pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +26 -9
  5. pulumi_vault/ad/secret_backend.py +16 -142
  6. pulumi_vault/ad/secret_library.py +16 -9
  7. pulumi_vault/ad/secret_role.py +14 -9
  8. pulumi_vault/alicloud/auth_backend_role.py +76 -190
  9. pulumi_vault/approle/auth_backend_login.py +12 -7
  10. pulumi_vault/approle/auth_backend_role.py +77 -191
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
  13. pulumi_vault/audit.py +30 -21
  14. pulumi_vault/audit_request_header.py +11 -2
  15. pulumi_vault/auth_backend.py +66 -14
  16. pulumi_vault/aws/auth_backend_cert.py +18 -9
  17. pulumi_vault/aws/auth_backend_client.py +267 -22
  18. pulumi_vault/aws/auth_backend_config_identity.py +14 -9
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +77 -191
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
  24. pulumi_vault/aws/auth_backend_sts_role.py +14 -9
  25. pulumi_vault/aws/get_access_credentials.py +38 -9
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +77 -9
  28. pulumi_vault/aws/secret_backend_role.py +185 -9
  29. pulumi_vault/aws/secret_backend_static_role.py +20 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +153 -15
  32. pulumi_vault/azure/auth_backend_role.py +77 -191
  33. pulumi_vault/azure/backend.py +227 -21
  34. pulumi_vault/azure/backend_role.py +42 -37
  35. pulumi_vault/azure/get_access_credentials.py +41 -7
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -267
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +28 -19
  44. pulumi_vault/consul/secret_backend_role.py +18 -78
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +119 -112
  48. pulumi_vault/database/secret_backend_role.py +31 -22
  49. pulumi_vault/database/secret_backend_static_role.py +87 -13
  50. pulumi_vault/database/secrets_mount.py +427 -136
  51. pulumi_vault/egp_policy.py +16 -11
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +250 -33
  54. pulumi_vault/gcp/auth_backend_role.py +77 -269
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -5
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -12
  58. pulumi_vault/gcp/secret_impersonated_account.py +76 -15
  59. pulumi_vault/gcp/secret_roleset.py +31 -24
  60. pulumi_vault/gcp/secret_static_account.py +39 -32
  61. pulumi_vault/generic/endpoint.py +24 -17
  62. pulumi_vault/generic/get_secret.py +64 -8
  63. pulumi_vault/generic/secret.py +21 -16
  64. pulumi_vault/get_auth_backend.py +24 -7
  65. pulumi_vault/get_auth_backends.py +51 -9
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -11
  69. pulumi_vault/get_policy_document.py +34 -19
  70. pulumi_vault/get_raft_autopilot_state.py +29 -10
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +19 -14
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +16 -11
  75. pulumi_vault/github/user.py +16 -11
  76. pulumi_vault/identity/entity.py +20 -13
  77. pulumi_vault/identity/entity_alias.py +20 -13
  78. pulumi_vault/identity/entity_policies.py +28 -11
  79. pulumi_vault/identity/get_entity.py +42 -10
  80. pulumi_vault/identity/get_group.py +47 -9
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -7
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -9
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -10
  84. pulumi_vault/identity/group.py +58 -39
  85. pulumi_vault/identity/group_alias.py +16 -9
  86. pulumi_vault/identity/group_member_entity_ids.py +28 -66
  87. pulumi_vault/identity/group_member_group_ids.py +40 -19
  88. pulumi_vault/identity/group_policies.py +20 -7
  89. pulumi_vault/identity/mfa_duo.py +11 -6
  90. pulumi_vault/identity/mfa_login_enforcement.py +15 -6
  91. pulumi_vault/identity/mfa_okta.py +11 -6
  92. pulumi_vault/identity/mfa_pingid.py +7 -2
  93. pulumi_vault/identity/mfa_totp.py +7 -2
  94. pulumi_vault/identity/oidc.py +12 -7
  95. pulumi_vault/identity/oidc_assignment.py +24 -11
  96. pulumi_vault/identity/oidc_client.py +36 -23
  97. pulumi_vault/identity/oidc_key.py +30 -17
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
  99. pulumi_vault/identity/oidc_provider.py +36 -21
  100. pulumi_vault/identity/oidc_role.py +42 -21
  101. pulumi_vault/identity/oidc_scope.py +20 -13
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +45 -40
  105. pulumi_vault/jwt/auth_backend_role.py +133 -254
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +24 -19
  108. pulumi_vault/kmip/secret_role.py +14 -9
  109. pulumi_vault/kmip/secret_scope.py +14 -9
  110. pulumi_vault/kubernetes/auth_backend_config.py +57 -5
  111. pulumi_vault/kubernetes/auth_backend_role.py +70 -177
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -11
  115. pulumi_vault/kubernetes/secret_backend.py +316 -27
  116. pulumi_vault/kubernetes/secret_backend_role.py +137 -46
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +25 -8
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
  120. pulumi_vault/kv/get_secret_v2.py +85 -9
  121. pulumi_vault/kv/get_secrets_list.py +24 -11
  122. pulumi_vault/kv/get_secrets_list_v2.py +37 -15
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +23 -16
  125. pulumi_vault/kv/secret_backend_v2.py +20 -11
  126. pulumi_vault/kv/secret_v2.py +59 -50
  127. pulumi_vault/ldap/auth_backend.py +127 -166
  128. pulumi_vault/ldap/auth_backend_group.py +14 -9
  129. pulumi_vault/ldap/auth_backend_user.py +14 -9
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +354 -82
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +16 -9
  135. pulumi_vault/ldap/secret_backend_static_role.py +73 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +29 -57
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +18 -11
  140. pulumi_vault/mfa_okta.py +18 -11
  141. pulumi_vault/mfa_pingid.py +18 -11
  142. pulumi_vault/mfa_totp.py +24 -17
  143. pulumi_vault/mongodbatlas/secret_backend.py +20 -15
  144. pulumi_vault/mongodbatlas/secret_role.py +47 -38
  145. pulumi_vault/mount.py +391 -51
  146. pulumi_vault/namespace.py +68 -83
  147. pulumi_vault/nomad_secret_backend.py +18 -13
  148. pulumi_vault/nomad_secret_role.py +14 -9
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +485 -39
  151. pulumi_vault/okta/auth_backend_group.py +14 -9
  152. pulumi_vault/okta/auth_backend_user.py +14 -9
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +20 -13
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -9
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -8
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
  174. pulumi_vault/pkisecret/secret_backend_key.py +14 -9
  175. pulumi_vault/pkisecret/secret_backend_role.py +21 -14
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +14 -9
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +60 -6
  185. pulumi_vault/quota_rate_limit.py +56 -2
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +18 -13
  189. pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
  190. pulumi_vault/raft_autopilot.py +14 -9
  191. pulumi_vault/raft_snapshot_agent_config.py +129 -224
  192. pulumi_vault/rgp_policy.py +14 -9
  193. pulumi_vault/saml/auth_backend.py +22 -17
  194. pulumi_vault/saml/auth_backend_role.py +92 -197
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -71
  199. pulumi_vault/secrets/sync_aws_destination.py +242 -27
  200. pulumi_vault/secrets/sync_azure_destination.py +92 -31
  201. pulumi_vault/secrets/sync_config.py +9 -4
  202. pulumi_vault/secrets/sync_gcp_destination.py +158 -25
  203. pulumi_vault/secrets/sync_gh_destination.py +189 -13
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +74 -13
  206. pulumi_vault/ssh/_inputs.py +28 -28
  207. pulumi_vault/ssh/outputs.py +11 -28
  208. pulumi_vault/ssh/secret_backend_ca.py +108 -9
  209. pulumi_vault/ssh/secret_backend_role.py +85 -118
  210. pulumi_vault/terraformcloud/secret_backend.py +7 -54
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -20
  212. pulumi_vault/terraformcloud/secret_role.py +16 -74
  213. pulumi_vault/token.py +28 -23
  214. pulumi_vault/tokenauth/auth_backend_role.py +78 -199
  215. pulumi_vault/transform/alphabet.py +16 -9
  216. pulumi_vault/transform/get_decode.py +45 -17
  217. pulumi_vault/transform/get_encode.py +45 -17
  218. pulumi_vault/transform/role.py +16 -9
  219. pulumi_vault/transform/template.py +30 -21
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -21
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +27 -93
  224. pulumi_vault/transit/secret_cache_config.py +12 -7
  225. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendSignArgs', 'SecretBackendSign']
@@ -47,7 +52,7 @@ class SecretBackendSignArgs:
47
52
  :param pulumi.Input[str] name: Name of the role to create the certificate against
48
53
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
49
54
  The value should not contain leading or trailing forward slashes.
50
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
55
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
51
56
  *Available only for Vault Enterprise*.
52
57
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
53
58
  :param pulumi.Input[str] ttl: Time to live
@@ -222,7 +227,7 @@ class SecretBackendSignArgs:
222
227
  """
223
228
  The namespace to provision the resource in.
224
229
  The value should not contain leading or trailing forward slashes.
225
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
230
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
226
231
  *Available only for Vault Enterprise*.
227
232
  """
228
233
  return pulumi.get(self, "namespace")
@@ -289,7 +294,6 @@ class _SecretBackendSignState:
289
294
  namespace: Optional[pulumi.Input[str]] = None,
290
295
  other_sans: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
291
296
  renew_pending: Optional[pulumi.Input[bool]] = None,
292
- serial: Optional[pulumi.Input[str]] = None,
293
297
  serial_number: Optional[pulumi.Input[str]] = None,
294
298
  ttl: Optional[pulumi.Input[str]] = None,
295
299
  uri_sans: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
@@ -315,11 +319,10 @@ class _SecretBackendSignState:
315
319
  :param pulumi.Input[str] name: Name of the role to create the certificate against
316
320
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
317
321
  The value should not contain leading or trailing forward slashes.
318
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
322
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
319
323
  *Available only for Vault Enterprise*.
320
324
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
321
325
  :param pulumi.Input[bool] renew_pending: `true` if the current time (during refresh) is after the start of the early renewal window declared by `min_seconds_remaining`, and `false` otherwise; if `auto_renew` is set to `true` then the provider will plan to replace the certificate once renewal is pending.
322
- :param pulumi.Input[str] serial: The serial number.
323
326
  :param pulumi.Input[str] serial_number: The certificate's serial number, hex formatted.
324
327
  :param pulumi.Input[str] ttl: Time to live
325
328
  :param pulumi.Input[Sequence[pulumi.Input[str]]] uri_sans: List of alternative URIs
@@ -360,11 +363,6 @@ class _SecretBackendSignState:
360
363
  pulumi.set(__self__, "other_sans", other_sans)
361
364
  if renew_pending is not None:
362
365
  pulumi.set(__self__, "renew_pending", renew_pending)
363
- if serial is not None:
364
- warnings.warn("""Use serial_number instead""", DeprecationWarning)
365
- pulumi.log.warn("""serial is deprecated: Use serial_number instead""")
366
- if serial is not None:
367
- pulumi.set(__self__, "serial", serial)
368
366
  if serial_number is not None:
369
367
  pulumi.set(__self__, "serial_number", serial_number)
370
368
  if ttl is not None:
@@ -561,7 +559,7 @@ class _SecretBackendSignState:
561
559
  """
562
560
  The namespace to provision the resource in.
563
561
  The value should not contain leading or trailing forward slashes.
564
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
562
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
565
563
  *Available only for Vault Enterprise*.
566
564
  """
567
565
  return pulumi.get(self, "namespace")
@@ -594,21 +592,6 @@ class _SecretBackendSignState:
594
592
  def renew_pending(self, value: Optional[pulumi.Input[bool]]):
595
593
  pulumi.set(self, "renew_pending", value)
596
594
 
597
- @property
598
- @pulumi.getter
599
- def serial(self) -> Optional[pulumi.Input[str]]:
600
- """
601
- The serial number.
602
- """
603
- warnings.warn("""Use serial_number instead""", DeprecationWarning)
604
- pulumi.log.warn("""serial is deprecated: Use serial_number instead""")
605
-
606
- return pulumi.get(self, "serial")
607
-
608
- @serial.setter
609
- def serial(self, value: Optional[pulumi.Input[str]]):
610
- pulumi.set(self, "serial", value)
611
-
612
595
  @property
613
596
  @pulumi.getter(name="serialNumber")
614
597
  def serial_number(self) -> Optional[pulumi.Input[str]]:
@@ -675,7 +658,8 @@ class SecretBackendSign(pulumi.CustomResource):
675
658
  import pulumi_vault as vault
676
659
 
677
660
  test = vault.pki_secret.SecretBackendSign("test",
678
- backend=vault_mount["pki"]["path"],
661
+ backend=pki["path"],
662
+ name=admin["name"],
679
663
  csr=\"\"\"-----BEGIN CERTIFICATE REQUEST-----
680
664
  MIIEqDCCApACAQAwYzELMAkGA1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3RhdGUx
681
665
  ITAfBgNVBAoMGEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZDEcMBoGA1UEAwwTY2Vy
@@ -705,11 +689,8 @@ class SecretBackendSign(pulumi.CustomResource):
705
689
  -----END CERTIFICATE REQUEST-----
706
690
  \"\"\",
707
691
  common_name="test.my.domain",
708
- opts=pulumi.ResourceOptions(depends_on=[vault_pki_secret_backend_role["admin"]]))
692
+ opts = pulumi.ResourceOptions(depends_on=[admin]))
709
693
  ```
710
- ## Deprecations
711
-
712
- * `serial` - Use `serial_number` instead.
713
694
 
714
695
  :param str resource_name: The name of the resource.
715
696
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -729,7 +710,7 @@ class SecretBackendSign(pulumi.CustomResource):
729
710
  :param pulumi.Input[str] name: Name of the role to create the certificate against
730
711
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
731
712
  The value should not contain leading or trailing forward slashes.
732
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
713
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
733
714
  *Available only for Vault Enterprise*.
734
715
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
735
716
  :param pulumi.Input[str] ttl: Time to live
@@ -749,7 +730,8 @@ class SecretBackendSign(pulumi.CustomResource):
749
730
  import pulumi_vault as vault
750
731
 
751
732
  test = vault.pki_secret.SecretBackendSign("test",
752
- backend=vault_mount["pki"]["path"],
733
+ backend=pki["path"],
734
+ name=admin["name"],
753
735
  csr=\"\"\"-----BEGIN CERTIFICATE REQUEST-----
754
736
  MIIEqDCCApACAQAwYzELMAkGA1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3RhdGUx
755
737
  ITAfBgNVBAoMGEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZDEcMBoGA1UEAwwTY2Vy
@@ -779,11 +761,8 @@ class SecretBackendSign(pulumi.CustomResource):
779
761
  -----END CERTIFICATE REQUEST-----
780
762
  \"\"\",
781
763
  common_name="test.my.domain",
782
- opts=pulumi.ResourceOptions(depends_on=[vault_pki_secret_backend_role["admin"]]))
764
+ opts = pulumi.ResourceOptions(depends_on=[admin]))
783
765
  ```
784
- ## Deprecations
785
-
786
- * `serial` - Use `serial_number` instead.
787
766
 
788
767
  :param str resource_name: The name of the resource.
789
768
  :param SecretBackendSignArgs args: The arguments to use to populate this resource's properties.
@@ -850,7 +829,6 @@ class SecretBackendSign(pulumi.CustomResource):
850
829
  __props__.__dict__["expiration"] = None
851
830
  __props__.__dict__["issuing_ca"] = None
852
831
  __props__.__dict__["renew_pending"] = None
853
- __props__.__dict__["serial"] = None
854
832
  __props__.__dict__["serial_number"] = None
855
833
  super(SecretBackendSign, __self__).__init__(
856
834
  'vault:pkiSecret/secretBackendSign:SecretBackendSign',
@@ -880,7 +858,6 @@ class SecretBackendSign(pulumi.CustomResource):
880
858
  namespace: Optional[pulumi.Input[str]] = None,
881
859
  other_sans: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
882
860
  renew_pending: Optional[pulumi.Input[bool]] = None,
883
- serial: Optional[pulumi.Input[str]] = None,
884
861
  serial_number: Optional[pulumi.Input[str]] = None,
885
862
  ttl: Optional[pulumi.Input[str]] = None,
886
863
  uri_sans: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None) -> 'SecretBackendSign':
@@ -911,11 +888,10 @@ class SecretBackendSign(pulumi.CustomResource):
911
888
  :param pulumi.Input[str] name: Name of the role to create the certificate against
912
889
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
913
890
  The value should not contain leading or trailing forward slashes.
914
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
891
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
915
892
  *Available only for Vault Enterprise*.
916
893
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
917
894
  :param pulumi.Input[bool] renew_pending: `true` if the current time (during refresh) is after the start of the early renewal window declared by `min_seconds_remaining`, and `false` otherwise; if `auto_renew` is set to `true` then the provider will plan to replace the certificate once renewal is pending.
918
- :param pulumi.Input[str] serial: The serial number.
919
895
  :param pulumi.Input[str] serial_number: The certificate's serial number, hex formatted.
920
896
  :param pulumi.Input[str] ttl: Time to live
921
897
  :param pulumi.Input[Sequence[pulumi.Input[str]]] uri_sans: List of alternative URIs
@@ -942,7 +918,6 @@ class SecretBackendSign(pulumi.CustomResource):
942
918
  __props__.__dict__["namespace"] = namespace
943
919
  __props__.__dict__["other_sans"] = other_sans
944
920
  __props__.__dict__["renew_pending"] = renew_pending
945
- __props__.__dict__["serial"] = serial
946
921
  __props__.__dict__["serial_number"] = serial_number
947
922
  __props__.__dict__["ttl"] = ttl
948
923
  __props__.__dict__["uri_sans"] = uri_sans
@@ -1077,7 +1052,7 @@ class SecretBackendSign(pulumi.CustomResource):
1077
1052
  """
1078
1053
  The namespace to provision the resource in.
1079
1054
  The value should not contain leading or trailing forward slashes.
1080
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1055
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1081
1056
  *Available only for Vault Enterprise*.
1082
1057
  """
1083
1058
  return pulumi.get(self, "namespace")
@@ -1098,17 +1073,6 @@ class SecretBackendSign(pulumi.CustomResource):
1098
1073
  """
1099
1074
  return pulumi.get(self, "renew_pending")
1100
1075
 
1101
- @property
1102
- @pulumi.getter
1103
- def serial(self) -> pulumi.Output[str]:
1104
- """
1105
- The serial number.
1106
- """
1107
- warnings.warn("""Use serial_number instead""", DeprecationWarning)
1108
- pulumi.log.warn("""serial is deprecated: Use serial_number instead""")
1109
-
1110
- return pulumi.get(self, "serial")
1111
-
1112
1076
  @property
1113
1077
  @pulumi.getter(name="serialNumber")
1114
1078
  def serial_number(self) -> pulumi.Output[str]: