@pulumi/harness 0.10.0-alpha.1763071963 → 0.10.0-alpha.1763186847

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,362 @@
1
+ "use strict";
2
+ // *** WARNING: this file was generated by pulumi-language-nodejs. ***
3
+ // *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+ Object.defineProperty(exports, "__esModule", { value: true });
5
+ exports.SecretWinrm = void 0;
6
+ const pulumi = require("@pulumi/pulumi");
7
+ const utilities = require("../utilities");
8
+ /**
9
+ * Resource for creating a WinRM credential secret.
10
+ *
11
+ * ## Example Usage
12
+ *
13
+ * ```typescript
14
+ * import * as pulumi from "@pulumi/pulumi";
15
+ * import * as harness from "@pulumi/harness";
16
+ *
17
+ * // ============================================================================
18
+ * // ACCOUNT LEVEL TESTS (3 scenarios)
19
+ * // ============================================================================
20
+ * // 1. Account-level NTLM
21
+ * const accountNtlmPassword = new harness.platform.SecretText("account_ntlm_password", {
22
+ * identifier: "account_ntlm_password_v3",
23
+ * name: "account_ntlm_password_v3",
24
+ * description: "Password for account-level NTLM",
25
+ * secretManagerIdentifier: "harnessSecretManager",
26
+ * valueType: "Inline",
27
+ * value: "account_ntlm_pass",
28
+ * });
29
+ * const accountNtlm = new harness.platform.SecretWinrm("account_ntlm", {
30
+ * identifier: "account_ntlm_v3",
31
+ * name: "Account NTLM v3",
32
+ * description: "Account-level WinRM with NTLM",
33
+ * tags: [
34
+ * "scope:account",
35
+ * "auth:ntlm",
36
+ * ],
37
+ * port: 5986,
38
+ * ntlm: {
39
+ * domain: "example.com",
40
+ * username: "admin",
41
+ * passwordRef: pulumi.interpolate`account.${accountNtlmPassword.id}`,
42
+ * useSsl: true,
43
+ * skipCertCheck: false,
44
+ * useNoProfile: true,
45
+ * },
46
+ * });
47
+ * // 2. Account-level Kerberos with KeyTab
48
+ * const accountKerberosKeytab = new harness.platform.SecretWinrm("account_kerberos_keytab", {
49
+ * identifier: "account_kerberos_keytab_v3",
50
+ * name: "Account Kerberos KeyTab v3",
51
+ * description: "Account-level WinRM with Kerberos KeyTab",
52
+ * tags: [
53
+ * "scope:account",
54
+ * "auth:kerberos-keytab",
55
+ * ],
56
+ * port: 5986,
57
+ * kerberos: {
58
+ * principal: "service@EXAMPLE.COM",
59
+ * realm: "EXAMPLE.COM",
60
+ * tgtGenerationMethod: "KeyTabFilePath",
61
+ * useSsl: true,
62
+ * skipCertCheck: true,
63
+ * useNoProfile: true,
64
+ * tgtKeyTabFilePathSpec: {
65
+ * keyPath: "/etc/krb5.keytab",
66
+ * },
67
+ * },
68
+ * });
69
+ * // 3. Account-level Kerberos with Password
70
+ * const accountKerberosPassword1 = new harness.platform.SecretText("account_kerberos_password_1", {
71
+ * identifier: "account_kerb_pass_20251111",
72
+ * name: "account_kerb_pass_20251111",
73
+ * description: "Password for account-level Kerberos",
74
+ * secretManagerIdentifier: "harnessSecretManager",
75
+ * valueType: "Inline",
76
+ * value: "account_kerberos_pass",
77
+ * });
78
+ * const accountKerberosPassword1SecretWinrm = new harness.platform.SecretWinrm("account_kerberos_password_1", {
79
+ * identifier: "account_kerb_winrm_20251111",
80
+ * name: "Account Kerberos WinRM 20251111",
81
+ * description: "Account-level WinRM with Kerberos Password",
82
+ * tags: [
83
+ * "scope:account",
84
+ * "auth:kerberos-password",
85
+ * ],
86
+ * port: 5986,
87
+ * kerberos: {
88
+ * principal: "user@EXAMPLE.COM",
89
+ * realm: "EXAMPLE.COM",
90
+ * tgtGenerationMethod: "Password",
91
+ * useSsl: true,
92
+ * skipCertCheck: false,
93
+ * useNoProfile: true,
94
+ * tgtPasswordSpec: {
95
+ * passwordRef: pulumi.interpolate`account.${accountKerberosPassword1.id}`,
96
+ * },
97
+ * },
98
+ * });
99
+ * // ============================================================================
100
+ * // ORGANIZATION LEVEL TESTS (3 scenarios)
101
+ * // ============================================================================
102
+ * // 4. Org-level NTLM
103
+ * const orgNtlmPassword = new harness.platform.SecretText("org_ntlm_password", {
104
+ * identifier: "org_ntlm_password_v3",
105
+ * name: "org_ntlm_password_v3",
106
+ * description: "Password for org-level NTLM",
107
+ * orgId: "default",
108
+ * secretManagerIdentifier: "harnessSecretManager",
109
+ * valueType: "Inline",
110
+ * value: "org_ntlm_pass",
111
+ * });
112
+ * const orgNtlm = new harness.platform.SecretWinrm("org_ntlm", {
113
+ * identifier: "org_ntlm_v3",
114
+ * name: "Org NTLM v3",
115
+ * description: "Org-level WinRM with NTLM",
116
+ * orgId: "default",
117
+ * tags: [
118
+ * "scope:org",
119
+ * "auth:ntlm",
120
+ * ],
121
+ * port: 5985,
122
+ * ntlm: {
123
+ * domain: "org.example.com",
124
+ * username: "orgadmin",
125
+ * passwordRef: pulumi.interpolate`org.${orgNtlmPassword.id}`,
126
+ * useSsl: false,
127
+ * skipCertCheck: false,
128
+ * useNoProfile: true,
129
+ * },
130
+ * });
131
+ * // 5. Org-level Kerberos with KeyTab
132
+ * const orgKerberosKeytab = new harness.platform.SecretWinrm("org_kerberos_keytab", {
133
+ * identifier: "org_kerberos_keytab_v3",
134
+ * name: "Org Kerberos KeyTab v3",
135
+ * description: "Org-level WinRM with Kerberos KeyTab",
136
+ * orgId: "default",
137
+ * tags: [
138
+ * "scope:org",
139
+ * "auth:kerberos-keytab",
140
+ * ],
141
+ * port: 5986,
142
+ * kerberos: {
143
+ * principal: "orgservice@EXAMPLE.COM",
144
+ * realm: "EXAMPLE.COM",
145
+ * tgtGenerationMethod: "KeyTabFilePath",
146
+ * useSsl: true,
147
+ * skipCertCheck: true,
148
+ * useNoProfile: true,
149
+ * tgtKeyTabFilePathSpec: {
150
+ * keyPath: "/etc/org.keytab",
151
+ * },
152
+ * },
153
+ * });
154
+ * // 6. Org-level Kerberos with Password
155
+ * const orgKerberosPassword = new harness.platform.SecretText("org_kerberos_password", {
156
+ * identifier: "org_kerb_pass_v3",
157
+ * name: "org_kerb_pass_v3",
158
+ * description: "Password for org-level Kerberos",
159
+ * orgId: "default",
160
+ * secretManagerIdentifier: "harnessSecretManager",
161
+ * valueType: "Inline",
162
+ * value: "org_kerberos_pass",
163
+ * });
164
+ * const orgKerberosPasswordSecretWinrm = new harness.platform.SecretWinrm("org_kerberos_password", {
165
+ * identifier: "org_kerb_winrm_v3",
166
+ * name: "Org Kerberos WinRM v3",
167
+ * description: "Org-level WinRM with Kerberos Password",
168
+ * orgId: "default",
169
+ * tags: [
170
+ * "scope:org",
171
+ * "auth:kerberos-password",
172
+ * ],
173
+ * port: 5986,
174
+ * kerberos: {
175
+ * principal: "orguser@EXAMPLE.COM",
176
+ * realm: "EXAMPLE.COM",
177
+ * tgtGenerationMethod: "Password",
178
+ * useSsl: true,
179
+ * skipCertCheck: false,
180
+ * useNoProfile: true,
181
+ * tgtPasswordSpec: {
182
+ * passwordRef: pulumi.interpolate`org.${orgKerberosPassword.id}`,
183
+ * },
184
+ * },
185
+ * });
186
+ * // ============================================================================
187
+ * // PROJECT LEVEL TESTS (3 scenarios)
188
+ * // ============================================================================
189
+ * // 7. Project-level NTLM
190
+ * const projectNtlmPassword = new harness.platform.SecretText("project_ntlm_password", {
191
+ * identifier: "proj_ntlm_pass_v3",
192
+ * name: "proj_ntlm_pass_v3",
193
+ * description: "Password for project-level NTLM",
194
+ * orgId: "default",
195
+ * projectId: "winrm_support_terraform",
196
+ * secretManagerIdentifier: "harnessSecretManager",
197
+ * valueType: "Inline",
198
+ * value: "project_ntlm_pass",
199
+ * });
200
+ * const projectNtlm = new harness.platform.SecretWinrm("project_ntlm", {
201
+ * identifier: "proj_ntlm_winrm_v3",
202
+ * name: "Project NTLM WinRM v3",
203
+ * description: "Project-level WinRM with NTLM",
204
+ * orgId: "default",
205
+ * projectId: "winrm_support_terraform",
206
+ * tags: [
207
+ * "scope:project",
208
+ * "auth:ntlm",
209
+ * ],
210
+ * port: 5986,
211
+ * ntlm: {
212
+ * domain: "project.example.com",
213
+ * username: "projectadmin",
214
+ * passwordRef: projectNtlmPassword.id,
215
+ * useSsl: true,
216
+ * skipCertCheck: false,
217
+ * useNoProfile: false,
218
+ * },
219
+ * });
220
+ * // 8. Project-level Kerberos with KeyTab
221
+ * const projectKerberosKeytab = new harness.platform.SecretWinrm("project_kerberos_keytab", {
222
+ * identifier: "proj_kerb_keytab_v3",
223
+ * name: "Project Kerberos KeyTab v3",
224
+ * description: "Project-level WinRM with Kerberos KeyTab",
225
+ * orgId: "default",
226
+ * projectId: "winrm_support_terraform",
227
+ * tags: [
228
+ * "scope:project",
229
+ * "auth:kerberos-keytab",
230
+ * ],
231
+ * port: 5986,
232
+ * kerberos: {
233
+ * principal: "projectservice@EXAMPLE.COM",
234
+ * realm: "EXAMPLE.COM",
235
+ * tgtGenerationMethod: "KeyTabFilePath",
236
+ * useSsl: false,
237
+ * skipCertCheck: false,
238
+ * useNoProfile: false,
239
+ * tgtKeyTabFilePathSpec: {
240
+ * keyPath: "/etc/project.keytab",
241
+ * },
242
+ * },
243
+ * });
244
+ * // 9. Project-level Kerberos with Password
245
+ * const projectKerberosPassword = new harness.platform.SecretText("project_kerberos_password", {
246
+ * identifier: "proj_kerb_pass_v3",
247
+ * name: "proj_kerb_pass_v3",
248
+ * description: "Password for project-level Kerberos",
249
+ * orgId: "default",
250
+ * projectId: "winrm_support_terraform",
251
+ * secretManagerIdentifier: "harnessSecretManager",
252
+ * valueType: "Inline",
253
+ * value: "project_kerberos_pass",
254
+ * });
255
+ * const projectKerberosPasswordSecretWinrm = new harness.platform.SecretWinrm("project_kerberos_password", {
256
+ * identifier: "proj_kerb_winrm_v3",
257
+ * name: "Project Kerberos WinRM v3",
258
+ * description: "Project-level WinRM with Kerberos Password",
259
+ * orgId: "default",
260
+ * projectId: "winrm_support_terraform",
261
+ * tags: [
262
+ * "scope:project",
263
+ * "auth:kerberos-password",
264
+ * ],
265
+ * port: 5986,
266
+ * kerberos: {
267
+ * principal: "projectuser@EXAMPLE.COM",
268
+ * realm: "EXAMPLE.COM",
269
+ * tgtGenerationMethod: "Password",
270
+ * useSsl: false,
271
+ * skipCertCheck: true,
272
+ * useNoProfile: true,
273
+ * tgtPasswordSpec: {
274
+ * passwordRef: projectKerberosPassword.id,
275
+ * },
276
+ * },
277
+ * });
278
+ * ```
279
+ *
280
+ * ## Import
281
+ *
282
+ * The `pulumi import` command can be used, for example:
283
+ *
284
+ * Import account level WinRM credential
285
+ *
286
+ * ```sh
287
+ * $ pulumi import harness:platform/secretWinrm:SecretWinrm example <winrm_credential_id>
288
+ * ```
289
+ *
290
+ * Import organization level WinRM credential
291
+ *
292
+ * ```sh
293
+ * $ pulumi import harness:platform/secretWinrm:SecretWinrm example <org_id>/<winrm_credential_id>
294
+ * ```
295
+ *
296
+ * Import project level WinRM credential
297
+ *
298
+ * ```sh
299
+ * $ pulumi import harness:platform/secretWinrm:SecretWinrm example <org_id>/<project_id>/<winrm_credential_id>
300
+ * ```
301
+ */
302
+ class SecretWinrm extends pulumi.CustomResource {
303
+ /**
304
+ * Get an existing SecretWinrm resource's state with the given name, ID, and optional extra
305
+ * properties used to qualify the lookup.
306
+ *
307
+ * @param name The _unique_ name of the resulting resource.
308
+ * @param id The _unique_ provider ID of the resource to lookup.
309
+ * @param state Any extra arguments used during the lookup.
310
+ * @param opts Optional settings to control the behavior of the CustomResource.
311
+ */
312
+ static get(name, id, state, opts) {
313
+ return new SecretWinrm(name, state, { ...opts, id: id });
314
+ }
315
+ /**
316
+ * Returns true if the given object is an instance of SecretWinrm. This is designed to work even
317
+ * when multiple copies of the Pulumi SDK have been loaded into the same process.
318
+ */
319
+ static isInstance(obj) {
320
+ if (obj === undefined || obj === null) {
321
+ return false;
322
+ }
323
+ return obj['__pulumiType'] === SecretWinrm.__pulumiType;
324
+ }
325
+ constructor(name, argsOrState, opts) {
326
+ let resourceInputs = {};
327
+ opts = opts || {};
328
+ if (opts.id) {
329
+ const state = argsOrState;
330
+ resourceInputs["description"] = state?.description;
331
+ resourceInputs["identifier"] = state?.identifier;
332
+ resourceInputs["kerberos"] = state?.kerberos;
333
+ resourceInputs["name"] = state?.name;
334
+ resourceInputs["ntlm"] = state?.ntlm;
335
+ resourceInputs["orgId"] = state?.orgId;
336
+ resourceInputs["port"] = state?.port;
337
+ resourceInputs["projectId"] = state?.projectId;
338
+ resourceInputs["tags"] = state?.tags;
339
+ }
340
+ else {
341
+ const args = argsOrState;
342
+ if (args?.identifier === undefined && !opts.urn) {
343
+ throw new Error("Missing required property 'identifier'");
344
+ }
345
+ resourceInputs["description"] = args?.description;
346
+ resourceInputs["identifier"] = args?.identifier;
347
+ resourceInputs["kerberos"] = args?.kerberos;
348
+ resourceInputs["name"] = args?.name;
349
+ resourceInputs["ntlm"] = args?.ntlm;
350
+ resourceInputs["orgId"] = args?.orgId;
351
+ resourceInputs["port"] = args?.port;
352
+ resourceInputs["projectId"] = args?.projectId;
353
+ resourceInputs["tags"] = args?.tags;
354
+ }
355
+ opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
356
+ super(SecretWinrm.__pulumiType, name, resourceInputs, opts);
357
+ }
358
+ }
359
+ exports.SecretWinrm = SecretWinrm;
360
+ /** @internal */
361
+ SecretWinrm.__pulumiType = 'harness:platform/secretWinrm:SecretWinrm';
362
+ //# sourceMappingURL=secretWinrm.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"secretWinrm.js","sourceRoot":"","sources":["../../platform/secretWinrm.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAqSG;AACH,MAAa,WAAY,SAAQ,MAAM,CAAC,cAAc;IAClD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAwB,EAAE,IAAmC;QACtH,OAAO,IAAI,WAAW,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAClE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,WAAW,CAAC,YAAY,CAAC;IAC5D,CAAC;IA+CD,YAAY,IAAY,EAAE,WAAgD,EAAE,IAAmC;QAC3G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA2C,CAAC;YAC1D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;SACxC;aAAM;YACH,MAAM,IAAI,GAAG,WAA0C,CAAC;YACxD,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC;YACtC,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;SACvC;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,WAAW,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAChE,CAAC;;AAxGL,kCAyGC;AA3FG,gBAAgB;AACO,wBAAY,GAAG,0CAA0C,CAAC"}
package/types/input.d.ts CHANGED
@@ -34211,6 +34211,78 @@ export declare namespace platform {
34211
34211
  interface SecretTextAdditionalMetadataValue {
34212
34212
  version?: pulumi.Input<string>;
34213
34213
  }
34214
+ interface SecretWinrmKerberos {
34215
+ /**
34216
+ * Kerberos principal.
34217
+ */
34218
+ principal: pulumi.Input<string>;
34219
+ /**
34220
+ * Kerberos realm.
34221
+ */
34222
+ realm: pulumi.Input<string>;
34223
+ /**
34224
+ * Skip certificate verification.
34225
+ */
34226
+ skipCertCheck?: pulumi.Input<boolean>;
34227
+ /**
34228
+ * Method to generate TGT (Ticket Granting Ticket).
34229
+ */
34230
+ tgtGenerationMethod?: pulumi.Input<string>;
34231
+ /**
34232
+ * TGT generation using key tab file.
34233
+ */
34234
+ tgtKeyTabFilePathSpec?: pulumi.Input<inputs.platform.SecretWinrmKerberosTgtKeyTabFilePathSpec>;
34235
+ /**
34236
+ * TGT generation using password.
34237
+ */
34238
+ tgtPasswordSpec?: pulumi.Input<inputs.platform.SecretWinrmKerberosTgtPasswordSpec>;
34239
+ /**
34240
+ * Use no profile.
34241
+ */
34242
+ useNoProfile?: pulumi.Input<boolean>;
34243
+ /**
34244
+ * Use SSL/TLS for WinRM communication.
34245
+ */
34246
+ useSsl?: pulumi.Input<boolean>;
34247
+ }
34248
+ interface SecretWinrmKerberosTgtKeyTabFilePathSpec {
34249
+ /**
34250
+ * Path to the key tab file.
34251
+ */
34252
+ keyPath: pulumi.Input<string>;
34253
+ }
34254
+ interface SecretWinrmKerberosTgtPasswordSpec {
34255
+ /**
34256
+ * Reference to a secret containing the password. To reference a secret at the organization scope, prefix 'org' to the expression: org.{identifier}. To reference a secret at the account scope, prefix 'account' to the expression: account.{identifier}.
34257
+ */
34258
+ passwordRef: pulumi.Input<string>;
34259
+ }
34260
+ interface SecretWinrmNtlm {
34261
+ /**
34262
+ * Domain name for NTLM authentication.
34263
+ */
34264
+ domain?: pulumi.Input<string>;
34265
+ /**
34266
+ * Reference to a secret containing the password to use for authentication. To reference a secret at the organization scope, prefix 'org' to the expression: org.{identifier}. To reference a secret at the account scope, prefix 'account' to the expression: account.{identifier}.
34267
+ */
34268
+ passwordRef: pulumi.Input<string>;
34269
+ /**
34270
+ * Skip certificate verification.
34271
+ */
34272
+ skipCertCheck?: pulumi.Input<boolean>;
34273
+ /**
34274
+ * Use no profile.
34275
+ */
34276
+ useNoProfile?: pulumi.Input<boolean>;
34277
+ /**
34278
+ * Use SSL/TLS for WinRM communication.
34279
+ */
34280
+ useSsl?: pulumi.Input<boolean>;
34281
+ /**
34282
+ * Username to use for authentication.
34283
+ */
34284
+ username: pulumi.Input<string>;
34285
+ }
34214
34286
  interface ServiceGitDetails {
34215
34287
  /**
34216
34288
  * Name of the default branch (this checks out a new branch titled by branch_name).
package/types/output.d.ts CHANGED
@@ -6729,6 +6729,78 @@ export declare namespace platform {
6729
6729
  interface GetSecretTextAdditionalMetadataValue {
6730
6730
  version?: string;
6731
6731
  }
6732
+ interface GetSecretWinrmKerbero {
6733
+ /**
6734
+ * Kerberos principal.
6735
+ */
6736
+ principal: string;
6737
+ /**
6738
+ * Kerberos realm.
6739
+ */
6740
+ realm: string;
6741
+ /**
6742
+ * Skip certificate verification.
6743
+ */
6744
+ skipCertCheck: boolean;
6745
+ /**
6746
+ * Method to generate TGT (Ticket Granting Ticket).
6747
+ */
6748
+ tgtGenerationMethod: string;
6749
+ /**
6750
+ * TGT generation using key tab file.
6751
+ */
6752
+ tgtKeyTabFilePathSpecs: outputs.platform.GetSecretWinrmKerberoTgtKeyTabFilePathSpec[];
6753
+ /**
6754
+ * TGT generation using password.
6755
+ */
6756
+ tgtPasswordSpecs: outputs.platform.GetSecretWinrmKerberoTgtPasswordSpec[];
6757
+ /**
6758
+ * Use no profile.
6759
+ */
6760
+ useNoProfile: boolean;
6761
+ /**
6762
+ * Use SSL/TLS for WinRM communication.
6763
+ */
6764
+ useSsl: boolean;
6765
+ }
6766
+ interface GetSecretWinrmKerberoTgtKeyTabFilePathSpec {
6767
+ /**
6768
+ * Path to the key tab file.
6769
+ */
6770
+ keyPath: string;
6771
+ }
6772
+ interface GetSecretWinrmKerberoTgtPasswordSpec {
6773
+ /**
6774
+ * Reference to a secret containing the password.
6775
+ */
6776
+ passwordRef: string;
6777
+ }
6778
+ interface GetSecretWinrmNtlm {
6779
+ /**
6780
+ * Domain name for NTLM authentication.
6781
+ */
6782
+ domain: string;
6783
+ /**
6784
+ * Reference to a secret containing the password to use for authentication.
6785
+ */
6786
+ passwordRef: string;
6787
+ /**
6788
+ * Skip certificate verification.
6789
+ */
6790
+ skipCertCheck: boolean;
6791
+ /**
6792
+ * Use no profile.
6793
+ */
6794
+ useNoProfile: boolean;
6795
+ /**
6796
+ * Use SSL/TLS for WinRM communication.
6797
+ */
6798
+ useSsl: boolean;
6799
+ /**
6800
+ * Username to use for authentication.
6801
+ */
6802
+ username: string;
6803
+ }
6732
6804
  interface GetServiceGitDetails {
6733
6805
  /**
6734
6806
  * Name of the branch.
@@ -35324,6 +35396,78 @@ export declare namespace platform {
35324
35396
  interface SecretTextAdditionalMetadataValue {
35325
35397
  version?: string;
35326
35398
  }
35399
+ interface SecretWinrmKerberos {
35400
+ /**
35401
+ * Kerberos principal.
35402
+ */
35403
+ principal: string;
35404
+ /**
35405
+ * Kerberos realm.
35406
+ */
35407
+ realm: string;
35408
+ /**
35409
+ * Skip certificate verification.
35410
+ */
35411
+ skipCertCheck?: boolean;
35412
+ /**
35413
+ * Method to generate TGT (Ticket Granting Ticket).
35414
+ */
35415
+ tgtGenerationMethod?: string;
35416
+ /**
35417
+ * TGT generation using key tab file.
35418
+ */
35419
+ tgtKeyTabFilePathSpec?: outputs.platform.SecretWinrmKerberosTgtKeyTabFilePathSpec;
35420
+ /**
35421
+ * TGT generation using password.
35422
+ */
35423
+ tgtPasswordSpec?: outputs.platform.SecretWinrmKerberosTgtPasswordSpec;
35424
+ /**
35425
+ * Use no profile.
35426
+ */
35427
+ useNoProfile?: boolean;
35428
+ /**
35429
+ * Use SSL/TLS for WinRM communication.
35430
+ */
35431
+ useSsl?: boolean;
35432
+ }
35433
+ interface SecretWinrmKerberosTgtKeyTabFilePathSpec {
35434
+ /**
35435
+ * Path to the key tab file.
35436
+ */
35437
+ keyPath: string;
35438
+ }
35439
+ interface SecretWinrmKerberosTgtPasswordSpec {
35440
+ /**
35441
+ * Reference to a secret containing the password. To reference a secret at the organization scope, prefix 'org' to the expression: org.{identifier}. To reference a secret at the account scope, prefix 'account' to the expression: account.{identifier}.
35442
+ */
35443
+ passwordRef: string;
35444
+ }
35445
+ interface SecretWinrmNtlm {
35446
+ /**
35447
+ * Domain name for NTLM authentication.
35448
+ */
35449
+ domain?: string;
35450
+ /**
35451
+ * Reference to a secret containing the password to use for authentication. To reference a secret at the organization scope, prefix 'org' to the expression: org.{identifier}. To reference a secret at the account scope, prefix 'account' to the expression: account.{identifier}.
35452
+ */
35453
+ passwordRef: string;
35454
+ /**
35455
+ * Skip certificate verification.
35456
+ */
35457
+ skipCertCheck?: boolean;
35458
+ /**
35459
+ * Use no profile.
35460
+ */
35461
+ useNoProfile?: boolean;
35462
+ /**
35463
+ * Use SSL/TLS for WinRM communication.
35464
+ */
35465
+ useSsl?: boolean;
35466
+ /**
35467
+ * Username to use for authentication.
35468
+ */
35469
+ username: string;
35470
+ }
35327
35471
  interface ServiceGitDetails {
35328
35472
  /**
35329
35473
  * Name of the default branch (this checks out a new branch titled by branch_name).