pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +26 -9
  5. pulumi_vault/ad/secret_backend.py +16 -142
  6. pulumi_vault/ad/secret_library.py +16 -9
  7. pulumi_vault/ad/secret_role.py +14 -9
  8. pulumi_vault/alicloud/auth_backend_role.py +76 -190
  9. pulumi_vault/approle/auth_backend_login.py +12 -7
  10. pulumi_vault/approle/auth_backend_role.py +77 -191
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
  13. pulumi_vault/audit.py +30 -21
  14. pulumi_vault/audit_request_header.py +11 -2
  15. pulumi_vault/auth_backend.py +66 -14
  16. pulumi_vault/aws/auth_backend_cert.py +18 -9
  17. pulumi_vault/aws/auth_backend_client.py +267 -22
  18. pulumi_vault/aws/auth_backend_config_identity.py +14 -9
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +77 -191
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
  24. pulumi_vault/aws/auth_backend_sts_role.py +14 -9
  25. pulumi_vault/aws/get_access_credentials.py +38 -9
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +77 -9
  28. pulumi_vault/aws/secret_backend_role.py +185 -9
  29. pulumi_vault/aws/secret_backend_static_role.py +20 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +153 -15
  32. pulumi_vault/azure/auth_backend_role.py +77 -191
  33. pulumi_vault/azure/backend.py +227 -21
  34. pulumi_vault/azure/backend_role.py +42 -37
  35. pulumi_vault/azure/get_access_credentials.py +41 -7
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -267
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +28 -19
  44. pulumi_vault/consul/secret_backend_role.py +18 -78
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +119 -112
  48. pulumi_vault/database/secret_backend_role.py +31 -22
  49. pulumi_vault/database/secret_backend_static_role.py +87 -13
  50. pulumi_vault/database/secrets_mount.py +427 -136
  51. pulumi_vault/egp_policy.py +16 -11
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +250 -33
  54. pulumi_vault/gcp/auth_backend_role.py +77 -269
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -5
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -12
  58. pulumi_vault/gcp/secret_impersonated_account.py +76 -15
  59. pulumi_vault/gcp/secret_roleset.py +31 -24
  60. pulumi_vault/gcp/secret_static_account.py +39 -32
  61. pulumi_vault/generic/endpoint.py +24 -17
  62. pulumi_vault/generic/get_secret.py +64 -8
  63. pulumi_vault/generic/secret.py +21 -16
  64. pulumi_vault/get_auth_backend.py +24 -7
  65. pulumi_vault/get_auth_backends.py +51 -9
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -11
  69. pulumi_vault/get_policy_document.py +34 -19
  70. pulumi_vault/get_raft_autopilot_state.py +29 -10
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +19 -14
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +16 -11
  75. pulumi_vault/github/user.py +16 -11
  76. pulumi_vault/identity/entity.py +20 -13
  77. pulumi_vault/identity/entity_alias.py +20 -13
  78. pulumi_vault/identity/entity_policies.py +28 -11
  79. pulumi_vault/identity/get_entity.py +42 -10
  80. pulumi_vault/identity/get_group.py +47 -9
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -7
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -9
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -10
  84. pulumi_vault/identity/group.py +58 -39
  85. pulumi_vault/identity/group_alias.py +16 -9
  86. pulumi_vault/identity/group_member_entity_ids.py +28 -66
  87. pulumi_vault/identity/group_member_group_ids.py +40 -19
  88. pulumi_vault/identity/group_policies.py +20 -7
  89. pulumi_vault/identity/mfa_duo.py +11 -6
  90. pulumi_vault/identity/mfa_login_enforcement.py +15 -6
  91. pulumi_vault/identity/mfa_okta.py +11 -6
  92. pulumi_vault/identity/mfa_pingid.py +7 -2
  93. pulumi_vault/identity/mfa_totp.py +7 -2
  94. pulumi_vault/identity/oidc.py +12 -7
  95. pulumi_vault/identity/oidc_assignment.py +24 -11
  96. pulumi_vault/identity/oidc_client.py +36 -23
  97. pulumi_vault/identity/oidc_key.py +30 -17
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
  99. pulumi_vault/identity/oidc_provider.py +36 -21
  100. pulumi_vault/identity/oidc_role.py +42 -21
  101. pulumi_vault/identity/oidc_scope.py +20 -13
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +45 -40
  105. pulumi_vault/jwt/auth_backend_role.py +133 -254
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +24 -19
  108. pulumi_vault/kmip/secret_role.py +14 -9
  109. pulumi_vault/kmip/secret_scope.py +14 -9
  110. pulumi_vault/kubernetes/auth_backend_config.py +57 -5
  111. pulumi_vault/kubernetes/auth_backend_role.py +70 -177
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -11
  115. pulumi_vault/kubernetes/secret_backend.py +316 -27
  116. pulumi_vault/kubernetes/secret_backend_role.py +137 -46
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +25 -8
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
  120. pulumi_vault/kv/get_secret_v2.py +85 -9
  121. pulumi_vault/kv/get_secrets_list.py +24 -11
  122. pulumi_vault/kv/get_secrets_list_v2.py +37 -15
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +23 -16
  125. pulumi_vault/kv/secret_backend_v2.py +20 -11
  126. pulumi_vault/kv/secret_v2.py +59 -50
  127. pulumi_vault/ldap/auth_backend.py +127 -166
  128. pulumi_vault/ldap/auth_backend_group.py +14 -9
  129. pulumi_vault/ldap/auth_backend_user.py +14 -9
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +354 -82
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +16 -9
  135. pulumi_vault/ldap/secret_backend_static_role.py +73 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +29 -57
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +18 -11
  140. pulumi_vault/mfa_okta.py +18 -11
  141. pulumi_vault/mfa_pingid.py +18 -11
  142. pulumi_vault/mfa_totp.py +24 -17
  143. pulumi_vault/mongodbatlas/secret_backend.py +20 -15
  144. pulumi_vault/mongodbatlas/secret_role.py +47 -38
  145. pulumi_vault/mount.py +391 -51
  146. pulumi_vault/namespace.py +68 -83
  147. pulumi_vault/nomad_secret_backend.py +18 -13
  148. pulumi_vault/nomad_secret_role.py +14 -9
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +485 -39
  151. pulumi_vault/okta/auth_backend_group.py +14 -9
  152. pulumi_vault/okta/auth_backend_user.py +14 -9
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +20 -13
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -9
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -8
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
  174. pulumi_vault/pkisecret/secret_backend_key.py +14 -9
  175. pulumi_vault/pkisecret/secret_backend_role.py +21 -14
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +14 -9
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +60 -6
  185. pulumi_vault/quota_rate_limit.py +56 -2
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +18 -13
  189. pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
  190. pulumi_vault/raft_autopilot.py +14 -9
  191. pulumi_vault/raft_snapshot_agent_config.py +129 -224
  192. pulumi_vault/rgp_policy.py +14 -9
  193. pulumi_vault/saml/auth_backend.py +22 -17
  194. pulumi_vault/saml/auth_backend_role.py +92 -197
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -71
  199. pulumi_vault/secrets/sync_aws_destination.py +242 -27
  200. pulumi_vault/secrets/sync_azure_destination.py +92 -31
  201. pulumi_vault/secrets/sync_config.py +9 -4
  202. pulumi_vault/secrets/sync_gcp_destination.py +158 -25
  203. pulumi_vault/secrets/sync_gh_destination.py +189 -13
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +74 -13
  206. pulumi_vault/ssh/_inputs.py +28 -28
  207. pulumi_vault/ssh/outputs.py +11 -28
  208. pulumi_vault/ssh/secret_backend_ca.py +108 -9
  209. pulumi_vault/ssh/secret_backend_role.py +85 -118
  210. pulumi_vault/terraformcloud/secret_backend.py +7 -54
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -20
  212. pulumi_vault/terraformcloud/secret_role.py +16 -74
  213. pulumi_vault/token.py +28 -23
  214. pulumi_vault/tokenauth/auth_backend_role.py +78 -199
  215. pulumi_vault/transform/alphabet.py +16 -9
  216. pulumi_vault/transform/get_decode.py +45 -17
  217. pulumi_vault/transform/get_encode.py +45 -17
  218. pulumi_vault/transform/role.py +16 -9
  219. pulumi_vault/transform/template.py +30 -21
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -21
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +27 -93
  224. pulumi_vault/transit/secret_cache_config.py +12 -7
  225. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
  from . import outputs
12
17
  from ._inputs import *
@@ -103,7 +108,7 @@ class SecretBackendRoleArgs:
103
108
  :param pulumi.Input[str] name: The name to identify this role within the backend. Must be unique within the backend.
104
109
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
105
110
  The value should not contain leading or trailing forward slashes.
106
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
111
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
107
112
  *Available only for Vault Enterprise*.
108
113
  :param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
109
114
  :param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
@@ -596,7 +601,7 @@ class SecretBackendRoleArgs:
596
601
  """
597
602
  The namespace to provision the resource in.
598
603
  The value should not contain leading or trailing forward slashes.
599
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
604
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
600
605
  *Available only for Vault Enterprise*.
601
606
  """
602
607
  return pulumi.get(self, "namespace")
@@ -864,7 +869,7 @@ class _SecretBackendRoleState:
864
869
  :param pulumi.Input[str] name: The name to identify this role within the backend. Must be unique within the backend.
865
870
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
866
871
  The value should not contain leading or trailing forward slashes.
867
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
872
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
868
873
  *Available only for Vault Enterprise*.
869
874
  :param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
870
875
  :param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
@@ -1358,7 +1363,7 @@ class _SecretBackendRoleState:
1358
1363
  """
1359
1364
  The namespace to provision the resource in.
1360
1365
  The value should not contain leading or trailing forward slashes.
1361
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1366
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1362
1367
  *Available only for Vault Enterprise*.
1363
1368
  """
1364
1369
  return pulumi.get(self, "namespace")
@@ -1577,7 +1582,7 @@ class SecretBackendRole(pulumi.CustomResource):
1577
1582
  not_before_duration: Optional[pulumi.Input[str]] = None,
1578
1583
  organization_unit: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1579
1584
  organizations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1580
- policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRolePolicyIdentifierArgs']]]]] = None,
1585
+ policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]]] = None,
1581
1586
  policy_identifiers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1582
1587
  postal_codes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1583
1588
  provinces: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
@@ -1604,6 +1609,7 @@ class SecretBackendRole(pulumi.CustomResource):
1604
1609
  max_lease_ttl_seconds=86400)
1605
1610
  role = vault.pki_secret.SecretBackendRole("role",
1606
1611
  backend=pki.path,
1612
+ name="my_role",
1607
1613
  ttl="3600",
1608
1614
  allow_ip_sans=True,
1609
1615
  key_type="rsa",
@@ -1620,7 +1626,7 @@ class SecretBackendRole(pulumi.CustomResource):
1620
1626
  PKI secret backend roles can be imported using the `path`, e.g.
1621
1627
 
1622
1628
  ```sh
1623
- $ pulumi import vault:pkiSecret/secretBackendRole:SecretBackendRole role pki/roles/my_role
1629
+ $ pulumi import vault:pkiSecret/secretBackendRole:SecretBackendRole role pki/roles/my_role
1624
1630
  ```
1625
1631
 
1626
1632
  :param str resource_name: The name of the resource.
@@ -1664,13 +1670,13 @@ class SecretBackendRole(pulumi.CustomResource):
1664
1670
  :param pulumi.Input[str] name: The name to identify this role within the backend. Must be unique within the backend.
1665
1671
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
1666
1672
  The value should not contain leading or trailing forward slashes.
1667
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1673
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1668
1674
  *Available only for Vault Enterprise*.
1669
1675
  :param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
1670
1676
  :param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
1671
1677
  :param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
1672
1678
  :param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
1673
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRolePolicyIdentifierArgs']]]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
1679
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
1674
1680
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policy_identifiers: Specify the list of allowed policies OIDs. Use with Vault 1.10 or before. For Vault 1.11+, use `policy_identifier` blocks instead
1675
1681
  :param pulumi.Input[Sequence[pulumi.Input[str]]] postal_codes: The postal code of generated certificates
1676
1682
  :param pulumi.Input[Sequence[pulumi.Input[str]]] provinces: The province of generated certificates
@@ -1703,6 +1709,7 @@ class SecretBackendRole(pulumi.CustomResource):
1703
1709
  max_lease_ttl_seconds=86400)
1704
1710
  role = vault.pki_secret.SecretBackendRole("role",
1705
1711
  backend=pki.path,
1712
+ name="my_role",
1706
1713
  ttl="3600",
1707
1714
  allow_ip_sans=True,
1708
1715
  key_type="rsa",
@@ -1719,7 +1726,7 @@ class SecretBackendRole(pulumi.CustomResource):
1719
1726
  PKI secret backend roles can be imported using the `path`, e.g.
1720
1727
 
1721
1728
  ```sh
1722
- $ pulumi import vault:pkiSecret/secretBackendRole:SecretBackendRole role pki/roles/my_role
1729
+ $ pulumi import vault:pkiSecret/secretBackendRole:SecretBackendRole role pki/roles/my_role
1723
1730
  ```
1724
1731
 
1725
1732
  :param str resource_name: The name of the resource.
@@ -1773,7 +1780,7 @@ class SecretBackendRole(pulumi.CustomResource):
1773
1780
  not_before_duration: Optional[pulumi.Input[str]] = None,
1774
1781
  organization_unit: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1775
1782
  organizations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1776
- policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRolePolicyIdentifierArgs']]]]] = None,
1783
+ policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]]] = None,
1777
1784
  policy_identifiers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1778
1785
  postal_codes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1779
1786
  provinces: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
@@ -1886,7 +1893,7 @@ class SecretBackendRole(pulumi.CustomResource):
1886
1893
  not_before_duration: Optional[pulumi.Input[str]] = None,
1887
1894
  organization_unit: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1888
1895
  organizations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1889
- policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRolePolicyIdentifierArgs']]]]] = None,
1896
+ policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]]] = None,
1890
1897
  policy_identifiers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1891
1898
  postal_codes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1892
1899
  provinces: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
@@ -1942,13 +1949,13 @@ class SecretBackendRole(pulumi.CustomResource):
1942
1949
  :param pulumi.Input[str] name: The name to identify this role within the backend. Must be unique within the backend.
1943
1950
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
1944
1951
  The value should not contain leading or trailing forward slashes.
1945
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1952
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1946
1953
  *Available only for Vault Enterprise*.
1947
1954
  :param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
1948
1955
  :param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
1949
1956
  :param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
1950
1957
  :param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
1951
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRolePolicyIdentifierArgs']]]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
1958
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
1952
1959
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policy_identifiers: Specify the list of allowed policies OIDs. Use with Vault 1.10 or before. For Vault 1.11+, use `policy_identifier` blocks instead
1953
1960
  :param pulumi.Input[Sequence[pulumi.Input[str]]] postal_codes: The postal code of generated certificates
1954
1961
  :param pulumi.Input[Sequence[pulumi.Input[str]]] provinces: The province of generated certificates
@@ -2271,7 +2278,7 @@ class SecretBackendRole(pulumi.CustomResource):
2271
2278
  """
2272
2279
  The namespace to provision the resource in.
2273
2280
  The value should not contain leading or trailing forward slashes.
2274
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
2281
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
2275
2282
  *Available only for Vault Enterprise*.
2276
2283
  """
2277
2284
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendRootCertArgs', 'SecretBackendRootCert']
@@ -69,7 +74,7 @@ class SecretBackendRootCertArgs:
69
74
  :param pulumi.Input[int] max_path_length: The maximum path length to encode in the generated certificate
70
75
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
71
76
  The value should not contain leading or trailing forward slashes.
72
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
77
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
73
78
  *Available only for Vault Enterprise*.
74
79
  :param pulumi.Input[str] organization: The organization
75
80
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
@@ -352,7 +357,7 @@ class SecretBackendRootCertArgs:
352
357
  """
353
358
  The namespace to provision the resource in.
354
359
  The value should not contain leading or trailing forward slashes.
355
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
360
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
356
361
  *Available only for Vault Enterprise*.
357
362
  """
358
363
  return pulumi.get(self, "namespace")
@@ -513,7 +518,6 @@ class _SecretBackendRootCertState:
513
518
  postal_code: Optional[pulumi.Input[str]] = None,
514
519
  private_key_format: Optional[pulumi.Input[str]] = None,
515
520
  province: Optional[pulumi.Input[str]] = None,
516
- serial: Optional[pulumi.Input[str]] = None,
517
521
  serial_number: Optional[pulumi.Input[str]] = None,
518
522
  street_address: Optional[pulumi.Input[str]] = None,
519
523
  ttl: Optional[pulumi.Input[str]] = None,
@@ -548,7 +552,7 @@ class _SecretBackendRootCertState:
548
552
  :param pulumi.Input[int] max_path_length: The maximum path length to encode in the generated certificate
549
553
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
550
554
  The value should not contain leading or trailing forward slashes.
551
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
555
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
552
556
  *Available only for Vault Enterprise*.
553
557
  :param pulumi.Input[str] organization: The organization
554
558
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
@@ -557,7 +561,6 @@ class _SecretBackendRootCertState:
557
561
  :param pulumi.Input[str] postal_code: The postal code
558
562
  :param pulumi.Input[str] private_key_format: The private key format
559
563
  :param pulumi.Input[str] province: The province
560
- :param pulumi.Input[str] serial: Deprecated, use `serial_number` instead.
561
564
  :param pulumi.Input[str] serial_number: The certificate's serial number, hex formatted.
562
565
  :param pulumi.Input[str] street_address: The street address
563
566
  :param pulumi.Input[str] ttl: Time to live
@@ -621,11 +624,6 @@ class _SecretBackendRootCertState:
621
624
  pulumi.set(__self__, "private_key_format", private_key_format)
622
625
  if province is not None:
623
626
  pulumi.set(__self__, "province", province)
624
- if serial is not None:
625
- warnings.warn("""Use serial_number instead""", DeprecationWarning)
626
- pulumi.log.warn("""serial is deprecated: Use serial_number instead""")
627
- if serial is not None:
628
- pulumi.set(__self__, "serial", serial)
629
627
  if serial_number is not None:
630
628
  pulumi.set(__self__, "serial_number", serial_number)
631
629
  if street_address is not None:
@@ -888,7 +886,7 @@ class _SecretBackendRootCertState:
888
886
  """
889
887
  The namespace to provision the resource in.
890
888
  The value should not contain leading or trailing forward slashes.
891
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
889
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
892
890
  *Available only for Vault Enterprise*.
893
891
  """
894
892
  return pulumi.get(self, "namespace")
@@ -981,21 +979,6 @@ class _SecretBackendRootCertState:
981
979
  def province(self, value: Optional[pulumi.Input[str]]):
982
980
  pulumi.set(self, "province", value)
983
981
 
984
- @property
985
- @pulumi.getter
986
- def serial(self) -> Optional[pulumi.Input[str]]:
987
- """
988
- Deprecated, use `serial_number` instead.
989
- """
990
- warnings.warn("""Use serial_number instead""", DeprecationWarning)
991
- pulumi.log.warn("""serial is deprecated: Use serial_number instead""")
992
-
993
- return pulumi.get(self, "serial")
994
-
995
- @serial.setter
996
- def serial(self, value: Optional[pulumi.Input[str]]):
997
- pulumi.set(self, "serial", value)
998
-
999
982
  @property
1000
983
  @pulumi.getter(name="serialNumber")
1001
984
  def serial_number(self) -> Optional[pulumi.Input[str]]:
@@ -1100,7 +1083,7 @@ class SecretBackendRootCert(pulumi.CustomResource):
1100
1083
  import pulumi_vault as vault
1101
1084
 
1102
1085
  test = vault.pki_secret.SecretBackendRootCert("test",
1103
- backend=vault_mount["pki"]["path"],
1086
+ backend=pki["path"],
1104
1087
  type="internal",
1105
1088
  common_name="Root CA",
1106
1089
  ttl="315360000",
@@ -1111,7 +1094,7 @@ class SecretBackendRootCert(pulumi.CustomResource):
1111
1094
  exclude_cn_from_sans=True,
1112
1095
  ou="My OU",
1113
1096
  organization="My organization",
1114
- opts=pulumi.ResourceOptions(depends_on=[vault_mount["pki"]]))
1097
+ opts = pulumi.ResourceOptions(depends_on=[pki]))
1115
1098
  ```
1116
1099
 
1117
1100
  :param str resource_name: The name of the resource.
@@ -1139,7 +1122,7 @@ class SecretBackendRootCert(pulumi.CustomResource):
1139
1122
  :param pulumi.Input[int] max_path_length: The maximum path length to encode in the generated certificate
1140
1123
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
1141
1124
  The value should not contain leading or trailing forward slashes.
1142
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1125
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1143
1126
  *Available only for Vault Enterprise*.
1144
1127
  :param pulumi.Input[str] organization: The organization
1145
1128
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
@@ -1168,7 +1151,7 @@ class SecretBackendRootCert(pulumi.CustomResource):
1168
1151
  import pulumi_vault as vault
1169
1152
 
1170
1153
  test = vault.pki_secret.SecretBackendRootCert("test",
1171
- backend=vault_mount["pki"]["path"],
1154
+ backend=pki["path"],
1172
1155
  type="internal",
1173
1156
  common_name="Root CA",
1174
1157
  ttl="315360000",
@@ -1179,7 +1162,7 @@ class SecretBackendRootCert(pulumi.CustomResource):
1179
1162
  exclude_cn_from_sans=True,
1180
1163
  ou="My OU",
1181
1164
  organization="My organization",
1182
- opts=pulumi.ResourceOptions(depends_on=[vault_mount["pki"]]))
1165
+ opts = pulumi.ResourceOptions(depends_on=[pki]))
1183
1166
  ```
1184
1167
 
1185
1168
  :param str resource_name: The name of the resource.
@@ -1272,7 +1255,6 @@ class SecretBackendRootCert(pulumi.CustomResource):
1272
1255
  __props__.__dict__["issuer_id"] = None
1273
1256
  __props__.__dict__["issuing_ca"] = None
1274
1257
  __props__.__dict__["key_id"] = None
1275
- __props__.__dict__["serial"] = None
1276
1258
  __props__.__dict__["serial_number"] = None
1277
1259
  super(SecretBackendRootCert, __self__).__init__(
1278
1260
  'vault:pkiSecret/secretBackendRootCert:SecretBackendRootCert',
@@ -1312,7 +1294,6 @@ class SecretBackendRootCert(pulumi.CustomResource):
1312
1294
  postal_code: Optional[pulumi.Input[str]] = None,
1313
1295
  private_key_format: Optional[pulumi.Input[str]] = None,
1314
1296
  province: Optional[pulumi.Input[str]] = None,
1315
- serial: Optional[pulumi.Input[str]] = None,
1316
1297
  serial_number: Optional[pulumi.Input[str]] = None,
1317
1298
  street_address: Optional[pulumi.Input[str]] = None,
1318
1299
  ttl: Optional[pulumi.Input[str]] = None,
@@ -1352,7 +1333,7 @@ class SecretBackendRootCert(pulumi.CustomResource):
1352
1333
  :param pulumi.Input[int] max_path_length: The maximum path length to encode in the generated certificate
1353
1334
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
1354
1335
  The value should not contain leading or trailing forward slashes.
1355
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1336
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1356
1337
  *Available only for Vault Enterprise*.
1357
1338
  :param pulumi.Input[str] organization: The organization
1358
1339
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
@@ -1361,7 +1342,6 @@ class SecretBackendRootCert(pulumi.CustomResource):
1361
1342
  :param pulumi.Input[str] postal_code: The postal code
1362
1343
  :param pulumi.Input[str] private_key_format: The private key format
1363
1344
  :param pulumi.Input[str] province: The province
1364
- :param pulumi.Input[str] serial: Deprecated, use `serial_number` instead.
1365
1345
  :param pulumi.Input[str] serial_number: The certificate's serial number, hex formatted.
1366
1346
  :param pulumi.Input[str] street_address: The street address
1367
1347
  :param pulumi.Input[str] ttl: Time to live
@@ -1401,7 +1381,6 @@ class SecretBackendRootCert(pulumi.CustomResource):
1401
1381
  __props__.__dict__["postal_code"] = postal_code
1402
1382
  __props__.__dict__["private_key_format"] = private_key_format
1403
1383
  __props__.__dict__["province"] = province
1404
- __props__.__dict__["serial"] = serial
1405
1384
  __props__.__dict__["serial_number"] = serial_number
1406
1385
  __props__.__dict__["street_address"] = street_address
1407
1386
  __props__.__dict__["ttl"] = ttl
@@ -1580,7 +1559,7 @@ class SecretBackendRootCert(pulumi.CustomResource):
1580
1559
  """
1581
1560
  The namespace to provision the resource in.
1582
1561
  The value should not contain leading or trailing forward slashes.
1583
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1562
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1584
1563
  *Available only for Vault Enterprise*.
1585
1564
  """
1586
1565
  return pulumi.get(self, "namespace")
@@ -1641,17 +1620,6 @@ class SecretBackendRootCert(pulumi.CustomResource):
1641
1620
  """
1642
1621
  return pulumi.get(self, "province")
1643
1622
 
1644
- @property
1645
- @pulumi.getter
1646
- def serial(self) -> pulumi.Output[str]:
1647
- """
1648
- Deprecated, use `serial_number` instead.
1649
- """
1650
- warnings.warn("""Use serial_number instead""", DeprecationWarning)
1651
- pulumi.log.warn("""serial is deprecated: Use serial_number instead""")
1652
-
1653
- return pulumi.get(self, "serial")
1654
-
1655
1623
  @property
1656
1624
  @pulumi.getter(name="serialNumber")
1657
1625
  def serial_number(self) -> pulumi.Output[str]:
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendRootSignIntermediateArgs', 'SecretBackendRootSignIntermediate']
@@ -55,7 +60,7 @@ class SecretBackendRootSignIntermediateArgs:
55
60
  :param pulumi.Input[int] max_path_length: The maximum path length to encode in the generated certificate
56
61
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
57
62
  The value should not contain leading or trailing forward slashes.
58
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
63
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
59
64
  *Available only for Vault Enterprise*.
60
65
  :param pulumi.Input[str] organization: The organization
61
66
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
@@ -254,7 +259,7 @@ class SecretBackendRootSignIntermediateArgs:
254
259
  """
255
260
  The namespace to provision the resource in.
256
261
  The value should not contain leading or trailing forward slashes.
257
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
262
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
258
263
  *Available only for Vault Enterprise*.
259
264
  """
260
265
  return pulumi.get(self, "namespace")
@@ -422,7 +427,6 @@ class _SecretBackendRootSignIntermediateState:
422
427
  postal_code: Optional[pulumi.Input[str]] = None,
423
428
  province: Optional[pulumi.Input[str]] = None,
424
429
  revoke: Optional[pulumi.Input[bool]] = None,
425
- serial: Optional[pulumi.Input[str]] = None,
426
430
  serial_number: Optional[pulumi.Input[str]] = None,
427
431
  street_address: Optional[pulumi.Input[str]] = None,
428
432
  ttl: Optional[pulumi.Input[str]] = None,
@@ -451,7 +455,7 @@ class _SecretBackendRootSignIntermediateState:
451
455
  :param pulumi.Input[int] max_path_length: The maximum path length to encode in the generated certificate
452
456
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
453
457
  The value should not contain leading or trailing forward slashes.
454
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
458
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
455
459
  *Available only for Vault Enterprise*.
456
460
  :param pulumi.Input[str] organization: The organization
457
461
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
@@ -460,7 +464,6 @@ class _SecretBackendRootSignIntermediateState:
460
464
  :param pulumi.Input[str] postal_code: The postal code
461
465
  :param pulumi.Input[str] province: The province
462
466
  :param pulumi.Input[bool] revoke: If set to `true`, the certificate will be revoked on resource destruction.
463
- :param pulumi.Input[str] serial: The serial number.
464
467
  :param pulumi.Input[str] serial_number: The certificate's serial number, hex formatted.
465
468
  :param pulumi.Input[str] street_address: The street address
466
469
  :param pulumi.Input[str] ttl: Time to live
@@ -513,11 +516,6 @@ class _SecretBackendRootSignIntermediateState:
513
516
  pulumi.set(__self__, "province", province)
514
517
  if revoke is not None:
515
518
  pulumi.set(__self__, "revoke", revoke)
516
- if serial is not None:
517
- warnings.warn("""Use serial_number instead""", DeprecationWarning)
518
- pulumi.log.warn("""serial is deprecated: Use serial_number instead""")
519
- if serial is not None:
520
- pulumi.set(__self__, "serial", serial)
521
519
  if serial_number is not None:
522
520
  pulumi.set(__self__, "serial_number", serial_number)
523
521
  if street_address is not None:
@@ -719,7 +717,7 @@ class _SecretBackendRootSignIntermediateState:
719
717
  """
720
718
  The namespace to provision the resource in.
721
719
  The value should not contain leading or trailing forward slashes.
722
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
720
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
723
721
  *Available only for Vault Enterprise*.
724
722
  """
725
723
  return pulumi.get(self, "namespace")
@@ -812,21 +810,6 @@ class _SecretBackendRootSignIntermediateState:
812
810
  def revoke(self, value: Optional[pulumi.Input[bool]]):
813
811
  pulumi.set(self, "revoke", value)
814
812
 
815
- @property
816
- @pulumi.getter
817
- def serial(self) -> Optional[pulumi.Input[str]]:
818
- """
819
- The serial number.
820
- """
821
- warnings.warn("""Use serial_number instead""", DeprecationWarning)
822
- pulumi.log.warn("""serial is deprecated: Use serial_number instead""")
823
-
824
- return pulumi.get(self, "serial")
825
-
826
- @serial.setter
827
- def serial(self, value: Optional[pulumi.Input[str]]):
828
- pulumi.set(self, "serial", value)
829
-
830
813
  @property
831
814
  @pulumi.getter(name="serialNumber")
832
815
  def serial_number(self) -> Optional[pulumi.Input[str]]:
@@ -927,17 +910,14 @@ class SecretBackendRootSignIntermediate(pulumi.CustomResource):
927
910
  import pulumi_vault as vault
928
911
 
929
912
  root = vault.pki_secret.SecretBackendRootSignIntermediate("root",
930
- backend=vault_mount["root"]["path"],
931
- csr=vault_pki_secret_backend_intermediate_cert_request["intermediate"]["csr"],
913
+ backend=root_vault_mount["path"],
914
+ csr=intermediate["csr"],
932
915
  common_name="Intermediate CA",
933
916
  exclude_cn_from_sans=True,
934
917
  ou="My OU",
935
918
  organization="My organization",
936
- opts=pulumi.ResourceOptions(depends_on=[vault_pki_secret_backend_intermediate_cert_request["intermediate"]]))
919
+ opts = pulumi.ResourceOptions(depends_on=[intermediate]))
937
920
  ```
938
- ## Deprecations
939
-
940
- * `serial` - Use `serial_number` instead.
941
921
 
942
922
  :param str resource_name: The name of the resource.
943
923
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -957,7 +937,7 @@ class SecretBackendRootSignIntermediate(pulumi.CustomResource):
957
937
  :param pulumi.Input[int] max_path_length: The maximum path length to encode in the generated certificate
958
938
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
959
939
  The value should not contain leading or trailing forward slashes.
960
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
940
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
961
941
  *Available only for Vault Enterprise*.
962
942
  :param pulumi.Input[str] organization: The organization
963
943
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
@@ -987,17 +967,14 @@ class SecretBackendRootSignIntermediate(pulumi.CustomResource):
987
967
  import pulumi_vault as vault
988
968
 
989
969
  root = vault.pki_secret.SecretBackendRootSignIntermediate("root",
990
- backend=vault_mount["root"]["path"],
991
- csr=vault_pki_secret_backend_intermediate_cert_request["intermediate"]["csr"],
970
+ backend=root_vault_mount["path"],
971
+ csr=intermediate["csr"],
992
972
  common_name="Intermediate CA",
993
973
  exclude_cn_from_sans=True,
994
974
  ou="My OU",
995
975
  organization="My organization",
996
- opts=pulumi.ResourceOptions(depends_on=[vault_pki_secret_backend_intermediate_cert_request["intermediate"]]))
976
+ opts = pulumi.ResourceOptions(depends_on=[intermediate]))
997
977
  ```
998
- ## Deprecations
999
-
1000
- * `serial` - Use `serial_number` instead.
1001
978
 
1002
979
  :param str resource_name: The name of the resource.
1003
980
  :param SecretBackendRootSignIntermediateArgs args: The arguments to use to populate this resource's properties.
@@ -1079,7 +1056,6 @@ class SecretBackendRootSignIntermediate(pulumi.CustomResource):
1079
1056
  __props__.__dict__["certificate"] = None
1080
1057
  __props__.__dict__["certificate_bundle"] = None
1081
1058
  __props__.__dict__["issuing_ca"] = None
1082
- __props__.__dict__["serial"] = None
1083
1059
  __props__.__dict__["serial_number"] = None
1084
1060
  super(SecretBackendRootSignIntermediate, __self__).__init__(
1085
1061
  'vault:pkiSecret/secretBackendRootSignIntermediate:SecretBackendRootSignIntermediate',
@@ -1114,7 +1090,6 @@ class SecretBackendRootSignIntermediate(pulumi.CustomResource):
1114
1090
  postal_code: Optional[pulumi.Input[str]] = None,
1115
1091
  province: Optional[pulumi.Input[str]] = None,
1116
1092
  revoke: Optional[pulumi.Input[bool]] = None,
1117
- serial: Optional[pulumi.Input[str]] = None,
1118
1093
  serial_number: Optional[pulumi.Input[str]] = None,
1119
1094
  street_address: Optional[pulumi.Input[str]] = None,
1120
1095
  ttl: Optional[pulumi.Input[str]] = None,
@@ -1148,7 +1123,7 @@ class SecretBackendRootSignIntermediate(pulumi.CustomResource):
1148
1123
  :param pulumi.Input[int] max_path_length: The maximum path length to encode in the generated certificate
1149
1124
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
1150
1125
  The value should not contain leading or trailing forward slashes.
1151
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1126
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1152
1127
  *Available only for Vault Enterprise*.
1153
1128
  :param pulumi.Input[str] organization: The organization
1154
1129
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
@@ -1157,7 +1132,6 @@ class SecretBackendRootSignIntermediate(pulumi.CustomResource):
1157
1132
  :param pulumi.Input[str] postal_code: The postal code
1158
1133
  :param pulumi.Input[str] province: The province
1159
1134
  :param pulumi.Input[bool] revoke: If set to `true`, the certificate will be revoked on resource destruction.
1160
- :param pulumi.Input[str] serial: The serial number.
1161
1135
  :param pulumi.Input[str] serial_number: The certificate's serial number, hex formatted.
1162
1136
  :param pulumi.Input[str] street_address: The street address
1163
1137
  :param pulumi.Input[str] ttl: Time to live
@@ -1191,7 +1165,6 @@ class SecretBackendRootSignIntermediate(pulumi.CustomResource):
1191
1165
  __props__.__dict__["postal_code"] = postal_code
1192
1166
  __props__.__dict__["province"] = province
1193
1167
  __props__.__dict__["revoke"] = revoke
1194
- __props__.__dict__["serial"] = serial
1195
1168
  __props__.__dict__["serial_number"] = serial_number
1196
1169
  __props__.__dict__["street_address"] = street_address
1197
1170
  __props__.__dict__["ttl"] = ttl
@@ -1329,7 +1302,7 @@ class SecretBackendRootSignIntermediate(pulumi.CustomResource):
1329
1302
  """
1330
1303
  The namespace to provision the resource in.
1331
1304
  The value should not contain leading or trailing forward slashes.
1332
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1305
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1333
1306
  *Available only for Vault Enterprise*.
1334
1307
  """
1335
1308
  return pulumi.get(self, "namespace")
@@ -1390,17 +1363,6 @@ class SecretBackendRootSignIntermediate(pulumi.CustomResource):
1390
1363
  """
1391
1364
  return pulumi.get(self, "revoke")
1392
1365
 
1393
- @property
1394
- @pulumi.getter
1395
- def serial(self) -> pulumi.Output[str]:
1396
- """
1397
- The serial number.
1398
- """
1399
- warnings.warn("""Use serial_number instead""", DeprecationWarning)
1400
- pulumi.log.warn("""serial is deprecated: Use serial_number instead""")
1401
-
1402
- return pulumi.get(self, "serial")
1403
-
1404
1366
  @property
1405
1367
  @pulumi.getter(name="serialNumber")
1406
1368
  def serial_number(self) -> pulumi.Output[str]: