@pulumi/consul 3.14.0 → 3.14.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/aclPolicy.d.ts +1 -1
- package/aclPolicy.js +1 -1
- package/aclRole.d.ts +2 -0
- package/aclRole.js +2 -0
- package/aclRole.js.map +1 -1
- package/aclRolePolicyAttachment.d.ts +4 -0
- package/aclRolePolicyAttachment.js +4 -0
- package/aclRolePolicyAttachment.js.map +1 -1
- package/aclToken.d.ts +4 -3
- package/aclToken.js +4 -3
- package/aclToken.js.map +1 -1
- package/aclTokenPolicyAttachment.d.ts +69 -5
- package/aclTokenPolicyAttachment.js +69 -5
- package/aclTokenPolicyAttachment.js.map +1 -1
- package/aclTokenRoleAttachment.d.ts +69 -1
- package/aclTokenRoleAttachment.js +69 -1
- package/aclTokenRoleAttachment.js.map +1 -1
- package/adminPartition.d.ts +1 -1
- package/adminPartition.js +1 -1
- package/certificateAuthority.d.ts +15 -0
- package/certificateAuthority.js.map +1 -1
- package/configEntry.d.ts +9 -1
- package/configEntry.js +9 -1
- package/configEntry.js.map +1 -1
- package/configEntryServiceDefaults.d.ts +2 -0
- package/configEntryServiceDefaults.js +2 -0
- package/configEntryServiceDefaults.js.map +1 -1
- package/configEntryServiceIntentions.d.ts +2 -0
- package/configEntryServiceIntentions.js +2 -0
- package/configEntryServiceIntentions.js.map +1 -1
- package/configEntryServiceResolver.d.ts +2 -0
- package/configEntryServiceResolver.js +2 -0
- package/configEntryServiceResolver.js.map +1 -1
- package/configEntryServiceRouter.d.ts +1 -1
- package/configEntryServiceRouter.js +1 -1
- package/configEntryServiceSplitter.d.ts +2 -0
- package/configEntryServiceSplitter.js +2 -0
- package/configEntryServiceSplitter.js.map +1 -1
- package/getAclTokenSecretId.d.ts +41 -0
- package/getAclTokenSecretId.js +24 -0
- package/getAclTokenSecretId.js.map +1 -1
- package/getCatalogServices.d.ts +7 -0
- package/getCatalogServices.js.map +1 -1
- package/getKeyPrefix.d.ts +6 -0
- package/getKeyPrefix.js +6 -0
- package/getKeyPrefix.js.map +1 -1
- package/getServices.d.ts +7 -0
- package/getServices.js.map +1 -1
- package/intention.d.ts +1 -1
- package/intention.js +1 -1
- package/keyPrefix.d.ts +24 -1
- package/keyPrefix.js +24 -1
- package/keyPrefix.js.map +1 -1
- package/keys.d.ts +10 -0
- package/keys.js +10 -0
- package/keys.js.map +1 -1
- package/namespace.d.ts +1 -1
- package/namespace.js +1 -1
- package/namespacePolicyAttachment.d.ts +67 -1
- package/namespacePolicyAttachment.js +67 -1
- package/namespacePolicyAttachment.js.map +1 -1
- package/namespaceRoleAttachment.d.ts +55 -1
- package/namespaceRoleAttachment.js +55 -1
- package/namespaceRoleAttachment.js.map +1 -1
- package/node.d.ts +1 -1
- package/node.js +1 -1
- package/package.json +2 -2
- package/preparedQuery.d.ts +4 -0
- package/preparedQuery.js +4 -0
- package/preparedQuery.js.map +1 -1
- package/types/input.d.ts +3 -0
- package/types/output.d.ts +3 -0
package/aclPolicy.d.ts
CHANGED
|
@@ -20,7 +20,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
20
20
|
*
|
|
21
21
|
* ## Import
|
|
22
22
|
*
|
|
23
|
-
* `
|
|
23
|
+
* `consul.AclPolicy` can be imported:
|
|
24
24
|
*
|
|
25
25
|
* ```sh
|
|
26
26
|
* $ pulumi import consul:index/aclPolicy:AclPolicy my-policy 1c90ef03-a6dd-6a8c-ac49-042ad3752896
|
package/aclPolicy.js
CHANGED
|
@@ -26,7 +26,7 @@ const utilities = require("./utilities");
|
|
|
26
26
|
*
|
|
27
27
|
* ## Import
|
|
28
28
|
*
|
|
29
|
-
* `
|
|
29
|
+
* `consul.AclPolicy` can be imported:
|
|
30
30
|
*
|
|
31
31
|
* ```sh
|
|
32
32
|
* $ pulumi import consul:index/aclPolicy:AclPolicy my-policy 1c90ef03-a6dd-6a8c-ac49-042ad3752896
|
package/aclRole.d.ts
CHANGED
|
@@ -2,6 +2,8 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
2
2
|
import * as inputs from "./types/input";
|
|
3
3
|
import * as outputs from "./types/output";
|
|
4
4
|
/**
|
|
5
|
+
* The `consul.AclRole` can be used to manage [Consul ACL roles](https://developer.hashicorp.com/consul/docs/security/acl/acl-roles).
|
|
6
|
+
*
|
|
5
7
|
* ## Example Usage
|
|
6
8
|
*
|
|
7
9
|
* ```typescript
|
package/aclRole.js
CHANGED
|
@@ -6,6 +6,8 @@ exports.AclRole = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
+
* The `consul.AclRole` can be used to manage [Consul ACL roles](https://developer.hashicorp.com/consul/docs/security/acl/acl-roles).
|
|
10
|
+
*
|
|
9
11
|
* ## Example Usage
|
|
10
12
|
*
|
|
11
13
|
* ```typescript
|
package/aclRole.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"aclRole.js","sourceRoot":"","sources":["../aclRole.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"aclRole.js","sourceRoot":"","sources":["../aclRole.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA6BG;AACH,MAAa,OAAQ,SAAQ,MAAM,CAAC,cAAc;IAC9C;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAoB,EAAE,IAAmC;QAClH,OAAO,IAAI,OAAO,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC9D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,OAAO,CAAC,YAAY,CAAC;IACxD,CAAC;IA2CD,YAAY,IAAY,EAAE,WAAwC,EAAE,IAAmC;QACnG,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAuC,CAAC;YACtD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,EAAE,iBAAiB,CAAC;YAC/D,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,EAAE,iBAAiB,CAAC;SAClE;aAAM;YACH,MAAM,IAAI,GAAG,WAAsC,CAAC;YACpD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC;YACxD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,EAAE,iBAAiB,CAAC;YAC9D,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,EAAE,iBAAiB,CAAC;SACjE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,OAAO,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC5D,CAAC;;AA/FL,0BAgGC;AAlFG,gBAAgB;AACO,oBAAY,GAAG,8BAA8B,CAAC"}
|
|
@@ -1,5 +1,9 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
/**
|
|
3
|
+
* The `consul.AclRolePolicyAttachment` resource links a Consul ACL role and an ACL policy. The link is implemented through an update to the Consul ACL role.
|
|
4
|
+
*
|
|
5
|
+
* > **NOTE:** This resource is only useful to attach policies to an ACL role that has been created outside the current Terraform configuration. If the ACL role you need to attach a policy to has been created in the current Terraform configuration and will only be used in it, you should use the `policies` attribute of [`consul.AclRole`](https://www.terraform.io/docs/providers/consul/r/acl_role.html).
|
|
6
|
+
*
|
|
3
7
|
* ## Example Usage
|
|
4
8
|
*
|
|
5
9
|
* ```typescript
|
|
@@ -6,6 +6,10 @@ exports.AclRolePolicyAttachment = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
+
* The `consul.AclRolePolicyAttachment` resource links a Consul ACL role and an ACL policy. The link is implemented through an update to the Consul ACL role.
|
|
10
|
+
*
|
|
11
|
+
* > **NOTE:** This resource is only useful to attach policies to an ACL role that has been created outside the current Terraform configuration. If the ACL role you need to attach a policy to has been created in the current Terraform configuration and will only be used in it, you should use the `policies` attribute of [`consul.AclRole`](https://www.terraform.io/docs/providers/consul/r/acl_role.html).
|
|
12
|
+
*
|
|
9
13
|
* ## Example Usage
|
|
10
14
|
*
|
|
11
15
|
* ```typescript
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"aclRolePolicyAttachment.js","sourceRoot":"","sources":["../aclRolePolicyAttachment.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"aclRolePolicyAttachment.js","sourceRoot":"","sources":["../aclRolePolicyAttachment.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA8BG;AACH,MAAa,uBAAwB,SAAQ,MAAM,CAAC,cAAc;IAC9D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAoC,EAAE,IAAmC;QAClI,OAAO,IAAI,uBAAuB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC9E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,uBAAuB,CAAC,YAAY,CAAC;IACxE,CAAC;IAmBD,YAAY,IAAY,EAAE,WAAwE,EAAE,IAAmC;QACnI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAuD,CAAC;YACtE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;YACzC,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;SAC5C;aAAM;YACH,MAAM,IAAI,GAAG,WAAsD,CAAC;YACpE,IAAI,IAAI,EAAE,MAAM,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACzC,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,IAAI,IAAI,EAAE,MAAM,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACzC,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;YACxC,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;SAC3C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,uBAAuB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC5E,CAAC;;AAjEL,0DAkEC;AApDG,gBAAgB;AACO,oCAAY,GAAG,8DAA8D,CAAC"}
|
package/aclToken.d.ts
CHANGED
|
@@ -2,6 +2,10 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
2
2
|
import * as inputs from "./types/input";
|
|
3
3
|
import * as outputs from "./types/output";
|
|
4
4
|
/**
|
|
5
|
+
* The `consul.AclToken` resource writes an ACL token into Consul.
|
|
6
|
+
*
|
|
7
|
+
* > **NOTE:** The `consul.AclToken` resource does not save the secret ID of the generated token to the Terraform state to avoid leaking it when it is not needed. If you need to get the secret ID after creating the ACL token you can use the [`consul.getAclTokenSecretId`](https://www.terraform.io/docs/providers/consul/d/consul_acl_token_secret_id.html) datasource.
|
|
8
|
+
*
|
|
5
9
|
* ## Example Usage
|
|
6
10
|
*
|
|
7
11
|
* ```typescript
|
|
@@ -36,9 +40,6 @@ import * as outputs from "./types/output";
|
|
|
36
40
|
*
|
|
37
41
|
* ```sh
|
|
38
42
|
* $ pulumi import consul:index/aclToken:AclToken anonymous 00000000-0000-0000-0000-000000000002
|
|
39
|
-
* ```
|
|
40
|
-
*
|
|
41
|
-
* ```sh
|
|
42
43
|
* $ pulumi import consul:index/aclToken:AclToken master-token 624d94ca-bc5c-f960-4e83-0a609cf588be
|
|
43
44
|
* ```
|
|
44
45
|
*/
|
package/aclToken.js
CHANGED
|
@@ -6,6 +6,10 @@ exports.AclToken = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
+
* The `consul.AclToken` resource writes an ACL token into Consul.
|
|
10
|
+
*
|
|
11
|
+
* > **NOTE:** The `consul.AclToken` resource does not save the secret ID of the generated token to the Terraform state to avoid leaking it when it is not needed. If you need to get the secret ID after creating the ACL token you can use the [`consul.getAclTokenSecretId`](https://www.terraform.io/docs/providers/consul/d/consul_acl_token_secret_id.html) datasource.
|
|
12
|
+
*
|
|
9
13
|
* ## Example Usage
|
|
10
14
|
*
|
|
11
15
|
* ```typescript
|
|
@@ -40,9 +44,6 @@ const utilities = require("./utilities");
|
|
|
40
44
|
*
|
|
41
45
|
* ```sh
|
|
42
46
|
* $ pulumi import consul:index/aclToken:AclToken anonymous 00000000-0000-0000-0000-000000000002
|
|
43
|
-
* ```
|
|
44
|
-
*
|
|
45
|
-
* ```sh
|
|
46
47
|
* $ pulumi import consul:index/aclToken:AclToken master-token 624d94ca-bc5c-f960-4e83-0a609cf588be
|
|
47
48
|
* ```
|
|
48
49
|
*/
|
package/aclToken.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"aclToken.js","sourceRoot":"","sources":["../aclToken.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"aclToken.js","sourceRoot":"","sources":["../aclToken.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAyCG;AACH,MAAa,QAAS,SAAQ,MAAM,CAAC,cAAc;IAC/C;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAqB,EAAE,IAAmC;QACnH,OAAO,IAAI,QAAQ,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC/D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,QAAQ,CAAC,YAAY,CAAC;IACzD,CAAC;IAuDD,YAAY,IAAY,EAAE,WAA0C,EAAE,IAAmC;QACrG,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAwC,CAAC;YACvD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,EAAE,iBAAiB,CAAC;YAC/D,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,EAAE,iBAAiB,CAAC;SAClE;aAAM;YACH,MAAM,IAAI,GAAG,WAAuC,CAAC;YACrD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC;YACxD,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC;YACtC,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC;YACxD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC;YACtC,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,EAAE,iBAAiB,CAAC;YAC9D,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,EAAE,iBAAiB,CAAC;SACjE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,QAAQ,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC7D,CAAC;;AAjHL,4BAkHC;AApGG,gBAAgB;AACO,qBAAY,GAAG,gCAAgC,CAAC"}
|
|
@@ -1,16 +1,80 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
/**
|
|
3
|
-
*
|
|
3
|
+
* The `consul.AclTokenPolicyAttachment` resource links a Consul Token and an ACL
|
|
4
|
+
* policy. The link is implemented through an update to the Consul ACL token.
|
|
4
5
|
*
|
|
5
|
-
*
|
|
6
|
+
* > **NOTE:** This resource is only useful to attach policies to an ACL token
|
|
7
|
+
* that has been created outside the current Terraform configuration, like the
|
|
8
|
+
* anonymous or the master token. If the token you need to attach a policy to has
|
|
9
|
+
* been created in the current Terraform configuration and will only be used in it,
|
|
10
|
+
* you should use the `policies` attribute of [`consul.AclToken`](https://www.terraform.io/docs/providers/consul/r/acl_token.html).
|
|
6
11
|
*
|
|
7
|
-
*
|
|
12
|
+
* ## Example Usage
|
|
8
13
|
*
|
|
9
|
-
*
|
|
10
|
-
*
|
|
14
|
+
* ### Attach a policy to the anonymous token
|
|
15
|
+
*
|
|
16
|
+
* ```typescript
|
|
17
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
18
|
+
* import * as consul from "@pulumi/consul";
|
|
19
|
+
*
|
|
20
|
+
* const agent = new consul.AclPolicy("agent", {
|
|
21
|
+
* name: "agent",
|
|
22
|
+
* rules: `node_prefix \\"\\" {
|
|
23
|
+
* policy = \\"read\\"
|
|
24
|
+
* }
|
|
25
|
+
* `,
|
|
26
|
+
* });
|
|
27
|
+
* const attachment = new consul.AclTokenPolicyAttachment("attachment", {
|
|
28
|
+
* tokenId: "00000000-0000-0000-0000-000000000002",
|
|
29
|
+
* policy: agent.name,
|
|
30
|
+
* });
|
|
31
|
+
* ```
|
|
32
|
+
*
|
|
33
|
+
* ### Attach a policy to a token created in another Terraform configuration
|
|
34
|
+
*
|
|
35
|
+
* ### In `first_configuration/main.tf`
|
|
36
|
+
*
|
|
37
|
+
* ```typescript
|
|
38
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
39
|
+
* import * as consul from "@pulumi/consul";
|
|
40
|
+
*
|
|
41
|
+
* const test = new consul.AclToken("test", {
|
|
42
|
+
* accessorId: "9b20de68-3ea2-4b70-b4f1-506afad062a4",
|
|
43
|
+
* description: "my test token",
|
|
44
|
+
* local: true,
|
|
45
|
+
* });
|
|
46
|
+
* ```
|
|
47
|
+
*
|
|
48
|
+
* ### In `second_configuration/main.tf`
|
|
49
|
+
*
|
|
50
|
+
* ```typescript
|
|
51
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
52
|
+
* import * as consul from "@pulumi/consul";
|
|
53
|
+
*
|
|
54
|
+
* const agent = new consul.AclPolicy("agent", {
|
|
55
|
+
* name: "agent",
|
|
56
|
+
* rules: `node_prefix \\"\\" {
|
|
57
|
+
* policy = \\"read\\"
|
|
58
|
+
* }
|
|
59
|
+
* `,
|
|
60
|
+
* });
|
|
61
|
+
* const attachment = new consul.AclTokenPolicyAttachment("attachment", {
|
|
62
|
+
* tokenId: "9b20de68-3ea2-4b70-b4f1-506afad062a4",
|
|
63
|
+
* policy: agent.name,
|
|
64
|
+
* });
|
|
11
65
|
* ```
|
|
66
|
+
* **NOTE**: consul.AclToken would attempt to enforce an empty set of policies,
|
|
67
|
+
* because its policies attribute is empty. For this reason it is necessary to add
|
|
68
|
+
* the lifecycle clause to prevent Terraform from attempting to empty the set of
|
|
69
|
+
* policies associated to the token.
|
|
70
|
+
*
|
|
71
|
+
* ## Import
|
|
72
|
+
*
|
|
73
|
+
* `consul.AclTokenPolicyAttachment` can be imported. This is especially useful to manage the
|
|
74
|
+
* policies attached to the anonymous and the master tokens with Terraform:
|
|
12
75
|
*
|
|
13
76
|
* ```sh
|
|
77
|
+
* $ pulumi import consul:index/aclTokenPolicyAttachment:AclTokenPolicyAttachment anonymous 00000000-0000-0000-0000-000000000002:policy_name
|
|
14
78
|
* $ pulumi import consul:index/aclTokenPolicyAttachment:AclTokenPolicyAttachment master-token 624d94ca-bc5c-f960-4e83-0a609cf588be:policy_name
|
|
15
79
|
* ```
|
|
16
80
|
*/
|
|
@@ -6,17 +6,81 @@ exports.AclTokenPolicyAttachment = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
-
*
|
|
9
|
+
* The `consul.AclTokenPolicyAttachment` resource links a Consul Token and an ACL
|
|
10
|
+
* policy. The link is implemented through an update to the Consul ACL token.
|
|
10
11
|
*
|
|
11
|
-
*
|
|
12
|
+
* > **NOTE:** This resource is only useful to attach policies to an ACL token
|
|
13
|
+
* that has been created outside the current Terraform configuration, like the
|
|
14
|
+
* anonymous or the master token. If the token you need to attach a policy to has
|
|
15
|
+
* been created in the current Terraform configuration and will only be used in it,
|
|
16
|
+
* you should use the `policies` attribute of [`consul.AclToken`](https://www.terraform.io/docs/providers/consul/r/acl_token.html).
|
|
12
17
|
*
|
|
13
|
-
*
|
|
18
|
+
* ## Example Usage
|
|
14
19
|
*
|
|
15
|
-
*
|
|
16
|
-
*
|
|
20
|
+
* ### Attach a policy to the anonymous token
|
|
21
|
+
*
|
|
22
|
+
* ```typescript
|
|
23
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
24
|
+
* import * as consul from "@pulumi/consul";
|
|
25
|
+
*
|
|
26
|
+
* const agent = new consul.AclPolicy("agent", {
|
|
27
|
+
* name: "agent",
|
|
28
|
+
* rules: `node_prefix \\"\\" {
|
|
29
|
+
* policy = \\"read\\"
|
|
30
|
+
* }
|
|
31
|
+
* `,
|
|
32
|
+
* });
|
|
33
|
+
* const attachment = new consul.AclTokenPolicyAttachment("attachment", {
|
|
34
|
+
* tokenId: "00000000-0000-0000-0000-000000000002",
|
|
35
|
+
* policy: agent.name,
|
|
36
|
+
* });
|
|
37
|
+
* ```
|
|
38
|
+
*
|
|
39
|
+
* ### Attach a policy to a token created in another Terraform configuration
|
|
40
|
+
*
|
|
41
|
+
* ### In `first_configuration/main.tf`
|
|
42
|
+
*
|
|
43
|
+
* ```typescript
|
|
44
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
45
|
+
* import * as consul from "@pulumi/consul";
|
|
46
|
+
*
|
|
47
|
+
* const test = new consul.AclToken("test", {
|
|
48
|
+
* accessorId: "9b20de68-3ea2-4b70-b4f1-506afad062a4",
|
|
49
|
+
* description: "my test token",
|
|
50
|
+
* local: true,
|
|
51
|
+
* });
|
|
52
|
+
* ```
|
|
53
|
+
*
|
|
54
|
+
* ### In `second_configuration/main.tf`
|
|
55
|
+
*
|
|
56
|
+
* ```typescript
|
|
57
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
58
|
+
* import * as consul from "@pulumi/consul";
|
|
59
|
+
*
|
|
60
|
+
* const agent = new consul.AclPolicy("agent", {
|
|
61
|
+
* name: "agent",
|
|
62
|
+
* rules: `node_prefix \\"\\" {
|
|
63
|
+
* policy = \\"read\\"
|
|
64
|
+
* }
|
|
65
|
+
* `,
|
|
66
|
+
* });
|
|
67
|
+
* const attachment = new consul.AclTokenPolicyAttachment("attachment", {
|
|
68
|
+
* tokenId: "9b20de68-3ea2-4b70-b4f1-506afad062a4",
|
|
69
|
+
* policy: agent.name,
|
|
70
|
+
* });
|
|
17
71
|
* ```
|
|
72
|
+
* **NOTE**: consul.AclToken would attempt to enforce an empty set of policies,
|
|
73
|
+
* because its policies attribute is empty. For this reason it is necessary to add
|
|
74
|
+
* the lifecycle clause to prevent Terraform from attempting to empty the set of
|
|
75
|
+
* policies associated to the token.
|
|
76
|
+
*
|
|
77
|
+
* ## Import
|
|
78
|
+
*
|
|
79
|
+
* `consul.AclTokenPolicyAttachment` can be imported. This is especially useful to manage the
|
|
80
|
+
* policies attached to the anonymous and the master tokens with Terraform:
|
|
18
81
|
*
|
|
19
82
|
* ```sh
|
|
83
|
+
* $ pulumi import consul:index/aclTokenPolicyAttachment:AclTokenPolicyAttachment anonymous 00000000-0000-0000-0000-000000000002:policy_name
|
|
20
84
|
* $ pulumi import consul:index/aclTokenPolicyAttachment:AclTokenPolicyAttachment master-token 624d94ca-bc5c-f960-4e83-0a609cf588be:policy_name
|
|
21
85
|
* ```
|
|
22
86
|
*/
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"aclTokenPolicyAttachment.js","sourceRoot":"","sources":["../aclTokenPolicyAttachment.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"aclTokenPolicyAttachment.js","sourceRoot":"","sources":["../aclTokenPolicyAttachment.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA8EG;AACH,MAAa,wBAAyB,SAAQ,MAAM,CAAC,cAAc;IAC/D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAqC,EAAE,IAAmC;QACnI,OAAO,IAAI,wBAAwB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC/E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,wBAAwB,CAAC,YAAY,CAAC;IACzE,CAAC;IAmBD,YAAY,IAAY,EAAE,WAA0E,EAAE,IAAmC;QACrI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAwD,CAAC;YACvE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;YACzC,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;SAC9C;aAAM;YACH,MAAM,IAAI,GAAG,WAAuD,CAAC;YACrE,IAAI,IAAI,EAAE,MAAM,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACzC,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,IAAI,IAAI,EAAE,OAAO,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1C,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;YACxC,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;SAC7C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,wBAAwB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC7E,CAAC;;AAjEL,4DAkEC;AApDG,gBAAgB;AACO,qCAAY,GAAG,gEAAgE,CAAC"}
|
|
@@ -1,8 +1,76 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
/**
|
|
3
|
+
* The `consul.AclTokenRoleAttachment` resource links a Consul Token and an ACL
|
|
4
|
+
* role. The link is implemented through an update to the Consul ACL token.
|
|
5
|
+
*
|
|
6
|
+
* > **NOTE:** This resource is only useful to attach roles to an ACL token
|
|
7
|
+
* that has been created outside the current Terraform configuration, like the
|
|
8
|
+
* anonymous or the master token. If the token you need to attach a policy to has
|
|
9
|
+
* been created in the current Terraform configuration and will only be used in it,
|
|
10
|
+
* you should use the `roles` attribute of [`consul.AclToken`](https://www.terraform.io/docs/providers/consul/r/acl_token.html).
|
|
11
|
+
*
|
|
12
|
+
* ## Example Usage
|
|
13
|
+
*
|
|
14
|
+
* ### Attach a role to the anonymous token
|
|
15
|
+
*
|
|
16
|
+
* ```typescript
|
|
17
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
18
|
+
* import * as consul from "@pulumi/consul";
|
|
19
|
+
*
|
|
20
|
+
* const role = new consul.AclRole("role", {
|
|
21
|
+
* name: "foo",
|
|
22
|
+
* description: "Foo",
|
|
23
|
+
* serviceIdentities: [{
|
|
24
|
+
* serviceName: "foo",
|
|
25
|
+
* }],
|
|
26
|
+
* });
|
|
27
|
+
* const attachment = new consul.AclTokenRoleAttachment("attachment", {
|
|
28
|
+
* tokenId: "00000000-0000-0000-0000-000000000002",
|
|
29
|
+
* roleId: role.id,
|
|
30
|
+
* });
|
|
31
|
+
* ```
|
|
32
|
+
*
|
|
33
|
+
* ### Attach a policy to a token created in another Terraform configuration
|
|
34
|
+
*
|
|
35
|
+
* ### In `first_configuration/main.tf`
|
|
36
|
+
*
|
|
37
|
+
* ```typescript
|
|
38
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
39
|
+
* import * as consul from "@pulumi/consul";
|
|
40
|
+
*
|
|
41
|
+
* const test = new consul.AclToken("test", {
|
|
42
|
+
* accessorId: "5914ee49-eb8d-4837-9767-9299ec155000",
|
|
43
|
+
* description: "my test token",
|
|
44
|
+
* local: true,
|
|
45
|
+
* });
|
|
46
|
+
* ```
|
|
47
|
+
*
|
|
48
|
+
* ### In `second_configuration/main.tf`
|
|
49
|
+
*
|
|
50
|
+
* ```typescript
|
|
51
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
52
|
+
* import * as consul from "@pulumi/consul";
|
|
53
|
+
*
|
|
54
|
+
* const role = new consul.AclRole("role", {
|
|
55
|
+
* name: "foo",
|
|
56
|
+
* description: "Foo",
|
|
57
|
+
* serviceIdentities: [{
|
|
58
|
+
* serviceName: "foo",
|
|
59
|
+
* }],
|
|
60
|
+
* });
|
|
61
|
+
* const attachment = new consul.AclTokenRoleAttachment("attachment", {
|
|
62
|
+
* tokenId: "00000000-0000-0000-0000-000000000002",
|
|
63
|
+
* roleId: role.id,
|
|
64
|
+
* });
|
|
65
|
+
* ```
|
|
66
|
+
* **NOTE**: `consul.AclToken` would attempt to enforce an empty set of roles,
|
|
67
|
+
* because its `roles` attribute is empty. For this reason it is necessary to add
|
|
68
|
+
* the lifecycle clause to prevent Terraform from attempting to clear the set of
|
|
69
|
+
* roles associated to the token.
|
|
70
|
+
*
|
|
3
71
|
* ## Import
|
|
4
72
|
*
|
|
5
|
-
* `
|
|
73
|
+
* `consul.AclTokenRoleAttachment` can be imported. This is especially useful to manage the
|
|
6
74
|
* policies attached to the anonymous and the master tokens with Terraform:
|
|
7
75
|
*
|
|
8
76
|
* ```sh
|
|
@@ -6,9 +6,77 @@ exports.AclTokenRoleAttachment = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
+
* The `consul.AclTokenRoleAttachment` resource links a Consul Token and an ACL
|
|
10
|
+
* role. The link is implemented through an update to the Consul ACL token.
|
|
11
|
+
*
|
|
12
|
+
* > **NOTE:** This resource is only useful to attach roles to an ACL token
|
|
13
|
+
* that has been created outside the current Terraform configuration, like the
|
|
14
|
+
* anonymous or the master token. If the token you need to attach a policy to has
|
|
15
|
+
* been created in the current Terraform configuration and will only be used in it,
|
|
16
|
+
* you should use the `roles` attribute of [`consul.AclToken`](https://www.terraform.io/docs/providers/consul/r/acl_token.html).
|
|
17
|
+
*
|
|
18
|
+
* ## Example Usage
|
|
19
|
+
*
|
|
20
|
+
* ### Attach a role to the anonymous token
|
|
21
|
+
*
|
|
22
|
+
* ```typescript
|
|
23
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
24
|
+
* import * as consul from "@pulumi/consul";
|
|
25
|
+
*
|
|
26
|
+
* const role = new consul.AclRole("role", {
|
|
27
|
+
* name: "foo",
|
|
28
|
+
* description: "Foo",
|
|
29
|
+
* serviceIdentities: [{
|
|
30
|
+
* serviceName: "foo",
|
|
31
|
+
* }],
|
|
32
|
+
* });
|
|
33
|
+
* const attachment = new consul.AclTokenRoleAttachment("attachment", {
|
|
34
|
+
* tokenId: "00000000-0000-0000-0000-000000000002",
|
|
35
|
+
* roleId: role.id,
|
|
36
|
+
* });
|
|
37
|
+
* ```
|
|
38
|
+
*
|
|
39
|
+
* ### Attach a policy to a token created in another Terraform configuration
|
|
40
|
+
*
|
|
41
|
+
* ### In `first_configuration/main.tf`
|
|
42
|
+
*
|
|
43
|
+
* ```typescript
|
|
44
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
45
|
+
* import * as consul from "@pulumi/consul";
|
|
46
|
+
*
|
|
47
|
+
* const test = new consul.AclToken("test", {
|
|
48
|
+
* accessorId: "5914ee49-eb8d-4837-9767-9299ec155000",
|
|
49
|
+
* description: "my test token",
|
|
50
|
+
* local: true,
|
|
51
|
+
* });
|
|
52
|
+
* ```
|
|
53
|
+
*
|
|
54
|
+
* ### In `second_configuration/main.tf`
|
|
55
|
+
*
|
|
56
|
+
* ```typescript
|
|
57
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
58
|
+
* import * as consul from "@pulumi/consul";
|
|
59
|
+
*
|
|
60
|
+
* const role = new consul.AclRole("role", {
|
|
61
|
+
* name: "foo",
|
|
62
|
+
* description: "Foo",
|
|
63
|
+
* serviceIdentities: [{
|
|
64
|
+
* serviceName: "foo",
|
|
65
|
+
* }],
|
|
66
|
+
* });
|
|
67
|
+
* const attachment = new consul.AclTokenRoleAttachment("attachment", {
|
|
68
|
+
* tokenId: "00000000-0000-0000-0000-000000000002",
|
|
69
|
+
* roleId: role.id,
|
|
70
|
+
* });
|
|
71
|
+
* ```
|
|
72
|
+
* **NOTE**: `consul.AclToken` would attempt to enforce an empty set of roles,
|
|
73
|
+
* because its `roles` attribute is empty. For this reason it is necessary to add
|
|
74
|
+
* the lifecycle clause to prevent Terraform from attempting to clear the set of
|
|
75
|
+
* roles associated to the token.
|
|
76
|
+
*
|
|
9
77
|
* ## Import
|
|
10
78
|
*
|
|
11
|
-
* `
|
|
79
|
+
* `consul.AclTokenRoleAttachment` can be imported. This is especially useful to manage the
|
|
12
80
|
* policies attached to the anonymous and the master tokens with Terraform:
|
|
13
81
|
*
|
|
14
82
|
* ```sh
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"aclTokenRoleAttachment.js","sourceRoot":"","sources":["../aclTokenRoleAttachment.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"aclTokenRoleAttachment.js","sourceRoot":"","sources":["../aclTokenRoleAttachment.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA6EG;AACH,MAAa,sBAAuB,SAAQ,MAAM,CAAC,cAAc;IAC7D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAmC,EAAE,IAAmC;QACjI,OAAO,IAAI,sBAAsB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC7E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,sBAAsB,CAAC,YAAY,CAAC;IACvE,CAAC;IAmBD,YAAY,IAAY,EAAE,WAAsE,EAAE,IAAmC;QACjI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAsD,CAAC;YACrE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;SAC9C;aAAM;YACH,MAAM,IAAI,GAAG,WAAqD,CAAC;YACnE,IAAI,IAAI,EAAE,IAAI,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACvC,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,IAAI,IAAI,EAAE,OAAO,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1C,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;SAC7C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,sBAAsB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC3E,CAAC;;AAjEL,wDAkEC;AApDG,gBAAgB;AACO,mCAAY,GAAG,4DAA4D,CAAC"}
|
package/adminPartition.d.ts
CHANGED
package/adminPartition.js
CHANGED
|
@@ -27,11 +27,16 @@ export declare class CertificateAuthority extends pulumi.CustomResource {
|
|
|
27
27
|
*/
|
|
28
28
|
static isInstance(obj: any): obj is CertificateAuthority;
|
|
29
29
|
/**
|
|
30
|
+
* The raw configuration to use for the chosen provider. For more information on configuring the Connect CA providers, see [Provider Config](https://developer.hashicorp.com/consul/docs/connect/ca).
|
|
31
|
+
*
|
|
30
32
|
* @deprecated The config attribute is deprecated, please use configJson instead.
|
|
31
33
|
*/
|
|
32
34
|
readonly config: pulumi.Output<{
|
|
33
35
|
[key: string]: string;
|
|
34
36
|
} | undefined>;
|
|
37
|
+
/**
|
|
38
|
+
* The raw configuration to use for the chosen provider. For more information on configuring the Connect CA providers, see [Provider Config](https://developer.hashicorp.com/consul/docs/connect/ca).
|
|
39
|
+
*/
|
|
35
40
|
readonly configJson: pulumi.Output<string | undefined>;
|
|
36
41
|
/**
|
|
37
42
|
* Specifies the CA provider type to use.
|
|
@@ -51,11 +56,16 @@ export declare class CertificateAuthority extends pulumi.CustomResource {
|
|
|
51
56
|
*/
|
|
52
57
|
export interface CertificateAuthorityState {
|
|
53
58
|
/**
|
|
59
|
+
* The raw configuration to use for the chosen provider. For more information on configuring the Connect CA providers, see [Provider Config](https://developer.hashicorp.com/consul/docs/connect/ca).
|
|
60
|
+
*
|
|
54
61
|
* @deprecated The config attribute is deprecated, please use configJson instead.
|
|
55
62
|
*/
|
|
56
63
|
config?: pulumi.Input<{
|
|
57
64
|
[key: string]: pulumi.Input<string>;
|
|
58
65
|
}>;
|
|
66
|
+
/**
|
|
67
|
+
* The raw configuration to use for the chosen provider. For more information on configuring the Connect CA providers, see [Provider Config](https://developer.hashicorp.com/consul/docs/connect/ca).
|
|
68
|
+
*/
|
|
59
69
|
configJson?: pulumi.Input<string>;
|
|
60
70
|
/**
|
|
61
71
|
* Specifies the CA provider type to use.
|
|
@@ -67,11 +77,16 @@ export interface CertificateAuthorityState {
|
|
|
67
77
|
*/
|
|
68
78
|
export interface CertificateAuthorityArgs {
|
|
69
79
|
/**
|
|
80
|
+
* The raw configuration to use for the chosen provider. For more information on configuring the Connect CA providers, see [Provider Config](https://developer.hashicorp.com/consul/docs/connect/ca).
|
|
81
|
+
*
|
|
70
82
|
* @deprecated The config attribute is deprecated, please use configJson instead.
|
|
71
83
|
*/
|
|
72
84
|
config?: pulumi.Input<{
|
|
73
85
|
[key: string]: pulumi.Input<string>;
|
|
74
86
|
}>;
|
|
87
|
+
/**
|
|
88
|
+
* The raw configuration to use for the chosen provider. For more information on configuring the Connect CA providers, see [Provider Config](https://developer.hashicorp.com/consul/docs/connect/ca).
|
|
89
|
+
*/
|
|
75
90
|
configJson?: pulumi.Input<string>;
|
|
76
91
|
/**
|
|
77
92
|
* Specifies the CA provider type to use.
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"certificateAuthority.js","sourceRoot":"","sources":["../certificateAuthority.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;GAUG;AACH,MAAa,oBAAqB,SAAQ,MAAM,CAAC,cAAc;IAC3D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAiC,EAAE,IAAmC;QAC/H,OAAO,IAAI,oBAAoB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC3E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,oBAAoB,CAAC,YAAY,CAAC;IACrE,CAAC;
|
|
1
|
+
{"version":3,"file":"certificateAuthority.js","sourceRoot":"","sources":["../certificateAuthority.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;GAUG;AACH,MAAa,oBAAqB,SAAQ,MAAM,CAAC,cAAc;IAC3D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAiC,EAAE,IAAmC;QAC/H,OAAO,IAAI,oBAAoB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC3E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,oBAAoB,CAAC,YAAY,CAAC;IACrE,CAAC;IAyBD,YAAY,IAAY,EAAE,WAAkE,EAAE,IAAmC;QAC7H,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAoD,CAAC;YACnE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;YACzC,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,EAAE,eAAe,CAAC;SAC9D;aAAM;YACH,MAAM,IAAI,GAAG,WAAmD,CAAC;YACjE,IAAI,IAAI,EAAE,eAAe,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,6CAA6C,CAAC,CAAC;aAClE;YACD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;YACxC,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,EAAE,eAAe,CAAC;SAC7D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,oBAAoB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACzE,CAAC;;AAtEL,oDAuEC;AAzDG,gBAAgB;AACO,iCAAY,GAAG,wDAAwD,CAAC"}
|
package/configEntry.d.ts
CHANGED
|
@@ -1,5 +1,13 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
/**
|
|
3
|
+
* The [Configuration Entry](https://www.consul.io/docs/agent/config_entries.html)
|
|
4
|
+
* resource can be used to provide cluster-wide defaults for various aspects of
|
|
5
|
+
* Consul.
|
|
6
|
+
*
|
|
7
|
+
* > **NOTE:** Because the schema in a `consul.ConfigEntry` resource can vary
|
|
8
|
+
* widely between the various configuration entry kinds, it is necessary to explicitly
|
|
9
|
+
* define every attribute to avoid Terraform reporting a diff on the resource.
|
|
10
|
+
*
|
|
3
11
|
* ## Example Usage
|
|
4
12
|
*
|
|
5
13
|
* ```typescript
|
|
@@ -274,7 +282,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
274
282
|
*
|
|
275
283
|
* ## Import
|
|
276
284
|
*
|
|
277
|
-
* `
|
|
285
|
+
* `consul.ConfigEntry` can be imported using the syntax `<kind>/<name>` if the
|
|
278
286
|
* config entry is in the default partition and default namespace, or
|
|
279
287
|
* `<partition>/<namespace>/<kind>/<name>` for config entries in a non-default
|
|
280
288
|
* partition or namespace:
|
package/configEntry.js
CHANGED
|
@@ -6,6 +6,14 @@ exports.ConfigEntry = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
+
* The [Configuration Entry](https://www.consul.io/docs/agent/config_entries.html)
|
|
10
|
+
* resource can be used to provide cluster-wide defaults for various aspects of
|
|
11
|
+
* Consul.
|
|
12
|
+
*
|
|
13
|
+
* > **NOTE:** Because the schema in a `consul.ConfigEntry` resource can vary
|
|
14
|
+
* widely between the various configuration entry kinds, it is necessary to explicitly
|
|
15
|
+
* define every attribute to avoid Terraform reporting a diff on the resource.
|
|
16
|
+
*
|
|
9
17
|
* ## Example Usage
|
|
10
18
|
*
|
|
11
19
|
* ```typescript
|
|
@@ -280,7 +288,7 @@ const utilities = require("./utilities");
|
|
|
280
288
|
*
|
|
281
289
|
* ## Import
|
|
282
290
|
*
|
|
283
|
-
* `
|
|
291
|
+
* `consul.ConfigEntry` can be imported using the syntax `<kind>/<name>` if the
|
|
284
292
|
* config entry is in the default partition and default namespace, or
|
|
285
293
|
* `<partition>/<namespace>/<kind>/<name>` for config entries in a non-default
|
|
286
294
|
* partition or namespace:
|
package/configEntry.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"configEntry.js","sourceRoot":"","sources":["../configEntry.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"configEntry.js","sourceRoot":"","sources":["../configEntry.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAmSG;AACH,MAAa,WAAY,SAAQ,MAAM,CAAC,cAAc;IAClD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAwB,EAAE,IAAmC;QACtH,OAAO,IAAI,WAAW,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAClE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,WAAW,CAAC,YAAY,CAAC;IAC5D,CAAC;IA+BD,YAAY,IAAY,EAAE,WAAgD,EAAE,IAAmC;QAC3G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA2C,CAAC;YAC1D,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;SAClD;aAAM;YACH,MAAM,IAAI,GAAG,WAA0C,CAAC;YACxD,IAAI,IAAI,EAAE,IAAI,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACvC,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;SACjD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,WAAW,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAChE,CAAC;;AAhFL,kCAiFC;AAnEG,gBAAgB;AACO,wBAAY,GAAG,sCAAsC,CAAC"}
|
|
@@ -2,6 +2,8 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
2
2
|
import * as inputs from "./types/input";
|
|
3
3
|
import * as outputs from "./types/output";
|
|
4
4
|
/**
|
|
5
|
+
* The `consul.ConfigEntryServiceDefaults` resource configures a [service defaults](https://developer.hashicorp.com/consul/docs/connect/config-entries/service-defaults) config entry that contains common configuration settings for service mesh services, such as upstreams and gateways.
|
|
6
|
+
*
|
|
5
7
|
* ## Example Usage
|
|
6
8
|
*
|
|
7
9
|
* ```typescript
|