@pulumi/consul 3.14.0 → 3.14.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (72) hide show
  1. package/aclPolicy.d.ts +1 -1
  2. package/aclPolicy.js +1 -1
  3. package/aclRole.d.ts +2 -0
  4. package/aclRole.js +2 -0
  5. package/aclRole.js.map +1 -1
  6. package/aclRolePolicyAttachment.d.ts +4 -0
  7. package/aclRolePolicyAttachment.js +4 -0
  8. package/aclRolePolicyAttachment.js.map +1 -1
  9. package/aclToken.d.ts +4 -3
  10. package/aclToken.js +4 -3
  11. package/aclToken.js.map +1 -1
  12. package/aclTokenPolicyAttachment.d.ts +69 -5
  13. package/aclTokenPolicyAttachment.js +69 -5
  14. package/aclTokenPolicyAttachment.js.map +1 -1
  15. package/aclTokenRoleAttachment.d.ts +69 -1
  16. package/aclTokenRoleAttachment.js +69 -1
  17. package/aclTokenRoleAttachment.js.map +1 -1
  18. package/adminPartition.d.ts +1 -1
  19. package/adminPartition.js +1 -1
  20. package/certificateAuthority.d.ts +15 -0
  21. package/certificateAuthority.js.map +1 -1
  22. package/configEntry.d.ts +9 -1
  23. package/configEntry.js +9 -1
  24. package/configEntry.js.map +1 -1
  25. package/configEntryServiceDefaults.d.ts +2 -0
  26. package/configEntryServiceDefaults.js +2 -0
  27. package/configEntryServiceDefaults.js.map +1 -1
  28. package/configEntryServiceIntentions.d.ts +2 -0
  29. package/configEntryServiceIntentions.js +2 -0
  30. package/configEntryServiceIntentions.js.map +1 -1
  31. package/configEntryServiceResolver.d.ts +2 -0
  32. package/configEntryServiceResolver.js +2 -0
  33. package/configEntryServiceResolver.js.map +1 -1
  34. package/configEntryServiceRouter.d.ts +1 -1
  35. package/configEntryServiceRouter.js +1 -1
  36. package/configEntryServiceSplitter.d.ts +2 -0
  37. package/configEntryServiceSplitter.js +2 -0
  38. package/configEntryServiceSplitter.js.map +1 -1
  39. package/getAclTokenSecretId.d.ts +41 -0
  40. package/getAclTokenSecretId.js +24 -0
  41. package/getAclTokenSecretId.js.map +1 -1
  42. package/getCatalogServices.d.ts +7 -0
  43. package/getCatalogServices.js.map +1 -1
  44. package/getKeyPrefix.d.ts +6 -0
  45. package/getKeyPrefix.js +6 -0
  46. package/getKeyPrefix.js.map +1 -1
  47. package/getServices.d.ts +7 -0
  48. package/getServices.js.map +1 -1
  49. package/intention.d.ts +1 -1
  50. package/intention.js +1 -1
  51. package/keyPrefix.d.ts +24 -1
  52. package/keyPrefix.js +24 -1
  53. package/keyPrefix.js.map +1 -1
  54. package/keys.d.ts +10 -0
  55. package/keys.js +10 -0
  56. package/keys.js.map +1 -1
  57. package/namespace.d.ts +1 -1
  58. package/namespace.js +1 -1
  59. package/namespacePolicyAttachment.d.ts +67 -1
  60. package/namespacePolicyAttachment.js +67 -1
  61. package/namespacePolicyAttachment.js.map +1 -1
  62. package/namespaceRoleAttachment.d.ts +55 -1
  63. package/namespaceRoleAttachment.js +55 -1
  64. package/namespaceRoleAttachment.js.map +1 -1
  65. package/node.d.ts +1 -1
  66. package/node.js +1 -1
  67. package/package.json +2 -2
  68. package/preparedQuery.d.ts +4 -0
  69. package/preparedQuery.js +4 -0
  70. package/preparedQuery.js.map +1 -1
  71. package/types/input.d.ts +3 -0
  72. package/types/output.d.ts +3 -0
@@ -6,9 +6,75 @@ exports.NamespacePolicyAttachment = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("./utilities");
8
8
  /**
9
+ * > **NOTE:** This feature requires Consul Enterprise.
10
+ *
11
+ * The `consul.NamespacePolicyAttachment` resource links a Consul Namespace and an ACL
12
+ * policy. The link is implemented through an update to the Consul Namespace.
13
+ *
14
+ * > **NOTE:** This resource is only useful to attach policies to a namespace
15
+ * that has been created outside the current Terraform configuration, like the
16
+ * `default` namespace. If the namespace you need to attach a policy to has
17
+ * been created in the current Terraform configuration and will only be used in it,
18
+ * you should use the `policyDefaults` attribute of [`consul.Namespace`](https://www.terraform.io/docs/providers/consul/r/namespace.html).
19
+ *
20
+ * ## Example Usage
21
+ *
22
+ * ### Attach a policy to the default namespace
23
+ *
24
+ * ```typescript
25
+ * import * as pulumi from "@pulumi/pulumi";
26
+ * import * as consul from "@pulumi/consul";
27
+ *
28
+ * const agent = new consul.AclPolicy("agent", {
29
+ * name: "agent",
30
+ * rules: `node_prefix \\"\\" {
31
+ * policy = \\"read\\"
32
+ * }
33
+ * `,
34
+ * });
35
+ * const attachment = new consul.NamespacePolicyAttachment("attachment", {
36
+ * namespace: "default",
37
+ * policy: agent.name,
38
+ * });
39
+ * ```
40
+ *
41
+ * ### Attach a policy to a namespace created in another Terraform configuration
42
+ *
43
+ * ### In `first_configuration/main.tf`
44
+ *
45
+ * ```typescript
46
+ * import * as pulumi from "@pulumi/pulumi";
47
+ * import * as consul from "@pulumi/consul";
48
+ *
49
+ * const qa = new consul.Namespace("qa", {name: "qa"});
50
+ * ```
51
+ *
52
+ * ### In `second_configuration/main.tf`
53
+ *
54
+ * ```typescript
55
+ * import * as pulumi from "@pulumi/pulumi";
56
+ * import * as consul from "@pulumi/consul";
57
+ *
58
+ * const agent = new consul.AclPolicy("agent", {
59
+ * name: "agent",
60
+ * rules: `node_prefix \\"\\" {
61
+ * policy = \\"read\\"
62
+ * }
63
+ * `,
64
+ * });
65
+ * const attachment = new consul.NamespacePolicyAttachment("attachment", {
66
+ * namespace: "qa",
67
+ * policy: agent.name,
68
+ * });
69
+ * ```
70
+ * **NOTE**: consulAclNamespace would attempt to enforce an empty set of default
71
+ * policies, because its `policyDefaults` attribute is empty. For this reason it
72
+ * is necessary to add the lifecycle clause to prevent Terraform from attempting to
73
+ * empty the set of policies associated to the namespace.
74
+ *
9
75
  * ## Import
10
76
  *
11
- * `consul_namespace_policy_attachment` can be imported. This is especially useful
77
+ * `consul.NamespacePolicyAttachment` can be imported. This is especially useful
12
78
  * to manage the policies attached to the `default` namespace:
13
79
  *
14
80
  * ```sh
@@ -1 +1 @@
1
- {"version":3,"file":"namespacePolicyAttachment.js","sourceRoot":"","sources":["../namespacePolicyAttachment.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;GASG;AACH,MAAa,yBAA0B,SAAQ,MAAM,CAAC,cAAc;IAChE;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAsC,EAAE,IAAmC;QACpI,OAAO,IAAI,yBAAyB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAChF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,yBAAyB,CAAC,YAAY,CAAC;IAC1E,CAAC;IAmBD,YAAY,IAAY,EAAE,WAA4E,EAAE,IAAmC;QACvI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAyD,CAAC;YACxE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;SAC5C;aAAM;YACH,MAAM,IAAI,GAAG,WAAwD,CAAC;YACtE,IAAI,IAAI,EAAE,SAAS,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC5C,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,IAAI,IAAI,EAAE,MAAM,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACzC,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;SAC3C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,yBAAyB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC9E,CAAC;;AAjEL,8DAkEC;AApDG,gBAAgB;AACO,sCAAY,GAAG,kEAAkE,CAAC"}
1
+ {"version":3,"file":"namespacePolicyAttachment.js","sourceRoot":"","sources":["../namespacePolicyAttachment.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2EG;AACH,MAAa,yBAA0B,SAAQ,MAAM,CAAC,cAAc;IAChE;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAsC,EAAE,IAAmC;QACpI,OAAO,IAAI,yBAAyB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAChF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,yBAAyB,CAAC,YAAY,CAAC;IAC1E,CAAC;IAmBD,YAAY,IAAY,EAAE,WAA4E,EAAE,IAAmC;QACvI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAyD,CAAC;YACxE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;SAC5C;aAAM;YACH,MAAM,IAAI,GAAG,WAAwD,CAAC;YACtE,IAAI,IAAI,EAAE,SAAS,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC5C,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,IAAI,IAAI,EAAE,MAAM,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACzC,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;SAC3C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,yBAAyB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC9E,CAAC;;AAjEL,8DAkEC;AApDG,gBAAgB;AACO,sCAAY,GAAG,kEAAkE,CAAC"}
@@ -1,8 +1,62 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
2
  /**
3
+ * > **NOTE:** This feature requires Consul Enterprise.
4
+ *
5
+ * The `consul.NamespaceRoleAttachment` resource links a Consul Namespace and an ACL
6
+ * role. The link is implemented through an update to the Consul Namespace.
7
+ *
8
+ * > **NOTE:** This resource is only useful to attach roles to a namespace
9
+ * that has been created outside the current Terraform configuration, like the
10
+ * `default` namespace. If the namespace you need to attach a role to has
11
+ * been created in the current Terraform configuration and will only be used in it,
12
+ * you should use the `roleDefaults` attribute of [`consul.Namespace`](https://www.terraform.io/docs/providers/consul/r/namespace.html).
13
+ *
14
+ * ## Example Usage
15
+ *
16
+ * ### Attach a role to the default namespace
17
+ *
18
+ * ```typescript
19
+ * import * as pulumi from "@pulumi/pulumi";
20
+ * import * as consul from "@pulumi/consul";
21
+ *
22
+ * const agent = new consul.AclRole("agent", {name: "agent"});
23
+ * const attachment = new consul.NamespaceRoleAttachment("attachment", {
24
+ * namespace: "default",
25
+ * role: agent.name,
26
+ * });
27
+ * ```
28
+ *
29
+ * ### Attach a role to a namespace created in another Terraform configuration
30
+ *
31
+ * ### In `first_configuration/main.tf`
32
+ *
33
+ * ```typescript
34
+ * import * as pulumi from "@pulumi/pulumi";
35
+ * import * as consul from "@pulumi/consul";
36
+ *
37
+ * const qa = new consul.Namespace("qa", {name: "qa"});
38
+ * ```
39
+ *
40
+ * ### In `second_configuration/main.tf`
41
+ *
42
+ * ```typescript
43
+ * import * as pulumi from "@pulumi/pulumi";
44
+ * import * as consul from "@pulumi/consul";
45
+ *
46
+ * const agent = new consul.AclRole("agent", {name: "agent"});
47
+ * const attachment = new consul.NamespaceRoleAttachment("attachment", {
48
+ * namespace: "qa",
49
+ * role: agent.name,
50
+ * });
51
+ * ```
52
+ * **NOTE**: consulAclNamespace would attempt to enforce an empty set of default
53
+ * roles, because its `roleDefaults` attribute is empty. For this reason it
54
+ * is necessary to add the lifecycle clause to prevent Terraform from attempting to
55
+ * empty the set of policies associated to the namespace.
56
+ *
3
57
  * ## Import
4
58
  *
5
- * `consul_namespace_role_attachment` can be imported. This is especially useful
59
+ * `consul.NamespaceRoleAttachment` can be imported. This is especially useful
6
60
  * to manage the policies attached to the `default` namespace:
7
61
  *
8
62
  * ```sh
@@ -6,9 +6,63 @@ exports.NamespaceRoleAttachment = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("./utilities");
8
8
  /**
9
+ * > **NOTE:** This feature requires Consul Enterprise.
10
+ *
11
+ * The `consul.NamespaceRoleAttachment` resource links a Consul Namespace and an ACL
12
+ * role. The link is implemented through an update to the Consul Namespace.
13
+ *
14
+ * > **NOTE:** This resource is only useful to attach roles to a namespace
15
+ * that has been created outside the current Terraform configuration, like the
16
+ * `default` namespace. If the namespace you need to attach a role to has
17
+ * been created in the current Terraform configuration and will only be used in it,
18
+ * you should use the `roleDefaults` attribute of [`consul.Namespace`](https://www.terraform.io/docs/providers/consul/r/namespace.html).
19
+ *
20
+ * ## Example Usage
21
+ *
22
+ * ### Attach a role to the default namespace
23
+ *
24
+ * ```typescript
25
+ * import * as pulumi from "@pulumi/pulumi";
26
+ * import * as consul from "@pulumi/consul";
27
+ *
28
+ * const agent = new consul.AclRole("agent", {name: "agent"});
29
+ * const attachment = new consul.NamespaceRoleAttachment("attachment", {
30
+ * namespace: "default",
31
+ * role: agent.name,
32
+ * });
33
+ * ```
34
+ *
35
+ * ### Attach a role to a namespace created in another Terraform configuration
36
+ *
37
+ * ### In `first_configuration/main.tf`
38
+ *
39
+ * ```typescript
40
+ * import * as pulumi from "@pulumi/pulumi";
41
+ * import * as consul from "@pulumi/consul";
42
+ *
43
+ * const qa = new consul.Namespace("qa", {name: "qa"});
44
+ * ```
45
+ *
46
+ * ### In `second_configuration/main.tf`
47
+ *
48
+ * ```typescript
49
+ * import * as pulumi from "@pulumi/pulumi";
50
+ * import * as consul from "@pulumi/consul";
51
+ *
52
+ * const agent = new consul.AclRole("agent", {name: "agent"});
53
+ * const attachment = new consul.NamespaceRoleAttachment("attachment", {
54
+ * namespace: "qa",
55
+ * role: agent.name,
56
+ * });
57
+ * ```
58
+ * **NOTE**: consulAclNamespace would attempt to enforce an empty set of default
59
+ * roles, because its `roleDefaults` attribute is empty. For this reason it
60
+ * is necessary to add the lifecycle clause to prevent Terraform from attempting to
61
+ * empty the set of policies associated to the namespace.
62
+ *
9
63
  * ## Import
10
64
  *
11
- * `consul_namespace_role_attachment` can be imported. This is especially useful
65
+ * `consul.NamespaceRoleAttachment` can be imported. This is especially useful
12
66
  * to manage the policies attached to the `default` namespace:
13
67
  *
14
68
  * ```sh
@@ -1 +1 @@
1
- {"version":3,"file":"namespaceRoleAttachment.js","sourceRoot":"","sources":["../namespaceRoleAttachment.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;GASG;AACH,MAAa,uBAAwB,SAAQ,MAAM,CAAC,cAAc;IAC9D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAoC,EAAE,IAAmC;QAClI,OAAO,IAAI,uBAAuB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC9E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,uBAAuB,CAAC,YAAY,CAAC;IACxE,CAAC;IAmBD,YAAY,IAAY,EAAE,WAAwE,EAAE,IAAmC;QACnI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAuD,CAAC;YACtE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;SACxC;aAAM;YACH,MAAM,IAAI,GAAG,WAAsD,CAAC;YACpE,IAAI,IAAI,EAAE,SAAS,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC5C,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,IAAI,IAAI,EAAE,IAAI,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACvC,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;SACvC;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,uBAAuB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC5E,CAAC;;AAjEL,0DAkEC;AApDG,gBAAgB;AACO,oCAAY,GAAG,8DAA8D,CAAC"}
1
+ {"version":3,"file":"namespaceRoleAttachment.js","sourceRoot":"","sources":["../namespaceRoleAttachment.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA+DG;AACH,MAAa,uBAAwB,SAAQ,MAAM,CAAC,cAAc;IAC9D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAoC,EAAE,IAAmC;QAClI,OAAO,IAAI,uBAAuB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC9E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,uBAAuB,CAAC,YAAY,CAAC;IACxE,CAAC;IAmBD,YAAY,IAAY,EAAE,WAAwE,EAAE,IAAmC;QACnI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAuD,CAAC;YACtE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;SACxC;aAAM;YACH,MAAM,IAAI,GAAG,WAAsD,CAAC;YACpE,IAAI,IAAI,EAAE,SAAS,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC5C,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,IAAI,IAAI,EAAE,IAAI,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACvC,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;SACvC;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,uBAAuB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC5E,CAAC;;AAjEL,0DAkEC;AApDG,gBAAgB;AACO,oCAAY,GAAG,8DAA8D,CAAC"}
package/node.d.ts CHANGED
@@ -17,7 +17,7 @@ import * as pulumi from "@pulumi/pulumi";
17
17
  *
18
18
  * ## Import
19
19
  *
20
- * The `consul_node` resource can be imported:
20
+ * The `consul.Node` resource can be imported:
21
21
  *
22
22
  * ```sh
23
23
  * $ pulumi import consul:index/node:Node example node-name
package/node.js CHANGED
@@ -23,7 +23,7 @@ const utilities = require("./utilities");
23
23
  *
24
24
  * ## Import
25
25
  *
26
- * The `consul_node` resource can be imported:
26
+ * The `consul.Node` resource can be imported:
27
27
  *
28
28
  * ```sh
29
29
  * $ pulumi import consul:index/node:Node example node-name
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@pulumi/consul",
3
- "version": "3.14.0",
3
+ "version": "3.14.1",
4
4
  "description": "A Pulumi package for creating and managing consul resources.",
5
5
  "keywords": [
6
6
  "pulumi",
@@ -23,6 +23,6 @@
23
23
  "pulumi": {
24
24
  "resource": true,
25
25
  "name": "consul",
26
- "version": "3.14.0"
26
+ "version": "3.14.1"
27
27
  }
28
28
  }
@@ -2,6 +2,10 @@ import * as pulumi from "@pulumi/pulumi";
2
2
  import * as inputs from "./types/input";
3
3
  import * as outputs from "./types/output";
4
4
  /**
5
+ * Allows Terraform to manage a Consul prepared query.
6
+ *
7
+ * Managing prepared queries is done using Consul's REST API. This resource is useful to provide a consistent and declarative way of managing prepared queries in your Consul cluster using Terraform.
8
+ *
5
9
  * ## Example Usage
6
10
  *
7
11
  * ```typescript
package/preparedQuery.js CHANGED
@@ -6,6 +6,10 @@ exports.PreparedQuery = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("./utilities");
8
8
  /**
9
+ * Allows Terraform to manage a Consul prepared query.
10
+ *
11
+ * Managing prepared queries is done using Consul's REST API. This resource is useful to provide a consistent and declarative way of managing prepared queries in your Consul cluster using Terraform.
12
+ *
9
13
  * ## Example Usage
10
14
  *
11
15
  * ```typescript
@@ -1 +1 @@
1
- {"version":3,"file":"preparedQuery.js","sourceRoot":"","sources":["../preparedQuery.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAqEG;AACH,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;IACpD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA0B,EAAE,IAAmC;QACxH,OAAO,IAAI,aAAa,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACpE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,aAAa,CAAC,YAAY,CAAC;IAC9D,CAAC;IA8ED,YAAY,IAAY,EAAE,WAAoD,EAAE,IAAmC;QAC/G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA6C,CAAC;YAC5D,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,EAAE,GAAG,CAAC;YACnC,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;SAC1C;aAAM;YACH,MAAM,IAAI,GAAG,WAA4C,CAAC;YAC1D,IAAI,IAAI,EAAE,OAAO,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1C,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,EAAE,GAAG,CAAC;YAClC,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC;YACxD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;SACjF;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,OAAO,CAAC,EAAE,CAAC;QAC1D,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAClE,CAAC;;AAvJL,sCAwJC;AA1IG,gBAAgB;AACO,0BAAY,GAAG,0CAA0C,CAAC"}
1
+ {"version":3,"file":"preparedQuery.js","sourceRoot":"","sources":["../preparedQuery.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAyEG;AACH,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;IACpD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA0B,EAAE,IAAmC;QACxH,OAAO,IAAI,aAAa,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACpE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,aAAa,CAAC,YAAY,CAAC;IAC9D,CAAC;IA8ED,YAAY,IAAY,EAAE,WAAoD,EAAE,IAAmC;QAC/G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA6C,CAAC;YAC5D,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,EAAE,GAAG,CAAC;YACnC,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;SAC1C;aAAM;YACH,MAAM,IAAI,GAAG,WAA4C,CAAC;YAC1D,IAAI,IAAI,EAAE,OAAO,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1C,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,EAAE,GAAG,CAAC;YAClC,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC;YACxD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;SACjF;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,OAAO,CAAC,EAAE,CAAC;QAC1D,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAClE,CAAC;;AAvJL,sCAwJC;AA1IG,gBAAgB;AACO,0BAAY,GAAG,0CAA0C,CAAC"}
package/types/input.d.ts CHANGED
@@ -1524,6 +1524,9 @@ export interface ProviderAuthJwt {
1524
1524
  meta?: pulumi.Input<{
1525
1525
  [key: string]: pulumi.Input<string>;
1526
1526
  }>;
1527
+ /**
1528
+ * Whether to use a [Terraform Workload Identity token](https://developer.hashicorp.com/terraform/cloud-docs/workspaces/dynamic-provider-credentials/workload-identity-tokens). The token will be read from the `TFC_WORKLOAD_IDENTITY_TOKEN` environment variable.
1529
+ */
1527
1530
  useTerraformCloudWorkloadIdentity?: pulumi.Input<boolean>;
1528
1531
  }
1529
1532
  export interface ProviderAuthLoginAws {
package/types/output.d.ts CHANGED
@@ -1758,6 +1758,9 @@ export declare namespace config {
1758
1758
  meta?: {
1759
1759
  [key: string]: string;
1760
1760
  };
1761
+ /**
1762
+ * Whether to use a [Terraform Workload Identity token](https://developer.hashicorp.com/terraform/cloud-docs/workspaces/dynamic-provider-credentials/workload-identity-tokens). The token will be read from the `TFC_WORKLOAD_IDENTITY_TOKEN` environment variable.
1763
+ */
1761
1764
  useTerraformCloudWorkloadIdentity?: boolean;
1762
1765
  }
1763
1766
  interface AuthLoginAws {