pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +22 -7
  5. pulumi_vault/ad/secret_backend.py +14 -144
  6. pulumi_vault/ad/secret_library.py +14 -11
  7. pulumi_vault/ad/secret_role.py +12 -11
  8. pulumi_vault/alicloud/auth_backend_role.py +74 -192
  9. pulumi_vault/approle/auth_backend_login.py +12 -11
  10. pulumi_vault/approle/auth_backend_role.py +75 -193
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
  13. pulumi_vault/audit.py +24 -27
  14. pulumi_vault/audit_request_header.py +11 -6
  15. pulumi_vault/auth_backend.py +64 -12
  16. pulumi_vault/aws/auth_backend_cert.py +12 -7
  17. pulumi_vault/aws/auth_backend_client.py +265 -24
  18. pulumi_vault/aws/auth_backend_config_identity.py +12 -11
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +75 -193
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
  24. pulumi_vault/aws/auth_backend_sts_role.py +12 -11
  25. pulumi_vault/aws/get_access_credentials.py +34 -7
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +75 -7
  28. pulumi_vault/aws/secret_backend_role.py +183 -11
  29. pulumi_vault/aws/secret_backend_static_role.py +14 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +151 -17
  32. pulumi_vault/azure/auth_backend_role.py +75 -193
  33. pulumi_vault/azure/backend.py +223 -29
  34. pulumi_vault/azure/backend_role.py +42 -41
  35. pulumi_vault/azure/get_access_credentials.py +39 -11
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -271
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +22 -25
  44. pulumi_vault/consul/secret_backend_role.py +14 -80
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +117 -114
  48. pulumi_vault/database/secret_backend_role.py +29 -24
  49. pulumi_vault/database/secret_backend_static_role.py +85 -15
  50. pulumi_vault/database/secrets_mount.py +425 -138
  51. pulumi_vault/egp_policy.py +16 -15
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +248 -35
  54. pulumi_vault/gcp/auth_backend_role.py +75 -271
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -9
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -16
  58. pulumi_vault/gcp/secret_impersonated_account.py +74 -17
  59. pulumi_vault/gcp/secret_roleset.py +29 -26
  60. pulumi_vault/gcp/secret_static_account.py +37 -34
  61. pulumi_vault/generic/endpoint.py +22 -21
  62. pulumi_vault/generic/get_secret.py +68 -12
  63. pulumi_vault/generic/secret.py +19 -14
  64. pulumi_vault/get_auth_backend.py +24 -11
  65. pulumi_vault/get_auth_backends.py +33 -11
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -15
  69. pulumi_vault/get_policy_document.py +34 -23
  70. pulumi_vault/get_raft_autopilot_state.py +29 -14
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +17 -16
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +14 -13
  75. pulumi_vault/github/user.py +14 -13
  76. pulumi_vault/identity/entity.py +18 -15
  77. pulumi_vault/identity/entity_alias.py +18 -15
  78. pulumi_vault/identity/entity_policies.py +24 -19
  79. pulumi_vault/identity/get_entity.py +40 -14
  80. pulumi_vault/identity/get_group.py +45 -13
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -11
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -13
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -14
  84. pulumi_vault/identity/group.py +50 -49
  85. pulumi_vault/identity/group_alias.py +14 -11
  86. pulumi_vault/identity/group_member_entity_ids.py +24 -74
  87. pulumi_vault/identity/group_member_group_ids.py +36 -27
  88. pulumi_vault/identity/group_policies.py +16 -15
  89. pulumi_vault/identity/mfa_duo.py +9 -8
  90. pulumi_vault/identity/mfa_login_enforcement.py +13 -8
  91. pulumi_vault/identity/mfa_okta.py +9 -8
  92. pulumi_vault/identity/mfa_pingid.py +5 -4
  93. pulumi_vault/identity/mfa_totp.py +5 -4
  94. pulumi_vault/identity/oidc.py +12 -11
  95. pulumi_vault/identity/oidc_assignment.py +22 -13
  96. pulumi_vault/identity/oidc_client.py +34 -25
  97. pulumi_vault/identity/oidc_key.py +28 -19
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
  99. pulumi_vault/identity/oidc_provider.py +34 -23
  100. pulumi_vault/identity/oidc_role.py +40 -27
  101. pulumi_vault/identity/oidc_scope.py +18 -15
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +39 -46
  105. pulumi_vault/jwt/auth_backend_role.py +131 -260
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +22 -21
  108. pulumi_vault/kmip/secret_role.py +12 -11
  109. pulumi_vault/kmip/secret_scope.py +12 -11
  110. pulumi_vault/kubernetes/auth_backend_config.py +55 -7
  111. pulumi_vault/kubernetes/auth_backend_role.py +68 -179
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -15
  115. pulumi_vault/kubernetes/secret_backend.py +314 -29
  116. pulumi_vault/kubernetes/secret_backend_role.py +135 -56
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +23 -12
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
  120. pulumi_vault/kv/get_secret_v2.py +89 -9
  121. pulumi_vault/kv/get_secrets_list.py +22 -15
  122. pulumi_vault/kv/get_secrets_list_v2.py +35 -19
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +19 -18
  125. pulumi_vault/kv/secret_backend_v2.py +12 -11
  126. pulumi_vault/kv/secret_v2.py +55 -52
  127. pulumi_vault/ldap/auth_backend.py +125 -168
  128. pulumi_vault/ldap/auth_backend_group.py +12 -11
  129. pulumi_vault/ldap/auth_backend_user.py +12 -11
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +352 -84
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +14 -11
  135. pulumi_vault/ldap/secret_backend_static_role.py +67 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +27 -43
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +16 -13
  140. pulumi_vault/mfa_okta.py +16 -13
  141. pulumi_vault/mfa_pingid.py +16 -13
  142. pulumi_vault/mfa_totp.py +22 -19
  143. pulumi_vault/mongodbatlas/secret_backend.py +18 -17
  144. pulumi_vault/mongodbatlas/secret_role.py +41 -38
  145. pulumi_vault/mount.py +389 -65
  146. pulumi_vault/namespace.py +26 -21
  147. pulumi_vault/nomad_secret_backend.py +16 -15
  148. pulumi_vault/nomad_secret_role.py +12 -11
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +483 -41
  151. pulumi_vault/okta/auth_backend_group.py +12 -11
  152. pulumi_vault/okta/auth_backend_user.py +12 -11
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +18 -15
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -13
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -12
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
  174. pulumi_vault/pkisecret/secret_backend_key.py +12 -7
  175. pulumi_vault/pkisecret/secret_backend_role.py +19 -16
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +12 -7
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +58 -8
  185. pulumi_vault/quota_rate_limit.py +54 -4
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +16 -15
  189. pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
  190. pulumi_vault/raft_autopilot.py +12 -11
  191. pulumi_vault/raft_snapshot_agent_config.py +121 -311
  192. pulumi_vault/rgp_policy.py +14 -13
  193. pulumi_vault/saml/auth_backend.py +20 -19
  194. pulumi_vault/saml/auth_backend_role.py +90 -199
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -75
  199. pulumi_vault/secrets/sync_aws_destination.py +240 -29
  200. pulumi_vault/secrets/sync_azure_destination.py +90 -33
  201. pulumi_vault/secrets/sync_config.py +7 -6
  202. pulumi_vault/secrets/sync_gcp_destination.py +156 -27
  203. pulumi_vault/secrets/sync_gh_destination.py +187 -15
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +72 -15
  206. pulumi_vault/ssh/_inputs.py +28 -32
  207. pulumi_vault/ssh/outputs.py +11 -32
  208. pulumi_vault/ssh/secret_backend_ca.py +106 -11
  209. pulumi_vault/ssh/secret_backend_role.py +83 -120
  210. pulumi_vault/terraformcloud/secret_backend.py +5 -56
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -24
  212. pulumi_vault/terraformcloud/secret_role.py +14 -76
  213. pulumi_vault/token.py +26 -25
  214. pulumi_vault/tokenauth/auth_backend_role.py +76 -201
  215. pulumi_vault/transform/alphabet.py +16 -13
  216. pulumi_vault/transform/get_decode.py +45 -21
  217. pulumi_vault/transform/get_encode.py +45 -21
  218. pulumi_vault/transform/role.py +16 -13
  219. pulumi_vault/transform/template.py +30 -25
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -25
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +25 -97
  224. pulumi_vault/transit/secret_cache_config.py +12 -11
  225. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendIssuerArgs', 'SecretBackendIssuer']
@@ -44,7 +49,7 @@ class SecretBackendIssuerArgs:
44
49
  computed CAChain field from, when non-empty.
45
50
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
46
51
  The value should not contain leading or trailing forward slashes.
47
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
52
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
48
53
  *Available only for Vault Enterprise*.
49
54
  :param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
50
55
  :param pulumi.Input[str] revocation_signature_algorithm: Which signature algorithm to use
@@ -182,7 +187,7 @@ class SecretBackendIssuerArgs:
182
187
  """
183
188
  The namespace to provision the resource in.
184
189
  The value should not contain leading or trailing forward slashes.
185
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
190
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
186
191
  *Available only for Vault Enterprise*.
187
192
  """
188
193
  return pulumi.get(self, "namespace")
@@ -264,7 +269,7 @@ class _SecretBackendIssuerState:
264
269
  computed CAChain field from, when non-empty.
265
270
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
266
271
  The value should not contain leading or trailing forward slashes.
267
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
272
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
268
273
  *Available only for Vault Enterprise*.
269
274
  :param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
270
275
  :param pulumi.Input[str] revocation_signature_algorithm: Which signature algorithm to use
@@ -418,7 +423,7 @@ class _SecretBackendIssuerState:
418
423
  """
419
424
  The namespace to provision the resource in.
420
425
  The value should not contain leading or trailing forward slashes.
421
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
426
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
422
427
  *Available only for Vault Enterprise*.
423
428
  """
424
429
  return pulumi.get(self, "namespace")
@@ -486,7 +491,6 @@ class SecretBackendIssuer(pulumi.CustomResource):
486
491
  """
487
492
  ## Example Usage
488
493
 
489
- <!--Start PulumiCodeChooser -->
490
494
  ```python
491
495
  import pulumi
492
496
  import pulumi_vault as vault
@@ -506,7 +510,6 @@ class SecretBackendIssuer(pulumi.CustomResource):
506
510
  issuer_ref=root.issuer_id,
507
511
  issuer_name="example-issuer")
508
512
  ```
509
- <!--End PulumiCodeChooser -->
510
513
 
511
514
  ## Import
512
515
 
@@ -534,7 +537,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
534
537
  computed CAChain field from, when non-empty.
535
538
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
536
539
  The value should not contain leading or trailing forward slashes.
537
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
540
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
538
541
  *Available only for Vault Enterprise*.
539
542
  :param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
540
543
  :param pulumi.Input[str] revocation_signature_algorithm: Which signature algorithm to use
@@ -550,7 +553,6 @@ class SecretBackendIssuer(pulumi.CustomResource):
550
553
  """
551
554
  ## Example Usage
552
555
 
553
- <!--Start PulumiCodeChooser -->
554
556
  ```python
555
557
  import pulumi
556
558
  import pulumi_vault as vault
@@ -570,7 +572,6 @@ class SecretBackendIssuer(pulumi.CustomResource):
570
572
  issuer_ref=root.issuer_id,
571
573
  issuer_name="example-issuer")
572
574
  ```
573
- <!--End PulumiCodeChooser -->
574
575
 
575
576
  ## Import
576
577
 
@@ -680,7 +681,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
680
681
  computed CAChain field from, when non-empty.
681
682
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
682
683
  The value should not contain leading or trailing forward slashes.
683
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
684
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
684
685
  *Available only for Vault Enterprise*.
685
686
  :param pulumi.Input[Sequence[pulumi.Input[str]]] ocsp_servers: Specifies the URL values for the OCSP Servers field.
686
687
  :param pulumi.Input[str] revocation_signature_algorithm: Which signature algorithm to use
@@ -790,7 +791,7 @@ class SecretBackendIssuer(pulumi.CustomResource):
790
791
  """
791
792
  The namespace to provision the resource in.
792
793
  The value should not contain leading or trailing forward slashes.
793
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
794
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
794
795
  *Available only for Vault Enterprise*.
795
796
  """
796
797
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendKeyArgs', 'SecretBackendKey']
@@ -37,7 +42,7 @@ class SecretBackendKeyArgs:
37
42
  :param pulumi.Input[str] managed_key_name: The managed key's configured name.
38
43
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
39
44
  The value should not contain leading or trailing forward slashes.
40
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
45
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
41
46
  *Available only for Vault Enterprise*.
42
47
  """
43
48
  pulumi.set(__self__, "backend", backend)
@@ -149,7 +154,7 @@ class SecretBackendKeyArgs:
149
154
  """
150
155
  The namespace to provision the resource in.
151
156
  The value should not contain leading or trailing forward slashes.
152
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
157
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
153
158
  *Available only for Vault Enterprise*.
154
159
  """
155
160
  return pulumi.get(self, "namespace")
@@ -186,7 +191,7 @@ class _SecretBackendKeyState:
186
191
  :param pulumi.Input[str] managed_key_name: The managed key's configured name.
187
192
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
188
193
  The value should not contain leading or trailing forward slashes.
189
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
194
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
190
195
  *Available only for Vault Enterprise*.
191
196
  :param pulumi.Input[str] type: Specifies the type of the key to create. Can be `exported`,`internal` or `kms`.
192
197
  """
@@ -303,7 +308,7 @@ class _SecretBackendKeyState:
303
308
  """
304
309
  The namespace to provision the resource in.
305
310
  The value should not contain leading or trailing forward slashes.
306
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
311
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
307
312
  *Available only for Vault Enterprise*.
308
313
  """
309
314
  return pulumi.get(self, "namespace")
@@ -364,7 +369,7 @@ class SecretBackendKey(pulumi.CustomResource):
364
369
  :param pulumi.Input[str] managed_key_name: The managed key's configured name.
365
370
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
366
371
  The value should not contain leading or trailing forward slashes.
367
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
372
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
368
373
  *Available only for Vault Enterprise*.
369
374
  :param pulumi.Input[str] type: Specifies the type of the key to create. Can be `exported`,`internal` or `kms`.
370
375
  """
@@ -469,7 +474,7 @@ class SecretBackendKey(pulumi.CustomResource):
469
474
  :param pulumi.Input[str] managed_key_name: The managed key's configured name.
470
475
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
471
476
  The value should not contain leading or trailing forward slashes.
472
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
477
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
473
478
  *Available only for Vault Enterprise*.
474
479
  :param pulumi.Input[str] type: Specifies the type of the key to create. Can be `exported`,`internal` or `kms`.
475
480
  """
@@ -554,7 +559,7 @@ class SecretBackendKey(pulumi.CustomResource):
554
559
  """
555
560
  The namespace to provision the resource in.
556
561
  The value should not contain leading or trailing forward slashes.
557
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
562
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
558
563
  *Available only for Vault Enterprise*.
559
564
  """
560
565
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
  from . import outputs
12
17
  from ._inputs import *
@@ -103,7 +108,7 @@ class SecretBackendRoleArgs:
103
108
  :param pulumi.Input[str] name: The name to identify this role within the backend. Must be unique within the backend.
104
109
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
105
110
  The value should not contain leading or trailing forward slashes.
106
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
111
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
107
112
  *Available only for Vault Enterprise*.
108
113
  :param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
109
114
  :param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
@@ -596,7 +601,7 @@ class SecretBackendRoleArgs:
596
601
  """
597
602
  The namespace to provision the resource in.
598
603
  The value should not contain leading or trailing forward slashes.
599
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
604
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
600
605
  *Available only for Vault Enterprise*.
601
606
  """
602
607
  return pulumi.get(self, "namespace")
@@ -864,7 +869,7 @@ class _SecretBackendRoleState:
864
869
  :param pulumi.Input[str] name: The name to identify this role within the backend. Must be unique within the backend.
865
870
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
866
871
  The value should not contain leading or trailing forward slashes.
867
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
872
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
868
873
  *Available only for Vault Enterprise*.
869
874
  :param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
870
875
  :param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
@@ -1358,7 +1363,7 @@ class _SecretBackendRoleState:
1358
1363
  """
1359
1364
  The namespace to provision the resource in.
1360
1365
  The value should not contain leading or trailing forward slashes.
1361
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1366
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1362
1367
  *Available only for Vault Enterprise*.
1363
1368
  """
1364
1369
  return pulumi.get(self, "namespace")
@@ -1577,7 +1582,7 @@ class SecretBackendRole(pulumi.CustomResource):
1577
1582
  not_before_duration: Optional[pulumi.Input[str]] = None,
1578
1583
  organization_unit: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1579
1584
  organizations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1580
- policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRolePolicyIdentifierArgs']]]]] = None,
1585
+ policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]]] = None,
1581
1586
  policy_identifiers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1582
1587
  postal_codes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1583
1588
  provinces: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
@@ -1593,7 +1598,6 @@ class SecretBackendRole(pulumi.CustomResource):
1593
1598
 
1594
1599
  ## Example Usage
1595
1600
 
1596
- <!--Start PulumiCodeChooser -->
1597
1601
  ```python
1598
1602
  import pulumi
1599
1603
  import pulumi_vault as vault
@@ -1605,6 +1609,7 @@ class SecretBackendRole(pulumi.CustomResource):
1605
1609
  max_lease_ttl_seconds=86400)
1606
1610
  role = vault.pki_secret.SecretBackendRole("role",
1607
1611
  backend=pki.path,
1612
+ name="my_role",
1608
1613
  ttl="3600",
1609
1614
  allow_ip_sans=True,
1610
1615
  key_type="rsa",
@@ -1615,7 +1620,6 @@ class SecretBackendRole(pulumi.CustomResource):
1615
1620
  ],
1616
1621
  allow_subdomains=True)
1617
1622
  ```
1618
- <!--End PulumiCodeChooser -->
1619
1623
 
1620
1624
  ## Import
1621
1625
 
@@ -1666,13 +1670,13 @@ class SecretBackendRole(pulumi.CustomResource):
1666
1670
  :param pulumi.Input[str] name: The name to identify this role within the backend. Must be unique within the backend.
1667
1671
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
1668
1672
  The value should not contain leading or trailing forward slashes.
1669
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1673
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1670
1674
  *Available only for Vault Enterprise*.
1671
1675
  :param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
1672
1676
  :param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
1673
1677
  :param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
1674
1678
  :param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
1675
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRolePolicyIdentifierArgs']]]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
1679
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
1676
1680
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policy_identifiers: Specify the list of allowed policies OIDs. Use with Vault 1.10 or before. For Vault 1.11+, use `policy_identifier` blocks instead
1677
1681
  :param pulumi.Input[Sequence[pulumi.Input[str]]] postal_codes: The postal code of generated certificates
1678
1682
  :param pulumi.Input[Sequence[pulumi.Input[str]]] provinces: The province of generated certificates
@@ -1694,7 +1698,6 @@ class SecretBackendRole(pulumi.CustomResource):
1694
1698
 
1695
1699
  ## Example Usage
1696
1700
 
1697
- <!--Start PulumiCodeChooser -->
1698
1701
  ```python
1699
1702
  import pulumi
1700
1703
  import pulumi_vault as vault
@@ -1706,6 +1709,7 @@ class SecretBackendRole(pulumi.CustomResource):
1706
1709
  max_lease_ttl_seconds=86400)
1707
1710
  role = vault.pki_secret.SecretBackendRole("role",
1708
1711
  backend=pki.path,
1712
+ name="my_role",
1709
1713
  ttl="3600",
1710
1714
  allow_ip_sans=True,
1711
1715
  key_type="rsa",
@@ -1716,7 +1720,6 @@ class SecretBackendRole(pulumi.CustomResource):
1716
1720
  ],
1717
1721
  allow_subdomains=True)
1718
1722
  ```
1719
- <!--End PulumiCodeChooser -->
1720
1723
 
1721
1724
  ## Import
1722
1725
 
@@ -1777,7 +1780,7 @@ class SecretBackendRole(pulumi.CustomResource):
1777
1780
  not_before_duration: Optional[pulumi.Input[str]] = None,
1778
1781
  organization_unit: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1779
1782
  organizations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1780
- policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRolePolicyIdentifierArgs']]]]] = None,
1783
+ policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]]] = None,
1781
1784
  policy_identifiers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1782
1785
  postal_codes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1783
1786
  provinces: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
@@ -1890,7 +1893,7 @@ class SecretBackendRole(pulumi.CustomResource):
1890
1893
  not_before_duration: Optional[pulumi.Input[str]] = None,
1891
1894
  organization_unit: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1892
1895
  organizations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1893
- policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRolePolicyIdentifierArgs']]]]] = None,
1896
+ policy_identifier: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]]] = None,
1894
1897
  policy_identifiers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1895
1898
  postal_codes: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
1896
1899
  provinces: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
@@ -1946,13 +1949,13 @@ class SecretBackendRole(pulumi.CustomResource):
1946
1949
  :param pulumi.Input[str] name: The name to identify this role within the backend. Must be unique within the backend.
1947
1950
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
1948
1951
  The value should not contain leading or trailing forward slashes.
1949
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1952
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1950
1953
  *Available only for Vault Enterprise*.
1951
1954
  :param pulumi.Input[bool] no_store: Flag to not store certificates in the storage backend
1952
1955
  :param pulumi.Input[str] not_before_duration: Specifies the duration by which to backdate the NotBefore property.
1953
1956
  :param pulumi.Input[Sequence[pulumi.Input[str]]] organization_unit: The organization unit of generated certificates
1954
1957
  :param pulumi.Input[Sequence[pulumi.Input[str]]] organizations: The organization of generated certificates
1955
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['SecretBackendRolePolicyIdentifierArgs']]]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
1958
+ :param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRolePolicyIdentifierArgs', 'SecretBackendRolePolicyIdentifierArgsDict']]]] policy_identifier: (Vault 1.11+ only) A block for specifying policy identifers. The `policy_identifier` block can be repeated, and supports the following arguments:
1956
1959
  :param pulumi.Input[Sequence[pulumi.Input[str]]] policy_identifiers: Specify the list of allowed policies OIDs. Use with Vault 1.10 or before. For Vault 1.11+, use `policy_identifier` blocks instead
1957
1960
  :param pulumi.Input[Sequence[pulumi.Input[str]]] postal_codes: The postal code of generated certificates
1958
1961
  :param pulumi.Input[Sequence[pulumi.Input[str]]] provinces: The province of generated certificates
@@ -2275,7 +2278,7 @@ class SecretBackendRole(pulumi.CustomResource):
2275
2278
  """
2276
2279
  The namespace to provision the resource in.
2277
2280
  The value should not contain leading or trailing forward slashes.
2278
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
2281
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
2279
2282
  *Available only for Vault Enterprise*.
2280
2283
  """
2281
2284
  return pulumi.get(self, "namespace")
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = ['SecretBackendRootCertArgs', 'SecretBackendRootCert']
@@ -69,7 +74,7 @@ class SecretBackendRootCertArgs:
69
74
  :param pulumi.Input[int] max_path_length: The maximum path length to encode in the generated certificate
70
75
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
71
76
  The value should not contain leading or trailing forward slashes.
72
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
77
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
73
78
  *Available only for Vault Enterprise*.
74
79
  :param pulumi.Input[str] organization: The organization
75
80
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
@@ -352,7 +357,7 @@ class SecretBackendRootCertArgs:
352
357
  """
353
358
  The namespace to provision the resource in.
354
359
  The value should not contain leading or trailing forward slashes.
355
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
360
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
356
361
  *Available only for Vault Enterprise*.
357
362
  """
358
363
  return pulumi.get(self, "namespace")
@@ -513,7 +518,6 @@ class _SecretBackendRootCertState:
513
518
  postal_code: Optional[pulumi.Input[str]] = None,
514
519
  private_key_format: Optional[pulumi.Input[str]] = None,
515
520
  province: Optional[pulumi.Input[str]] = None,
516
- serial: Optional[pulumi.Input[str]] = None,
517
521
  serial_number: Optional[pulumi.Input[str]] = None,
518
522
  street_address: Optional[pulumi.Input[str]] = None,
519
523
  ttl: Optional[pulumi.Input[str]] = None,
@@ -548,7 +552,7 @@ class _SecretBackendRootCertState:
548
552
  :param pulumi.Input[int] max_path_length: The maximum path length to encode in the generated certificate
549
553
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
550
554
  The value should not contain leading or trailing forward slashes.
551
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
555
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
552
556
  *Available only for Vault Enterprise*.
553
557
  :param pulumi.Input[str] organization: The organization
554
558
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
@@ -557,7 +561,6 @@ class _SecretBackendRootCertState:
557
561
  :param pulumi.Input[str] postal_code: The postal code
558
562
  :param pulumi.Input[str] private_key_format: The private key format
559
563
  :param pulumi.Input[str] province: The province
560
- :param pulumi.Input[str] serial: Deprecated, use `serial_number` instead.
561
564
  :param pulumi.Input[str] serial_number: The certificate's serial number, hex formatted.
562
565
  :param pulumi.Input[str] street_address: The street address
563
566
  :param pulumi.Input[str] ttl: Time to live
@@ -621,11 +624,6 @@ class _SecretBackendRootCertState:
621
624
  pulumi.set(__self__, "private_key_format", private_key_format)
622
625
  if province is not None:
623
626
  pulumi.set(__self__, "province", province)
624
- if serial is not None:
625
- warnings.warn("""Use serial_number instead""", DeprecationWarning)
626
- pulumi.log.warn("""serial is deprecated: Use serial_number instead""")
627
- if serial is not None:
628
- pulumi.set(__self__, "serial", serial)
629
627
  if serial_number is not None:
630
628
  pulumi.set(__self__, "serial_number", serial_number)
631
629
  if street_address is not None:
@@ -888,7 +886,7 @@ class _SecretBackendRootCertState:
888
886
  """
889
887
  The namespace to provision the resource in.
890
888
  The value should not contain leading or trailing forward slashes.
891
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
889
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
892
890
  *Available only for Vault Enterprise*.
893
891
  """
894
892
  return pulumi.get(self, "namespace")
@@ -981,21 +979,6 @@ class _SecretBackendRootCertState:
981
979
  def province(self, value: Optional[pulumi.Input[str]]):
982
980
  pulumi.set(self, "province", value)
983
981
 
984
- @property
985
- @pulumi.getter
986
- def serial(self) -> Optional[pulumi.Input[str]]:
987
- """
988
- Deprecated, use `serial_number` instead.
989
- """
990
- warnings.warn("""Use serial_number instead""", DeprecationWarning)
991
- pulumi.log.warn("""serial is deprecated: Use serial_number instead""")
992
-
993
- return pulumi.get(self, "serial")
994
-
995
- @serial.setter
996
- def serial(self, value: Optional[pulumi.Input[str]]):
997
- pulumi.set(self, "serial", value)
998
-
999
982
  @property
1000
983
  @pulumi.getter(name="serialNumber")
1001
984
  def serial_number(self) -> Optional[pulumi.Input[str]]:
@@ -1095,13 +1078,12 @@ class SecretBackendRootCert(pulumi.CustomResource):
1095
1078
  """
1096
1079
  ## Example Usage
1097
1080
 
1098
- <!--Start PulumiCodeChooser -->
1099
1081
  ```python
1100
1082
  import pulumi
1101
1083
  import pulumi_vault as vault
1102
1084
 
1103
1085
  test = vault.pki_secret.SecretBackendRootCert("test",
1104
- backend=vault_mount["pki"]["path"],
1086
+ backend=pki["path"],
1105
1087
  type="internal",
1106
1088
  common_name="Root CA",
1107
1089
  ttl="315360000",
@@ -1112,9 +1094,8 @@ class SecretBackendRootCert(pulumi.CustomResource):
1112
1094
  exclude_cn_from_sans=True,
1113
1095
  ou="My OU",
1114
1096
  organization="My organization",
1115
- opts=pulumi.ResourceOptions(depends_on=[vault_mount["pki"]]))
1097
+ opts = pulumi.ResourceOptions(depends_on=[pki]))
1116
1098
  ```
1117
- <!--End PulumiCodeChooser -->
1118
1099
 
1119
1100
  :param str resource_name: The name of the resource.
1120
1101
  :param pulumi.ResourceOptions opts: Options for the resource.
@@ -1141,7 +1122,7 @@ class SecretBackendRootCert(pulumi.CustomResource):
1141
1122
  :param pulumi.Input[int] max_path_length: The maximum path length to encode in the generated certificate
1142
1123
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
1143
1124
  The value should not contain leading or trailing forward slashes.
1144
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1125
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1145
1126
  *Available only for Vault Enterprise*.
1146
1127
  :param pulumi.Input[str] organization: The organization
1147
1128
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
@@ -1165,13 +1146,12 @@ class SecretBackendRootCert(pulumi.CustomResource):
1165
1146
  """
1166
1147
  ## Example Usage
1167
1148
 
1168
- <!--Start PulumiCodeChooser -->
1169
1149
  ```python
1170
1150
  import pulumi
1171
1151
  import pulumi_vault as vault
1172
1152
 
1173
1153
  test = vault.pki_secret.SecretBackendRootCert("test",
1174
- backend=vault_mount["pki"]["path"],
1154
+ backend=pki["path"],
1175
1155
  type="internal",
1176
1156
  common_name="Root CA",
1177
1157
  ttl="315360000",
@@ -1182,9 +1162,8 @@ class SecretBackendRootCert(pulumi.CustomResource):
1182
1162
  exclude_cn_from_sans=True,
1183
1163
  ou="My OU",
1184
1164
  organization="My organization",
1185
- opts=pulumi.ResourceOptions(depends_on=[vault_mount["pki"]]))
1165
+ opts = pulumi.ResourceOptions(depends_on=[pki]))
1186
1166
  ```
1187
- <!--End PulumiCodeChooser -->
1188
1167
 
1189
1168
  :param str resource_name: The name of the resource.
1190
1169
  :param SecretBackendRootCertArgs args: The arguments to use to populate this resource's properties.
@@ -1276,7 +1255,6 @@ class SecretBackendRootCert(pulumi.CustomResource):
1276
1255
  __props__.__dict__["issuer_id"] = None
1277
1256
  __props__.__dict__["issuing_ca"] = None
1278
1257
  __props__.__dict__["key_id"] = None
1279
- __props__.__dict__["serial"] = None
1280
1258
  __props__.__dict__["serial_number"] = None
1281
1259
  super(SecretBackendRootCert, __self__).__init__(
1282
1260
  'vault:pkiSecret/secretBackendRootCert:SecretBackendRootCert',
@@ -1316,7 +1294,6 @@ class SecretBackendRootCert(pulumi.CustomResource):
1316
1294
  postal_code: Optional[pulumi.Input[str]] = None,
1317
1295
  private_key_format: Optional[pulumi.Input[str]] = None,
1318
1296
  province: Optional[pulumi.Input[str]] = None,
1319
- serial: Optional[pulumi.Input[str]] = None,
1320
1297
  serial_number: Optional[pulumi.Input[str]] = None,
1321
1298
  street_address: Optional[pulumi.Input[str]] = None,
1322
1299
  ttl: Optional[pulumi.Input[str]] = None,
@@ -1356,7 +1333,7 @@ class SecretBackendRootCert(pulumi.CustomResource):
1356
1333
  :param pulumi.Input[int] max_path_length: The maximum path length to encode in the generated certificate
1357
1334
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
1358
1335
  The value should not contain leading or trailing forward slashes.
1359
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1336
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1360
1337
  *Available only for Vault Enterprise*.
1361
1338
  :param pulumi.Input[str] organization: The organization
1362
1339
  :param pulumi.Input[Sequence[pulumi.Input[str]]] other_sans: List of other SANs
@@ -1365,7 +1342,6 @@ class SecretBackendRootCert(pulumi.CustomResource):
1365
1342
  :param pulumi.Input[str] postal_code: The postal code
1366
1343
  :param pulumi.Input[str] private_key_format: The private key format
1367
1344
  :param pulumi.Input[str] province: The province
1368
- :param pulumi.Input[str] serial: Deprecated, use `serial_number` instead.
1369
1345
  :param pulumi.Input[str] serial_number: The certificate's serial number, hex formatted.
1370
1346
  :param pulumi.Input[str] street_address: The street address
1371
1347
  :param pulumi.Input[str] ttl: Time to live
@@ -1405,7 +1381,6 @@ class SecretBackendRootCert(pulumi.CustomResource):
1405
1381
  __props__.__dict__["postal_code"] = postal_code
1406
1382
  __props__.__dict__["private_key_format"] = private_key_format
1407
1383
  __props__.__dict__["province"] = province
1408
- __props__.__dict__["serial"] = serial
1409
1384
  __props__.__dict__["serial_number"] = serial_number
1410
1385
  __props__.__dict__["street_address"] = street_address
1411
1386
  __props__.__dict__["ttl"] = ttl
@@ -1584,7 +1559,7 @@ class SecretBackendRootCert(pulumi.CustomResource):
1584
1559
  """
1585
1560
  The namespace to provision the resource in.
1586
1561
  The value should not contain leading or trailing forward slashes.
1587
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
1562
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1588
1563
  *Available only for Vault Enterprise*.
1589
1564
  """
1590
1565
  return pulumi.get(self, "namespace")
@@ -1645,17 +1620,6 @@ class SecretBackendRootCert(pulumi.CustomResource):
1645
1620
  """
1646
1621
  return pulumi.get(self, "province")
1647
1622
 
1648
- @property
1649
- @pulumi.getter
1650
- def serial(self) -> pulumi.Output[str]:
1651
- """
1652
- Deprecated, use `serial_number` instead.
1653
- """
1654
- warnings.warn("""Use serial_number instead""", DeprecationWarning)
1655
- pulumi.log.warn("""serial is deprecated: Use serial_number instead""")
1656
-
1657
- return pulumi.get(self, "serial")
1658
-
1659
1623
  @property
1660
1624
  @pulumi.getter(name="serialNumber")
1661
1625
  def serial_number(self) -> pulumi.Output[str]: