pulumi-vault 6.3.0__py3-none-any.whl → 6.3.0a1719265746__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
pulumi_vault/_inputs.py CHANGED
@@ -1844,19 +1844,12 @@ class GetPolicyDocumentRuleAllowedParameterArgs:
1844
1844
  def __init__(__self__, *,
1845
1845
  key: str,
1846
1846
  values: Sequence[str]):
1847
- """
1848
- :param str key: name of permitted or denied parameter.
1849
- :param Sequence[str] values: list of values what are permitted or denied by policy rule.
1850
- """
1851
1847
  pulumi.set(__self__, "key", key)
1852
1848
  pulumi.set(__self__, "values", values)
1853
1849
 
1854
1850
  @property
1855
1851
  @pulumi.getter
1856
1852
  def key(self) -> str:
1857
- """
1858
- name of permitted or denied parameter.
1859
- """
1860
1853
  return pulumi.get(self, "key")
1861
1854
 
1862
1855
  @key.setter
@@ -1866,9 +1859,6 @@ class GetPolicyDocumentRuleAllowedParameterArgs:
1866
1859
  @property
1867
1860
  @pulumi.getter
1868
1861
  def values(self) -> Sequence[str]:
1869
- """
1870
- list of values what are permitted or denied by policy rule.
1871
- """
1872
1862
  return pulumi.get(self, "values")
1873
1863
 
1874
1864
  @values.setter
@@ -1881,19 +1871,12 @@ class GetPolicyDocumentRuleDeniedParameterArgs:
1881
1871
  def __init__(__self__, *,
1882
1872
  key: str,
1883
1873
  values: Sequence[str]):
1884
- """
1885
- :param str key: name of permitted or denied parameter.
1886
- :param Sequence[str] values: list of values what are permitted or denied by policy rule.
1887
- """
1888
1874
  pulumi.set(__self__, "key", key)
1889
1875
  pulumi.set(__self__, "values", values)
1890
1876
 
1891
1877
  @property
1892
1878
  @pulumi.getter
1893
1879
  def key(self) -> str:
1894
- """
1895
- name of permitted or denied parameter.
1896
- """
1897
1880
  return pulumi.get(self, "key")
1898
1881
 
1899
1882
  @key.setter
@@ -1903,9 +1886,6 @@ class GetPolicyDocumentRuleDeniedParameterArgs:
1903
1886
  @property
1904
1887
  @pulumi.getter
1905
1888
  def values(self) -> Sequence[str]:
1906
- """
1907
- list of values what are permitted or denied by policy rule.
1908
- """
1909
1889
  return pulumi.get(self, "values")
1910
1890
 
1911
1891
  @values.setter
@@ -13,12 +13,10 @@ import os
13
13
  import sys
14
14
  import typing
15
15
  import warnings
16
- import base64
17
16
 
18
17
  import pulumi
19
18
  import pulumi.runtime
20
19
  from pulumi.runtime.sync_await import _sync_await
21
- from pulumi.runtime.proto import resource_pb2
22
20
 
23
21
  from semver import VersionInfo as SemverVersion
24
22
  from parver import Version as PEP440Version
@@ -102,6 +100,10 @@ def _get_semver_version():
102
100
  _version = _get_semver_version()
103
101
  _version_str = str(_version)
104
102
 
103
+
104
+ def get_version():
105
+ return _version_str
106
+
105
107
  def get_resource_opts_defaults() -> pulumi.ResourceOptions:
106
108
  return pulumi.ResourceOptions(
107
109
  version=get_version(),
@@ -322,6 +324,3 @@ def deprecated(message: str) -> typing.Callable[[C], C]:
322
324
 
323
325
  def get_plugin_download_url():
324
326
  return None
325
-
326
- def get_version():
327
- return _version_str
@@ -17,7 +17,6 @@ class SecretBackendRoleArgs:
17
17
  backend: pulumi.Input[str],
18
18
  credential_type: pulumi.Input[str],
19
19
  default_sts_ttl: Optional[pulumi.Input[int]] = None,
20
- external_id: Optional[pulumi.Input[str]] = None,
21
20
  iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
22
21
  iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
23
22
  max_sts_ttl: Optional[pulumi.Input[int]] = None,
@@ -27,7 +26,6 @@ class SecretBackendRoleArgs:
27
26
  policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
28
27
  policy_document: Optional[pulumi.Input[str]] = None,
29
28
  role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
30
- session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
31
29
  user_path: Optional[pulumi.Input[str]] = None):
32
30
  """
33
31
  The set of arguments for constructing a SecretBackendRole resource.
@@ -41,8 +39,6 @@ class SecretBackendRoleArgs:
41
39
  and a default TTL is specified on the role,
42
40
  then this default TTL will be used. Valid only when `credential_type` is one of
43
41
  `assumed_role` or `federation_token`.
44
- :param pulumi.Input[str] external_id: External ID to set for assume role creds.
45
- Valid only when `credential_type` is set to `assumed_role`.
46
42
  :param pulumi.Input[Sequence[pulumi.Input[str]]] iam_groups: A list of IAM group names. IAM users generated
47
43
  against this vault role will be added to these IAM Groups. For a credential
48
44
  type of `assumed_role` or `federation_token`, the policies sent to the
@@ -79,9 +75,6 @@ class SecretBackendRoleArgs:
79
75
  :param pulumi.Input[Sequence[pulumi.Input[str]]] role_arns: Specifies the ARNs of the AWS roles this Vault role
80
76
  is allowed to assume. Required when `credential_type` is `assumed_role` and
81
77
  prohibited otherwise.
82
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] session_tags: A map of strings representing key/value pairs to be set
83
- during assume role creds creation. Valid only when `credential_type` is set to
84
- `assumed_role`.
85
78
  :param pulumi.Input[str] user_path: The path for the user name. Valid only when
86
79
  `credential_type` is `iam_user`. Default is `/`.
87
80
  """
@@ -89,8 +82,6 @@ class SecretBackendRoleArgs:
89
82
  pulumi.set(__self__, "credential_type", credential_type)
90
83
  if default_sts_ttl is not None:
91
84
  pulumi.set(__self__, "default_sts_ttl", default_sts_ttl)
92
- if external_id is not None:
93
- pulumi.set(__self__, "external_id", external_id)
94
85
  if iam_groups is not None:
95
86
  pulumi.set(__self__, "iam_groups", iam_groups)
96
87
  if iam_tags is not None:
@@ -109,8 +100,6 @@ class SecretBackendRoleArgs:
109
100
  pulumi.set(__self__, "policy_document", policy_document)
110
101
  if role_arns is not None:
111
102
  pulumi.set(__self__, "role_arns", role_arns)
112
- if session_tags is not None:
113
- pulumi.set(__self__, "session_tags", session_tags)
114
103
  if user_path is not None:
115
104
  pulumi.set(__self__, "user_path", user_path)
116
105
 
@@ -157,19 +146,6 @@ class SecretBackendRoleArgs:
157
146
  def default_sts_ttl(self, value: Optional[pulumi.Input[int]]):
158
147
  pulumi.set(self, "default_sts_ttl", value)
159
148
 
160
- @property
161
- @pulumi.getter(name="externalId")
162
- def external_id(self) -> Optional[pulumi.Input[str]]:
163
- """
164
- External ID to set for assume role creds.
165
- Valid only when `credential_type` is set to `assumed_role`.
166
- """
167
- return pulumi.get(self, "external_id")
168
-
169
- @external_id.setter
170
- def external_id(self, value: Optional[pulumi.Input[str]]):
171
- pulumi.set(self, "external_id", value)
172
-
173
149
  @property
174
150
  @pulumi.getter(name="iamGroups")
175
151
  def iam_groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
@@ -305,20 +281,6 @@ class SecretBackendRoleArgs:
305
281
  def role_arns(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
306
282
  pulumi.set(self, "role_arns", value)
307
283
 
308
- @property
309
- @pulumi.getter(name="sessionTags")
310
- def session_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
311
- """
312
- A map of strings representing key/value pairs to be set
313
- during assume role creds creation. Valid only when `credential_type` is set to
314
- `assumed_role`.
315
- """
316
- return pulumi.get(self, "session_tags")
317
-
318
- @session_tags.setter
319
- def session_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
320
- pulumi.set(self, "session_tags", value)
321
-
322
284
  @property
323
285
  @pulumi.getter(name="userPath")
324
286
  def user_path(self) -> Optional[pulumi.Input[str]]:
@@ -339,7 +301,6 @@ class _SecretBackendRoleState:
339
301
  backend: Optional[pulumi.Input[str]] = None,
340
302
  credential_type: Optional[pulumi.Input[str]] = None,
341
303
  default_sts_ttl: Optional[pulumi.Input[int]] = None,
342
- external_id: Optional[pulumi.Input[str]] = None,
343
304
  iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
344
305
  iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
345
306
  max_sts_ttl: Optional[pulumi.Input[int]] = None,
@@ -349,7 +310,6 @@ class _SecretBackendRoleState:
349
310
  policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
350
311
  policy_document: Optional[pulumi.Input[str]] = None,
351
312
  role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
352
- session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
353
313
  user_path: Optional[pulumi.Input[str]] = None):
354
314
  """
355
315
  Input properties used for looking up and filtering SecretBackendRole resources.
@@ -363,8 +323,6 @@ class _SecretBackendRoleState:
363
323
  and a default TTL is specified on the role,
364
324
  then this default TTL will be used. Valid only when `credential_type` is one of
365
325
  `assumed_role` or `federation_token`.
366
- :param pulumi.Input[str] external_id: External ID to set for assume role creds.
367
- Valid only when `credential_type` is set to `assumed_role`.
368
326
  :param pulumi.Input[Sequence[pulumi.Input[str]]] iam_groups: A list of IAM group names. IAM users generated
369
327
  against this vault role will be added to these IAM Groups. For a credential
370
328
  type of `assumed_role` or `federation_token`, the policies sent to the
@@ -401,9 +359,6 @@ class _SecretBackendRoleState:
401
359
  :param pulumi.Input[Sequence[pulumi.Input[str]]] role_arns: Specifies the ARNs of the AWS roles this Vault role
402
360
  is allowed to assume. Required when `credential_type` is `assumed_role` and
403
361
  prohibited otherwise.
404
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] session_tags: A map of strings representing key/value pairs to be set
405
- during assume role creds creation. Valid only when `credential_type` is set to
406
- `assumed_role`.
407
362
  :param pulumi.Input[str] user_path: The path for the user name. Valid only when
408
363
  `credential_type` is `iam_user`. Default is `/`.
409
364
  """
@@ -413,8 +368,6 @@ class _SecretBackendRoleState:
413
368
  pulumi.set(__self__, "credential_type", credential_type)
414
369
  if default_sts_ttl is not None:
415
370
  pulumi.set(__self__, "default_sts_ttl", default_sts_ttl)
416
- if external_id is not None:
417
- pulumi.set(__self__, "external_id", external_id)
418
371
  if iam_groups is not None:
419
372
  pulumi.set(__self__, "iam_groups", iam_groups)
420
373
  if iam_tags is not None:
@@ -433,8 +386,6 @@ class _SecretBackendRoleState:
433
386
  pulumi.set(__self__, "policy_document", policy_document)
434
387
  if role_arns is not None:
435
388
  pulumi.set(__self__, "role_arns", role_arns)
436
- if session_tags is not None:
437
- pulumi.set(__self__, "session_tags", session_tags)
438
389
  if user_path is not None:
439
390
  pulumi.set(__self__, "user_path", user_path)
440
391
 
@@ -481,19 +432,6 @@ class _SecretBackendRoleState:
481
432
  def default_sts_ttl(self, value: Optional[pulumi.Input[int]]):
482
433
  pulumi.set(self, "default_sts_ttl", value)
483
434
 
484
- @property
485
- @pulumi.getter(name="externalId")
486
- def external_id(self) -> Optional[pulumi.Input[str]]:
487
- """
488
- External ID to set for assume role creds.
489
- Valid only when `credential_type` is set to `assumed_role`.
490
- """
491
- return pulumi.get(self, "external_id")
492
-
493
- @external_id.setter
494
- def external_id(self, value: Optional[pulumi.Input[str]]):
495
- pulumi.set(self, "external_id", value)
496
-
497
435
  @property
498
436
  @pulumi.getter(name="iamGroups")
499
437
  def iam_groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
@@ -629,20 +567,6 @@ class _SecretBackendRoleState:
629
567
  def role_arns(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
630
568
  pulumi.set(self, "role_arns", value)
631
569
 
632
- @property
633
- @pulumi.getter(name="sessionTags")
634
- def session_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
635
- """
636
- A map of strings representing key/value pairs to be set
637
- during assume role creds creation. Valid only when `credential_type` is set to
638
- `assumed_role`.
639
- """
640
- return pulumi.get(self, "session_tags")
641
-
642
- @session_tags.setter
643
- def session_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
644
- pulumi.set(self, "session_tags", value)
645
-
646
570
  @property
647
571
  @pulumi.getter(name="userPath")
648
572
  def user_path(self) -> Optional[pulumi.Input[str]]:
@@ -665,7 +589,6 @@ class SecretBackendRole(pulumi.CustomResource):
665
589
  backend: Optional[pulumi.Input[str]] = None,
666
590
  credential_type: Optional[pulumi.Input[str]] = None,
667
591
  default_sts_ttl: Optional[pulumi.Input[int]] = None,
668
- external_id: Optional[pulumi.Input[str]] = None,
669
592
  iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
670
593
  iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
671
594
  max_sts_ttl: Optional[pulumi.Input[int]] = None,
@@ -675,7 +598,6 @@ class SecretBackendRole(pulumi.CustomResource):
675
598
  policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
676
599
  policy_document: Optional[pulumi.Input[str]] = None,
677
600
  role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
678
- session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
679
601
  user_path: Optional[pulumi.Input[str]] = None,
680
602
  __props__=None):
681
603
  """
@@ -725,8 +647,6 @@ class SecretBackendRole(pulumi.CustomResource):
725
647
  and a default TTL is specified on the role,
726
648
  then this default TTL will be used. Valid only when `credential_type` is one of
727
649
  `assumed_role` or `federation_token`.
728
- :param pulumi.Input[str] external_id: External ID to set for assume role creds.
729
- Valid only when `credential_type` is set to `assumed_role`.
730
650
  :param pulumi.Input[Sequence[pulumi.Input[str]]] iam_groups: A list of IAM group names. IAM users generated
731
651
  against this vault role will be added to these IAM Groups. For a credential
732
652
  type of `assumed_role` or `federation_token`, the policies sent to the
@@ -763,9 +683,6 @@ class SecretBackendRole(pulumi.CustomResource):
763
683
  :param pulumi.Input[Sequence[pulumi.Input[str]]] role_arns: Specifies the ARNs of the AWS roles this Vault role
764
684
  is allowed to assume. Required when `credential_type` is `assumed_role` and
765
685
  prohibited otherwise.
766
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] session_tags: A map of strings representing key/value pairs to be set
767
- during assume role creds creation. Valid only when `credential_type` is set to
768
- `assumed_role`.
769
686
  :param pulumi.Input[str] user_path: The path for the user name. Valid only when
770
687
  `credential_type` is `iam_user`. Default is `/`.
771
688
  """
@@ -828,7 +745,6 @@ class SecretBackendRole(pulumi.CustomResource):
828
745
  backend: Optional[pulumi.Input[str]] = None,
829
746
  credential_type: Optional[pulumi.Input[str]] = None,
830
747
  default_sts_ttl: Optional[pulumi.Input[int]] = None,
831
- external_id: Optional[pulumi.Input[str]] = None,
832
748
  iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
833
749
  iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
834
750
  max_sts_ttl: Optional[pulumi.Input[int]] = None,
@@ -838,7 +754,6 @@ class SecretBackendRole(pulumi.CustomResource):
838
754
  policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
839
755
  policy_document: Optional[pulumi.Input[str]] = None,
840
756
  role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
841
- session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
842
757
  user_path: Optional[pulumi.Input[str]] = None,
843
758
  __props__=None):
844
759
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
@@ -856,7 +771,6 @@ class SecretBackendRole(pulumi.CustomResource):
856
771
  raise TypeError("Missing required property 'credential_type'")
857
772
  __props__.__dict__["credential_type"] = credential_type
858
773
  __props__.__dict__["default_sts_ttl"] = default_sts_ttl
859
- __props__.__dict__["external_id"] = external_id
860
774
  __props__.__dict__["iam_groups"] = iam_groups
861
775
  __props__.__dict__["iam_tags"] = iam_tags
862
776
  __props__.__dict__["max_sts_ttl"] = max_sts_ttl
@@ -866,7 +780,6 @@ class SecretBackendRole(pulumi.CustomResource):
866
780
  __props__.__dict__["policy_arns"] = policy_arns
867
781
  __props__.__dict__["policy_document"] = policy_document
868
782
  __props__.__dict__["role_arns"] = role_arns
869
- __props__.__dict__["session_tags"] = session_tags
870
783
  __props__.__dict__["user_path"] = user_path
871
784
  super(SecretBackendRole, __self__).__init__(
872
785
  'vault:aws/secretBackendRole:SecretBackendRole',
@@ -881,7 +794,6 @@ class SecretBackendRole(pulumi.CustomResource):
881
794
  backend: Optional[pulumi.Input[str]] = None,
882
795
  credential_type: Optional[pulumi.Input[str]] = None,
883
796
  default_sts_ttl: Optional[pulumi.Input[int]] = None,
884
- external_id: Optional[pulumi.Input[str]] = None,
885
797
  iam_groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
886
798
  iam_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
887
799
  max_sts_ttl: Optional[pulumi.Input[int]] = None,
@@ -891,7 +803,6 @@ class SecretBackendRole(pulumi.CustomResource):
891
803
  policy_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
892
804
  policy_document: Optional[pulumi.Input[str]] = None,
893
805
  role_arns: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
894
- session_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
895
806
  user_path: Optional[pulumi.Input[str]] = None) -> 'SecretBackendRole':
896
807
  """
897
808
  Get an existing SecretBackendRole resource's state with the given name, id, and optional extra
@@ -910,8 +821,6 @@ class SecretBackendRole(pulumi.CustomResource):
910
821
  and a default TTL is specified on the role,
911
822
  then this default TTL will be used. Valid only when `credential_type` is one of
912
823
  `assumed_role` or `federation_token`.
913
- :param pulumi.Input[str] external_id: External ID to set for assume role creds.
914
- Valid only when `credential_type` is set to `assumed_role`.
915
824
  :param pulumi.Input[Sequence[pulumi.Input[str]]] iam_groups: A list of IAM group names. IAM users generated
916
825
  against this vault role will be added to these IAM Groups. For a credential
917
826
  type of `assumed_role` or `federation_token`, the policies sent to the
@@ -948,9 +857,6 @@ class SecretBackendRole(pulumi.CustomResource):
948
857
  :param pulumi.Input[Sequence[pulumi.Input[str]]] role_arns: Specifies the ARNs of the AWS roles this Vault role
949
858
  is allowed to assume. Required when `credential_type` is `assumed_role` and
950
859
  prohibited otherwise.
951
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] session_tags: A map of strings representing key/value pairs to be set
952
- during assume role creds creation. Valid only when `credential_type` is set to
953
- `assumed_role`.
954
860
  :param pulumi.Input[str] user_path: The path for the user name. Valid only when
955
861
  `credential_type` is `iam_user`. Default is `/`.
956
862
  """
@@ -961,7 +867,6 @@ class SecretBackendRole(pulumi.CustomResource):
961
867
  __props__.__dict__["backend"] = backend
962
868
  __props__.__dict__["credential_type"] = credential_type
963
869
  __props__.__dict__["default_sts_ttl"] = default_sts_ttl
964
- __props__.__dict__["external_id"] = external_id
965
870
  __props__.__dict__["iam_groups"] = iam_groups
966
871
  __props__.__dict__["iam_tags"] = iam_tags
967
872
  __props__.__dict__["max_sts_ttl"] = max_sts_ttl
@@ -971,7 +876,6 @@ class SecretBackendRole(pulumi.CustomResource):
971
876
  __props__.__dict__["policy_arns"] = policy_arns
972
877
  __props__.__dict__["policy_document"] = policy_document
973
878
  __props__.__dict__["role_arns"] = role_arns
974
- __props__.__dict__["session_tags"] = session_tags
975
879
  __props__.__dict__["user_path"] = user_path
976
880
  return SecretBackendRole(resource_name, opts=opts, __props__=__props__)
977
881
 
@@ -1006,15 +910,6 @@ class SecretBackendRole(pulumi.CustomResource):
1006
910
  """
1007
911
  return pulumi.get(self, "default_sts_ttl")
1008
912
 
1009
- @property
1010
- @pulumi.getter(name="externalId")
1011
- def external_id(self) -> pulumi.Output[Optional[str]]:
1012
- """
1013
- External ID to set for assume role creds.
1014
- Valid only when `credential_type` is set to `assumed_role`.
1015
- """
1016
- return pulumi.get(self, "external_id")
1017
-
1018
913
  @property
1019
914
  @pulumi.getter(name="iamGroups")
1020
915
  def iam_groups(self) -> pulumi.Output[Optional[Sequence[str]]]:
@@ -1114,16 +1009,6 @@ class SecretBackendRole(pulumi.CustomResource):
1114
1009
  """
1115
1010
  return pulumi.get(self, "role_arns")
1116
1011
 
1117
- @property
1118
- @pulumi.getter(name="sessionTags")
1119
- def session_tags(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
1120
- """
1121
- A map of strings representing key/value pairs to be set
1122
- during assume role creds creation. Valid only when `credential_type` is set to
1123
- `assumed_role`.
1124
- """
1125
- return pulumi.get(self, "session_tags")
1126
-
1127
1012
  @property
1128
1013
  @pulumi.getter(name="userPath")
1129
1014
  def user_path(self) -> pulumi.Output[Optional[str]]:
@@ -263,7 +263,7 @@ def get_entity(alias_id: Optional[str] = None,
263
263
 
264
264
  ## Required Vault Capabilities
265
265
 
266
- Use of this resource requires the `update` capability on `/identity/lookup/entity`.
266
+ Use of this resource requires the `create` capability on `/identity/lookup/entity`.
267
267
 
268
268
 
269
269
  :param str alias_id: ID of the alias.
@@ -333,7 +333,7 @@ def get_entity_output(alias_id: Optional[pulumi.Input[Optional[str]]] = None,
333
333
 
334
334
  ## Required Vault Capabilities
335
335
 
336
- Use of this resource requires the `update` capability on `/identity/lookup/entity`.
336
+ Use of this resource requires the `create` capability on `/identity/lookup/entity`.
337
337
 
338
338
 
339
339
  :param str alias_id: ID of the alias.
pulumi_vault/mount.py CHANGED
@@ -49,8 +49,7 @@ class MountArgs:
49
49
  :param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
50
50
  :param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
51
51
  not provided, this will default to Vault's OIDC default key.
52
- :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
53
- listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
52
+ :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
54
53
  :param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
55
54
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
56
55
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
@@ -241,8 +240,7 @@ class MountArgs:
241
240
  @pulumi.getter(name="listingVisibility")
242
241
  def listing_visibility(self) -> Optional[pulumi.Input[str]]:
243
242
  """
244
- Specifies whether to show this mount in the UI-specific
245
- listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
243
+ Specifies whether to show this mount in the UI-specific listing endpoint
246
244
  """
247
245
  return pulumi.get(self, "listing_visibility")
248
246
 
@@ -379,8 +377,7 @@ class _MountState:
379
377
  :param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
380
378
  :param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
381
379
  not provided, this will default to Vault's OIDC default key.
382
- :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
383
- listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
380
+ :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
384
381
  :param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
385
382
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
386
383
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
@@ -565,8 +562,7 @@ class _MountState:
565
562
  @pulumi.getter(name="listingVisibility")
566
563
  def listing_visibility(self) -> Optional[pulumi.Input[str]]:
567
564
  """
568
- Specifies whether to show this mount in the UI-specific
569
- listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
565
+ Specifies whether to show this mount in the UI-specific listing endpoint
570
566
  """
571
567
  return pulumi.get(self, "listing_visibility")
572
568
 
@@ -790,8 +786,7 @@ class Mount(pulumi.CustomResource):
790
786
  :param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
791
787
  :param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
792
788
  not provided, this will default to Vault's OIDC default key.
793
- :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
794
- listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
789
+ :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
795
790
  :param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
796
791
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
797
792
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
@@ -993,8 +988,7 @@ class Mount(pulumi.CustomResource):
993
988
  :param pulumi.Input[bool] external_entropy_access: Boolean flag that can be explicitly set to true to enable the secrets engine to access Vault's external entropy source
994
989
  :param pulumi.Input[str] identity_token_key: The key to use for signing plugin workload identity tokens. If
995
990
  not provided, this will default to Vault's OIDC default key.
996
- :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific
997
- listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
991
+ :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in the UI-specific listing endpoint
998
992
  :param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
999
993
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for tokens and secrets in seconds
1000
994
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
@@ -1124,8 +1118,7 @@ class Mount(pulumi.CustomResource):
1124
1118
  @pulumi.getter(name="listingVisibility")
1125
1119
  def listing_visibility(self) -> pulumi.Output[Optional[str]]:
1126
1120
  """
1127
- Specifies whether to show this mount in the UI-specific
1128
- listing endpoint. Valid values are `unauth` or `hidden`. If not set, behaves like `hidden`.
1121
+ Specifies whether to show this mount in the UI-specific listing endpoint
1129
1122
  """
1130
1123
  return pulumi.get(self, "listing_visibility")
1131
1124
 
pulumi_vault/outputs.py CHANGED
@@ -277,27 +277,17 @@ class GetPolicyDocumentRuleAllowedParameterResult(dict):
277
277
  def __init__(__self__, *,
278
278
  key: str,
279
279
  values: Sequence[str]):
280
- """
281
- :param str key: name of permitted or denied parameter.
282
- :param Sequence[str] values: list of values what are permitted or denied by policy rule.
283
- """
284
280
  pulumi.set(__self__, "key", key)
285
281
  pulumi.set(__self__, "values", values)
286
282
 
287
283
  @property
288
284
  @pulumi.getter
289
285
  def key(self) -> str:
290
- """
291
- name of permitted or denied parameter.
292
- """
293
286
  return pulumi.get(self, "key")
294
287
 
295
288
  @property
296
289
  @pulumi.getter
297
290
  def values(self) -> Sequence[str]:
298
- """
299
- list of values what are permitted or denied by policy rule.
300
- """
301
291
  return pulumi.get(self, "values")
302
292
 
303
293
 
@@ -306,27 +296,17 @@ class GetPolicyDocumentRuleDeniedParameterResult(dict):
306
296
  def __init__(__self__, *,
307
297
  key: str,
308
298
  values: Sequence[str]):
309
- """
310
- :param str key: name of permitted or denied parameter.
311
- :param Sequence[str] values: list of values what are permitted or denied by policy rule.
312
- """
313
299
  pulumi.set(__self__, "key", key)
314
300
  pulumi.set(__self__, "values", values)
315
301
 
316
302
  @property
317
303
  @pulumi.getter
318
304
  def key(self) -> str:
319
- """
320
- name of permitted or denied parameter.
321
- """
322
305
  return pulumi.get(self, "key")
323
306
 
324
307
  @property
325
308
  @pulumi.getter
326
309
  def values(self) -> Sequence[str]:
327
- """
328
- list of values what are permitted or denied by policy rule.
329
- """
330
310
  return pulumi.get(self, "values")
331
311
 
332
312
 
@@ -19,10 +19,6 @@ class BackendConfigEstAuthenticatorsArgs:
19
19
  def __init__(__self__, *,
20
20
  cert: Optional[pulumi.Input[Mapping[str, Any]]] = None,
21
21
  userpass: Optional[pulumi.Input[Mapping[str, Any]]] = None):
22
- """
23
- :param pulumi.Input[Mapping[str, Any]] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
24
- :param pulumi.Input[Mapping[str, Any]] userpass: "The accessor (required) property for user pass auth backends".
25
- """
26
22
  if cert is not None:
27
23
  pulumi.set(__self__, "cert", cert)
28
24
  if userpass is not None:
@@ -31,9 +27,6 @@ class BackendConfigEstAuthenticatorsArgs:
31
27
  @property
32
28
  @pulumi.getter
33
29
  def cert(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
34
- """
35
- "The accessor (required) and cert_role (optional) properties for cert auth backends".
36
- """
37
30
  return pulumi.get(self, "cert")
38
31
 
39
32
  @cert.setter
@@ -43,9 +36,6 @@ class BackendConfigEstAuthenticatorsArgs:
43
36
  @property
44
37
  @pulumi.getter
45
38
  def userpass(self) -> Optional[pulumi.Input[Mapping[str, Any]]]:
46
- """
47
- "The accessor (required) property for user pass auth backends".
48
- """
49
39
  return pulumi.get(self, "userpass")
50
40
 
51
41
  @userpass.setter
@@ -20,10 +20,6 @@ class BackendConfigEstAuthenticators(dict):
20
20
  def __init__(__self__, *,
21
21
  cert: Optional[Mapping[str, Any]] = None,
22
22
  userpass: Optional[Mapping[str, Any]] = None):
23
- """
24
- :param Mapping[str, Any] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
25
- :param Mapping[str, Any] userpass: "The accessor (required) property for user pass auth backends".
26
- """
27
23
  if cert is not None:
28
24
  pulumi.set(__self__, "cert", cert)
29
25
  if userpass is not None:
@@ -32,17 +28,11 @@ class BackendConfigEstAuthenticators(dict):
32
28
  @property
33
29
  @pulumi.getter
34
30
  def cert(self) -> Optional[Mapping[str, Any]]:
35
- """
36
- "The accessor (required) and cert_role (optional) properties for cert auth backends".
37
- """
38
31
  return pulumi.get(self, "cert")
39
32
 
40
33
  @property
41
34
  @pulumi.getter
42
35
  def userpass(self) -> Optional[Mapping[str, Any]]:
43
- """
44
- "The accessor (required) property for user pass auth backends".
45
- """
46
36
  return pulumi.get(self, "userpass")
47
37
 
48
38
 
@@ -1,5 +1,5 @@
1
1
  {
2
2
  "resource": true,
3
3
  "name": "vault",
4
- "version": "6.3.0"
4
+ "version": "6.3.0-alpha.1719265746"
5
5
  }
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: pulumi_vault
3
- Version: 6.3.0
3
+ Version: 6.3.0a1719265746
4
4
  Summary: A Pulumi package for creating and managing HashiCorp Vault cloud resources.
5
5
  License: Apache-2.0
6
6
  Project-URL: Homepage, https://pulumi.io
@@ -1,6 +1,6 @@
1
1
  pulumi_vault/__init__.py,sha256=YyUZ3AwssRd84-MFiLiMsKlEs0Gl5dnqjoRlDWbWe70,31607
2
- pulumi_vault/_inputs.py,sha256=Q9weKCzZZ0f0tVbn8d3jxCbKRwRhRzvmBLbinoDTPns,73552
3
- pulumi_vault/_utilities.py,sha256=aNnnaO6zRha3FhNHonuabR4fJLWGXANtK5dlh1Mz95k,10506
2
+ pulumi_vault/_inputs.py,sha256=mjyuroOXUphjofRI4JeGJ2Q1ESCb9uJeiA4C48NHfNQ,72858
3
+ pulumi_vault/_utilities.py,sha256=zozFZPZGnJJ7MjOYHQPdH-l-EHcRcX5lh5TVi22oTCw,10446
4
4
  pulumi_vault/audit.py,sha256=DlMWyovN9OrGVBpDgNvvtMRMpZRI_pC8YwqEaI9S6lk,20343
5
5
  pulumi_vault/audit_request_header.py,sha256=CHCfbFBwzX3mU6Fi34Havyl8cH9Mtzj5BDmKIc2tIno,10313
6
6
  pulumi_vault/auth_backend.py,sha256=v4dxfpqhg94wXTnSuKAJ8-qBC_TnUXneSa-ODx9NNoQ,23808
@@ -17,17 +17,17 @@ pulumi_vault/mfa_duo.py,sha256=LJzOnwcNhzbgogrW4cyvadUFnB7wasK-QQ4MbPU0eS4,28237
17
17
  pulumi_vault/mfa_okta.py,sha256=pA6n9k3BBMHXLvvyjOoSxTirgAznz5M0bWeXjHq8riU,29503
18
18
  pulumi_vault/mfa_pingid.py,sha256=h4W3TOvcUQK1gzwqiC6samirfBghCTIcBgd3KpyBGww,30972
19
19
  pulumi_vault/mfa_totp.py,sha256=J-c-GoVmO6FED6UDff2AtZJh5R8XlbnYY7CDeuPopI0,25344
20
- pulumi_vault/mount.py,sha256=c1LAxLDySvex6kcEwzd4ZmRUBhWf3Saetpue9MLTiYs,59849
20
+ pulumi_vault/mount.py,sha256=bcvGRLfo5rYBpP72qfdYm7H90lsPb5vDDQR1Xhviifo,59240
21
21
  pulumi_vault/namespace.py,sha256=QKY3lKdHIZpT_l0Ut6Fk_FarRPsEkLyxv1tmfgXXoU0,18077
22
22
  pulumi_vault/nomad_secret_backend.py,sha256=cmL2NkjNIZxu9a7NEMMHgojGi12I2tGDojFdMGSgj04,42018
23
23
  pulumi_vault/nomad_secret_role.py,sha256=47QltNPaM58oiCXt77Z6r1cXRVN79FhYWI7Iei5sQ3w,20146
24
- pulumi_vault/outputs.py,sha256=88VJ3ypd_FjGNbSs30B5o6hAiAvWU2bx4SoCfTBGyIc,13760
24
+ pulumi_vault/outputs.py,sha256=mcrrIhKLRFtb_JPFAdlsFxARGwRL_HPRFsP5x39EnVI,13066
25
25
  pulumi_vault/password_policy.py,sha256=sDU2lauo4-13snK35DOXtWbzn_bMJ5AZS-gS57T0aUw,12241
26
26
  pulumi_vault/plugin.py,sha256=0fBhSZDyQhzML9r1Udhy9ngHcfjwzi1BzvutsbKKUwU,23482
27
27
  pulumi_vault/plugin_pinned_version.py,sha256=mo62qPp_IwJRnv5t2p9ywInEjwHFsBunoyCDGc0bveg,10583
28
28
  pulumi_vault/policy.py,sha256=V6knAiqkzH97T72s6FB2qNjScDfKOAl3mox1h7vg0Ps,10935
29
29
  pulumi_vault/provider.py,sha256=gvnZj6hsMxMypnzizoolBed2LmtQPUCyMXlgGWpmLxY,41708
30
- pulumi_vault/pulumi-plugin.json,sha256=j8R--JRVm5NAC9dzEru5GOAjDXh5eXuVXX3iv7h9Z4I,64
30
+ pulumi_vault/pulumi-plugin.json,sha256=rnr5LI8iKrFVNCaasAj72Mv3FbEtoHFEFbld7wMoJw0,81
31
31
  pulumi_vault/py.typed,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
32
32
  pulumi_vault/quota_lease_count.py,sha256=w5CLQQjCk9PKSzX_XeLMEV87xre-poHJG9NfAGVVTjw,24898
33
33
  pulumi_vault/quota_rate_limit.py,sha256=hA0tDU-54VrfcTHCzbRU-TL32BLnPBxhl92faufEkZo,29503
@@ -60,7 +60,7 @@ pulumi_vault/aws/auth_backend_sts_role.py,sha256=yy2-_7dY4LEjFjo2ROE905-o-3uiHqL
60
60
  pulumi_vault/aws/get_access_credentials.py,sha256=AjYqLOhyucc98yNNh39DpTwBzTnSPgUeOgWAqiWZs9c,12282
61
61
  pulumi_vault/aws/get_static_access_credentials.py,sha256=65NLi7oDfPERU_XHaQC7kYkw-VngpesORVJ5B8ahPwo,4742
62
62
  pulumi_vault/aws/secret_backend.py,sha256=VoDgh8p5z7KC0jhBu5bh_oKcvYscPciTnEe00X3WaD8,49429
63
- pulumi_vault/aws/secret_backend_role.py,sha256=mGJYeBEct69kdK9HfS7k7wQgrlatu93U-ZkFbgNUQck,56724
63
+ pulumi_vault/aws/secret_backend_role.py,sha256=Vim6Vfq5SrC_oNajDFXv7TM9xlDP46ju7gBfuHQcyrM,50962
64
64
  pulumi_vault/aws/secret_backend_static_role.py,sha256=XB-cCvBxYf3G1yp8FUh1ecUDIHAc80pV8mokb3NS1HQ,17821
65
65
  pulumi_vault/azure/__init__.py,sha256=Ip6GcRxEn43qDXL93F4Jm2uYqW7HJlPK_dg1WrfwXBg,471
66
66
  pulumi_vault/azure/_inputs.py,sha256=uS9C0fl059lbaxHD8PiAwWbCrDahbgBcqztfYeTDaEo,2564
@@ -110,7 +110,7 @@ pulumi_vault/identity/__init__.py,sha256=0lwEIF5yG_HPzGj-VTGpnAPyd5zqwoLC0ltNaWW
110
110
  pulumi_vault/identity/entity.py,sha256=n0urur32RKQ4eEzU8TzkrsEr_iVU7CnjJu-GT2-igEU,19832
111
111
  pulumi_vault/identity/entity_alias.py,sha256=F6u_zADIe7DFrPem3FB11kU618b6VqMbJCEDqQ8Vqn0,18539
112
112
  pulumi_vault/identity/entity_policies.py,sha256=IVW9T5hHFcToSmM9DX0tYTZ7m5kMC-LF8hmsGVUSZkA,19927
113
- pulumi_vault/identity/get_entity.py,sha256=DuvhHx1ZpDhxdHYebh7DWOQ-iIY57F6OscJR4LPvpAU,14351
113
+ pulumi_vault/identity/get_entity.py,sha256=6tp6fyb26cnkkxi2dahnoIJaz5RVshhq0BJGKHmPDVY,14351
114
114
  pulumi_vault/identity/get_group.py,sha256=uD9KxGqQp2rOgExzehjgC1-AeIvY99QKRPS4EaC1_0Y,17956
115
115
  pulumi_vault/identity/get_oidc_client_creds.py,sha256=y8S0VLA_bVhqxmLHsMlBZrcRHBpjrTphPgVpU4FPgM0,5927
116
116
  pulumi_vault/identity/get_oidc_openid_config.py,sha256=B75fMH2x5QFtDUKO0hheszmMrM9EvRQ3JszpCWPiI7k,13482
@@ -186,7 +186,7 @@ pulumi_vault/okta/auth_backend_group.py,sha256=5Sw2MK4d5AnVMXT3O1a8fMbiqDOP1gmau
186
186
  pulumi_vault/okta/auth_backend_user.py,sha256=kiNHbdduI1R4XWbtnHWvdCIW8xR-UykSQGp1CLujeRk,16937
187
187
  pulumi_vault/okta/outputs.py,sha256=8IPwy3nKDVxvwT8wd9dyFm3hfPYd_FXZ4TcCkT9vUR4,3067
188
188
  pulumi_vault/pkisecret/__init__.py,sha256=Lwp_52rZJohEKOGZTENoaHtUcsrMDlAa87JRrMSrXcw,1103
189
- pulumi_vault/pkisecret/_inputs.py,sha256=w-AtpcUpcZAI0q1yE_6E8MuYUWe7tKkxOinoCFrps-I,3592
189
+ pulumi_vault/pkisecret/_inputs.py,sha256=SDVn0tXfYrSSVDZJ43CDY7yy4nhTzso3gmeNPefy2Zg,3094
190
190
  pulumi_vault/pkisecret/backend_config_cluster.py,sha256=gJDXjoh1qkAnXm6BAP65AXrDaY2q8aZpclglNBwCx2U,15929
191
191
  pulumi_vault/pkisecret/backend_config_est.py,sha256=NEhpisOocjL-_w3_b97Bw2kUz9lPxki1PGylh-1M0wQ,32409
192
192
  pulumi_vault/pkisecret/get_backend_config_est.py,sha256=pYeRNsK3RLeTmrPaU1rCi1pn8BC12kIvME6uHqniQps,9896
@@ -194,7 +194,7 @@ pulumi_vault/pkisecret/get_backend_issuer.py,sha256=098K4SWse6Xt5NCzqLqFFaqMHtuP
194
194
  pulumi_vault/pkisecret/get_backend_issuers.py,sha256=SQMnqHSCQzVBVNjHio7Pt3BQvYS1sNbgb75TeoClWoU,6398
195
195
  pulumi_vault/pkisecret/get_backend_key.py,sha256=NIjBO6CBmZ0gJ44wWnz510nQ4E47aQhuytFE-iSyhXY,6930
196
196
  pulumi_vault/pkisecret/get_backend_keys.py,sha256=Ke6ggiCEupZK3x1bvo1cPTLlKeOp4wVG09LyuldvL90,6303
197
- pulumi_vault/pkisecret/outputs.py,sha256=yPqzmnBbWgIR8K2_Bln9dE3ZNdxc6ns4cligGeEeJjE,3879
197
+ pulumi_vault/pkisecret/outputs.py,sha256=WbI2UNcZkEQbMyXzlQmHvqndGoa4e1uZXUASmsfmwdM,3409
198
198
  pulumi_vault/pkisecret/secret_backend_cert.py,sha256=arfvGLS6IEmMVdIAl7d5OTjPPt05VGtRKdYV7QhMSnc,49699
199
199
  pulumi_vault/pkisecret/secret_backend_config_ca.py,sha256=8JIjvEqZ-2uCuK6sh7TwhVdU5RgakdsGjham4iRsKUg,18958
200
200
  pulumi_vault/pkisecret/secret_backend_config_issuers.py,sha256=Hrk1TZ-vIYlDE-lmBRPndL2dwTh9MZbDN1Q3AVA6IZ0,16978
@@ -250,7 +250,7 @@ pulumi_vault/transit/get_decrypt.py,sha256=6rFzK4Ghf3tWRNJ_rSCs0yJsPynk9oeqZIJJq
250
250
  pulumi_vault/transit/get_encrypt.py,sha256=wz1GDrLP8JzDLCcjbU7tZM7vHNtBQ9PPpLHczy22uqY,5712
251
251
  pulumi_vault/transit/secret_backend_key.py,sha256=56to0JZaIFaCZVeiW5pNKER6azVhs2JXJoccgdVdtoI,53286
252
252
  pulumi_vault/transit/secret_cache_config.py,sha256=kSfKajNG2v5iPtoEnNLRXCIR5sRGUqTTxRW-tT0X_iM,12483
253
- pulumi_vault-6.3.0.dist-info/METADATA,sha256=EAluMaciG4gKF2BjCluv6DF8x2Wdn5cX8v5sirQf6CQ,4849
254
- pulumi_vault-6.3.0.dist-info/WHEEL,sha256=R0nc6qTxuoLk7ShA2_Y-UWkN8ZdfDBG2B6Eqpz2WXbs,91
255
- pulumi_vault-6.3.0.dist-info/top_level.txt,sha256=J7lAGvfexHc6T1EpDBGNKF0SXWURpmUhyzi9Nr5I61w,13
256
- pulumi_vault-6.3.0.dist-info/RECORD,,
253
+ pulumi_vault-6.3.0a1719265746.dist-info/METADATA,sha256=WDDcjJToHGBt1OCEyRz0h8FFGJ1dCkkOgLNgF3zUeCQ,4860
254
+ pulumi_vault-6.3.0a1719265746.dist-info/WHEEL,sha256=cpQTJ5IWu9CdaPViMhC9YzF8gZuS5-vlfoFihTBC86A,91
255
+ pulumi_vault-6.3.0a1719265746.dist-info/top_level.txt,sha256=J7lAGvfexHc6T1EpDBGNKF0SXWURpmUhyzi9Nr5I61w,13
256
+ pulumi_vault-6.3.0a1719265746.dist-info/RECORD,,
@@ -1,5 +1,5 @@
1
1
  Wheel-Version: 1.0
2
- Generator: setuptools (72.1.0)
2
+ Generator: setuptools (70.1.0)
3
3
  Root-Is-Purelib: true
4
4
  Tag: py3-none-any
5
5