pulumi-vault 6.6.0a1741415971__py3-none-any.whl → 6.6.0a1741836364__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +8 -0
- pulumi_vault/aws/auth_backend_client.py +228 -4
- pulumi_vault/aws/secret_backend.py +266 -50
- pulumi_vault/aws/secret_backend_static_role.py +217 -0
- pulumi_vault/azure/auth_backend_config.py +257 -5
- pulumi_vault/azure/backend.py +249 -4
- pulumi_vault/database/_inputs.py +1692 -36
- pulumi_vault/database/outputs.py +1170 -18
- pulumi_vault/database/secret_backend_connection.py +220 -0
- pulumi_vault/database/secret_backend_static_role.py +143 -1
- pulumi_vault/database/secrets_mount.py +8 -0
- pulumi_vault/gcp/auth_backend.py +222 -2
- pulumi_vault/gcp/secret_backend.py +244 -4
- pulumi_vault/ldap/auth_backend.py +222 -2
- pulumi_vault/ldap/secret_backend.py +222 -2
- pulumi_vault/pkisecret/__init__.py +2 -0
- pulumi_vault/pkisecret/_inputs.py +0 -6
- pulumi_vault/pkisecret/backend_config_acme.py +47 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1376 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +61 -14
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +18 -1
- pulumi_vault/pkisecret/get_backend_issuer.py +114 -1
- pulumi_vault/pkisecret/outputs.py +0 -4
- pulumi_vault/pkisecret/secret_backend_cert.py +148 -7
- pulumi_vault/pkisecret/secret_backend_crl_config.py +54 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +141 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +265 -0
- pulumi_vault/pkisecret/secret_backend_role.py +252 -3
- pulumi_vault/pkisecret/secret_backend_root_cert.py +423 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +581 -3
- pulumi_vault/pkisecret/secret_backend_sign.py +94 -0
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/ssh/__init__.py +1 -0
- pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
- pulumi_vault/terraformcloud/secret_role.py +7 -7
- pulumi_vault/transit/__init__.py +2 -0
- pulumi_vault/transit/get_sign.py +324 -0
- pulumi_vault/transit/get_verify.py +354 -0
- pulumi_vault/transit/secret_backend_key.py +162 -0
- {pulumi_vault-6.6.0a1741415971.dist-info → pulumi_vault-6.6.0a1741836364.dist-info}/METADATA +1 -1
- {pulumi_vault-6.6.0a1741415971.dist-info → pulumi_vault-6.6.0a1741836364.dist-info}/RECORD +44 -39
- {pulumi_vault-6.6.0a1741415971.dist-info → pulumi_vault-6.6.0a1741836364.dist-info}/WHEEL +1 -1
- {pulumi_vault-6.6.0a1741415971.dist-info → pulumi_vault-6.6.0a1741836364.dist-info}/top_level.txt +0 -0
@@ -26,11 +26,14 @@ class SecretBackendKeyArgs:
|
|
26
26
|
deletion_allowed: Optional[pulumi.Input[bool]] = None,
|
27
27
|
derived: Optional[pulumi.Input[bool]] = None,
|
28
28
|
exportable: Optional[pulumi.Input[bool]] = None,
|
29
|
+
hybrid_key_type_ec: Optional[pulumi.Input[str]] = None,
|
30
|
+
hybrid_key_type_pqc: Optional[pulumi.Input[str]] = None,
|
29
31
|
key_size: Optional[pulumi.Input[int]] = None,
|
30
32
|
min_decryption_version: Optional[pulumi.Input[int]] = None,
|
31
33
|
min_encryption_version: Optional[pulumi.Input[int]] = None,
|
32
34
|
name: Optional[pulumi.Input[str]] = None,
|
33
35
|
namespace: Optional[pulumi.Input[str]] = None,
|
36
|
+
parameter_set: Optional[pulumi.Input[str]] = None,
|
34
37
|
type: Optional[pulumi.Input[str]] = None):
|
35
38
|
"""
|
36
39
|
The set of arguments for constructing a SecretBackendKey resource.
|
@@ -43,6 +46,10 @@ class SecretBackendKeyArgs:
|
|
43
46
|
:param pulumi.Input[bool] deletion_allowed: Specifies if the key is allowed to be deleted.
|
44
47
|
:param pulumi.Input[bool] derived: Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation.
|
45
48
|
:param pulumi.Input[bool] exportable: Enables keys to be exportable. This allows for all valid private keys in the keyring to be exported. Once set, this cannot be disabled.
|
49
|
+
:param pulumi.Input[str] hybrid_key_type_ec: The elliptic curve algorithm to use for hybrid signatures.
|
50
|
+
Supported key types are `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, and `ed25519`.
|
51
|
+
:param pulumi.Input[str] hybrid_key_type_pqc: The post-quantum algorithm to use for hybrid signatures.
|
52
|
+
Currently, ML-DSA is the only supported key type.
|
46
53
|
:param pulumi.Input[int] key_size: The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC, where it must be between 32 and 512 bytes.
|
47
54
|
:param pulumi.Input[int] min_decryption_version: Minimum key version to use for decryption.
|
48
55
|
:param pulumi.Input[int] min_encryption_version: Minimum key version to use for encryption
|
@@ -51,6 +58,8 @@ class SecretBackendKeyArgs:
|
|
51
58
|
The value should not contain leading or trailing forward slashes.
|
52
59
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
53
60
|
*Available only for Vault Enterprise*.
|
61
|
+
:param pulumi.Input[str] parameter_set: The parameter set to use for ML-DSA. Required for
|
62
|
+
ML-DSA and hybrid keys. Valid values are `44`, `65`, and `87`.
|
54
63
|
:param pulumi.Input[str] type: Specifies the type of key to create. The currently-supported types are: `aes128-gcm96`, `aes256-gcm96` (default), `chacha20-poly1305`, `ed25519`, `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, `hmac`, `rsa-2048`, `rsa-3072` and `rsa-4096`.
|
55
64
|
* Refer to the Vault documentation on transit key types for more information: [Key Types](https://www.vaultproject.io/docs/secrets/transit#key-types)
|
56
65
|
"""
|
@@ -67,6 +76,10 @@ class SecretBackendKeyArgs:
|
|
67
76
|
pulumi.set(__self__, "derived", derived)
|
68
77
|
if exportable is not None:
|
69
78
|
pulumi.set(__self__, "exportable", exportable)
|
79
|
+
if hybrid_key_type_ec is not None:
|
80
|
+
pulumi.set(__self__, "hybrid_key_type_ec", hybrid_key_type_ec)
|
81
|
+
if hybrid_key_type_pqc is not None:
|
82
|
+
pulumi.set(__self__, "hybrid_key_type_pqc", hybrid_key_type_pqc)
|
70
83
|
if key_size is not None:
|
71
84
|
pulumi.set(__self__, "key_size", key_size)
|
72
85
|
if min_decryption_version is not None:
|
@@ -77,6 +90,8 @@ class SecretBackendKeyArgs:
|
|
77
90
|
pulumi.set(__self__, "name", name)
|
78
91
|
if namespace is not None:
|
79
92
|
pulumi.set(__self__, "namespace", namespace)
|
93
|
+
if parameter_set is not None:
|
94
|
+
pulumi.set(__self__, "parameter_set", parameter_set)
|
80
95
|
if type is not None:
|
81
96
|
pulumi.set(__self__, "type", type)
|
82
97
|
|
@@ -166,6 +181,32 @@ class SecretBackendKeyArgs:
|
|
166
181
|
def exportable(self, value: Optional[pulumi.Input[bool]]):
|
167
182
|
pulumi.set(self, "exportable", value)
|
168
183
|
|
184
|
+
@property
|
185
|
+
@pulumi.getter(name="hybridKeyTypeEc")
|
186
|
+
def hybrid_key_type_ec(self) -> Optional[pulumi.Input[str]]:
|
187
|
+
"""
|
188
|
+
The elliptic curve algorithm to use for hybrid signatures.
|
189
|
+
Supported key types are `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, and `ed25519`.
|
190
|
+
"""
|
191
|
+
return pulumi.get(self, "hybrid_key_type_ec")
|
192
|
+
|
193
|
+
@hybrid_key_type_ec.setter
|
194
|
+
def hybrid_key_type_ec(self, value: Optional[pulumi.Input[str]]):
|
195
|
+
pulumi.set(self, "hybrid_key_type_ec", value)
|
196
|
+
|
197
|
+
@property
|
198
|
+
@pulumi.getter(name="hybridKeyTypePqc")
|
199
|
+
def hybrid_key_type_pqc(self) -> Optional[pulumi.Input[str]]:
|
200
|
+
"""
|
201
|
+
The post-quantum algorithm to use for hybrid signatures.
|
202
|
+
Currently, ML-DSA is the only supported key type.
|
203
|
+
"""
|
204
|
+
return pulumi.get(self, "hybrid_key_type_pqc")
|
205
|
+
|
206
|
+
@hybrid_key_type_pqc.setter
|
207
|
+
def hybrid_key_type_pqc(self, value: Optional[pulumi.Input[str]]):
|
208
|
+
pulumi.set(self, "hybrid_key_type_pqc", value)
|
209
|
+
|
169
210
|
@property
|
170
211
|
@pulumi.getter(name="keySize")
|
171
212
|
def key_size(self) -> Optional[pulumi.Input[int]]:
|
@@ -229,6 +270,19 @@ class SecretBackendKeyArgs:
|
|
229
270
|
def namespace(self, value: Optional[pulumi.Input[str]]):
|
230
271
|
pulumi.set(self, "namespace", value)
|
231
272
|
|
273
|
+
@property
|
274
|
+
@pulumi.getter(name="parameterSet")
|
275
|
+
def parameter_set(self) -> Optional[pulumi.Input[str]]:
|
276
|
+
"""
|
277
|
+
The parameter set to use for ML-DSA. Required for
|
278
|
+
ML-DSA and hybrid keys. Valid values are `44`, `65`, and `87`.
|
279
|
+
"""
|
280
|
+
return pulumi.get(self, "parameter_set")
|
281
|
+
|
282
|
+
@parameter_set.setter
|
283
|
+
def parameter_set(self, value: Optional[pulumi.Input[str]]):
|
284
|
+
pulumi.set(self, "parameter_set", value)
|
285
|
+
|
232
286
|
@property
|
233
287
|
@pulumi.getter
|
234
288
|
def type(self) -> Optional[pulumi.Input[str]]:
|
@@ -253,6 +307,8 @@ class _SecretBackendKeyState:
|
|
253
307
|
deletion_allowed: Optional[pulumi.Input[bool]] = None,
|
254
308
|
derived: Optional[pulumi.Input[bool]] = None,
|
255
309
|
exportable: Optional[pulumi.Input[bool]] = None,
|
310
|
+
hybrid_key_type_ec: Optional[pulumi.Input[str]] = None,
|
311
|
+
hybrid_key_type_pqc: Optional[pulumi.Input[str]] = None,
|
256
312
|
key_size: Optional[pulumi.Input[int]] = None,
|
257
313
|
keys: Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[str]]]]]] = None,
|
258
314
|
latest_version: Optional[pulumi.Input[int]] = None,
|
@@ -261,6 +317,7 @@ class _SecretBackendKeyState:
|
|
261
317
|
min_encryption_version: Optional[pulumi.Input[int]] = None,
|
262
318
|
name: Optional[pulumi.Input[str]] = None,
|
263
319
|
namespace: Optional[pulumi.Input[str]] = None,
|
320
|
+
parameter_set: Optional[pulumi.Input[str]] = None,
|
264
321
|
supports_decryption: Optional[pulumi.Input[bool]] = None,
|
265
322
|
supports_derivation: Optional[pulumi.Input[bool]] = None,
|
266
323
|
supports_encryption: Optional[pulumi.Input[bool]] = None,
|
@@ -277,6 +334,10 @@ class _SecretBackendKeyState:
|
|
277
334
|
:param pulumi.Input[bool] deletion_allowed: Specifies if the key is allowed to be deleted.
|
278
335
|
:param pulumi.Input[bool] derived: Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation.
|
279
336
|
:param pulumi.Input[bool] exportable: Enables keys to be exportable. This allows for all valid private keys in the keyring to be exported. Once set, this cannot be disabled.
|
337
|
+
:param pulumi.Input[str] hybrid_key_type_ec: The elliptic curve algorithm to use for hybrid signatures.
|
338
|
+
Supported key types are `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, and `ed25519`.
|
339
|
+
:param pulumi.Input[str] hybrid_key_type_pqc: The post-quantum algorithm to use for hybrid signatures.
|
340
|
+
Currently, ML-DSA is the only supported key type.
|
280
341
|
:param pulumi.Input[int] key_size: The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC, where it must be between 32 and 512 bytes.
|
281
342
|
:param pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[str]]]]] keys: List of key versions in the keyring. This attribute is zero-indexed and will contain a map of values depending on the `type` of the encryption key.
|
282
343
|
* for key types `aes128-gcm96`, `aes256-gcm96` and `chacha20-poly1305`, each key version will be a map of a single value `id` which is just a hash of the key's metadata.
|
@@ -290,6 +351,8 @@ class _SecretBackendKeyState:
|
|
290
351
|
The value should not contain leading or trailing forward slashes.
|
291
352
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
292
353
|
*Available only for Vault Enterprise*.
|
354
|
+
:param pulumi.Input[str] parameter_set: The parameter set to use for ML-DSA. Required for
|
355
|
+
ML-DSA and hybrid keys. Valid values are `44`, `65`, and `87`.
|
293
356
|
:param pulumi.Input[bool] supports_decryption: Whether or not the key supports decryption, based on key type.
|
294
357
|
:param pulumi.Input[bool] supports_derivation: Whether or not the key supports derivation, based on key type.
|
295
358
|
:param pulumi.Input[bool] supports_encryption: Whether or not the key supports encryption, based on key type.
|
@@ -311,6 +374,10 @@ class _SecretBackendKeyState:
|
|
311
374
|
pulumi.set(__self__, "derived", derived)
|
312
375
|
if exportable is not None:
|
313
376
|
pulumi.set(__self__, "exportable", exportable)
|
377
|
+
if hybrid_key_type_ec is not None:
|
378
|
+
pulumi.set(__self__, "hybrid_key_type_ec", hybrid_key_type_ec)
|
379
|
+
if hybrid_key_type_pqc is not None:
|
380
|
+
pulumi.set(__self__, "hybrid_key_type_pqc", hybrid_key_type_pqc)
|
314
381
|
if key_size is not None:
|
315
382
|
pulumi.set(__self__, "key_size", key_size)
|
316
383
|
if keys is not None:
|
@@ -327,6 +394,8 @@ class _SecretBackendKeyState:
|
|
327
394
|
pulumi.set(__self__, "name", name)
|
328
395
|
if namespace is not None:
|
329
396
|
pulumi.set(__self__, "namespace", namespace)
|
397
|
+
if parameter_set is not None:
|
398
|
+
pulumi.set(__self__, "parameter_set", parameter_set)
|
330
399
|
if supports_decryption is not None:
|
331
400
|
pulumi.set(__self__, "supports_decryption", supports_decryption)
|
332
401
|
if supports_derivation is not None:
|
@@ -424,6 +493,32 @@ class _SecretBackendKeyState:
|
|
424
493
|
def exportable(self, value: Optional[pulumi.Input[bool]]):
|
425
494
|
pulumi.set(self, "exportable", value)
|
426
495
|
|
496
|
+
@property
|
497
|
+
@pulumi.getter(name="hybridKeyTypeEc")
|
498
|
+
def hybrid_key_type_ec(self) -> Optional[pulumi.Input[str]]:
|
499
|
+
"""
|
500
|
+
The elliptic curve algorithm to use for hybrid signatures.
|
501
|
+
Supported key types are `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, and `ed25519`.
|
502
|
+
"""
|
503
|
+
return pulumi.get(self, "hybrid_key_type_ec")
|
504
|
+
|
505
|
+
@hybrid_key_type_ec.setter
|
506
|
+
def hybrid_key_type_ec(self, value: Optional[pulumi.Input[str]]):
|
507
|
+
pulumi.set(self, "hybrid_key_type_ec", value)
|
508
|
+
|
509
|
+
@property
|
510
|
+
@pulumi.getter(name="hybridKeyTypePqc")
|
511
|
+
def hybrid_key_type_pqc(self) -> Optional[pulumi.Input[str]]:
|
512
|
+
"""
|
513
|
+
The post-quantum algorithm to use for hybrid signatures.
|
514
|
+
Currently, ML-DSA is the only supported key type.
|
515
|
+
"""
|
516
|
+
return pulumi.get(self, "hybrid_key_type_pqc")
|
517
|
+
|
518
|
+
@hybrid_key_type_pqc.setter
|
519
|
+
def hybrid_key_type_pqc(self, value: Optional[pulumi.Input[str]]):
|
520
|
+
pulumi.set(self, "hybrid_key_type_pqc", value)
|
521
|
+
|
427
522
|
@property
|
428
523
|
@pulumi.getter(name="keySize")
|
429
524
|
def key_size(self) -> Optional[pulumi.Input[int]]:
|
@@ -525,6 +620,19 @@ class _SecretBackendKeyState:
|
|
525
620
|
def namespace(self, value: Optional[pulumi.Input[str]]):
|
526
621
|
pulumi.set(self, "namespace", value)
|
527
622
|
|
623
|
+
@property
|
624
|
+
@pulumi.getter(name="parameterSet")
|
625
|
+
def parameter_set(self) -> Optional[pulumi.Input[str]]:
|
626
|
+
"""
|
627
|
+
The parameter set to use for ML-DSA. Required for
|
628
|
+
ML-DSA and hybrid keys. Valid values are `44`, `65`, and `87`.
|
629
|
+
"""
|
630
|
+
return pulumi.get(self, "parameter_set")
|
631
|
+
|
632
|
+
@parameter_set.setter
|
633
|
+
def parameter_set(self, value: Optional[pulumi.Input[str]]):
|
634
|
+
pulumi.set(self, "parameter_set", value)
|
635
|
+
|
528
636
|
@property
|
529
637
|
@pulumi.getter(name="supportsDecryption")
|
530
638
|
def supports_decryption(self) -> Optional[pulumi.Input[bool]]:
|
@@ -599,11 +707,14 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
599
707
|
deletion_allowed: Optional[pulumi.Input[bool]] = None,
|
600
708
|
derived: Optional[pulumi.Input[bool]] = None,
|
601
709
|
exportable: Optional[pulumi.Input[bool]] = None,
|
710
|
+
hybrid_key_type_ec: Optional[pulumi.Input[str]] = None,
|
711
|
+
hybrid_key_type_pqc: Optional[pulumi.Input[str]] = None,
|
602
712
|
key_size: Optional[pulumi.Input[int]] = None,
|
603
713
|
min_decryption_version: Optional[pulumi.Input[int]] = None,
|
604
714
|
min_encryption_version: Optional[pulumi.Input[int]] = None,
|
605
715
|
name: Optional[pulumi.Input[str]] = None,
|
606
716
|
namespace: Optional[pulumi.Input[str]] = None,
|
717
|
+
parameter_set: Optional[pulumi.Input[str]] = None,
|
607
718
|
type: Optional[pulumi.Input[str]] = None,
|
608
719
|
__props__=None):
|
609
720
|
"""
|
@@ -645,6 +756,10 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
645
756
|
:param pulumi.Input[bool] deletion_allowed: Specifies if the key is allowed to be deleted.
|
646
757
|
:param pulumi.Input[bool] derived: Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation.
|
647
758
|
:param pulumi.Input[bool] exportable: Enables keys to be exportable. This allows for all valid private keys in the keyring to be exported. Once set, this cannot be disabled.
|
759
|
+
:param pulumi.Input[str] hybrid_key_type_ec: The elliptic curve algorithm to use for hybrid signatures.
|
760
|
+
Supported key types are `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, and `ed25519`.
|
761
|
+
:param pulumi.Input[str] hybrid_key_type_pqc: The post-quantum algorithm to use for hybrid signatures.
|
762
|
+
Currently, ML-DSA is the only supported key type.
|
648
763
|
:param pulumi.Input[int] key_size: The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC, where it must be between 32 and 512 bytes.
|
649
764
|
:param pulumi.Input[int] min_decryption_version: Minimum key version to use for decryption.
|
650
765
|
:param pulumi.Input[int] min_encryption_version: Minimum key version to use for encryption
|
@@ -653,6 +768,8 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
653
768
|
The value should not contain leading or trailing forward slashes.
|
654
769
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
655
770
|
*Available only for Vault Enterprise*.
|
771
|
+
:param pulumi.Input[str] parameter_set: The parameter set to use for ML-DSA. Required for
|
772
|
+
ML-DSA and hybrid keys. Valid values are `44`, `65`, and `87`.
|
656
773
|
:param pulumi.Input[str] type: Specifies the type of key to create. The currently-supported types are: `aes128-gcm96`, `aes256-gcm96` (default), `chacha20-poly1305`, `ed25519`, `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, `hmac`, `rsa-2048`, `rsa-3072` and `rsa-4096`.
|
657
774
|
* Refer to the Vault documentation on transit key types for more information: [Key Types](https://www.vaultproject.io/docs/secrets/transit#key-types)
|
658
775
|
"""
|
@@ -712,11 +829,14 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
712
829
|
deletion_allowed: Optional[pulumi.Input[bool]] = None,
|
713
830
|
derived: Optional[pulumi.Input[bool]] = None,
|
714
831
|
exportable: Optional[pulumi.Input[bool]] = None,
|
832
|
+
hybrid_key_type_ec: Optional[pulumi.Input[str]] = None,
|
833
|
+
hybrid_key_type_pqc: Optional[pulumi.Input[str]] = None,
|
715
834
|
key_size: Optional[pulumi.Input[int]] = None,
|
716
835
|
min_decryption_version: Optional[pulumi.Input[int]] = None,
|
717
836
|
min_encryption_version: Optional[pulumi.Input[int]] = None,
|
718
837
|
name: Optional[pulumi.Input[str]] = None,
|
719
838
|
namespace: Optional[pulumi.Input[str]] = None,
|
839
|
+
parameter_set: Optional[pulumi.Input[str]] = None,
|
720
840
|
type: Optional[pulumi.Input[str]] = None,
|
721
841
|
__props__=None):
|
722
842
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
@@ -736,11 +856,14 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
736
856
|
__props__.__dict__["deletion_allowed"] = deletion_allowed
|
737
857
|
__props__.__dict__["derived"] = derived
|
738
858
|
__props__.__dict__["exportable"] = exportable
|
859
|
+
__props__.__dict__["hybrid_key_type_ec"] = hybrid_key_type_ec
|
860
|
+
__props__.__dict__["hybrid_key_type_pqc"] = hybrid_key_type_pqc
|
739
861
|
__props__.__dict__["key_size"] = key_size
|
740
862
|
__props__.__dict__["min_decryption_version"] = min_decryption_version
|
741
863
|
__props__.__dict__["min_encryption_version"] = min_encryption_version
|
742
864
|
__props__.__dict__["name"] = name
|
743
865
|
__props__.__dict__["namespace"] = namespace
|
866
|
+
__props__.__dict__["parameter_set"] = parameter_set
|
744
867
|
__props__.__dict__["type"] = type
|
745
868
|
__props__.__dict__["keys"] = None
|
746
869
|
__props__.__dict__["latest_version"] = None
|
@@ -766,6 +889,8 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
766
889
|
deletion_allowed: Optional[pulumi.Input[bool]] = None,
|
767
890
|
derived: Optional[pulumi.Input[bool]] = None,
|
768
891
|
exportable: Optional[pulumi.Input[bool]] = None,
|
892
|
+
hybrid_key_type_ec: Optional[pulumi.Input[str]] = None,
|
893
|
+
hybrid_key_type_pqc: Optional[pulumi.Input[str]] = None,
|
769
894
|
key_size: Optional[pulumi.Input[int]] = None,
|
770
895
|
keys: Optional[pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[str]]]]]] = None,
|
771
896
|
latest_version: Optional[pulumi.Input[int]] = None,
|
@@ -774,6 +899,7 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
774
899
|
min_encryption_version: Optional[pulumi.Input[int]] = None,
|
775
900
|
name: Optional[pulumi.Input[str]] = None,
|
776
901
|
namespace: Optional[pulumi.Input[str]] = None,
|
902
|
+
parameter_set: Optional[pulumi.Input[str]] = None,
|
777
903
|
supports_decryption: Optional[pulumi.Input[bool]] = None,
|
778
904
|
supports_derivation: Optional[pulumi.Input[bool]] = None,
|
779
905
|
supports_encryption: Optional[pulumi.Input[bool]] = None,
|
@@ -795,6 +921,10 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
795
921
|
:param pulumi.Input[bool] deletion_allowed: Specifies if the key is allowed to be deleted.
|
796
922
|
:param pulumi.Input[bool] derived: Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation.
|
797
923
|
:param pulumi.Input[bool] exportable: Enables keys to be exportable. This allows for all valid private keys in the keyring to be exported. Once set, this cannot be disabled.
|
924
|
+
:param pulumi.Input[str] hybrid_key_type_ec: The elliptic curve algorithm to use for hybrid signatures.
|
925
|
+
Supported key types are `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, and `ed25519`.
|
926
|
+
:param pulumi.Input[str] hybrid_key_type_pqc: The post-quantum algorithm to use for hybrid signatures.
|
927
|
+
Currently, ML-DSA is the only supported key type.
|
798
928
|
:param pulumi.Input[int] key_size: The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC, where it must be between 32 and 512 bytes.
|
799
929
|
:param pulumi.Input[Sequence[pulumi.Input[Mapping[str, pulumi.Input[str]]]]] keys: List of key versions in the keyring. This attribute is zero-indexed and will contain a map of values depending on the `type` of the encryption key.
|
800
930
|
* for key types `aes128-gcm96`, `aes256-gcm96` and `chacha20-poly1305`, each key version will be a map of a single value `id` which is just a hash of the key's metadata.
|
@@ -808,6 +938,8 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
808
938
|
The value should not contain leading or trailing forward slashes.
|
809
939
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
810
940
|
*Available only for Vault Enterprise*.
|
941
|
+
:param pulumi.Input[str] parameter_set: The parameter set to use for ML-DSA. Required for
|
942
|
+
ML-DSA and hybrid keys. Valid values are `44`, `65`, and `87`.
|
811
943
|
:param pulumi.Input[bool] supports_decryption: Whether or not the key supports decryption, based on key type.
|
812
944
|
:param pulumi.Input[bool] supports_derivation: Whether or not the key supports derivation, based on key type.
|
813
945
|
:param pulumi.Input[bool] supports_encryption: Whether or not the key supports encryption, based on key type.
|
@@ -826,6 +958,8 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
826
958
|
__props__.__dict__["deletion_allowed"] = deletion_allowed
|
827
959
|
__props__.__dict__["derived"] = derived
|
828
960
|
__props__.__dict__["exportable"] = exportable
|
961
|
+
__props__.__dict__["hybrid_key_type_ec"] = hybrid_key_type_ec
|
962
|
+
__props__.__dict__["hybrid_key_type_pqc"] = hybrid_key_type_pqc
|
829
963
|
__props__.__dict__["key_size"] = key_size
|
830
964
|
__props__.__dict__["keys"] = keys
|
831
965
|
__props__.__dict__["latest_version"] = latest_version
|
@@ -834,6 +968,7 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
834
968
|
__props__.__dict__["min_encryption_version"] = min_encryption_version
|
835
969
|
__props__.__dict__["name"] = name
|
836
970
|
__props__.__dict__["namespace"] = namespace
|
971
|
+
__props__.__dict__["parameter_set"] = parameter_set
|
837
972
|
__props__.__dict__["supports_decryption"] = supports_decryption
|
838
973
|
__props__.__dict__["supports_derivation"] = supports_derivation
|
839
974
|
__props__.__dict__["supports_encryption"] = supports_encryption
|
@@ -899,6 +1034,24 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
899
1034
|
"""
|
900
1035
|
return pulumi.get(self, "exportable")
|
901
1036
|
|
1037
|
+
@property
|
1038
|
+
@pulumi.getter(name="hybridKeyTypeEc")
|
1039
|
+
def hybrid_key_type_ec(self) -> pulumi.Output[Optional[str]]:
|
1040
|
+
"""
|
1041
|
+
The elliptic curve algorithm to use for hybrid signatures.
|
1042
|
+
Supported key types are `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, and `ed25519`.
|
1043
|
+
"""
|
1044
|
+
return pulumi.get(self, "hybrid_key_type_ec")
|
1045
|
+
|
1046
|
+
@property
|
1047
|
+
@pulumi.getter(name="hybridKeyTypePqc")
|
1048
|
+
def hybrid_key_type_pqc(self) -> pulumi.Output[Optional[str]]:
|
1049
|
+
"""
|
1050
|
+
The post-quantum algorithm to use for hybrid signatures.
|
1051
|
+
Currently, ML-DSA is the only supported key type.
|
1052
|
+
"""
|
1053
|
+
return pulumi.get(self, "hybrid_key_type_pqc")
|
1054
|
+
|
902
1055
|
@property
|
903
1056
|
@pulumi.getter(name="keySize")
|
904
1057
|
def key_size(self) -> pulumi.Output[Optional[int]]:
|
@@ -968,6 +1121,15 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
968
1121
|
"""
|
969
1122
|
return pulumi.get(self, "namespace")
|
970
1123
|
|
1124
|
+
@property
|
1125
|
+
@pulumi.getter(name="parameterSet")
|
1126
|
+
def parameter_set(self) -> pulumi.Output[Optional[str]]:
|
1127
|
+
"""
|
1128
|
+
The parameter set to use for ML-DSA. Required for
|
1129
|
+
ML-DSA and hybrid keys. Valid values are `44`, `65`, and `87`.
|
1130
|
+
"""
|
1131
|
+
return pulumi.get(self, "parameter_set")
|
1132
|
+
|
971
1133
|
@property
|
972
1134
|
@pulumi.getter(name="supportsDecryption")
|
973
1135
|
def supports_decryption(self) -> pulumi.Output[bool]:
|
@@ -1,4 +1,4 @@
|
|
1
|
-
pulumi_vault/__init__.py,sha256=
|
1
|
+
pulumi_vault/__init__.py,sha256=H4BNLPHa_ivLIK7aPn5xpy_584Tds2BvFtKMfql1EtU,32403
|
2
2
|
pulumi_vault/_inputs.py,sha256=SF9ssDW-1LueES-snz-lfjgpbVI0bldHW0yL4qeh7N0,92747
|
3
3
|
pulumi_vault/_utilities.py,sha256=yyuODPikZ9pto3JWJRfMJo98dWmQ5_y45-TVcZG_K8Y,10807
|
4
4
|
pulumi_vault/audit.py,sha256=qeLdEPUPWtIcJsnba2V6_uicJEVC5yMvwSLZi0DSqWw,20517
|
@@ -27,7 +27,7 @@ pulumi_vault/plugin.py,sha256=wsHI-O03QoIMQB4ni-MOBjXNz2xloYRHiqx9mk5dZq8,23656
|
|
27
27
|
pulumi_vault/plugin_pinned_version.py,sha256=FRBwnJxAYtleO9MoM2juvwBpCk-Um-hmELLAj7kJvLo,10757
|
28
28
|
pulumi_vault/policy.py,sha256=jhgtVabSBI5Z69EXKUJxlidTsNLzN-A9NsKkbnGX8n8,11109
|
29
29
|
pulumi_vault/provider.py,sha256=KnBSEL3D7S8eRWQlc-oOGh1lKqtrPnQbdpPwfQdYZxg,42800
|
30
|
-
pulumi_vault/pulumi-plugin.json,sha256=
|
30
|
+
pulumi_vault/pulumi-plugin.json,sha256=WrdxAIb0S1rd48g8jZ-HN0bM9zhkfR-v5WSml8ABAjU,81
|
31
31
|
pulumi_vault/py.typed,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
32
32
|
pulumi_vault/quota_lease_count.py,sha256=KkTKOgxZwkjLgFMKK1zy4qD7VMxKPahIs1E6EQkMxT8,25072
|
33
33
|
pulumi_vault/quota_rate_limit.py,sha256=5XXedC8Orsgqq0LSHMaW-J_d0ht9Th_Hr7h8BSOC_Ik,29677
|
@@ -49,7 +49,7 @@ pulumi_vault/approle/auth_backend_role_secret_id.py,sha256=VGTmnQE9I1PNHChtZh3ST
|
|
49
49
|
pulumi_vault/approle/get_auth_backend_role_id.py,sha256=_SSpvnF6FdGAHNl0eXxVB1zertlumwuE0Ol4lHeBLzQ,6633
|
50
50
|
pulumi_vault/aws/__init__.py,sha256=0IbkDTvlbFtL-UyRoqQHLIxCm5ZVs-KOodxg9WO46tI,805
|
51
51
|
pulumi_vault/aws/auth_backend_cert.py,sha256=4NSx3vBR2dOUcwOSVxH9gbWkJjCEeN5QYngb6LfpPtI,18543
|
52
|
-
pulumi_vault/aws/auth_backend_client.py,sha256=
|
52
|
+
pulumi_vault/aws/auth_backend_client.py,sha256=m8yUtkHiOoe02ZHB3KuDfgK_mUcFBrVk6EtyGW-c0zE,58384
|
53
53
|
pulumi_vault/aws/auth_backend_config_identity.py,sha256=70bblHD2V3Tx9hYA2NhToPRE9aIhyXeSKebC7uA0Dq0,23306
|
54
54
|
pulumi_vault/aws/auth_backend_identity_whitelist.py,sha256=7RwYcQMkpHPe-kNLYWd8jL2TWzG8aEfaivoFSGAh8oo,17114
|
55
55
|
pulumi_vault/aws/auth_backend_login.py,sha256=yq2ujRVX4WrHH7YuhsTpPxZxTKi4VzgCzdW8FsCZ3KA,42767
|
@@ -59,14 +59,14 @@ pulumi_vault/aws/auth_backend_roletag_blacklist.py,sha256=d6OxN_pjgLpw_Zzm5d21PY
|
|
59
59
|
pulumi_vault/aws/auth_backend_sts_role.py,sha256=VRn2perU4FIlmaxWyFkN6kJb7WNMFVB0PVw4sYCBkKU,18218
|
60
60
|
pulumi_vault/aws/get_access_credentials.py,sha256=zQrWdGYD3yeddCvIID1X7qflXwX3xyDS9cYWUAs1SRg,13831
|
61
61
|
pulumi_vault/aws/get_static_access_credentials.py,sha256=tlKvd3yYt58urxZnQe9LPaE0DVW8c_soJcCcV9VJgvA,5660
|
62
|
-
pulumi_vault/aws/secret_backend.py,sha256
|
62
|
+
pulumi_vault/aws/secret_backend.py,sha256=jy19J0FtJTp98zl9Bz0YJk8c7HoqCOMRnHoVjVGnwIc,71246
|
63
63
|
pulumi_vault/aws/secret_backend_role.py,sha256=d8TJj99dXlj9yIBr3hUx8WuV5meBLgCetakaOF5AQ_0,56898
|
64
|
-
pulumi_vault/aws/secret_backend_static_role.py,sha256=
|
64
|
+
pulumi_vault/aws/secret_backend_static_role.py,sha256=pdUz2ro2bVxvbAdmZ4kd-dcDxbxskL5Z6f8Bjj0VZn8,29558
|
65
65
|
pulumi_vault/azure/__init__.py,sha256=Ip6GcRxEn43qDXL93F4Jm2uYqW7HJlPK_dg1WrfwXBg,471
|
66
66
|
pulumi_vault/azure/_inputs.py,sha256=NKp_c7kssHigrXAcE3rImbVnjFbVsknqqRA-cRS4aJU,3328
|
67
|
-
pulumi_vault/azure/auth_backend_config.py,sha256=
|
67
|
+
pulumi_vault/azure/auth_backend_config.py,sha256=siumw8VjEPnbi3hRiTprTEJHsoP8K9gRRnXa7tKElI8,44936
|
68
68
|
pulumi_vault/azure/auth_backend_role.py,sha256=474skCd5OlVplAhOEk6r8KohjRl1ryGpWjo2MIQyNho,54886
|
69
|
-
pulumi_vault/azure/backend.py,sha256=
|
69
|
+
pulumi_vault/azure/backend.py,sha256=Z-N0rp4g21Ln29v-IUnK19O5bHsBTHEEJo1n0OeMjc8,54628
|
70
70
|
pulumi_vault/azure/backend_role.py,sha256=vcwCtPQ5nfsqGHD9gWMaYjyyxxsBjh0h3UEshBhwqSw,39345
|
71
71
|
pulumi_vault/azure/get_access_credentials.py,sha256=PuMGCuFzSh_V6q20SeUYlAOu49-lDbxZmTs8z6SJDw8,19874
|
72
72
|
pulumi_vault/azure/outputs.py,sha256=WE8XiyjS-7U3e2NzKHkRwRcI9WWg8nIvgkr1QaVVhsk,3271
|
@@ -80,19 +80,19 @@ pulumi_vault/consul/__init__.py,sha256=MYNOUNqNi49Gsivdn3pOzEa_z-y9NF69sasXX1K0Y
|
|
80
80
|
pulumi_vault/consul/secret_backend.py,sha256=zBN37oAaROpMYqQaK7OZdBRNUi84kAFGYnkUoBwMNlY,39690
|
81
81
|
pulumi_vault/consul/secret_backend_role.py,sha256=CSEWiICBmW3uQogwVPyP9WIws_eGNwd7uHbk4UzJQ1I,41693
|
82
82
|
pulumi_vault/database/__init__.py,sha256=tYq_SkLBBJ3LzcjTNj5KSt92p2t595IcZ_5Qbe-Gz2g,461
|
83
|
-
pulumi_vault/database/_inputs.py,sha256=
|
84
|
-
pulumi_vault/database/outputs.py,sha256=
|
85
|
-
pulumi_vault/database/secret_backend_connection.py,sha256=
|
83
|
+
pulumi_vault/database/_inputs.py,sha256=OHSH7aJ75VYvg_uAQxNV9WbokIRC2gkl0sWvwReb3VE,466934
|
84
|
+
pulumi_vault/database/outputs.py,sha256=f-a3zPenrKR2lkJ2Ie-dIFXWdwUSz3wTkYpEXasXqkU,325427
|
85
|
+
pulumi_vault/database/secret_backend_connection.py,sha256=6cmCZABkPHJ7pdu6KFnnpgQOlULGoUuZOrLwM86a-k0,89585
|
86
86
|
pulumi_vault/database/secret_backend_role.py,sha256=YmjmE13qoDWAr-yx35z-KqWtWELW2n6sGeQP5ALsBVU,37120
|
87
|
-
pulumi_vault/database/secret_backend_static_role.py,sha256=
|
88
|
-
pulumi_vault/database/secrets_mount.py,sha256=
|
87
|
+
pulumi_vault/database/secret_backend_static_role.py,sha256=ok3JfmEmZnL60HSmfAgaLwF3ywfwbNCebs9lGj-bqdA,42349
|
88
|
+
pulumi_vault/database/secrets_mount.py,sha256=g8Glpmd7PwH6n9j8YcBR0VIFNScPLD3v9lYOmLMOtLM,116322
|
89
89
|
pulumi_vault/gcp/__init__.py,sha256=C0xixHwpaTovKTJEMFd1P6NitNgdlYCfCFY4aPbbI68,552
|
90
90
|
pulumi_vault/gcp/_inputs.py,sha256=A1yy646oZMUGISk5eKIC__TEALrxQEVmpitBEHTjfm8,19371
|
91
|
-
pulumi_vault/gcp/auth_backend.py,sha256=
|
91
|
+
pulumi_vault/gcp/auth_backend.py,sha256=maK1BpmC0WP-YWpywnrw9RqDoINAkAeCt3bsJAT9uMs,64677
|
92
92
|
pulumi_vault/gcp/auth_backend_role.py,sha256=LAYTOyebBXUZgNeJtdNrD4IlvfSZ-eFzwXeo3N5ADCk,52082
|
93
93
|
pulumi_vault/gcp/get_auth_backend_role.py,sha256=Sowwer06mHmweprbO55wW3kbRNOa_0faX8yDY1-MlZk,25162
|
94
94
|
pulumi_vault/gcp/outputs.py,sha256=Q6iSAQpe5--YJo3Pn32PZj_5isdTOYkETk7z7Z3RwSE,12787
|
95
|
-
pulumi_vault/gcp/secret_backend.py,sha256=
|
95
|
+
pulumi_vault/gcp/secret_backend.py,sha256=CpvY9Bs-nVrJqMAJb1mA2Lfuc1Ao0AjqRXFmn3kPU9g,54227
|
96
96
|
pulumi_vault/gcp/secret_impersonated_account.py,sha256=PSi1gZTlenIdUFOoX-4GKqeDsdeAc5ndhfGW2ZFO8Jk,21784
|
97
97
|
pulumi_vault/gcp/secret_roleset.py,sha256=hHjmfw-kgGckWtdR_WtiNqieLSjAKrSTnBR4to6ZFAU,26190
|
98
98
|
pulumi_vault/gcp/secret_static_account.py,sha256=MtvjrJwcSooLDgpHwgFFNyjp9F5qFclRo7Nv_dE4wQE,27512
|
@@ -163,12 +163,12 @@ pulumi_vault/kv/secret.py,sha256=MU8yHTIaNqcLNDPPyuVmFIF_q4Z0PXdxuxKaly8EPNw,161
|
|
163
163
|
pulumi_vault/kv/secret_backend_v2.py,sha256=shCYHPEEBHSDWYU7N29ZDgI8MGuO7MNG2Y5Mq-7P4D4,19153
|
164
164
|
pulumi_vault/kv/secret_v2.py,sha256=KvGcWr_lD23GxTGMwtozsw_V3ctlLQv1Hnihce4I3Jw,36412
|
165
165
|
pulumi_vault/ldap/__init__.py,sha256=mNTQURo6CGBFeZf13WaYyNlRpXZzyME5qGhHrVfgLeM,598
|
166
|
-
pulumi_vault/ldap/auth_backend.py,sha256=
|
166
|
+
pulumi_vault/ldap/auth_backend.py,sha256=3oARM3pEXlqkptM9JIfg3H7QYgBxzVeN6vMxA5aZWQU,100892
|
167
167
|
pulumi_vault/ldap/auth_backend_group.py,sha256=4z-rRE9dOlqPBsTgUTq5bmua-__d1Fk0Yp2IQ58NqNs,16595
|
168
168
|
pulumi_vault/ldap/auth_backend_user.py,sha256=aF14zwPkSrTKNpH_6xN4I0SGlKNLCy99I5xPibKDtbg,18663
|
169
169
|
pulumi_vault/ldap/get_dynamic_credentials.py,sha256=AV3acrBEpgRTTJIiYC3x9dYgrgoWGQmZ9WcM_FRAG4U,7711
|
170
170
|
pulumi_vault/ldap/get_static_credentials.py,sha256=oBbC8C-xGLdO9a9IvrSOtlTNB_Qnsq1LwdI-PSK4w64,7926
|
171
|
-
pulumi_vault/ldap/secret_backend.py,sha256=
|
171
|
+
pulumi_vault/ldap/secret_backend.py,sha256=4E4FlRH4tXzZ8MyXnzXBpSXKCJyXxt9TiTOY8mYD66E,106715
|
172
172
|
pulumi_vault/ldap/secret_backend_dynamic_role.py,sha256=6bxRbjAaWpHMxMXUZwWznpu_RM6AGOLndfXpKYnO7LM,37971
|
173
173
|
pulumi_vault/ldap/secret_backend_library_set.py,sha256=7VBGCIjEcrPEY_Pg73XQjDJFsiZW-1dWFoZCzu3Eiqg,24102
|
174
174
|
pulumi_vault/ldap/secret_backend_static_role.py,sha256=KuzZv_EP1K0QuTuBeATNqmL5up1WLJYQyDFJKoZvaGM,24149
|
@@ -185,33 +185,35 @@ pulumi_vault/okta/auth_backend.py,sha256=CuQ7-ySllNKdmRJfR1U1_IxIAkXNKKO0tBe552O
|
|
185
185
|
pulumi_vault/okta/auth_backend_group.py,sha256=_-yxuKaRFmGsE1AX7rTXeDLceU5cyoVJL2jeKm5eTCc,15149
|
186
186
|
pulumi_vault/okta/auth_backend_user.py,sha256=RAQAgkbKikMwgl-eYhKfADahKxuKM-S8fvqv3f2vSFs,17111
|
187
187
|
pulumi_vault/okta/outputs.py,sha256=9oSrWhhmR6ZGu_sdE6Ba46T2IW8w-nLUlZB-5pmg6uk,3241
|
188
|
-
pulumi_vault/pkisecret/__init__.py,sha256=
|
189
|
-
pulumi_vault/pkisecret/_inputs.py,sha256=
|
188
|
+
pulumi_vault/pkisecret/__init__.py,sha256=wx54Eywbq4-Ngs-KONYBslFtn19ANzF3fYYIHWZJsRY,1327
|
189
|
+
pulumi_vault/pkisecret/_inputs.py,sha256=FSvpEh9AEe42f2wF8tt8_yzgkhO7je2SGuUhPDewop0,6238
|
190
190
|
pulumi_vault/pkisecret/backend_acme_eab.py,sha256=DJntVKxVJpxN7UISOINTpnEZAuSopKK0qyxyYcy86po,24256
|
191
|
-
pulumi_vault/pkisecret/backend_config_acme.py,sha256=
|
191
|
+
pulumi_vault/pkisecret/backend_config_acme.py,sha256=IEFJRIisJ3itO-8EuJY7wcUtqB2J5dts7WhvAKapBTY,32598
|
192
|
+
pulumi_vault/pkisecret/backend_config_auto_tidy.py,sha256=l3Nns1ZqyNga63y0kLcq5qJ5F9ZYGc7ZAdOT8bVrpH4,72044
|
192
193
|
pulumi_vault/pkisecret/backend_config_cluster.py,sha256=HZKD0_RG3InjJ5KMDhJjVe3v8KNkPo3Wh_8OclZU1vY,16103
|
193
|
-
pulumi_vault/pkisecret/backend_config_cmpv2.py,sha256=
|
194
|
+
pulumi_vault/pkisecret/backend_config_cmpv2.py,sha256=k0eK4eJRjnqNXovVvjjMaJREW1CGrn6a_yaBawAe88M,28734
|
194
195
|
pulumi_vault/pkisecret/backend_config_est.py,sha256=-QFenquNdyHCi-YJJeGnq1o3iQRpfVhI1pWQ1oelsz4,32920
|
195
|
-
pulumi_vault/pkisecret/
|
196
|
+
pulumi_vault/pkisecret/get_backend_cert_metadata.py,sha256=3SL8V1ojx6K9bKuAkjIjaUhs4ruxn8PsAJkP6JRg5lU,10925
|
197
|
+
pulumi_vault/pkisecret/get_backend_config_cmpv2.py,sha256=65Sz2y7hxOZyXwuk1RGHJNal7TVTZ7PmWtLCcpHJN2w,10112
|
196
198
|
pulumi_vault/pkisecret/get_backend_config_est.py,sha256=hQE-leiO65lno8u5_6ektO-c6pfP6xOu7VbmGtGsVas,11158
|
197
|
-
pulumi_vault/pkisecret/get_backend_issuer.py,sha256=
|
199
|
+
pulumi_vault/pkisecret/get_backend_issuer.py,sha256=lkjRAsU2wUbUJAvOe1RSlm2GPP1BkLIBz2CkLfDFgPc,18914
|
198
200
|
pulumi_vault/pkisecret/get_backend_issuers.py,sha256=6jL0FCtQbDRA5HSifYQpDtOaSAyFQoCXwCD3K7GSq70,7270
|
199
201
|
pulumi_vault/pkisecret/get_backend_key.py,sha256=DSl9s_XhYVGFKoa9fJFKV8n6ZTvRk4FkE6OM0DaEhM4,7870
|
200
202
|
pulumi_vault/pkisecret/get_backend_keys.py,sha256=VVDFkEN0xgHSkj7KTl0Pi0CIEmrrAocOkMXs_whZ148,7166
|
201
|
-
pulumi_vault/pkisecret/outputs.py,sha256=
|
202
|
-
pulumi_vault/pkisecret/secret_backend_cert.py,sha256=
|
203
|
+
pulumi_vault/pkisecret/outputs.py,sha256=tMdEb0KRb7hdmPyNzZRthYa1ceZV4ef6HKOqt_N17OM,5281
|
204
|
+
pulumi_vault/pkisecret/secret_backend_cert.py,sha256=ibPqA__h2ST6M4fTwdUhliRvDcqSytAWoolZLnRkdwU,59550
|
203
205
|
pulumi_vault/pkisecret/secret_backend_config_ca.py,sha256=8M1BLNtbvoV-MNuK-3VWGwJAjyn67KOQsvSgeXOpt1Y,19132
|
204
206
|
pulumi_vault/pkisecret/secret_backend_config_issuers.py,sha256=Uo-dgOdMyI4P4C0wG0GEQhwJGWpmpXuHkoiYceunDjM,17152
|
205
207
|
pulumi_vault/pkisecret/secret_backend_config_urls.py,sha256=7SwlJk7GPF73siCyMv-gEjWAfHh3JbYhvSKVJOdfG10,22217
|
206
|
-
pulumi_vault/pkisecret/secret_backend_crl_config.py,sha256=
|
207
|
-
pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py,sha256=
|
208
|
+
pulumi_vault/pkisecret/secret_backend_crl_config.py,sha256=xemqxNlSiSOfkRruCSID3FPsvw7QVHYStEyIvLpqlpY,40217
|
209
|
+
pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py,sha256=BrCjSehl4zUfbF5Lr2klTpCBd6SjgJofVa8WRruoqAA,68504
|
208
210
|
pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py,sha256=lFkhI8pO0pR-skKGjMpv2lDxaCQGKTgxO52eTCOsLyI,20222
|
209
|
-
pulumi_vault/pkisecret/secret_backend_issuer.py,sha256=
|
211
|
+
pulumi_vault/pkisecret/secret_backend_issuer.py,sha256=FRXnJftWkoMlvPKBw4nMD_vUSL_bpMfX2zsSmHfF1NM,52608
|
210
212
|
pulumi_vault/pkisecret/secret_backend_key.py,sha256=nD5V_mXwHh_sTZ2N0Zk33M1_wbOHJ5NLlkp-Bb66vGc,25697
|
211
|
-
pulumi_vault/pkisecret/secret_backend_role.py,sha256=
|
212
|
-
pulumi_vault/pkisecret/secret_backend_root_cert.py,sha256=
|
213
|
-
pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py,sha256=
|
214
|
-
pulumi_vault/pkisecret/secret_backend_sign.py,sha256=
|
213
|
+
pulumi_vault/pkisecret/secret_backend_role.py,sha256=kxDXnfRAU7aI24x2cABeyK1kasSOo1QWgIkYuXkJrGM,136516
|
214
|
+
pulumi_vault/pkisecret/secret_backend_root_cert.py,sha256=OQPQnbVuXLa1k4Gn1FH5dU2lt2lI98Rd8ezBRD9a_vQ,95518
|
215
|
+
pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py,sha256=0jom0Wh5J1IDnNUHOPHidOywVUaz38A5Aiec0J2aTVs,92117
|
216
|
+
pulumi_vault/pkisecret/secret_backend_sign.py,sha256=0wX6vZU5yrUBebP9KUaqPwnpl0uFx72gTkW2djqT-mo,55014
|
215
217
|
pulumi_vault/rabbitmq/__init__.py,sha256=8QnL4OBf123TwWNwxgf2zSsJVPuTixNLywif1gW1yII,379
|
216
218
|
pulumi_vault/rabbitmq/_inputs.py,sha256=Hqm9EtPpi6AzuypE9QhSOQBX935HMgCWmsjZ9u-d-BM,7068
|
217
219
|
pulumi_vault/rabbitmq/outputs.py,sha256=cQ8s92UdRnG86OWYbsFGGqsXw5dBb1fqLoBwo65owmk,4027
|
@@ -231,15 +233,16 @@ pulumi_vault/secrets/sync_gcp_destination.py,sha256=tlwd3IesJNcL8vKwwuqVd5Or2WD5
|
|
231
233
|
pulumi_vault/secrets/sync_gh_destination.py,sha256=Q7t2zA3ZdiiWRbaZfTEjgL8iNtgsxvcs2CLxXQG59m0,32351
|
232
234
|
pulumi_vault/secrets/sync_github_apps.py,sha256=Uhrzcm573DH6fpJYv4tMCv8BMdhQe2jahd-BQdMUFRc,15378
|
233
235
|
pulumi_vault/secrets/sync_vercel_destination.py,sha256=kaxUCmNcuFXJcFp8gs04ZDQbPtWOLepcT4vvbbrUeuE,26822
|
234
|
-
pulumi_vault/ssh/__init__.py,sha256=
|
236
|
+
pulumi_vault/ssh/__init__.py,sha256=NccXESbmubRMPEZDpobAyrwFJDqkqeQcWC-7Et8tCuI,421
|
235
237
|
pulumi_vault/ssh/_inputs.py,sha256=vz1nSJIjKJykgA6R44j7XrcbT2SYkfUGYOK-hKFdxRw,2585
|
238
|
+
pulumi_vault/ssh/get_secret_backend_sign.py,sha256=64iNyWkJhlNObSOJure1CprFijg9sYennkmXC-s3OrY,14928
|
236
239
|
pulumi_vault/ssh/outputs.py,sha256=-c6dDRsAT71gVJZhORGeJrFwpsIORqhlph6787TGY9U,1620
|
237
240
|
pulumi_vault/ssh/secret_backend_ca.py,sha256=WzqOAfDQe3LnXVysRf-kCny0qlH4-bXwQl83_kTrdPA,22649
|
238
241
|
pulumi_vault/ssh/secret_backend_role.py,sha256=PueW8PuPDoQNfsT8G_M9u9di5GnAn8WEPu1NBGeM5zw,76446
|
239
242
|
pulumi_vault/terraformcloud/__init__.py,sha256=sNst-XlgbdicqCgFwaD4FZQ1Qbpf3mMh6Q5Fn1J4Arg,354
|
240
243
|
pulumi_vault/terraformcloud/secret_backend.py,sha256=nWrPaMGfgDWHl8ykHEti8TezastFmgNOqo6F-3gSdMg,23451
|
241
244
|
pulumi_vault/terraformcloud/secret_creds.py,sha256=BANYfjsHHem66Wx6o2_HLWSLNwKS89IJyepFf_E8duU,18041
|
242
|
-
pulumi_vault/terraformcloud/secret_role.py,sha256=
|
245
|
+
pulumi_vault/terraformcloud/secret_role.py,sha256=Qo-xIjy0eYPIZ6lUvrm7NafA9vQZLAPzzjtm_DvvsfM,19063
|
243
246
|
pulumi_vault/tokenauth/__init__.py,sha256=uj-EJDeysMWfUsv2u4NII_tnIzZFXkTcEpYvGpEjotk,302
|
244
247
|
pulumi_vault/tokenauth/auth_backend_role.py,sha256=QgRUazwsOXEh1uLuoRIvfm_aaPtjimZx9vXQ18C_7dI,51384
|
245
248
|
pulumi_vault/transform/__init__.py,sha256=cywOzL5fbNIQ8v8Wb5KHP7zIxlbdiilO6z2JyG2gYLw,419
|
@@ -249,12 +252,14 @@ pulumi_vault/transform/get_encode.py,sha256=w8_P9Egg5mN9VmxBcixugadl1fPaTBlnnjxb
|
|
249
252
|
pulumi_vault/transform/role.py,sha256=cEo6rdqD4wvQiyfIReFCdxWP6uYLnfLVXw3ZYn9-ryc,14586
|
250
253
|
pulumi_vault/transform/template.py,sha256=wyvZYtj3r6PwKAvODSbSY9VWobe-0hrlAbxMQS_HDZU,25955
|
251
254
|
pulumi_vault/transform/transformation.py,sha256=xEU2nKRjINTWN93L71GPJ5eaq_j6BEboK4QN1jYXJUg,26798
|
252
|
-
pulumi_vault/transit/__init__.py,sha256=
|
255
|
+
pulumi_vault/transit/__init__.py,sha256=doUJo-f0xLwCaPWSmNDVW0PDdK6wED5KlQ4HxdQejQE,442
|
253
256
|
pulumi_vault/transit/get_decrypt.py,sha256=I0XLtE5HqX4WULOf80wK9dJFf_J9jBLrzn-A5RIJAyg,6625
|
254
257
|
pulumi_vault/transit/get_encrypt.py,sha256=yP6ftK53qWzA1_dl_B3skv6UsnZUROpVrC7Kc24PvUw,6809
|
255
|
-
pulumi_vault/transit/
|
258
|
+
pulumi_vault/transit/get_sign.py,sha256=HxEJpVPjWjgQzTeW7QAocETtMo50sZETHFZJUh8tjU4,14419
|
259
|
+
pulumi_vault/transit/get_verify.py,sha256=oARRAe1BO80ki2UX_n_8LoFlTU6Ogk2bIqMvJ-oqrOY,15601
|
260
|
+
pulumi_vault/transit/secret_backend_key.py,sha256=akLF2zbKOePAGb8pz23Q5wo307OjKs9eWfXLkzbDZiE,61862
|
256
261
|
pulumi_vault/transit/secret_cache_config.py,sha256=Ya9l81qmQuwTpXGKfPVB38ecb0OghkQPc9Qz6rrbzD8,12657
|
257
|
-
pulumi_vault-6.6.
|
258
|
-
pulumi_vault-6.6.
|
259
|
-
pulumi_vault-6.6.
|
260
|
-
pulumi_vault-6.6.
|
262
|
+
pulumi_vault-6.6.0a1741836364.dist-info/METADATA,sha256=dIa6yAEXSL5y_wRvVYvryldnp5NOAZk-vjaCoynnEhI,4923
|
263
|
+
pulumi_vault-6.6.0a1741836364.dist-info/WHEEL,sha256=52BFRY2Up02UkjOa29eZOS2VxUrpPORXg1pkohGGUS8,91
|
264
|
+
pulumi_vault-6.6.0a1741836364.dist-info/top_level.txt,sha256=J7lAGvfexHc6T1EpDBGNKF0SXWURpmUhyzi9Nr5I61w,13
|
265
|
+
pulumi_vault-6.6.0a1741836364.dist-info/RECORD,,
|
{pulumi_vault-6.6.0a1741415971.dist-info → pulumi_vault-6.6.0a1741836364.dist-info}/top_level.txt
RENAMED
File without changes
|