@pulumi/vault 4.5.0 → 4.6.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (398) hide show
  1. package/README.md +1 -1
  2. package/ad/getAccessCredentials.d.ts +18 -2
  3. package/ad/getAccessCredentials.js +5 -0
  4. package/ad/getAccessCredentials.js.map +1 -1
  5. package/ad/index.js +14 -7
  6. package/ad/index.js.map +1 -1
  7. package/ad/secretBackend.d.ts +68 -68
  8. package/ad/secretBackend.js +1 -0
  9. package/ad/secretBackend.js.map +1 -1
  10. package/ad/secretLibrary.d.ts +12 -12
  11. package/ad/secretLibrary.js +1 -0
  12. package/ad/secretLibrary.js.map +1 -1
  13. package/ad/secretRole.d.ts +10 -10
  14. package/ad/secretRole.js +1 -0
  15. package/ad/secretRole.js.map +1 -1
  16. package/alicloud/authBackendRole.d.ts +24 -24
  17. package/alicloud/authBackendRole.js +1 -0
  18. package/alicloud/authBackendRole.js.map +1 -1
  19. package/alicloud/index.js +11 -4
  20. package/alicloud/index.js.map +1 -1
  21. package/approle/authBackendLogin.d.ts +16 -16
  22. package/approle/authBackendLogin.js +4 -3
  23. package/approle/authBackendLogin.js.map +1 -1
  24. package/approle/authBackendRole.d.ts +39 -39
  25. package/approle/authBackendRole.js +2 -1
  26. package/approle/authBackendRole.js.map +1 -1
  27. package/approle/authBackendRoleSecretID.d.ts +17 -17
  28. package/approle/authBackendRoleSecretID.js +3 -2
  29. package/approle/authBackendRoleSecretID.js.map +1 -1
  30. package/approle/getAuthBackendRoleId.d.ts +17 -2
  31. package/approle/getAuthBackendRoleId.js +5 -0
  32. package/approle/getAuthBackendRoleId.js.map +1 -1
  33. package/approle/index.js +14 -7
  34. package/approle/index.js.map +1 -1
  35. package/audit.d.ts +10 -10
  36. package/audit.js +1 -0
  37. package/audit.js.map +1 -1
  38. package/authBackend.d.ts +17 -17
  39. package/authBackend.js +1 -0
  40. package/authBackend.js.map +1 -1
  41. package/aws/authBackendCert.d.ts +8 -8
  42. package/aws/authBackendCert.js +1 -0
  43. package/aws/authBackendCert.js.map +1 -1
  44. package/aws/authBackendClient.d.ts +16 -16
  45. package/aws/authBackendClient.js +1 -0
  46. package/aws/authBackendClient.js.map +1 -1
  47. package/aws/authBackendIdentityWhitelist.d.ts +6 -6
  48. package/aws/authBackendIdentityWhitelist.js +1 -0
  49. package/aws/authBackendIdentityWhitelist.js.map +1 -1
  50. package/aws/authBackendLogin.d.ts +28 -28
  51. package/aws/authBackendLogin.js +1 -0
  52. package/aws/authBackendLogin.js.map +1 -1
  53. package/aws/authBackendRole.d.ts +62 -62
  54. package/aws/authBackendRole.js +1 -0
  55. package/aws/authBackendRole.js.map +1 -1
  56. package/aws/authBackendRoleTag.d.ts +16 -16
  57. package/aws/authBackendRoleTag.js +1 -0
  58. package/aws/authBackendRoleTag.js.map +1 -1
  59. package/aws/authBackendRoletagBlacklist.d.ts +6 -6
  60. package/aws/authBackendRoletagBlacklist.js +1 -0
  61. package/aws/authBackendRoletagBlacklist.js.map +1 -1
  62. package/aws/authBackendStsRole.d.ts +6 -6
  63. package/aws/authBackendStsRole.js +1 -0
  64. package/aws/authBackendStsRole.js.map +1 -1
  65. package/aws/getAccessCredentials.d.ts +42 -6
  66. package/aws/getAccessCredentials.js +5 -0
  67. package/aws/getAccessCredentials.js.map +1 -1
  68. package/aws/index.js +21 -14
  69. package/aws/index.js.map +1 -1
  70. package/aws/secretBackend.d.ts +18 -18
  71. package/aws/secretBackend.js +1 -0
  72. package/aws/secretBackend.js.map +1 -1
  73. package/aws/secretBackendRole.d.ts +18 -18
  74. package/aws/secretBackendRole.js +1 -0
  75. package/aws/secretBackendRole.js.map +1 -1
  76. package/azure/authBackendConfig.d.ts +12 -12
  77. package/azure/authBackendConfig.js +1 -0
  78. package/azure/authBackendConfig.js.map +1 -1
  79. package/azure/authBackendRole.d.ts +45 -45
  80. package/azure/authBackendRole.js +1 -0
  81. package/azure/authBackendRole.js.map +1 -1
  82. package/azure/backend.d.ts +14 -14
  83. package/azure/backend.js +1 -0
  84. package/azure/backend.js.map +1 -1
  85. package/azure/backendRole.d.ts +16 -16
  86. package/azure/backendRole.js +1 -0
  87. package/azure/backendRole.js.map +1 -1
  88. package/azure/getAccessCredentials.d.ts +47 -6
  89. package/azure/getAccessCredentials.js +5 -0
  90. package/azure/getAccessCredentials.js.map +1 -1
  91. package/azure/index.js +15 -8
  92. package/azure/index.js.map +1 -1
  93. package/certAuthBackendRole.d.ts +50 -50
  94. package/certAuthBackendRole.js +1 -0
  95. package/certAuthBackendRole.js.map +1 -1
  96. package/config/index.js +11 -4
  97. package/config/index.js.map +1 -1
  98. package/config/vars.d.ts +13 -13
  99. package/config/vars.js +82 -53
  100. package/config/vars.js.map +1 -1
  101. package/consul/index.js +12 -5
  102. package/consul/index.js.map +1 -1
  103. package/consul/secretBackend.d.ts +22 -22
  104. package/consul/secretBackend.js +1 -0
  105. package/consul/secretBackend.js.map +1 -1
  106. package/consul/secretBackendRole.d.ts +16 -16
  107. package/consul/secretBackendRole.js +1 -0
  108. package/consul/secretBackendRole.js.map +1 -1
  109. package/database/index.js +13 -6
  110. package/database/index.js.map +1 -1
  111. package/database/secretBackendConnection.d.ts +38 -38
  112. package/database/secretBackendConnection.js +1 -0
  113. package/database/secretBackendConnection.js.map +1 -1
  114. package/database/secretBackendRole.d.ts +18 -18
  115. package/database/secretBackendRole.js +1 -0
  116. package/database/secretBackendRole.js.map +1 -1
  117. package/database/secretBackendStaticRole.d.ts +12 -12
  118. package/database/secretBackendStaticRole.js +1 -0
  119. package/database/secretBackendStaticRole.js.map +1 -1
  120. package/egpPolicy.d.ts +8 -8
  121. package/egpPolicy.js +1 -0
  122. package/egpPolicy.js.map +1 -1
  123. package/gcp/authBackend.d.ts +16 -16
  124. package/gcp/authBackend.js +1 -0
  125. package/gcp/authBackend.js.map +1 -1
  126. package/gcp/authBackendRole.d.ts +50 -50
  127. package/gcp/authBackendRole.js +1 -0
  128. package/gcp/authBackendRole.js.map +1 -1
  129. package/gcp/getAuthBackendRole.d.ts +80 -12
  130. package/gcp/getAuthBackendRole.js +6 -1
  131. package/gcp/getAuthBackendRole.js.map +1 -1
  132. package/gcp/index.js +16 -9
  133. package/gcp/index.js.map +1 -1
  134. package/gcp/secretBackend.d.ts +12 -12
  135. package/gcp/secretBackend.js +1 -0
  136. package/gcp/secretBackend.js.map +1 -1
  137. package/gcp/secretRoleset.d.ts +13 -13
  138. package/gcp/secretRoleset.js +1 -0
  139. package/gcp/secretRoleset.js.map +1 -1
  140. package/gcp/secretStaticAccount.d.ts +39 -13
  141. package/gcp/secretStaticAccount.js +27 -0
  142. package/gcp/secretStaticAccount.js.map +1 -1
  143. package/generic/endpoint.d.ts +14 -14
  144. package/generic/endpoint.js +1 -0
  145. package/generic/endpoint.js.map +1 -1
  146. package/generic/getSecret.d.ts +22 -2
  147. package/generic/getSecret.js +5 -0
  148. package/generic/getSecret.js.map +1 -1
  149. package/generic/index.js +13 -6
  150. package/generic/index.js.map +1 -1
  151. package/generic/secret.d.ts +7 -7
  152. package/generic/secret.js +1 -0
  153. package/generic/secret.js.map +1 -1
  154. package/getAuthBackend.d.ts +13 -3
  155. package/getAuthBackend.js +6 -1
  156. package/getAuthBackend.js.map +1 -1
  157. package/getNomadAccessToken.d.ts +18 -2
  158. package/getNomadAccessToken.js +5 -0
  159. package/getNomadAccessToken.js.map +1 -1
  160. package/getPolicyDocument.d.ts +8 -1
  161. package/getPolicyDocument.js +5 -0
  162. package/getPolicyDocument.js.map +1 -1
  163. package/github/authBackend.d.ts +44 -35
  164. package/github/authBackend.js +3 -2
  165. package/github/authBackend.js.map +1 -1
  166. package/github/index.js +13 -6
  167. package/github/index.js.map +1 -1
  168. package/github/team.d.ts +24 -24
  169. package/github/team.js +1 -0
  170. package/github/team.js.map +1 -1
  171. package/github/user.d.ts +24 -24
  172. package/github/user.js +1 -0
  173. package/github/user.js.map +1 -1
  174. package/identity/entity.d.ts +10 -10
  175. package/identity/entity.js +1 -0
  176. package/identity/entity.js.map +1 -1
  177. package/identity/entityAlias.d.ts +6 -6
  178. package/identity/entityAlias.js +1 -0
  179. package/identity/entityAlias.js.map +1 -1
  180. package/identity/entityPolicies.d.ts +7 -7
  181. package/identity/entityPolicies.js +1 -0
  182. package/identity/entityPolicies.js.map +1 -1
  183. package/identity/getEntity.d.ts +33 -5
  184. package/identity/getEntity.js +5 -0
  185. package/identity/getEntity.js.map +1 -1
  186. package/identity/getGroup.d.ts +33 -5
  187. package/identity/getGroup.js +5 -0
  188. package/identity/getGroup.js.map +1 -1
  189. package/identity/group.d.ts +16 -16
  190. package/identity/group.js +1 -0
  191. package/identity/group.js.map +1 -1
  192. package/identity/groupAlias.d.ts +6 -6
  193. package/identity/groupAlias.js +1 -0
  194. package/identity/groupAlias.js.map +1 -1
  195. package/identity/groupMemberEntityIds.d.ts +7 -7
  196. package/identity/groupMemberEntityIds.js +1 -0
  197. package/identity/groupMemberEntityIds.js.map +1 -1
  198. package/identity/groupPolicies.d.ts +7 -7
  199. package/identity/groupPolicies.js +1 -0
  200. package/identity/groupPolicies.js.map +1 -1
  201. package/identity/index.js +23 -16
  202. package/identity/index.js.map +1 -1
  203. package/identity/oidc.d.ts +2 -2
  204. package/identity/oidc.js +1 -0
  205. package/identity/oidc.js.map +1 -1
  206. package/identity/oidcKey.d.ts +10 -10
  207. package/identity/oidcKey.js +1 -0
  208. package/identity/oidcKey.js.map +1 -1
  209. package/identity/oidcKeyAllowedClientID.d.ts +4 -4
  210. package/identity/oidcKeyAllowedClientID.js +1 -0
  211. package/identity/oidcKeyAllowedClientID.js.map +1 -1
  212. package/identity/oidcRole.d.ts +10 -10
  213. package/identity/oidcRole.js +1 -0
  214. package/identity/oidcRole.js.map +1 -1
  215. package/index.js +31 -23
  216. package/index.js.map +1 -1
  217. package/jwt/authBackend.d.ts +33 -33
  218. package/jwt/authBackend.js +1 -0
  219. package/jwt/authBackend.js.map +1 -1
  220. package/jwt/authBackendRole.d.ts +64 -64
  221. package/jwt/authBackendRole.js +1 -0
  222. package/jwt/authBackendRole.js.map +1 -1
  223. package/jwt/index.js +12 -5
  224. package/jwt/index.js.map +1 -1
  225. package/kubernetes/authBackendConfig.d.ts +16 -16
  226. package/kubernetes/authBackendConfig.js +1 -0
  227. package/kubernetes/authBackendConfig.js.map +1 -1
  228. package/kubernetes/authBackendRole.d.ts +40 -40
  229. package/kubernetes/authBackendRole.js +1 -0
  230. package/kubernetes/authBackendRole.js.map +1 -1
  231. package/kubernetes/getAuthBackendConfig.d.ts +36 -7
  232. package/kubernetes/getAuthBackendConfig.js +5 -0
  233. package/kubernetes/getAuthBackendConfig.js.map +1 -1
  234. package/kubernetes/getAuthBackendRole.d.ts +115 -18
  235. package/kubernetes/getAuthBackendRole.js +5 -0
  236. package/kubernetes/getAuthBackendRole.js.map +1 -1
  237. package/kubernetes/index.js +14 -7
  238. package/kubernetes/index.js.map +1 -1
  239. package/ldap/authBackend.d.ts +63 -63
  240. package/ldap/authBackend.js +1 -0
  241. package/ldap/authBackend.js.map +1 -1
  242. package/ldap/authBackendGroup.d.ts +6 -6
  243. package/ldap/authBackendGroup.js +1 -0
  244. package/ldap/authBackendGroup.js.map +1 -1
  245. package/ldap/authBackendUser.d.ts +8 -8
  246. package/ldap/authBackendUser.js +1 -0
  247. package/ldap/authBackendUser.js.map +1 -1
  248. package/ldap/index.js +13 -6
  249. package/ldap/index.js.map +1 -1
  250. package/mfaDuo.d.ts +14 -14
  251. package/mfaDuo.js +1 -0
  252. package/mfaDuo.js.map +1 -1
  253. package/mount.d.ts +19 -19
  254. package/mount.js +1 -0
  255. package/mount.js.map +1 -1
  256. package/namespace.d.ts +3 -3
  257. package/namespace.js +1 -0
  258. package/namespace.js.map +1 -1
  259. package/nomadSecretBackend.d.ts +26 -26
  260. package/nomadSecretBackend.js +1 -0
  261. package/nomadSecretBackend.js.map +1 -1
  262. package/nomadSecretRole.d.ts +10 -10
  263. package/nomadSecretRole.js +1 -0
  264. package/nomadSecretRole.js.map +1 -1
  265. package/okta/authBackend.d.ts +21 -21
  266. package/okta/authBackend.js +1 -0
  267. package/okta/authBackend.js.map +1 -1
  268. package/okta/authBackendGroup.d.ts +6 -6
  269. package/okta/authBackendGroup.js +1 -0
  270. package/okta/authBackendGroup.js.map +1 -1
  271. package/okta/authBackendUser.d.ts +16 -8
  272. package/okta/authBackendUser.js +9 -0
  273. package/okta/authBackendUser.js.map +1 -1
  274. package/okta/index.js +13 -6
  275. package/okta/index.js.map +1 -1
  276. package/package.json +4 -3
  277. package/package.json.bak +3 -2
  278. package/package.json.dev +4 -3
  279. package/passwordPolicy.d.ts +4 -4
  280. package/passwordPolicy.js +1 -0
  281. package/passwordPolicy.js.map +1 -1
  282. package/pkisecret/index.js +21 -14
  283. package/pkisecret/index.js.map +1 -1
  284. package/pkisecret/secretBackend.d.ts +8 -8
  285. package/pkisecret/secretBackend.js +1 -0
  286. package/pkisecret/secretBackend.js.map +1 -1
  287. package/pkisecret/secretBackendCert.d.ts +33 -33
  288. package/pkisecret/secretBackendCert.js +1 -0
  289. package/pkisecret/secretBackendCert.js.map +1 -1
  290. package/pkisecret/secretBackendConfigCa.d.ts +4 -4
  291. package/pkisecret/secretBackendConfigCa.js +1 -0
  292. package/pkisecret/secretBackendConfigCa.js.map +1 -1
  293. package/pkisecret/secretBackendConfigUrls.d.ts +10 -10
  294. package/pkisecret/secretBackendConfigUrls.js +3 -2
  295. package/pkisecret/secretBackendConfigUrls.js.map +1 -1
  296. package/pkisecret/secretBackendCrlConfig.d.ts +7 -7
  297. package/pkisecret/secretBackendCrlConfig.js +2 -1
  298. package/pkisecret/secretBackendCrlConfig.js.map +1 -1
  299. package/pkisecret/secretBackendIntermediateCertRequest.d.ts +41 -41
  300. package/pkisecret/secretBackendIntermediateCertRequest.js +1 -0
  301. package/pkisecret/secretBackendIntermediateCertRequest.js.map +1 -1
  302. package/pkisecret/secretBackendIntermediateSetSigned.d.ts +4 -4
  303. package/pkisecret/secretBackendIntermediateSetSigned.js +1 -0
  304. package/pkisecret/secretBackendIntermediateSetSigned.js.map +1 -1
  305. package/pkisecret/secretBackendRole.d.ts +78 -78
  306. package/pkisecret/secretBackendRole.js +3 -2
  307. package/pkisecret/secretBackendRole.js.map +1 -1
  308. package/pkisecret/secretBackendRootCert.d.ts +47 -47
  309. package/pkisecret/secretBackendRootCert.js +1 -0
  310. package/pkisecret/secretBackendRootCert.js.map +1 -1
  311. package/pkisecret/secretBackendRootSignIntermediate.d.ts +45 -45
  312. package/pkisecret/secretBackendRootSignIntermediate.js +2 -1
  313. package/pkisecret/secretBackendRootSignIntermediate.js.map +1 -1
  314. package/pkisecret/secretBackendSign.d.ts +31 -31
  315. package/pkisecret/secretBackendSign.js +1 -0
  316. package/pkisecret/secretBackendSign.js.map +1 -1
  317. package/policy.d.ts +4 -4
  318. package/policy.js +1 -0
  319. package/policy.js.map +1 -1
  320. package/provider.d.ts +41 -13
  321. package/provider.js +4 -3
  322. package/provider.js.map +1 -1
  323. package/quotaLeaseCount.d.ts +6 -6
  324. package/quotaLeaseCount.js +1 -0
  325. package/quotaLeaseCount.js.map +1 -1
  326. package/quotaRateLimit.d.ts +6 -6
  327. package/quotaRateLimit.js +1 -0
  328. package/quotaRateLimit.js.map +1 -1
  329. package/rabbitmq/index.js +12 -5
  330. package/rabbitmq/index.js.map +1 -1
  331. package/rabbitmq/secretBackend.d.ts +16 -16
  332. package/rabbitmq/secretBackend.js +1 -0
  333. package/rabbitmq/secretBackend.js.map +1 -1
  334. package/rabbitmq/secretBackendRole.d.ts +8 -8
  335. package/rabbitmq/secretBackendRole.js +1 -0
  336. package/rabbitmq/secretBackendRole.js.map +1 -1
  337. package/raftSnapshotAgentConfig.d.ts +54 -54
  338. package/raftSnapshotAgentConfig.js +1 -0
  339. package/raftSnapshotAgentConfig.js.map +1 -1
  340. package/rgpPolicy.d.ts +6 -6
  341. package/rgpPolicy.js +1 -0
  342. package/rgpPolicy.js.map +1 -1
  343. package/ssh/index.js +12 -5
  344. package/ssh/index.js.map +1 -1
  345. package/ssh/secretBackendCa.d.ts +8 -8
  346. package/ssh/secretBackendCa.js +1 -0
  347. package/ssh/secretBackendCa.js.map +1 -1
  348. package/ssh/secretBackendRole.d.ts +44 -44
  349. package/ssh/secretBackendRole.js +1 -0
  350. package/ssh/secretBackendRole.js.map +1 -1
  351. package/token.d.ts +34 -34
  352. package/token.js +1 -0
  353. package/token.js.map +1 -1
  354. package/tokenauth/authBackendRole.d.ts +39 -39
  355. package/tokenauth/authBackendRole.js +1 -0
  356. package/tokenauth/authBackendRole.js.map +1 -1
  357. package/tokenauth/index.js +11 -4
  358. package/tokenauth/index.js.map +1 -1
  359. package/transform/alphabet.d.ts +6 -6
  360. package/transform/alphabet.js +1 -0
  361. package/transform/alphabet.js.map +1 -1
  362. package/transform/getDecode.d.ts +50 -8
  363. package/transform/getDecode.js +5 -0
  364. package/transform/getDecode.js.map +1 -1
  365. package/transform/getEncode.d.ts +50 -8
  366. package/transform/getEncode.js +5 -0
  367. package/transform/getEncode.js.map +1 -1
  368. package/transform/index.js +16 -9
  369. package/transform/index.js.map +1 -1
  370. package/transform/role.d.ts +6 -6
  371. package/transform/role.js +1 -0
  372. package/transform/role.js.map +1 -1
  373. package/transform/template.d.ts +10 -10
  374. package/transform/template.js +1 -0
  375. package/transform/template.js.map +1 -1
  376. package/transform/transformation.d.ts +16 -16
  377. package/transform/transformation.js +1 -0
  378. package/transform/transformation.js.map +1 -1
  379. package/transit/getDecrypt.d.ts +27 -5
  380. package/transit/getDecrypt.js +6 -1
  381. package/transit/getDecrypt.js.map +1 -1
  382. package/transit/getEncrypt.d.ts +31 -5
  383. package/transit/getEncrypt.js +5 -0
  384. package/transit/getEncrypt.js.map +1 -1
  385. package/transit/index.js +14 -7
  386. package/transit/index.js.map +1 -1
  387. package/transit/secretBackendKey.d.ts +27 -27
  388. package/transit/secretBackendKey.js +1 -0
  389. package/transit/secretBackendKey.js.map +1 -1
  390. package/transit/secretCacheConfig.d.ts +4 -4
  391. package/transit/secretCacheConfig.js +1 -0
  392. package/transit/secretCacheConfig.js.map +1 -1
  393. package/types/index.js +1 -0
  394. package/types/index.js.map +1 -1
  395. package/types/input.d.ts +54 -0
  396. package/types/output.d.ts +0 -16
  397. package/utilities.js +1 -0
  398. package/utilities.js.map +1 -1
package/README.md CHANGED
@@ -29,7 +29,7 @@ To use from Python, install using `pip`:
29
29
 
30
30
  To use from Go, use `go get` to grab the latest version of the library
31
31
 
32
- $ go get github.com/pulumi/pulumi-vault/sdk/v4/go/...
32
+ $ go get github.com/pulumi/pulumi-vault/sdk/v4
33
33
 
34
34
  ### .NET
35
35
 
@@ -8,12 +8,12 @@ export interface GetAccessCredentialsArgs {
8
8
  * The path to the AD secret backend to
9
9
  * read credentials from, with no leading or trailing `/`s.
10
10
  */
11
- readonly backend: string;
11
+ backend: string;
12
12
  /**
13
13
  * The name of the AD secret backend role to read
14
14
  * credentials from, with no leading or trailing `/`s.
15
15
  */
16
- readonly role: string;
16
+ role: string;
17
17
  }
18
18
  /**
19
19
  * A collection of values returned by getAccessCredentials.
@@ -38,3 +38,19 @@ export interface GetAccessCredentialsResult {
38
38
  */
39
39
  readonly username: string;
40
40
  }
41
+ export declare function getAccessCredentialsOutput(args: GetAccessCredentialsOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output<GetAccessCredentialsResult>;
42
+ /**
43
+ * A collection of arguments for invoking getAccessCredentials.
44
+ */
45
+ export interface GetAccessCredentialsOutputArgs {
46
+ /**
47
+ * The path to the AD secret backend to
48
+ * read credentials from, with no leading or trailing `/`s.
49
+ */
50
+ backend: pulumi.Input<string>;
51
+ /**
52
+ * The name of the AD secret backend role to read
53
+ * credentials from, with no leading or trailing `/`s.
54
+ */
55
+ role: pulumi.Input<string>;
56
+ }
@@ -2,6 +2,7 @@
2
2
  // *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  // *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
  Object.defineProperty(exports, "__esModule", { value: true });
5
+ exports.getAccessCredentialsOutput = exports.getAccessCredentials = void 0;
5
6
  const pulumi = require("@pulumi/pulumi");
6
7
  const utilities = require("../utilities");
7
8
  function getAccessCredentials(args, opts) {
@@ -17,4 +18,8 @@ function getAccessCredentials(args, opts) {
17
18
  }, opts);
18
19
  }
19
20
  exports.getAccessCredentials = getAccessCredentials;
21
+ function getAccessCredentialsOutput(args, opts) {
22
+ return pulumi.output(args).apply(a => getAccessCredentials(a, opts));
23
+ }
24
+ exports.getAccessCredentialsOutput = getAccessCredentialsOutput;
20
25
  //# sourceMappingURL=getAccessCredentials.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"getAccessCredentials.js","sourceRoot":"","sources":["../../ad/getAccessCredentials.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;AAEjF,yCAAyC;AAEzC,0CAA0C;AAE1C,SAAgB,oBAAoB,CAAC,IAA8B,EAAE,IAA2B;IAC5F,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;QACf,IAAI,CAAC,OAAO,GAAG,SAAS,CAAC,UAAU,EAAE,CAAC;KACzC;IACD,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,oDAAoD,EAAE;QAC/E,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAZD,oDAYC"}
1
+ {"version":3,"file":"getAccessCredentials.js","sourceRoot":"","sources":["../../ad/getAccessCredentials.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,SAAgB,oBAAoB,CAAC,IAA8B,EAAE,IAA2B;IAC5F,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;QACf,IAAI,CAAC,OAAO,GAAG,SAAS,CAAC,UAAU,EAAE,CAAC;KACzC;IACD,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,oDAAoD,EAAE;QAC/E,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAZD,oDAYC;AA0CD,SAAgB,0BAA0B,CAAC,IAAoC,EAAE,IAA2B;IACxG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,oBAAoB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACxE,CAAC;AAFD,gEAEC"}
package/ad/index.js CHANGED
@@ -1,17 +1,24 @@
1
1
  "use strict";
2
2
  // *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  // *** Do not edit by hand unless you're certain you know what you are doing! ***
4
- function __export(m) {
5
- for (var p in m) if (!exports.hasOwnProperty(p)) exports[p] = m[p];
6
- }
4
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
5
+ if (k2 === undefined) k2 = k;
6
+ Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } });
7
+ }) : (function(o, m, k, k2) {
8
+ if (k2 === undefined) k2 = k;
9
+ o[k2] = m[k];
10
+ }));
11
+ var __exportStar = (this && this.__exportStar) || function(m, exports) {
12
+ for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
13
+ };
7
14
  Object.defineProperty(exports, "__esModule", { value: true });
8
15
  const pulumi = require("@pulumi/pulumi");
9
16
  const utilities = require("../utilities");
10
17
  // Export members:
11
- __export(require("./getAccessCredentials"));
12
- __export(require("./secretBackend"));
13
- __export(require("./secretLibrary"));
14
- __export(require("./secretRole"));
18
+ __exportStar(require("./getAccessCredentials"), exports);
19
+ __exportStar(require("./secretBackend"), exports);
20
+ __exportStar(require("./secretLibrary"), exports);
21
+ __exportStar(require("./secretRole"), exports);
15
22
  // Import resources to register:
16
23
  const secretBackend_1 = require("./secretBackend");
17
24
  const secretLibrary_1 = require("./secretLibrary");
package/ad/index.js.map CHANGED
@@ -1 +1 @@
1
- {"version":3,"file":"index.js","sourceRoot":"","sources":["../../ad/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,kBAAkB;AAClB,4CAAuC;AACvC,qCAAgC;AAChC,qCAAgC;AAChC,kCAA6B;AAE7B,gCAAgC;AAChC,mDAAgD;AAChD,mDAAgD;AAChD,6CAA0C;AAE1C,MAAM,OAAO,GAAG;IACZ,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE;IAC/B,SAAS,EAAE,CAAC,IAAY,EAAE,IAAY,EAAE,GAAW,EAAmB,EAAE;QACpE,QAAQ,IAAI,EAAE;YACV,KAAK,sCAAsC;gBACvC,OAAO,IAAI,6BAAa,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC3D,KAAK,sCAAsC;gBACvC,OAAO,IAAI,6BAAa,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC3D,KAAK,gCAAgC;gBACjC,OAAO,IAAI,uBAAU,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACxD;gBACI,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,EAAE,CAAC,CAAC;SACxD;IACL,CAAC;CACJ,CAAC;AACF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,kBAAkB,EAAE,OAAO,CAAC,CAAA;AAC3E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,kBAAkB,EAAE,OAAO,CAAC,CAAA;AAC3E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,eAAe,EAAE,OAAO,CAAC,CAAA"}
1
+ {"version":3,"file":"index.js","sourceRoot":"","sources":["../../ad/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;;;;;;;;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,kBAAkB;AAClB,yDAAuC;AACvC,kDAAgC;AAChC,kDAAgC;AAChC,+CAA6B;AAE7B,gCAAgC;AAChC,mDAAgD;AAChD,mDAAgD;AAChD,6CAA0C;AAE1C,MAAM,OAAO,GAAG;IACZ,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE;IAC/B,SAAS,EAAE,CAAC,IAAY,EAAE,IAAY,EAAE,GAAW,EAAmB,EAAE;QACpE,QAAQ,IAAI,EAAE;YACV,KAAK,sCAAsC;gBACvC,OAAO,IAAI,6BAAa,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC3D,KAAK,sCAAsC;gBACvC,OAAO,IAAI,6BAAa,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC3D,KAAK,gCAAgC;gBACjC,OAAO,IAAI,uBAAU,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACxD;gBACI,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,EAAE,CAAC,CAAC;SACxD;IACL,CAAC;CACJ,CAAC;AACF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,kBAAkB,EAAE,OAAO,CAAC,CAAA;AAC3E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,kBAAkB,EAAE,OAAO,CAAC,CAAA;AAC3E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,eAAe,EAAE,OAAO,CAAC,CAAA"}
@@ -203,142 +203,142 @@ export interface SecretBackendState {
203
203
  * Use anonymous binds when performing LDAP group searches
204
204
  * (if true the initial credentials will still be used for the initial connection test).
205
205
  */
206
- readonly anonymousGroupSearch?: pulumi.Input<boolean>;
206
+ anonymousGroupSearch?: pulumi.Input<boolean>;
207
207
  /**
208
208
  * The unique path this backend should be mounted at. Must
209
209
  * not begin or end with a `/`. Defaults to `ad`.
210
210
  */
211
- readonly backend?: pulumi.Input<string>;
211
+ backend?: pulumi.Input<string>;
212
212
  /**
213
213
  * Distinguished name of object to bind when performing user and group search.
214
214
  */
215
- readonly binddn?: pulumi.Input<string>;
215
+ binddn?: pulumi.Input<string>;
216
216
  /**
217
217
  * Password to use along with binddn when performing user search.
218
218
  */
219
- readonly bindpass?: pulumi.Input<string>;
219
+ bindpass?: pulumi.Input<string>;
220
220
  /**
221
221
  * If set, user and group names assigned to policies within the
222
222
  * backend will be case sensitive. Otherwise, names will be normalized to lower case.
223
223
  */
224
- readonly caseSensitiveNames?: pulumi.Input<boolean>;
224
+ caseSensitiveNames?: pulumi.Input<boolean>;
225
225
  /**
226
226
  * CA certificate to use when verifying LDAP server certificate, must be
227
227
  * x509 PEM encoded.
228
228
  */
229
- readonly certificate?: pulumi.Input<string>;
229
+ certificate?: pulumi.Input<string>;
230
230
  /**
231
231
  * Client certificate to provide to the LDAP server, must be x509 PEM encoded.
232
232
  */
233
- readonly clientTlsCert?: pulumi.Input<string>;
233
+ clientTlsCert?: pulumi.Input<string>;
234
234
  /**
235
235
  * Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
236
236
  */
237
- readonly clientTlsKey?: pulumi.Input<string>;
237
+ clientTlsKey?: pulumi.Input<string>;
238
238
  /**
239
239
  * Default lease duration for secrets in seconds.
240
240
  */
241
- readonly defaultLeaseTtlSeconds?: pulumi.Input<number>;
241
+ defaultLeaseTtlSeconds?: pulumi.Input<number>;
242
242
  /**
243
243
  * Denies an unauthenticated LDAP bind request if the user's password is empty;
244
244
  * defaults to true.
245
245
  */
246
- readonly denyNullBind?: pulumi.Input<boolean>;
246
+ denyNullBind?: pulumi.Input<boolean>;
247
247
  /**
248
248
  * Human-friendly description of the mount for the Active Directory backend.
249
249
  */
250
- readonly description?: pulumi.Input<string>;
250
+ description?: pulumi.Input<string>;
251
251
  /**
252
252
  * Use anonymous bind to discover the bind Distinguished Name of a user.
253
253
  */
254
- readonly discoverdn?: pulumi.Input<boolean>;
254
+ discoverdn?: pulumi.Input<boolean>;
255
255
  /**
256
256
  * Text to insert the password into, ex. "customPrefix{{PASSWORD}}customSuffix". This
257
257
  * setting is deprecated and should instead use `passwordPolicy`.
258
258
  *
259
259
  * @deprecated Formatter is deprecated and password_policy should be used with Vault >= 1.5.
260
260
  */
261
- readonly formatter?: pulumi.Input<string>;
261
+ formatter?: pulumi.Input<string>;
262
262
  /**
263
263
  * LDAP attribute to follow on objects returned by <groupfilter> in order to enumerate
264
264
  * user group membership. Examples: `cn` or `memberOf`, etc. Defaults to `cn`.
265
265
  */
266
- readonly groupattr?: pulumi.Input<string>;
266
+ groupattr?: pulumi.Input<string>;
267
267
  /**
268
268
  * LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org).
269
269
  */
270
- readonly groupdn?: pulumi.Input<string>;
270
+ groupdn?: pulumi.Input<string>;
271
271
  /**
272
272
  * Go template for querying group membership of user (optional) The template can access
273
273
  * the following context variables: UserDN, Username. Defaults to `(|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}}))`
274
274
  */
275
- readonly groupfilter?: pulumi.Input<string>;
275
+ groupfilter?: pulumi.Input<string>;
276
276
  /**
277
277
  * Skip LDAP server SSL Certificate verification. This is not recommended for production.
278
278
  * Defaults to `false`.
279
279
  */
280
- readonly insecureTls?: pulumi.Input<boolean>;
280
+ insecureTls?: pulumi.Input<boolean>;
281
281
  /**
282
282
  * The number of seconds after a Vault rotation where, if Active Directory
283
283
  * shows a later rotation, it should be considered out-of-band
284
284
  */
285
- readonly lastRotationTolerance?: pulumi.Input<number>;
285
+ lastRotationTolerance?: pulumi.Input<number>;
286
286
  /**
287
287
  * The desired length of passwords that Vault generates. This
288
288
  * setting is deprecated and should instead use `passwordPolicy`.
289
289
  *
290
290
  * @deprecated Length is deprecated and password_policy should be used with Vault >= 1.5.
291
291
  */
292
- readonly length?: pulumi.Input<number>;
292
+ length?: pulumi.Input<number>;
293
293
  /**
294
294
  * Mark the secrets engine as local-only. Local engines are not replicated or removed by
295
295
  * replication.Tolerance duration to use when checking the last rotation time.
296
296
  */
297
- readonly local?: pulumi.Input<boolean>;
297
+ local?: pulumi.Input<boolean>;
298
298
  /**
299
299
  * Maximum possible lease duration for secrets in seconds.
300
300
  */
301
- readonly maxLeaseTtlSeconds?: pulumi.Input<number>;
301
+ maxLeaseTtlSeconds?: pulumi.Input<number>;
302
302
  /**
303
303
  * In seconds, the maximum password time-to-live.
304
304
  */
305
- readonly maxTtl?: pulumi.Input<number>;
305
+ maxTtl?: pulumi.Input<number>;
306
306
  /**
307
307
  * Name of the password policy to use to generate passwords.
308
308
  */
309
- readonly passwordPolicy?: pulumi.Input<string>;
309
+ passwordPolicy?: pulumi.Input<string>;
310
310
  /**
311
311
  * Timeout, in seconds, for the connection when making requests against the server
312
312
  * before returning back an error.
313
313
  */
314
- readonly requestTimeout?: pulumi.Input<number>;
314
+ requestTimeout?: pulumi.Input<number>;
315
315
  /**
316
316
  * Issue a StartTLS command after establishing unencrypted connection.
317
317
  */
318
- readonly starttls?: pulumi.Input<boolean>;
318
+ starttls?: pulumi.Input<boolean>;
319
319
  /**
320
320
  * Maximum TLS version to use. Accepted values are `tls10`, `tls11`,
321
321
  * `tls12` or `tls13`. Defaults to `tls12`.
322
322
  */
323
- readonly tlsMaxVersion?: pulumi.Input<string>;
323
+ tlsMaxVersion?: pulumi.Input<string>;
324
324
  /**
325
325
  * Minimum TLS version to use. Accepted values are `tls10`, `tls11`,
326
326
  * `tls12` or `tls13`. Defaults to `tls12`.
327
327
  */
328
- readonly tlsMinVersion?: pulumi.Input<string>;
328
+ tlsMinVersion?: pulumi.Input<string>;
329
329
  /**
330
330
  * In seconds, the default password time-to-live.
331
331
  */
332
- readonly ttl?: pulumi.Input<number>;
332
+ ttl?: pulumi.Input<number>;
333
333
  /**
334
334
  * Enables userPrincipalDomain login with [username]@UPNDomain.
335
335
  */
336
- readonly upndomain?: pulumi.Input<string>;
336
+ upndomain?: pulumi.Input<string>;
337
337
  /**
338
338
  * LDAP URL to connect to. Multiple URLs can be specified by concatenating
339
339
  * them with commas; they will be tried in-order. Defaults to `ldap://127.0.0.1`.
340
340
  */
341
- readonly url?: pulumi.Input<string>;
341
+ url?: pulumi.Input<string>;
342
342
  /**
343
343
  * In Vault 1.1.1 a fix for handling group CN values of
344
344
  * different cases unfortunately introduced a regression that could cause previously defined groups
@@ -347,20 +347,20 @@ export interface SecretBackendState {
347
347
  * compatibility. It is enabled by default if the config is upgraded but disabled by default on
348
348
  * new configurations.
349
349
  */
350
- readonly usePre111GroupCnBehavior?: pulumi.Input<boolean>;
350
+ usePre111GroupCnBehavior?: pulumi.Input<boolean>;
351
351
  /**
352
352
  * If true, use the Active Directory tokenGroups constructed attribute of the
353
353
  * user to find the group memberships. This will find all security groups including nested ones.
354
354
  */
355
- readonly useTokenGroups?: pulumi.Input<boolean>;
355
+ useTokenGroups?: pulumi.Input<boolean>;
356
356
  /**
357
357
  * Attribute used when searching users. Defaults to `cn`.
358
358
  */
359
- readonly userattr?: pulumi.Input<string>;
359
+ userattr?: pulumi.Input<string>;
360
360
  /**
361
361
  * LDAP domain to use for users (eg: ou=People,dc=example,dc=org)`.
362
362
  */
363
- readonly userdn?: pulumi.Input<string>;
363
+ userdn?: pulumi.Input<string>;
364
364
  }
365
365
  /**
366
366
  * The set of arguments for constructing a SecretBackend resource.
@@ -370,142 +370,142 @@ export interface SecretBackendArgs {
370
370
  * Use anonymous binds when performing LDAP group searches
371
371
  * (if true the initial credentials will still be used for the initial connection test).
372
372
  */
373
- readonly anonymousGroupSearch?: pulumi.Input<boolean>;
373
+ anonymousGroupSearch?: pulumi.Input<boolean>;
374
374
  /**
375
375
  * The unique path this backend should be mounted at. Must
376
376
  * not begin or end with a `/`. Defaults to `ad`.
377
377
  */
378
- readonly backend?: pulumi.Input<string>;
378
+ backend?: pulumi.Input<string>;
379
379
  /**
380
380
  * Distinguished name of object to bind when performing user and group search.
381
381
  */
382
- readonly binddn: pulumi.Input<string>;
382
+ binddn: pulumi.Input<string>;
383
383
  /**
384
384
  * Password to use along with binddn when performing user search.
385
385
  */
386
- readonly bindpass: pulumi.Input<string>;
386
+ bindpass: pulumi.Input<string>;
387
387
  /**
388
388
  * If set, user and group names assigned to policies within the
389
389
  * backend will be case sensitive. Otherwise, names will be normalized to lower case.
390
390
  */
391
- readonly caseSensitiveNames?: pulumi.Input<boolean>;
391
+ caseSensitiveNames?: pulumi.Input<boolean>;
392
392
  /**
393
393
  * CA certificate to use when verifying LDAP server certificate, must be
394
394
  * x509 PEM encoded.
395
395
  */
396
- readonly certificate?: pulumi.Input<string>;
396
+ certificate?: pulumi.Input<string>;
397
397
  /**
398
398
  * Client certificate to provide to the LDAP server, must be x509 PEM encoded.
399
399
  */
400
- readonly clientTlsCert?: pulumi.Input<string>;
400
+ clientTlsCert?: pulumi.Input<string>;
401
401
  /**
402
402
  * Client certificate key to provide to the LDAP server, must be x509 PEM encoded.
403
403
  */
404
- readonly clientTlsKey?: pulumi.Input<string>;
404
+ clientTlsKey?: pulumi.Input<string>;
405
405
  /**
406
406
  * Default lease duration for secrets in seconds.
407
407
  */
408
- readonly defaultLeaseTtlSeconds?: pulumi.Input<number>;
408
+ defaultLeaseTtlSeconds?: pulumi.Input<number>;
409
409
  /**
410
410
  * Denies an unauthenticated LDAP bind request if the user's password is empty;
411
411
  * defaults to true.
412
412
  */
413
- readonly denyNullBind?: pulumi.Input<boolean>;
413
+ denyNullBind?: pulumi.Input<boolean>;
414
414
  /**
415
415
  * Human-friendly description of the mount for the Active Directory backend.
416
416
  */
417
- readonly description?: pulumi.Input<string>;
417
+ description?: pulumi.Input<string>;
418
418
  /**
419
419
  * Use anonymous bind to discover the bind Distinguished Name of a user.
420
420
  */
421
- readonly discoverdn?: pulumi.Input<boolean>;
421
+ discoverdn?: pulumi.Input<boolean>;
422
422
  /**
423
423
  * Text to insert the password into, ex. "customPrefix{{PASSWORD}}customSuffix". This
424
424
  * setting is deprecated and should instead use `passwordPolicy`.
425
425
  *
426
426
  * @deprecated Formatter is deprecated and password_policy should be used with Vault >= 1.5.
427
427
  */
428
- readonly formatter?: pulumi.Input<string>;
428
+ formatter?: pulumi.Input<string>;
429
429
  /**
430
430
  * LDAP attribute to follow on objects returned by <groupfilter> in order to enumerate
431
431
  * user group membership. Examples: `cn` or `memberOf`, etc. Defaults to `cn`.
432
432
  */
433
- readonly groupattr?: pulumi.Input<string>;
433
+ groupattr?: pulumi.Input<string>;
434
434
  /**
435
435
  * LDAP search base to use for group membership search (eg: ou=Groups,dc=example,dc=org).
436
436
  */
437
- readonly groupdn?: pulumi.Input<string>;
437
+ groupdn?: pulumi.Input<string>;
438
438
  /**
439
439
  * Go template for querying group membership of user (optional) The template can access
440
440
  * the following context variables: UserDN, Username. Defaults to `(|(memberUid={{.Username}})(member={{.UserDN}})(uniqueMember={{.UserDN}}))`
441
441
  */
442
- readonly groupfilter?: pulumi.Input<string>;
442
+ groupfilter?: pulumi.Input<string>;
443
443
  /**
444
444
  * Skip LDAP server SSL Certificate verification. This is not recommended for production.
445
445
  * Defaults to `false`.
446
446
  */
447
- readonly insecureTls?: pulumi.Input<boolean>;
447
+ insecureTls?: pulumi.Input<boolean>;
448
448
  /**
449
449
  * The number of seconds after a Vault rotation where, if Active Directory
450
450
  * shows a later rotation, it should be considered out-of-band
451
451
  */
452
- readonly lastRotationTolerance?: pulumi.Input<number>;
452
+ lastRotationTolerance?: pulumi.Input<number>;
453
453
  /**
454
454
  * The desired length of passwords that Vault generates. This
455
455
  * setting is deprecated and should instead use `passwordPolicy`.
456
456
  *
457
457
  * @deprecated Length is deprecated and password_policy should be used with Vault >= 1.5.
458
458
  */
459
- readonly length?: pulumi.Input<number>;
459
+ length?: pulumi.Input<number>;
460
460
  /**
461
461
  * Mark the secrets engine as local-only. Local engines are not replicated or removed by
462
462
  * replication.Tolerance duration to use when checking the last rotation time.
463
463
  */
464
- readonly local?: pulumi.Input<boolean>;
464
+ local?: pulumi.Input<boolean>;
465
465
  /**
466
466
  * Maximum possible lease duration for secrets in seconds.
467
467
  */
468
- readonly maxLeaseTtlSeconds?: pulumi.Input<number>;
468
+ maxLeaseTtlSeconds?: pulumi.Input<number>;
469
469
  /**
470
470
  * In seconds, the maximum password time-to-live.
471
471
  */
472
- readonly maxTtl?: pulumi.Input<number>;
472
+ maxTtl?: pulumi.Input<number>;
473
473
  /**
474
474
  * Name of the password policy to use to generate passwords.
475
475
  */
476
- readonly passwordPolicy?: pulumi.Input<string>;
476
+ passwordPolicy?: pulumi.Input<string>;
477
477
  /**
478
478
  * Timeout, in seconds, for the connection when making requests against the server
479
479
  * before returning back an error.
480
480
  */
481
- readonly requestTimeout?: pulumi.Input<number>;
481
+ requestTimeout?: pulumi.Input<number>;
482
482
  /**
483
483
  * Issue a StartTLS command after establishing unencrypted connection.
484
484
  */
485
- readonly starttls?: pulumi.Input<boolean>;
485
+ starttls?: pulumi.Input<boolean>;
486
486
  /**
487
487
  * Maximum TLS version to use. Accepted values are `tls10`, `tls11`,
488
488
  * `tls12` or `tls13`. Defaults to `tls12`.
489
489
  */
490
- readonly tlsMaxVersion?: pulumi.Input<string>;
490
+ tlsMaxVersion?: pulumi.Input<string>;
491
491
  /**
492
492
  * Minimum TLS version to use. Accepted values are `tls10`, `tls11`,
493
493
  * `tls12` or `tls13`. Defaults to `tls12`.
494
494
  */
495
- readonly tlsMinVersion?: pulumi.Input<string>;
495
+ tlsMinVersion?: pulumi.Input<string>;
496
496
  /**
497
497
  * In seconds, the default password time-to-live.
498
498
  */
499
- readonly ttl?: pulumi.Input<number>;
499
+ ttl?: pulumi.Input<number>;
500
500
  /**
501
501
  * Enables userPrincipalDomain login with [username]@UPNDomain.
502
502
  */
503
- readonly upndomain?: pulumi.Input<string>;
503
+ upndomain?: pulumi.Input<string>;
504
504
  /**
505
505
  * LDAP URL to connect to. Multiple URLs can be specified by concatenating
506
506
  * them with commas; they will be tried in-order. Defaults to `ldap://127.0.0.1`.
507
507
  */
508
- readonly url?: pulumi.Input<string>;
508
+ url?: pulumi.Input<string>;
509
509
  /**
510
510
  * In Vault 1.1.1 a fix for handling group CN values of
511
511
  * different cases unfortunately introduced a regression that could cause previously defined groups
@@ -514,18 +514,18 @@ export interface SecretBackendArgs {
514
514
  * compatibility. It is enabled by default if the config is upgraded but disabled by default on
515
515
  * new configurations.
516
516
  */
517
- readonly usePre111GroupCnBehavior?: pulumi.Input<boolean>;
517
+ usePre111GroupCnBehavior?: pulumi.Input<boolean>;
518
518
  /**
519
519
  * If true, use the Active Directory tokenGroups constructed attribute of the
520
520
  * user to find the group memberships. This will find all security groups including nested ones.
521
521
  */
522
- readonly useTokenGroups?: pulumi.Input<boolean>;
522
+ useTokenGroups?: pulumi.Input<boolean>;
523
523
  /**
524
524
  * Attribute used when searching users. Defaults to `cn`.
525
525
  */
526
- readonly userattr?: pulumi.Input<string>;
526
+ userattr?: pulumi.Input<string>;
527
527
  /**
528
528
  * LDAP domain to use for users (eg: ou=People,dc=example,dc=org)`.
529
529
  */
530
- readonly userdn?: pulumi.Input<string>;
530
+ userdn?: pulumi.Input<string>;
531
531
  }
@@ -2,6 +2,7 @@
2
2
  // *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  // *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
  Object.defineProperty(exports, "__esModule", { value: true });
5
+ exports.SecretBackend = void 0;
5
6
  const pulumi = require("@pulumi/pulumi");
6
7
  const utilities = require("../utilities");
7
8
  /**
@@ -1 +1 @@
1
- {"version":3,"file":"secretBackend.js","sourceRoot":"","sources":["../../ad/secretBackend.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;GAQG;AACH,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;IAuMpD,YAAY,IAAY,EAAE,WAAoD,EAAE,IAAmC;QAC/G,IAAI,MAAM,GAAkB,EAAE,CAAC;QAC/B,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA6C,CAAC;YAC5D,MAAM,CAAC,sBAAsB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,MAAM,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,MAAM,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,MAAM,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,MAAM,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,uBAAuB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,qBAAqB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,MAAM,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,MAAM,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,MAAM,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,MAAM,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9C,MAAM,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9C,MAAM,CAAC,0BAA0B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,MAAM,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,MAAM,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SACvD;aAAM;YACH,MAAM,IAAI,GAAG,WAA4C,CAAC;YAC1D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,MAAM,CAAC,sBAAsB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,MAAM,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,MAAM,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,MAAM,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,uBAAuB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,qBAAqB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,MAAM,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,MAAM,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,MAAM,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,MAAM,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5C,MAAM,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5C,MAAM,CAAC,0BAA0B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,MAAM,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,MAAM,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SACrD;QACD,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;YACf,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE,EAAC,CAAC,CAAC;SACxE;QACD,KAAK,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,CAAC,CAAC;IAC1D,CAAC;IA5RD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA0B,EAAE,IAAmC;QACxH,OAAO,IAAI,aAAa,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACpE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,aAAa,CAAC,YAAY,CAAC;IAC9D,CAAC;;AA1BL,sCA8RC;AAhRG,gBAAgB;AACO,0BAAY,GAAG,sCAAsC,CAAC"}
1
+ {"version":3,"file":"secretBackend.js","sourceRoot":"","sources":["../../ad/secretBackend.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;GAQG;AACH,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;IAuMpD,YAAY,IAAY,EAAE,WAAoD,EAAE,IAAmC;QAC/G,IAAI,MAAM,GAAkB,EAAE,CAAC;QAC/B,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA6C,CAAC;YAC5D,MAAM,CAAC,sBAAsB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,MAAM,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,MAAM,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,MAAM,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,MAAM,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,uBAAuB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,qBAAqB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,MAAM,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,MAAM,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,MAAM,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,MAAM,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9C,MAAM,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9C,MAAM,CAAC,0BAA0B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,MAAM,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,MAAM,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SACvD;aAAM;YACH,MAAM,IAAI,GAAG,WAA4C,CAAC;YAC1D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,MAAM,CAAC,sBAAsB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,MAAM,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,MAAM,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,MAAM,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,uBAAuB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,qBAAqB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,MAAM,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,MAAM,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,MAAM,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,MAAM,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5C,MAAM,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5C,MAAM,CAAC,0BAA0B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,MAAM,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,MAAM,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SACrD;QACD,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;YACf,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE,EAAC,CAAC,CAAC;SACxE;QACD,KAAK,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,CAAC,CAAC;IAC1D,CAAC;IA5RD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA0B,EAAE,IAAmC;QACxH,OAAO,IAAI,aAAa,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACpE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,aAAa,CAAC,YAAY,CAAC;IAC9D,CAAC;;AA1BL,sCA8RC;AAhRG,gBAAgB;AACO,0BAAY,GAAG,sCAAsC,CAAC"}
@@ -56,28 +56,28 @@ export interface SecretLibraryState {
56
56
  /**
57
57
  * The mount path for the AD backend.
58
58
  */
59
- readonly backend?: pulumi.Input<string>;
59
+ backend?: pulumi.Input<string>;
60
60
  /**
61
61
  * Disable enforcing that service accounts must be checked in by the entity or client token that checked them out.
62
62
  */
63
- readonly disableCheckInEnforcement?: pulumi.Input<boolean>;
63
+ disableCheckInEnforcement?: pulumi.Input<boolean>;
64
64
  /**
65
65
  * The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in.
66
66
  */
67
- readonly maxTtl?: pulumi.Input<number>;
67
+ maxTtl?: pulumi.Input<number>;
68
68
  /**
69
69
  * The name of the set of service accounts.
70
70
  */
71
- readonly name?: pulumi.Input<string>;
71
+ name?: pulumi.Input<string>;
72
72
  /**
73
73
  * The names of all the service accounts that can be checked out from this set. These service accounts must already exist
74
74
  * in Active Directory.
75
75
  */
76
- readonly serviceAccountNames?: pulumi.Input<pulumi.Input<string>[]>;
76
+ serviceAccountNames?: pulumi.Input<pulumi.Input<string>[]>;
77
77
  /**
78
78
  * The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in.
79
79
  */
80
- readonly ttl?: pulumi.Input<number>;
80
+ ttl?: pulumi.Input<number>;
81
81
  }
82
82
  /**
83
83
  * The set of arguments for constructing a SecretLibrary resource.
@@ -86,26 +86,26 @@ export interface SecretLibraryArgs {
86
86
  /**
87
87
  * The mount path for the AD backend.
88
88
  */
89
- readonly backend: pulumi.Input<string>;
89
+ backend: pulumi.Input<string>;
90
90
  /**
91
91
  * Disable enforcing that service accounts must be checked in by the entity or client token that checked them out.
92
92
  */
93
- readonly disableCheckInEnforcement?: pulumi.Input<boolean>;
93
+ disableCheckInEnforcement?: pulumi.Input<boolean>;
94
94
  /**
95
95
  * The maximum amount of time, in seconds, a check-out last with renewal before Vault automatically checks it back in.
96
96
  */
97
- readonly maxTtl?: pulumi.Input<number>;
97
+ maxTtl?: pulumi.Input<number>;
98
98
  /**
99
99
  * The name of the set of service accounts.
100
100
  */
101
- readonly name?: pulumi.Input<string>;
101
+ name?: pulumi.Input<string>;
102
102
  /**
103
103
  * The names of all the service accounts that can be checked out from this set. These service accounts must already exist
104
104
  * in Active Directory.
105
105
  */
106
- readonly serviceAccountNames: pulumi.Input<pulumi.Input<string>[]>;
106
+ serviceAccountNames: pulumi.Input<pulumi.Input<string>[]>;
107
107
  /**
108
108
  * The amount of time, in seconds, a single check-out lasts before Vault automatically checks it back in.
109
109
  */
110
- readonly ttl?: pulumi.Input<number>;
110
+ ttl?: pulumi.Input<number>;
111
111
  }
@@ -2,6 +2,7 @@
2
2
  // *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  // *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
  Object.defineProperty(exports, "__esModule", { value: true });
5
+ exports.SecretLibrary = void 0;
5
6
  const pulumi = require("@pulumi/pulumi");
6
7
  const utilities = require("../utilities");
7
8
  class SecretLibrary extends pulumi.CustomResource {
@@ -1 +1 @@
1
- {"version":3,"file":"secretLibrary.js","sourceRoot":"","sources":["../../ad/secretLibrary.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;IA8DpD,YAAY,IAAY,EAAE,WAAoD,EAAE,IAAmC;QAC/G,IAAI,MAAM,GAAkB,EAAE,CAAC;QAC/B,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA6C,CAAC;YAC5D,MAAM,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,2BAA2B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,yBAAyB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,MAAM,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACjD;aAAM;YACH,MAAM,IAAI,GAAG,WAA4C,CAAC;YAC1D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,mBAAmB,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAChE,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,CAAC;aACtE;YACD,MAAM,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,2BAA2B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,yBAAyB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9C,MAAM,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,MAAM,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/C;QACD,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;YACf,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE,EAAC,CAAC,CAAC;SACxE;QACD,KAAK,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,CAAC,CAAC;IAC1D,CAAC;IA3FD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA0B,EAAE,IAAmC;QACxH,OAAO,IAAI,aAAa,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACpE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,aAAa,CAAC,YAAY,CAAC;IAC9D,CAAC;;AA1BL,sCA6FC;AA/EG,gBAAgB;AACO,0BAAY,GAAG,sCAAsC,CAAC"}
1
+ {"version":3,"file":"secretLibrary.js","sourceRoot":"","sources":["../../ad/secretLibrary.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;IA8DpD,YAAY,IAAY,EAAE,WAAoD,EAAE,IAAmC;QAC/G,IAAI,MAAM,GAAkB,EAAE,CAAC;QAC/B,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA6C,CAAC;YAC5D,MAAM,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,2BAA2B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,yBAAyB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,MAAM,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACjD;aAAM;YACH,MAAM,IAAI,GAAG,WAA4C,CAAC;YAC1D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,mBAAmB,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAChE,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,CAAC;aACtE;YACD,MAAM,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,2BAA2B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,yBAAyB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9C,MAAM,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,MAAM,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/C;QACD,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;YACf,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE,EAAC,CAAC,CAAC;SACxE;QACD,KAAK,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,CAAC,CAAC;IAC1D,CAAC;IA3FD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA0B,EAAE,IAAmC;QACxH,OAAO,IAAI,aAAa,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACpE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,aAAa,CAAC,YAAY,CAAC;IAC9D,CAAC;;AA1BL,sCA6FC;AA/EG,gBAAgB;AACO,0BAAY,GAAG,sCAAsC,CAAC"}