid only when `credential_type` is set to `assumed_role`.
|
166
|
-
"""
|
167
|
-
return pulumi.get(self, "external_id")
|
168
|
-
|
169
|
-
@external_id.setter
|
170
|
-
def external_id(self, value: Optional[pulumi.Input[str]]):
|
171
|
-
pulumi.set(self, "external_id", value)
|
172
|
-
|
173
149
|
@property
|
174
150
|
@pulumi.getter(name="iamGroups")
|
175
151
|
def iam_groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
@@ -305,20 +281,6 @@ class SecretBackendRoleArgs:
|
|
305
281
|
def role_arns(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
306
282
|
pulumi.set(self, "role_arns", value)
|
307
283
|
|
308
|
-
@property
|
309
|
-
@pulumi.getter(name="sessionTags")
|
310
|
-
def session_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
311
|
-
"""
|
312
|
-
A map of strings representing key/value pairs to be set
|
313
|
-
during assume role creds creation. Valid only when `credential_type` is set to
|
314
|
-
`assumed_role`.
|
315
|
-
"""
|
316
|
-
return pulumi.get(self, "session_tags")
|
317
|
-
|
318
|
-
@session_tags.setter
|
319
|
-
def session_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
320
|
-
pulumi.set(self, "session_tags", value)
|
321
|
-
|
322
284
|
@property
|
323
285
|
@pulumi.getter(name="userPath")
|
324
286
|
def user_path(self) -> Optional[pulumi.Input[str]]:
|
@@ -339,7 +301,6 @@ class _SecretBackendRoleState:
|
|
339
301
|
backend: Optional[pulumi.Input[str]] = None,
|
340
302
|
credential_type: Optional[pulumi.Input[str]] = None,
|
341
303
|
default_sts_ttl: Optional[pulumi.Input[int]] = None,
|
342
|
-
external_id: Optional[pulumi.Input[str]] = None,
|
343
304
|
iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
344
305
|
iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
345
306
|
max_sts_ttl: Optional[pulumi.Input[int]] = None,
|
@@ -349,7 +310,6 @@ class _SecretBackendRoleState:
|
|
349
310
|
policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
350
311
|
policy_document: Optional[pulumi.Input[str]] = None,
|
351
312
|
role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
352
|
-
session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
353
313
|
user_path: Optional[pulumi.Input[str]] = None):
|
354
314
|
"""
|
355
315
|
Input properties used for looking up and filtering SecretBackendRole resources.
|
@@ -363,8 +323,6 @@ class _SecretBackendRoleState:
|
|
363
323
|
and a default TTL is specified on the role,
|
364
324
|
then this default TTL will be used. Valid only when `credential_type` is one of
|
365
325
|
`assumed_role` or `federation_token`.
|
366
|
-
:param pulumi.Input[str] external_id: External ID to set for assume role creds.
|
367
|
-
Valid only when `credential_type` is set to `assumed_role`.
|
368
326
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] iam_groups: A list of IAM group names. IAM users generated
|
369
327
|
against this vault role will be added to these IAM Groups. For a credential
|
370
328
|
type of `assumed_role` or `federation_token`, the policies sent to the
|
@@ -401,9 +359,6 @@ class _SecretBackendRoleState:
|
|
401
359
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] role_arns: Specifies the ARNs of the AWS roles this Vault role
|
402
360
|
is allowed to assume. Required when `credential_type` is `assumed_role` and
|
403
361
|
prohibited otherwise.
|
404
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] session_tags: A map of strings representing key/value pairs to be set
|
405
|
-
during assume role creds creation. Valid only when `credential_type` is set to
|
406
|
-
`assumed_role`.
|
407
362
|
:param pulumi.Input[str] user_path: The path for the user name. Valid only when
|
408
363
|
`credential_type` is `iam_user`. Default is `/`.
|
409
364
|
"""
|
@@ -413,8 +368,6 @@ class _SecretBackendRoleState:
|
|
413
368
|
pulumi.set(__self__, "credential_type", credential_type)
|
414
369
|
if default_sts_ttl is not None:
|
415
370
|
pulumi.set(__self__, "default_sts_ttl", default_sts_ttl)
|
416
|
-
if external_id is not None:
|
417
|
-
pulumi.set(__self__, "external_id", external_id)
|
418
371
|
if iam_groups is not None:
|
419
372
|
pulumi.set(__self__, "iam_groups", iam_groups)
|
420
373
|
if iam_tags is not None:
|
@@ -433,8 +386,6 @@ class _SecretBackendRoleState:
|
|
433
386
|
pulumi.set(__self__, "policy_document", policy_document)
|
434
387
|
if role_arns is not None:
|
435
388
|
pulumi.set(__self__, "role_arns", role_arns)
|
436
|
-
if session_tags is not None:
|
437
|
-
pulumi.set(__self__, "session_tags", session_tags)
|
438
389
|
if user_path is not None:
|
439
390
|
pulumi.set(__self__, "user_path", user_path)
|
440
391
|
|
@@ -481,19 +432,6 @@ class _SecretBackendRoleState:
|
|
481
432
|
def default_sts_ttl(self, value: Optional[pulumi.Input[int]]):
|
482
433
|
pulumi.set(self, "default_sts_ttl", value)
|
483
434
|
|
484
|
-
@property
|
485
|
-
@pulumi.getter(name="externalId")
|
486
|
-
def external_id(self) -> Optional[pulumi.Input[str]]:
|
487
|
-
"""
|
488
|
-
External ID to set for assume role creds.
|
489
|
-
Valid only when `credential_type` is set to `assumed_role`.
|
490
|
-
"""
|
491
|
-
return pulumi.get(self, "external_id")
|
492
|
-
|
493
|
-
@external_id.setter
|
494
|
-
def external_id(self, value: Optional[pulumi.Input[str]]):
|
495
|
-
pulumi.set(self, "external_id", value)
|
496
|
-
|
497
435
|
@property
|
498
436
|
@pulumi.getter(name="iamGroups")
|
499
437
|
def iam_groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
@@ -629,20 +567,6 @@ class _SecretBackendRoleState:
|
|
629
567
|
def role_arns(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
630
568
|
pulumi.set(self, "role_arns", value)
|
631
569
|
|
632
|
-
@property
|
633
|
-
@pulumi.getter(name="sessionTags")
|
634
|
-
def session_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
|
635
|
-
"""
|
636
|
-
A map of strings representing key/value pairs to be set
|
637
|
-
during assume role creds creation. Valid only when `credential_type` is set to
|
638
|
-
`assumed_role`.
|
639
|
-
"""
|
640
|
-
return pulumi.get(self, "session_tags")
|
641
|
-
|
642
|
-
@session_tags.setter
|
643
|
-
def session_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
|
644
|
-
pulumi.set(self, "session_tags", value)
|
645
|
-
|
646
570
|
@property
|
647
571
|
@pulumi.getter(name="userPath")
|
648
572
|
def user_path(self) -> Optional[pulumi.Input[str]]:
|
@@ -665,7 +589,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
665
589
|
backend: Optional[pulumi.Input[str]] = None,
|
666
590
|
credential_type: Optional[pulumi.Input[str]] = None,
|
667
591
|
default_sts_ttl: Optional[pulumi.Input[int]] = None,
|
668
|
-
external_id: Optional[pulumi.Input[str]] = None,
|
669
592
|
iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
670
593
|
iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
671
594
|
max_sts_ttl: Optional[pulumi.Input[int]] = None,
|
@@ -675,7 +598,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
675
598
|
policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
676
599
|
policy_document: Optional[pulumi.Input[str]] = None,
|
677
600
|
role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
678
|
-
session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
679
601
|
user_path: Optional[pulumi.Input[str]] = None,
|
680
602
|
__props__=None):
|
681
603
|
"""
|
@@ -725,8 +647,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
725
647
|
and a default TTL is specified on the role,
|
726
648
|
then this default TTL will be used. Valid only when `credential_type` is one of
|
727
649
|
`assumed_role` or `federation_token`.
|
728
|
-
:param pulumi.Input[str] external_id: External ID to set for assume role creds.
|
729
|
-
Valid only when `credential_type` is set to `assumed_role`.
|
730
650
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] iam_groups: A list of IAM group names. IAM users generated
|
731
651
|
against this vault role will be added to these IAM Groups. For a credential
|
732
652
|
type of `assumed_role` or `federation_token`, the policies sent to the
|
@@ -763,9 +683,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
763
683
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] role_arns: Specifies the ARNs of the AWS roles this Vault role
|
764
684
|
is allowed to assume. Required when `credential_type` is `assumed_role` and
|
765
685
|
prohibited otherwise.
|
766
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] session_tags: A map of strings representing key/value pairs to be set
|
767
|
-
during assume role creds creation. Valid only when `credential_type` is set to
|
768
|
-
`assumed_role`.
|
769
686
|
:param pulumi.Input[str] user_path: The path for the user name. Valid only when
|
770
687
|
`credential_type` is `iam_user`. Default is `/`.
|
771
688
|
"""
|
@@ -828,7 +745,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
828
745
|
backend: Optional[pulumi.Input[str]] = None,
|
829
746
|
credential_type: Optional[pulumi.Input[str]] = None,
|
830
747
|
default_sts_ttl: Optional[pulumi.Input[int]] = None,
|
831
|
-
external_id: Optional[pulumi.Input[str]] = None,
|
832
748
|
iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
833
749
|
iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
834
750
|
max_sts_ttl: Optional[pulumi.Input[int]] = None,
|
@@ -838,7 +754,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
838
754
|
policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
839
755
|
policy_document: Optional[pulumi.Input[str]] = None,
|
840
756
|
role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
841
|
-
session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
842
757
|
user_path: Optional[pulumi.Input[str]] = None,
|
843
758
|
__props__=None):
|
844
759
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
@@ -856,7 +771,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
856
771
|
raise TypeError("Missing required property 'credential_type'")
|
857
772
|
__props__.__dict__["credential_type"] = credential_type
|
858
773
|
__props__.__dict__["default_sts_ttl"] = default_sts_ttl
|
859
|
-
__props__.__dict__["external_id"] = external_id
|
860
774
|
__props__.__dict__["iam_groups"] = iam_groups
|
861
775
|
__props__.__dict__["iam_tags"] = iam_tags
|
862
776
|
__props__.__dict__["max_sts_ttl"] = max_sts_ttl
|
@@ -866,7 +780,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
866
780
|
__props__.__dict__["policy_arns"] = policy_arns
|
867
781
|
__props__.__dict__["policy_document"] = policy_document
|
868
782
|
__props__.__dict__["role_arns"] = role_arns
|
869
|
-
__props__.__dict__["session_tags"] = session_tags
|
870
783
|
__props__.__dict__["user_path"] = user_path
|
871
784
|
super(SecretBackendRole, __self__).__init__(
|
872
785
|
'vault:aws/secretBackendRole:SecretBackendRole',
|
@@ -881,7 +794,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
881
794
|
backend: Optional[pulumi.Input[str]] = None,
|
882
795
|
credential_type: Optional[pulumi.Input[str]] = None,
|
883
796
|
default_sts_ttl: Optional[pulumi.Input[int]] = None,
|
884
|
-
external_id: Optional[pulumi.Input[str]] = None,
|
885
797
|
iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
886
798
|
iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
887
799
|
max_sts_ttl: Optional[pulumi.Input[int]] = None,
|
@@ -891,7 +803,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
891
803
|
policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
892
804
|
policy_document: Optional[pulumi.Input[str]] = None,
|
893
805
|
role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
894
|
-
session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
|
895
806
|
user_path: Optional[pulumi.Input[str]] = None) -> 'SecretBackendRole':
|
896
807
|
"""
|
897
808
|
Get an existing SecretBackendRole resource's state with the given name, id, and optional extra
|
@@ -910,8 +821,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
910
821
|
and a default TTL is specified on the role,
|
911
822
|
then this default TTL will be used. Valid only when `credential_type` is one of
|
912
823
|
`assumed_role` or `federation_token`.
|
913
|
-
:param pulumi.Input[str] external_id: External ID to set for assume role creds.
|
914
|
-
Valid only when `credential_type` is set to `assumed_role`.
|
915
824
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] iam_groups: A list of IAM group names. IAM users generated
|
916
825
|
against this vault role will be added to these IAM Groups. For a credential
|
917
826
|
type of `assumed_role` or `federation_token`, the policies sent to the
|
@@ -948,9 +857,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
948
857
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] role_arns: Specifies the ARNs of the AWS roles this Vault role
|
949
858
|
is allowed to assume. Required when `credential_type` is `assumed_role` and
|
950
859
|
prohibited otherwise.
|
951
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[str]]] session_tags: A map of strings representing key/value pairs to be set
|
952
|
-
during assume role creds creation. Valid only when `credential_type` is set to
|
953
|
-
`assumed_role`.
|
954
860
|
:param pulumi.Input[str] user_path: The path for the user name. Valid only when
|
955
861
|
`credential_type` is `iam_user`. Default is `/`.
|
956
862
|
"""
|
@@ -961,7 +867,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
961
867
|
__props__.__dict__["backend"] = backend
|
962
868
|
__props__.__dict__["credential_type"] = credential_type
|
963
869
|
__props__.__dict__["default_sts_ttl"] = default_sts_ttl
|
964
|
-
__props__.__dict__["external_id"] = external_id
|
965
870
|
__props__.__dict__["iam_groups"] = iam_groups
|
966
871
|
__props__.__dict__["iam_tags"] = iam_tags
|
967
872
|
__props__.__dict__["max_sts_ttl"] = max_sts_ttl
|
@@ -971,7 +876,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
971
876
|
__props__.__dict__["policy_arns"] = policy_arns
|
972
877
|
__props__.__dict__["policy_document"] = policy_document
|
973
878
|
__props__.__dict__["role_arns"] = role_arns
|
974
|
-
__props__.__dict__["session_tags"] = session_tags
|
975
879
|
__props__.__dict__["user_path"] = user_path
|
976
880
|
return SecretBackendRole(resource_name, opts=opts, __props__=__props__)
|
977
881
|
|
@@ -1006,15 +910,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1006
910
|
"""
|
1007
911
|
return pulumi.get(self, "default_sts_ttl")
|
1008
912
|
|
1009
|
-
@property
|
1010
|
-
@pulumi.getter(name="externalId")
|
1011
|
-
def external_id(self) -> pulumi.Output[Optional[str]]:
|
1012
|
-
"""
|
1013
|
-
External ID to set for assume role creds.
|
1014
|
-
Valid only when `credential_type` is set to `assumed_role`.
|
1015
|
-
"""
|
1016
|
-
return pulumi.get(self, "external_id")
|
1017
|
-
|
1018
913
|
@property
|
1019
914
|
@pulumi.getter(name="iamGroups")
|
1020
915
|
def iam_groups(self) -> pulumi.Output[Optional[Sequence[str]]]:
|
@@ -1114,16 +1009,6 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
1114
1009
|
"""
|
1115
1010
|
return pulumi.get(self, "role_arns")
|
1116
1011
|
|
1117
|
-
@property
|
1118
|
-
@pulumi.getter(name="sessionTags")
|
1119
|
-
def session_tags(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
|
1120
|
-
"""
|
1121
|
-
A map of strings representing key/value pairs to be set
|
1122
|
-
during assume role creds creation. Valid only when `credential_type` is set to
|
1123
|
-
`assumed_role`.
|
1124
|
-
"""
|
1125
|
-
return pulumi.get(self, "session_tags")
|
1126
|
-
|
1127
1012
|
@property
|
1128
1013
|
@pulumi.getter(name="userPath")
|
1129
1014
|
def user_path(self) -> pulumi.Output[Optional[str]]:
|
@@ -263,7 +263,7 @@ def get_entity(alias_id: Optional[str] = None,
|
|
263
263
|
|
264
264
|
## Required Vault Capabilities
|
265
265
|
|
266
|
-
Use of this resource requires the `
|
266
|
+
Use of this resource requires the `create` capability on `/identity/lookup/entity`.
|
267
267
|
|
268
268
|
|
269
269
|
:param str alias_id: ID of the alias.
|
@@ -333,7 +333,7 @@ def get_entity_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
|
|
333
333
|
|
334
334
|
## Required Vault Capabilities
|
335
335
|
|
336
|
-
Use of this resource requires the `
|
336
|
+
Use of this resource requires the `create` capability on `/identity/lookup/entity`.
|
337
337
|
|
338
338
|
|
339
339
|
:param str alias_id: ID of the alias.
|
pulumi_vault/mount.py
CHANGED
@@ -49,8 +49,7 @@ class MountArgs:
|
|
49
49
|
:param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
50
50
|
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
|
51
51
|
not provided, this will default to Vault's OIDC default key.
|
52
|
-
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
53
|
-
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
52
|
+
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
54
53
|
:param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
55
54
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
56
55
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -241,8 +240,7 @@ class MountArgs:
|
|
241
240
|
@pulumi.getter(name="listingVisibility")
|
242
241
|
def listing_visibility(self) -> Optional[pulumi.Input[str]]:
|
243
242
|
"""
|
244
|
-
Specifies whether to show this mount in the UI-specific
|
245
|
-
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
243
|
+
Specifies whether to show this mount in the UI-specific listing endpoint
|
246
244
|
"""
|
247
245
|
return pulumi.get(self, "listing_visibility")
|
248
246
|
|
@@ -379,8 +377,7 @@ class _MountState:
|
|
379
377
|
:param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
380
378
|
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
|
381
379
|
not provided, this will default to Vault's OIDC default key.
|
382
|
-
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
383
|
-
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
380
|
+
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
384
381
|
:param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
385
382
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
386
383
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -565,8 +562,7 @@ class _MountState:
|
|
565
562
|
@pulumi.getter(name="listingVisibility")
|
566
563
|
def listing_visibility(self) -> Optional[pulumi.Input[str]]:
|
567
564
|
"""
|
568
|
-
Specifies whether to show this mount in the UI-specific
|
569
|
-
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
565
|
+
Specifies whether to show this mount in the UI-specific listing endpoint
|
570
566
|
"""
|
571
567
|
return pulumi.get(self, "listing_visibility")
|
572
568
|
|
@@ -790,8 +786,7 @@ class Mount(pulumi.CustomResource):
|
|
790
786
|
:param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
791
787
|
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
|
792
788
|
not provided, this will default to Vault's OIDC default key.
|
793
|
-
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
794
|
-
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
789
|
+
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
795
790
|
:param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
796
791
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
797
792
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -993,8 +988,7 @@ class Mount(pulumi.CustomResource):
|
|
993
988
|
:param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
|
994
989
|
:param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
|
995
990
|
not provided, this will default to Vault's OIDC default key.
|
996
|
-
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
|
997
|
-
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
991
|
+
:param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
|
998
992
|
:param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
|
999
993
|
:param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
|
1000
994
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
@@ -1124,8 +1118,7 @@ class Mount(pulumi.CustomResource):
|
|
1124
1118
|
@pulumi.getter(name="listingVisibility")
|
1125
1119
|
def listing_visibility(self) -> pulumi.Output[Optional[str]]:
|
1126
1120
|
"""
|
1127
|
-
Specifies whether to show this mount in the UI-specific
|
1128
|
-
listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
|
1121
|
+
Specifies whether to show this mount in the UI-specific listing endpoint
|
1129
1122
|
"""
|
1130
1123
|
return pulumi.get(self, "listing_visibility")
|
1131
1124
|
|
pulumi_vault/outputs.py
CHANGED
@@ -277,27 +277,17 @@ class GetPolicyDocumentRuleAllowedParameterResult(dict):
|
|
277
277
|
def __init__(__self__, *,
|
278
278
|
key: str,
|
279
279
|
values: Sequence[str]):
|
280
|
-
"""
|
281
|
-
:param str key: name of permitted or denied parameter.
|
282
|
-
:param Sequence[str] values: list of values what are permitted or denied by policy rule.
|
283
|
-
"""
|
284
280
|
pulumi.set(__self__, "key", key)
|
285
281
|
pulumi.set(__self__, "values", values)
|
286
282
|
|
287
283
|
@property
|
288
284
|
@pulumi.getter
|
289
285
|
def key(self) -> str:
|
290
|
-
"""
|
291
|
-
name of permitted or denied parameter.
|
292
|
-
"""
|
293
286
|
return pulumi.get(self, "key")
|
294
287
|
|
295
288
|
@property
|
296
289
|
@pulumi.getter
|
297
290
|
def values(self) -> Sequence[str]:
|
298
|
-
"""
|
299
|
-
list of values what are permitted or denied by policy rule.
|
300
|
-
"""
|
301
291
|
return pulumi.get(self, "values")
|
302
292
|
|
303
293
|
|
@@ -306,27 +296,17 @@ class GetPolicyDocumentRuleDeniedParameterResult(dict):
|
|
306
296
|
def __init__(__self__, *,
|
307
297
|
key: str,
|
308
298
|
values: Sequence[str]):
|
309
|
-
"""
|
310
|
-
:param str key: name of permitted or denied parameter.
|
311
|
-
:param Sequence[str] values: list of values what are permitted or denied by policy rule.
|
312
|
-
"""
|
313
299
|
pulumi.set(__self__, "key", key)
|
314
300
|
pulumi.set(__self__, "values", values)
|
315
301
|
|
316
302
|
@property
|
317
303
|
@pulumi.getter
|
318
304
|
def key(self) -> str:
|
319
|
-
"""
|
320
|
-
name of permitted or denied parameter.
|
321
|
-
"""
|
322
305
|
return pulumi.get(self, "key")
|
323
306
|
|
324
307
|
@property
|
325
308
|
@pulumi.getter
|
326
309
|
def values(self) -> Sequence[str]:
|
327
|
-
"""
|
328
|
-
list of values what are permitted or denied by policy rule.
|
329
|
-
"""
|
330
310
|
return pulumi.get(self, "values")
|
331
311
|
|
332
312
|
|
@@ -19,10 +19,6 @@ class BackendConfigEstAuthenticatorsArgs:
|
|
19
19
|
def __init__(__self__, *,
|
20
20
|
cert: Optional[pulumi.Input[Mapping[str, Any]]] = None,
|
21
21
|
userpass: Optional[pulumi.Input[Mapping[str, Any]]] = None):
|
22
|
-
"""
|
23
|
-
:param pulumi.Input[Mapping[str, Any]] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
|
24
|
-
:param pulumi.Input[Mapping[str, Any]] userpass: "The accessor (required) property for user pass auth backends".
|
25
|
-
"""
|
26
22
|
if cert is not None:
|
27
23
|
pulumi.set(__self__, "cert", cert)
|
28
24
|
if userpass is not None:
|
@@ -31,9 +27,6 @@ class BackendConfigEstAuthenticatorsArgs:
|
|
31
27
|
@property
|
32
28
|
@pulumi.getter
|
33
29
|
def cert(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
34
|
-
"""
|
35
|
-
"The accessor (required) and cert_role (optional) properties for cert auth backends".
|
36
|
-
"""
|
37
30
|
return pulumi.get(self, "cert")
|
38
31
|
|
39
32
|
@cert.setter
|
@@ -43,9 +36,6 @@ class BackendConfigEstAuthenticatorsArgs:
|
|
43
36
|
@property
|
44
37
|
@pulumi.getter
|
45
38
|
def userpass(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
|
46
|
-
"""
|
47
|
-
"The accessor (required) property for user pass auth backends".
|
48
|
-
"""
|
49
39
|
return pulumi.get(self, "userpass")
|
50
40
|
|
51
41
|
@userpass.setter
|
@@ -20,10 +20,6 @@ class BackendConfigEstAuthenticators(dict):
|
|
20
20
|
def __init__(__self__, *,
|
21
21
|
cert: Optional[Mapping[str, Any]] = None,
|
22
22
|
userpass: Optional[Mapping[str, Any]] = None):
|
23
|
-
"""
|
24
|
-
:param Mapping[str, Any] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
|
25
|
-
:param Mapping[str, Any] userpass: "The accessor (required) property for user pass auth backends".
|
26
|
-
"""
|
27
23
|
if cert is not None:
|
28
24
|
pulumi.set(__self__, "cert", cert)
|
29
25
|
if userpass is not None:
|
@@ -32,17 +28,11 @@ class BackendConfigEstAuthenticators(dict):
|
|
32
28
|
@property
|
33
29
|
@pulumi.getter
|
34
30
|
def cert(self) -> Optional[Mapping[str, Any]]:
|
35
|
-
"""
|
36
|
-
"The accessor (required) and cert_role (optional) properties for cert auth backends".
|
37
|
-
"""
|
38
31
|
return pulumi.get(self, "cert")
|
39
32
|
|
40
33
|
@property
|
41
34
|
@pulumi.getter
|
42
35
|
def userpass(self) -> Optional[Mapping[str, Any]]:
|
43
|
-
"""
|
44
|
-
"The accessor (required) property for user pass auth backends".
|
45
|
-
"""
|
46
36
|
return pulumi.get(self, "userpass")
|
47
37
|
|
48
38
|
|
pulumi_vault/pulumi-plugin.json
CHANGED
@@ -1,6 +1,6 @@
|
|
1
1
|
pulumi_vault/__init__.py,sha256=YyUZ3AwssRd84-MFiLiMsKlEs0Gl5dnqjoRlDWbWe70,31607
|
2
|
-
pulumi_vault/_inputs.py,sha256=
|
3
|
-
pulumi_vault/_utilities.py,sha256=
|
2
|
+
pulumi_vault/_inputs.py,sha256=mjyuroOXUphjofRI4JeGJ2Q1ESCb9uJeiA4C48NHfNQ,72858
|
3
|
+
pulumi_vault/_utilities.py,sha256=zozFZPZGnJJ7MjOYHQPdH-l-EHcRcX5lh5TVi22oTCw,10446
|
4
4
|
pulumi_vault/audit.py,sha256=DlMWyovN9OrGVBpDgNvvtMRMpZRI_pC8YwqEaI9S6lk,20343
|
5
5
|
pulumi_vault/audit_request_header.py,sha256=CHCfbFBwzX3mU6Fi34Havyl8cH9Mtzj5BDmKIc2tIno,10313
|
6
6
|
pulumi_vault/auth_backend.py,sha256=v4dxfpqhg94wXTnSuKAJ8-qBC_TnUXneSa-ODx9NNoQ,23808
|
@@ -17,17 +17,17 @@ pulumi_vault/mfa_duo.py,sha256=LJzOnwcNhzbgogrW4cyvadUFnB7wasK-QQ4MbPU0eS4,28237
|
|
17
17
|
pulumi_vault/mfa_okta.py,sha256=pA6n9k3BBMHXLvvyjOoSxTirgAznz5M0bWeXjHq8riU,29503
|
18
18
|
pulumi_vault/mfa_pingid.py,sha256=h4W3TOvcUQK1gzwqiC6samirfBghCTIcBgd3KpyBGww,30972
|
19
19
|
pulumi_vault/mfa_totp.py,sha256=J-c-GoVmO6FED6UDff2AtZJh5R8XlbnYY7CDeuPopI0,25344
|
20
|
-
pulumi_vault/mount.py,sha256=
|
20
|
+
pulumi_vault/mount.py,sha256=bcvGRLfo5rYBpP72qfdYm7H90lsPb5vDDQR1Xhviifo,59240
|
21
21
|
pulumi_vault/namespace.py,sha256=QKY3lKdHIZpT_l0Ut6Fk_FarRPsEkLyxv1tmfgXXoU0,18077
|
22
22
|
pulumi_vault/nomad_secret_backend.py,sha256=cmL2NkjNIZxu9a7NEMMHgojGi12I2tGDojFdMGSgj04,42018
|
23
23
|
pulumi_vault/nomad_secret_role.py,sha256=47QltNPaM58oiCXt77Z6r1cXRVN79FhYWI7Iei5sQ3w,20146
|
24
|
-
pulumi_vault/outputs.py,sha256=
|
24
|
+
pulumi_vault/outputs.py,sha256=mcrrIhKLRFtb_JPFAdlsFxARGwRL_HPRFsP5x39EnVI,13066
|
25
25
|
pulumi_vault/password_policy.py,sha256=sDU2lauo4-13snK35DOXtWbzn_bMJ5AZS-gS57T0aUw,12241
|
26
26
|
pulumi_vault/plugin.py,sha256=0fBhSZDyQhzML9r1Udhy9ngHcfjwzi1BzvutsbKKUwU,23482
|
27
27
|
pulumi_vault/plugin_pinned_version.py,sha256=mo62qPp_IwJRnv5t2p9ywInEjwHFsBunoyCDGc0bveg,10583
|
28
28
|
pulumi_vault/policy.py,sha256=V6knAiqkzH97T72s6FB2qNjScDfKOAl3mox1h7vg0Ps,10935
|
29
29
|
pulumi_vault/provider.py,sha256=gvnZj6hsMxMypnzizoolBed2LmtQPUCyMXlgGWpmLxY,41708
|
30
|
-
pulumi_vault/pulumi-plugin.json,sha256=
|
30
|
+
pulumi_vault/pulumi-plugin.json,sha256=rnr5LI8iKrFVNCaasAj72Mv3FbEtoHFEFbld7wMoJw0,81
|
31
31
|
pulumi_vault/py.typed,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
32
32
|
pulumi_vault/quota_lease_count.py,sha256=w5CLQQjCk9PKSzX_XeLMEV87xre-poHJG9NfAGVVTjw,24898
|
33
33
|
pulumi_vault/quota_rate_limit.py,sha256=hA0tDU-54VrfcTHCzbRU-TL32BLnPBxhl92faufEkZo,29503
|
@@ -60,7 +60,7 @@ pulumi_vault/aws/auth_backend_sts_role.py,sha256=yy2-_7dY4LEjFjo2ROE905-o-3uiHqL
|
|
60
60
|
pulumi_vault/aws/get_access_credentials.py,sha256=AjYqLOhyucc98yNNh39DpTwBzTnSPgUeOgWAqiWZs9c,12282
|
61
61
|
pulumi_vault/aws/get_static_access_credentials.py,sha256=65NLi7oDfPERU_XHaQC7kYkw-VngpesORVJ5B8ahPwo,4742
|
62
62
|
pulumi_vault/aws/secret_backend.py,sha256=VoDgh8p5z7KC0jhBu5bh_oKcvYscPciTnEe00X3WaD8,49429
|
63
|
-
pulumi_vault/aws/secret_backend_role.py,sha256=
|
63
|
+
pulumi_vault/aws/secret_backend_role.py,sha256=Vim6Vfq5SrC_oNajDFXv7TM9xlDP46ju7gBfuHQcyrM,50962
|
64
64
|
pulumi_vault/aws/secret_backend_static_role.py,sha256=XB-cCvBxYf3G1yp8FUh1ecUDIHAc80pV8mokb3NS1HQ,17821
|
65
65
|
pulumi_vault/azure/__init__.py,sha256=Ip6GcRxEn43qDXL93F4Jm2uYqW7HJlPK_dg1WrfwXBg,471
|
66
66
|
pulumi_vault/azure/_inputs.py,sha256=uS9C0fl059lbaxHD8PiAwWbCrDahbgBcqztfYeTDaEo,2564
|
@@ -110,7 +110,7 @@ pulumi_vault/identity/__init__.py,sha256=0lwEIF5yG_HPzGj-VTGpnAPyd5zqwoLC0ltNaWW
|
|
110
110
|
pulumi_vault/identity/entity.py,sha256=n0urur32RKQ4eEzU8TzkrsEr_iVU7CnjJu-GT2-igEU,19832
|
111
111
|
pulumi_vault/identity/entity_alias.py,sha256=F6u_zADIe7DFrPem3FB11kU618b6VqMbJCEDqQ8Vqn0,18539
|
112
112
|
pulumi_vault/identity/entity_policies.py,sha256=IVW9T5hHFcToSmM9DX0tYTZ7m5kMC-LF8hmsGVUSZkA,19927
|
113
|
-
pulumi_vault/identity/get_entity.py,sha256=
|
113
|
+
pulumi_vault/identity/get_entity.py,sha256=6tp6fyb26cnkkxi2dahnoIJaz5RVshhq0BJGKHmPDVY,14351
|
114
114
|
pulumi_vault/identity/get_group.py,sha256=uD9KxGqQp2rOgExzehjgC1-AeIvY99QKRPS4EaC1_0Y,17956
|
115
115
|
pulumi_vault/identity/get_oidc_client_creds.py,sha256=y8S0VLA_bVhqxmLHsMlBZrcRHBpjrTphPgVpU4FPgM0,5927
|
116
116
|
pulumi_vault/identity/get_oidc_openid_config.py,sha256=B75fMH2x5QFtDUKO0hheszmMrM9EvRQ3JszpCWPiI7k,13482
|
@@ -186,7 +186,7 @@ pulumi_vault/okta/auth_backend_group.py,sha256=5Sw2MK4d5AnVMXT3O1a8fMbiqDOP1gmau
|
|
186
186
|
pulumi_vault/okta/auth_backend_user.py,sha256=kiNHbdduI1R4XWbtnHWvdCIW8xR-UykSQGp1CLujeRk,16937
|
187
187
|
pulumi_vault/okta/outputs.py,sha256=8IPwy3nKDVxvwT8wd9dyFm3hfPYd_FXZ4TcCkT9vUR4,3067
|
188
188
|
pulumi_vault/pkisecret/__init__.py,sha256=Lwp_52rZJohEKOGZTENoaHtUcsrMDlAa87JRrMSrXcw,1103
|
189
|
-
pulumi_vault/pkisecret/_inputs.py,sha256=
|
189
|
+
pulumi_vault/pkisecret/_inputs.py,sha256=SDVn0tXfYrSSVDZJ43CDY7yy4nhTzso3gmeNPefy2Zg,3094
|
190
190
|
pulumi_vault/pkisecret/backend_config_cluster.py,sha256=gJDXjoh1qkAnXm6BAP65AXrDaY2q8aZpclglNBwCx2U,15929
|
191
191
|
pulumi_vault/pkisecret/backend_config_est.py,sha256=NEhpisOocjL-_w3_b97Bw2kUz9lPxki1PGylh-1M0wQ,32409
|
192
192
|
pulumi_vault/pkisecret/get_backend_config_est.py,sha256=pYeRNsK3RLeTmrPaU1rCi1pn8BC12kIvME6uHqniQps,9896
|
@@ -194,7 +194,7 @@ pulumi_vault/pkisecret/get_backend_issuer.py,sha256=098K4SWse6Xt5NCzqLqFFaqMHtuP
|
|
194
194
|
pulumi_vault/pkisecret/get_backend_issuers.py,sha256=SQMnqHSCQzVBVNjHio7Pt3BQvYS1sNbgb75TeoClWoU,6398
|
195
195
|
pulumi_vault/pkisecret/get_backend_key.py,sha256=NIjBO6CBmZ0gJ44wWnz510nQ4E47aQhuytFE-iSyhXY,6930
|
196
196
|
pulumi_vault/pkisecret/get_backend_keys.py,sha256=Ke6ggiCEupZK3x1bvo1cPTLlKeOp4wVG09LyuldvL90,6303
|
197
|
-
pulumi_vault/pkisecret/outputs.py,sha256=
|
197
|
+
pulumi_vault/pkisecret/outputs.py,sha256=WbI2UNcZkEQbMyXzlQmHvqndGoa4e1uZXUASmsfmwdM,3409
|
198
198
|
pulumi_vault/pkisecret/secret_backend_cert.py,sha256=arfvGLS6IEmMVdIAl7d5OTjPPt05VGtRKdYV7QhMSnc,49699
|
199
199
|
pulumi_vault/pkisecret/secret_backend_config_ca.py,sha256=8JIjvEqZ-2uCuK6sh7TwhVdU5RgakdsGjham4iRsKUg,18958
|
200
200
|
pulumi_vault/pkisecret/secret_backend_config_issuers.py,sha256=Hrk1TZ-vIYlDE-lmBRPndL2dwTh9MZbDN1Q3AVA6IZ0,16978
|
@@ -250,7 +250,7 @@ pulumi_vault/transit/get_decrypt.py,sha256=6rFzK4Ghf3tWRNJ_rSCs0yJsPynk9oeqZIJJq
|
|
250
250
|
pulumi_vault/transit/get_encrypt.py,sha256=wz1GDrLP8JzDLCcjbU7tZM7vHNtBQ9PPpLHczy22uqY,5712
|
251
251
|
pulumi_vault/transit/secret_backend_key.py,sha256=56to0JZaIFaCZVeiW5pNKER6azVhs2JXJoccgdVdtoI,53286
|
252
252
|
pulumi_vault/transit/secret_cache_config.py,sha256=kSfKajNG2v5iPtoEnNLRXCIR5sRGUqTTxRW-tT0X_iM,12483
|
253
|
-
pulumi_vault-6.3.
|
254
|
-
pulumi_vault-6.3.
|
255
|
-
pulumi_vault-6.3.
|
256
|
-
pulumi_vault-6.3.
|
253
|
+
pulumi_vault-6.3.0a1719265746.dist-info/METADATA,sha256=WDDcjJToHGBt1OCEyRz0h8FFGJ1dCkkOgLNgF3zUeCQ,4860
|
254
|
+
pulumi_vault-6.3.0a1719265746.dist-info/WHEEL,sha256=cpQTJ5IWu9CdaPViMhC9YzF8gZuS5-vlfoFihTBC86A,91
|
255
|
+
pulumi_vault-6.3.0a1719265746.dist-info/top_level.txt,sha256=J7lAGvfexHc6T1EpDBGNKF0SXWURpmUhyzi9Nr5I61w,13
|
256
|
+
pulumi_vault-6.3.0a1719265746.dist-info/RECORD,,
|
File without changes
|