@pulumi/vault 4.5.0 → 4.6.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +1 -1
- package/ad/getAccessCredentials.d.ts +18 -2
- package/ad/getAccessCredentials.js +5 -0
- package/ad/getAccessCredentials.js.map +1 -1
- package/ad/index.js +14 -7
- package/ad/index.js.map +1 -1
- package/ad/secretBackend.d.ts +68 -68
- package/ad/secretBackend.js +1 -0
- package/ad/secretBackend.js.map +1 -1
- package/ad/secretLibrary.d.ts +12 -12
- package/ad/secretLibrary.js +1 -0
- package/ad/secretLibrary.js.map +1 -1
- package/ad/secretRole.d.ts +10 -10
- package/ad/secretRole.js +1 -0
- package/ad/secretRole.js.map +1 -1
- package/alicloud/authBackendRole.d.ts +24 -24
- package/alicloud/authBackendRole.js +1 -0
- package/alicloud/authBackendRole.js.map +1 -1
- package/alicloud/index.js +11 -4
- package/alicloud/index.js.map +1 -1
- package/approle/authBackendLogin.d.ts +16 -16
- package/approle/authBackendLogin.js +4 -3
- package/approle/authBackendLogin.js.map +1 -1
- package/approle/authBackendRole.d.ts +39 -39
- package/approle/authBackendRole.js +2 -1
- package/approle/authBackendRole.js.map +1 -1
- package/approle/authBackendRoleSecretID.d.ts +17 -17
- package/approle/authBackendRoleSecretID.js +3 -2
- package/approle/authBackendRoleSecretID.js.map +1 -1
- package/approle/getAuthBackendRoleId.d.ts +17 -2
- package/approle/getAuthBackendRoleId.js +5 -0
- package/approle/getAuthBackendRoleId.js.map +1 -1
- package/approle/index.js +14 -7
- package/approle/index.js.map +1 -1
- package/audit.d.ts +10 -10
- package/audit.js +1 -0
- package/audit.js.map +1 -1
- package/authBackend.d.ts +17 -17
- package/authBackend.js +1 -0
- package/authBackend.js.map +1 -1
- package/aws/authBackendCert.d.ts +8 -8
- package/aws/authBackendCert.js +1 -0
- package/aws/authBackendCert.js.map +1 -1
- package/aws/authBackendClient.d.ts +16 -16
- package/aws/authBackendClient.js +1 -0
- package/aws/authBackendClient.js.map +1 -1
- package/aws/authBackendIdentityWhitelist.d.ts +6 -6
- package/aws/authBackendIdentityWhitelist.js +1 -0
- package/aws/authBackendIdentityWhitelist.js.map +1 -1
- package/aws/authBackendLogin.d.ts +28 -28
- package/aws/authBackendLogin.js +1 -0
- package/aws/authBackendLogin.js.map +1 -1
- package/aws/authBackendRole.d.ts +62 -62
- package/aws/authBackendRole.js +1 -0
- package/aws/authBackendRole.js.map +1 -1
- package/aws/authBackendRoleTag.d.ts +16 -16
- package/aws/authBackendRoleTag.js +1 -0
- package/aws/authBackendRoleTag.js.map +1 -1
- package/aws/authBackendRoletagBlacklist.d.ts +6 -6
- package/aws/authBackendRoletagBlacklist.js +1 -0
- package/aws/authBackendRoletagBlacklist.js.map +1 -1
- package/aws/authBackendStsRole.d.ts +6 -6
- package/aws/authBackendStsRole.js +1 -0
- package/aws/authBackendStsRole.js.map +1 -1
- package/aws/getAccessCredentials.d.ts +42 -6
- package/aws/getAccessCredentials.js +5 -0
- package/aws/getAccessCredentials.js.map +1 -1
- package/aws/index.js +21 -14
- package/aws/index.js.map +1 -1
- package/aws/secretBackend.d.ts +18 -18
- package/aws/secretBackend.js +1 -0
- package/aws/secretBackend.js.map +1 -1
- package/aws/secretBackendRole.d.ts +18 -18
- package/aws/secretBackendRole.js +1 -0
- package/aws/secretBackendRole.js.map +1 -1
- package/azure/authBackendConfig.d.ts +12 -12
- package/azure/authBackendConfig.js +1 -0
- package/azure/authBackendConfig.js.map +1 -1
- package/azure/authBackendRole.d.ts +45 -45
- package/azure/authBackendRole.js +1 -0
- package/azure/authBackendRole.js.map +1 -1
- package/azure/backend.d.ts +14 -14
- package/azure/backend.js +1 -0
- package/azure/backend.js.map +1 -1
- package/azure/backendRole.d.ts +16 -16
- package/azure/backendRole.js +1 -0
- package/azure/backendRole.js.map +1 -1
- package/azure/getAccessCredentials.d.ts +47 -6
- package/azure/getAccessCredentials.js +5 -0
- package/azure/getAccessCredentials.js.map +1 -1
- package/azure/index.js +15 -8
- package/azure/index.js.map +1 -1
- package/certAuthBackendRole.d.ts +50 -50
- package/certAuthBackendRole.js +1 -0
- package/certAuthBackendRole.js.map +1 -1
- package/config/index.js +11 -4
- package/config/index.js.map +1 -1
- package/config/vars.d.ts +13 -13
- package/config/vars.js +82 -53
- package/config/vars.js.map +1 -1
- package/consul/index.js +12 -5
- package/consul/index.js.map +1 -1
- package/consul/secretBackend.d.ts +22 -22
- package/consul/secretBackend.js +1 -0
- package/consul/secretBackend.js.map +1 -1
- package/consul/secretBackendRole.d.ts +16 -16
- package/consul/secretBackendRole.js +1 -0
- package/consul/secretBackendRole.js.map +1 -1
- package/database/index.js +13 -6
- package/database/index.js.map +1 -1
- package/database/secretBackendConnection.d.ts +38 -38
- package/database/secretBackendConnection.js +1 -0
- package/database/secretBackendConnection.js.map +1 -1
- package/database/secretBackendRole.d.ts +18 -18
- package/database/secretBackendRole.js +1 -0
- package/database/secretBackendRole.js.map +1 -1
- package/database/secretBackendStaticRole.d.ts +12 -12
- package/database/secretBackendStaticRole.js +1 -0
- package/database/secretBackendStaticRole.js.map +1 -1
- package/egpPolicy.d.ts +8 -8
- package/egpPolicy.js +1 -0
- package/egpPolicy.js.map +1 -1
- package/gcp/authBackend.d.ts +16 -16
- package/gcp/authBackend.js +1 -0
- package/gcp/authBackend.js.map +1 -1
- package/gcp/authBackendRole.d.ts +50 -50
- package/gcp/authBackendRole.js +1 -0
- package/gcp/authBackendRole.js.map +1 -1
- package/gcp/getAuthBackendRole.d.ts +80 -12
- package/gcp/getAuthBackendRole.js +6 -1
- package/gcp/getAuthBackendRole.js.map +1 -1
- package/gcp/index.js +16 -9
- package/gcp/index.js.map +1 -1
- package/gcp/secretBackend.d.ts +12 -12
- package/gcp/secretBackend.js +1 -0
- package/gcp/secretBackend.js.map +1 -1
- package/gcp/secretRoleset.d.ts +13 -13
- package/gcp/secretRoleset.js +1 -0
- package/gcp/secretRoleset.js.map +1 -1
- package/gcp/secretStaticAccount.d.ts +39 -13
- package/gcp/secretStaticAccount.js +27 -0
- package/gcp/secretStaticAccount.js.map +1 -1
- package/generic/endpoint.d.ts +14 -14
- package/generic/endpoint.js +1 -0
- package/generic/endpoint.js.map +1 -1
- package/generic/getSecret.d.ts +22 -2
- package/generic/getSecret.js +5 -0
- package/generic/getSecret.js.map +1 -1
- package/generic/index.js +13 -6
- package/generic/index.js.map +1 -1
- package/generic/secret.d.ts +7 -7
- package/generic/secret.js +1 -0
- package/generic/secret.js.map +1 -1
- package/getAuthBackend.d.ts +13 -3
- package/getAuthBackend.js +6 -1
- package/getAuthBackend.js.map +1 -1
- package/getNomadAccessToken.d.ts +18 -2
- package/getNomadAccessToken.js +5 -0
- package/getNomadAccessToken.js.map +1 -1
- package/getPolicyDocument.d.ts +8 -1
- package/getPolicyDocument.js +5 -0
- package/getPolicyDocument.js.map +1 -1
- package/github/authBackend.d.ts +44 -35
- package/github/authBackend.js +3 -2
- package/github/authBackend.js.map +1 -1
- package/github/index.js +13 -6
- package/github/index.js.map +1 -1
- package/github/team.d.ts +24 -24
- package/github/team.js +1 -0
- package/github/team.js.map +1 -1
- package/github/user.d.ts +24 -24
- package/github/user.js +1 -0
- package/github/user.js.map +1 -1
- package/identity/entity.d.ts +10 -10
- package/identity/entity.js +1 -0
- package/identity/entity.js.map +1 -1
- package/identity/entityAlias.d.ts +6 -6
- package/identity/entityAlias.js +1 -0
- package/identity/entityAlias.js.map +1 -1
- package/identity/entityPolicies.d.ts +7 -7
- package/identity/entityPolicies.js +1 -0
- package/identity/entityPolicies.js.map +1 -1
- package/identity/getEntity.d.ts +33 -5
- package/identity/getEntity.js +5 -0
- package/identity/getEntity.js.map +1 -1
- package/identity/getGroup.d.ts +33 -5
- package/identity/getGroup.js +5 -0
- package/identity/getGroup.js.map +1 -1
- package/identity/group.d.ts +16 -16
- package/identity/group.js +1 -0
- package/identity/group.js.map +1 -1
- package/identity/groupAlias.d.ts +6 -6
- package/identity/groupAlias.js +1 -0
- package/identity/groupAlias.js.map +1 -1
- package/identity/groupMemberEntityIds.d.ts +7 -7
- package/identity/groupMemberEntityIds.js +1 -0
- package/identity/groupMemberEntityIds.js.map +1 -1
- package/identity/groupPolicies.d.ts +7 -7
- package/identity/groupPolicies.js +1 -0
- package/identity/groupPolicies.js.map +1 -1
- package/identity/index.js +23 -16
- package/identity/index.js.map +1 -1
- package/identity/oidc.d.ts +2 -2
- package/identity/oidc.js +1 -0
- package/identity/oidc.js.map +1 -1
- package/identity/oidcKey.d.ts +10 -10
- package/identity/oidcKey.js +1 -0
- package/identity/oidcKey.js.map +1 -1
- package/identity/oidcKeyAllowedClientID.d.ts +4 -4
- package/identity/oidcKeyAllowedClientID.js +1 -0
- package/identity/oidcKeyAllowedClientID.js.map +1 -1
- package/identity/oidcRole.d.ts +10 -10
- package/identity/oidcRole.js +1 -0
- package/identity/oidcRole.js.map +1 -1
- package/index.js +31 -23
- package/index.js.map +1 -1
- package/jwt/authBackend.d.ts +33 -33
- package/jwt/authBackend.js +1 -0
- package/jwt/authBackend.js.map +1 -1
- package/jwt/authBackendRole.d.ts +64 -64
- package/jwt/authBackendRole.js +1 -0
- package/jwt/authBackendRole.js.map +1 -1
- package/jwt/index.js +12 -5
- package/jwt/index.js.map +1 -1
- package/kubernetes/authBackendConfig.d.ts +16 -16
- package/kubernetes/authBackendConfig.js +1 -0
- package/kubernetes/authBackendConfig.js.map +1 -1
- package/kubernetes/authBackendRole.d.ts +40 -40
- package/kubernetes/authBackendRole.js +1 -0
- package/kubernetes/authBackendRole.js.map +1 -1
- package/kubernetes/getAuthBackendConfig.d.ts +36 -7
- package/kubernetes/getAuthBackendConfig.js +5 -0
- package/kubernetes/getAuthBackendConfig.js.map +1 -1
- package/kubernetes/getAuthBackendRole.d.ts +115 -18
- package/kubernetes/getAuthBackendRole.js +5 -0
- package/kubernetes/getAuthBackendRole.js.map +1 -1
- package/kubernetes/index.js +14 -7
- package/kubernetes/index.js.map +1 -1
- package/ldap/authBackend.d.ts +63 -63
- package/ldap/authBackend.js +1 -0
- package/ldap/authBackend.js.map +1 -1
- package/ldap/authBackendGroup.d.ts +6 -6
- package/ldap/authBackendGroup.js +1 -0
- package/ldap/authBackendGroup.js.map +1 -1
- package/ldap/authBackendUser.d.ts +8 -8
- package/ldap/authBackendUser.js +1 -0
- package/ldap/authBackendUser.js.map +1 -1
- package/ldap/index.js +13 -6
- package/ldap/index.js.map +1 -1
- package/mfaDuo.d.ts +14 -14
- package/mfaDuo.js +1 -0
- package/mfaDuo.js.map +1 -1
- package/mount.d.ts +19 -19
- package/mount.js +1 -0
- package/mount.js.map +1 -1
- package/namespace.d.ts +3 -3
- package/namespace.js +1 -0
- package/namespace.js.map +1 -1
- package/nomadSecretBackend.d.ts +26 -26
- package/nomadSecretBackend.js +1 -0
- package/nomadSecretBackend.js.map +1 -1
- package/nomadSecretRole.d.ts +10 -10
- package/nomadSecretRole.js +1 -0
- package/nomadSecretRole.js.map +1 -1
- package/okta/authBackend.d.ts +21 -21
- package/okta/authBackend.js +1 -0
- package/okta/authBackend.js.map +1 -1
- package/okta/authBackendGroup.d.ts +6 -6
- package/okta/authBackendGroup.js +1 -0
- package/okta/authBackendGroup.js.map +1 -1
- package/okta/authBackendUser.d.ts +16 -8
- package/okta/authBackendUser.js +9 -0
- package/okta/authBackendUser.js.map +1 -1
- package/okta/index.js +13 -6
- package/okta/index.js.map +1 -1
- package/package.json +4 -3
- package/package.json.bak +3 -2
- package/package.json.dev +4 -3
- package/passwordPolicy.d.ts +4 -4
- package/passwordPolicy.js +1 -0
- package/passwordPolicy.js.map +1 -1
- package/pkisecret/index.js +21 -14
- package/pkisecret/index.js.map +1 -1
- package/pkisecret/secretBackend.d.ts +8 -8
- package/pkisecret/secretBackend.js +1 -0
- package/pkisecret/secretBackend.js.map +1 -1
- package/pkisecret/secretBackendCert.d.ts +33 -33
- package/pkisecret/secretBackendCert.js +1 -0
- package/pkisecret/secretBackendCert.js.map +1 -1
- package/pkisecret/secretBackendConfigCa.d.ts +4 -4
- package/pkisecret/secretBackendConfigCa.js +1 -0
- package/pkisecret/secretBackendConfigCa.js.map +1 -1
- package/pkisecret/secretBackendConfigUrls.d.ts +10 -10
- package/pkisecret/secretBackendConfigUrls.js +3 -2
- package/pkisecret/secretBackendConfigUrls.js.map +1 -1
- package/pkisecret/secretBackendCrlConfig.d.ts +7 -7
- package/pkisecret/secretBackendCrlConfig.js +2 -1
- package/pkisecret/secretBackendCrlConfig.js.map +1 -1
- package/pkisecret/secretBackendIntermediateCertRequest.d.ts +41 -41
- package/pkisecret/secretBackendIntermediateCertRequest.js +1 -0
- package/pkisecret/secretBackendIntermediateCertRequest.js.map +1 -1
- package/pkisecret/secretBackendIntermediateSetSigned.d.ts +4 -4
- package/pkisecret/secretBackendIntermediateSetSigned.js +1 -0
- package/pkisecret/secretBackendIntermediateSetSigned.js.map +1 -1
- package/pkisecret/secretBackendRole.d.ts +78 -78
- package/pkisecret/secretBackendRole.js +3 -2
- package/pkisecret/secretBackendRole.js.map +1 -1
- package/pkisecret/secretBackendRootCert.d.ts +47 -47
- package/pkisecret/secretBackendRootCert.js +1 -0
- package/pkisecret/secretBackendRootCert.js.map +1 -1
- package/pkisecret/secretBackendRootSignIntermediate.d.ts +45 -45
- package/pkisecret/secretBackendRootSignIntermediate.js +2 -1
- package/pkisecret/secretBackendRootSignIntermediate.js.map +1 -1
- package/pkisecret/secretBackendSign.d.ts +31 -31
- package/pkisecret/secretBackendSign.js +1 -0
- package/pkisecret/secretBackendSign.js.map +1 -1
- package/policy.d.ts +4 -4
- package/policy.js +1 -0
- package/policy.js.map +1 -1
- package/provider.d.ts +41 -13
- package/provider.js +4 -3
- package/provider.js.map +1 -1
- package/quotaLeaseCount.d.ts +6 -6
- package/quotaLeaseCount.js +1 -0
- package/quotaLeaseCount.js.map +1 -1
- package/quotaRateLimit.d.ts +6 -6
- package/quotaRateLimit.js +1 -0
- package/quotaRateLimit.js.map +1 -1
- package/rabbitmq/index.js +12 -5
- package/rabbitmq/index.js.map +1 -1
- package/rabbitmq/secretBackend.d.ts +16 -16
- package/rabbitmq/secretBackend.js +1 -0
- package/rabbitmq/secretBackend.js.map +1 -1
- package/rabbitmq/secretBackendRole.d.ts +8 -8
- package/rabbitmq/secretBackendRole.js +1 -0
- package/rabbitmq/secretBackendRole.js.map +1 -1
- package/raftSnapshotAgentConfig.d.ts +54 -54
- package/raftSnapshotAgentConfig.js +1 -0
- package/raftSnapshotAgentConfig.js.map +1 -1
- package/rgpPolicy.d.ts +6 -6
- package/rgpPolicy.js +1 -0
- package/rgpPolicy.js.map +1 -1
- package/ssh/index.js +12 -5
- package/ssh/index.js.map +1 -1
- package/ssh/secretBackendCa.d.ts +8 -8
- package/ssh/secretBackendCa.js +1 -0
- package/ssh/secretBackendCa.js.map +1 -1
- package/ssh/secretBackendRole.d.ts +44 -44
- package/ssh/secretBackendRole.js +1 -0
- package/ssh/secretBackendRole.js.map +1 -1
- package/token.d.ts +34 -34
- package/token.js +1 -0
- package/token.js.map +1 -1
- package/tokenauth/authBackendRole.d.ts +39 -39
- package/tokenauth/authBackendRole.js +1 -0
- package/tokenauth/authBackendRole.js.map +1 -1
- package/tokenauth/index.js +11 -4
- package/tokenauth/index.js.map +1 -1
- package/transform/alphabet.d.ts +6 -6
- package/transform/alphabet.js +1 -0
- package/transform/alphabet.js.map +1 -1
- package/transform/getDecode.d.ts +50 -8
- package/transform/getDecode.js +5 -0
- package/transform/getDecode.js.map +1 -1
- package/transform/getEncode.d.ts +50 -8
- package/transform/getEncode.js +5 -0
- package/transform/getEncode.js.map +1 -1
- package/transform/index.js +16 -9
- package/transform/index.js.map +1 -1
- package/transform/role.d.ts +6 -6
- package/transform/role.js +1 -0
- package/transform/role.js.map +1 -1
- package/transform/template.d.ts +10 -10
- package/transform/template.js +1 -0
- package/transform/template.js.map +1 -1
- package/transform/transformation.d.ts +16 -16
- package/transform/transformation.js +1 -0
- package/transform/transformation.js.map +1 -1
- package/transit/getDecrypt.d.ts +27 -5
- package/transit/getDecrypt.js +6 -1
- package/transit/getDecrypt.js.map +1 -1
- package/transit/getEncrypt.d.ts +31 -5
- package/transit/getEncrypt.js +5 -0
- package/transit/getEncrypt.js.map +1 -1
- package/transit/index.js +14 -7
- package/transit/index.js.map +1 -1
- package/transit/secretBackendKey.d.ts +27 -27
- package/transit/secretBackendKey.js +1 -0
- package/transit/secretBackendKey.js.map +1 -1
- package/transit/secretCacheConfig.d.ts +4 -4
- package/transit/secretCacheConfig.js +1 -0
- package/transit/secretCacheConfig.js.map +1 -1
- package/types/index.js +1 -0
- package/types/index.js.map +1 -1
- package/types/input.d.ts +54 -0
- package/types/output.d.ts +0 -16
- package/utilities.js +1 -0
- package/utilities.js.map +1 -1
package/README.md
CHANGED
|
@@ -8,12 +8,12 @@ export interface GetAccessCredentialsArgs {
|
|
|
8
8
|
* The path to the AD secret backend to
|
|
9
9
|
* read credentials from, with no leading or trailing `/`s.
|
|
10
10
|
*/
|
|
11
|
-
|
|
11
|
+
backend: string;
|
|
12
12
|
/**
|
|
13
13
|
* The name of the AD secret backend role to read
|
|
14
14
|
* credentials from, with no leading or trailing `/`s.
|
|
15
15
|
*/
|
|
16
|
-
|
|
16
|
+
role: string;
|
|
17
17
|
}
|
|
18
18
|
/**
|
|
19
19
|
* A collection of values returned by getAccessCredentials.
|
|
@@ -38,3 +38,19 @@ export interface GetAccessCredentialsResult {
|
|
|
38
38
|
*/
|
|
39
39
|
readonly username: string;
|
|
40
40
|
}
|
|
41
|
+
export declare function getAccessCredentialsOutput(args: GetAccessCredentialsOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output<GetAccessCredentialsResult>;
|
|
42
|
+
/**
|
|
43
|
+
* A collection of arguments for invoking getAccessCredentials.
|
|
44
|
+
*/
|
|
45
|
+
export interface GetAccessCredentialsOutputArgs {
|
|
46
|
+
/**
|
|
47
|
+
* The path to the AD secret backend to
|
|
48
|
+
* read credentials from, with no leading or trailing `/`s.
|
|
49
|
+
*/
|
|
50
|
+
backend: pulumi.Input<string>;
|
|
51
|
+
/**
|
|
52
|
+
* The name of the AD secret backend role to read
|
|
53
|
+
* credentials from, with no leading or trailing `/`s.
|
|
54
|
+
*/
|
|
55
|
+
role: pulumi.Input<string>;
|
|
56
|
+
}
|
|
@@ -2,6 +2,7 @@
|
|
|
2
2
|
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
3
|
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
4
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.getAccessCredentialsOutput = exports.getAccessCredentials = void 0;
|
|
5
6
|
const pulumi = require("@pulumi/pulumi");
|
|
6
7
|
const utilities = require("../utilities");
|
|
7
8
|
function getAccessCredentials(args, opts) {
|
|
@@ -17,4 +18,8 @@ function getAccessCredentials(args, opts) {
|
|
|
17
18
|
}, opts);
|
|
18
19
|
}
|
|
19
20
|
exports.getAccessCredentials = getAccessCredentials;
|
|
21
|
+
function getAccessCredentialsOutput(args, opts) {
|
|
22
|
+
return pulumi.output(args).apply(a => getAccessCredentials(a, opts));
|
|
23
|
+
}
|
|
24
|
+
exports.getAccessCredentialsOutput = getAccessCredentialsOutput;
|
|
20
25
|
//# sourceMappingURL=getAccessCredentials.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getAccessCredentials.js","sourceRoot":"","sources":["../../ad/getAccessCredentials.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF
|
|
1
|
+
{"version":3,"file":"getAccessCredentials.js","sourceRoot":"","sources":["../../ad/getAccessCredentials.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,SAAgB,oBAAoB,CAAC,IAA8B,EAAE,IAA2B;IAC5F,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;QACf,IAAI,CAAC,OAAO,GAAG,SAAS,CAAC,UAAU,EAAE,CAAC;KACzC;IACD,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,oDAAoD,EAAE;QAC/E,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAZD,oDAYC;AA0CD,SAAgB,0BAA0B,CAAC,IAAoC,EAAE,IAA2B;IACxG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,oBAAoB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACxE,CAAC;AAFD,gEAEC"}
|
package/ad/index.js
CHANGED
|
@@ -1,17 +1,24 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
3
|
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
-
function
|
|
5
|
-
|
|
6
|
-
}
|
|
4
|
+
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
5
|
+
if (k2 === undefined) k2 = k;
|
|
6
|
+
Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } });
|
|
7
|
+
}) : (function(o, m, k, k2) {
|
|
8
|
+
if (k2 === undefined) k2 = k;
|
|
9
|
+
o[k2] = m[k];
|
|
10
|
+
}));
|
|
11
|
+
var __exportStar = (this && this.__exportStar) || function(m, exports) {
|
|
12
|
+
for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
|
|
13
|
+
};
|
|
7
14
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
8
15
|
const pulumi = require("@pulumi/pulumi");
|
|
9
16
|
const utilities = require("../utilities");
|
|
10
17
|
// Export members:
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
|
|
14
|
-
|
|
18
|
+
__exportStar(require("./getAccessCredentials"), exports);
|
|
19
|
+
__exportStar(require("./secretBackend"), exports);
|
|
20
|
+
__exportStar(require("./secretLibrary"), exports);
|
|
21
|
+
__exportStar(require("./secretRole"), exports);
|
|
15
22
|
// Import resources to register:
|
|
16
23
|
const secretBackend_1 = require("./secretBackend");
|
|
17
24
|
const secretLibrary_1 = require("./secretLibrary");
|
package/ad/index.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../ad/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../ad/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;;;;;;;;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,kBAAkB;AAClB,yDAAuC;AACvC,kDAAgC;AAChC,kDAAgC;AAChC,+CAA6B;AAE7B,gCAAgC;AAChC,mDAAgD;AAChD,mDAAgD;AAChD,6CAA0C;AAE1C,MAAM,OAAO,GAAG;IACZ,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE;IAC/B,SAAS,EAAE,CAAC,IAAY,EAAE,IAAY,EAAE,GAAW,EAAmB,EAAE;QACpE,QAAQ,IAAI,EAAE;YACV,KAAK,sCAAsC;gBACvC,OAAO,IAAI,6BAAa,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC3D,KAAK,sCAAsC;gBACvC,OAAO,IAAI,6BAAa,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC3D,KAAK,gCAAgC;gBACjC,OAAO,IAAI,uBAAU,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACxD;gBACI,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,EAAE,CAAC,CAAC;SACxD;IACL,CAAC;CACJ,CAAC;AACF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,kBAAkB,EAAE,OAAO,CAAC,CAAA;AAC3E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,kBAAkB,EAAE,OAAO,CAAC,CAAA;AAC3E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,eAAe,EAAE,OAAO,CAAC,CAAA"}
|
package/ad/secretBackend.d.ts
CHANGED
|
@@ -203,142 +203,142 @@ export interface SecretBackendState {
|
|
|
203
203
|
* Use anonymous binds when performing LDAP group searches
|
|
204
204
|
* (if true the initial credentials will still be used for the initial connection test).
|
|
205
205
|
*/
|
|
206
|
-
|
|
206
|
+
anonymousGroupSearch?: pulumi.Input<boolean>;
|
|
207
207
|
/**
|
|
208
208
|
* The unique path this backend should be mounted at. Must
|
|
209
209
|
* not begin or end with a `/`. Defaults to `ad`.
|
|
210
210
|
*/
|
|
211
|
-
|
|
211
|
+
backend?: pulumi.Input<string>;
|
|
212
212
|
/**
|
|
213
213
|
* Distinguished name of object to bind when performing user and group search.
|
|
214
214
|
*/
|
|
215
|
-
|
|
215
|
+
binddn?: pulumi.Input<string>;
|
|
216
216
|
/**
|
|
217
217
|
* Password to use along with binddn when performing user search.
|
|
218
218
|
*/
|
|
219
|
-
|
|
219
|
+
bindpass?: pulumi.Input<string>;
|
|
220
220
|
/**
|
|
221
221
|
* If set, user and group names assigned to policies within the
|
|
222
222
|
* backend will be case sensitive. Otherwise, names will be normalized to lower case.
|
|
223
223
|
*/
|
|
224
|
-
|
|
224
|
+
caseSensitiveNames?: pulumi.Input<boolean>;
|
|
225
225
|
/**
|
|
226
226
|
* CA certificate to use when verifying LDAP server certificate, must be
|
|
227
227
|
* x509 PEM encoded.
|
|
228
228
|
*/
|
|
229
|
-
|
|
229
|
+
certificate?: pulumi.Input<string>;
|
|
230
230
|
/**
|
|
231
231
|
* Client certificate to provide to the LDAP server, must be x509 PEM encoded.
|
|
232
232
|
*/
|
|
233
|
-
|
|
233
|
+
clientTlsCert?: pulumi.Input<string>;
|
|
234
234
|
/**
|
|
235
235
|
* Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
|
|
236
236
|
*/
|
|
237
|
-
|
|
237
|
+
clientTlsKey?: pulumi.Input<string>;
|
|
238
238
|
/**
|
|
239
239
|
* Default lease duration for secrets in seconds.
|
|
240
240
|
*/
|
|
241
|
-
|
|
241
|
+
defaultLeaseTtlSeconds?: pulumi.Input<number>;
|
|
242
242
|
/**
|
|
243
243
|
* Denies an unauthenticated LDAP bind request if the user's password is empty;
|
|
244
244
|
* defaults to true.
|
|
245
245
|
*/
|
|
246
|
-
|
|
246
|
+
denyNullBind?: pulumi.Input<boolean>;
|
|
247
247
|
/**
|
|
248
248
|
* Human-friendly description of the mount for the Active Directory backend.
|
|
249
249
|
*/
|
|
250
|
-
|
|
250
|
+
description?: pulumi.Input<string>;
|
|
251
251
|
/**
|
|
252
252
|
* Use anonymous bind to discover the bind Distinguished Name of a user.
|
|
253
253
|
*/
|
|
254
|
-
|
|
254
|
+
discoverdn?: pulumi.Input<boolean>;
|
|
255
255
|
/**
|
|
256
256
|
* Text to insert the password into, ex. "customPrefix{{PASSWORD}}customSuffix". This
|
|
257
257
|
* setting is deprecated and should instead use `passwordPolicy`.
|
|
258
258
|
*
|
|
259
259
|
* @deprecated Formatter is deprecated and password_policy should be used with Vault >= 1.5.
|
|
260
260
|
*/
|
|
261
|
-
|
|
261
|
+
formatter?: pulumi.Input<string>;
|
|
262
262
|
/**
|
|
263
263
|
* LDAP attribute to follow on objects returned by <groupfilter> in order to enumerate
|
|
264
264
|
* user group membership. Examples: `cn` or `memberOf`, etc. Defaults to `cn`.
|
|
265
265
|
*/
|
|
266
|
-
|
|
266
|
+
groupattr?: pulumi.Input<string>;
|
|
267
267
|
/**
|
|
268
268
|
* LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org).
|
|
269
269
|
*/
|
|
270
|
-
|
|
270
|
+
groupdn?: pulumi.Input<string>;
|
|
271
271
|
/**
|
|
272
272
|
* Go template for querying group membership of user (optional) The template can access
|
|
273
273
|
* the following context variables: UserDN, Username. Defaults to `(|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}}))`
|
|
274
274
|
*/
|
|
275
|
-
|
|
275
|
+
groupfilter?: pulumi.Input<string>;
|
|
276
276
|
/**
|
|
277
277
|
* Skip LDAP server SSL Certificate verification. This is not recommended for production.
|
|
278
278
|
* Defaults to `false`.
|
|
279
279
|
*/
|
|
280
|
-
|
|
280
|
+
insecureTls?: pulumi.Input<boolean>;
|
|
281
281
|
/**
|
|
282
282
|
* The number of seconds after a Vault rotation where, if Active Directory
|
|
283
283
|
* shows a later rotation, it should be considered out-of-band
|
|
284
284
|
*/
|
|
285
|
-
|
|
285
|
+
lastRotationTolerance?: pulumi.Input<number>;
|
|
286
286
|
/**
|
|
287
287
|
* The desired length of passwords that Vault generates. This
|
|
288
288
|
* setting is deprecated and should instead use `passwordPolicy`.
|
|
289
289
|
*
|
|
290
290
|
* @deprecated Length is deprecated and password_policy should be used with Vault >= 1.5.
|
|
291
291
|
*/
|
|
292
|
-
|
|
292
|
+
length?: pulumi.Input<number>;
|
|
293
293
|
/**
|
|
294
294
|
* Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
|
295
295
|
* replication.Tolerance duration to use when checking the last rotation time.
|
|
296
296
|
*/
|
|
297
|
-
|
|
297
|
+
local?: pulumi.Input<boolean>;
|
|
298
298
|
/**
|
|
299
299
|
* Maximum possible lease duration for secrets in seconds.
|
|
300
300
|
*/
|
|
301
|
-
|
|
301
|
+
maxLeaseTtlSeconds?: pulumi.Input<number>;
|
|
302
302
|
/**
|
|
303
303
|
* In seconds, the maximum password time-to-live.
|
|
304
304
|
*/
|
|
305
|
-
|
|
305
|
+
maxTtl?: pulumi.Input<number>;
|
|
306
306
|
/**
|
|
307
307
|
* Name of the password policy to use to generate passwords.
|
|
308
308
|
*/
|
|
309
|
-
|
|
309
|
+
passwordPolicy?: pulumi.Input<string>;
|
|
310
310
|
/**
|
|
311
311
|
* Timeout, in seconds, for the connection when making requests against the server
|
|
312
312
|
* before returning back an error.
|
|
313
313
|
*/
|
|
314
|
-
|
|
314
|
+
requestTimeout?: pulumi.Input<number>;
|
|
315
315
|
/**
|
|
316
316
|
* Issue a StartTLS command after establishing unencrypted connection.
|
|
317
317
|
*/
|
|
318
|
-
|
|
318
|
+
starttls?: pulumi.Input<boolean>;
|
|
319
319
|
/**
|
|
320
320
|
* Maximum TLS version to use. Accepted values are `tls10`, `tls11`,
|
|
321
321
|
* `tls12` or `tls13`. Defaults to `tls12`.
|
|
322
322
|
*/
|
|
323
|
-
|
|
323
|
+
tlsMaxVersion?: pulumi.Input<string>;
|
|
324
324
|
/**
|
|
325
325
|
* Minimum TLS version to use. Accepted values are `tls10`, `tls11`,
|
|
326
326
|
* `tls12` or `tls13`. Defaults to `tls12`.
|
|
327
327
|
*/
|
|
328
|
-
|
|
328
|
+
tlsMinVersion?: pulumi.Input<string>;
|
|
329
329
|
/**
|
|
330
330
|
* In seconds, the default password time-to-live.
|
|
331
331
|
*/
|
|
332
|
-
|
|
332
|
+
ttl?: pulumi.Input<number>;
|
|
333
333
|
/**
|
|
334
334
|
* Enables userPrincipalDomain login with [username]@UPNDomain.
|
|
335
335
|
*/
|
|
336
|
-
|
|
336
|
+
upndomain?: pulumi.Input<string>;
|
|
337
337
|
/**
|
|
338
338
|
* LDAP URL to connect to. Multiple URLs can be specified by concatenating
|
|
339
339
|
* them with commas; they will be tried in-order. Defaults to `ldap://127.0.0.1`.
|
|
340
340
|
*/
|
|
341
|
-
|
|
341
|
+
url?: pulumi.Input<string>;
|
|
342
342
|
/**
|
|
343
343
|
* In Vault 1.1.1 a fix for handling group CN values of
|
|
344
344
|
* different cases unfortunately introduced a regression that could cause previously defined groups
|
|
@@ -347,20 +347,20 @@ export interface SecretBackendState {
|
|
|
347
347
|
* compatibility. It is enabled by default if the config is upgraded but disabled by default on
|
|
348
348
|
* new configurations.
|
|
349
349
|
*/
|
|
350
|
-
|
|
350
|
+
usePre111GroupCnBehavior?: pulumi.Input<boolean>;
|
|
351
351
|
/**
|
|
352
352
|
* If true, use the Active Directory tokenGroups constructed attribute of the
|
|
353
353
|
* user to find the group memberships. This will find all security groups including nested ones.
|
|
354
354
|
*/
|
|
355
|
-
|
|
355
|
+
useTokenGroups?: pulumi.Input<boolean>;
|
|
356
356
|
/**
|
|
357
357
|
* Attribute used when searching users. Defaults to `cn`.
|
|
358
358
|
*/
|
|
359
|
-
|
|
359
|
+
userattr?: pulumi.Input<string>;
|
|
360
360
|
/**
|
|
361
361
|
* LDAP domain to use for users (eg: ou=People,dc=example,dc=org)`.
|
|
362
362
|
*/
|
|
363
|
-
|
|
363
|
+
userdn?: pulumi.Input<string>;
|
|
364
364
|
}
|
|
365
365
|
/**
|
|
366
366
|
* The set of arguments for constructing a SecretBackend resource.
|
|
@@ -370,142 +370,142 @@ export interface SecretBackendArgs {
|
|
|
370
370
|
* Use anonymous binds when performing LDAP group searches
|
|
371
371
|
* (if true the initial credentials will still be used for the initial connection test).
|
|
372
372
|
*/
|
|
373
|
-
|
|
373
|
+
anonymousGroupSearch?: pulumi.Input<boolean>;
|
|
374
374
|
/**
|
|
375
375
|
* The unique path this backend should be mounted at. Must
|
|
376
376
|
* not begin or end with a `/`. Defaults to `ad`.
|
|
377
377
|
*/
|
|
378
|
-
|
|
378
|
+
backend?: pulumi.Input<string>;
|
|
379
379
|
/**
|
|
380
380
|
* Distinguished name of object to bind when performing user and group search.
|
|
381
381
|
*/
|
|
382
|
-
|
|
382
|
+
binddn: pulumi.Input<string>;
|
|
383
383
|
/**
|
|
384
384
|
* Password to use along with binddn when performing user search.
|
|
385
385
|
*/
|
|
386
|
-
|
|
386
|
+
bindpass: pulumi.Input<string>;
|
|
387
387
|
/**
|
|
388
388
|
* If set, user and group names assigned to policies within the
|
|
389
389
|
* backend will be case sensitive. Otherwise, names will be normalized to lower case.
|
|
390
390
|
*/
|
|
391
|
-
|
|
391
|
+
caseSensitiveNames?: pulumi.Input<boolean>;
|
|
392
392
|
/**
|
|
393
393
|
* CA certificate to use when verifying LDAP server certificate, must be
|
|
394
394
|
* x509 PEM encoded.
|
|
395
395
|
*/
|
|
396
|
-
|
|
396
|
+
certificate?: pulumi.Input<string>;
|
|
397
397
|
/**
|
|
398
398
|
* Client certificate to provide to the LDAP server, must be x509 PEM encoded.
|
|
399
399
|
*/
|
|
400
|
-
|
|
400
|
+
clientTlsCert?: pulumi.Input<string>;
|
|
401
401
|
/**
|
|
402
402
|
* Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
|
|
403
403
|
*/
|
|
404
|
-
|
|
404
|
+
clientTlsKey?: pulumi.Input<string>;
|
|
405
405
|
/**
|
|
406
406
|
* Default lease duration for secrets in seconds.
|
|
407
407
|
*/
|
|
408
|
-
|
|
408
|
+
defaultLeaseTtlSeconds?: pulumi.Input<number>;
|
|
409
409
|
/**
|
|
410
410
|
* Denies an unauthenticated LDAP bind request if the user's password is empty;
|
|
411
411
|
* defaults to true.
|
|
412
412
|
*/
|
|
413
|
-
|
|
413
|
+
denyNullBind?: pulumi.Input<boolean>;
|
|
414
414
|
/**
|
|
415
415
|
* Human-friendly description of the mount for the Active Directory backend.
|
|
416
416
|
*/
|
|
417
|
-
|
|
417
|
+
description?: pulumi.Input<string>;
|
|
418
418
|
/**
|
|
419
419
|
* Use anonymous bind to discover the bind Distinguished Name of a user.
|
|
420
420
|
*/
|
|
421
|
-
|
|
421
|
+
discoverdn?: pulumi.Input<boolean>;
|
|
422
422
|
/**
|
|
423
423
|
* Text to insert the password into, ex. "customPrefix{{PASSWORD}}customSuffix". This
|
|
424
424
|
* setting is deprecated and should instead use `passwordPolicy`.
|
|
425
425
|
*
|
|
426
426
|
* @deprecated Formatter is deprecated and password_policy should be used with Vault >= 1.5.
|
|
427
427
|
*/
|
|
428
|
-
|
|
428
|
+
formatter?: pulumi.Input<string>;
|
|
429
429
|
/**
|
|
430
430
|
* LDAP attribute to follow on objects returned by <groupfilter> in order to enumerate
|
|
431
431
|
* user group membership. Examples: `cn` or `memberOf`, etc. Defaults to `cn`.
|
|
432
432
|
*/
|
|
433
|
-
|
|
433
|
+
groupattr?: pulumi.Input<string>;
|
|
434
434
|
/**
|
|
435
435
|
* LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org).
|
|
436
436
|
*/
|
|
437
|
-
|
|
437
|
+
groupdn?: pulumi.Input<string>;
|
|
438
438
|
/**
|
|
439
439
|
* Go template for querying group membership of user (optional) The template can access
|
|
440
440
|
* the following context variables: UserDN, Username. Defaults to `(|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}}))`
|
|
441
441
|
*/
|
|
442
|
-
|
|
442
|
+
groupfilter?: pulumi.Input<string>;
|
|
443
443
|
/**
|
|
444
444
|
* Skip LDAP server SSL Certificate verification. This is not recommended for production.
|
|
445
445
|
* Defaults to `false`.
|
|
446
446
|
*/
|
|
447
|
-
|
|
447
|
+
insecureTls?: pulumi.Input<boolean>;
|
|
448
448
|
/**
|
|
449
449
|
* The number of seconds after a Vault rotation where, if Active Directory
|
|
450
450
|
* shows a later rotation, it should be considered out-of-band
|
|
451
451
|
*/
|
|
452
|
-
|
|
452
|
+
lastRotationTolerance?: pulumi.Input<number>;
|
|
453
453
|
/**
|
|
454
454
|
* The desired length of passwords that Vault generates. This
|
|
455
455
|
* setting is deprecated and should instead use `passwordPolicy`.
|
|
456
456
|
*
|
|
457
457
|
* @deprecated Length is deprecated and password_policy should be used with Vault >= 1.5.
|
|
458
458
|
*/
|
|
459
|
-
|
|
459
|
+
length?: pulumi.Input<number>;
|
|
460
460
|
/**
|
|
461
461
|
* Mark the secrets engine as local-only. Local engines are not replicated or removed by
|
|
462
462
|
* replication.Tolerance duration to use when checking the last rotation time.
|
|
463
463
|
*/
|
|
464
|
-
|
|
464
|
+
local?: pulumi.Input<boolean>;
|
|
465
465
|
/**
|
|
466
466
|
* Maximum possible lease duration for secrets in seconds.
|
|
467
467
|
*/
|
|
468
|
-
|
|
468
|
+
maxLeaseTtlSeconds?: pulumi.Input<number>;
|
|
469
469
|
/**
|
|
470
470
|
* In seconds, the maximum password time-to-live.
|
|
471
471
|
*/
|
|
472
|
-
|
|
472
|
+
maxTtl?: pulumi.Input<number>;
|
|
473
473
|
/**
|
|
474
474
|
* Name of the password policy to use to generate passwords.
|
|
475
475
|
*/
|
|
476
|
-
|
|
476
|
+
passwordPolicy?: pulumi.Input<string>;
|
|
477
477
|
/**
|
|
478
478
|
* Timeout, in seconds, for the connection when making requests against the server
|
|
479
479
|
* before returning back an error.
|
|
480
480
|
*/
|
|
481
|
-
|
|
481
|
+
requestTimeout?: pulumi.Input<number>;
|
|
482
482
|
/**
|
|
483
483
|
* Issue a StartTLS command after establishing unencrypted connection.
|
|
484
484
|
*/
|
|
485
|
-
|
|
485
|
+
starttls?: pulumi.Input<boolean>;
|
|
486
486
|
/**
|
|
487
487
|
* Maximum TLS version to use. Accepted values are `tls10`, `tls11`,
|
|
488
488
|
* `tls12` or `tls13`. Defaults to `tls12`.
|
|
489
489
|
*/
|
|
490
|
-
|
|
490
|
+
tlsMaxVersion?: pulumi.Input<string>;
|
|
491
491
|
/**
|
|
492
492
|
* Minimum TLS version to use. Accepted values are `tls10`, `tls11`,
|
|
493
493
|
* `tls12` or `tls13`. Defaults to `tls12`.
|
|
494
494
|
*/
|
|
495
|
-
|
|
495
|
+
tlsMinVersion?: pulumi.Input<string>;
|
|
496
496
|
/**
|
|
497
497
|
* In seconds, the default password time-to-live.
|
|
498
498
|
*/
|
|
499
|
-
|
|
499
|
+
ttl?: pulumi.Input<number>;
|
|
500
500
|
/**
|
|
501
501
|
* Enables userPrincipalDomain login with [username]@UPNDomain.
|
|
502
502
|
*/
|
|
503
|
-
|
|
503
|
+
upndomain?: pulumi.Input<string>;
|
|
504
504
|
/**
|
|
505
505
|
* LDAP URL to connect to. Multiple URLs can be specified by concatenating
|
|
506
506
|
* them with commas; they will be tried in-order. Defaults to `ldap://127.0.0.1`.
|
|
507
507
|
*/
|
|
508
|
-
|
|
508
|
+
url?: pulumi.Input<string>;
|
|
509
509
|
/**
|
|
510
510
|
* In Vault 1.1.1 a fix for handling group CN values of
|
|
511
511
|
* different cases unfortunately introduced a regression that could cause previously defined groups
|
|
@@ -514,18 +514,18 @@ export interface SecretBackendArgs {
|
|
|
514
514
|
* compatibility. It is enabled by default if the config is upgraded but disabled by default on
|
|
515
515
|
* new configurations.
|
|
516
516
|
*/
|
|
517
|
-
|
|
517
|
+
usePre111GroupCnBehavior?: pulumi.Input<boolean>;
|
|
518
518
|
/**
|
|
519
519
|
* If true, use the Active Directory tokenGroups constructed attribute of the
|
|
520
520
|
* user to find the group memberships. This will find all security groups including nested ones.
|
|
521
521
|
*/
|
|
522
|
-
|
|
522
|
+
useTokenGroups?: pulumi.Input<boolean>;
|
|
523
523
|
/**
|
|
524
524
|
* Attribute used when searching users. Defaults to `cn`.
|
|
525
525
|
*/
|
|
526
|
-
|
|
526
|
+
userattr?: pulumi.Input<string>;
|
|
527
527
|
/**
|
|
528
528
|
* LDAP domain to use for users (eg: ou=People,dc=example,dc=org)`.
|
|
529
529
|
*/
|
|
530
|
-
|
|
530
|
+
userdn?: pulumi.Input<string>;
|
|
531
531
|
}
|
package/ad/secretBackend.js
CHANGED
|
@@ -2,6 +2,7 @@
|
|
|
2
2
|
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
3
|
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
4
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.SecretBackend = void 0;
|
|
5
6
|
const pulumi = require("@pulumi/pulumi");
|
|
6
7
|
const utilities = require("../utilities");
|
|
7
8
|
/**
|
package/ad/secretBackend.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretBackend.js","sourceRoot":"","sources":["../../ad/secretBackend.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF
|
|
1
|
+
{"version":3,"file":"secretBackend.js","sourceRoot":"","sources":["../../ad/secretBackend.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;GAQG;AACH,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;IAuMpD,YAAY,IAAY,EAAE,WAAoD,EAAE,IAAmC;QAC/G,IAAI,MAAM,GAAkB,EAAE,CAAC;QAC/B,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA6C,CAAC;YAC5D,MAAM,CAAC,sBAAsB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,MAAM,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,MAAM,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,MAAM,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,MAAM,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,uBAAuB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,qBAAqB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,MAAM,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,MAAM,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,MAAM,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,MAAM,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9C,MAAM,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9C,MAAM,CAAC,0BAA0B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,MAAM,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,MAAM,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SACvD;aAAM;YACH,MAAM,IAAI,GAAG,WAA4C,CAAC;YAC1D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,MAAM,CAAC,sBAAsB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,MAAM,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,MAAM,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,MAAM,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,uBAAuB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,qBAAqB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,MAAM,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,MAAM,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,MAAM,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,MAAM,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5C,MAAM,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5C,MAAM,CAAC,0BAA0B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,MAAM,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,MAAM,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SACrD;QACD,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;YACf,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE,EAAC,CAAC,CAAC;SACxE;QACD,KAAK,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,CAAC,CAAC;IAC1D,CAAC;IA5RD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA0B,EAAE,IAAmC;QACxH,OAAO,IAAI,aAAa,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACpE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,aAAa,CAAC,YAAY,CAAC;IAC9D,CAAC;;AA1BL,sCA8RC;AAhRG,gBAAgB;AACO,0BAAY,GAAG,sCAAsC,CAAC"}
|
package/ad/secretLibrary.d.ts
CHANGED
|
@@ -56,28 +56,28 @@ export interface SecretLibraryState {
|
|
|
56
56
|
/**
|
|
57
57
|
* The mount path for the AD backend.
|
|
58
58
|
*/
|
|
59
|
-
|
|
59
|
+
backend?: pulumi.Input<string>;
|
|
60
60
|
/**
|
|
61
61
|
* Disable enforcing that service accounts must be checked in by the entity or client token that checked them out.
|
|
62
62
|
*/
|
|
63
|
-
|
|
63
|
+
disableCheckInEnforcement?: pulumi.Input<boolean>;
|
|
64
64
|
/**
|
|
65
65
|
* The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in.
|
|
66
66
|
*/
|
|
67
|
-
|
|
67
|
+
maxTtl?: pulumi.Input<number>;
|
|
68
68
|
/**
|
|
69
69
|
* The name of the set of service accounts.
|
|
70
70
|
*/
|
|
71
|
-
|
|
71
|
+
name?: pulumi.Input<string>;
|
|
72
72
|
/**
|
|
73
73
|
* The names of all the service accounts that can be checked out from this set. These service accounts must already exist
|
|
74
74
|
* in Active Directory.
|
|
75
75
|
*/
|
|
76
|
-
|
|
76
|
+
serviceAccountNames?: pulumi.Input<pulumi.Input<string>[]>;
|
|
77
77
|
/**
|
|
78
78
|
* The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in.
|
|
79
79
|
*/
|
|
80
|
-
|
|
80
|
+
ttl?: pulumi.Input<number>;
|
|
81
81
|
}
|
|
82
82
|
/**
|
|
83
83
|
* The set of arguments for constructing a SecretLibrary resource.
|
|
@@ -86,26 +86,26 @@ export interface SecretLibraryArgs {
|
|
|
86
86
|
/**
|
|
87
87
|
* The mount path for the AD backend.
|
|
88
88
|
*/
|
|
89
|
-
|
|
89
|
+
backend: pulumi.Input<string>;
|
|
90
90
|
/**
|
|
91
91
|
* Disable enforcing that service accounts must be checked in by the entity or client token that checked them out.
|
|
92
92
|
*/
|
|
93
|
-
|
|
93
|
+
disableCheckInEnforcement?: pulumi.Input<boolean>;
|
|
94
94
|
/**
|
|
95
95
|
* The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in.
|
|
96
96
|
*/
|
|
97
|
-
|
|
97
|
+
maxTtl?: pulumi.Input<number>;
|
|
98
98
|
/**
|
|
99
99
|
* The name of the set of service accounts.
|
|
100
100
|
*/
|
|
101
|
-
|
|
101
|
+
name?: pulumi.Input<string>;
|
|
102
102
|
/**
|
|
103
103
|
* The names of all the service accounts that can be checked out from this set. These service accounts must already exist
|
|
104
104
|
* in Active Directory.
|
|
105
105
|
*/
|
|
106
|
-
|
|
106
|
+
serviceAccountNames: pulumi.Input<pulumi.Input<string>[]>;
|
|
107
107
|
/**
|
|
108
108
|
* The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in.
|
|
109
109
|
*/
|
|
110
|
-
|
|
110
|
+
ttl?: pulumi.Input<number>;
|
|
111
111
|
}
|
package/ad/secretLibrary.js
CHANGED
|
@@ -2,6 +2,7 @@
|
|
|
2
2
|
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
3
|
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
4
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.SecretLibrary = void 0;
|
|
5
6
|
const pulumi = require("@pulumi/pulumi");
|
|
6
7
|
const utilities = require("../utilities");
|
|
7
8
|
class SecretLibrary extends pulumi.CustomResource {
|
package/ad/secretLibrary.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretLibrary.js","sourceRoot":"","sources":["../../ad/secretLibrary.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF
|
|
1
|
+
{"version":3,"file":"secretLibrary.js","sourceRoot":"","sources":["../../ad/secretLibrary.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;IA8DpD,YAAY,IAAY,EAAE,WAAoD,EAAE,IAAmC;QAC/G,IAAI,MAAM,GAAkB,EAAE,CAAC;QAC/B,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA6C,CAAC;YAC5D,MAAM,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,2BAA2B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,yBAAyB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,MAAM,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACjD;aAAM;YACH,MAAM,IAAI,GAAG,WAA4C,CAAC;YAC1D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,mBAAmB,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAChE,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,CAAC;aACtE;YACD,MAAM,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,2BAA2B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,yBAAyB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9C,MAAM,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,MAAM,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/C;QACD,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;YACf,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE,EAAC,CAAC,CAAC;SACxE;QACD,KAAK,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,CAAC,CAAC;IAC1D,CAAC;IA3FD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA0B,EAAE,IAAmC;QACxH,OAAO,IAAI,aAAa,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACpE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,aAAa,CAAC,YAAY,CAAC;IAC9D,CAAC;;AA1BL,sCA6FC;AA/EG,gBAAgB;AACO,0BAAY,GAAG,sCAAsC,CAAC"}
|