pulumi-vault 7.2.0a1755297899__py3-none-any.whl → 7.2.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +18 -0
- pulumi_vault/_inputs.py +201 -0
- pulumi_vault/aws/secret_backend.py +627 -49
- pulumi_vault/azure/backend.py +788 -15
- pulumi_vault/consul/secret_backend.py +660 -28
- pulumi_vault/database/secrets_mount.py +47 -0
- pulumi_vault/gcp/secret_backend.py +599 -56
- pulumi_vault/jwt/auth_backend.py +47 -0
- pulumi_vault/kmip/secret_backend.py +787 -7
- pulumi_vault/kubernetes/secret_backend.py +47 -0
- pulumi_vault/ldap/secret_backend.py +75 -35
- pulumi_vault/mount.py +47 -0
- pulumi_vault/nomad_secret_backend.py +660 -21
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/outputs.py +153 -0
- pulumi_vault/pkisecret/backend_config_scep.py +68 -21
- pulumi_vault/pkisecret/get_backend_config_scep.py +21 -1
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/rabbitmq/secret_backend.py +707 -35
- pulumi_vault/ssh/secret_backend_ca.py +101 -7
- pulumi_vault/terraformcloud/secret_backend.py +707 -28
- pulumi_vault/transit/secret_backend_key.py +49 -21
- {pulumi_vault-7.2.0a1755297899.dist-info → pulumi_vault-7.2.1.dist-info}/METADATA +1 -1
- {pulumi_vault-7.2.0a1755297899.dist-info → pulumi_vault-7.2.1.dist-info}/RECORD +27 -25
- {pulumi_vault-7.2.0a1755297899.dist-info → pulumi_vault-7.2.1.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1755297899.dist-info → pulumi_vault-7.2.1.dist-info}/top_level.txt +0 -0
@@ -58,9 +58,13 @@ class SecretBackendKeyArgs:
|
|
58
58
|
The value should not contain leading or trailing forward slashes.
|
59
59
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
60
60
|
*Available only for Vault Enterprise*.
|
61
|
-
:param pulumi.Input[_builtins.str] parameter_set: The parameter set to use for ML-DSA. Required for
|
62
|
-
ML-DSA and
|
63
|
-
|
61
|
+
:param pulumi.Input[_builtins.str] parameter_set: The parameter set to use for ML-DSA or SLH-DSA. Required for
|
62
|
+
ML-DSA, hybrid, and SLH-DSA keys.
|
63
|
+
Valid values for ML-DSA are `44`, `65`, and `87`.
|
64
|
+
Valid values for SLH-DSA are `slh-dsa-sha2-128s`, `slh-dsa-shake-128s`, `slh-dsa-sha2-128f`, `slh-dsa-shake-128`, `slh-dsa-sha2-192s`,
|
65
|
+
`slh-dsa-shake-192s`, `slh-dsa-sha2-192f`, `slh-dsa-shake-192f`, `slh-dsa-sha2-256s`, `slh-dsa-shake-256s`,
|
66
|
+
`slh-dsa-sha2-256f`, and `slh-dsa-shake-256f`.
|
67
|
+
:param pulumi.Input[_builtins.str] type: Specifies the type of key to create. The currently-supported types are: `aes128-gcm96`, `aes256-gcm96` (default), `chacha20-poly1305`, `ed25519`, `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, `hmac`, `rsa-2048`, `rsa-3072`, `rsa-4096`, `managed_key`, `aes128-cmac`, `aes192-cmac`, `aes256-cmac`, `ml-dsa`, `hybrid`, and `slh-dsa`.
|
64
68
|
* Refer to the Vault documentation on transit key types for more information: [Key Types](https://www.vaultproject.io/docs/secrets/transit#key-types)
|
65
69
|
"""
|
66
70
|
pulumi.set(__self__, "backend", backend)
|
@@ -274,8 +278,12 @@ class SecretBackendKeyArgs:
|
|
274
278
|
@pulumi.getter(name="parameterSet")
|
275
279
|
def parameter_set(self) -> Optional[pulumi.Input[_builtins.str]]:
|
276
280
|
"""
|
277
|
-
The parameter set to use for ML-DSA. Required for
|
278
|
-
ML-DSA and
|
281
|
+
The parameter set to use for ML-DSA or SLH-DSA. Required for
|
282
|
+
ML-DSA, hybrid, and SLH-DSA keys.
|
283
|
+
Valid values for ML-DSA are `44`, `65`, and `87`.
|
284
|
+
Valid values for SLH-DSA are `slh-dsa-sha2-128s`, `slh-dsa-shake-128s`, `slh-dsa-sha2-128f`, `slh-dsa-shake-128`, `slh-dsa-sha2-192s`,
|
285
|
+
`slh-dsa-shake-192s`, `slh-dsa-sha2-192f`, `slh-dsa-shake-192f`, `slh-dsa-sha2-256s`, `slh-dsa-shake-256s`,
|
286
|
+
`slh-dsa-sha2-256f`, and `slh-dsa-shake-256f`.
|
279
287
|
"""
|
280
288
|
return pulumi.get(self, "parameter_set")
|
281
289
|
|
@@ -287,7 +295,7 @@ class SecretBackendKeyArgs:
|
|
287
295
|
@pulumi.getter
|
288
296
|
def type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
289
297
|
"""
|
290
|
-
Specifies the type of key to create. The currently-supported types are: `aes128-gcm96`, `aes256-gcm96` (default), `chacha20-poly1305`, `ed25519`, `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, `hmac`, `rsa-2048`, `rsa-3072` and `
|
298
|
+
Specifies the type of key to create. The currently-supported types are: `aes128-gcm96`, `aes256-gcm96` (default), `chacha20-poly1305`, `ed25519`, `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, `hmac`, `rsa-2048`, `rsa-3072`, `rsa-4096`, `managed_key`, `aes128-cmac`, `aes192-cmac`, `aes256-cmac`, `ml-dsa`, `hybrid`, and `slh-dsa`.
|
291
299
|
* Refer to the Vault documentation on transit key types for more information: [Key Types](https://www.vaultproject.io/docs/secrets/transit#key-types)
|
292
300
|
"""
|
293
301
|
return pulumi.get(self, "type")
|
@@ -351,13 +359,17 @@ class _SecretBackendKeyState:
|
|
351
359
|
The value should not contain leading or trailing forward slashes.
|
352
360
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
353
361
|
*Available only for Vault Enterprise*.
|
354
|
-
:param pulumi.Input[_builtins.str] parameter_set: The parameter set to use for ML-DSA. Required for
|
355
|
-
ML-DSA and
|
362
|
+
:param pulumi.Input[_builtins.str] parameter_set: The parameter set to use for ML-DSA or SLH-DSA. Required for
|
363
|
+
ML-DSA, hybrid, and SLH-DSA keys.
|
364
|
+
Valid values for ML-DSA are `44`, `65`, and `87`.
|
365
|
+
Valid values for SLH-DSA are `slh-dsa-sha2-128s`, `slh-dsa-shake-128s`, `slh-dsa-sha2-128f`, `slh-dsa-shake-128`, `slh-dsa-sha2-192s`,
|
366
|
+
`slh-dsa-shake-192s`, `slh-dsa-sha2-192f`, `slh-dsa-shake-192f`, `slh-dsa-sha2-256s`, `slh-dsa-shake-256s`,
|
367
|
+
`slh-dsa-sha2-256f`, and `slh-dsa-shake-256f`.
|
356
368
|
:param pulumi.Input[_builtins.bool] supports_decryption: Whether or not the key supports decryption, based on key type.
|
357
369
|
:param pulumi.Input[_builtins.bool] supports_derivation: Whether or not the key supports derivation, based on key type.
|
358
370
|
:param pulumi.Input[_builtins.bool] supports_encryption: Whether or not the key supports encryption, based on key type.
|
359
371
|
:param pulumi.Input[_builtins.bool] supports_signing: Whether or not the key supports signing, based on key type.
|
360
|
-
:param pulumi.Input[_builtins.str] type: Specifies the type of key to create. The currently-supported types are: `aes128-gcm96`, `aes256-gcm96` (default), `chacha20-poly1305`, `ed25519`, `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, `hmac`, `rsa-2048`, `rsa-3072` and `
|
372
|
+
:param pulumi.Input[_builtins.str] type: Specifies the type of key to create. The currently-supported types are: `aes128-gcm96`, `aes256-gcm96` (default), `chacha20-poly1305`, `ed25519`, `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, `hmac`, `rsa-2048`, `rsa-3072`, `rsa-4096`, `managed_key`, `aes128-cmac`, `aes192-cmac`, `aes256-cmac`, `ml-dsa`, `hybrid`, and `slh-dsa`.
|
361
373
|
* Refer to the Vault documentation on transit key types for more information: [Key Types](https://www.vaultproject.io/docs/secrets/transit#key-types)
|
362
374
|
"""
|
363
375
|
if allow_plaintext_backup is not None:
|
@@ -624,8 +636,12 @@ class _SecretBackendKeyState:
|
|
624
636
|
@pulumi.getter(name="parameterSet")
|
625
637
|
def parameter_set(self) -> Optional[pulumi.Input[_builtins.str]]:
|
626
638
|
"""
|
627
|
-
The parameter set to use for ML-DSA. Required for
|
628
|
-
ML-DSA and
|
639
|
+
The parameter set to use for ML-DSA or SLH-DSA. Required for
|
640
|
+
ML-DSA, hybrid, and SLH-DSA keys.
|
641
|
+
Valid values for ML-DSA are `44`, `65`, and `87`.
|
642
|
+
Valid values for SLH-DSA are `slh-dsa-sha2-128s`, `slh-dsa-shake-128s`, `slh-dsa-sha2-128f`, `slh-dsa-shake-128`, `slh-dsa-sha2-192s`,
|
643
|
+
`slh-dsa-shake-192s`, `slh-dsa-sha2-192f`, `slh-dsa-shake-192f`, `slh-dsa-sha2-256s`, `slh-dsa-shake-256s`,
|
644
|
+
`slh-dsa-sha2-256f`, and `slh-dsa-shake-256f`.
|
629
645
|
"""
|
630
646
|
return pulumi.get(self, "parameter_set")
|
631
647
|
|
@@ -685,7 +701,7 @@ class _SecretBackendKeyState:
|
|
685
701
|
@pulumi.getter
|
686
702
|
def type(self) -> Optional[pulumi.Input[_builtins.str]]:
|
687
703
|
"""
|
688
|
-
Specifies the type of key to create. The currently-supported types are: `aes128-gcm96`, `aes256-gcm96` (default), `chacha20-poly1305`, `ed25519`, `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, `hmac`, `rsa-2048`, `rsa-3072` and `
|
704
|
+
Specifies the type of key to create. The currently-supported types are: `aes128-gcm96`, `aes256-gcm96` (default), `chacha20-poly1305`, `ed25519`, `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, `hmac`, `rsa-2048`, `rsa-3072`, `rsa-4096`, `managed_key`, `aes128-cmac`, `aes192-cmac`, `aes256-cmac`, `ml-dsa`, `hybrid`, and `slh-dsa`.
|
689
705
|
* Refer to the Vault documentation on transit key types for more information: [Key Types](https://www.vaultproject.io/docs/secrets/transit#key-types)
|
690
706
|
"""
|
691
707
|
return pulumi.get(self, "type")
|
@@ -769,9 +785,13 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
769
785
|
The value should not contain leading or trailing forward slashes.
|
770
786
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
771
787
|
*Available only for Vault Enterprise*.
|
772
|
-
:param pulumi.Input[_builtins.str] parameter_set: The parameter set to use for ML-DSA. Required for
|
773
|
-
ML-DSA and
|
774
|
-
|
788
|
+
:param pulumi.Input[_builtins.str] parameter_set: The parameter set to use for ML-DSA or SLH-DSA. Required for
|
789
|
+
ML-DSA, hybrid, and SLH-DSA keys.
|
790
|
+
Valid values for ML-DSA are `44`, `65`, and `87`.
|
791
|
+
Valid values for SLH-DSA are `slh-dsa-sha2-128s`, `slh-dsa-shake-128s`, `slh-dsa-sha2-128f`, `slh-dsa-shake-128`, `slh-dsa-sha2-192s`,
|
792
|
+
`slh-dsa-shake-192s`, `slh-dsa-sha2-192f`, `slh-dsa-shake-192f`, `slh-dsa-sha2-256s`, `slh-dsa-shake-256s`,
|
793
|
+
`slh-dsa-sha2-256f`, and `slh-dsa-shake-256f`.
|
794
|
+
:param pulumi.Input[_builtins.str] type: Specifies the type of key to create. The currently-supported types are: `aes128-gcm96`, `aes256-gcm96` (default), `chacha20-poly1305`, `ed25519`, `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, `hmac`, `rsa-2048`, `rsa-3072`, `rsa-4096`, `managed_key`, `aes128-cmac`, `aes192-cmac`, `aes256-cmac`, `ml-dsa`, `hybrid`, and `slh-dsa`.
|
775
795
|
* Refer to the Vault documentation on transit key types for more information: [Key Types](https://www.vaultproject.io/docs/secrets/transit#key-types)
|
776
796
|
"""
|
777
797
|
...
|
@@ -939,13 +959,17 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
939
959
|
The value should not contain leading or trailing forward slashes.
|
940
960
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
941
961
|
*Available only for Vault Enterprise*.
|
942
|
-
:param pulumi.Input[_builtins.str] parameter_set: The parameter set to use for ML-DSA. Required for
|
943
|
-
ML-DSA and
|
962
|
+
:param pulumi.Input[_builtins.str] parameter_set: The parameter set to use for ML-DSA or SLH-DSA. Required for
|
963
|
+
ML-DSA, hybrid, and SLH-DSA keys.
|
964
|
+
Valid values for ML-DSA are `44`, `65`, and `87`.
|
965
|
+
Valid values for SLH-DSA are `slh-dsa-sha2-128s`, `slh-dsa-shake-128s`, `slh-dsa-sha2-128f`, `slh-dsa-shake-128`, `slh-dsa-sha2-192s`,
|
966
|
+
`slh-dsa-shake-192s`, `slh-dsa-sha2-192f`, `slh-dsa-shake-192f`, `slh-dsa-sha2-256s`, `slh-dsa-shake-256s`,
|
967
|
+
`slh-dsa-sha2-256f`, and `slh-dsa-shake-256f`.
|
944
968
|
:param pulumi.Input[_builtins.bool] supports_decryption: Whether or not the key supports decryption, based on key type.
|
945
969
|
:param pulumi.Input[_builtins.bool] supports_derivation: Whether or not the key supports derivation, based on key type.
|
946
970
|
:param pulumi.Input[_builtins.bool] supports_encryption: Whether or not the key supports encryption, based on key type.
|
947
971
|
:param pulumi.Input[_builtins.bool] supports_signing: Whether or not the key supports signing, based on key type.
|
948
|
-
:param pulumi.Input[_builtins.str] type: Specifies the type of key to create. The currently-supported types are: `aes128-gcm96`, `aes256-gcm96` (default), `chacha20-poly1305`, `ed25519`, `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, `hmac`, `rsa-2048`, `rsa-3072` and `
|
972
|
+
:param pulumi.Input[_builtins.str] type: Specifies the type of key to create. The currently-supported types are: `aes128-gcm96`, `aes256-gcm96` (default), `chacha20-poly1305`, `ed25519`, `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, `hmac`, `rsa-2048`, `rsa-3072`, `rsa-4096`, `managed_key`, `aes128-cmac`, `aes192-cmac`, `aes256-cmac`, `ml-dsa`, `hybrid`, and `slh-dsa`.
|
949
973
|
* Refer to the Vault documentation on transit key types for more information: [Key Types](https://www.vaultproject.io/docs/secrets/transit#key-types)
|
950
974
|
"""
|
951
975
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
@@ -1126,8 +1150,12 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
1126
1150
|
@pulumi.getter(name="parameterSet")
|
1127
1151
|
def parameter_set(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1128
1152
|
"""
|
1129
|
-
The parameter set to use for ML-DSA. Required for
|
1130
|
-
ML-DSA and
|
1153
|
+
The parameter set to use for ML-DSA or SLH-DSA. Required for
|
1154
|
+
ML-DSA, hybrid, and SLH-DSA keys.
|
1155
|
+
Valid values for ML-DSA are `44`, `65`, and `87`.
|
1156
|
+
Valid values for SLH-DSA are `slh-dsa-sha2-128s`, `slh-dsa-shake-128s`, `slh-dsa-sha2-128f`, `slh-dsa-shake-128`, `slh-dsa-sha2-192s`,
|
1157
|
+
`slh-dsa-shake-192s`, `slh-dsa-sha2-192f`, `slh-dsa-shake-192f`, `slh-dsa-sha2-256s`, `slh-dsa-shake-256s`,
|
1158
|
+
`slh-dsa-sha2-256f`, and `slh-dsa-shake-256f`.
|
1131
1159
|
"""
|
1132
1160
|
return pulumi.get(self, "parameter_set")
|
1133
1161
|
|
@@ -1167,7 +1195,7 @@ class SecretBackendKey(pulumi.CustomResource):
|
|
1167
1195
|
@pulumi.getter
|
1168
1196
|
def type(self) -> pulumi.Output[Optional[_builtins.str]]:
|
1169
1197
|
"""
|
1170
|
-
Specifies the type of key to create. The currently-supported types are: `aes128-gcm96`, `aes256-gcm96` (default), `chacha20-poly1305`, `ed25519`, `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, `hmac`, `rsa-2048`, `rsa-3072` and `
|
1198
|
+
Specifies the type of key to create. The currently-supported types are: `aes128-gcm96`, `aes256-gcm96` (default), `chacha20-poly1305`, `ed25519`, `ecdsa-p256`, `ecdsa-p384`, `ecdsa-p521`, `hmac`, `rsa-2048`, `rsa-3072`, `rsa-4096`, `managed_key`, `aes128-cmac`, `aes192-cmac`, `aes256-cmac`, `ml-dsa`, `hybrid`, and `slh-dsa`.
|
1171
1199
|
* Refer to the Vault documentation on transit key types for more information: [Key Types](https://www.vaultproject.io/docs/secrets/transit#key-types)
|
1172
1200
|
"""
|
1173
1201
|
return pulumi.get(self, "type")
|
@@ -1,5 +1,5 @@
|
|
1
|
-
pulumi_vault/__init__.py,sha256=
|
2
|
-
pulumi_vault/_inputs.py,sha256=
|
1
|
+
pulumi_vault/__init__.py,sha256=6VGWXFdAObw1o-qZhxyI-iBYVRuqFEQ88QAOgZFn6SE,33057
|
2
|
+
pulumi_vault/_inputs.py,sha256=9XzNvTBONtQDXm1AAx59pauCTwk4WA1pBrzPGEgI_tk,110458
|
3
3
|
pulumi_vault/_utilities.py,sha256=66uLGQDI1oMFOI3Fe5igAphtexWhcSLDyuVW50jW3ik,10789
|
4
4
|
pulumi_vault/audit.py,sha256=vOuQ1Js4rp7rgadjacG4dWgK--hAxbvrQAOmlQtyzaQ,21582
|
5
5
|
pulumi_vault/audit_request_header.py,sha256=6_23qSkGjs03W2Ee8epJHEfYQ-gZec3_18OVk0wyCmE,11068
|
@@ -17,16 +17,18 @@ pulumi_vault/mfa_duo.py,sha256=MCs-j0a6m7SFdHcBZqk_c9tUyfejCte3Ld6PnqI4VU0,29818
|
|
17
17
|
pulumi_vault/mfa_okta.py,sha256=li5i1pEYeHhiFF7ZByTAy2vUqRa_ahGd_6CdWcjDcVQ,31086
|
18
18
|
pulumi_vault/mfa_pingid.py,sha256=qtYnZ7xA35EZZij8YsM1yZHVDNLkOciLDVui_CkSf9I,32679
|
19
19
|
pulumi_vault/mfa_totp.py,sha256=oioMOfMYIpqaj2J7tEbujskxQ6EbvBTR1-15DkCEP2c,27097
|
20
|
-
pulumi_vault/mount.py,sha256=
|
20
|
+
pulumi_vault/mount.py,sha256=JtwtH9JHyMpUe-Sk2ApftSWdgCYXs4JAdgNvJhgyTLU,65745
|
21
21
|
pulumi_vault/namespace.py,sha256=R21BCWrDoMOSFDgPbjVzP_h2J5LynnTMyGEWrgaqHAE,19256
|
22
|
-
pulumi_vault/nomad_secret_backend.py,sha256=
|
22
|
+
pulumi_vault/nomad_secret_backend.py,sha256=AEBgdq9IYG0xQJUfxkqgdwxiDEu5IF0ZqSBgu0BQhKE,82255
|
23
23
|
pulumi_vault/nomad_secret_role.py,sha256=axNMl7B12t-_atT3I4vwBiqpfaWPgeqMHaJaTNjIh8w,21405
|
24
|
-
pulumi_vault/
|
24
|
+
pulumi_vault/oci_auth_backend.py,sha256=s8QLmunDbB_NLFFFDISKKyjc7nJTgxFVXr2BFT2jiJE,32990
|
25
|
+
pulumi_vault/oci_auth_backend_role.py,sha256=sesaveRmaFy-3asJEbCoNBpm4WcFSkFyYTXm094Fyz4,38113
|
26
|
+
pulumi_vault/outputs.py,sha256=q-HfnLHjRLbBe_T-9-kc2dE4ndKETqte_0t1TFAu-N8,22343
|
25
27
|
pulumi_vault/plugin.py,sha256=57QZXnzP9lPAU0TbErKMCaLggsm9MehQm9hjVgy36_k,25233
|
26
28
|
pulumi_vault/plugin_pinned_version.py,sha256=w3YbjWKRyKY_7Ufc45n7nIAhVxpuj352jqykNlzmk4Q,11340
|
27
29
|
pulumi_vault/policy.py,sha256=eOofckCLS7K3YRGh3GElW5jpXz_oK76xny4Fk5VrsR0,11666
|
28
30
|
pulumi_vault/provider.py,sha256=8VNU3RFDfN_DYbhoF3ucyTrfc-s6jGHG-ySRX5ggTDY,44982
|
29
|
-
pulumi_vault/pulumi-plugin.json,sha256=
|
31
|
+
pulumi_vault/pulumi-plugin.json,sha256=D0oz1pgJcjJ_dvf2jhRsoNNg4XXu8fifjXpLOGMUBVM,64
|
30
32
|
pulumi_vault/py.typed,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
31
33
|
pulumi_vault/quota_lease_count.py,sha256=CoqfUnFAx956hEU4610qCLLhfzYcB5Qey0Jfy3hkVwA,26157
|
32
34
|
pulumi_vault/quota_rate_limit.py,sha256=tI72HsW0lOMEMMHLyr3EQhW8d6F-FfgsEQyXGH5ebjU,43077
|
@@ -59,14 +61,14 @@ pulumi_vault/aws/auth_backend_roletag_blacklist.py,sha256=KYLHFteScul45B3h3dAX4x
|
|
59
61
|
pulumi_vault/aws/auth_backend_sts_role.py,sha256=e0vY-1dBNlDGge32cVDwB7Zycur8eiIgI9pxnZalEHM,19137
|
60
62
|
pulumi_vault/aws/get_access_credentials.py,sha256=1OjQ9aeIFV4TLhOsd--oSCk8j2vyNBlqIbLVHrVjQoc,14410
|
61
63
|
pulumi_vault/aws/get_static_access_credentials.py,sha256=qYvLMUMt7rNQjzZqXxokk4QwHD9onfLpKHeSUTszFR0,5839
|
62
|
-
pulumi_vault/aws/secret_backend.py,sha256=
|
64
|
+
pulumi_vault/aws/secret_backend.py,sha256=ytG6vpwgn2pmwSwbXMitGyIEiujfQi74Iz5Uokwx8y8,109474
|
63
65
|
pulumi_vault/aws/secret_backend_role.py,sha256=mukTRV3_N4w-N57ofRefNqoHcYBqQAE18dxFghUq14w,59515
|
64
66
|
pulumi_vault/aws/secret_backend_static_role.py,sha256=GGxEANEzWYbxywCfaQLN8rFh6VGWYBVlDAeZJS2hiR8,30997
|
65
67
|
pulumi_vault/azure/__init__.py,sha256=Gk64A0BSscD4T-rAlEfhmiFrzqqE8gCw37QFy8DNDas,482
|
66
68
|
pulumi_vault/azure/_inputs.py,sha256=VeLFb5UAVYaX1QsQSlvFUX-avQuajl7HWFFzvfxMk28,3577
|
67
69
|
pulumi_vault/azure/auth_backend_config.py,sha256=My-bB0obwZtizG_ALzw1rZo_3QRgh5pbKLW_J9lrZmI,47215
|
68
70
|
pulumi_vault/azure/auth_backend_role.py,sha256=aRwf8jo7KHrwRN3gG-glFV8eah_MpZ1zIQj8Kgxl4-A,58011
|
69
|
-
pulumi_vault/azure/backend.py,sha256=
|
71
|
+
pulumi_vault/azure/backend.py,sha256=yQozy7BOex_Cg3dQlABbbvX6suTrrjlZ5InnDmvH0oA,97175
|
70
72
|
pulumi_vault/azure/backend_role.py,sha256=56fxGFa0IxqmEwlsXtNOwmF3RpHUBn9HpqVlXSmu5vw,44475
|
71
73
|
pulumi_vault/azure/get_access_credentials.py,sha256=Fq9VD7uteM-MgM6gprkh3yTf-l1Edf9LgO-rRyTc8qg,20613
|
72
74
|
pulumi_vault/azure/outputs.py,sha256=JqVDbYxhPOUhfiuRjkwkXo_VfaU08awc7VyGL4joI9k,3420
|
@@ -77,7 +79,7 @@ pulumi_vault/config/outputs.py,sha256=ViTYi4YxunYgaBHVUJJL7g9Ih6q2eWNfmJPf-hY-bN
|
|
77
79
|
pulumi_vault/config/ui_custom_message.py,sha256=dB9ZRzS2LHr0f2UsOp3W0tmCOKEYnl15y9xgvFKPM_o,24394
|
78
80
|
pulumi_vault/config/vars.py,sha256=1Y8tDmLIAXMnUpfpzdQ_a6TXHr5CdcLD25FGGnkCrhQ,6998
|
79
81
|
pulumi_vault/consul/__init__.py,sha256=rvV594Qo7hp6Ysz7aaxgrOVw1c6LlliyrD8nrCoKEdU,345
|
80
|
-
pulumi_vault/consul/secret_backend.py,sha256=
|
82
|
+
pulumi_vault/consul/secret_backend.py,sha256=qKboTfen7iw4PB46LMe_jH_C8TxLOztDRTsE0wKZg28,79364
|
81
83
|
pulumi_vault/consul/secret_backend_role.py,sha256=42QN0s2omlBnfwOiPV4EmNOlpOCRlf_vb_Cyk63HmCg,43973
|
82
84
|
pulumi_vault/database/__init__.py,sha256=IKf2lsiEPGWbulcje7pAgpeQqZ3kElNCrP3eDced97M,472
|
83
85
|
pulumi_vault/database/_inputs.py,sha256=eValBNKKgSg16n8gbW5Oe3ALPipO_tFWWCNC2a50ANU,521391
|
@@ -85,14 +87,14 @@ pulumi_vault/database/outputs.py,sha256=211SlAm68M0ICkYh8U_P6wy5P4XH7CXt_Rek8VK-
|
|
85
87
|
pulumi_vault/database/secret_backend_connection.py,sha256=-lETXtUXeiz1vmwG7glaFHi7v4iR8ghIwRHM9dwYchQ,93381
|
86
88
|
pulumi_vault/database/secret_backend_role.py,sha256=Sm4PtpIA3m0nfUtfIEAGjORXZamAQsEpMaPkNSPNr8U,39232
|
87
89
|
pulumi_vault/database/secret_backend_static_role.py,sha256=jCXeO6LU-Bdd-dSV8ZbXdKxZqGHF0YudGsuP4zFSbfc,44603
|
88
|
-
pulumi_vault/database/secrets_mount.py,sha256=
|
90
|
+
pulumi_vault/database/secrets_mount.py,sha256=WAJEOlfp0dB2SZxh1GkTGXGMImweQxS42O3bdboPlIQ,122955
|
89
91
|
pulumi_vault/gcp/__init__.py,sha256=FEwIPfzcZ5RqQYSD27FtChXzHEMQfcnhJbDvOPlWSAE,563
|
90
92
|
pulumi_vault/gcp/_inputs.py,sha256=OLgraky8XbCZfbPIjQF6Q7G4Gglag_AIOKKZD97VsZk,20330
|
91
93
|
pulumi_vault/gcp/auth_backend.py,sha256=uflYLK4RA69PU9hk1Bf9kusL6JnNf8zbLgda26bR0yY,67942
|
92
94
|
pulumi_vault/gcp/auth_backend_role.py,sha256=MfEOPCRmN_nurUXEU0cQqk9-lVLEOVw7ayjBhJPfn60,55605
|
93
95
|
pulumi_vault/gcp/get_auth_backend_role.py,sha256=AXBEolTbMQZ9BGnOcOVLtIBeTeVZmHOI2bsqfIQUpHI,26061
|
94
96
|
pulumi_vault/gcp/outputs.py,sha256=vvLkW71J3ssEWjMuSqoo8aiTovZ4_KZoGJy2RM0Fc50,13426
|
95
|
-
pulumi_vault/gcp/secret_backend.py,sha256=
|
97
|
+
pulumi_vault/gcp/secret_backend.py,sha256=PtkF8CTpbv_gMEDPgHVCaVTWbZHK7S7SQ0Np3NQ7eE8,93453
|
96
98
|
pulumi_vault/gcp/secret_impersonated_account.py,sha256=gce_PM1Gqy55CqXDLq6cgDGHdpT4nLwsNDCpnIlMBhE,22977
|
97
99
|
pulumi_vault/gcp/secret_roleset.py,sha256=AnSk3-lqjh0XkoXarn8wWkHhDHRJ_i_LgWucfkfw_aA,27389
|
98
100
|
pulumi_vault/gcp/secret_static_account.py,sha256=VO_U1phr4qU9pcs8hW0k4A7SCtOyJsQuIXormirS7zY,28723
|
@@ -136,11 +138,11 @@ pulumi_vault/identity/oidc_scope.py,sha256=wId169uvjr-tQjVTN5GJ5nqN_9nvUwWPqUKJV
|
|
136
138
|
pulumi_vault/identity/outputs.py,sha256=Xba7sdqNw5YjBZg0My4-xaji5ykUFXUYAOdGnSQsXw0,4727
|
137
139
|
pulumi_vault/jwt/__init__.py,sha256=SXax5_frO4SpZQZYF8Q5r2twE8RXshQ_8izTQ5Dz5lo,386
|
138
140
|
pulumi_vault/jwt/_inputs.py,sha256=tk58Yyqjfn_nsmBWrdY5eEsh3yOMLuId8CQllIk4H4E,10700
|
139
|
-
pulumi_vault/jwt/auth_backend.py,sha256=
|
141
|
+
pulumi_vault/jwt/auth_backend.py,sha256=Y4HrZTZLupSnoABnaPvGzYMFtd2RQx37z-YUYGRsSrU,73154
|
140
142
|
pulumi_vault/jwt/auth_backend_role.py,sha256=R9zE-CB1v4QM4FTXeUpgyCD7-SBx-Qd27PJvvTtvj3M,92251
|
141
143
|
pulumi_vault/jwt/outputs.py,sha256=ZMez2UK8RGHNyi3mcPDbNlXY7u2M96dKLPRz7sFiowk,7813
|
142
144
|
pulumi_vault/kmip/__init__.py,sha256=imJuKlgQiNdfiESoYeytRca1vNwYZ_KXkaRkUcGncAk,365
|
143
|
-
pulumi_vault/kmip/secret_backend.py,sha256=
|
145
|
+
pulumi_vault/kmip/secret_backend.py,sha256=zyF-gvkaqQNRa0ELa4iYn1LVJfs9rp45kyu0aWV5QSA,85393
|
144
146
|
pulumi_vault/kmip/secret_role.py,sha256=hok_eaqx_Ws4l52mYY--V5N063fyKtSmWpmktK-vQxI,58203
|
145
147
|
pulumi_vault/kmip/secret_scope.py,sha256=Di7loWyXMtxuccPWb0R0Hqw7lVuegnCTVrXXdlQTj6g,15680
|
146
148
|
pulumi_vault/kubernetes/__init__.py,sha256=60lqFtbyb-uWFYGPVvTM7wfEx5nF0Pkc58Hw0ORuusA,530
|
@@ -149,7 +151,7 @@ pulumi_vault/kubernetes/auth_backend_role.py,sha256=z0RiuB7A6sCw2O_WGhL9N603nNff
|
|
149
151
|
pulumi_vault/kubernetes/get_auth_backend_config.py,sha256=d968c90ptl_I0UC2A51qWwpfNsRu9raTxdSejj2z-cY,15641
|
150
152
|
pulumi_vault/kubernetes/get_auth_backend_role.py,sha256=Vm4dor58F6FojJ8ZnurFJ8AlkQxS8f2hvebF3SNpWZg,24429
|
151
153
|
pulumi_vault/kubernetes/get_service_account_token.py,sha256=KfOe5q2QjffFkxxqqzOVCSmINtC5bQ7gvhN9bYx2e4M,15885
|
152
|
-
pulumi_vault/kubernetes/secret_backend.py,sha256=
|
154
|
+
pulumi_vault/kubernetes/secret_backend.py,sha256=Hgo1KtRKKP9G_08xmqquFmIQVmdHc1LFJmkr43QyxC8,72817
|
153
155
|
pulumi_vault/kubernetes/secret_backend_role.py,sha256=YIcbHS-N9h-XdxA2QfFLHm6LTOvbzSDRMj7KOZsLvjw,58337
|
154
156
|
pulumi_vault/kv/__init__.py,sha256=GR2l26PMnfg9JqlfN7wrTdgbuunrtIWu0UPDf5w69sc,564
|
155
157
|
pulumi_vault/kv/_inputs.py,sha256=ts6WWfSbnAgLHuN9cCrpnreh0qlAtsCaCoyVDKOfhq8,5404
|
@@ -168,7 +170,7 @@ pulumi_vault/ldap/auth_backend_group.py,sha256=bjnSZPaUnUJSV2TD76k0ciyU_r4YO245K
|
|
168
170
|
pulumi_vault/ldap/auth_backend_user.py,sha256=hwIK_XGGuYAOhHaNWBFErbH_mRyXfwy366nQKXwzGoc,19577
|
169
171
|
pulumi_vault/ldap/get_dynamic_credentials.py,sha256=AXkcISQo0YSfGrTEP6VDMohl_s2WFMHjY132qQ8ziAM,7970
|
170
172
|
pulumi_vault/ldap/get_static_credentials.py,sha256=6ulQebkikrl6onkom9uWaE2s5NRvNiA--lL5JsLsW3k,8205
|
171
|
-
pulumi_vault/ldap/secret_backend.py,sha256=
|
173
|
+
pulumi_vault/ldap/secret_backend.py,sha256=i3L_T-Z7BjaU37ulSGbo1bacXOr-Qwv38mE6sJXuaLM,115001
|
172
174
|
pulumi_vault/ldap/secret_backend_dynamic_role.py,sha256=41aPRUrxVk_iWjQyRrUHoKhw5JR70UJ2AqrSLlQi-Yo,39583
|
173
175
|
pulumi_vault/ldap/secret_backend_library_set.py,sha256=ydUXFqRFUBiLRbEDw_DE_ESbYyos1FZCpMrLcqHya4s,25372
|
174
176
|
pulumi_vault/ldap/secret_backend_static_role.py,sha256=KMrK3R7jeJqUkiuSpG5TTFQ3K0iUfoSxn22ncBt3la8,25419
|
@@ -193,11 +195,11 @@ pulumi_vault/pkisecret/backend_config_auto_tidy.py,sha256=rpMYICeDJmESwEp9QPZ8TQ
|
|
193
195
|
pulumi_vault/pkisecret/backend_config_cluster.py,sha256=BFdj9-vZjssNGuuwqOpfDhwo09r9eG0Erx2Lf8kpTl8,16860
|
194
196
|
pulumi_vault/pkisecret/backend_config_cmpv2.py,sha256=rHtG4Uqo7tx3GEoBjrKX5_eEt3HYm0_zlqt4c-JPqUU,30119
|
195
197
|
pulumi_vault/pkisecret/backend_config_est.py,sha256=ZiWCH7hrUXrEW9Z4E95k6r_lekbSE16fq4qwegtzJfo,34471
|
196
|
-
pulumi_vault/pkisecret/backend_config_scep.py,sha256=
|
198
|
+
pulumi_vault/pkisecret/backend_config_scep.py,sha256=YLJYzdnZUB19ar9O26lXEPGkqhCHyHd2KTiLKFMwzzU,39055
|
197
199
|
pulumi_vault/pkisecret/get_backend_cert_metadata.py,sha256=soWRqLyTx4IdBN22FxUUUmOTcYTt7t1_uFeWk5kV24s,11218
|
198
200
|
pulumi_vault/pkisecret/get_backend_config_cmpv2.py,sha256=OxXBjkHFBajRgMuUwWnXXkgPiwOEi-FVHDPyb3UreIw,10421
|
199
201
|
pulumi_vault/pkisecret/get_backend_config_est.py,sha256=JuuL4pfngO3FzFwjF3ioOOeiIGXkbJc164yM7IzPqLU,11447
|
200
|
-
pulumi_vault/pkisecret/get_backend_config_scep.py,sha256=
|
202
|
+
pulumi_vault/pkisecret/get_backend_config_scep.py,sha256=KNbbD-J-uLAxEBdgk0oedq_P3veyXj39GYp9n5tQR1E,12822
|
201
203
|
pulumi_vault/pkisecret/get_backend_issuer.py,sha256=aiNdqRNlXrsB054UGCHzEXiwEOSIiiKYfb-R9ROMQ88,19511
|
202
204
|
pulumi_vault/pkisecret/get_backend_issuers.py,sha256=opVS5alp85ddogkZHDtcreofiupbsUJFF-j1-Z8D8Lc,7467
|
203
205
|
pulumi_vault/pkisecret/get_backend_key.py,sha256=f5_R-4R-SXWIqD90G9y8iW2Jo03XXTjzoCc2ykXLWug,8127
|
@@ -219,7 +221,7 @@ pulumi_vault/pkisecret/secret_backend_sign.py,sha256=m3K6j_5H-0EjwXROS3raVzQAp_d
|
|
219
221
|
pulumi_vault/rabbitmq/__init__.py,sha256=UEtXWIr26m0bT7t3D6YLbAe0tmPUXjrEr7TI8nEVMik,390
|
220
222
|
pulumi_vault/rabbitmq/_inputs.py,sha256=70XomOgdc6ZUDyAcpGvtdKbvEgenUTCsuv3I6PQNIQc,7557
|
221
223
|
pulumi_vault/rabbitmq/outputs.py,sha256=z5zFDGrd8iuNaiOpfMyhkRbowgUfAwg1Va-k3GHcezg,4356
|
222
|
-
pulumi_vault/rabbitmq/secret_backend.py,sha256=
|
224
|
+
pulumi_vault/rabbitmq/secret_backend.py,sha256=fy83NqeFNKANAaQwLmUBVGRF3w9c8cQ7AfchTbovkY4,76375
|
223
225
|
pulumi_vault/rabbitmq/secret_backend_role.py,sha256=wtE8zmk8geLnGDWuWqqtjrzDvIxLIAIa8SjO1K-RaY8,22867
|
224
226
|
pulumi_vault/saml/__init__.py,sha256=wMBbnEwuTaFZz555HFfScJLtpDzZUoHrJsetLx8Dykk,341
|
225
227
|
pulumi_vault/saml/auth_backend.py,sha256=r8PmrHJrl81UJ4_U1VSSXZG3QzAkw0ac7OzEBBKxG8I,35582
|
@@ -239,10 +241,10 @@ pulumi_vault/ssh/__init__.py,sha256=WXKqv03iHsyYcEhBDnLmstssXvu-BHz5YKQHg45WBVs,
|
|
239
241
|
pulumi_vault/ssh/_inputs.py,sha256=v3GdcSbN1Br_92zUsvdQEfpaOQaj5tiPcjXb5gJS5to,2704
|
240
242
|
pulumi_vault/ssh/get_secret_backend_sign.py,sha256=wODGbhmHq_jFhWrzgMBit86rSuH0VeVfc2so8eFPsJk,15567
|
241
243
|
pulumi_vault/ssh/outputs.py,sha256=iB1p6nl3UpI5_dE4IILWDIG-_vgWO3iy30Rf6KPfWmQ,1699
|
242
|
-
pulumi_vault/ssh/secret_backend_ca.py,sha256=
|
244
|
+
pulumi_vault/ssh/secret_backend_ca.py,sha256=XBxwsEQ0sn6VBQe6XsIwSzq5q_kaXTqqgRYBtb--nE0,29312
|
243
245
|
pulumi_vault/ssh/secret_backend_role.py,sha256=-H-p39wHx5hblb_YzOTggI9qgSlnzH5lF458gc53rDs,80963
|
244
246
|
pulumi_vault/terraformcloud/__init__.py,sha256=qIUJKScjeydBaTQyEwU2lnHGGXc8bwAINl2Md1cRFj8,365
|
245
|
-
pulumi_vault/terraformcloud/secret_backend.py,sha256=
|
247
|
+
pulumi_vault/terraformcloud/secret_backend.py,sha256=wtVZBJJa5N5eK-AsQrMm7n2nB81tpgG1mkNXPOJcv9w,64452
|
246
248
|
pulumi_vault/terraformcloud/secret_creds.py,sha256=Y52e2K_3ZkIMx3_rA4YjV67R-lM0TwOtDpWtPWc1_Uw,19027
|
247
249
|
pulumi_vault/terraformcloud/secret_role.py,sha256=Pl7lx6F3Gz6SnqDvvKM5mgLbMieov5_rZaqAb_Mzgh8,20287
|
248
250
|
pulumi_vault/tokenauth/__init__.py,sha256=aP4g_rBY3hQFv49drtxcrFaDH6VW0YxD_3W3eFTZkRc,313
|
@@ -260,9 +262,9 @@ pulumi_vault/transit/get_decrypt.py,sha256=xJ09pH1sn0NRDd3ZLKtLoy9LcB4cS8-rpN7O-
|
|
260
262
|
pulumi_vault/transit/get_encrypt.py,sha256=tWA32tfONa6OuF5f46ZTum9-3d8932CUO8cJ18JsOpc,7088
|
261
263
|
pulumi_vault/transit/get_sign.py,sha256=cvWAgPsSZSyhzU4Hewp7FCsQiMLH3NxgD2d8rbFbvi8,15118
|
262
264
|
pulumi_vault/transit/get_verify.py,sha256=h2XhUQwJOlOOx8IzccA2YPySmhEMcHWOtuNfKV-9DQ0,17126
|
263
|
-
pulumi_vault/transit/secret_backend_key.py,sha256=
|
265
|
+
pulumi_vault/transit/secret_backend_key.py,sha256=4F_MJXEBzVsNY22HzSp79mPl0SLIVPCknk-D9klcW5A,68515
|
264
266
|
pulumi_vault/transit/secret_cache_config.py,sha256=v5enplOZynVxCUCPaav5df8d9zK2vi07C8F9SAQ73aA,13238
|
265
|
-
pulumi_vault-7.2.
|
266
|
-
pulumi_vault-7.2.
|
267
|
-
pulumi_vault-7.2.
|
268
|
-
pulumi_vault-7.2.
|
267
|
+
pulumi_vault-7.2.1.dist-info/METADATA,sha256=4wQYgCQ3ekq7n04fHJy_dm809OHXOzNcIuHLemdVA14,4915
|
268
|
+
pulumi_vault-7.2.1.dist-info/WHEEL,sha256=_zCd3N1l69ArxyTb8rzEoP9TpbYXkqRFSNOD5OuxnTs,91
|
269
|
+
pulumi_vault-7.2.1.dist-info/top_level.txt,sha256=J7lAGvfexHc6T1EpDBGNKF0SXWURpmUhyzi9Nr5I61w,13
|
270
|
+
pulumi_vault-7.2.1.dist-info/RECORD,,
|
File without changes
|
File without changes
|