pulumi-vault 6.6.0a1741329548__py3-none-any.whl → 6.6.0a1741836364__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (44) hide show
  1. pulumi_vault/__init__.py +8 -0
  2. pulumi_vault/aws/auth_backend_client.py +228 -4
  3. pulumi_vault/aws/secret_backend.py +266 -50
  4. pulumi_vault/aws/secret_backend_static_role.py +217 -0
  5. pulumi_vault/azure/auth_backend_config.py +257 -5
  6. pulumi_vault/azure/backend.py +249 -4
  7. pulumi_vault/database/_inputs.py +1692 -36
  8. pulumi_vault/database/outputs.py +1170 -18
  9. pulumi_vault/database/secret_backend_connection.py +220 -0
  10. pulumi_vault/database/secret_backend_static_role.py +143 -1
  11. pulumi_vault/database/secrets_mount.py +8 -0
  12. pulumi_vault/gcp/auth_backend.py +222 -2
  13. pulumi_vault/gcp/secret_backend.py +244 -4
  14. pulumi_vault/ldap/auth_backend.py +222 -2
  15. pulumi_vault/ldap/secret_backend.py +222 -2
  16. pulumi_vault/pkisecret/__init__.py +2 -0
  17. pulumi_vault/pkisecret/_inputs.py +0 -6
  18. pulumi_vault/pkisecret/backend_config_acme.py +47 -0
  19. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1376 -0
  20. pulumi_vault/pkisecret/backend_config_cmpv2.py +61 -14
  21. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  22. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +18 -1
  23. pulumi_vault/pkisecret/get_backend_issuer.py +114 -1
  24. pulumi_vault/pkisecret/outputs.py +0 -4
  25. pulumi_vault/pkisecret/secret_backend_cert.py +148 -7
  26. pulumi_vault/pkisecret/secret_backend_crl_config.py +54 -0
  27. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +141 -0
  28. pulumi_vault/pkisecret/secret_backend_issuer.py +265 -0
  29. pulumi_vault/pkisecret/secret_backend_role.py +252 -3
  30. pulumi_vault/pkisecret/secret_backend_root_cert.py +423 -0
  31. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +581 -3
  32. pulumi_vault/pkisecret/secret_backend_sign.py +94 -0
  33. pulumi_vault/pulumi-plugin.json +1 -1
  34. pulumi_vault/ssh/__init__.py +1 -0
  35. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  36. pulumi_vault/terraformcloud/secret_role.py +7 -7
  37. pulumi_vault/transit/__init__.py +2 -0
  38. pulumi_vault/transit/get_sign.py +324 -0
  39. pulumi_vault/transit/get_verify.py +354 -0
  40. pulumi_vault/transit/secret_backend_key.py +162 -0
  41. {pulumi_vault-6.6.0a1741329548.dist-info → pulumi_vault-6.6.0a1741836364.dist-info}/METADATA +1 -1
  42. {pulumi_vault-6.6.0a1741329548.dist-info → pulumi_vault-6.6.0a1741836364.dist-info}/RECORD +44 -39
  43. {pulumi_vault-6.6.0a1741329548.dist-info → pulumi_vault-6.6.0a1741836364.dist-info}/WHEEL +1 -1
  44. {pulumi_vault-6.6.0a1741329548.dist-info → pulumi_vault-6.6.0a1741836364.dist-info}/top_level.txt +0 -0
@@ -26,11 +26,14 @@ class SecretBackendKeyArgs:
26
26
  deletion_allowed: Optional[pulumi.Input[bool]] = None,
27
27
  derived: Optional[pulumi.Input[bool]] = None,
28
28
  exportable: Optional[pulumi.Input[bool]] = None,
29
+ hybrid_key_type_ec: Optional[pulumi.Input[str]] = None,
30
+ hybrid_key_type_pqc: Optional[pulumi.Input[str]] = None,
29
31
  key_size: Optional[pulumi.Input[int]] = None,
30
32
  min_decryption_version: Optional[pulumi.Input[int]] = None,
31
33
  min_encryption_version: Optional[pulumi.Input[int]] = None,
32
34
  name: Optional[pulumi.Input[str]] = None,
33
35
  namespace: Optional[pulumi.Input[str]] = None,
36
+ parameter_set: Optional[pulumi.Input[str]] = None,
34
37
  type: Optional[pulumi.Input[str]] = None):
35
38
  """
36
39
  The set of arguments for constructing a SecretBackendKey resource.
@@ -43,6 +46,10 @@ class SecretBackendKeyArgs:
43
46
  :param pulumi.Input[bool] deletion_allowed: Specifies if the key is allowed to be deleted.
44
47
  :param pulumi.Input[bool] derived: Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation.
45
48
  :param pulumi.Input[bool] exportable: Enables keys to be exportable. This allows for all valid private keys in the keyring to be exported. Once set, this cannot be disabled.
49
+ :param pulumi.Input[str] hybrid_key_type_ec: The elliptic curve algorithm to use for hybrid signatures.
50
+ Supported key types are `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, and `ed25519`.
51
+ :param pulumi.Input[str] hybrid_key_type_pqc: The post-quantum algorithm to use for hybrid signatures.
52
+ Currently, ML-DSA is the only supported key type.
46
53
  :param pulumi.Input[int] key_size: The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC, where it must be between 32 and 512 bytes.
47
54
  :param pulumi.Input[int] min_decryption_version: Minimum key version to use for decryption.
48
55
  :param pulumi.Input[int] min_encryption_version: Minimum key version to use for encryption
@@ -51,6 +58,8 @@ class SecretBackendKeyArgs:
51
58
  The value should not contain leading or trailing forward slashes.
52
59
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
53
60
  *Available only for Vault Enterprise*.
61
+ :param pulumi.Input[str] parameter_set: The parameter set to use for ML-DSA. Required for
62
+ ML-DSA and hybrid keys. Valid values are `44`, `65`, and `87`.
54
63
  :param pulumi.Input[str] type: Specifies the type of key to create. The currently-supported types are: `aes128-gcm96`, `aes256-gcm96` (default), `chacha20-poly1305`, `ed25519`, `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, `hmac`, `rsa-2048`, `rsa-3072` and `rsa-4096`.
55
64
  * Refer to the Vault documentation on transit key types for more information: [Key Types](https://www.vaultproject.io/docs/secrets/transit#key-types)
56
65
  """
@@ -67,6 +76,10 @@ class SecretBackendKeyArgs:
67
76
  pulumi.set(__self__, "derived", derived)
68
77
  if exportable is not None:
69
78
  pulumi.set(__self__, "exportable", exportable)
79
+ if hybrid_key_type_ec is not None:
80
+ pulumi.set(__self__, "hybrid_key_type_ec", hybrid_key_type_ec)
81
+ if hybrid_key_type_pqc is not None:
82
+ pulumi.set(__self__, "hybrid_key_type_pqc", hybrid_key_type_pqc)
70
83
  if key_size is not None:
71
84
  pulumi.set(__self__, "key_size", key_size)
72
85
  if min_decryption_version is not None:
@@ -77,6 +90,8 @@ class SecretBackendKeyArgs:
77
90
  pulumi.set(__self__, "name", name)
78
91
  if namespace is not None:
79
92
  pulumi.set(__self__, "namespace", namespace)
93
+ if parameter_set is not None:
94
+ pulumi.set(__self__, "parameter_set", parameter_set)
80
95
  if type is not None:
81
96
  pulumi.set(__self__, "type", type)
82
97
 
@@ -166,6 +181,32 @@ class SecretBackendKeyArgs:
166
181
  def exportable(self, value: Optional[pulumi.Input[bool]]):
167
182
  pulumi.set(self, "exportable", value)
168
183
 
184
+ @property
185
+ @pulumi.getter(name="hybridKeyTypeEc")
186
+ def hybrid_key_type_ec(self) -> Optional[pulumi.Input[str]]:
187
+ """
188
+ The elliptic curve algorithm to use for hybrid signatures.
189
+ Supported key types are `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, and `ed25519`.
190
+ """
191
+ return pulumi.get(self, "hybrid_key_type_ec")
192
+
193
+ @hybrid_key_type_ec.setter
194
+ def hybrid_key_type_ec(self, value: Optional[pulumi.Input[str]]):
195
+ pulumi.set(self, "hybrid_key_type_ec", value)
196
+
197
+ @property
198
+ @pulumi.getter(name="hybridKeyTypePqc")
199
+ def hybrid_key_type_pqc(self) -> Optional[pulumi.Input[str]]:
200
+ """
201
+ The post-quantum algorithm to use for hybrid signatures.
202
+ Currently, ML-DSA is the only supported key type.
203
+ """
204
+ return pulumi.get(self, "hybrid_key_type_pqc")
205
+
206
+ @hybrid_key_type_pqc.setter
207
+ def hybrid_key_type_pqc(self, value: Optional[pulumi.Input[str]]):
208
+ pulumi.set(self, "hybrid_key_type_pqc", value)
209
+
169
210
  @property
170
211
  @pulumi.getter(name="keySize")
171
212
  def key_size(self) -> Optional[pulumi.Input[int]]:
@@ -229,6 +270,19 @@ class SecretBackendKeyArgs:
229
270
  def namespace(self, value: Optional[pulumi.Input[str]]):
230
271
  pulumi.set(self, "namespace", value)
231
272
 
273
+ @property
274
+ @pulumi.getter(name="parameterSet")
275
+ def parameter_set(self) -> Optional[pulumi.Input[str]]:
276
+ """
277
+ The parameter set to use for ML-DSA. Required for
278
+ ML-DSA and hybrid keys. Valid values are `44`, `65`, and `87`.
279
+ """
280
+ return pulumi.get(self, "parameter_set")
281
+
282
+ @parameter_set.setter
283
+ def parameter_set(self, value: Optional[pulumi.Input[str]]):
284
+ pulumi.set(self, "parameter_set", value)
285
+
232
286
  @property
233
287
  @pulumi.getter
234
288
  def type(self) -> Optional[pulumi.Input[str]]:
@@ -253,6 +307,8 @@ class _SecretBackendKeyState:
253
307
  deletion_allowed: Optional[pulumi.Input[bool]] = None,
254
308
  derived: Optional[pulumi.Input[bool]] = None,
255
309
  exportable: Optional[pulumi.Input[bool]] = None,
310
+ hybrid_key_type_ec: Optional[pulumi.Input[str]] = None,
311
+ hybrid_key_type_pqc: Optional[pulumi.Input[str]] = None,
256
312
  key_size: Optional[pulumi.Input[int]] = None,
257
313
  keys: Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[str]]]]]] = None,
258
314
  latest_version: Optional[pulumi.Input[int]] = None,
@@ -261,6 +317,7 @@ class _SecretBackendKeyState:
261
317
  min_encryption_version: Optional[pulumi.Input[int]] = None,
262
318
  name: Optional[pulumi.Input[str]] = None,
263
319
  namespace: Optional[pulumi.Input[str]] = None,
320
+ parameter_set: Optional[pulumi.Input[str]] = None,
264
321
  supports_decryption: Optional[pulumi.Input[bool]] = None,
265
322
  supports_derivation: Optional[pulumi.Input[bool]] = None,
266
323
  supports_encryption: Optional[pulumi.Input[bool]] = None,
@@ -277,6 +334,10 @@ class _SecretBackendKeyState:
277
334
  :param pulumi.Input[bool] deletion_allowed: Specifies if the key is allowed to be deleted.
278
335
  :param pulumi.Input[bool] derived: Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation.
279
336
  :param pulumi.Input[bool] exportable: Enables keys to be exportable. This allows for all valid private keys in the keyring to be exported. Once set, this cannot be disabled.
337
+ :param pulumi.Input[str] hybrid_key_type_ec: The elliptic curve algorithm to use for hybrid signatures.
338
+ Supported key types are `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, and `ed25519`.
339
+ :param pulumi.Input[str] hybrid_key_type_pqc: The post-quantum algorithm to use for hybrid signatures.
340
+ Currently, ML-DSA is the only supported key type.
280
341
  :param pulumi.Input[int] key_size: The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC, where it must be between 32 and 512 bytes.
281
342
  :param pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[str]]]]] keys: List of key versions in the keyring. This attribute is zero-indexed and will contain a map of values depending on the `type` of the encryption key.
282
343
  * for key types `aes128-gcm96`, `aes256-gcm96` and `chacha20-poly1305`, each key version will be a map of a single value `id` which is just a hash of the key's metadata.
@@ -290,6 +351,8 @@ class _SecretBackendKeyState:
290
351
  The value should not contain leading or trailing forward slashes.
291
352
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
292
353
  *Available only for Vault Enterprise*.
354
+ :param pulumi.Input[str] parameter_set: The parameter set to use for ML-DSA. Required for
355
+ ML-DSA and hybrid keys. Valid values are `44`, `65`, and `87`.
293
356
  :param pulumi.Input[bool] supports_decryption: Whether or not the key supports decryption, based on key type.
294
357
  :param pulumi.Input[bool] supports_derivation: Whether or not the key supports derivation, based on key type.
295
358
  :param pulumi.Input[bool] supports_encryption: Whether or not the key supports encryption, based on key type.
@@ -311,6 +374,10 @@ class _SecretBackendKeyState:
311
374
  pulumi.set(__self__, "derived", derived)
312
375
  if exportable is not None:
313
376
  pulumi.set(__self__, "exportable", exportable)
377
+ if hybrid_key_type_ec is not None:
378
+ pulumi.set(__self__, "hybrid_key_type_ec", hybrid_key_type_ec)
379
+ if hybrid_key_type_pqc is not None:
380
+ pulumi.set(__self__, "hybrid_key_type_pqc", hybrid_key_type_pqc)
314
381
  if key_size is not None:
315
382
  pulumi.set(__self__, "key_size", key_size)
316
383
  if keys is not None:
@@ -327,6 +394,8 @@ class _SecretBackendKeyState:
327
394
  pulumi.set(__self__, "name", name)
328
395
  if namespace is not None:
329
396
  pulumi.set(__self__, "namespace", namespace)
397
+ if parameter_set is not None:
398
+ pulumi.set(__self__, "parameter_set", parameter_set)
330
399
  if supports_decryption is not None:
331
400
  pulumi.set(__self__, "supports_decryption", supports_decryption)
332
401
  if supports_derivation is not None:
@@ -424,6 +493,32 @@ class _SecretBackendKeyState:
424
493
  def exportable(self, value: Optional[pulumi.Input[bool]]):
425
494
  pulumi.set(self, "exportable", value)
426
495
 
496
+ @property
497
+ @pulumi.getter(name="hybridKeyTypeEc")
498
+ def hybrid_key_type_ec(self) -> Optional[pulumi.Input[str]]:
499
+ """
500
+ The elliptic curve algorithm to use for hybrid signatures.
501
+ Supported key types are `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, and `ed25519`.
502
+ """
503
+ return pulumi.get(self, "hybrid_key_type_ec")
504
+
505
+ @hybrid_key_type_ec.setter
506
+ def hybrid_key_type_ec(self, value: Optional[pulumi.Input[str]]):
507
+ pulumi.set(self, "hybrid_key_type_ec", value)
508
+
509
+ @property
510
+ @pulumi.getter(name="hybridKeyTypePqc")
511
+ def hybrid_key_type_pqc(self) -> Optional[pulumi.Input[str]]:
512
+ """
513
+ The post-quantum algorithm to use for hybrid signatures.
514
+ Currently, ML-DSA is the only supported key type.
515
+ """
516
+ return pulumi.get(self, "hybrid_key_type_pqc")
517
+
518
+ @hybrid_key_type_pqc.setter
519
+ def hybrid_key_type_pqc(self, value: Optional[pulumi.Input[str]]):
520
+ pulumi.set(self, "hybrid_key_type_pqc", value)
521
+
427
522
  @property
428
523
  @pulumi.getter(name="keySize")
429
524
  def key_size(self) -> Optional[pulumi.Input[int]]:
@@ -525,6 +620,19 @@ class _SecretBackendKeyState:
525
620
  def namespace(self, value: Optional[pulumi.Input[str]]):
526
621
  pulumi.set(self, "namespace", value)
527
622
 
623
+ @property
624
+ @pulumi.getter(name="parameterSet")
625
+ def parameter_set(self) -> Optional[pulumi.Input[str]]:
626
+ """
627
+ The parameter set to use for ML-DSA. Required for
628
+ ML-DSA and hybrid keys. Valid values are `44`, `65`, and `87`.
629
+ """
630
+ return pulumi.get(self, "parameter_set")
631
+
632
+ @parameter_set.setter
633
+ def parameter_set(self, value: Optional[pulumi.Input[str]]):
634
+ pulumi.set(self, "parameter_set", value)
635
+
528
636
  @property
529
637
  @pulumi.getter(name="supportsDecryption")
530
638
  def supports_decryption(self) -> Optional[pulumi.Input[bool]]:
@@ -599,11 +707,14 @@ class SecretBackendKey(pulumi.CustomResource):
599
707
  deletion_allowed: Optional[pulumi.Input[bool]] = None,
600
708
  derived: Optional[pulumi.Input[bool]] = None,
601
709
  exportable: Optional[pulumi.Input[bool]] = None,
710
+ hybrid_key_type_ec: Optional[pulumi.Input[str]] = None,
711
+ hybrid_key_type_pqc: Optional[pulumi.Input[str]] = None,
602
712
  key_size: Optional[pulumi.Input[int]] = None,
603
713
  min_decryption_version: Optional[pulumi.Input[int]] = None,
604
714
  min_encryption_version: Optional[pulumi.Input[int]] = None,
605
715
  name: Optional[pulumi.Input[str]] = None,
606
716
  namespace: Optional[pulumi.Input[str]] = None,
717
+ parameter_set: Optional[pulumi.Input[str]] = None,
607
718
  type: Optional[pulumi.Input[str]] = None,
608
719
  __props__=None):
609
720
  """
@@ -645,6 +756,10 @@ class SecretBackendKey(pulumi.CustomResource):
645
756
  :param pulumi.Input[bool] deletion_allowed: Specifies if the key is allowed to be deleted.
646
757
  :param pulumi.Input[bool] derived: Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation.
647
758
  :param pulumi.Input[bool] exportable: Enables keys to be exportable. This allows for all valid private keys in the keyring to be exported. Once set, this cannot be disabled.
759
+ :param pulumi.Input[str] hybrid_key_type_ec: The elliptic curve algorithm to use for hybrid signatures.
760
+ Supported key types are `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, and `ed25519`.
761
+ :param pulumi.Input[str] hybrid_key_type_pqc: The post-quantum algorithm to use for hybrid signatures.
762
+ Currently, ML-DSA is the only supported key type.
648
763
  :param pulumi.Input[int] key_size: The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC, where it must be between 32 and 512 bytes.
649
764
  :param pulumi.Input[int] min_decryption_version: Minimum key version to use for decryption.
650
765
  :param pulumi.Input[int] min_encryption_version: Minimum key version to use for encryption
@@ -653,6 +768,8 @@ class SecretBackendKey(pulumi.CustomResource):
653
768
  The value should not contain leading or trailing forward slashes.
654
769
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
655
770
  *Available only for Vault Enterprise*.
771
+ :param pulumi.Input[str] parameter_set: The parameter set to use for ML-DSA. Required for
772
+ ML-DSA and hybrid keys. Valid values are `44`, `65`, and `87`.
656
773
  :param pulumi.Input[str] type: Specifies the type of key to create. The currently-supported types are: `aes128-gcm96`, `aes256-gcm96` (default), `chacha20-poly1305`, `ed25519`, `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, `hmac`, `rsa-2048`, `rsa-3072` and `rsa-4096`.
657
774
  * Refer to the Vault documentation on transit key types for more information: [Key Types](https://www.vaultproject.io/docs/secrets/transit#key-types)
658
775
  """
@@ -712,11 +829,14 @@ class SecretBackendKey(pulumi.CustomResource):
712
829
  deletion_allowed: Optional[pulumi.Input[bool]] = None,
713
830
  derived: Optional[pulumi.Input[bool]] = None,
714
831
  exportable: Optional[pulumi.Input[bool]] = None,
832
+ hybrid_key_type_ec: Optional[pulumi.Input[str]] = None,
833
+ hybrid_key_type_pqc: Optional[pulumi.Input[str]] = None,
715
834
  key_size: Optional[pulumi.Input[int]] = None,
716
835
  min_decryption_version: Optional[pulumi.Input[int]] = None,
717
836
  min_encryption_version: Optional[pulumi.Input[int]] = None,
718
837
  name: Optional[pulumi.Input[str]] = None,
719
838
  namespace: Optional[pulumi.Input[str]] = None,
839
+ parameter_set: Optional[pulumi.Input[str]] = None,
720
840
  type: Optional[pulumi.Input[str]] = None,
721
841
  __props__=None):
722
842
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
@@ -736,11 +856,14 @@ class SecretBackendKey(pulumi.CustomResource):
736
856
  __props__.__dict__["deletion_allowed"] = deletion_allowed
737
857
  __props__.__dict__["derived"] = derived
738
858
  __props__.__dict__["exportable"] = exportable
859
+ __props__.__dict__["hybrid_key_type_ec"] = hybrid_key_type_ec
860
+ __props__.__dict__["hybrid_key_type_pqc"] = hybrid_key_type_pqc
739
861
  __props__.__dict__["key_size"] = key_size
740
862
  __props__.__dict__["min_decryption_version"] = min_decryption_version
741
863
  __props__.__dict__["min_encryption_version"] = min_encryption_version
742
864
  __props__.__dict__["name"] = name
743
865
  __props__.__dict__["namespace"] = namespace
866
+ __props__.__dict__["parameter_set"] = parameter_set
744
867
  __props__.__dict__["type"] = type
745
868
  __props__.__dict__["keys"] = None
746
869
  __props__.__dict__["latest_version"] = None
@@ -766,6 +889,8 @@ class SecretBackendKey(pulumi.CustomResource):
766
889
  deletion_allowed: Optional[pulumi.Input[bool]] = None,
767
890
  derived: Optional[pulumi.Input[bool]] = None,
768
891
  exportable: Optional[pulumi.Input[bool]] = None,
892
+ hybrid_key_type_ec: Optional[pulumi.Input[str]] = None,
893
+ hybrid_key_type_pqc: Optional[pulumi.Input[str]] = None,
769
894
  key_size: Optional[pulumi.Input[int]] = None,
770
895
  keys: Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[str]]]]]] = None,
771
896
  latest_version: Optional[pulumi.Input[int]] = None,
@@ -774,6 +899,7 @@ class SecretBackendKey(pulumi.CustomResource):
774
899
  min_encryption_version: Optional[pulumi.Input[int]] = None,
775
900
  name: Optional[pulumi.Input[str]] = None,
776
901
  namespace: Optional[pulumi.Input[str]] = None,
902
+ parameter_set: Optional[pulumi.Input[str]] = None,
777
903
  supports_decryption: Optional[pulumi.Input[bool]] = None,
778
904
  supports_derivation: Optional[pulumi.Input[bool]] = None,
779
905
  supports_encryption: Optional[pulumi.Input[bool]] = None,
@@ -795,6 +921,10 @@ class SecretBackendKey(pulumi.CustomResource):
795
921
  :param pulumi.Input[bool] deletion_allowed: Specifies if the key is allowed to be deleted.
796
922
  :param pulumi.Input[bool] derived: Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation.
797
923
  :param pulumi.Input[bool] exportable: Enables keys to be exportable. This allows for all valid private keys in the keyring to be exported. Once set, this cannot be disabled.
924
+ :param pulumi.Input[str] hybrid_key_type_ec: The elliptic curve algorithm to use for hybrid signatures.
925
+ Supported key types are `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, and `ed25519`.
926
+ :param pulumi.Input[str] hybrid_key_type_pqc: The post-quantum algorithm to use for hybrid signatures.
927
+ Currently, ML-DSA is the only supported key type.
798
928
  :param pulumi.Input[int] key_size: The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC, where it must be between 32 and 512 bytes.
799
929
  :param pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[str]]]]] keys: List of key versions in the keyring. This attribute is zero-indexed and will contain a map of values depending on the `type` of the encryption key.
800
930
  * for key types `aes128-gcm96`, `aes256-gcm96` and `chacha20-poly1305`, each key version will be a map of a single value `id` which is just a hash of the key's metadata.
@@ -808,6 +938,8 @@ class SecretBackendKey(pulumi.CustomResource):
808
938
  The value should not contain leading or trailing forward slashes.
809
939
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
810
940
  *Available only for Vault Enterprise*.
941
+ :param pulumi.Input[str] parameter_set: The parameter set to use for ML-DSA. Required for
942
+ ML-DSA and hybrid keys. Valid values are `44`, `65`, and `87`.
811
943
  :param pulumi.Input[bool] supports_decryption: Whether or not the key supports decryption, based on key type.
812
944
  :param pulumi.Input[bool] supports_derivation: Whether or not the key supports derivation, based on key type.
813
945
  :param pulumi.Input[bool] supports_encryption: Whether or not the key supports encryption, based on key type.
@@ -826,6 +958,8 @@ class SecretBackendKey(pulumi.CustomResource):
826
958
  __props__.__dict__["deletion_allowed"] = deletion_allowed
827
959
  __props__.__dict__["derived"] = derived
828
960
  __props__.__dict__["exportable"] = exportable
961
+ __props__.__dict__["hybrid_key_type_ec"] = hybrid_key_type_ec
962
+ __props__.__dict__["hybrid_key_type_pqc"] = hybrid_key_type_pqc
829
963
  __props__.__dict__["key_size"] = key_size
830
964
  __props__.__dict__["keys"] = keys
831
965
  __props__.__dict__["latest_version"] = latest_version
@@ -834,6 +968,7 @@ class SecretBackendKey(pulumi.CustomResource):
834
968
  __props__.__dict__["min_encryption_version"] = min_encryption_version
835
969
  __props__.__dict__["name"] = name
836
970
  __props__.__dict__["namespace"] = namespace
971
+ __props__.__dict__["parameter_set"] = parameter_set
837
972
  __props__.__dict__["supports_decryption"] = supports_decryption
838
973
  __props__.__dict__["supports_derivation"] = supports_derivation
839
974
  __props__.__dict__["supports_encryption"] = supports_encryption
@@ -899,6 +1034,24 @@ class SecretBackendKey(pulumi.CustomResource):
899
1034
  """
900
1035
  return pulumi.get(self, "exportable")
901
1036
 
1037
+ @property
1038
+ @pulumi.getter(name="hybridKeyTypeEc")
1039
+ def hybrid_key_type_ec(self) -> pulumi.Output[Optional[str]]:
1040
+ """
1041
+ The elliptic curve algorithm to use for hybrid signatures.
1042
+ Supported key types are `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, and `ed25519`.
1043
+ """
1044
+ return pulumi.get(self, "hybrid_key_type_ec")
1045
+
1046
+ @property
1047
+ @pulumi.getter(name="hybridKeyTypePqc")
1048
+ def hybrid_key_type_pqc(self) -> pulumi.Output[Optional[str]]:
1049
+ """
1050
+ The post-quantum algorithm to use for hybrid signatures.
1051
+ Currently, ML-DSA is the only supported key type.
1052
+ """
1053
+ return pulumi.get(self, "hybrid_key_type_pqc")
1054
+
902
1055
  @property
903
1056
  @pulumi.getter(name="keySize")
904
1057
  def key_size(self) -> pulumi.Output[Optional[int]]:
@@ -968,6 +1121,15 @@ class SecretBackendKey(pulumi.CustomResource):
968
1121
  """
969
1122
  return pulumi.get(self, "namespace")
970
1123
 
1124
+ @property
1125
+ @pulumi.getter(name="parameterSet")
1126
+ def parameter_set(self) -> pulumi.Output[Optional[str]]:
1127
+ """
1128
+ The parameter set to use for ML-DSA. Required for
1129
+ ML-DSA and hybrid keys. Valid values are `44`, `65`, and `87`.
1130
+ """
1131
+ return pulumi.get(self, "parameter_set")
1132
+
971
1133
  @property
972
1134
  @pulumi.getter(name="supportsDecryption")
973
1135
  def supports_decryption(self) -> pulumi.Output[bool]:
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.2
2
2
  Name: pulumi_vault
3
- Version: 6.6.0a1741329548
3
+ Version: 6.6.0a1741836364
4
4
  Summary: A Pulumi package for creating and managing HashiCorp Vault cloud resources.
5
5
  License: Apache-2.0
6
6
  Project-URL: Homepage, https://pulumi.io
@@ -1,4 +1,4 @@
1
- pulumi_vault/__init__.py,sha256=FcjjMuSTS8ketXMRJIhsXOIitbOr26gL3988G__itco,32190
1
+ pulumi_vault/__init__.py,sha256=H4BNLPHa_ivLIK7aPn5xpy_584Tds2BvFtKMfql1EtU,32403
2
2
  pulumi_vault/_inputs.py,sha256=SF9ssDW-1LueES-snz-lfjgpbVI0bldHW0yL4qeh7N0,92747
3
3
  pulumi_vault/_utilities.py,sha256=yyuODPikZ9pto3JWJRfMJo98dWmQ5_y45-TVcZG_K8Y,10807
4
4
  pulumi_vault/audit.py,sha256=qeLdEPUPWtIcJsnba2V6_uicJEVC5yMvwSLZi0DSqWw,20517
@@ -27,7 +27,7 @@ pulumi_vault/plugin.py,sha256=wsHI-O03QoIMQB4ni-MOBjXNz2xloYRHiqx9mk5dZq8,23656
27
27
  pulumi_vault/plugin_pinned_version.py,sha256=FRBwnJxAYtleO9MoM2juvwBpCk-Um-hmELLAj7kJvLo,10757
28
28
  pulumi_vault/policy.py,sha256=jhgtVabSBI5Z69EXKUJxlidTsNLzN-A9NsKkbnGX8n8,11109
29
29
  pulumi_vault/provider.py,sha256=KnBSEL3D7S8eRWQlc-oOGh1lKqtrPnQbdpPwfQdYZxg,42800
30
- pulumi_vault/pulumi-plugin.json,sha256=cQ3Tx9uMJDCc6-m6ufHrI0rpQzoiWVCZ0eNIBXSOcVA,81
30
+ pulumi_vault/pulumi-plugin.json,sha256=WrdxAIb0S1rd48g8jZ-HN0bM9zhkfR-v5WSml8ABAjU,81
31
31
  pulumi_vault/py.typed,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
32
32
  pulumi_vault/quota_lease_count.py,sha256=KkTKOgxZwkjLgFMKK1zy4qD7VMxKPahIs1E6EQkMxT8,25072
33
33
  pulumi_vault/quota_rate_limit.py,sha256=5XXedC8Orsgqq0LSHMaW-J_d0ht9Th_Hr7h8BSOC_Ik,29677
@@ -49,7 +49,7 @@ pulumi_vault/approle/auth_backend_role_secret_id.py,sha256=VGTmnQE9I1PNHChtZh3ST
49
49
  pulumi_vault/approle/get_auth_backend_role_id.py,sha256=_SSpvnF6FdGAHNl0eXxVB1zertlumwuE0Ol4lHeBLzQ,6633
50
50
  pulumi_vault/aws/__init__.py,sha256=0IbkDTvlbFtL-UyRoqQHLIxCm5ZVs-KOodxg9WO46tI,805
51
51
  pulumi_vault/aws/auth_backend_cert.py,sha256=4NSx3vBR2dOUcwOSVxH9gbWkJjCEeN5QYngb6LfpPtI,18543
52
- pulumi_vault/aws/auth_backend_client.py,sha256=O9Rn8rpNJIag-SHsZQlKBJRiCV96JmAo6aoPjw39fbo,45020
52
+ pulumi_vault/aws/auth_backend_client.py,sha256=m8yUtkHiOoe02ZHB3KuDfgK_mUcFBrVk6EtyGW-c0zE,58384
53
53
  pulumi_vault/aws/auth_backend_config_identity.py,sha256=70bblHD2V3Tx9hYA2NhToPRE9aIhyXeSKebC7uA0Dq0,23306
54
54
  pulumi_vault/aws/auth_backend_identity_whitelist.py,sha256=7RwYcQMkpHPe-kNLYWd8jL2TWzG8aEfaivoFSGAh8oo,17114
55
55
  pulumi_vault/aws/auth_backend_login.py,sha256=yq2ujRVX4WrHH7YuhsTpPxZxTKi4VzgCzdW8FsCZ3KA,42767
@@ -59,14 +59,14 @@ pulumi_vault/aws/auth_backend_roletag_blacklist.py,sha256=d6OxN_pjgLpw_Zzm5d21PY
59
59
  pulumi_vault/aws/auth_backend_sts_role.py,sha256=VRn2perU4FIlmaxWyFkN6kJb7WNMFVB0PVw4sYCBkKU,18218
60
60
  pulumi_vault/aws/get_access_credentials.py,sha256=zQrWdGYD3yeddCvIID1X7qflXwX3xyDS9cYWUAs1SRg,13831
61
61
  pulumi_vault/aws/get_static_access_credentials.py,sha256=tlKvd3yYt58urxZnQe9LPaE0DVW8c_soJcCcV9VJgvA,5660
62
- pulumi_vault/aws/secret_backend.py,sha256=-FqxHnwYK0hblN3J07S4AFmJu7edsE7nSoUdagDNdsA,58191
62
+ pulumi_vault/aws/secret_backend.py,sha256=jy19J0FtJTp98zl9Bz0YJk8c7HoqCOMRnHoVjVGnwIc,71246
63
63
  pulumi_vault/aws/secret_backend_role.py,sha256=d8TJj99dXlj9yIBr3hUx8WuV5meBLgCetakaOF5AQ_0,56898
64
- pulumi_vault/aws/secret_backend_static_role.py,sha256=FUIPjsAjM-SOmVFMK1r4Mk3KPXxQYLIiY5XC__GsNe8,17995
64
+ pulumi_vault/aws/secret_backend_static_role.py,sha256=pdUz2ro2bVxvbAdmZ4kd-dcDxbxskL5Z6f8Bjj0VZn8,29558
65
65
  pulumi_vault/azure/__init__.py,sha256=Ip6GcRxEn43qDXL93F4Jm2uYqW7HJlPK_dg1WrfwXBg,471
66
66
  pulumi_vault/azure/_inputs.py,sha256=NKp_c7kssHigrXAcE3rImbVnjFbVsknqqRA-cRS4aJU,3328
67
- pulumi_vault/azure/auth_backend_config.py,sha256=zbMXUchA55e-kGtoQZqxIB0OEx4Tew2zn8avaY_3EzU,30172
67
+ pulumi_vault/azure/auth_backend_config.py,sha256=siumw8VjEPnbi3hRiTprTEJHsoP8K9gRRnXa7tKElI8,44936
68
68
  pulumi_vault/azure/auth_backend_role.py,sha256=474skCd5OlVplAhOEk6r8KohjRl1ryGpWjo2MIQyNho,54886
69
- pulumi_vault/azure/backend.py,sha256=SiEKpXDeFgb3dmJtUYu9atWfnblEZ7BG3FfoWn-_UNM,39948
69
+ pulumi_vault/azure/backend.py,sha256=Z-N0rp4g21Ln29v-IUnK19O5bHsBTHEEJo1n0OeMjc8,54628
70
70
  pulumi_vault/azure/backend_role.py,sha256=vcwCtPQ5nfsqGHD9gWMaYjyyxxsBjh0h3UEshBhwqSw,39345
71
71
  pulumi_vault/azure/get_access_credentials.py,sha256=PuMGCuFzSh_V6q20SeUYlAOu49-lDbxZmTs8z6SJDw8,19874
72
72
  pulumi_vault/azure/outputs.py,sha256=WE8XiyjS-7U3e2NzKHkRwRcI9WWg8nIvgkr1QaVVhsk,3271
@@ -80,19 +80,19 @@ pulumi_vault/consul/__init__.py,sha256=MYNOUNqNi49Gsivdn3pOzEa_z-y9NF69sasXX1K0Y
80
80
  pulumi_vault/consul/secret_backend.py,sha256=zBN37oAaROpMYqQaK7OZdBRNUi84kAFGYnkUoBwMNlY,39690
81
81
  pulumi_vault/consul/secret_backend_role.py,sha256=CSEWiICBmW3uQogwVPyP9WIws_eGNwd7uHbk4UzJQ1I,41693
82
82
  pulumi_vault/database/__init__.py,sha256=tYq_SkLBBJ3LzcjTNj5KSt92p2t595IcZ_5Qbe-Gz2g,461
83
- pulumi_vault/database/_inputs.py,sha256=9mzVAKPkUag-WS2Fw9E6wwC85METljswEqY9crETuvc,374720
84
- pulumi_vault/database/outputs.py,sha256=C8Jbpep0D50ob83PusxYQqg4vKmzM6g701qjwD4W-Zs,261689
85
- pulumi_vault/database/secret_backend_connection.py,sha256=_uQTdiuaEws2Il1TJbHv0o_amJT7E6MRf7zFOVjnEPU,76379
83
+ pulumi_vault/database/_inputs.py,sha256=OHSH7aJ75VYvg_uAQxNV9WbokIRC2gkl0sWvwReb3VE,466934
84
+ pulumi_vault/database/outputs.py,sha256=f-a3zPenrKR2lkJ2Ie-dIFXWdwUSz3wTkYpEXasXqkU,325427
85
+ pulumi_vault/database/secret_backend_connection.py,sha256=6cmCZABkPHJ7pdu6KFnnpgQOlULGoUuZOrLwM86a-k0,89585
86
86
  pulumi_vault/database/secret_backend_role.py,sha256=YmjmE13qoDWAr-yx35z-KqWtWELW2n6sGeQP5ALsBVU,37120
87
- pulumi_vault/database/secret_backend_static_role.py,sha256=Xq0-15wL3FCiMG5Izg9rBLUVdTWpSGcQKW4MUbHCVdI,34772
88
- pulumi_vault/database/secrets_mount.py,sha256=4GZIWwCFRajtmZEP1ir5D1P0sj8Po-8sJJjNgU8aDOo,115950
87
+ pulumi_vault/database/secret_backend_static_role.py,sha256=ok3JfmEmZnL60HSmfAgaLwF3ywfwbNCebs9lGj-bqdA,42349
88
+ pulumi_vault/database/secrets_mount.py,sha256=g8Glpmd7PwH6n9j8YcBR0VIFNScPLD3v9lYOmLMOtLM,116322
89
89
  pulumi_vault/gcp/__init__.py,sha256=C0xixHwpaTovKTJEMFd1P6NitNgdlYCfCFY4aPbbI68,552
90
90
  pulumi_vault/gcp/_inputs.py,sha256=A1yy646oZMUGISk5eKIC__TEALrxQEVmpitBEHTjfm8,19371
91
- pulumi_vault/gcp/auth_backend.py,sha256=wlA00GFp0phnvt3UohHKafr14g_7NRmnS4-Jx6ViMwQ,51471
91
+ pulumi_vault/gcp/auth_backend.py,sha256=maK1BpmC0WP-YWpywnrw9RqDoINAkAeCt3bsJAT9uMs,64677
92
92
  pulumi_vault/gcp/auth_backend_role.py,sha256=LAYTOyebBXUZgNeJtdNrD4IlvfSZ-eFzwXeo3N5ADCk,52082
93
93
  pulumi_vault/gcp/get_auth_backend_role.py,sha256=Sowwer06mHmweprbO55wW3kbRNOa_0faX8yDY1-MlZk,25162
94
94
  pulumi_vault/gcp/outputs.py,sha256=Q6iSAQpe5--YJo3Pn32PZj_5isdTOYkETk7z7Z3RwSE,12787
95
- pulumi_vault/gcp/secret_backend.py,sha256=QCuNuEKEsuRNLU41J1E6hVJKM0E3cbxKAHAYLp56sbc,39579
95
+ pulumi_vault/gcp/secret_backend.py,sha256=CpvY9Bs-nVrJqMAJb1mA2Lfuc1Ao0AjqRXFmn3kPU9g,54227
96
96
  pulumi_vault/gcp/secret_impersonated_account.py,sha256=PSi1gZTlenIdUFOoX-4GKqeDsdeAc5ndhfGW2ZFO8Jk,21784
97
97
  pulumi_vault/gcp/secret_roleset.py,sha256=hHjmfw-kgGckWtdR_WtiNqieLSjAKrSTnBR4to6ZFAU,26190
98
98
  pulumi_vault/gcp/secret_static_account.py,sha256=MtvjrJwcSooLDgpHwgFFNyjp9F5qFclRo7Nv_dE4wQE,27512
@@ -163,12 +163,12 @@ pulumi_vault/kv/secret.py,sha256=MU8yHTIaNqcLNDPPyuVmFIF_q4Z0PXdxuxKaly8EPNw,161
163
163
  pulumi_vault/kv/secret_backend_v2.py,sha256=shCYHPEEBHSDWYU7N29ZDgI8MGuO7MNG2Y5Mq-7P4D4,19153
164
164
  pulumi_vault/kv/secret_v2.py,sha256=KvGcWr_lD23GxTGMwtozsw_V3ctlLQv1Hnihce4I3Jw,36412
165
165
  pulumi_vault/ldap/__init__.py,sha256=mNTQURo6CGBFeZf13WaYyNlRpXZzyME5qGhHrVfgLeM,598
166
- pulumi_vault/ldap/auth_backend.py,sha256=HyO_lq3mEsjN3HQWWkNYhvQOE9j44priIHE9vxGd5tg,87686
166
+ pulumi_vault/ldap/auth_backend.py,sha256=3oARM3pEXlqkptM9JIfg3H7QYgBxzVeN6vMxA5aZWQU,100892
167
167
  pulumi_vault/ldap/auth_backend_group.py,sha256=4z-rRE9dOlqPBsTgUTq5bmua-__d1Fk0Yp2IQ58NqNs,16595
168
168
  pulumi_vault/ldap/auth_backend_user.py,sha256=aF14zwPkSrTKNpH_6xN4I0SGlKNLCy99I5xPibKDtbg,18663
169
169
  pulumi_vault/ldap/get_dynamic_credentials.py,sha256=AV3acrBEpgRTTJIiYC3x9dYgrgoWGQmZ9WcM_FRAG4U,7711
170
170
  pulumi_vault/ldap/get_static_credentials.py,sha256=oBbC8C-xGLdO9a9IvrSOtlTNB_Qnsq1LwdI-PSK4w64,7926
171
- pulumi_vault/ldap/secret_backend.py,sha256=OK7FLfzKc_TxN2HKjjuU_WjIUtAw4y_c8BbDOQq1EpI,93509
171
+ pulumi_vault/ldap/secret_backend.py,sha256=4E4FlRH4tXzZ8MyXnzXBpSXKCJyXxt9TiTOY8mYD66E,106715
172
172
  pulumi_vault/ldap/secret_backend_dynamic_role.py,sha256=6bxRbjAaWpHMxMXUZwWznpu_RM6AGOLndfXpKYnO7LM,37971
173
173
  pulumi_vault/ldap/secret_backend_library_set.py,sha256=7VBGCIjEcrPEY_Pg73XQjDJFsiZW-1dWFoZCzu3Eiqg,24102
174
174
  pulumi_vault/ldap/secret_backend_static_role.py,sha256=KuzZv_EP1K0QuTuBeATNqmL5up1WLJYQyDFJKoZvaGM,24149
@@ -185,33 +185,35 @@ pulumi_vault/okta/auth_backend.py,sha256=CuQ7-ySllNKdmRJfR1U1_IxIAkXNKKO0tBe552O
185
185
  pulumi_vault/okta/auth_backend_group.py,sha256=_-yxuKaRFmGsE1AX7rTXeDLceU5cyoVJL2jeKm5eTCc,15149
186
186
  pulumi_vault/okta/auth_backend_user.py,sha256=RAQAgkbKikMwgl-eYhKfADahKxuKM-S8fvqv3f2vSFs,17111
187
187
  pulumi_vault/okta/outputs.py,sha256=9oSrWhhmR6ZGu_sdE6Ba46T2IW8w-nLUlZB-5pmg6uk,3241
188
- pulumi_vault/pkisecret/__init__.py,sha256=V0UUCT2UNR_N_PB-ZSRx4hz-m7bIY6-peAVaTDUCYsI,1246
189
- pulumi_vault/pkisecret/_inputs.py,sha256=Bmqq_5ILTQ5up2lKIbttYzMIUvuyQPEjTS8KPfas1JY,6332
188
+ pulumi_vault/pkisecret/__init__.py,sha256=wx54Eywbq4-Ngs-KONYBslFtn19ANzF3fYYIHWZJsRY,1327
189
+ pulumi_vault/pkisecret/_inputs.py,sha256=FSvpEh9AEe42f2wF8tt8_yzgkhO7je2SGuUhPDewop0,6238
190
190
  pulumi_vault/pkisecret/backend_acme_eab.py,sha256=DJntVKxVJpxN7UISOINTpnEZAuSopKK0qyxyYcy86po,24256
191
- pulumi_vault/pkisecret/backend_config_acme.py,sha256=ss724FovdojMUH0jjjvXEPUtWyb2XdAiyUsOs8u5w0Y,30538
191
+ pulumi_vault/pkisecret/backend_config_acme.py,sha256=IEFJRIisJ3itO-8EuJY7wcUtqB2J5dts7WhvAKapBTY,32598
192
+ pulumi_vault/pkisecret/backend_config_auto_tidy.py,sha256=l3Nns1ZqyNga63y0kLcq5qJ5F9ZYGc7ZAdOT8bVrpH4,72044
192
193
  pulumi_vault/pkisecret/backend_config_cluster.py,sha256=HZKD0_RG3InjJ5KMDhJjVe3v8KNkPo3Wh_8OclZU1vY,16103
193
- pulumi_vault/pkisecret/backend_config_cmpv2.py,sha256=pH-6aIY2MYfzdiiY1i0gzT0_su_a6ijSCd_HABE8VNY,25942
194
+ pulumi_vault/pkisecret/backend_config_cmpv2.py,sha256=k0eK4eJRjnqNXovVvjjMaJREW1CGrn6a_yaBawAe88M,28734
194
195
  pulumi_vault/pkisecret/backend_config_est.py,sha256=-QFenquNdyHCi-YJJeGnq1o3iQRpfVhI1pWQ1oelsz4,32920
195
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py,sha256=HSsFTcNbBbVXPXjUKnOexm9K70IbU71gmBaTTKMgpHM,8898
196
+ pulumi_vault/pkisecret/get_backend_cert_metadata.py,sha256=3SL8V1ojx6K9bKuAkjIjaUhs4ruxn8PsAJkP6JRg5lU,10925
197
+ pulumi_vault/pkisecret/get_backend_config_cmpv2.py,sha256=65Sz2y7hxOZyXwuk1RGHJNal7TVTZ7PmWtLCcpHJN2w,10112
196
198
  pulumi_vault/pkisecret/get_backend_config_est.py,sha256=hQE-leiO65lno8u5_6ektO-c6pfP6xOu7VbmGtGsVas,11158
197
- pulumi_vault/pkisecret/get_backend_issuer.py,sha256=iceEn_VYlywWxNmUUTuyFZblZwlDN3lONN1UGsgNL2s,11195
199
+ pulumi_vault/pkisecret/get_backend_issuer.py,sha256=lkjRAsU2wUbUJAvOe1RSlm2GPP1BkLIBz2CkLfDFgPc,18914
198
200
  pulumi_vault/pkisecret/get_backend_issuers.py,sha256=6jL0FCtQbDRA5HSifYQpDtOaSAyFQoCXwCD3K7GSq70,7270
199
201
  pulumi_vault/pkisecret/get_backend_key.py,sha256=DSl9s_XhYVGFKoa9fJFKV8n6ZTvRk4FkE6OM0DaEhM4,7870
200
202
  pulumi_vault/pkisecret/get_backend_keys.py,sha256=VVDFkEN0xgHSkj7KTl0Pi0CIEmrrAocOkMXs_whZ148,7166
201
- pulumi_vault/pkisecret/outputs.py,sha256=On7SvbU4OK-TQVDr9aB9Uvl5I1ZfoQNZ9pof_Jrqdeo,5351
202
- pulumi_vault/pkisecret/secret_backend_cert.py,sha256=hJk7_aH4pMhtqR5Q_AlP2YF8YrtjfItmKrL31QSqUkw,49873
203
+ pulumi_vault/pkisecret/outputs.py,sha256=tMdEb0KRb7hdmPyNzZRthYa1ceZV4ef6HKOqt_N17OM,5281
204
+ pulumi_vault/pkisecret/secret_backend_cert.py,sha256=ibPqA__h2ST6M4fTwdUhliRvDcqSytAWoolZLnRkdwU,59550
203
205
  pulumi_vault/pkisecret/secret_backend_config_ca.py,sha256=8M1BLNtbvoV-MNuK-3VWGwJAjyn67KOQsvSgeXOpt1Y,19132
204
206
  pulumi_vault/pkisecret/secret_backend_config_issuers.py,sha256=Uo-dgOdMyI4P4C0wG0GEQhwJGWpmpXuHkoiYceunDjM,17152
205
207
  pulumi_vault/pkisecret/secret_backend_config_urls.py,sha256=7SwlJk7GPF73siCyMv-gEjWAfHh3JbYhvSKVJOdfG10,22217
206
- pulumi_vault/pkisecret/secret_backend_crl_config.py,sha256=A0Lum7Rv7aCaxE2y59k7g8qjS06hkjEmHArKtEeJelg,36985
207
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py,sha256=IP2NADeG1y3jEcmyqYWeEDvoRCNpvcViKuPtfbjvRMQ,61967
208
+ pulumi_vault/pkisecret/secret_backend_crl_config.py,sha256=xemqxNlSiSOfkRruCSID3FPsvw7QVHYStEyIvLpqlpY,40217
209
+ pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py,sha256=BrCjSehl4zUfbF5Lr2klTpCBd6SjgJofVa8WRruoqAA,68504
208
210
  pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py,sha256=lFkhI8pO0pR-skKGjMpv2lDxaCQGKTgxO52eTCOsLyI,20222
209
- pulumi_vault/pkisecret/secret_backend_issuer.py,sha256=QfxaKVBRRPhdHVVcfFiBnAlx7RNmwQktJWVtHxHCWZI,36799
211
+ pulumi_vault/pkisecret/secret_backend_issuer.py,sha256=FRXnJftWkoMlvPKBw4nMD_vUSL_bpMfX2zsSmHfF1NM,52608
210
212
  pulumi_vault/pkisecret/secret_backend_key.py,sha256=nD5V_mXwHh_sTZ2N0Zk33M1_wbOHJ5NLlkp-Bb66vGc,25697
211
- pulumi_vault/pkisecret/secret_backend_role.py,sha256=pOi0XaoYjp-ZbgM2NsUSOz2FZr-4xeB0WrDy96hY_1w,119374
212
- pulumi_vault/pkisecret/secret_backend_root_cert.py,sha256=t97B_ERPgwuQ_zN-oTfYXmIKExaXSp5NF0t3hQxz4tM,69011
213
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py,sha256=rRSgnF9abGx_ABjszkmF3303OlEEOO6grnabo_arg2I,58598
214
- pulumi_vault/pkisecret/secret_backend_sign.py,sha256=92aerAXaiVjzdD3QCw3BC4PCh_oX3HOQUN-Pk1KZIxs,48754
213
+ pulumi_vault/pkisecret/secret_backend_role.py,sha256=kxDXnfRAU7aI24x2cABeyK1kasSOo1QWgIkYuXkJrGM,136516
214
+ pulumi_vault/pkisecret/secret_backend_root_cert.py,sha256=OQPQnbVuXLa1k4Gn1FH5dU2lt2lI98Rd8ezBRD9a_vQ,95518
215
+ pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py,sha256=0jom0Wh5J1IDnNUHOPHidOywVUaz38A5Aiec0J2aTVs,92117
216
+ pulumi_vault/pkisecret/secret_backend_sign.py,sha256=0wX6vZU5yrUBebP9KUaqPwnpl0uFx72gTkW2djqT-mo,55014
215
217
  pulumi_vault/rabbitmq/__init__.py,sha256=8QnL4OBf123TwWNwxgf2zSsJVPuTixNLywif1gW1yII,379
216
218
  pulumi_vault/rabbitmq/_inputs.py,sha256=Hqm9EtPpi6AzuypE9QhSOQBX935HMgCWmsjZ9u-d-BM,7068
217
219
  pulumi_vault/rabbitmq/outputs.py,sha256=cQ8s92UdRnG86OWYbsFGGqsXw5dBb1fqLoBwo65owmk,4027
@@ -231,15 +233,16 @@ pulumi_vault/secrets/sync_gcp_destination.py,sha256=tlwd3IesJNcL8vKwwuqVd5Or2WD5
231
233
  pulumi_vault/secrets/sync_gh_destination.py,sha256=Q7t2zA3ZdiiWRbaZfTEjgL8iNtgsxvcs2CLxXQG59m0,32351
232
234
  pulumi_vault/secrets/sync_github_apps.py,sha256=Uhrzcm573DH6fpJYv4tMCv8BMdhQe2jahd-BQdMUFRc,15378
233
235
  pulumi_vault/secrets/sync_vercel_destination.py,sha256=kaxUCmNcuFXJcFp8gs04ZDQbPtWOLepcT4vvbbrUeuE,26822
234
- pulumi_vault/ssh/__init__.py,sha256=kSaEW40BMdCU_LlCcy8YIBYROxHLbXfyHdaMRDm76i0,382
236
+ pulumi_vault/ssh/__init__.py,sha256=NccXESbmubRMPEZDpobAyrwFJDqkqeQcWC-7Et8tCuI,421
235
237
  pulumi_vault/ssh/_inputs.py,sha256=vz1nSJIjKJykgA6R44j7XrcbT2SYkfUGYOK-hKFdxRw,2585
238
+ pulumi_vault/ssh/get_secret_backend_sign.py,sha256=64iNyWkJhlNObSOJure1CprFijg9sYennkmXC-s3OrY,14928
236
239
  pulumi_vault/ssh/outputs.py,sha256=-c6dDRsAT71gVJZhORGeJrFwpsIORqhlph6787TGY9U,1620
237
240
  pulumi_vault/ssh/secret_backend_ca.py,sha256=WzqOAfDQe3LnXVysRf-kCny0qlH4-bXwQl83_kTrdPA,22649
238
241
  pulumi_vault/ssh/secret_backend_role.py,sha256=PueW8PuPDoQNfsT8G_M9u9di5GnAn8WEPu1NBGeM5zw,76446
239
242
  pulumi_vault/terraformcloud/__init__.py,sha256=sNst-XlgbdicqCgFwaD4FZQ1Qbpf3mMh6Q5Fn1J4Arg,354
240
243
  pulumi_vault/terraformcloud/secret_backend.py,sha256=nWrPaMGfgDWHl8ykHEti8TezastFmgNOqo6F-3gSdMg,23451
241
244
  pulumi_vault/terraformcloud/secret_creds.py,sha256=BANYfjsHHem66Wx6o2_HLWSLNwKS89IJyepFf_E8duU,18041
242
- pulumi_vault/terraformcloud/secret_role.py,sha256=MZiC9y-RxD609L8R5NFMCPaIVPL21t5jebEXxRGHGt4,18979
245
+ pulumi_vault/terraformcloud/secret_role.py,sha256=Qo-xIjy0eYPIZ6lUvrm7NafA9vQZLAPzzjtm_DvvsfM,19063
243
246
  pulumi_vault/tokenauth/__init__.py,sha256=uj-EJDeysMWfUsv2u4NII_tnIzZFXkTcEpYvGpEjotk,302
244
247
  pulumi_vault/tokenauth/auth_backend_role.py,sha256=QgRUazwsOXEh1uLuoRIvfm_aaPtjimZx9vXQ18C_7dI,51384
245
248
  pulumi_vault/transform/__init__.py,sha256=cywOzL5fbNIQ8v8Wb5KHP7zIxlbdiilO6z2JyG2gYLw,419
@@ -249,12 +252,14 @@ pulumi_vault/transform/get_encode.py,sha256=w8_P9Egg5mN9VmxBcixugadl1fPaTBlnnjxb
249
252
  pulumi_vault/transform/role.py,sha256=cEo6rdqD4wvQiyfIReFCdxWP6uYLnfLVXw3ZYn9-ryc,14586
250
253
  pulumi_vault/transform/template.py,sha256=wyvZYtj3r6PwKAvODSbSY9VWobe-0hrlAbxMQS_HDZU,25955
251
254
  pulumi_vault/transform/transformation.py,sha256=xEU2nKRjINTWN93L71GPJ5eaq_j6BEboK4QN1jYXJUg,26798
252
- pulumi_vault/transit/__init__.py,sha256=rjEd-GCT71lWrlA0gWd5FYxE14DRdMix9OhIHlg4ctw,392
255
+ pulumi_vault/transit/__init__.py,sha256=doUJo-f0xLwCaPWSmNDVW0PDdK6wED5KlQ4HxdQejQE,442
253
256
  pulumi_vault/transit/get_decrypt.py,sha256=I0XLtE5HqX4WULOf80wK9dJFf_J9jBLrzn-A5RIJAyg,6625
254
257
  pulumi_vault/transit/get_encrypt.py,sha256=yP6ftK53qWzA1_dl_B3skv6UsnZUROpVrC7Kc24PvUw,6809
255
- pulumi_vault/transit/secret_backend_key.py,sha256=wMEBzwCAc0mp20tJIgEgGvckxQvn_1V-dD-DjbUerlM,53544
258
+ pulumi_vault/transit/get_sign.py,sha256=HxEJpVPjWjgQzTeW7QAocETtMo50sZETHFZJUh8tjU4,14419
259
+ pulumi_vault/transit/get_verify.py,sha256=oARRAe1BO80ki2UX_n_8LoFlTU6Ogk2bIqMvJ-oqrOY,15601
260
+ pulumi_vault/transit/secret_backend_key.py,sha256=akLF2zbKOePAGb8pz23Q5wo307OjKs9eWfXLkzbDZiE,61862
256
261
  pulumi_vault/transit/secret_cache_config.py,sha256=Ya9l81qmQuwTpXGKfPVB38ecb0OghkQPc9Qz6rrbzD8,12657
257
- pulumi_vault-6.6.0a1741329548.dist-info/METADATA,sha256=XZS8twHYGChhRAdgbWXse0gd11Y9UugMlFS-5QQn3fE,4923
258
- pulumi_vault-6.6.0a1741329548.dist-info/WHEEL,sha256=jB7zZ3N9hIM9adW7qlTAyycLYW9npaWKLRzaoVcLKcM,91
259
- pulumi_vault-6.6.0a1741329548.dist-info/top_level.txt,sha256=J7lAGvfexHc6T1EpDBGNKF0SXWURpmUhyzi9Nr5I61w,13
260
- pulumi_vault-6.6.0a1741329548.dist-info/RECORD,,
262
+ pulumi_vault-6.6.0a1741836364.dist-info/METADATA,sha256=dIa6yAEXSL5y_wRvVYvryldnp5NOAZk-vjaCoynnEhI,4923
263
+ pulumi_vault-6.6.0a1741836364.dist-info/WHEEL,sha256=52BFRY2Up02UkjOa29eZOS2VxUrpPORXg1pkohGGUS8,91
264
+ pulumi_vault-6.6.0a1741836364.dist-info/top_level.txt,sha256=J7lAGvfexHc6T1EpDBGNKF0SXWURpmUhyzi9Nr5I61w,13
265
+ pulumi_vault-6.6.0a1741836364.dist-info/RECORD,,
@@ -1,5 +1,5 @@
1
1
  Wheel-Version: 1.0
2
- Generator: setuptools (75.8.2)
2
+ Generator: setuptools (76.0.0)
3
3
  Root-Is-Purelib: true
4
4
  Tag: py3-none-any
5
5