pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +52 -0
- pulumi_vault/_inputs.py +560 -0
- pulumi_vault/_utilities.py +41 -5
- pulumi_vault/ad/get_access_credentials.py +26 -9
- pulumi_vault/ad/secret_backend.py +16 -142
- pulumi_vault/ad/secret_library.py +16 -9
- pulumi_vault/ad/secret_role.py +14 -9
- pulumi_vault/alicloud/auth_backend_role.py +76 -190
- pulumi_vault/approle/auth_backend_login.py +12 -7
- pulumi_vault/approle/auth_backend_role.py +77 -191
- pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
- pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
- pulumi_vault/audit.py +30 -21
- pulumi_vault/audit_request_header.py +11 -2
- pulumi_vault/auth_backend.py +66 -14
- pulumi_vault/aws/auth_backend_cert.py +18 -9
- pulumi_vault/aws/auth_backend_client.py +267 -22
- pulumi_vault/aws/auth_backend_config_identity.py +14 -9
- pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
- pulumi_vault/aws/auth_backend_login.py +19 -22
- pulumi_vault/aws/auth_backend_role.py +77 -191
- pulumi_vault/aws/auth_backend_role_tag.py +12 -7
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
- pulumi_vault/aws/auth_backend_sts_role.py +14 -9
- pulumi_vault/aws/get_access_credentials.py +38 -9
- pulumi_vault/aws/get_static_access_credentials.py +19 -5
- pulumi_vault/aws/secret_backend.py +77 -9
- pulumi_vault/aws/secret_backend_role.py +185 -9
- pulumi_vault/aws/secret_backend_static_role.py +20 -11
- pulumi_vault/azure/_inputs.py +24 -0
- pulumi_vault/azure/auth_backend_config.py +153 -15
- pulumi_vault/azure/auth_backend_role.py +77 -191
- pulumi_vault/azure/backend.py +227 -21
- pulumi_vault/azure/backend_role.py +42 -37
- pulumi_vault/azure/get_access_credentials.py +41 -7
- pulumi_vault/azure/outputs.py +5 -0
- pulumi_vault/cert_auth_backend_role.py +87 -267
- pulumi_vault/config/__init__.pyi +5 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +35 -0
- pulumi_vault/config/ui_custom_message.py +529 -0
- pulumi_vault/config/vars.py +5 -0
- pulumi_vault/consul/secret_backend.py +28 -19
- pulumi_vault/consul/secret_backend_role.py +18 -78
- pulumi_vault/database/_inputs.py +2770 -881
- pulumi_vault/database/outputs.py +721 -838
- pulumi_vault/database/secret_backend_connection.py +119 -112
- pulumi_vault/database/secret_backend_role.py +31 -22
- pulumi_vault/database/secret_backend_static_role.py +87 -13
- pulumi_vault/database/secrets_mount.py +427 -136
- pulumi_vault/egp_policy.py +16 -11
- pulumi_vault/gcp/_inputs.py +111 -0
- pulumi_vault/gcp/auth_backend.py +250 -33
- pulumi_vault/gcp/auth_backend_role.py +77 -269
- pulumi_vault/gcp/get_auth_backend_role.py +43 -5
- pulumi_vault/gcp/outputs.py +5 -0
- pulumi_vault/gcp/secret_backend.py +287 -12
- pulumi_vault/gcp/secret_impersonated_account.py +76 -15
- pulumi_vault/gcp/secret_roleset.py +31 -24
- pulumi_vault/gcp/secret_static_account.py +39 -32
- pulumi_vault/generic/endpoint.py +24 -17
- pulumi_vault/generic/get_secret.py +64 -8
- pulumi_vault/generic/secret.py +21 -16
- pulumi_vault/get_auth_backend.py +24 -7
- pulumi_vault/get_auth_backends.py +51 -9
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +153 -0
- pulumi_vault/get_nomad_access_token.py +31 -11
- pulumi_vault/get_policy_document.py +34 -19
- pulumi_vault/get_raft_autopilot_state.py +29 -10
- pulumi_vault/github/_inputs.py +55 -0
- pulumi_vault/github/auth_backend.py +19 -14
- pulumi_vault/github/outputs.py +5 -0
- pulumi_vault/github/team.py +16 -11
- pulumi_vault/github/user.py +16 -11
- pulumi_vault/identity/entity.py +20 -13
- pulumi_vault/identity/entity_alias.py +20 -13
- pulumi_vault/identity/entity_policies.py +28 -11
- pulumi_vault/identity/get_entity.py +42 -10
- pulumi_vault/identity/get_group.py +47 -9
- pulumi_vault/identity/get_oidc_client_creds.py +21 -7
- pulumi_vault/identity/get_oidc_openid_config.py +39 -9
- pulumi_vault/identity/get_oidc_public_keys.py +29 -10
- pulumi_vault/identity/group.py +58 -39
- pulumi_vault/identity/group_alias.py +16 -9
- pulumi_vault/identity/group_member_entity_ids.py +28 -66
- pulumi_vault/identity/group_member_group_ids.py +40 -19
- pulumi_vault/identity/group_policies.py +20 -7
- pulumi_vault/identity/mfa_duo.py +11 -6
- pulumi_vault/identity/mfa_login_enforcement.py +15 -6
- pulumi_vault/identity/mfa_okta.py +11 -6
- pulumi_vault/identity/mfa_pingid.py +7 -2
- pulumi_vault/identity/mfa_totp.py +7 -2
- pulumi_vault/identity/oidc.py +12 -7
- pulumi_vault/identity/oidc_assignment.py +24 -11
- pulumi_vault/identity/oidc_client.py +36 -23
- pulumi_vault/identity/oidc_key.py +30 -17
- pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
- pulumi_vault/identity/oidc_provider.py +36 -21
- pulumi_vault/identity/oidc_role.py +42 -21
- pulumi_vault/identity/oidc_scope.py +20 -13
- pulumi_vault/identity/outputs.py +8 -3
- pulumi_vault/jwt/_inputs.py +55 -0
- pulumi_vault/jwt/auth_backend.py +45 -40
- pulumi_vault/jwt/auth_backend_role.py +133 -254
- pulumi_vault/jwt/outputs.py +5 -0
- pulumi_vault/kmip/secret_backend.py +24 -19
- pulumi_vault/kmip/secret_role.py +14 -9
- pulumi_vault/kmip/secret_scope.py +14 -9
- pulumi_vault/kubernetes/auth_backend_config.py +57 -5
- pulumi_vault/kubernetes/auth_backend_role.py +70 -177
- pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
- pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
- pulumi_vault/kubernetes/get_service_account_token.py +39 -11
- pulumi_vault/kubernetes/secret_backend.py +316 -27
- pulumi_vault/kubernetes/secret_backend_role.py +137 -46
- pulumi_vault/kv/_inputs.py +36 -4
- pulumi_vault/kv/get_secret.py +25 -8
- pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
- pulumi_vault/kv/get_secret_v2.py +85 -9
- pulumi_vault/kv/get_secrets_list.py +24 -11
- pulumi_vault/kv/get_secrets_list_v2.py +37 -15
- pulumi_vault/kv/outputs.py +8 -3
- pulumi_vault/kv/secret.py +23 -16
- pulumi_vault/kv/secret_backend_v2.py +20 -11
- pulumi_vault/kv/secret_v2.py +59 -50
- pulumi_vault/ldap/auth_backend.py +127 -166
- pulumi_vault/ldap/auth_backend_group.py +14 -9
- pulumi_vault/ldap/auth_backend_user.py +14 -9
- pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
- pulumi_vault/ldap/get_static_credentials.py +24 -5
- pulumi_vault/ldap/secret_backend.py +354 -82
- pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
- pulumi_vault/ldap/secret_backend_library_set.py +16 -9
- pulumi_vault/ldap/secret_backend_static_role.py +73 -12
- pulumi_vault/managed/_inputs.py +289 -132
- pulumi_vault/managed/keys.py +29 -57
- pulumi_vault/managed/outputs.py +89 -132
- pulumi_vault/mfa_duo.py +18 -11
- pulumi_vault/mfa_okta.py +18 -11
- pulumi_vault/mfa_pingid.py +18 -11
- pulumi_vault/mfa_totp.py +24 -17
- pulumi_vault/mongodbatlas/secret_backend.py +20 -15
- pulumi_vault/mongodbatlas/secret_role.py +47 -38
- pulumi_vault/mount.py +391 -51
- pulumi_vault/namespace.py +68 -83
- pulumi_vault/nomad_secret_backend.py +18 -13
- pulumi_vault/nomad_secret_role.py +14 -9
- pulumi_vault/okta/_inputs.py +47 -8
- pulumi_vault/okta/auth_backend.py +485 -39
- pulumi_vault/okta/auth_backend_group.py +14 -9
- pulumi_vault/okta/auth_backend_user.py +14 -9
- pulumi_vault/okta/outputs.py +13 -8
- pulumi_vault/outputs.py +5 -0
- pulumi_vault/password_policy.py +20 -13
- pulumi_vault/pkisecret/__init__.py +3 -0
- pulumi_vault/pkisecret/_inputs.py +81 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
- pulumi_vault/pkisecret/backend_config_est.py +619 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
- pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
- pulumi_vault/pkisecret/get_backend_key.py +24 -9
- pulumi_vault/pkisecret/get_backend_keys.py +21 -8
- pulumi_vault/pkisecret/outputs.py +69 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
- pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
- pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
- pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
- pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
- pulumi_vault/pkisecret/secret_backend_key.py +14 -9
- pulumi_vault/pkisecret/secret_backend_role.py +21 -14
- pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
- pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
- pulumi_vault/plugin.py +595 -0
- pulumi_vault/plugin_pinned_version.py +298 -0
- pulumi_vault/policy.py +14 -9
- pulumi_vault/provider.py +48 -53
- pulumi_vault/pulumi-plugin.json +2 -1
- pulumi_vault/quota_lease_count.py +60 -6
- pulumi_vault/quota_rate_limit.py +56 -2
- pulumi_vault/rabbitmq/_inputs.py +61 -0
- pulumi_vault/rabbitmq/outputs.py +5 -0
- pulumi_vault/rabbitmq/secret_backend.py +18 -13
- pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
- pulumi_vault/raft_autopilot.py +14 -9
- pulumi_vault/raft_snapshot_agent_config.py +129 -224
- pulumi_vault/rgp_policy.py +14 -9
- pulumi_vault/saml/auth_backend.py +22 -17
- pulumi_vault/saml/auth_backend_role.py +92 -197
- pulumi_vault/secrets/__init__.py +3 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +56 -71
- pulumi_vault/secrets/sync_aws_destination.py +242 -27
- pulumi_vault/secrets/sync_azure_destination.py +92 -31
- pulumi_vault/secrets/sync_config.py +9 -4
- pulumi_vault/secrets/sync_gcp_destination.py +158 -25
- pulumi_vault/secrets/sync_gh_destination.py +189 -13
- pulumi_vault/secrets/sync_github_apps.py +375 -0
- pulumi_vault/secrets/sync_vercel_destination.py +74 -13
- pulumi_vault/ssh/_inputs.py +28 -28
- pulumi_vault/ssh/outputs.py +11 -28
- pulumi_vault/ssh/secret_backend_ca.py +108 -9
- pulumi_vault/ssh/secret_backend_role.py +85 -118
- pulumi_vault/terraformcloud/secret_backend.py +7 -54
- pulumi_vault/terraformcloud/secret_creds.py +14 -20
- pulumi_vault/terraformcloud/secret_role.py +16 -74
- pulumi_vault/token.py +28 -23
- pulumi_vault/tokenauth/auth_backend_role.py +78 -199
- pulumi_vault/transform/alphabet.py +16 -9
- pulumi_vault/transform/get_decode.py +45 -17
- pulumi_vault/transform/get_encode.py +45 -17
- pulumi_vault/transform/role.py +16 -9
- pulumi_vault/transform/template.py +30 -21
- pulumi_vault/transform/transformation.py +12 -7
- pulumi_vault/transit/get_decrypt.py +26 -21
- pulumi_vault/transit/get_encrypt.py +24 -19
- pulumi_vault/transit/secret_backend_key.py +27 -93
- pulumi_vault/transit/secret_cache_config.py +12 -7
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
- pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
|
|
4
4
|
|
5
5
|
import copy
|
6
6
|
import warnings
|
7
|
+
import sys
|
7
8
|
import pulumi
|
8
9
|
import pulumi.runtime
|
9
10
|
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
11
|
+
if sys.version_info >= (3, 11):
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
13
|
+
else:
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
10
15
|
from .. import _utilities
|
11
16
|
|
12
17
|
__all__ = ['SecretBackendSignArgs', 'SecretBackendSign']
|
@@ -47,7 +52,7 @@ class SecretBackendSignArgs:
|
|
47
52
|
:param pulumi.Input[str] name: Name of the role to create the certificate against
|
48
53
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
49
54
|
The value should not contain leading or trailing forward slashes.
|
50
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
55
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
51
56
|
*Available only for Vault Enterprise*.
|
52
57
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
53
58
|
:param pulumi.Input[str] ttl: Time to live
|
@@ -222,7 +227,7 @@ class SecretBackendSignArgs:
|
|
222
227
|
"""
|
223
228
|
The namespace to provision the resource in.
|
224
229
|
The value should not contain leading or trailing forward slashes.
|
225
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
230
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
226
231
|
*Available only for Vault Enterprise*.
|
227
232
|
"""
|
228
233
|
return pulumi.get(self, "namespace")
|
@@ -289,7 +294,6 @@ class _SecretBackendSignState:
|
|
289
294
|
namespace: Optional[pulumi.Input[str]] = None,
|
290
295
|
other_sans: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
291
296
|
renew_pending: Optional[pulumi.Input[bool]] = None,
|
292
|
-
serial: Optional[pulumi.Input[str]] = None,
|
293
297
|
serial_number: Optional[pulumi.Input[str]] = None,
|
294
298
|
ttl: Optional[pulumi.Input[str]] = None,
|
295
299
|
uri_sans: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
|
@@ -315,11 +319,10 @@ class _SecretBackendSignState:
|
|
315
319
|
:param pulumi.Input[str] name: Name of the role to create the certificate against
|
316
320
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
317
321
|
The value should not contain leading or trailing forward slashes.
|
318
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
322
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
319
323
|
*Available only for Vault Enterprise*.
|
320
324
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
321
325
|
:param pulumi.Input[bool] renew_pending: `true` if the current time (during refresh) is after the start of the early renewal window declared by `min_seconds_remaining`, and `false` otherwise; if `auto_renew` is set to `true` then the provider will plan to replace the certificate once renewal is pending.
|
322
|
-
:param pulumi.Input[str] serial: The serial number.
|
323
326
|
:param pulumi.Input[str] serial_number: The certificate's serial number, hex formatted.
|
324
327
|
:param pulumi.Input[str] ttl: Time to live
|
325
328
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] uri_sans: List of alternative URIs
|
@@ -360,11 +363,6 @@ class _SecretBackendSignState:
|
|
360
363
|
pulumi.set(__self__, "other_sans", other_sans)
|
361
364
|
if renew_pending is not None:
|
362
365
|
pulumi.set(__self__, "renew_pending", renew_pending)
|
363
|
-
if serial is not None:
|
364
|
-
warnings.warn("""Use serial_number instead""", DeprecationWarning)
|
365
|
-
pulumi.log.warn("""serial is deprecated: Use serial_number instead""")
|
366
|
-
if serial is not None:
|
367
|
-
pulumi.set(__self__, "serial", serial)
|
368
366
|
if serial_number is not None:
|
369
367
|
pulumi.set(__self__, "serial_number", serial_number)
|
370
368
|
if ttl is not None:
|
@@ -561,7 +559,7 @@ class _SecretBackendSignState:
|
|
561
559
|
"""
|
562
560
|
The namespace to provision the resource in.
|
563
561
|
The value should not contain leading or trailing forward slashes.
|
564
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
562
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
565
563
|
*Available only for Vault Enterprise*.
|
566
564
|
"""
|
567
565
|
return pulumi.get(self, "namespace")
|
@@ -594,21 +592,6 @@ class _SecretBackendSignState:
|
|
594
592
|
def renew_pending(self, value: Optional[pulumi.Input[bool]]):
|
595
593
|
pulumi.set(self, "renew_pending", value)
|
596
594
|
|
597
|
-
@property
|
598
|
-
@pulumi.getter
|
599
|
-
def serial(self) -> Optional[pulumi.Input[str]]:
|
600
|
-
"""
|
601
|
-
The serial number.
|
602
|
-
"""
|
603
|
-
warnings.warn("""Use serial_number instead""", DeprecationWarning)
|
604
|
-
pulumi.log.warn("""serial is deprecated: Use serial_number instead""")
|
605
|
-
|
606
|
-
return pulumi.get(self, "serial")
|
607
|
-
|
608
|
-
@serial.setter
|
609
|
-
def serial(self, value: Optional[pulumi.Input[str]]):
|
610
|
-
pulumi.set(self, "serial", value)
|
611
|
-
|
612
595
|
@property
|
613
596
|
@pulumi.getter(name="serialNumber")
|
614
597
|
def serial_number(self) -> Optional[pulumi.Input[str]]:
|
@@ -675,7 +658,8 @@ class SecretBackendSign(pulumi.CustomResource):
|
|
675
658
|
import pulumi_vault as vault
|
676
659
|
|
677
660
|
test = vault.pki_secret.SecretBackendSign("test",
|
678
|
-
backend=
|
661
|
+
backend=pki["path"],
|
662
|
+
name=admin["name"],
|
679
663
|
csr=\"\"\"-----BEGIN CERTIFICATE REQUEST-----
|
680
664
|
MIIEqDCCApACAQAwYzELMAkGA1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3RhdGUx
|
681
665
|
ITAfBgNVBAoMGEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZDEcMBoGA1UEAwwTY2Vy
|
@@ -705,11 +689,8 @@ class SecretBackendSign(pulumi.CustomResource):
|
|
705
689
|
-----END CERTIFICATE REQUEST-----
|
706
690
|
\"\"\",
|
707
691
|
common_name="test.my.domain",
|
708
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
692
|
+
opts = pulumi.ResourceOptions(depends_on=[admin]))
|
709
693
|
```
|
710
|
-
## Deprecations
|
711
|
-
|
712
|
-
* `serial` - Use `serial_number` instead.
|
713
694
|
|
714
695
|
:param str resource_name: The name of the resource.
|
715
696
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
@@ -729,7 +710,7 @@ class SecretBackendSign(pulumi.CustomResource):
|
|
729
710
|
:param pulumi.Input[str] name: Name of the role to create the certificate against
|
730
711
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
731
712
|
The value should not contain leading or trailing forward slashes.
|
732
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
713
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
733
714
|
*Available only for Vault Enterprise*.
|
734
715
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
735
716
|
:param pulumi.Input[str] ttl: Time to live
|
@@ -749,7 +730,8 @@ class SecretBackendSign(pulumi.CustomResource):
|
|
749
730
|
import pulumi_vault as vault
|
750
731
|
|
751
732
|
test = vault.pki_secret.SecretBackendSign("test",
|
752
|
-
backend=
|
733
|
+
backend=pki["path"],
|
734
|
+
name=admin["name"],
|
753
735
|
csr=\"\"\"-----BEGIN CERTIFICATE REQUEST-----
|
754
736
|
MIIEqDCCApACAQAwYzELMAkGA1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3RhdGUx
|
755
737
|
ITAfBgNVBAoMGEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZDEcMBoGA1UEAwwTY2Vy
|
@@ -779,11 +761,8 @@ class SecretBackendSign(pulumi.CustomResource):
|
|
779
761
|
-----END CERTIFICATE REQUEST-----
|
780
762
|
\"\"\",
|
781
763
|
common_name="test.my.domain",
|
782
|
-
opts=pulumi.ResourceOptions(depends_on=[
|
764
|
+
opts = pulumi.ResourceOptions(depends_on=[admin]))
|
783
765
|
```
|
784
|
-
## Deprecations
|
785
|
-
|
786
|
-
* `serial` - Use `serial_number` instead.
|
787
766
|
|
788
767
|
:param str resource_name: The name of the resource.
|
789
768
|
:param SecretBackendSignArgs args: The arguments to use to populate this resource's properties.
|
@@ -850,7 +829,6 @@ class SecretBackendSign(pulumi.CustomResource):
|
|
850
829
|
__props__.__dict__["expiration"] = None
|
851
830
|
__props__.__dict__["issuing_ca"] = None
|
852
831
|
__props__.__dict__["renew_pending"] = None
|
853
|
-
__props__.__dict__["serial"] = None
|
854
832
|
__props__.__dict__["serial_number"] = None
|
855
833
|
super(SecretBackendSign, __self__).__init__(
|
856
834
|
'vault:pkiSecret/secretBackendSign:SecretBackendSign',
|
@@ -880,7 +858,6 @@ class SecretBackendSign(pulumi.CustomResource):
|
|
880
858
|
namespace: Optional[pulumi.Input[str]] = None,
|
881
859
|
other_sans: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
|
882
860
|
renew_pending: Optional[pulumi.Input[bool]] = None,
|
883
|
-
serial: Optional[pulumi.Input[str]] = None,
|
884
861
|
serial_number: Optional[pulumi.Input[str]] = None,
|
885
862
|
ttl: Optional[pulumi.Input[str]] = None,
|
886
863
|
uri_sans: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None) -> 'SecretBackendSign':
|
@@ -911,11 +888,10 @@ class SecretBackendSign(pulumi.CustomResource):
|
|
911
888
|
:param pulumi.Input[str] name: Name of the role to create the certificate against
|
912
889
|
:param pulumi.Input[str] namespace: The namespace to provision the resource in.
|
913
890
|
The value should not contain leading or trailing forward slashes.
|
914
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
891
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
915
892
|
*Available only for Vault Enterprise*.
|
916
893
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
|
917
894
|
:param pulumi.Input[bool] renew_pending: `true` if the current time (during refresh) is after the start of the early renewal window declared by `min_seconds_remaining`, and `false` otherwise; if `auto_renew` is set to `true` then the provider will plan to replace the certificate once renewal is pending.
|
918
|
-
:param pulumi.Input[str] serial: The serial number.
|
919
895
|
:param pulumi.Input[str] serial_number: The certificate's serial number, hex formatted.
|
920
896
|
:param pulumi.Input[str] ttl: Time to live
|
921
897
|
:param pulumi.Input[Sequence[pulumi.Input[str]]] uri_sans: List of alternative URIs
|
@@ -942,7 +918,6 @@ class SecretBackendSign(pulumi.CustomResource):
|
|
942
918
|
__props__.__dict__["namespace"] = namespace
|
943
919
|
__props__.__dict__["other_sans"] = other_sans
|
944
920
|
__props__.__dict__["renew_pending"] = renew_pending
|
945
|
-
__props__.__dict__["serial"] = serial
|
946
921
|
__props__.__dict__["serial_number"] = serial_number
|
947
922
|
__props__.__dict__["ttl"] = ttl
|
948
923
|
__props__.__dict__["uri_sans"] = uri_sans
|
@@ -1077,7 +1052,7 @@ class SecretBackendSign(pulumi.CustomResource):
|
|
1077
1052
|
"""
|
1078
1053
|
The namespace to provision the resource in.
|
1079
1054
|
The value should not contain leading or trailing forward slashes.
|
1080
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
1055
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
1081
1056
|
*Available only for Vault Enterprise*.
|
1082
1057
|
"""
|
1083
1058
|
return pulumi.get(self, "namespace")
|
@@ -1098,17 +1073,6 @@ class SecretBackendSign(pulumi.CustomResource):
|
|
1098
1073
|
"""
|
1099
1074
|
return pulumi.get(self, "renew_pending")
|
1100
1075
|
|
1101
|
-
@property
|
1102
|
-
@pulumi.getter
|
1103
|
-
def serial(self) -> pulumi.Output[str]:
|
1104
|
-
"""
|
1105
|
-
The serial number.
|
1106
|
-
"""
|
1107
|
-
warnings.warn("""Use serial_number instead""", DeprecationWarning)
|
1108
|
-
pulumi.log.warn("""serial is deprecated: Use serial_number instead""")
|
1109
|
-
|
1110
|
-
return pulumi.get(self, "serial")
|
1111
|
-
|
1112
1076
|
@property
|
1113
1077
|
@pulumi.getter(name="serialNumber")
|
1114
1078
|
def serial_number(self) -> pulumi.Output[str]:
|