@pulumi/consul 3.14.0 → 3.14.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (72) hide show
  1. package/aclPolicy.d.ts +1 -1
  2. package/aclPolicy.js +1 -1
  3. package/aclRole.d.ts +2 -0
  4. package/aclRole.js +2 -0
  5. package/aclRole.js.map +1 -1
  6. package/aclRolePolicyAttachment.d.ts +4 -0
  7. package/aclRolePolicyAttachment.js +4 -0
  8. package/aclRolePolicyAttachment.js.map +1 -1
  9. package/aclToken.d.ts +4 -3
  10. package/aclToken.js +4 -3
  11. package/aclToken.js.map +1 -1
  12. package/aclTokenPolicyAttachment.d.ts +69 -5
  13. package/aclTokenPolicyAttachment.js +69 -5
  14. package/aclTokenPolicyAttachment.js.map +1 -1
  15. package/aclTokenRoleAttachment.d.ts +69 -1
  16. package/aclTokenRoleAttachment.js +69 -1
  17. package/aclTokenRoleAttachment.js.map +1 -1
  18. package/adminPartition.d.ts +1 -1
  19. package/adminPartition.js +1 -1
  20. package/certificateAuthority.d.ts +15 -0
  21. package/certificateAuthority.js.map +1 -1
  22. package/configEntry.d.ts +9 -1
  23. package/configEntry.js +9 -1
  24. package/configEntry.js.map +1 -1
  25. package/configEntryServiceDefaults.d.ts +2 -0
  26. package/configEntryServiceDefaults.js +2 -0
  27. package/configEntryServiceDefaults.js.map +1 -1
  28. package/configEntryServiceIntentions.d.ts +2 -0
  29. package/configEntryServiceIntentions.js +2 -0
  30. package/configEntryServiceIntentions.js.map +1 -1
  31. package/configEntryServiceResolver.d.ts +2 -0
  32. package/configEntryServiceResolver.js +2 -0
  33. package/configEntryServiceResolver.js.map +1 -1
  34. package/configEntryServiceRouter.d.ts +1 -1
  35. package/configEntryServiceRouter.js +1 -1
  36. package/configEntryServiceSplitter.d.ts +2 -0
  37. package/configEntryServiceSplitter.js +2 -0
  38. package/configEntryServiceSplitter.js.map +1 -1
  39. package/getAclTokenSecretId.d.ts +41 -0
  40. package/getAclTokenSecretId.js +24 -0
  41. package/getAclTokenSecretId.js.map +1 -1
  42. package/getCatalogServices.d.ts +7 -0
  43. package/getCatalogServices.js.map +1 -1
  44. package/getKeyPrefix.d.ts +6 -0
  45. package/getKeyPrefix.js +6 -0
  46. package/getKeyPrefix.js.map +1 -1
  47. package/getServices.d.ts +7 -0
  48. package/getServices.js.map +1 -1
  49. package/intention.d.ts +1 -1
  50. package/intention.js +1 -1
  51. package/keyPrefix.d.ts +24 -1
  52. package/keyPrefix.js +24 -1
  53. package/keyPrefix.js.map +1 -1
  54. package/keys.d.ts +10 -0
  55. package/keys.js +10 -0
  56. package/keys.js.map +1 -1
  57. package/namespace.d.ts +1 -1
  58. package/namespace.js +1 -1
  59. package/namespacePolicyAttachment.d.ts +67 -1
  60. package/namespacePolicyAttachment.js +67 -1
  61. package/namespacePolicyAttachment.js.map +1 -1
  62. package/namespaceRoleAttachment.d.ts +55 -1
  63. package/namespaceRoleAttachment.js +55 -1
  64. package/namespaceRoleAttachment.js.map +1 -1
  65. package/node.d.ts +1 -1
  66. package/node.js +1 -1
  67. package/package.json +2 -2
  68. package/preparedQuery.d.ts +4 -0
  69. package/preparedQuery.js +4 -0
  70. package/preparedQuery.js.map +1 -1
  71. package/types/input.d.ts +3 -0
  72. package/types/output.d.ts +3 -0
package/aclPolicy.d.ts CHANGED
@@ -20,7 +20,7 @@ import * as pulumi from "@pulumi/pulumi";
20
20
  *
21
21
  * ## Import
22
22
  *
23
- * `consul_acl_policy` can be imported:
23
+ * `consul.AclPolicy` can be imported:
24
24
  *
25
25
  * ```sh
26
26
  * $ pulumi import consul:index/aclPolicy:AclPolicy my-policy 1c90ef03-a6dd-6a8c-ac49-042ad3752896
package/aclPolicy.js CHANGED
@@ -26,7 +26,7 @@ const utilities = require("./utilities");
26
26
  *
27
27
  * ## Import
28
28
  *
29
- * `consul_acl_policy` can be imported:
29
+ * `consul.AclPolicy` can be imported:
30
30
  *
31
31
  * ```sh
32
32
  * $ pulumi import consul:index/aclPolicy:AclPolicy my-policy 1c90ef03-a6dd-6a8c-ac49-042ad3752896
package/aclRole.d.ts CHANGED
@@ -2,6 +2,8 @@ import * as pulumi from "@pulumi/pulumi";
2
2
  import * as inputs from "./types/input";
3
3
  import * as outputs from "./types/output";
4
4
  /**
5
+ * The `consul.AclRole` can be used to manage [Consul ACL roles](https://developer.hashicorp.com/consul/docs/security/acl/acl-roles).
6
+ *
5
7
  * ## Example Usage
6
8
  *
7
9
  * ```typescript
package/aclRole.js CHANGED
@@ -6,6 +6,8 @@ exports.AclRole = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("./utilities");
8
8
  /**
9
+ * The `consul.AclRole` can be used to manage [Consul ACL roles](https://developer.hashicorp.com/consul/docs/security/acl/acl-roles).
10
+ *
9
11
  * ## Example Usage
10
12
  *
11
13
  * ```typescript
package/aclRole.js.map CHANGED
@@ -1 +1 @@
1
- {"version":3,"file":"aclRole.js","sourceRoot":"","sources":["../aclRole.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2BG;AACH,MAAa,OAAQ,SAAQ,MAAM,CAAC,cAAc;IAC9C;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAoB,EAAE,IAAmC;QAClH,OAAO,IAAI,OAAO,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC9D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,OAAO,CAAC,YAAY,CAAC;IACxD,CAAC;IA2CD,YAAY,IAAY,EAAE,WAAwC,EAAE,IAAmC;QACnG,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAuC,CAAC;YACtD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,EAAE,iBAAiB,CAAC;YAC/D,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,EAAE,iBAAiB,CAAC;SAClE;aAAM;YACH,MAAM,IAAI,GAAG,WAAsC,CAAC;YACpD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC;YACxD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,EAAE,iBAAiB,CAAC;YAC9D,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,EAAE,iBAAiB,CAAC;SACjE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,OAAO,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC5D,CAAC;;AA/FL,0BAgGC;AAlFG,gBAAgB;AACO,oBAAY,GAAG,8BAA8B,CAAC"}
1
+ {"version":3,"file":"aclRole.js","sourceRoot":"","sources":["../aclRole.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA6BG;AACH,MAAa,OAAQ,SAAQ,MAAM,CAAC,cAAc;IAC9C;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAoB,EAAE,IAAmC;QAClH,OAAO,IAAI,OAAO,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC9D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,OAAO,CAAC,YAAY,CAAC;IACxD,CAAC;IA2CD,YAAY,IAAY,EAAE,WAAwC,EAAE,IAAmC;QACnG,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAuC,CAAC;YACtD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,EAAE,iBAAiB,CAAC;YAC/D,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,EAAE,iBAAiB,CAAC;SAClE;aAAM;YACH,MAAM,IAAI,GAAG,WAAsC,CAAC;YACpD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC;YACxD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,EAAE,iBAAiB,CAAC;YAC9D,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,EAAE,iBAAiB,CAAC;SACjE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,OAAO,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC5D,CAAC;;AA/FL,0BAgGC;AAlFG,gBAAgB;AACO,oBAAY,GAAG,8BAA8B,CAAC"}
@@ -1,5 +1,9 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
2
  /**
3
+ * The `consul.AclRolePolicyAttachment` resource links a Consul ACL role and an ACL policy. The link is implemented through an update to the Consul ACL role.
4
+ *
5
+ * > **NOTE:** This resource is only useful to attach policies to an ACL role that has been created outside the current Terraform configuration. If the ACL role you need to attach a policy to has been created in the current Terraform configuration and will only be used in it, you should use the `policies` attribute of [`consul.AclRole`](https://www.terraform.io/docs/providers/consul/r/acl_role.html).
6
+ *
3
7
  * ## Example Usage
4
8
  *
5
9
  * ```typescript
@@ -6,6 +6,10 @@ exports.AclRolePolicyAttachment = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("./utilities");
8
8
  /**
9
+ * The `consul.AclRolePolicyAttachment` resource links a Consul ACL role and an ACL policy. The link is implemented through an update to the Consul ACL role.
10
+ *
11
+ * > **NOTE:** This resource is only useful to attach policies to an ACL role that has been created outside the current Terraform configuration. If the ACL role you need to attach a policy to has been created in the current Terraform configuration and will only be used in it, you should use the `policies` attribute of [`consul.AclRole`](https://www.terraform.io/docs/providers/consul/r/acl_role.html).
12
+ *
9
13
  * ## Example Usage
10
14
  *
11
15
  * ```typescript
@@ -1 +1 @@
1
- {"version":3,"file":"aclRolePolicyAttachment.js","sourceRoot":"","sources":["../aclRolePolicyAttachment.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;GA0BG;AACH,MAAa,uBAAwB,SAAQ,MAAM,CAAC,cAAc;IAC9D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAoC,EAAE,IAAmC;QAClI,OAAO,IAAI,uBAAuB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC9E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,uBAAuB,CAAC,YAAY,CAAC;IACxE,CAAC;IAmBD,YAAY,IAAY,EAAE,WAAwE,EAAE,IAAmC;QACnI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAuD,CAAC;YACtE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;YACzC,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;SAC5C;aAAM;YACH,MAAM,IAAI,GAAG,WAAsD,CAAC;YACpE,IAAI,IAAI,EAAE,MAAM,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACzC,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,IAAI,IAAI,EAAE,MAAM,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACzC,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;YACxC,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;SAC3C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,uBAAuB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC5E,CAAC;;AAjEL,0DAkEC;AApDG,gBAAgB;AACO,oCAAY,GAAG,8DAA8D,CAAC"}
1
+ {"version":3,"file":"aclRolePolicyAttachment.js","sourceRoot":"","sources":["../aclRolePolicyAttachment.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA8BG;AACH,MAAa,uBAAwB,SAAQ,MAAM,CAAC,cAAc;IAC9D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAoC,EAAE,IAAmC;QAClI,OAAO,IAAI,uBAAuB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC9E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,uBAAuB,CAAC,YAAY,CAAC;IACxE,CAAC;IAmBD,YAAY,IAAY,EAAE,WAAwE,EAAE,IAAmC;QACnI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAuD,CAAC;YACtE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;YACzC,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;SAC5C;aAAM;YACH,MAAM,IAAI,GAAG,WAAsD,CAAC;YACpE,IAAI,IAAI,EAAE,MAAM,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACzC,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,IAAI,IAAI,EAAE,MAAM,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACzC,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;YACxC,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;SAC3C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,uBAAuB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC5E,CAAC;;AAjEL,0DAkEC;AApDG,gBAAgB;AACO,oCAAY,GAAG,8DAA8D,CAAC"}
package/aclToken.d.ts CHANGED
@@ -2,6 +2,10 @@ import * as pulumi from "@pulumi/pulumi";
2
2
  import * as inputs from "./types/input";
3
3
  import * as outputs from "./types/output";
4
4
  /**
5
+ * The `consul.AclToken` resource writes an ACL token into Consul.
6
+ *
7
+ * > **NOTE:** The `consul.AclToken` resource does not save the secret ID of the generated token to the Terraform state to avoid leaking it when it is not needed. If you need to get the secret ID after creating the ACL token you can use the [`consul.getAclTokenSecretId`](https://www.terraform.io/docs/providers/consul/d/consul_acl_token_secret_id.html) datasource.
8
+ *
5
9
  * ## Example Usage
6
10
  *
7
11
  * ```typescript
@@ -36,9 +40,6 @@ import * as outputs from "./types/output";
36
40
  *
37
41
  * ```sh
38
42
  * $ pulumi import consul:index/aclToken:AclToken anonymous 00000000-0000-0000-0000-000000000002
39
- * ```
40
- *
41
- * ```sh
42
43
  * $ pulumi import consul:index/aclToken:AclToken master-token 624d94ca-bc5c-f960-4e83-0a609cf588be
43
44
  * ```
44
45
  */
package/aclToken.js CHANGED
@@ -6,6 +6,10 @@ exports.AclToken = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("./utilities");
8
8
  /**
9
+ * The `consul.AclToken` resource writes an ACL token into Consul.
10
+ *
11
+ * > **NOTE:** The `consul.AclToken` resource does not save the secret ID of the generated token to the Terraform state to avoid leaking it when it is not needed. If you need to get the secret ID after creating the ACL token you can use the [`consul.getAclTokenSecretId`](https://www.terraform.io/docs/providers/consul/d/consul_acl_token_secret_id.html) datasource.
12
+ *
9
13
  * ## Example Usage
10
14
  *
11
15
  * ```typescript
@@ -40,9 +44,6 @@ const utilities = require("./utilities");
40
44
  *
41
45
  * ```sh
42
46
  * $ pulumi import consul:index/aclToken:AclToken anonymous 00000000-0000-0000-0000-000000000002
43
- * ```
44
- *
45
- * ```sh
46
47
  * $ pulumi import consul:index/aclToken:AclToken master-token 624d94ca-bc5c-f960-4e83-0a609cf588be
47
48
  * ```
48
49
  */
package/aclToken.js.map CHANGED
@@ -1 +1 @@
1
- {"version":3,"file":"aclToken.js","sourceRoot":"","sources":["../aclToken.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAwCG;AACH,MAAa,QAAS,SAAQ,MAAM,CAAC,cAAc;IAC/C;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAqB,EAAE,IAAmC;QACnH,OAAO,IAAI,QAAQ,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC/D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,QAAQ,CAAC,YAAY,CAAC;IACzD,CAAC;IAuDD,YAAY,IAAY,EAAE,WAA0C,EAAE,IAAmC;QACrG,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAwC,CAAC;YACvD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,EAAE,iBAAiB,CAAC;YAC/D,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,EAAE,iBAAiB,CAAC;SAClE;aAAM;YACH,MAAM,IAAI,GAAG,WAAuC,CAAC;YACrD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC;YACxD,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC;YACtC,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC;YACxD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC;YACtC,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,EAAE,iBAAiB,CAAC;YAC9D,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,EAAE,iBAAiB,CAAC;SACjE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,QAAQ,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC7D,CAAC;;AAjHL,4BAkHC;AApGG,gBAAgB;AACO,qBAAY,GAAG,gCAAgC,CAAC"}
1
+ {"version":3,"file":"aclToken.js","sourceRoot":"","sources":["../aclToken.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAyCG;AACH,MAAa,QAAS,SAAQ,MAAM,CAAC,cAAc;IAC/C;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAqB,EAAE,IAAmC;QACnH,OAAO,IAAI,QAAQ,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC/D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,QAAQ,CAAC,YAAY,CAAC;IACzD,CAAC;IAuDD,YAAY,IAAY,EAAE,WAA0C,EAAE,IAAmC;QACrG,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAwC,CAAC;YACvD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,EAAE,iBAAiB,CAAC;YAC/D,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,EAAE,iBAAiB,CAAC;SAClE;aAAM;YACH,MAAM,IAAI,GAAG,WAAuC,CAAC;YACrD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC;YACxD,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC;YACtC,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC;YACxD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC;YACtC,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,EAAE,iBAAiB,CAAC;YAC9D,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,EAAE,iBAAiB,CAAC;SACjE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,QAAQ,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC7D,CAAC;;AAjHL,4BAkHC;AApGG,gBAAgB;AACO,qBAAY,GAAG,gCAAgC,CAAC"}
@@ -1,16 +1,80 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
2
  /**
3
- * ## Import
3
+ * The `consul.AclTokenPolicyAttachment` resource links a Consul Token and an ACL
4
+ * policy. The link is implemented through an update to the Consul ACL token.
4
5
  *
5
- * `consul_acl_token_policy_attachment` can be imported. This is especially useful to manage the
6
+ * > **NOTE:** This resource is only useful to attach policies to an ACL token
7
+ * that has been created outside the current Terraform configuration, like the
8
+ * anonymous or the master token. If the token you need to attach a policy to has
9
+ * been created in the current Terraform configuration and will only be used in it,
10
+ * you should use the `policies` attribute of [`consul.AclToken`](https://www.terraform.io/docs/providers/consul/r/acl_token.html).
6
11
  *
7
- * policies attached to the anonymous and the master tokens with Terraform:
12
+ * ## Example Usage
8
13
  *
9
- * ```sh
10
- * $ pulumi import consul:index/aclTokenPolicyAttachment:AclTokenPolicyAttachment anonymous 00000000-0000-0000-0000-000000000002:policy_name
14
+ * ### Attach a policy to the anonymous token
15
+ *
16
+ * ```typescript
17
+ * import * as pulumi from "@pulumi/pulumi";
18
+ * import * as consul from "@pulumi/consul";
19
+ *
20
+ * const agent = new consul.AclPolicy("agent", {
21
+ * name: "agent",
22
+ * rules: `node_prefix \\"\\" {
23
+ * policy = \\"read\\"
24
+ * }
25
+ * `,
26
+ * });
27
+ * const attachment = new consul.AclTokenPolicyAttachment("attachment", {
28
+ * tokenId: "00000000-0000-0000-0000-000000000002",
29
+ * policy: agent.name,
30
+ * });
31
+ * ```
32
+ *
33
+ * ### Attach a policy to a token created in another Terraform configuration
34
+ *
35
+ * ### In `first_configuration/main.tf`
36
+ *
37
+ * ```typescript
38
+ * import * as pulumi from "@pulumi/pulumi";
39
+ * import * as consul from "@pulumi/consul";
40
+ *
41
+ * const test = new consul.AclToken("test", {
42
+ * accessorId: "9b20de68-3ea2-4b70-b4f1-506afad062a4",
43
+ * description: "my test token",
44
+ * local: true,
45
+ * });
46
+ * ```
47
+ *
48
+ * ### In `second_configuration/main.tf`
49
+ *
50
+ * ```typescript
51
+ * import * as pulumi from "@pulumi/pulumi";
52
+ * import * as consul from "@pulumi/consul";
53
+ *
54
+ * const agent = new consul.AclPolicy("agent", {
55
+ * name: "agent",
56
+ * rules: `node_prefix \\"\\" {
57
+ * policy = \\"read\\"
58
+ * }
59
+ * `,
60
+ * });
61
+ * const attachment = new consul.AclTokenPolicyAttachment("attachment", {
62
+ * tokenId: "9b20de68-3ea2-4b70-b4f1-506afad062a4",
63
+ * policy: agent.name,
64
+ * });
11
65
  * ```
66
+ * **NOTE**: consul.AclToken would attempt to enforce an empty set of policies,
67
+ * because its policies attribute is empty. For this reason it is necessary to add
68
+ * the lifecycle clause to prevent Terraform from attempting to empty the set of
69
+ * policies associated to the token.
70
+ *
71
+ * ## Import
72
+ *
73
+ * `consul.AclTokenPolicyAttachment` can be imported. This is especially useful to manage the
74
+ * policies attached to the anonymous and the master tokens with Terraform:
12
75
  *
13
76
  * ```sh
77
+ * $ pulumi import consul:index/aclTokenPolicyAttachment:AclTokenPolicyAttachment anonymous 00000000-0000-0000-0000-000000000002:policy_name
14
78
  * $ pulumi import consul:index/aclTokenPolicyAttachment:AclTokenPolicyAttachment master-token 624d94ca-bc5c-f960-4e83-0a609cf588be:policy_name
15
79
  * ```
16
80
  */
@@ -6,17 +6,81 @@ exports.AclTokenPolicyAttachment = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("./utilities");
8
8
  /**
9
- * ## Import
9
+ * The `consul.AclTokenPolicyAttachment` resource links a Consul Token and an ACL
10
+ * policy. The link is implemented through an update to the Consul ACL token.
10
11
  *
11
- * `consul_acl_token_policy_attachment` can be imported. This is especially useful to manage the
12
+ * > **NOTE:** This resource is only useful to attach policies to an ACL token
13
+ * that has been created outside the current Terraform configuration, like the
14
+ * anonymous or the master token. If the token you need to attach a policy to has
15
+ * been created in the current Terraform configuration and will only be used in it,
16
+ * you should use the `policies` attribute of [`consul.AclToken`](https://www.terraform.io/docs/providers/consul/r/acl_token.html).
12
17
  *
13
- * policies attached to the anonymous and the master tokens with Terraform:
18
+ * ## Example Usage
14
19
  *
15
- * ```sh
16
- * $ pulumi import consul:index/aclTokenPolicyAttachment:AclTokenPolicyAttachment anonymous 00000000-0000-0000-0000-000000000002:policy_name
20
+ * ### Attach a policy to the anonymous token
21
+ *
22
+ * ```typescript
23
+ * import * as pulumi from "@pulumi/pulumi";
24
+ * import * as consul from "@pulumi/consul";
25
+ *
26
+ * const agent = new consul.AclPolicy("agent", {
27
+ * name: "agent",
28
+ * rules: `node_prefix \\"\\" {
29
+ * policy = \\"read\\"
30
+ * }
31
+ * `,
32
+ * });
33
+ * const attachment = new consul.AclTokenPolicyAttachment("attachment", {
34
+ * tokenId: "00000000-0000-0000-0000-000000000002",
35
+ * policy: agent.name,
36
+ * });
37
+ * ```
38
+ *
39
+ * ### Attach a policy to a token created in another Terraform configuration
40
+ *
41
+ * ### In `first_configuration/main.tf`
42
+ *
43
+ * ```typescript
44
+ * import * as pulumi from "@pulumi/pulumi";
45
+ * import * as consul from "@pulumi/consul";
46
+ *
47
+ * const test = new consul.AclToken("test", {
48
+ * accessorId: "9b20de68-3ea2-4b70-b4f1-506afad062a4",
49
+ * description: "my test token",
50
+ * local: true,
51
+ * });
52
+ * ```
53
+ *
54
+ * ### In `second_configuration/main.tf`
55
+ *
56
+ * ```typescript
57
+ * import * as pulumi from "@pulumi/pulumi";
58
+ * import * as consul from "@pulumi/consul";
59
+ *
60
+ * const agent = new consul.AclPolicy("agent", {
61
+ * name: "agent",
62
+ * rules: `node_prefix \\"\\" {
63
+ * policy = \\"read\\"
64
+ * }
65
+ * `,
66
+ * });
67
+ * const attachment = new consul.AclTokenPolicyAttachment("attachment", {
68
+ * tokenId: "9b20de68-3ea2-4b70-b4f1-506afad062a4",
69
+ * policy: agent.name,
70
+ * });
17
71
  * ```
72
+ * **NOTE**: consul.AclToken would attempt to enforce an empty set of policies,
73
+ * because its policies attribute is empty. For this reason it is necessary to add
74
+ * the lifecycle clause to prevent Terraform from attempting to empty the set of
75
+ * policies associated to the token.
76
+ *
77
+ * ## Import
78
+ *
79
+ * `consul.AclTokenPolicyAttachment` can be imported. This is especially useful to manage the
80
+ * policies attached to the anonymous and the master tokens with Terraform:
18
81
  *
19
82
  * ```sh
83
+ * $ pulumi import consul:index/aclTokenPolicyAttachment:AclTokenPolicyAttachment anonymous 00000000-0000-0000-0000-000000000002:policy_name
20
84
  * $ pulumi import consul:index/aclTokenPolicyAttachment:AclTokenPolicyAttachment master-token 624d94ca-bc5c-f960-4e83-0a609cf588be:policy_name
21
85
  * ```
22
86
  */
@@ -1 +1 @@
1
- {"version":3,"file":"aclTokenPolicyAttachment.js","sourceRoot":"","sources":["../aclTokenPolicyAttachment.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;GAcG;AACH,MAAa,wBAAyB,SAAQ,MAAM,CAAC,cAAc;IAC/D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAqC,EAAE,IAAmC;QACnI,OAAO,IAAI,wBAAwB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC/E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,wBAAwB,CAAC,YAAY,CAAC;IACzE,CAAC;IAmBD,YAAY,IAAY,EAAE,WAA0E,EAAE,IAAmC;QACrI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAwD,CAAC;YACvE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;YACzC,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;SAC9C;aAAM;YACH,MAAM,IAAI,GAAG,WAAuD,CAAC;YACrE,IAAI,IAAI,EAAE,MAAM,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACzC,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,IAAI,IAAI,EAAE,OAAO,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1C,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;YACxC,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;SAC7C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,wBAAwB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC7E,CAAC;;AAjEL,4DAkEC;AApDG,gBAAgB;AACO,qCAAY,GAAG,gEAAgE,CAAC"}
1
+ {"version":3,"file":"aclTokenPolicyAttachment.js","sourceRoot":"","sources":["../aclTokenPolicyAttachment.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA8EG;AACH,MAAa,wBAAyB,SAAQ,MAAM,CAAC,cAAc;IAC/D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAqC,EAAE,IAAmC;QACnI,OAAO,IAAI,wBAAwB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC/E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,wBAAwB,CAAC,YAAY,CAAC;IACzE,CAAC;IAmBD,YAAY,IAAY,EAAE,WAA0E,EAAE,IAAmC;QACrI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAwD,CAAC;YACvE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;YACzC,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;SAC9C;aAAM;YACH,MAAM,IAAI,GAAG,WAAuD,CAAC;YACrE,IAAI,IAAI,EAAE,MAAM,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACzC,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,IAAI,IAAI,EAAE,OAAO,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1C,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;YACxC,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;SAC7C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,wBAAwB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC7E,CAAC;;AAjEL,4DAkEC;AApDG,gBAAgB;AACO,qCAAY,GAAG,gEAAgE,CAAC"}
@@ -1,8 +1,76 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
2
  /**
3
+ * The `consul.AclTokenRoleAttachment` resource links a Consul Token and an ACL
4
+ * role. The link is implemented through an update to the Consul ACL token.
5
+ *
6
+ * > **NOTE:** This resource is only useful to attach roles to an ACL token
7
+ * that has been created outside the current Terraform configuration, like the
8
+ * anonymous or the master token. If the token you need to attach a policy to has
9
+ * been created in the current Terraform configuration and will only be used in it,
10
+ * you should use the `roles` attribute of [`consul.AclToken`](https://www.terraform.io/docs/providers/consul/r/acl_token.html).
11
+ *
12
+ * ## Example Usage
13
+ *
14
+ * ### Attach a role to the anonymous token
15
+ *
16
+ * ```typescript
17
+ * import * as pulumi from "@pulumi/pulumi";
18
+ * import * as consul from "@pulumi/consul";
19
+ *
20
+ * const role = new consul.AclRole("role", {
21
+ * name: "foo",
22
+ * description: "Foo",
23
+ * serviceIdentities: [{
24
+ * serviceName: "foo",
25
+ * }],
26
+ * });
27
+ * const attachment = new consul.AclTokenRoleAttachment("attachment", {
28
+ * tokenId: "00000000-0000-0000-0000-000000000002",
29
+ * roleId: role.id,
30
+ * });
31
+ * ```
32
+ *
33
+ * ### Attach a policy to a token created in another Terraform configuration
34
+ *
35
+ * ### In `first_configuration/main.tf`
36
+ *
37
+ * ```typescript
38
+ * import * as pulumi from "@pulumi/pulumi";
39
+ * import * as consul from "@pulumi/consul";
40
+ *
41
+ * const test = new consul.AclToken("test", {
42
+ * accessorId: "5914ee49-eb8d-4837-9767-9299ec155000",
43
+ * description: "my test token",
44
+ * local: true,
45
+ * });
46
+ * ```
47
+ *
48
+ * ### In `second_configuration/main.tf`
49
+ *
50
+ * ```typescript
51
+ * import * as pulumi from "@pulumi/pulumi";
52
+ * import * as consul from "@pulumi/consul";
53
+ *
54
+ * const role = new consul.AclRole("role", {
55
+ * name: "foo",
56
+ * description: "Foo",
57
+ * serviceIdentities: [{
58
+ * serviceName: "foo",
59
+ * }],
60
+ * });
61
+ * const attachment = new consul.AclTokenRoleAttachment("attachment", {
62
+ * tokenId: "00000000-0000-0000-0000-000000000002",
63
+ * roleId: role.id,
64
+ * });
65
+ * ```
66
+ * **NOTE**: `consul.AclToken` would attempt to enforce an empty set of roles,
67
+ * because its `roles` attribute is empty. For this reason it is necessary to add
68
+ * the lifecycle clause to prevent Terraform from attempting to clear the set of
69
+ * roles associated to the token.
70
+ *
3
71
  * ## Import
4
72
  *
5
- * `consul_acl_token_role_attachment` can be imported. This is especially useful to manage the
73
+ * `consul.AclTokenRoleAttachment` can be imported. This is especially useful to manage the
6
74
  * policies attached to the anonymous and the master tokens with Terraform:
7
75
  *
8
76
  * ```sh
@@ -6,9 +6,77 @@ exports.AclTokenRoleAttachment = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("./utilities");
8
8
  /**
9
+ * The `consul.AclTokenRoleAttachment` resource links a Consul Token and an ACL
10
+ * role. The link is implemented through an update to the Consul ACL token.
11
+ *
12
+ * > **NOTE:** This resource is only useful to attach roles to an ACL token
13
+ * that has been created outside the current Terraform configuration, like the
14
+ * anonymous or the master token. If the token you need to attach a policy to has
15
+ * been created in the current Terraform configuration and will only be used in it,
16
+ * you should use the `roles` attribute of [`consul.AclToken`](https://www.terraform.io/docs/providers/consul/r/acl_token.html).
17
+ *
18
+ * ## Example Usage
19
+ *
20
+ * ### Attach a role to the anonymous token
21
+ *
22
+ * ```typescript
23
+ * import * as pulumi from "@pulumi/pulumi";
24
+ * import * as consul from "@pulumi/consul";
25
+ *
26
+ * const role = new consul.AclRole("role", {
27
+ * name: "foo",
28
+ * description: "Foo",
29
+ * serviceIdentities: [{
30
+ * serviceName: "foo",
31
+ * }],
32
+ * });
33
+ * const attachment = new consul.AclTokenRoleAttachment("attachment", {
34
+ * tokenId: "00000000-0000-0000-0000-000000000002",
35
+ * roleId: role.id,
36
+ * });
37
+ * ```
38
+ *
39
+ * ### Attach a policy to a token created in another Terraform configuration
40
+ *
41
+ * ### In `first_configuration/main.tf`
42
+ *
43
+ * ```typescript
44
+ * import * as pulumi from "@pulumi/pulumi";
45
+ * import * as consul from "@pulumi/consul";
46
+ *
47
+ * const test = new consul.AclToken("test", {
48
+ * accessorId: "5914ee49-eb8d-4837-9767-9299ec155000",
49
+ * description: "my test token",
50
+ * local: true,
51
+ * });
52
+ * ```
53
+ *
54
+ * ### In `second_configuration/main.tf`
55
+ *
56
+ * ```typescript
57
+ * import * as pulumi from "@pulumi/pulumi";
58
+ * import * as consul from "@pulumi/consul";
59
+ *
60
+ * const role = new consul.AclRole("role", {
61
+ * name: "foo",
62
+ * description: "Foo",
63
+ * serviceIdentities: [{
64
+ * serviceName: "foo",
65
+ * }],
66
+ * });
67
+ * const attachment = new consul.AclTokenRoleAttachment("attachment", {
68
+ * tokenId: "00000000-0000-0000-0000-000000000002",
69
+ * roleId: role.id,
70
+ * });
71
+ * ```
72
+ * **NOTE**: `consul.AclToken` would attempt to enforce an empty set of roles,
73
+ * because its `roles` attribute is empty. For this reason it is necessary to add
74
+ * the lifecycle clause to prevent Terraform from attempting to clear the set of
75
+ * roles associated to the token.
76
+ *
9
77
  * ## Import
10
78
  *
11
- * `consul_acl_token_role_attachment` can be imported. This is especially useful to manage the
79
+ * `consul.AclTokenRoleAttachment` can be imported. This is especially useful to manage the
12
80
  * policies attached to the anonymous and the master tokens with Terraform:
13
81
  *
14
82
  * ```sh
@@ -1 +1 @@
1
- {"version":3,"file":"aclTokenRoleAttachment.js","sourceRoot":"","sources":["../aclTokenRoleAttachment.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;GASG;AACH,MAAa,sBAAuB,SAAQ,MAAM,CAAC,cAAc;IAC7D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAmC,EAAE,IAAmC;QACjI,OAAO,IAAI,sBAAsB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC7E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,sBAAsB,CAAC,YAAY,CAAC;IACvE,CAAC;IAmBD,YAAY,IAAY,EAAE,WAAsE,EAAE,IAAmC;QACjI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAsD,CAAC;YACrE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;SAC9C;aAAM;YACH,MAAM,IAAI,GAAG,WAAqD,CAAC;YACnE,IAAI,IAAI,EAAE,IAAI,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACvC,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,IAAI,IAAI,EAAE,OAAO,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1C,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;SAC7C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,sBAAsB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC3E,CAAC;;AAjEL,wDAkEC;AApDG,gBAAgB;AACO,mCAAY,GAAG,4DAA4D,CAAC"}
1
+ {"version":3,"file":"aclTokenRoleAttachment.js","sourceRoot":"","sources":["../aclTokenRoleAttachment.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA6EG;AACH,MAAa,sBAAuB,SAAQ,MAAM,CAAC,cAAc;IAC7D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAmC,EAAE,IAAmC;QACjI,OAAO,IAAI,sBAAsB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC7E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,sBAAsB,CAAC,YAAY,CAAC;IACvE,CAAC;IAmBD,YAAY,IAAY,EAAE,WAAsE,EAAE,IAAmC;QACjI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAsD,CAAC;YACrE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;SAC9C;aAAM;YACH,MAAM,IAAI,GAAG,WAAqD,CAAC;YACnE,IAAI,IAAI,EAAE,IAAI,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACvC,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,IAAI,IAAI,EAAE,OAAO,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1C,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;SAC7C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,sBAAsB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC3E,CAAC;;AAjEL,wDAkEC;AApDG,gBAAgB;AACO,mCAAY,GAAG,4DAA4D,CAAC"}
@@ -18,7 +18,7 @@ import * as pulumi from "@pulumi/pulumi";
18
18
  *
19
19
  * ## Import
20
20
  *
21
- * `consul_admin_partition` can be imported:
21
+ * `consul.AdminPartition` can be imported:
22
22
  *
23
23
  * ```sh
24
24
  * $ pulumi import consul:index/adminPartition:AdminPartition na_west na-west
package/adminPartition.js CHANGED
@@ -24,7 +24,7 @@ const utilities = require("./utilities");
24
24
  *
25
25
  * ## Import
26
26
  *
27
- * `consul_admin_partition` can be imported:
27
+ * `consul.AdminPartition` can be imported:
28
28
  *
29
29
  * ```sh
30
30
  * $ pulumi import consul:index/adminPartition:AdminPartition na_west na-west
@@ -27,11 +27,16 @@ export declare class CertificateAuthority extends pulumi.CustomResource {
27
27
  */
28
28
  static isInstance(obj: any): obj is CertificateAuthority;
29
29
  /**
30
+ * The raw configuration to use for the chosen provider. For more information on configuring the Connect CA providers, see [Provider Config](https://developer.hashicorp.com/consul/docs/connect/ca).
31
+ *
30
32
  * @deprecated The config attribute is deprecated, please use configJson instead.
31
33
  */
32
34
  readonly config: pulumi.Output<{
33
35
  [key: string]: string;
34
36
  } | undefined>;
37
+ /**
38
+ * The raw configuration to use for the chosen provider. For more information on configuring the Connect CA providers, see [Provider Config](https://developer.hashicorp.com/consul/docs/connect/ca).
39
+ */
35
40
  readonly configJson: pulumi.Output<string | undefined>;
36
41
  /**
37
42
  * Specifies the CA provider type to use.
@@ -51,11 +56,16 @@ export declare class CertificateAuthority extends pulumi.CustomResource {
51
56
  */
52
57
  export interface CertificateAuthorityState {
53
58
  /**
59
+ * The raw configuration to use for the chosen provider. For more information on configuring the Connect CA providers, see [Provider Config](https://developer.hashicorp.com/consul/docs/connect/ca).
60
+ *
54
61
  * @deprecated The config attribute is deprecated, please use configJson instead.
55
62
  */
56
63
  config?: pulumi.Input<{
57
64
  [key: string]: pulumi.Input<string>;
58
65
  }>;
66
+ /**
67
+ * The raw configuration to use for the chosen provider. For more information on configuring the Connect CA providers, see [Provider Config](https://developer.hashicorp.com/consul/docs/connect/ca).
68
+ */
59
69
  configJson?: pulumi.Input<string>;
60
70
  /**
61
71
  * Specifies the CA provider type to use.
@@ -67,11 +77,16 @@ export interface CertificateAuthorityState {
67
77
  */
68
78
  export interface CertificateAuthorityArgs {
69
79
  /**
80
+ * The raw configuration to use for the chosen provider. For more information on configuring the Connect CA providers, see [Provider Config](https://developer.hashicorp.com/consul/docs/connect/ca).
81
+ *
70
82
  * @deprecated The config attribute is deprecated, please use configJson instead.
71
83
  */
72
84
  config?: pulumi.Input<{
73
85
  [key: string]: pulumi.Input<string>;
74
86
  }>;
87
+ /**
88
+ * The raw configuration to use for the chosen provider. For more information on configuring the Connect CA providers, see [Provider Config](https://developer.hashicorp.com/consul/docs/connect/ca).
89
+ */
75
90
  configJson?: pulumi.Input<string>;
76
91
  /**
77
92
  * Specifies the CA provider type to use.
@@ -1 +1 @@
1
- {"version":3,"file":"certificateAuthority.js","sourceRoot":"","sources":["../certificateAuthority.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;GAUG;AACH,MAAa,oBAAqB,SAAQ,MAAM,CAAC,cAAc;IAC3D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAiC,EAAE,IAAmC;QAC/H,OAAO,IAAI,oBAAoB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC3E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,oBAAoB,CAAC,YAAY,CAAC;IACrE,CAAC;IAoBD,YAAY,IAAY,EAAE,WAAkE,EAAE,IAAmC;QAC7H,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAoD,CAAC;YACnE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;YACzC,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,EAAE,eAAe,CAAC;SAC9D;aAAM;YACH,MAAM,IAAI,GAAG,WAAmD,CAAC;YACjE,IAAI,IAAI,EAAE,eAAe,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,6CAA6C,CAAC,CAAC;aAClE;YACD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;YACxC,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,EAAE,eAAe,CAAC;SAC7D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,oBAAoB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACzE,CAAC;;AAjEL,oDAkEC;AApDG,gBAAgB;AACO,iCAAY,GAAG,wDAAwD,CAAC"}
1
+ {"version":3,"file":"certificateAuthority.js","sourceRoot":"","sources":["../certificateAuthority.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;GAUG;AACH,MAAa,oBAAqB,SAAQ,MAAM,CAAC,cAAc;IAC3D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAiC,EAAE,IAAmC;QAC/H,OAAO,IAAI,oBAAoB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC3E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,oBAAoB,CAAC,YAAY,CAAC;IACrE,CAAC;IAyBD,YAAY,IAAY,EAAE,WAAkE,EAAE,IAAmC;QAC7H,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAoD,CAAC;YACnE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;YACzC,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,EAAE,eAAe,CAAC;SAC9D;aAAM;YACH,MAAM,IAAI,GAAG,WAAmD,CAAC;YACjE,IAAI,IAAI,EAAE,eAAe,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,6CAA6C,CAAC,CAAC;aAClE;YACD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;YACxC,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,EAAE,eAAe,CAAC;SAC7D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,oBAAoB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACzE,CAAC;;AAtEL,oDAuEC;AAzDG,gBAAgB;AACO,iCAAY,GAAG,wDAAwD,CAAC"}
package/configEntry.d.ts CHANGED
@@ -1,5 +1,13 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
2
  /**
3
+ * The [Configuration Entry](https://www.consul.io/docs/agent/config_entries.html)
4
+ * resource can be used to provide cluster-wide defaults for various aspects of
5
+ * Consul.
6
+ *
7
+ * > **NOTE:** Because the schema in a `consul.ConfigEntry` resource can vary
8
+ * widely between the various configuration entry kinds, it is necessary to explicitly
9
+ * define every attribute to avoid Terraform reporting a diff on the resource.
10
+ *
3
11
  * ## Example Usage
4
12
  *
5
13
  * ```typescript
@@ -274,7 +282,7 @@ import * as pulumi from "@pulumi/pulumi";
274
282
  *
275
283
  * ## Import
276
284
  *
277
- * `consul_config_entry` can be imported using the syntax `<kind>/<name>` if the
285
+ * `consul.ConfigEntry` can be imported using the syntax `<kind>/<name>` if the
278
286
  * config entry is in the default partition and default namespace, or
279
287
  * `<partition>/<namespace>/<kind>/<name>` for config entries in a non-default
280
288
  * partition or namespace:
package/configEntry.js CHANGED
@@ -6,6 +6,14 @@ exports.ConfigEntry = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("./utilities");
8
8
  /**
9
+ * The [Configuration Entry](https://www.consul.io/docs/agent/config_entries.html)
10
+ * resource can be used to provide cluster-wide defaults for various aspects of
11
+ * Consul.
12
+ *
13
+ * > **NOTE:** Because the schema in a `consul.ConfigEntry` resource can vary
14
+ * widely between the various configuration entry kinds, it is necessary to explicitly
15
+ * define every attribute to avoid Terraform reporting a diff on the resource.
16
+ *
9
17
  * ## Example Usage
10
18
  *
11
19
  * ```typescript
@@ -280,7 +288,7 @@ const utilities = require("./utilities");
280
288
  *
281
289
  * ## Import
282
290
  *
283
- * `consul_config_entry` can be imported using the syntax `<kind>/<name>` if the
291
+ * `consul.ConfigEntry` can be imported using the syntax `<kind>/<name>` if the
284
292
  * config entry is in the default partition and default namespace, or
285
293
  * `<partition>/<namespace>/<kind>/<name>` for config entries in a non-default
286
294
  * partition or namespace:
@@ -1 +1 @@
1
- {"version":3,"file":"configEntry.js","sourceRoot":"","sources":["../configEntry.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2RG;AACH,MAAa,WAAY,SAAQ,MAAM,CAAC,cAAc;IAClD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAwB,EAAE,IAAmC;QACtH,OAAO,IAAI,WAAW,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAClE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,WAAW,CAAC,YAAY,CAAC;IAC5D,CAAC;IA+BD,YAAY,IAAY,EAAE,WAAgD,EAAE,IAAmC;QAC3G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA2C,CAAC;YAC1D,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;SAClD;aAAM;YACH,MAAM,IAAI,GAAG,WAA0C,CAAC;YACxD,IAAI,IAAI,EAAE,IAAI,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACvC,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;SACjD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,WAAW,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAChE,CAAC;;AAhFL,kCAiFC;AAnEG,gBAAgB;AACO,wBAAY,GAAG,sCAAsC,CAAC"}
1
+ {"version":3,"file":"configEntry.js","sourceRoot":"","sources":["../configEntry.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAmSG;AACH,MAAa,WAAY,SAAQ,MAAM,CAAC,cAAc;IAClD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAwB,EAAE,IAAmC;QACtH,OAAO,IAAI,WAAW,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAClE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,WAAW,CAAC,YAAY,CAAC;IAC5D,CAAC;IA+BD,YAAY,IAAY,EAAE,WAAgD,EAAE,IAAmC;QAC3G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA2C,CAAC;YAC1D,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;SAClD;aAAM;YACH,MAAM,IAAI,GAAG,WAA0C,CAAC;YACxD,IAAI,IAAI,EAAE,IAAI,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACvC,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;SACjD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,WAAW,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAChE,CAAC;;AAhFL,kCAiFC;AAnEG,gBAAgB;AACO,wBAAY,GAAG,sCAAsC,CAAC"}
@@ -2,6 +2,8 @@ import * as pulumi from "@pulumi/pulumi";
2
2
  import * as inputs from "./types/input";
3
3
  import * as outputs from "./types/output";
4
4
  /**
5
+ * The `consul.ConfigEntryServiceDefaults` resource configures a [service defaults](https://developer.hashicorp.com/consul/docs/connect/config-entries/service-defaults) config entry that contains common configuration settings for service mesh services, such as upstreams and gateways.
6
+ *
5
7
  * ## Example Usage
6
8
  *
7
9
  * ```typescript