pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (233) hide show
  1. pulumi_vault/__init__.py +76 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +22 -7
  5. pulumi_vault/ad/secret_backend.py +14 -144
  6. pulumi_vault/ad/secret_library.py +14 -11
  7. pulumi_vault/ad/secret_role.py +12 -11
  8. pulumi_vault/alicloud/auth_backend_role.py +74 -192
  9. pulumi_vault/approle/auth_backend_login.py +12 -11
  10. pulumi_vault/approle/auth_backend_role.py +75 -193
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
  13. pulumi_vault/audit.py +24 -27
  14. pulumi_vault/audit_request_header.py +11 -6
  15. pulumi_vault/auth_backend.py +64 -12
  16. pulumi_vault/aws/auth_backend_cert.py +12 -7
  17. pulumi_vault/aws/auth_backend_client.py +265 -24
  18. pulumi_vault/aws/auth_backend_config_identity.py +12 -11
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +75 -193
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
  24. pulumi_vault/aws/auth_backend_sts_role.py +59 -11
  25. pulumi_vault/aws/get_access_credentials.py +34 -7
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +216 -7
  28. pulumi_vault/aws/secret_backend_role.py +183 -11
  29. pulumi_vault/aws/secret_backend_static_role.py +14 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +151 -17
  32. pulumi_vault/azure/auth_backend_role.py +75 -193
  33. pulumi_vault/azure/backend.py +223 -29
  34. pulumi_vault/azure/backend_role.py +42 -41
  35. pulumi_vault/azure/get_access_credentials.py +39 -11
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -271
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +22 -25
  44. pulumi_vault/consul/secret_backend_role.py +14 -80
  45. pulumi_vault/database/_inputs.py +2808 -879
  46. pulumi_vault/database/outputs.py +749 -838
  47. pulumi_vault/database/secret_backend_connection.py +117 -114
  48. pulumi_vault/database/secret_backend_role.py +29 -24
  49. pulumi_vault/database/secret_backend_static_role.py +85 -15
  50. pulumi_vault/database/secrets_mount.py +425 -138
  51. pulumi_vault/egp_policy.py +16 -15
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +248 -35
  54. pulumi_vault/gcp/auth_backend_role.py +75 -271
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -9
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -16
  58. pulumi_vault/gcp/secret_impersonated_account.py +74 -17
  59. pulumi_vault/gcp/secret_roleset.py +29 -26
  60. pulumi_vault/gcp/secret_static_account.py +37 -34
  61. pulumi_vault/generic/endpoint.py +22 -21
  62. pulumi_vault/generic/get_secret.py +68 -12
  63. pulumi_vault/generic/secret.py +19 -14
  64. pulumi_vault/get_auth_backend.py +24 -11
  65. pulumi_vault/get_auth_backends.py +33 -11
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -15
  69. pulumi_vault/get_policy_document.py +34 -23
  70. pulumi_vault/get_raft_autopilot_state.py +29 -14
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +17 -16
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +14 -13
  75. pulumi_vault/github/user.py +14 -13
  76. pulumi_vault/identity/entity.py +18 -15
  77. pulumi_vault/identity/entity_alias.py +18 -15
  78. pulumi_vault/identity/entity_policies.py +24 -19
  79. pulumi_vault/identity/get_entity.py +40 -14
  80. pulumi_vault/identity/get_group.py +45 -13
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -11
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -13
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -14
  84. pulumi_vault/identity/group.py +50 -49
  85. pulumi_vault/identity/group_alias.py +14 -11
  86. pulumi_vault/identity/group_member_entity_ids.py +24 -74
  87. pulumi_vault/identity/group_member_group_ids.py +36 -27
  88. pulumi_vault/identity/group_policies.py +16 -15
  89. pulumi_vault/identity/mfa_duo.py +9 -8
  90. pulumi_vault/identity/mfa_login_enforcement.py +13 -8
  91. pulumi_vault/identity/mfa_okta.py +9 -8
  92. pulumi_vault/identity/mfa_pingid.py +5 -4
  93. pulumi_vault/identity/mfa_totp.py +5 -4
  94. pulumi_vault/identity/oidc.py +12 -11
  95. pulumi_vault/identity/oidc_assignment.py +22 -13
  96. pulumi_vault/identity/oidc_client.py +34 -25
  97. pulumi_vault/identity/oidc_key.py +28 -19
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
  99. pulumi_vault/identity/oidc_provider.py +34 -23
  100. pulumi_vault/identity/oidc_role.py +40 -27
  101. pulumi_vault/identity/oidc_scope.py +18 -15
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +39 -46
  105. pulumi_vault/jwt/auth_backend_role.py +131 -260
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +22 -21
  108. pulumi_vault/kmip/secret_role.py +12 -11
  109. pulumi_vault/kmip/secret_scope.py +12 -11
  110. pulumi_vault/kubernetes/auth_backend_config.py +55 -7
  111. pulumi_vault/kubernetes/auth_backend_role.py +68 -179
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -15
  115. pulumi_vault/kubernetes/secret_backend.py +314 -29
  116. pulumi_vault/kubernetes/secret_backend_role.py +135 -56
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +23 -12
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
  120. pulumi_vault/kv/get_secret_v2.py +89 -9
  121. pulumi_vault/kv/get_secrets_list.py +22 -15
  122. pulumi_vault/kv/get_secrets_list_v2.py +35 -19
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +19 -18
  125. pulumi_vault/kv/secret_backend_v2.py +12 -11
  126. pulumi_vault/kv/secret_v2.py +55 -52
  127. pulumi_vault/ldap/auth_backend.py +125 -168
  128. pulumi_vault/ldap/auth_backend_group.py +12 -11
  129. pulumi_vault/ldap/auth_backend_user.py +12 -11
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +352 -84
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +14 -11
  135. pulumi_vault/ldap/secret_backend_static_role.py +67 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +27 -43
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +16 -13
  140. pulumi_vault/mfa_okta.py +16 -13
  141. pulumi_vault/mfa_pingid.py +16 -13
  142. pulumi_vault/mfa_totp.py +22 -19
  143. pulumi_vault/mongodbatlas/secret_backend.py +18 -17
  144. pulumi_vault/mongodbatlas/secret_role.py +41 -38
  145. pulumi_vault/mount.py +389 -65
  146. pulumi_vault/namespace.py +26 -21
  147. pulumi_vault/nomad_secret_backend.py +16 -15
  148. pulumi_vault/nomad_secret_role.py +12 -11
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +483 -41
  151. pulumi_vault/okta/auth_backend_group.py +12 -11
  152. pulumi_vault/okta/auth_backend_user.py +12 -11
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +18 -15
  156. pulumi_vault/pkisecret/__init__.py +7 -0
  157. pulumi_vault/pkisecret/_inputs.py +115 -0
  158. pulumi_vault/pkisecret/backend_acme_eab.py +549 -0
  159. pulumi_vault/pkisecret/backend_config_acme.py +642 -0
  160. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  161. pulumi_vault/pkisecret/backend_config_cmpv2.py +525 -0
  162. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  163. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +209 -0
  164. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  165. pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
  166. pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
  167. pulumi_vault/pkisecret/get_backend_key.py +24 -13
  168. pulumi_vault/pkisecret/get_backend_keys.py +21 -12
  169. pulumi_vault/pkisecret/outputs.py +109 -0
  170. pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
  171. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
  172. pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
  173. pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
  174. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
  175. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
  176. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
  177. pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
  178. pulumi_vault/pkisecret/secret_backend_key.py +12 -7
  179. pulumi_vault/pkisecret/secret_backend_role.py +66 -16
  180. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
  181. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
  182. pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
  183. pulumi_vault/plugin.py +595 -0
  184. pulumi_vault/plugin_pinned_version.py +298 -0
  185. pulumi_vault/policy.py +12 -7
  186. pulumi_vault/provider.py +48 -53
  187. pulumi_vault/pulumi-plugin.json +2 -1
  188. pulumi_vault/quota_lease_count.py +58 -8
  189. pulumi_vault/quota_rate_limit.py +54 -4
  190. pulumi_vault/rabbitmq/_inputs.py +61 -0
  191. pulumi_vault/rabbitmq/outputs.py +5 -0
  192. pulumi_vault/rabbitmq/secret_backend.py +16 -15
  193. pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
  194. pulumi_vault/raft_autopilot.py +12 -11
  195. pulumi_vault/raft_snapshot_agent_config.py +121 -311
  196. pulumi_vault/rgp_policy.py +14 -13
  197. pulumi_vault/saml/auth_backend.py +20 -19
  198. pulumi_vault/saml/auth_backend_role.py +90 -199
  199. pulumi_vault/secrets/__init__.py +3 -0
  200. pulumi_vault/secrets/_inputs.py +110 -0
  201. pulumi_vault/secrets/outputs.py +94 -0
  202. pulumi_vault/secrets/sync_association.py +56 -75
  203. pulumi_vault/secrets/sync_aws_destination.py +240 -29
  204. pulumi_vault/secrets/sync_azure_destination.py +90 -33
  205. pulumi_vault/secrets/sync_config.py +7 -6
  206. pulumi_vault/secrets/sync_gcp_destination.py +156 -27
  207. pulumi_vault/secrets/sync_gh_destination.py +187 -15
  208. pulumi_vault/secrets/sync_github_apps.py +375 -0
  209. pulumi_vault/secrets/sync_vercel_destination.py +72 -15
  210. pulumi_vault/ssh/_inputs.py +28 -32
  211. pulumi_vault/ssh/outputs.py +11 -32
  212. pulumi_vault/ssh/secret_backend_ca.py +106 -11
  213. pulumi_vault/ssh/secret_backend_role.py +110 -120
  214. pulumi_vault/terraformcloud/secret_backend.py +5 -56
  215. pulumi_vault/terraformcloud/secret_creds.py +14 -24
  216. pulumi_vault/terraformcloud/secret_role.py +14 -76
  217. pulumi_vault/token.py +26 -25
  218. pulumi_vault/tokenauth/auth_backend_role.py +76 -201
  219. pulumi_vault/transform/alphabet.py +16 -13
  220. pulumi_vault/transform/get_decode.py +45 -21
  221. pulumi_vault/transform/get_encode.py +45 -21
  222. pulumi_vault/transform/role.py +16 -13
  223. pulumi_vault/transform/template.py +30 -25
  224. pulumi_vault/transform/transformation.py +12 -7
  225. pulumi_vault/transit/get_decrypt.py +26 -25
  226. pulumi_vault/transit/get_encrypt.py +24 -19
  227. pulumi_vault/transit/secret_backend_key.py +25 -97
  228. pulumi_vault/transit/secret_cache_config.py +12 -11
  229. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0.dist-info}/METADATA +8 -7
  230. pulumi_vault-6.5.0.dist-info/RECORD +260 -0
  231. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0.dist-info}/WHEEL +1 -1
  232. pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
  233. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
  from . import outputs
12
17
  from ._inputs import *
@@ -33,6 +38,7 @@ class SecretBackendRoleArgs:
33
38
  allowed_user_ids: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
34
39
  basic_constraints_valid_for_non_ca: Optional[pulumi.Input[bool]] = None,
35
40
  client_flag: Optional[pulumi.Input[bool]] = None,
41
+ cn_validations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
36
42
  code_signing_flag: Optional[pulumi.Input[bool]] = None,
37
43
  countries: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
38
44
  email_protection_flag: Optional[pulumi.Input[bool]] = None,
@@ -81,6 +87,7 @@ class SecretBackendRoleArgs:
81
87
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_user_ids: Defines allowed User IDs
82
88
  :param pulumi.Input[bool] basic_constraints_valid_for_non_ca: Flag to mark basic constraints valid when issuing non-CA certificates
83
89
  :param pulumi.Input[bool] client_flag: Flag to specify certificates for client use
90
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] cn_validations: Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
84
91
  :param pulumi.Input[bool] code_signing_flag: Flag to specify certificates for code signing use
85
92
  :param pulumi.Input[Sequence[pulumi.Input[str]]] countries: The country of generated certificates
86
93
  :param pulumi.Input[bool] email_protection_flag: Flag to specify certificates for email protection use
@@ -103,7 +110,7 @@ class SecretBackendRoleArgs:
103
110
  :param pulumi.Input[str] name: The name to identify this role within the backend. Must be unique within the backend.
104
111
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
105
112
  The value should not contain leading or trailing forward slashes.
106
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
113
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
107
114
  *Available only for Vault Enterprise*.
108
115
  :param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
109
116
  :param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
@@ -153,6 +160,8 @@ class SecretBackendRoleArgs:
153
160
  pulumi.set(__self__, "basic_constraints_valid_for_non_ca", basic_constraints_valid_for_non_ca)
154
161
  if client_flag is not None:
155
162
  pulumi.set(__self__, "client_flag", client_flag)
163
+ if cn_validations is not None:
164
+ pulumi.set(__self__, "cn_validations", cn_validations)
156
165
  if code_signing_flag is not None:
157
166
  pulumi.set(__self__, "code_signing_flag", code_signing_flag)
158
167
  if countries is not None:
@@ -416,6 +425,18 @@ class SecretBackendRoleArgs:
416
425
  def client_flag(self, value: Optional[pulumi.Input[bool]]):
417
426
  pulumi.set(self, "client_flag", value)
418
427
 
428
+ @property
429
+ @pulumi.getter(name="cnValidations")
430
+ def cn_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
431
+ """
432
+ Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
433
+ """
434
+ return pulumi.get(self, "cn_validations")
435
+
436
+ @cn_validations.setter
437
+ def cn_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
438
+ pulumi.set(self, "cn_validations", value)
439
+
419
440
  @property
420
441
  @pulumi.getter(name="codeSigningFlag")
421
442
  def code_signing_flag(self) -> Optional[pulumi.Input[bool]]:
@@ -596,7 +617,7 @@ class SecretBackendRoleArgs:
596
617
  """
597
618
  The namespace to provision the resource in.
598
619
  The value should not contain leading or trailing forward slashes.
599
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
620
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
600
621
  *Available only for Vault Enterprise*.
601
622
  """
602
623
  return pulumi.get(self, "namespace")
@@ -794,6 +815,7 @@ class _SecretBackendRoleState:
794
815
  backend: Optional[pulumi.Input[str]] = None,
795
816
  basic_constraints_valid_for_non_ca: Optional[pulumi.Input[bool]] = None,
796
817
  client_flag: Optional[pulumi.Input[bool]] = None,
818
+ cn_validations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
797
819
  code_signing_flag: Optional[pulumi.Input[bool]] = None,
798
820
  countries: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
799
821
  email_protection_flag: Optional[pulumi.Input[bool]] = None,
@@ -842,6 +864,7 @@ class _SecretBackendRoleState:
842
864
  :param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
843
865
  :param pulumi.Input[bool] basic_constraints_valid_for_non_ca: Flag to mark basic constraints valid when issuing non-CA certificates
844
866
  :param pulumi.Input[bool] client_flag: Flag to specify certificates for client use
867
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] cn_validations: Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
845
868
  :param pulumi.Input[bool] code_signing_flag: Flag to specify certificates for code signing use
846
869
  :param pulumi.Input[Sequence[pulumi.Input[str]]] countries: The country of generated certificates
847
870
  :param pulumi.Input[bool] email_protection_flag: Flag to specify certificates for email protection use
@@ -864,7 +887,7 @@ class _SecretBackendRoleState:
864
887
  :param pulumi.Input[str] name: The name to identify this role within the backend. Must be unique within the backend.
865
888
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
866
889
  The value should not contain leading or trailing forward slashes.
867
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
890
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
868
891
  *Available only for Vault Enterprise*.
869
892
  :param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
870
893
  :param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
@@ -915,6 +938,8 @@ class _SecretBackendRoleState:
915
938
  pulumi.set(__self__, "basic_constraints_valid_for_non_ca", basic_constraints_valid_for_non_ca)
916
939
  if client_flag is not None:
917
940
  pulumi.set(__self__, "client_flag", client_flag)
941
+ if cn_validations is not None:
942
+ pulumi.set(__self__, "cn_validations", cn_validations)
918
943
  if code_signing_flag is not None:
919
944
  pulumi.set(__self__, "code_signing_flag", code_signing_flag)
920
945
  if countries is not None:
@@ -1178,6 +1203,18 @@ class _SecretBackendRoleState:
1178
1203
  def client_flag(self, value: Optional[pulumi.Input[bool]]):
1179
1204
  pulumi.set(self, "client_flag", value)
1180
1205
 
1206
+ @property
1207
+ @pulumi.getter(name="cnValidations")
1208
+ def cn_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
1209
+ """
1210
+ Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
1211
+ """
1212
+ return pulumi.get(self, "cn_validations")
1213
+
1214
+ @cn_validations.setter
1215
+ def cn_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
1216
+ pulumi.set(self, "cn_validations", value)
1217
+
1181
1218
  @property
1182
1219
  @pulumi.getter(name="codeSigningFlag")
1183
1220
  def code_signing_flag(self) -> Optional[pulumi.Input[bool]]:
@@ -1358,7 +1395,7 @@ class _SecretBackendRoleState:
1358
1395
  """
1359
1396
  The namespace to provision the resource in.
1360
1397
  The value should not contain leading or trailing forward slashes.
1361
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1398
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1362
1399
  *Available only for Vault Enterprise*.
1363
1400
  """
1364
1401
  return pulumi.get(self, "namespace")
@@ -1558,6 +1595,7 @@ class SecretBackendRole(pulumi.CustomResource):
1558
1595
  backend: Optional[pulumi.Input[str]] = None,
1559
1596
  basic_constraints_valid_for_non_ca: Optional[pulumi.Input[bool]] = None,
1560
1597
  client_flag: Optional[pulumi.Input[bool]] = None,
1598
+ cn_validations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1561
1599
  code_signing_flag: Optional[pulumi.Input[bool]] = None,
1562
1600
  countries: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1563
1601
  email_protection_flag: Optional[pulumi.Input[bool]] = None,
@@ -1577,7 +1615,7 @@ class SecretBackendRole(pulumi.CustomResource):
1577
1615
  not_before_duration: Optional[pulumi.Input[str]] = None,
1578
1616
  organization_unit: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1579
1617
  organizations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1580
- policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRolePolicyIdentifierArgs']]]]] = None,
1618
+ policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]]] = None,
1581
1619
  policy_identifiers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1582
1620
  postal_codes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1583
1621
  provinces: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
@@ -1593,7 +1631,6 @@ class SecretBackendRole(pulumi.CustomResource):
1593
1631
 
1594
1632
  ## Example Usage
1595
1633
 
1596
- <!--Start PulumiCodeChooser -->
1597
1634
  ```python
1598
1635
  import pulumi
1599
1636
  import pulumi_vault as vault
@@ -1605,6 +1642,7 @@ class SecretBackendRole(pulumi.CustomResource):
1605
1642
  max_lease_ttl_seconds=86400)
1606
1643
  role = vault.pki_secret.SecretBackendRole("role",
1607
1644
  backend=pki.path,
1645
+ name="my_role",
1608
1646
  ttl="3600",
1609
1647
  allow_ip_sans=True,
1610
1648
  key_type="rsa",
@@ -1615,7 +1653,6 @@ class SecretBackendRole(pulumi.CustomResource):
1615
1653
  ],
1616
1654
  allow_subdomains=True)
1617
1655
  ```
1618
- <!--End PulumiCodeChooser -->
1619
1656
 
1620
1657
  ## Import
1621
1658
 
@@ -1644,6 +1681,7 @@ class SecretBackendRole(pulumi.CustomResource):
1644
1681
  :param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
1645
1682
  :param pulumi.Input[bool] basic_constraints_valid_for_non_ca: Flag to mark basic constraints valid when issuing non-CA certificates
1646
1683
  :param pulumi.Input[bool] client_flag: Flag to specify certificates for client use
1684
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] cn_validations: Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
1647
1685
  :param pulumi.Input[bool] code_signing_flag: Flag to specify certificates for code signing use
1648
1686
  :param pulumi.Input[Sequence[pulumi.Input[str]]] countries: The country of generated certificates
1649
1687
  :param pulumi.Input[bool] email_protection_flag: Flag to specify certificates for email protection use
@@ -1666,13 +1704,13 @@ class SecretBackendRole(pulumi.CustomResource):
1666
1704
  :param pulumi.Input[str] name: The name to identify this role within the backend. Must be unique within the backend.
1667
1705
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
1668
1706
  The value should not contain leading or trailing forward slashes.
1669
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1707
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1670
1708
  *Available only for Vault Enterprise*.
1671
1709
  :param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
1672
1710
  :param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
1673
1711
  :param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
1674
1712
  :param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
1675
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRolePolicyIdentifierArgs']]]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
1713
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
1676
1714
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policy_identifiers: Specify the list of allowed policies OIDs. Use with Vault 1.10 or before. For Vault 1.11+, use `policy_identifier` blocks instead
1677
1715
  :param pulumi.Input[Sequence[pulumi.Input[str]]] postal_codes: The postal code of generated certificates
1678
1716
  :param pulumi.Input[Sequence[pulumi.Input[str]]] provinces: The province of generated certificates
@@ -1694,7 +1732,6 @@ class SecretBackendRole(pulumi.CustomResource):
1694
1732
 
1695
1733
  ## Example Usage
1696
1734
 
1697
- <!--Start PulumiCodeChooser -->
1698
1735
  ```python
1699
1736
  import pulumi
1700
1737
  import pulumi_vault as vault
@@ -1706,6 +1743,7 @@ class SecretBackendRole(pulumi.CustomResource):
1706
1743
  max_lease_ttl_seconds=86400)
1707
1744
  role = vault.pki_secret.SecretBackendRole("role",
1708
1745
  backend=pki.path,
1746
+ name="my_role",
1709
1747
  ttl="3600",
1710
1748
  allow_ip_sans=True,
1711
1749
  key_type="rsa",
@@ -1716,7 +1754,6 @@ class SecretBackendRole(pulumi.CustomResource):
1716
1754
  ],
1717
1755
  allow_subdomains=True)
1718
1756
  ```
1719
- <!--End PulumiCodeChooser -->
1720
1757
 
1721
1758
  ## Import
1722
1759
 
@@ -1758,6 +1795,7 @@ class SecretBackendRole(pulumi.CustomResource):
1758
1795
  backend: Optional[pulumi.Input[str]] = None,
1759
1796
  basic_constraints_valid_for_non_ca: Optional[pulumi.Input[bool]] = None,
1760
1797
  client_flag: Optional[pulumi.Input[bool]] = None,
1798
+ cn_validations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1761
1799
  code_signing_flag: Optional[pulumi.Input[bool]] = None,
1762
1800
  countries: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1763
1801
  email_protection_flag: Optional[pulumi.Input[bool]] = None,
@@ -1777,7 +1815,7 @@ class SecretBackendRole(pulumi.CustomResource):
1777
1815
  not_before_duration: Optional[pulumi.Input[str]] = None,
1778
1816
  organization_unit: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1779
1817
  organizations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1780
- policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRolePolicyIdentifierArgs']]]]] = None,
1818
+ policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]]] = None,
1781
1819
  policy_identifiers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1782
1820
  postal_codes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1783
1821
  provinces: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
@@ -1815,6 +1853,7 @@ class SecretBackendRole(pulumi.CustomResource):
1815
1853
  __props__.__dict__["backend"] = backend
1816
1854
  __props__.__dict__["basic_constraints_valid_for_non_ca"] = basic_constraints_valid_for_non_ca
1817
1855
  __props__.__dict__["client_flag"] = client_flag
1856
+ __props__.__dict__["cn_validations"] = cn_validations
1818
1857
  __props__.__dict__["code_signing_flag"] = code_signing_flag
1819
1858
  __props__.__dict__["countries"] = countries
1820
1859
  __props__.__dict__["email_protection_flag"] = email_protection_flag
@@ -1871,6 +1910,7 @@ class SecretBackendRole(pulumi.CustomResource):
1871
1910
  backend: Optional[pulumi.Input[str]] = None,
1872
1911
  basic_constraints_valid_for_non_ca: Optional[pulumi.Input[bool]] = None,
1873
1912
  client_flag: Optional[pulumi.Input[bool]] = None,
1913
+ cn_validations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1874
1914
  code_signing_flag: Optional[pulumi.Input[bool]] = None,
1875
1915
  countries: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1876
1916
  email_protection_flag: Optional[pulumi.Input[bool]] = None,
@@ -1890,7 +1930,7 @@ class SecretBackendRole(pulumi.CustomResource):
1890
1930
  not_before_duration: Optional[pulumi.Input[str]] = None,
1891
1931
  organization_unit: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1892
1932
  organizations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1893
- policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRolePolicyIdentifierArgs']]]]] = None,
1933
+ policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]]] = None,
1894
1934
  policy_identifiers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1895
1935
  postal_codes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1896
1936
  provinces: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
@@ -1924,6 +1964,7 @@ class SecretBackendRole(pulumi.CustomResource):
1924
1964
  :param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
1925
1965
  :param pulumi.Input[bool] basic_constraints_valid_for_non_ca: Flag to mark basic constraints valid when issuing non-CA certificates
1926
1966
  :param pulumi.Input[bool] client_flag: Flag to specify certificates for client use
1967
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] cn_validations: Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
1927
1968
  :param pulumi.Input[bool] code_signing_flag: Flag to specify certificates for code signing use
1928
1969
  :param pulumi.Input[Sequence[pulumi.Input[str]]] countries: The country of generated certificates
1929
1970
  :param pulumi.Input[bool] email_protection_flag: Flag to specify certificates for email protection use
@@ -1946,13 +1987,13 @@ class SecretBackendRole(pulumi.CustomResource):
1946
1987
  :param pulumi.Input[str] name: The name to identify this role within the backend. Must be unique within the backend.
1947
1988
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
1948
1989
  The value should not contain leading or trailing forward slashes.
1949
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1990
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1950
1991
  *Available only for Vault Enterprise*.
1951
1992
  :param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
1952
1993
  :param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
1953
1994
  :param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
1954
1995
  :param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
1955
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRolePolicyIdentifierArgs']]]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
1996
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
1956
1997
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policy_identifiers: Specify the list of allowed policies OIDs. Use with Vault 1.10 or before. For Vault 1.11+, use `policy_identifier` blocks instead
1957
1998
  :param pulumi.Input[Sequence[pulumi.Input[str]]] postal_codes: The postal code of generated certificates
1958
1999
  :param pulumi.Input[Sequence[pulumi.Input[str]]] provinces: The province of generated certificates
@@ -1984,6 +2025,7 @@ class SecretBackendRole(pulumi.CustomResource):
1984
2025
  __props__.__dict__["backend"] = backend
1985
2026
  __props__.__dict__["basic_constraints_valid_for_non_ca"] = basic_constraints_valid_for_non_ca
1986
2027
  __props__.__dict__["client_flag"] = client_flag
2028
+ __props__.__dict__["cn_validations"] = cn_validations
1987
2029
  __props__.__dict__["code_signing_flag"] = code_signing_flag
1988
2030
  __props__.__dict__["countries"] = countries
1989
2031
  __props__.__dict__["email_protection_flag"] = email_protection_flag
@@ -2151,6 +2193,14 @@ class SecretBackendRole(pulumi.CustomResource):
2151
2193
  """
2152
2194
  return pulumi.get(self, "client_flag")
2153
2195
 
2196
+ @property
2197
+ @pulumi.getter(name="cnValidations")
2198
+ def cn_validations(self) -> pulumi.Output[Sequence[str]]:
2199
+ """
2200
+ Validations to run on the Common Name field of the certificate, choices: `email`, `hostname`, `disabled`
2201
+ """
2202
+ return pulumi.get(self, "cn_validations")
2203
+
2154
2204
  @property
2155
2205
  @pulumi.getter(name="codeSigningFlag")
2156
2206
  def code_signing_flag(self) -> pulumi.Output[Optional[bool]]:
@@ -2275,7 +2325,7 @@ class SecretBackendRole(pulumi.CustomResource):
2275
2325
  """
2276
2326
  The namespace to provision the resource in.
2277
2327
  The value should not contain leading or trailing forward slashes.
2278
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
2328
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
2279
2329
  *Available only for Vault Enterprise*.
2280
2330
  """
2281
2331
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendRootCertArgs', 'SecretBackendRootCert']
@@ -69,7 +74,7 @@ class SecretBackendRootCertArgs:
69
74
  :param pulumi.Input[int] max_path_length: The maximum path length to encode in the generated certificate
70
75
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
71
76
  The value should not contain leading or trailing forward slashes.
72
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
77
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
73
78
  *Available only for Vault Enterprise*.
74
79
  :param pulumi.Input[str] organization: The organization
75
80
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
@@ -352,7 +357,7 @@ class SecretBackendRootCertArgs:
352
357
  """
353
358
  The namespace to provision the resource in.
354
359
  The value should not contain leading or trailing forward slashes.
355
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
360
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
356
361
  *Available only for Vault Enterprise*.
357
362
  """
358
363
  return pulumi.get(self, "namespace")
@@ -513,7 +518,6 @@ class _SecretBackendRootCertState:
513
518
  postal_code: Optional[pulumi.Input[str]] = None,
514
519
  private_key_format: Optional[pulumi.Input[str]] = None,
515
520
  province: Optional[pulumi.Input[str]] = None,
516
- serial: Optional[pulumi.Input[str]] = None,
517
521
  serial_number: Optional[pulumi.Input[str]] = None,
518
522
  street_address: Optional[pulumi.Input[str]] = None,
519
523
  ttl: Optional[pulumi.Input[str]] = None,
@@ -548,7 +552,7 @@ class _SecretBackendRootCertState:
548
552
  :param pulumi.Input[int] max_path_length: The maximum path length to encode in the generated certificate
549
553
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
550
554
  The value should not contain leading or trailing forward slashes.
551
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
555
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
552
556
  *Available only for Vault Enterprise*.
553
557
  :param pulumi.Input[str] organization: The organization
554
558
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
@@ -557,7 +561,6 @@ class _SecretBackendRootCertState:
557
561
  :param pulumi.Input[str] postal_code: The postal code
558
562
  :param pulumi.Input[str] private_key_format: The private key format
559
563
  :param pulumi.Input[str] province: The province
560
- :param pulumi.Input[str] serial: Deprecated, use `serial_number` instead.
561
564
  :param pulumi.Input[str] serial_number: The certificate's serial number, hex formatted.
562
565
  :param pulumi.Input[str] street_address: The street address
563
566
  :param pulumi.Input[str] ttl: Time to live
@@ -621,11 +624,6 @@ class _SecretBackendRootCertState:
621
624
  pulumi.set(__self__, "private_key_format", private_key_format)
622
625
  if province is not None:
623
626
  pulumi.set(__self__, "province", province)
624
- if serial is not None:
625
- warnings.warn("""Use serial_number instead""", DeprecationWarning)
626
- pulumi.log.warn("""serial is deprecated: Use serial_number instead""")
627
- if serial is not None:
628
- pulumi.set(__self__, "serial", serial)
629
627
  if serial_number is not None:
630
628
  pulumi.set(__self__, "serial_number", serial_number)
631
629
  if street_address is not None:
@@ -888,7 +886,7 @@ class _SecretBackendRootCertState:
888
886
  """
889
887
  The namespace to provision the resource in.
890
888
  The value should not contain leading or trailing forward slashes.
891
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
889
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
892
890
  *Available only for Vault Enterprise*.
893
891
  """
894
892
  return pulumi.get(self, "namespace")
@@ -981,21 +979,6 @@ class _SecretBackendRootCertState:
981
979
  def province(self, value: Optional[pulumi.Input[str]]):
982
980
  pulumi.set(self, "province", value)
983
981
 
984
- @property
985
- @pulumi.getter
986
- def serial(self) -> Optional[pulumi.Input[str]]:
987
- """
988
- Deprecated, use `serial_number` instead.
989
- """
990
- warnings.warn("""Use serial_number instead""", DeprecationWarning)
991
- pulumi.log.warn("""serial is deprecated: Use serial_number instead""")
992
-
993
- return pulumi.get(self, "serial")
994
-
995
- @serial.setter
996
- def serial(self, value: Optional[pulumi.Input[str]]):
997
- pulumi.set(self, "serial", value)
998
-
999
982
  @property
1000
983
  @pulumi.getter(name="serialNumber")
1001
984
  def serial_number(self) -> Optional[pulumi.Input[str]]:
@@ -1095,13 +1078,12 @@ class SecretBackendRootCert(pulumi.CustomResource):
1095
1078
  """
1096
1079
  ## Example Usage
1097
1080
 
1098
- <!--Start PulumiCodeChooser -->
1099
1081
  ```python
1100
1082
  import pulumi
1101
1083
  import pulumi_vault as vault
1102
1084
 
1103
1085
  test = vault.pki_secret.SecretBackendRootCert("test",
1104
- backend=vault_mount["pki"]["path"],
1086
+ backend=pki["path"],
1105
1087
  type="internal",
1106
1088
  common_name="Root CA",
1107
1089
  ttl="315360000",
@@ -1112,9 +1094,8 @@ class SecretBackendRootCert(pulumi.CustomResource):
1112
1094
  exclude_cn_from_sans=True,
1113
1095
  ou="My OU",
1114
1096
  organization="My organization",
1115
- opts=pulumi.ResourceOptions(depends_on=[vault_mount["pki"]]))
1097
+ opts = pulumi.ResourceOptions(depends_on=[pki]))
1116
1098
  ```
1117
- <!--End PulumiCodeChooser -->
1118
1099
 
1119
1100
  :param str resource_name: The name of the resource.
1120
1101
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -1141,7 +1122,7 @@ class SecretBackendRootCert(pulumi.CustomResource):
1141
1122
  :param pulumi.Input[int] max_path_length: The maximum path length to encode in the generated certificate
1142
1123
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
1143
1124
  The value should not contain leading or trailing forward slashes.
1144
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1125
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1145
1126
  *Available only for Vault Enterprise*.
1146
1127
  :param pulumi.Input[str] organization: The organization
1147
1128
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
@@ -1165,13 +1146,12 @@ class SecretBackendRootCert(pulumi.CustomResource):
1165
1146
  """
1166
1147
  ## Example Usage
1167
1148
 
1168
- <!--Start PulumiCodeChooser -->
1169
1149
  ```python
1170
1150
  import pulumi
1171
1151
  import pulumi_vault as vault
1172
1152
 
1173
1153
  test = vault.pki_secret.SecretBackendRootCert("test",
1174
- backend=vault_mount["pki"]["path"],
1154
+ backend=pki["path"],
1175
1155
  type="internal",
1176
1156
  common_name="Root CA",
1177
1157
  ttl="315360000",
@@ -1182,9 +1162,8 @@ class SecretBackendRootCert(pulumi.CustomResource):
1182
1162
  exclude_cn_from_sans=True,
1183
1163
  ou="My OU",
1184
1164
  organization="My organization",
1185
- opts=pulumi.ResourceOptions(depends_on=[vault_mount["pki"]]))
1165
+ opts = pulumi.ResourceOptions(depends_on=[pki]))
1186
1166
  ```
1187
- <!--End PulumiCodeChooser -->
1188
1167
 
1189
1168
  :param str resource_name: The name of the resource.
1190
1169
  :param SecretBackendRootCertArgs args: The arguments to use to populate this resource's properties.
@@ -1276,7 +1255,6 @@ class SecretBackendRootCert(pulumi.CustomResource):
1276
1255
  __props__.__dict__["issuer_id"] = None
1277
1256
  __props__.__dict__["issuing_ca"] = None
1278
1257
  __props__.__dict__["key_id"] = None
1279
- __props__.__dict__["serial"] = None
1280
1258
  __props__.__dict__["serial_number"] = None
1281
1259
  super(SecretBackendRootCert, __self__).__init__(
1282
1260
  'vault:pkiSecret/secretBackendRootCert:SecretBackendRootCert',
@@ -1316,7 +1294,6 @@ class SecretBackendRootCert(pulumi.CustomResource):
1316
1294
  postal_code: Optional[pulumi.Input[str]] = None,
1317
1295
  private_key_format: Optional[pulumi.Input[str]] = None,
1318
1296
  province: Optional[pulumi.Input[str]] = None,
1319
- serial: Optional[pulumi.Input[str]] = None,
1320
1297
  serial_number: Optional[pulumi.Input[str]] = None,
1321
1298
  street_address: Optional[pulumi.Input[str]] = None,
1322
1299
  ttl: Optional[pulumi.Input[str]] = None,
@@ -1356,7 +1333,7 @@ class SecretBackendRootCert(pulumi.CustomResource):
1356
1333
  :param pulumi.Input[int] max_path_length: The maximum path length to encode in the generated certificate
1357
1334
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
1358
1335
  The value should not contain leading or trailing forward slashes.
1359
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1336
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1360
1337
  *Available only for Vault Enterprise*.
1361
1338
  :param pulumi.Input[str] organization: The organization
1362
1339
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
@@ -1365,7 +1342,6 @@ class SecretBackendRootCert(pulumi.CustomResource):
1365
1342
  :param pulumi.Input[str] postal_code: The postal code
1366
1343
  :param pulumi.Input[str] private_key_format: The private key format
1367
1344
  :param pulumi.Input[str] province: The province
1368
- :param pulumi.Input[str] serial: Deprecated, use `serial_number` instead.
1369
1345
  :param pulumi.Input[str] serial_number: The certificate's serial number, hex formatted.
1370
1346
  :param pulumi.Input[str] street_address: The street address
1371
1347
  :param pulumi.Input[str] ttl: Time to live
@@ -1405,7 +1381,6 @@ class SecretBackendRootCert(pulumi.CustomResource):
1405
1381
  __props__.__dict__["postal_code"] = postal_code
1406
1382
  __props__.__dict__["private_key_format"] = private_key_format
1407
1383
  __props__.__dict__["province"] = province
1408
- __props__.__dict__["serial"] = serial
1409
1384
  __props__.__dict__["serial_number"] = serial_number
1410
1385
  __props__.__dict__["street_address"] = street_address
1411
1386
  __props__.__dict__["ttl"] = ttl
@@ -1584,7 +1559,7 @@ class SecretBackendRootCert(pulumi.CustomResource):
1584
1559
  """
1585
1560
  The namespace to provision the resource in.
1586
1561
  The value should not contain leading or trailing forward slashes.
1587
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1562
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1588
1563
  *Available only for Vault Enterprise*.
1589
1564
  """
1590
1565
  return pulumi.get(self, "namespace")
@@ -1645,17 +1620,6 @@ class SecretBackendRootCert(pulumi.CustomResource):
1645
1620
  """
1646
1621
  return pulumi.get(self, "province")
1647
1622
 
1648
- @property
1649
- @pulumi.getter
1650
- def serial(self) -> pulumi.Output[str]:
1651
- """
1652
- Deprecated, use `serial_number` instead.
1653
- """
1654
- warnings.warn("""Use serial_number instead""", DeprecationWarning)
1655
- pulumi.log.warn("""serial is deprecated: Use serial_number instead""")
1656
-
1657
- return pulumi.get(self, "serial")
1658
-
1659
1623
  @property
1660
1624
  @pulumi.getter(name="serialNumber")
1661
1625
  def serial_number(self) -> pulumi.Output[str]: