@pulumi/consul 3.14.0 → 3.14.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/aclPolicy.d.ts +1 -1
- package/aclPolicy.js +1 -1
- package/aclRole.d.ts +2 -0
- package/aclRole.js +2 -0
- package/aclRole.js.map +1 -1
- package/aclRolePolicyAttachment.d.ts +4 -0
- package/aclRolePolicyAttachment.js +4 -0
- package/aclRolePolicyAttachment.js.map +1 -1
- package/aclToken.d.ts +4 -3
- package/aclToken.js +4 -3
- package/aclToken.js.map +1 -1
- package/aclTokenPolicyAttachment.d.ts +69 -5
- package/aclTokenPolicyAttachment.js +69 -5
- package/aclTokenPolicyAttachment.js.map +1 -1
- package/aclTokenRoleAttachment.d.ts +69 -1
- package/aclTokenRoleAttachment.js +69 -1
- package/aclTokenRoleAttachment.js.map +1 -1
- package/adminPartition.d.ts +1 -1
- package/adminPartition.js +1 -1
- package/certificateAuthority.d.ts +15 -0
- package/certificateAuthority.js.map +1 -1
- package/configEntry.d.ts +9 -1
- package/configEntry.js +9 -1
- package/configEntry.js.map +1 -1
- package/configEntryServiceDefaults.d.ts +2 -0
- package/configEntryServiceDefaults.js +2 -0
- package/configEntryServiceDefaults.js.map +1 -1
- package/configEntryServiceIntentions.d.ts +2 -0
- package/configEntryServiceIntentions.js +2 -0
- package/configEntryServiceIntentions.js.map +1 -1
- package/configEntryServiceResolver.d.ts +2 -0
- package/configEntryServiceResolver.js +2 -0
- package/configEntryServiceResolver.js.map +1 -1
- package/configEntryServiceRouter.d.ts +1 -1
- package/configEntryServiceRouter.js +1 -1
- package/configEntryServiceSplitter.d.ts +2 -0
- package/configEntryServiceSplitter.js +2 -0
- package/configEntryServiceSplitter.js.map +1 -1
- package/getAclTokenSecretId.d.ts +41 -0
- package/getAclTokenSecretId.js +24 -0
- package/getAclTokenSecretId.js.map +1 -1
- package/getCatalogServices.d.ts +7 -0
- package/getCatalogServices.js.map +1 -1
- package/getKeyPrefix.d.ts +6 -0
- package/getKeyPrefix.js +6 -0
- package/getKeyPrefix.js.map +1 -1
- package/getServices.d.ts +7 -0
- package/getServices.js.map +1 -1
- package/intention.d.ts +1 -1
- package/intention.js +1 -1
- package/keyPrefix.d.ts +24 -1
- package/keyPrefix.js +24 -1
- package/keyPrefix.js.map +1 -1
- package/keys.d.ts +10 -0
- package/keys.js +10 -0
- package/keys.js.map +1 -1
- package/namespace.d.ts +1 -1
- package/namespace.js +1 -1
- package/namespacePolicyAttachment.d.ts +67 -1
- package/namespacePolicyAttachment.js +67 -1
- package/namespacePolicyAttachment.js.map +1 -1
- package/namespaceRoleAttachment.d.ts +55 -1
- package/namespaceRoleAttachment.js +55 -1
- package/namespaceRoleAttachment.js.map +1 -1
- package/node.d.ts +1 -1
- package/node.js +1 -1
- package/package.json +2 -2
- package/preparedQuery.d.ts +4 -0
- package/preparedQuery.js +4 -0
- package/preparedQuery.js.map +1 -1
- package/types/input.d.ts +3 -0
- package/types/output.d.ts +3 -0
|
@@ -6,9 +6,75 @@ exports.NamespacePolicyAttachment = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
+
* > **NOTE:** This feature requires Consul Enterprise.
|
|
10
|
+
*
|
|
11
|
+
* The `consul.NamespacePolicyAttachment` resource links a Consul Namespace and an ACL
|
|
12
|
+
* policy. The link is implemented through an update to the Consul Namespace.
|
|
13
|
+
*
|
|
14
|
+
* > **NOTE:** This resource is only useful to attach policies to a namespace
|
|
15
|
+
* that has been created outside the current Terraform configuration, like the
|
|
16
|
+
* `default` namespace. If the namespace you need to attach a policy to has
|
|
17
|
+
* been created in the current Terraform configuration and will only be used in it,
|
|
18
|
+
* you should use the `policyDefaults` attribute of [`consul.Namespace`](https://www.terraform.io/docs/providers/consul/r/namespace.html).
|
|
19
|
+
*
|
|
20
|
+
* ## Example Usage
|
|
21
|
+
*
|
|
22
|
+
* ### Attach a policy to the default namespace
|
|
23
|
+
*
|
|
24
|
+
* ```typescript
|
|
25
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
26
|
+
* import * as consul from "@pulumi/consul";
|
|
27
|
+
*
|
|
28
|
+
* const agent = new consul.AclPolicy("agent", {
|
|
29
|
+
* name: "agent",
|
|
30
|
+
* rules: `node_prefix \\"\\" {
|
|
31
|
+
* policy = \\"read\\"
|
|
32
|
+
* }
|
|
33
|
+
* `,
|
|
34
|
+
* });
|
|
35
|
+
* const attachment = new consul.NamespacePolicyAttachment("attachment", {
|
|
36
|
+
* namespace: "default",
|
|
37
|
+
* policy: agent.name,
|
|
38
|
+
* });
|
|
39
|
+
* ```
|
|
40
|
+
*
|
|
41
|
+
* ### Attach a policy to a namespace created in another Terraform configuration
|
|
42
|
+
*
|
|
43
|
+
* ### In `first_configuration/main.tf`
|
|
44
|
+
*
|
|
45
|
+
* ```typescript
|
|
46
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
47
|
+
* import * as consul from "@pulumi/consul";
|
|
48
|
+
*
|
|
49
|
+
* const qa = new consul.Namespace("qa", {name: "qa"});
|
|
50
|
+
* ```
|
|
51
|
+
*
|
|
52
|
+
* ### In `second_configuration/main.tf`
|
|
53
|
+
*
|
|
54
|
+
* ```typescript
|
|
55
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
56
|
+
* import * as consul from "@pulumi/consul";
|
|
57
|
+
*
|
|
58
|
+
* const agent = new consul.AclPolicy("agent", {
|
|
59
|
+
* name: "agent",
|
|
60
|
+
* rules: `node_prefix \\"\\" {
|
|
61
|
+
* policy = \\"read\\"
|
|
62
|
+
* }
|
|
63
|
+
* `,
|
|
64
|
+
* });
|
|
65
|
+
* const attachment = new consul.NamespacePolicyAttachment("attachment", {
|
|
66
|
+
* namespace: "qa",
|
|
67
|
+
* policy: agent.name,
|
|
68
|
+
* });
|
|
69
|
+
* ```
|
|
70
|
+
* **NOTE**: consulAclNamespace would attempt to enforce an empty set of default
|
|
71
|
+
* policies, because its `policyDefaults` attribute is empty. For this reason it
|
|
72
|
+
* is necessary to add the lifecycle clause to prevent Terraform from attempting to
|
|
73
|
+
* empty the set of policies associated to the namespace.
|
|
74
|
+
*
|
|
9
75
|
* ## Import
|
|
10
76
|
*
|
|
11
|
-
* `
|
|
77
|
+
* `consul.NamespacePolicyAttachment` can be imported. This is especially useful
|
|
12
78
|
* to manage the policies attached to the `default` namespace:
|
|
13
79
|
*
|
|
14
80
|
* ```sh
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"namespacePolicyAttachment.js","sourceRoot":"","sources":["../namespacePolicyAttachment.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"namespacePolicyAttachment.js","sourceRoot":"","sources":["../namespacePolicyAttachment.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2EG;AACH,MAAa,yBAA0B,SAAQ,MAAM,CAAC,cAAc;IAChE;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAsC,EAAE,IAAmC;QACpI,OAAO,IAAI,yBAAyB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAChF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,yBAAyB,CAAC,YAAY,CAAC;IAC1E,CAAC;IAmBD,YAAY,IAAY,EAAE,WAA4E,EAAE,IAAmC;QACvI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAyD,CAAC;YACxE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;SAC5C;aAAM;YACH,MAAM,IAAI,GAAG,WAAwD,CAAC;YACtE,IAAI,IAAI,EAAE,SAAS,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC5C,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,IAAI,IAAI,EAAE,MAAM,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACzC,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;SAC3C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,yBAAyB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC9E,CAAC;;AAjEL,8DAkEC;AApDG,gBAAgB;AACO,sCAAY,GAAG,kEAAkE,CAAC"}
|
|
@@ -1,8 +1,62 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
/**
|
|
3
|
+
* > **NOTE:** This feature requires Consul Enterprise.
|
|
4
|
+
*
|
|
5
|
+
* The `consul.NamespaceRoleAttachment` resource links a Consul Namespace and an ACL
|
|
6
|
+
* role. The link is implemented through an update to the Consul Namespace.
|
|
7
|
+
*
|
|
8
|
+
* > **NOTE:** This resource is only useful to attach roles to a namespace
|
|
9
|
+
* that has been created outside the current Terraform configuration, like the
|
|
10
|
+
* `default` namespace. If the namespace you need to attach a role to has
|
|
11
|
+
* been created in the current Terraform configuration and will only be used in it,
|
|
12
|
+
* you should use the `roleDefaults` attribute of [`consul.Namespace`](https://www.terraform.io/docs/providers/consul/r/namespace.html).
|
|
13
|
+
*
|
|
14
|
+
* ## Example Usage
|
|
15
|
+
*
|
|
16
|
+
* ### Attach a role to the default namespace
|
|
17
|
+
*
|
|
18
|
+
* ```typescript
|
|
19
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
20
|
+
* import * as consul from "@pulumi/consul";
|
|
21
|
+
*
|
|
22
|
+
* const agent = new consul.AclRole("agent", {name: "agent"});
|
|
23
|
+
* const attachment = new consul.NamespaceRoleAttachment("attachment", {
|
|
24
|
+
* namespace: "default",
|
|
25
|
+
* role: agent.name,
|
|
26
|
+
* });
|
|
27
|
+
* ```
|
|
28
|
+
*
|
|
29
|
+
* ### Attach a role to a namespace created in another Terraform configuration
|
|
30
|
+
*
|
|
31
|
+
* ### In `first_configuration/main.tf`
|
|
32
|
+
*
|
|
33
|
+
* ```typescript
|
|
34
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
35
|
+
* import * as consul from "@pulumi/consul";
|
|
36
|
+
*
|
|
37
|
+
* const qa = new consul.Namespace("qa", {name: "qa"});
|
|
38
|
+
* ```
|
|
39
|
+
*
|
|
40
|
+
* ### In `second_configuration/main.tf`
|
|
41
|
+
*
|
|
42
|
+
* ```typescript
|
|
43
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
44
|
+
* import * as consul from "@pulumi/consul";
|
|
45
|
+
*
|
|
46
|
+
* const agent = new consul.AclRole("agent", {name: "agent"});
|
|
47
|
+
* const attachment = new consul.NamespaceRoleAttachment("attachment", {
|
|
48
|
+
* namespace: "qa",
|
|
49
|
+
* role: agent.name,
|
|
50
|
+
* });
|
|
51
|
+
* ```
|
|
52
|
+
* **NOTE**: consulAclNamespace would attempt to enforce an empty set of default
|
|
53
|
+
* roles, because its `roleDefaults` attribute is empty. For this reason it
|
|
54
|
+
* is necessary to add the lifecycle clause to prevent Terraform from attempting to
|
|
55
|
+
* empty the set of policies associated to the namespace.
|
|
56
|
+
*
|
|
3
57
|
* ## Import
|
|
4
58
|
*
|
|
5
|
-
* `
|
|
59
|
+
* `consul.NamespaceRoleAttachment` can be imported. This is especially useful
|
|
6
60
|
* to manage the policies attached to the `default` namespace:
|
|
7
61
|
*
|
|
8
62
|
* ```sh
|
|
@@ -6,9 +6,63 @@ exports.NamespaceRoleAttachment = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
+
* > **NOTE:** This feature requires Consul Enterprise.
|
|
10
|
+
*
|
|
11
|
+
* The `consul.NamespaceRoleAttachment` resource links a Consul Namespace and an ACL
|
|
12
|
+
* role. The link is implemented through an update to the Consul Namespace.
|
|
13
|
+
*
|
|
14
|
+
* > **NOTE:** This resource is only useful to attach roles to a namespace
|
|
15
|
+
* that has been created outside the current Terraform configuration, like the
|
|
16
|
+
* `default` namespace. If the namespace you need to attach a role to has
|
|
17
|
+
* been created in the current Terraform configuration and will only be used in it,
|
|
18
|
+
* you should use the `roleDefaults` attribute of [`consul.Namespace`](https://www.terraform.io/docs/providers/consul/r/namespace.html).
|
|
19
|
+
*
|
|
20
|
+
* ## Example Usage
|
|
21
|
+
*
|
|
22
|
+
* ### Attach a role to the default namespace
|
|
23
|
+
*
|
|
24
|
+
* ```typescript
|
|
25
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
26
|
+
* import * as consul from "@pulumi/consul";
|
|
27
|
+
*
|
|
28
|
+
* const agent = new consul.AclRole("agent", {name: "agent"});
|
|
29
|
+
* const attachment = new consul.NamespaceRoleAttachment("attachment", {
|
|
30
|
+
* namespace: "default",
|
|
31
|
+
* role: agent.name,
|
|
32
|
+
* });
|
|
33
|
+
* ```
|
|
34
|
+
*
|
|
35
|
+
* ### Attach a role to a namespace created in another Terraform configuration
|
|
36
|
+
*
|
|
37
|
+
* ### In `first_configuration/main.tf`
|
|
38
|
+
*
|
|
39
|
+
* ```typescript
|
|
40
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
41
|
+
* import * as consul from "@pulumi/consul";
|
|
42
|
+
*
|
|
43
|
+
* const qa = new consul.Namespace("qa", {name: "qa"});
|
|
44
|
+
* ```
|
|
45
|
+
*
|
|
46
|
+
* ### In `second_configuration/main.tf`
|
|
47
|
+
*
|
|
48
|
+
* ```typescript
|
|
49
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
50
|
+
* import * as consul from "@pulumi/consul";
|
|
51
|
+
*
|
|
52
|
+
* const agent = new consul.AclRole("agent", {name: "agent"});
|
|
53
|
+
* const attachment = new consul.NamespaceRoleAttachment("attachment", {
|
|
54
|
+
* namespace: "qa",
|
|
55
|
+
* role: agent.name,
|
|
56
|
+
* });
|
|
57
|
+
* ```
|
|
58
|
+
* **NOTE**: consulAclNamespace would attempt to enforce an empty set of default
|
|
59
|
+
* roles, because its `roleDefaults` attribute is empty. For this reason it
|
|
60
|
+
* is necessary to add the lifecycle clause to prevent Terraform from attempting to
|
|
61
|
+
* empty the set of policies associated to the namespace.
|
|
62
|
+
*
|
|
9
63
|
* ## Import
|
|
10
64
|
*
|
|
11
|
-
* `
|
|
65
|
+
* `consul.NamespaceRoleAttachment` can be imported. This is especially useful
|
|
12
66
|
* to manage the policies attached to the `default` namespace:
|
|
13
67
|
*
|
|
14
68
|
* ```sh
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"namespaceRoleAttachment.js","sourceRoot":"","sources":["../namespaceRoleAttachment.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"namespaceRoleAttachment.js","sourceRoot":"","sources":["../namespaceRoleAttachment.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA+DG;AACH,MAAa,uBAAwB,SAAQ,MAAM,CAAC,cAAc;IAC9D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAoC,EAAE,IAAmC;QAClI,OAAO,IAAI,uBAAuB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC9E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,uBAAuB,CAAC,YAAY,CAAC;IACxE,CAAC;IAmBD,YAAY,IAAY,EAAE,WAAwE,EAAE,IAAmC;QACnI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAuD,CAAC;YACtE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;SACxC;aAAM;YACH,MAAM,IAAI,GAAG,WAAsD,CAAC;YACpE,IAAI,IAAI,EAAE,SAAS,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC5C,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,IAAI,IAAI,EAAE,IAAI,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACvC,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;SACvC;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,uBAAuB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC5E,CAAC;;AAjEL,0DAkEC;AApDG,gBAAgB;AACO,oCAAY,GAAG,8DAA8D,CAAC"}
|
package/node.d.ts
CHANGED
package/node.js
CHANGED
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@pulumi/consul",
|
|
3
|
-
"version": "3.14.
|
|
3
|
+
"version": "3.14.1",
|
|
4
4
|
"description": "A Pulumi package for creating and managing consul resources.",
|
|
5
5
|
"keywords": [
|
|
6
6
|
"pulumi",
|
|
@@ -23,6 +23,6 @@
|
|
|
23
23
|
"pulumi": {
|
|
24
24
|
"resource": true,
|
|
25
25
|
"name": "consul",
|
|
26
|
-
"version": "3.14.
|
|
26
|
+
"version": "3.14.1"
|
|
27
27
|
}
|
|
28
28
|
}
|
package/preparedQuery.d.ts
CHANGED
|
@@ -2,6 +2,10 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
2
2
|
import * as inputs from "./types/input";
|
|
3
3
|
import * as outputs from "./types/output";
|
|
4
4
|
/**
|
|
5
|
+
* Allows Terraform to manage a Consul prepared query.
|
|
6
|
+
*
|
|
7
|
+
* Managing prepared queries is done using Consul's REST API. This resource is useful to provide a consistent and declarative way of managing prepared queries in your Consul cluster using Terraform.
|
|
8
|
+
*
|
|
5
9
|
* ## Example Usage
|
|
6
10
|
*
|
|
7
11
|
* ```typescript
|
package/preparedQuery.js
CHANGED
|
@@ -6,6 +6,10 @@ exports.PreparedQuery = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
+
* Allows Terraform to manage a Consul prepared query.
|
|
10
|
+
*
|
|
11
|
+
* Managing prepared queries is done using Consul's REST API. This resource is useful to provide a consistent and declarative way of managing prepared queries in your Consul cluster using Terraform.
|
|
12
|
+
*
|
|
9
13
|
* ## Example Usage
|
|
10
14
|
*
|
|
11
15
|
* ```typescript
|
package/preparedQuery.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"preparedQuery.js","sourceRoot":"","sources":["../preparedQuery.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"preparedQuery.js","sourceRoot":"","sources":["../preparedQuery.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAyEG;AACH,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;IACpD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA0B,EAAE,IAAmC;QACxH,OAAO,IAAI,aAAa,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACpE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,aAAa,CAAC,YAAY,CAAC;IAC9D,CAAC;IA8ED,YAAY,IAAY,EAAE,WAAoD,EAAE,IAAmC;QAC/G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA6C,CAAC;YAC5D,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,EAAE,GAAG,CAAC;YACnC,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;SAC1C;aAAM;YACH,MAAM,IAAI,GAAG,WAA4C,CAAC;YAC1D,IAAI,IAAI,EAAE,OAAO,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1C,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,EAAE,GAAG,CAAC;YAClC,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC;YACxD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;SACjF;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,OAAO,CAAC,EAAE,CAAC;QAC1D,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAClE,CAAC;;AAvJL,sCAwJC;AA1IG,gBAAgB;AACO,0BAAY,GAAG,0CAA0C,CAAC"}
|
package/types/input.d.ts
CHANGED
|
@@ -1524,6 +1524,9 @@ export interface ProviderAuthJwt {
|
|
|
1524
1524
|
meta?: pulumi.Input<{
|
|
1525
1525
|
[key: string]: pulumi.Input<string>;
|
|
1526
1526
|
}>;
|
|
1527
|
+
/**
|
|
1528
|
+
* Whether to use a [Terraform Workload Identity token](https://developer.hashicorp.com/terraform/cloud-docs/workspaces/dynamic-provider-credentials/workload-identity-tokens). The token will be read from the `TFC_WORKLOAD_IDENTITY_TOKEN` environment variable.
|
|
1529
|
+
*/
|
|
1527
1530
|
useTerraformCloudWorkloadIdentity?: pulumi.Input<boolean>;
|
|
1528
1531
|
}
|
|
1529
1532
|
export interface ProviderAuthLoginAws {
|
package/types/output.d.ts
CHANGED
|
@@ -1758,6 +1758,9 @@ export declare namespace config {
|
|
|
1758
1758
|
meta?: {
|
|
1759
1759
|
[key: string]: string;
|
|
1760
1760
|
};
|
|
1761
|
+
/**
|
|
1762
|
+
* Whether to use a [Terraform Workload Identity token](https://developer.hashicorp.com/terraform/cloud-docs/workspaces/dynamic-provider-credentials/workload-identity-tokens). The token will be read from the `TFC_WORKLOAD_IDENTITY_TOKEN` environment variable.
|
|
1763
|
+
*/
|
|
1761
1764
|
useTerraformCloudWorkloadIdentity?: boolean;
|
|
1762
1765
|
}
|
|
1763
1766
|
interface AuthLoginAws {
|