@pulumi/consul 3.14.0 → 3.14.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/aclPolicy.d.ts +1 -1
- package/aclPolicy.js +1 -1
- package/aclRole.d.ts +2 -0
- package/aclRole.js +2 -0
- package/aclRole.js.map +1 -1
- package/aclRolePolicyAttachment.d.ts +4 -0
- package/aclRolePolicyAttachment.js +4 -0
- package/aclRolePolicyAttachment.js.map +1 -1
- package/aclToken.d.ts +4 -3
- package/aclToken.js +4 -3
- package/aclToken.js.map +1 -1
- package/aclTokenPolicyAttachment.d.ts +69 -5
- package/aclTokenPolicyAttachment.js +69 -5
- package/aclTokenPolicyAttachment.js.map +1 -1
- package/aclTokenRoleAttachment.d.ts +69 -1
- package/aclTokenRoleAttachment.js +69 -1
- package/aclTokenRoleAttachment.js.map +1 -1
- package/adminPartition.d.ts +1 -1
- package/adminPartition.js +1 -1
- package/certificateAuthority.d.ts +15 -0
- package/certificateAuthority.js.map +1 -1
- package/configEntry.d.ts +9 -1
- package/configEntry.js +9 -1
- package/configEntry.js.map +1 -1
- package/configEntryServiceDefaults.d.ts +2 -0
- package/configEntryServiceDefaults.js +2 -0
- package/configEntryServiceDefaults.js.map +1 -1
- package/configEntryServiceIntentions.d.ts +2 -0
- package/configEntryServiceIntentions.js +2 -0
- package/configEntryServiceIntentions.js.map +1 -1
- package/configEntryServiceResolver.d.ts +2 -0
- package/configEntryServiceResolver.js +2 -0
- package/configEntryServiceResolver.js.map +1 -1
- package/configEntryServiceRouter.d.ts +1 -1
- package/configEntryServiceRouter.js +1 -1
- package/configEntryServiceSplitter.d.ts +2 -0
- package/configEntryServiceSplitter.js +2 -0
- package/configEntryServiceSplitter.js.map +1 -1
- package/getAclTokenSecretId.d.ts +41 -0
- package/getAclTokenSecretId.js +24 -0
- package/getAclTokenSecretId.js.map +1 -1
- package/getCatalogServices.d.ts +7 -0
- package/getCatalogServices.js.map +1 -1
- package/getKeyPrefix.d.ts +6 -0
- package/getKeyPrefix.js +6 -0
- package/getKeyPrefix.js.map +1 -1
- package/getServices.d.ts +7 -0
- package/getServices.js.map +1 -1
- package/intention.d.ts +1 -1
- package/intention.js +1 -1
- package/keyPrefix.d.ts +24 -1
- package/keyPrefix.js +24 -1
- package/keyPrefix.js.map +1 -1
- package/keys.d.ts +10 -0
- package/keys.js +10 -0
- package/keys.js.map +1 -1
- package/namespace.d.ts +1 -1
- package/namespace.js +1 -1
- package/namespacePolicyAttachment.d.ts +67 -1
- package/namespacePolicyAttachment.js +67 -1
- package/namespacePolicyAttachment.js.map +1 -1
- package/namespaceRoleAttachment.d.ts +55 -1
- package/namespaceRoleAttachment.js +55 -1
- package/namespaceRoleAttachment.js.map +1 -1
- package/node.d.ts +1 -1
- package/node.js +1 -1
- package/package.json +2 -2
- package/preparedQuery.d.ts +4 -0
- package/preparedQuery.js +4 -0
- package/preparedQuery.js.map +1 -1
- package/types/input.d.ts +3 -0
- package/types/output.d.ts +3 -0
|
@@ -6,6 +6,8 @@ exports.ConfigEntryServiceDefaults = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
+
* The `consul.ConfigEntryServiceDefaults` resource configures a [service defaults](https://developer.hashicorp.com/consul/docs/connect/config-entries/service-defaults) config entry that contains common configuration settings for service mesh services, such as upstreams and gateways.
|
|
10
|
+
*
|
|
9
11
|
* ## Example Usage
|
|
10
12
|
*
|
|
11
13
|
* ```typescript
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"configEntryServiceDefaults.js","sourceRoot":"","sources":["../configEntryServiceDefaults.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"configEntryServiceDefaults.js","sourceRoot":"","sources":["../configEntryServiceDefaults.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA+BG;AACH,MAAa,0BAA2B,SAAQ,MAAM,CAAC,cAAc;IACjE;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAuC,EAAE,IAAmC;QACrI,OAAO,IAAI,0BAA0B,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACjF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,0BAA0B,CAAC,YAAY,CAAC;IAC3E,CAAC;IAmFD,YAAY,IAAY,EAAE,WAA8E,EAAE,IAAmC;QACzI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA0D,CAAC;YACzE,cAAc,CAAC,2BAA2B,CAAC,GAAG,KAAK,EAAE,yBAAyB,CAAC;YAC/E,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,EAAE,eAAe,CAAC;YAC3D,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,EAAE,qBAAqB,CAAC;YACvE,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,EAAE,qBAAqB,CAAC;YACvE,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,EAAE,qBAAqB,CAAC;YACvE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,EAAE,aAAa,CAAC;YACvD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,EAAE,kBAAkB,CAAC;YACjE,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,EAAE,eAAe,CAAC;SAC9D;aAAM;YACH,MAAM,IAAI,GAAG,WAAyD,CAAC;YACvE,IAAI,IAAI,EAAE,OAAO,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1C,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,IAAI,EAAE,QAAQ,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC3C,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,cAAc,CAAC,2BAA2B,CAAC,GAAG,IAAI,EAAE,yBAAyB,CAAC;YAC9E,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,EAAE,eAAe,CAAC;YAC1D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,EAAE,qBAAqB,CAAC;YACtE,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,EAAE,qBAAqB,CAAC;YACtE,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,EAAE,qBAAqB,CAAC;YACtE,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,EAAE,aAAa,CAAC;YACtD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,EAAE,kBAAkB,CAAC;YAChE,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,EAAE,eAAe,CAAC;SAC7D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,0BAA0B,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC/E,CAAC;;AAjKL,gEAkKC;AApJG,gBAAgB;AACO,uCAAY,GAAG,oEAAoE,CAAC"}
|
|
@@ -2,6 +2,8 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
2
2
|
import * as inputs from "./types/input";
|
|
3
3
|
import * as outputs from "./types/output";
|
|
4
4
|
/**
|
|
5
|
+
* The `consulServiceIntentionsConfigEntry` resource configures [service intentions](https://developer.hashicorp.com/consul/docs/connect/config-entries/service-intentions) that are configurations for controlling access between services in the service mesh. A single service intentions configuration entry specifies one destination service and one or more L4 traffic sources, L7 traffic sources, or combination of traffic sources.
|
|
6
|
+
*
|
|
5
7
|
* ## Example Usage
|
|
6
8
|
*
|
|
7
9
|
* ```typescript
|
|
@@ -6,6 +6,8 @@ exports.ConfigEntryServiceIntentions = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
+
* The `consulServiceIntentionsConfigEntry` resource configures [service intentions](https://developer.hashicorp.com/consul/docs/connect/config-entries/service-intentions) that are configurations for controlling access between services in the service mesh. A single service intentions configuration entry specifies one destination service and one or more L4 traffic sources, L7 traffic sources, or combination of traffic sources.
|
|
10
|
+
*
|
|
9
11
|
* ## Example Usage
|
|
10
12
|
*
|
|
11
13
|
* ```typescript
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"configEntryServiceIntentions.js","sourceRoot":"","sources":["../configEntryServiceIntentions.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"configEntryServiceIntentions.js","sourceRoot":"","sources":["../configEntryServiceIntentions.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAmDG;AACH,MAAa,4BAA6B,SAAQ,MAAM,CAAC,cAAc;IACnE;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAyC,EAAE,IAAmC;QACvI,OAAO,IAAI,4BAA4B,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACnF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,4BAA4B,CAAC,YAAY,CAAC;IAC7E,CAAC;IAmCD,YAAY,IAAY,EAAE,WAAkF,EAAE,IAAmC;QAC7I,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA4D,CAAC;YAC3E,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;SAC9C;aAAM;YACH,MAAM,IAAI,GAAG,WAA2D,CAAC;YACzE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;SAC7C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,4BAA4B,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACjF,CAAC;;AAnFL,oEAoFC;AAtEG,gBAAgB;AACO,yCAAY,GAAG,wEAAwE,CAAC"}
|
|
@@ -2,6 +2,8 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
2
2
|
import * as inputs from "./types/input";
|
|
3
3
|
import * as outputs from "./types/output";
|
|
4
4
|
/**
|
|
5
|
+
* The `consul.ConfigEntryServiceResolver` resource configures a [service resolver](https://developer.hashicorp.com/consul/docs/connect/config-entries/service-resolver) that creates named subsets of service instances and define their behavior when satisfying upstream requests.
|
|
6
|
+
*
|
|
5
7
|
* ## Example Usage
|
|
6
8
|
*
|
|
7
9
|
* ```typescript
|
|
@@ -6,6 +6,8 @@ exports.ConfigEntryServiceResolver = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
+
* The `consul.ConfigEntryServiceResolver` resource configures a [service resolver](https://developer.hashicorp.com/consul/docs/connect/config-entries/service-resolver) that creates named subsets of service instances and define their behavior when satisfying upstream requests.
|
|
10
|
+
*
|
|
9
11
|
* ## Example Usage
|
|
10
12
|
*
|
|
11
13
|
* ```typescript
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"configEntryServiceResolver.js","sourceRoot":"","sources":["../configEntryServiceResolver.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"configEntryServiceResolver.js","sourceRoot":"","sources":["../configEntryServiceResolver.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA0CG;AACH,MAAa,0BAA2B,SAAQ,MAAM,CAAC,cAAc;IACjE;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAuC,EAAE,IAAmC;QACrI,OAAO,IAAI,0BAA0B,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACjF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,0BAA0B,CAAC,YAAY,CAAC;IAC3E,CAAC;IAuDD,YAAY,IAAY,EAAE,WAA8E,EAAE,IAAmC;QACzI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA0D,CAAC;YACzE,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,EAAE,aAAa,CAAC;YACvD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,EAAE,aAAa,CAAC;YACvD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;SAC9C;aAAM;YACH,MAAM,IAAI,GAAG,WAAyD,CAAC;YACvE,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC;YACxD,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,EAAE,aAAa,CAAC;YACtD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,EAAE,aAAa,CAAC;YACtD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC;YACxD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;SAC7C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,0BAA0B,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC/E,CAAC;;AAjHL,gEAkHC;AApGG,gBAAgB;AACO,uCAAY,GAAG,oEAAoE,CAAC"}
|
|
@@ -2,7 +2,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
2
2
|
import * as inputs from "./types/input";
|
|
3
3
|
import * as outputs from "./types/output";
|
|
4
4
|
/**
|
|
5
|
-
*
|
|
5
|
+
* The `consul.ConfigEntryServiceRouter` resource configures a [service router](https://developer.hashicorp.com/consul/docs/connect/config-entries/service-router) to redirect a traffic request for a service to one or more specific service instances.
|
|
6
6
|
*/
|
|
7
7
|
export declare class ConfigEntryServiceRouter extends pulumi.CustomResource {
|
|
8
8
|
/**
|
|
@@ -6,7 +6,7 @@ exports.ConfigEntryServiceRouter = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
-
*
|
|
9
|
+
* The `consul.ConfigEntryServiceRouter` resource configures a [service router](https://developer.hashicorp.com/consul/docs/connect/config-entries/service-router) to redirect a traffic request for a service to one or more specific service instances.
|
|
10
10
|
*/
|
|
11
11
|
class ConfigEntryServiceRouter extends pulumi.CustomResource {
|
|
12
12
|
/**
|
|
@@ -2,6 +2,8 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
2
2
|
import * as inputs from "./types/input";
|
|
3
3
|
import * as outputs from "./types/output";
|
|
4
4
|
/**
|
|
5
|
+
* The `consul.ConfigEntryServiceSplitter` resource configures a [service splitter](https://developer.hashicorp.com/consul/docs/connect/config-entries/service-splitter) that will redirect a percentage of incoming traffic requests for a service to one or more specific service instances.
|
|
6
|
+
*
|
|
5
7
|
* ## Example Usage
|
|
6
8
|
*
|
|
7
9
|
* ```typescript
|
|
@@ -6,6 +6,8 @@ exports.ConfigEntryServiceSplitter = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
+
* The `consul.ConfigEntryServiceSplitter` resource configures a [service splitter](https://developer.hashicorp.com/consul/docs/connect/config-entries/service-splitter) that will redirect a percentage of incoming traffic requests for a service to one or more specific service instances.
|
|
10
|
+
*
|
|
9
11
|
* ## Example Usage
|
|
10
12
|
*
|
|
11
13
|
* ```typescript
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"configEntryServiceSplitter.js","sourceRoot":"","sources":["../configEntryServiceSplitter.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"configEntryServiceSplitter.js","sourceRoot":"","sources":["../configEntryServiceSplitter.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAmFG;AACH,MAAa,0BAA2B,SAAQ,MAAM,CAAC,cAAc;IACjE;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAuC,EAAE,IAAmC;QACrI,OAAO,IAAI,0BAA0B,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACjF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,0BAA0B,CAAC,YAAY,CAAC;IAC3E,CAAC;IA+BD,YAAY,IAAY,EAAE,WAA8E,EAAE,IAAmC;QACzI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA0D,CAAC;YACzE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;SAC5C;aAAM;YACH,MAAM,IAAI,GAAG,WAAyD,CAAC;YACvE,IAAI,IAAI,EAAE,MAAM,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACzC,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;SAC3C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,0BAA0B,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC/E,CAAC;;AAhFL,gEAiFC;AAnEG,gBAAgB;AACO,uCAAY,GAAG,oEAAoE,CAAC"}
|
package/getAclTokenSecretId.d.ts
CHANGED
|
@@ -1,5 +1,17 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
/**
|
|
3
|
+
* > **Warning:** When using this is resource, the ACL Token secret ID will be
|
|
4
|
+
* written to the Terraform state. It is strongly recommended to use the `pgpKey`
|
|
5
|
+
* attribute and to make sure the remote state has strong access controls before
|
|
6
|
+
* using this resource.
|
|
7
|
+
*
|
|
8
|
+
* The `consulAclTokenSecret` data source returns the secret ID associated to
|
|
9
|
+
* the accessor ID. This can be useful to make systems that cannot use an auth
|
|
10
|
+
* method to interface with Consul.
|
|
11
|
+
*
|
|
12
|
+
* If you want to get other attributes of the Consul ACL token, please use the
|
|
13
|
+
* [`consul.AclToken` data source](https://www.terraform.io/docs/providers/consul/d/acl_token.html).
|
|
14
|
+
*
|
|
3
15
|
* ## Example Usage
|
|
4
16
|
*
|
|
5
17
|
* ```typescript
|
|
@@ -40,6 +52,12 @@ export interface GetAclTokenSecretIdArgs {
|
|
|
40
52
|
* The partition to lookup the token.
|
|
41
53
|
*/
|
|
42
54
|
partition?: string;
|
|
55
|
+
/**
|
|
56
|
+
* Either a base-64 encoded PGP public key, or a keybase
|
|
57
|
+
* username in the form `keybase:some_person_that_exists`. **If you do not set this
|
|
58
|
+
* argument, the token secret ID will be written as plain text in the Terraform
|
|
59
|
+
* state.**
|
|
60
|
+
*/
|
|
43
61
|
pgpKey?: string;
|
|
44
62
|
}
|
|
45
63
|
/**
|
|
@@ -47,6 +65,11 @@ export interface GetAclTokenSecretIdArgs {
|
|
|
47
65
|
*/
|
|
48
66
|
export interface GetAclTokenSecretIdResult {
|
|
49
67
|
readonly accessorId: string;
|
|
68
|
+
/**
|
|
69
|
+
* The encrypted secret ID of the ACL token if `pgpKey`
|
|
70
|
+
* has been set. You can decrypt the secret by using the command line, for example
|
|
71
|
+
* with: `terraform output encryptedSecret | base64 --decode | keybase pgp decrypt`.
|
|
72
|
+
*/
|
|
50
73
|
readonly encryptedSecretId: string;
|
|
51
74
|
/**
|
|
52
75
|
* The provider-assigned unique ID for this managed resource.
|
|
@@ -61,6 +84,18 @@ export interface GetAclTokenSecretIdResult {
|
|
|
61
84
|
readonly secretId: string;
|
|
62
85
|
}
|
|
63
86
|
/**
|
|
87
|
+
* > **Warning:** When using this is resource, the ACL Token secret ID will be
|
|
88
|
+
* written to the Terraform state. It is strongly recommended to use the `pgpKey`
|
|
89
|
+
* attribute and to make sure the remote state has strong access controls before
|
|
90
|
+
* using this resource.
|
|
91
|
+
*
|
|
92
|
+
* The `consulAclTokenSecret` data source returns the secret ID associated to
|
|
93
|
+
* the accessor ID. This can be useful to make systems that cannot use an auth
|
|
94
|
+
* method to interface with Consul.
|
|
95
|
+
*
|
|
96
|
+
* If you want to get other attributes of the Consul ACL token, please use the
|
|
97
|
+
* [`consul.AclToken` data source](https://www.terraform.io/docs/providers/consul/d/acl_token.html).
|
|
98
|
+
*
|
|
64
99
|
* ## Example Usage
|
|
65
100
|
*
|
|
66
101
|
* ```typescript
|
|
@@ -101,5 +136,11 @@ export interface GetAclTokenSecretIdOutputArgs {
|
|
|
101
136
|
* The partition to lookup the token.
|
|
102
137
|
*/
|
|
103
138
|
partition?: pulumi.Input<string>;
|
|
139
|
+
/**
|
|
140
|
+
* Either a base-64 encoded PGP public key, or a keybase
|
|
141
|
+
* username in the form `keybase:some_person_that_exists`. **If you do not set this
|
|
142
|
+
* argument, the token secret ID will be written as plain text in the Terraform
|
|
143
|
+
* state.**
|
|
144
|
+
*/
|
|
104
145
|
pgpKey?: pulumi.Input<string>;
|
|
105
146
|
}
|
package/getAclTokenSecretId.js
CHANGED
|
@@ -6,6 +6,18 @@ exports.getAclTokenSecretIdOutput = exports.getAclTokenSecretId = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
+
* > **Warning:** When using this is resource, the ACL Token secret ID will be
|
|
10
|
+
* written to the Terraform state. It is strongly recommended to use the `pgpKey`
|
|
11
|
+
* attribute and to make sure the remote state has strong access controls before
|
|
12
|
+
* using this resource.
|
|
13
|
+
*
|
|
14
|
+
* The `consulAclTokenSecret` data source returns the secret ID associated to
|
|
15
|
+
* the accessor ID. This can be useful to make systems that cannot use an auth
|
|
16
|
+
* method to interface with Consul.
|
|
17
|
+
*
|
|
18
|
+
* If you want to get other attributes of the Consul ACL token, please use the
|
|
19
|
+
* [`consul.AclToken` data source](https://www.terraform.io/docs/providers/consul/d/acl_token.html).
|
|
20
|
+
*
|
|
9
21
|
* ## Example Usage
|
|
10
22
|
*
|
|
11
23
|
* ```typescript
|
|
@@ -40,6 +52,18 @@ function getAclTokenSecretId(args, opts) {
|
|
|
40
52
|
}
|
|
41
53
|
exports.getAclTokenSecretId = getAclTokenSecretId;
|
|
42
54
|
/**
|
|
55
|
+
* > **Warning:** When using this is resource, the ACL Token secret ID will be
|
|
56
|
+
* written to the Terraform state. It is strongly recommended to use the `pgpKey`
|
|
57
|
+
* attribute and to make sure the remote state has strong access controls before
|
|
58
|
+
* using this resource.
|
|
59
|
+
*
|
|
60
|
+
* The `consulAclTokenSecret` data source returns the secret ID associated to
|
|
61
|
+
* the accessor ID. This can be useful to make systems that cannot use an auth
|
|
62
|
+
* method to interface with Consul.
|
|
63
|
+
*
|
|
64
|
+
* If you want to get other attributes of the Consul ACL token, please use the
|
|
65
|
+
* [`consul.AclToken` data source](https://www.terraform.io/docs/providers/consul/d/acl_token.html).
|
|
66
|
+
*
|
|
43
67
|
* ## Example Usage
|
|
44
68
|
*
|
|
45
69
|
* ```typescript
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getAclTokenSecretId.js","sourceRoot":"","sources":["../getAclTokenSecretId.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"getAclTokenSecretId.js","sourceRoot":"","sources":["../getAclTokenSecretId.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAmCG;AACH,SAAgB,mBAAmB,CAAC,IAA6B,EAAE,IAA2B;IAC1F,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,sDAAsD,EAAE;QACjF,YAAY,EAAE,IAAI,CAAC,UAAU;QAC7B,WAAW,EAAE,IAAI,CAAC,SAAS;QAC3B,WAAW,EAAE,IAAI,CAAC,SAAS;QAC3B,QAAQ,EAAE,IAAI,CAAC,MAAM;KACxB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AARD,kDAQC;AAkDD;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAmCG;AACH,SAAgB,yBAAyB,CAAC,IAAmC,EAAE,IAAiC;IAC5G,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,YAAY,CAAC,sDAAsD,EAAE;QACvF,YAAY,EAAE,IAAI,CAAC,UAAU;QAC7B,WAAW,EAAE,IAAI,CAAC,SAAS;QAC3B,WAAW,EAAE,IAAI,CAAC,SAAS;QAC3B,QAAQ,EAAE,IAAI,CAAC,MAAM;KACxB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AARD,8DAQC"}
|
package/getCatalogServices.d.ts
CHANGED
|
@@ -53,6 +53,13 @@ export interface GetCatalogServicesResult {
|
|
|
53
53
|
* The provider-assigned unique ID for this managed resource.
|
|
54
54
|
*/
|
|
55
55
|
readonly id: string;
|
|
56
|
+
/**
|
|
57
|
+
* A list of the Consul services found. This will always contain the
|
|
58
|
+
* list of services found.
|
|
59
|
+
* * `services.<service>` - For each name given, the corresponding attribute is a
|
|
60
|
+
* Terraform map of services and their tags. The value is an alphanumerically
|
|
61
|
+
* sorted, whitespace delimited set of tags associated with the service.
|
|
62
|
+
*/
|
|
56
63
|
readonly names: string[];
|
|
57
64
|
readonly queryOptions?: outputs.GetCatalogServicesQueryOption[];
|
|
58
65
|
readonly services: {
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getCatalogServices.js","sourceRoot":"","sources":["../getCatalogServices.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA4BG;AACH,iFAAiF;AACjF,SAAgB,kBAAkB,CAAC,IAA6B,EAAE,IAA2B;IACzF,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,kGAAkG,CAAC,CAAA;IACnH,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;IAClB,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,oDAAoD,EAAE;QAC/E,cAAc,EAAE,IAAI,CAAC,YAAY;KACpC,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAPD,gDAOC;
|
|
1
|
+
{"version":3,"file":"getCatalogServices.js","sourceRoot":"","sources":["../getCatalogServices.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA4BG;AACH,iFAAiF;AACjF,SAAgB,kBAAkB,CAAC,IAA6B,EAAE,IAA2B;IACzF,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,kGAAkG,CAAC,CAAA;IACnH,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;IAClB,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,oDAAoD,EAAE;QAC/E,cAAc,EAAE,IAAI,CAAC,YAAY;KACpC,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAPD,gDAOC;AA0CD;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA4BG;AACH,iFAAiF;AACjF,SAAgB,wBAAwB,CAAC,IAAmC,EAAE,IAAiC;IAC3G,MAAM,CAAC,GAAG,CAAC,IAAI,CAAC,kGAAkG,CAAC,CAAA;IACnH,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;IAClB,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,YAAY,CAAC,oDAAoD,EAAE;QACrF,cAAc,EAAE,IAAI,CAAC,YAAY;KACpC,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAPD,4DAOC"}
|
package/getKeyPrefix.d.ts
CHANGED
|
@@ -2,6 +2,9 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
2
2
|
import * as inputs from "./types/input";
|
|
3
3
|
import * as outputs from "./types/output";
|
|
4
4
|
/**
|
|
5
|
+
* Allows Terraform to read values from a "namespace" of Consul keys that
|
|
6
|
+
* share a common name prefix.
|
|
7
|
+
*
|
|
5
8
|
* ## Example Usage
|
|
6
9
|
*
|
|
7
10
|
* ```typescript
|
|
@@ -113,6 +116,9 @@ Please use the token argument in the provider configuration
|
|
|
113
116
|
};
|
|
114
117
|
}
|
|
115
118
|
/**
|
|
119
|
+
* Allows Terraform to read values from a "namespace" of Consul keys that
|
|
120
|
+
* share a common name prefix.
|
|
121
|
+
*
|
|
116
122
|
* ## Example Usage
|
|
117
123
|
*
|
|
118
124
|
* ```typescript
|
package/getKeyPrefix.js
CHANGED
|
@@ -6,6 +6,9 @@ exports.getKeyPrefixOutput = exports.getKeyPrefix = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
+
* Allows Terraform to read values from a "namespace" of Consul keys that
|
|
10
|
+
* share a common name prefix.
|
|
11
|
+
*
|
|
9
12
|
* ## Example Usage
|
|
10
13
|
*
|
|
11
14
|
* ```typescript
|
|
@@ -54,6 +57,9 @@ function getKeyPrefix(args, opts) {
|
|
|
54
57
|
}
|
|
55
58
|
exports.getKeyPrefix = getKeyPrefix;
|
|
56
59
|
/**
|
|
60
|
+
* Allows Terraform to read values from a "namespace" of Consul keys that
|
|
61
|
+
* share a common name prefix.
|
|
62
|
+
*
|
|
57
63
|
* ## Example Usage
|
|
58
64
|
*
|
|
59
65
|
* ```typescript
|
package/getKeyPrefix.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getKeyPrefix.js","sourceRoot":"","sources":["../getKeyPrefix.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"getKeyPrefix.js","sourceRoot":"","sources":["../getKeyPrefix.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAsCG;AACH,SAAgB,YAAY,CAAC,IAAsB,EAAE,IAA2B;IAC5E,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,wCAAwC,EAAE;QACnE,YAAY,EAAE,IAAI,CAAC,UAAU;QAC7B,WAAW,EAAE,IAAI,CAAC,SAAS;QAC3B,WAAW,EAAE,IAAI,CAAC,SAAS;QAC3B,YAAY,EAAE,IAAI,CAAC,UAAU;QAC7B,kBAAkB,EAAE,IAAI,CAAC,gBAAgB;QACzC,OAAO,EAAE,IAAI,CAAC,KAAK;KACtB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAVD,oCAUC;AAyED;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAsCG;AACH,SAAgB,kBAAkB,CAAC,IAA4B,EAAE,IAAiC;IAC9F,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,YAAY,CAAC,wCAAwC,EAAE;QACzE,YAAY,EAAE,IAAI,CAAC,UAAU;QAC7B,WAAW,EAAE,IAAI,CAAC,SAAS;QAC3B,WAAW,EAAE,IAAI,CAAC,SAAS;QAC3B,YAAY,EAAE,IAAI,CAAC,UAAU;QAC7B,kBAAkB,EAAE,IAAI,CAAC,gBAAgB;QACzC,OAAO,EAAE,IAAI,CAAC,KAAK;KACtB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAVD,gDAUC"}
|
package/getServices.d.ts
CHANGED
|
@@ -52,6 +52,13 @@ export interface GetServicesResult {
|
|
|
52
52
|
* The provider-assigned unique ID for this managed resource.
|
|
53
53
|
*/
|
|
54
54
|
readonly id: string;
|
|
55
|
+
/**
|
|
56
|
+
* A list of the Consul services found. This will always contain the
|
|
57
|
+
* list of services found.
|
|
58
|
+
* * `services.<service>` - For each name given, the corresponding attribute is a
|
|
59
|
+
* Terraform map of services and their tags. The value is an alphanumerically
|
|
60
|
+
* sorted, whitespace delimited set of tags associated with the service.
|
|
61
|
+
*/
|
|
55
62
|
readonly names: string[];
|
|
56
63
|
readonly queryOptions?: outputs.GetServicesQueryOption[];
|
|
57
64
|
readonly services: {
|
package/getServices.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getServices.js","sourceRoot":"","sources":["../getServices.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA4BG;AACH,SAAgB,WAAW,CAAC,IAAsB,EAAE,IAA2B;IAC3E,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;IAClB,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,sCAAsC,EAAE;QACjE,cAAc,EAAE,IAAI,CAAC,YAAY;KACpC,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAND,kCAMC;
|
|
1
|
+
{"version":3,"file":"getServices.js","sourceRoot":"","sources":["../getServices.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA4BG;AACH,SAAgB,WAAW,CAAC,IAAsB,EAAE,IAA2B;IAC3E,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;IAClB,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,sCAAsC,EAAE;QACjE,cAAc,EAAE,IAAI,CAAC,YAAY;KACpC,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAND,kCAMC;AA0CD;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA4BG;AACH,SAAgB,iBAAiB,CAAC,IAA4B,EAAE,IAAiC;IAC7F,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;IAClB,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,YAAY,CAAC,sCAAsC,EAAE;QACvE,cAAc,EAAE,IAAI,CAAC,YAAY;KACpC,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAND,8CAMC"}
|
package/intention.d.ts
CHANGED
|
@@ -47,7 +47,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
47
47
|
*
|
|
48
48
|
* ## Import
|
|
49
49
|
*
|
|
50
|
-
* `
|
|
50
|
+
* `consul.Intention` can be imported:
|
|
51
51
|
*
|
|
52
52
|
* ```sh
|
|
53
53
|
* $ pulumi import consul:index/intention:Intention database 657a57d6-0d56-57e2-31cb-e9f1ed3c18dd
|
package/intention.js
CHANGED
|
@@ -53,7 +53,7 @@ const utilities = require("./utilities");
|
|
|
53
53
|
*
|
|
54
54
|
* ## Import
|
|
55
55
|
*
|
|
56
|
-
* `
|
|
56
|
+
* `consul.Intention` can be imported:
|
|
57
57
|
*
|
|
58
58
|
* ```sh
|
|
59
59
|
* $ pulumi import consul:index/intention:Intention database 657a57d6-0d56-57e2-31cb-e9f1ed3c18dd
|
package/keyPrefix.d.ts
CHANGED
|
@@ -2,6 +2,29 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
2
2
|
import * as inputs from "./types/input";
|
|
3
3
|
import * as outputs from "./types/output";
|
|
4
4
|
/**
|
|
5
|
+
* Allows Terraform to manage a "namespace" of Consul keys that share a common
|
|
6
|
+
* name prefix.
|
|
7
|
+
*
|
|
8
|
+
* Like `consul.Keys`, this resource can write values into the Consul key/value
|
|
9
|
+
* store, but *unlike* `consul.Keys` this resource can detect and remove extra
|
|
10
|
+
* keys that have been added some other way, thus ensuring that rogue data
|
|
11
|
+
* added outside of Terraform will be removed on the next run.
|
|
12
|
+
*
|
|
13
|
+
* This resource is thus useful in the case where Terraform is exclusively
|
|
14
|
+
* managing a set of related keys.
|
|
15
|
+
*
|
|
16
|
+
* To avoid accidentally clobbering matching data that existed in Consul before
|
|
17
|
+
* a `consul.KeyPrefix` resource was created, creation of a key prefix instance
|
|
18
|
+
* will fail if any matching keys are already present in the key/value store.
|
|
19
|
+
* If any conflicting data is present, you must first delete it manually or
|
|
20
|
+
* explicitly import the prefix.
|
|
21
|
+
*
|
|
22
|
+
* > **Warning** After this resource is instantiated, Terraform takes control
|
|
23
|
+
* over *all* keys with the given path prefix, and will remove any matching keys
|
|
24
|
+
* that are not present in the configuration. It will also delete *all* keys under
|
|
25
|
+
* the given prefix when a `consul.KeyPrefix` resource is destroyed, even if
|
|
26
|
+
* those keys were created outside of Terraform.
|
|
27
|
+
*
|
|
5
28
|
* ## Example Usage
|
|
6
29
|
*
|
|
7
30
|
* ```typescript
|
|
@@ -30,7 +53,7 @@ import * as outputs from "./types/output";
|
|
|
30
53
|
*
|
|
31
54
|
* ## Import
|
|
32
55
|
*
|
|
33
|
-
* `
|
|
56
|
+
* `consul.KeyPrefix` can be imported. This is useful when the path already exists and
|
|
34
57
|
* you know all keys in path should be managed by Terraform.
|
|
35
58
|
*
|
|
36
59
|
* ```sh
|
package/keyPrefix.js
CHANGED
|
@@ -6,6 +6,29 @@ exports.KeyPrefix = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
+
* Allows Terraform to manage a "namespace" of Consul keys that share a common
|
|
10
|
+
* name prefix.
|
|
11
|
+
*
|
|
12
|
+
* Like `consul.Keys`, this resource can write values into the Consul key/value
|
|
13
|
+
* store, but *unlike* `consul.Keys` this resource can detect and remove extra
|
|
14
|
+
* keys that have been added some other way, thus ensuring that rogue data
|
|
15
|
+
* added outside of Terraform will be removed on the next run.
|
|
16
|
+
*
|
|
17
|
+
* This resource is thus useful in the case where Terraform is exclusively
|
|
18
|
+
* managing a set of related keys.
|
|
19
|
+
*
|
|
20
|
+
* To avoid accidentally clobbering matching data that existed in Consul before
|
|
21
|
+
* a `consul.KeyPrefix` resource was created, creation of a key prefix instance
|
|
22
|
+
* will fail if any matching keys are already present in the key/value store.
|
|
23
|
+
* If any conflicting data is present, you must first delete it manually or
|
|
24
|
+
* explicitly import the prefix.
|
|
25
|
+
*
|
|
26
|
+
* > **Warning** After this resource is instantiated, Terraform takes control
|
|
27
|
+
* over *all* keys with the given path prefix, and will remove any matching keys
|
|
28
|
+
* that are not present in the configuration. It will also delete *all* keys under
|
|
29
|
+
* the given prefix when a `consul.KeyPrefix` resource is destroyed, even if
|
|
30
|
+
* those keys were created outside of Terraform.
|
|
31
|
+
*
|
|
9
32
|
* ## Example Usage
|
|
10
33
|
*
|
|
11
34
|
* ```typescript
|
|
@@ -34,7 +57,7 @@ const utilities = require("./utilities");
|
|
|
34
57
|
*
|
|
35
58
|
* ## Import
|
|
36
59
|
*
|
|
37
|
-
* `
|
|
60
|
+
* `consul.KeyPrefix` can be imported. This is useful when the path already exists and
|
|
38
61
|
* you know all keys in path should be managed by Terraform.
|
|
39
62
|
*
|
|
40
63
|
* ```sh
|
package/keyPrefix.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"keyPrefix.js","sourceRoot":"","sources":["../keyPrefix.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"keyPrefix.js","sourceRoot":"","sources":["../keyPrefix.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA0DG;AACH,MAAa,SAAU,SAAQ,MAAM,CAAC,cAAc;IAChD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAsB,EAAE,IAAmC;QACpH,OAAO,IAAI,SAAS,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAChE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,SAAS,CAAC,YAAY,CAAC;IAC1D,CAAC;IAkDD,YAAY,IAAY,EAAE,WAA4C,EAAE,IAAmC;QACvG,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAyC,CAAC;YACxD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,EAAE,gBAAgB,CAAC;YAC7D,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;SAC1C;aAAM;YACH,MAAM,IAAI,GAAG,WAAwC,CAAC;YACtD,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,EAAE,gBAAgB,CAAC;YAC5D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;SACjF;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,OAAO,CAAC,EAAE,CAAC;QAC1D,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,SAAS,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC9D,CAAC;;AAzGL,8BA0GC;AA5FG,gBAAgB;AACO,sBAAY,GAAG,kCAAkC,CAAC"}
|
package/keys.d.ts
CHANGED
|
@@ -2,6 +2,16 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
2
2
|
import * as inputs from "./types/input";
|
|
3
3
|
import * as outputs from "./types/output";
|
|
4
4
|
/**
|
|
5
|
+
* The `consul.Keys` resource writes sets of individual values into Consul.
|
|
6
|
+
* This is a powerful way to expose infrastructure details to clients.
|
|
7
|
+
*
|
|
8
|
+
* This resource manages individual keys, and thus it can create, update
|
|
9
|
+
* and delete the keys explicitly given. However, it is not able to detect
|
|
10
|
+
* and remove additional keys that have been added by non-Terraform means.
|
|
11
|
+
* To manage *all* keys sharing a common prefix, and thus have Terraform
|
|
12
|
+
* remove errant keys not present in the configuration, consider using the
|
|
13
|
+
* `consul.KeyPrefix` resource instead.
|
|
14
|
+
*
|
|
5
15
|
* ## Example Usage
|
|
6
16
|
*
|
|
7
17
|
* ```typescript
|
package/keys.js
CHANGED
|
@@ -6,6 +6,16 @@ exports.Keys = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
+
* The `consul.Keys` resource writes sets of individual values into Consul.
|
|
10
|
+
* This is a powerful way to expose infrastructure details to clients.
|
|
11
|
+
*
|
|
12
|
+
* This resource manages individual keys, and thus it can create, update
|
|
13
|
+
* and delete the keys explicitly given. However, it is not able to detect
|
|
14
|
+
* and remove additional keys that have been added by non-Terraform means.
|
|
15
|
+
* To manage *all* keys sharing a common prefix, and thus have Terraform
|
|
16
|
+
* remove errant keys not present in the configuration, consider using the
|
|
17
|
+
* `consul.KeyPrefix` resource instead.
|
|
18
|
+
*
|
|
9
19
|
* ## Example Usage
|
|
10
20
|
*
|
|
11
21
|
* ```typescript
|
package/keys.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"keys.js","sourceRoot":"","sources":["../keys.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"keys.js","sourceRoot":"","sources":["../keys.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;GA0BG;AACH,MAAa,IAAK,SAAQ,MAAM,CAAC,cAAc;IAC3C;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAiB,EAAE,IAAmC;QAC/G,OAAO,IAAI,IAAI,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC3D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,IAAI,CAAC,YAAY,CAAC;IACrD,CAAC;IAsCD,YAAY,IAAY,EAAE,WAAkC,EAAE,IAAmC;QAC7F,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAoC,CAAC;YACnD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,EAAE,GAAG,CAAC;SACtC;aAAM;YACH,MAAM,IAAI,GAAG,WAAmC,CAAC;YACjD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,KAAK,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAC7C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,OAAO,CAAC,EAAE,CAAC;QAC1D,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,IAAI,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACzD,CAAC;;AAxFL,oBAyFC;AA3EG,gBAAgB;AACO,iBAAY,GAAG,wBAAwB,CAAC"}
|
package/namespace.d.ts
CHANGED
|
@@ -21,7 +21,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
21
21
|
*
|
|
22
22
|
* ## Import
|
|
23
23
|
*
|
|
24
|
-
* `
|
|
24
|
+
* `consul.Namespace` can be imported. This is useful to manage attributes of the
|
|
25
25
|
* default namespace that is created automatically:
|
|
26
26
|
*
|
|
27
27
|
* ```sh
|
package/namespace.js
CHANGED
|
@@ -27,7 +27,7 @@ const utilities = require("./utilities");
|
|
|
27
27
|
*
|
|
28
28
|
* ## Import
|
|
29
29
|
*
|
|
30
|
-
* `
|
|
30
|
+
* `consul.Namespace` can be imported. This is useful to manage attributes of the
|
|
31
31
|
* default namespace that is created automatically:
|
|
32
32
|
*
|
|
33
33
|
* ```sh
|
|
@@ -1,8 +1,74 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
/**
|
|
3
|
+
* > **NOTE:** This feature requires Consul Enterprise.
|
|
4
|
+
*
|
|
5
|
+
* The `consul.NamespacePolicyAttachment` resource links a Consul Namespace and an ACL
|
|
6
|
+
* policy. The link is implemented through an update to the Consul Namespace.
|
|
7
|
+
*
|
|
8
|
+
* > **NOTE:** This resource is only useful to attach policies to a namespace
|
|
9
|
+
* that has been created outside the current Terraform configuration, like the
|
|
10
|
+
* `default` namespace. If the namespace you need to attach a policy to has
|
|
11
|
+
* been created in the current Terraform configuration and will only be used in it,
|
|
12
|
+
* you should use the `policyDefaults` attribute of [`consul.Namespace`](https://www.terraform.io/docs/providers/consul/r/namespace.html).
|
|
13
|
+
*
|
|
14
|
+
* ## Example Usage
|
|
15
|
+
*
|
|
16
|
+
* ### Attach a policy to the default namespace
|
|
17
|
+
*
|
|
18
|
+
* ```typescript
|
|
19
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
20
|
+
* import * as consul from "@pulumi/consul";
|
|
21
|
+
*
|
|
22
|
+
* const agent = new consul.AclPolicy("agent", {
|
|
23
|
+
* name: "agent",
|
|
24
|
+
* rules: `node_prefix \\"\\" {
|
|
25
|
+
* policy = \\"read\\"
|
|
26
|
+
* }
|
|
27
|
+
* `,
|
|
28
|
+
* });
|
|
29
|
+
* const attachment = new consul.NamespacePolicyAttachment("attachment", {
|
|
30
|
+
* namespace: "default",
|
|
31
|
+
* policy: agent.name,
|
|
32
|
+
* });
|
|
33
|
+
* ```
|
|
34
|
+
*
|
|
35
|
+
* ### Attach a policy to a namespace created in another Terraform configuration
|
|
36
|
+
*
|
|
37
|
+
* ### In `first_configuration/main.tf`
|
|
38
|
+
*
|
|
39
|
+
* ```typescript
|
|
40
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
41
|
+
* import * as consul from "@pulumi/consul";
|
|
42
|
+
*
|
|
43
|
+
* const qa = new consul.Namespace("qa", {name: "qa"});
|
|
44
|
+
* ```
|
|
45
|
+
*
|
|
46
|
+
* ### In `second_configuration/main.tf`
|
|
47
|
+
*
|
|
48
|
+
* ```typescript
|
|
49
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
50
|
+
* import * as consul from "@pulumi/consul";
|
|
51
|
+
*
|
|
52
|
+
* const agent = new consul.AclPolicy("agent", {
|
|
53
|
+
* name: "agent",
|
|
54
|
+
* rules: `node_prefix \\"\\" {
|
|
55
|
+
* policy = \\"read\\"
|
|
56
|
+
* }
|
|
57
|
+
* `,
|
|
58
|
+
* });
|
|
59
|
+
* const attachment = new consul.NamespacePolicyAttachment("attachment", {
|
|
60
|
+
* namespace: "qa",
|
|
61
|
+
* policy: agent.name,
|
|
62
|
+
* });
|
|
63
|
+
* ```
|
|
64
|
+
* **NOTE**: consulAclNamespace would attempt to enforce an empty set of default
|
|
65
|
+
* policies, because its `policyDefaults` attribute is empty. For this reason it
|
|
66
|
+
* is necessary to add the lifecycle clause to prevent Terraform from attempting to
|
|
67
|
+
* empty the set of policies associated to the namespace.
|
|
68
|
+
*
|
|
3
69
|
* ## Import
|
|
4
70
|
*
|
|
5
|
-
* `
|
|
71
|
+
* `consul.NamespacePolicyAttachment` can be imported. This is especially useful
|
|
6
72
|
* to manage the policies attached to the `default` namespace:
|
|
7
73
|
*
|
|
8
74
|
* ```sh
|