@pulumi/vault 4.5.0 → 4.6.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +1 -1
- package/ad/getAccessCredentials.d.ts +18 -2
- package/ad/getAccessCredentials.js +5 -0
- package/ad/getAccessCredentials.js.map +1 -1
- package/ad/index.js +14 -7
- package/ad/index.js.map +1 -1
- package/ad/secretBackend.d.ts +68 -68
- package/ad/secretBackend.js +1 -0
- package/ad/secretBackend.js.map +1 -1
- package/ad/secretLibrary.d.ts +12 -12
- package/ad/secretLibrary.js +1 -0
- package/ad/secretLibrary.js.map +1 -1
- package/ad/secretRole.d.ts +10 -10
- package/ad/secretRole.js +1 -0
- package/ad/secretRole.js.map +1 -1
- package/alicloud/authBackendRole.d.ts +24 -24
- package/alicloud/authBackendRole.js +1 -0
- package/alicloud/authBackendRole.js.map +1 -1
- package/alicloud/index.js +11 -4
- package/alicloud/index.js.map +1 -1
- package/approle/authBackendLogin.d.ts +16 -16
- package/approle/authBackendLogin.js +4 -3
- package/approle/authBackendLogin.js.map +1 -1
- package/approle/authBackendRole.d.ts +39 -39
- package/approle/authBackendRole.js +2 -1
- package/approle/authBackendRole.js.map +1 -1
- package/approle/authBackendRoleSecretID.d.ts +17 -17
- package/approle/authBackendRoleSecretID.js +3 -2
- package/approle/authBackendRoleSecretID.js.map +1 -1
- package/approle/getAuthBackendRoleId.d.ts +17 -2
- package/approle/getAuthBackendRoleId.js +5 -0
- package/approle/getAuthBackendRoleId.js.map +1 -1
- package/approle/index.js +14 -7
- package/approle/index.js.map +1 -1
- package/audit.d.ts +10 -10
- package/audit.js +1 -0
- package/audit.js.map +1 -1
- package/authBackend.d.ts +17 -17
- package/authBackend.js +1 -0
- package/authBackend.js.map +1 -1
- package/aws/authBackendCert.d.ts +8 -8
- package/aws/authBackendCert.js +1 -0
- package/aws/authBackendCert.js.map +1 -1
- package/aws/authBackendClient.d.ts +16 -16
- package/aws/authBackendClient.js +1 -0
- package/aws/authBackendClient.js.map +1 -1
- package/aws/authBackendIdentityWhitelist.d.ts +6 -6
- package/aws/authBackendIdentityWhitelist.js +1 -0
- package/aws/authBackendIdentityWhitelist.js.map +1 -1
- package/aws/authBackendLogin.d.ts +28 -28
- package/aws/authBackendLogin.js +1 -0
- package/aws/authBackendLogin.js.map +1 -1
- package/aws/authBackendRole.d.ts +62 -62
- package/aws/authBackendRole.js +1 -0
- package/aws/authBackendRole.js.map +1 -1
- package/aws/authBackendRoleTag.d.ts +16 -16
- package/aws/authBackendRoleTag.js +1 -0
- package/aws/authBackendRoleTag.js.map +1 -1
- package/aws/authBackendRoletagBlacklist.d.ts +6 -6
- package/aws/authBackendRoletagBlacklist.js +1 -0
- package/aws/authBackendRoletagBlacklist.js.map +1 -1
- package/aws/authBackendStsRole.d.ts +6 -6
- package/aws/authBackendStsRole.js +1 -0
- package/aws/authBackendStsRole.js.map +1 -1
- package/aws/getAccessCredentials.d.ts +42 -6
- package/aws/getAccessCredentials.js +5 -0
- package/aws/getAccessCredentials.js.map +1 -1
- package/aws/index.js +21 -14
- package/aws/index.js.map +1 -1
- package/aws/secretBackend.d.ts +18 -18
- package/aws/secretBackend.js +1 -0
- package/aws/secretBackend.js.map +1 -1
- package/aws/secretBackendRole.d.ts +18 -18
- package/aws/secretBackendRole.js +1 -0
- package/aws/secretBackendRole.js.map +1 -1
- package/azure/authBackendConfig.d.ts +12 -12
- package/azure/authBackendConfig.js +1 -0
- package/azure/authBackendConfig.js.map +1 -1
- package/azure/authBackendRole.d.ts +45 -45
- package/azure/authBackendRole.js +1 -0
- package/azure/authBackendRole.js.map +1 -1
- package/azure/backend.d.ts +14 -14
- package/azure/backend.js +1 -0
- package/azure/backend.js.map +1 -1
- package/azure/backendRole.d.ts +16 -16
- package/azure/backendRole.js +1 -0
- package/azure/backendRole.js.map +1 -1
- package/azure/getAccessCredentials.d.ts +47 -6
- package/azure/getAccessCredentials.js +5 -0
- package/azure/getAccessCredentials.js.map +1 -1
- package/azure/index.js +15 -8
- package/azure/index.js.map +1 -1
- package/certAuthBackendRole.d.ts +50 -50
- package/certAuthBackendRole.js +1 -0
- package/certAuthBackendRole.js.map +1 -1
- package/config/index.js +11 -4
- package/config/index.js.map +1 -1
- package/config/vars.d.ts +13 -13
- package/config/vars.js +82 -53
- package/config/vars.js.map +1 -1
- package/consul/index.js +12 -5
- package/consul/index.js.map +1 -1
- package/consul/secretBackend.d.ts +22 -22
- package/consul/secretBackend.js +1 -0
- package/consul/secretBackend.js.map +1 -1
- package/consul/secretBackendRole.d.ts +16 -16
- package/consul/secretBackendRole.js +1 -0
- package/consul/secretBackendRole.js.map +1 -1
- package/database/index.js +13 -6
- package/database/index.js.map +1 -1
- package/database/secretBackendConnection.d.ts +38 -38
- package/database/secretBackendConnection.js +1 -0
- package/database/secretBackendConnection.js.map +1 -1
- package/database/secretBackendRole.d.ts +18 -18
- package/database/secretBackendRole.js +1 -0
- package/database/secretBackendRole.js.map +1 -1
- package/database/secretBackendStaticRole.d.ts +12 -12
- package/database/secretBackendStaticRole.js +1 -0
- package/database/secretBackendStaticRole.js.map +1 -1
- package/egpPolicy.d.ts +8 -8
- package/egpPolicy.js +1 -0
- package/egpPolicy.js.map +1 -1
- package/gcp/authBackend.d.ts +16 -16
- package/gcp/authBackend.js +1 -0
- package/gcp/authBackend.js.map +1 -1
- package/gcp/authBackendRole.d.ts +50 -50
- package/gcp/authBackendRole.js +1 -0
- package/gcp/authBackendRole.js.map +1 -1
- package/gcp/getAuthBackendRole.d.ts +80 -12
- package/gcp/getAuthBackendRole.js +6 -1
- package/gcp/getAuthBackendRole.js.map +1 -1
- package/gcp/index.js +16 -9
- package/gcp/index.js.map +1 -1
- package/gcp/secretBackend.d.ts +12 -12
- package/gcp/secretBackend.js +1 -0
- package/gcp/secretBackend.js.map +1 -1
- package/gcp/secretRoleset.d.ts +13 -13
- package/gcp/secretRoleset.js +1 -0
- package/gcp/secretRoleset.js.map +1 -1
- package/gcp/secretStaticAccount.d.ts +39 -13
- package/gcp/secretStaticAccount.js +27 -0
- package/gcp/secretStaticAccount.js.map +1 -1
- package/generic/endpoint.d.ts +14 -14
- package/generic/endpoint.js +1 -0
- package/generic/endpoint.js.map +1 -1
- package/generic/getSecret.d.ts +22 -2
- package/generic/getSecret.js +5 -0
- package/generic/getSecret.js.map +1 -1
- package/generic/index.js +13 -6
- package/generic/index.js.map +1 -1
- package/generic/secret.d.ts +7 -7
- package/generic/secret.js +1 -0
- package/generic/secret.js.map +1 -1
- package/getAuthBackend.d.ts +13 -3
- package/getAuthBackend.js +6 -1
- package/getAuthBackend.js.map +1 -1
- package/getNomadAccessToken.d.ts +18 -2
- package/getNomadAccessToken.js +5 -0
- package/getNomadAccessToken.js.map +1 -1
- package/getPolicyDocument.d.ts +8 -1
- package/getPolicyDocument.js +5 -0
- package/getPolicyDocument.js.map +1 -1
- package/github/authBackend.d.ts +44 -35
- package/github/authBackend.js +3 -2
- package/github/authBackend.js.map +1 -1
- package/github/index.js +13 -6
- package/github/index.js.map +1 -1
- package/github/team.d.ts +24 -24
- package/github/team.js +1 -0
- package/github/team.js.map +1 -1
- package/github/user.d.ts +24 -24
- package/github/user.js +1 -0
- package/github/user.js.map +1 -1
- package/identity/entity.d.ts +10 -10
- package/identity/entity.js +1 -0
- package/identity/entity.js.map +1 -1
- package/identity/entityAlias.d.ts +6 -6
- package/identity/entityAlias.js +1 -0
- package/identity/entityAlias.js.map +1 -1
- package/identity/entityPolicies.d.ts +7 -7
- package/identity/entityPolicies.js +1 -0
- package/identity/entityPolicies.js.map +1 -1
- package/identity/getEntity.d.ts +33 -5
- package/identity/getEntity.js +5 -0
- package/identity/getEntity.js.map +1 -1
- package/identity/getGroup.d.ts +33 -5
- package/identity/getGroup.js +5 -0
- package/identity/getGroup.js.map +1 -1
- package/identity/group.d.ts +16 -16
- package/identity/group.js +1 -0
- package/identity/group.js.map +1 -1
- package/identity/groupAlias.d.ts +6 -6
- package/identity/groupAlias.js +1 -0
- package/identity/groupAlias.js.map +1 -1
- package/identity/groupMemberEntityIds.d.ts +7 -7
- package/identity/groupMemberEntityIds.js +1 -0
- package/identity/groupMemberEntityIds.js.map +1 -1
- package/identity/groupPolicies.d.ts +7 -7
- package/identity/groupPolicies.js +1 -0
- package/identity/groupPolicies.js.map +1 -1
- package/identity/index.js +23 -16
- package/identity/index.js.map +1 -1
- package/identity/oidc.d.ts +2 -2
- package/identity/oidc.js +1 -0
- package/identity/oidc.js.map +1 -1
- package/identity/oidcKey.d.ts +10 -10
- package/identity/oidcKey.js +1 -0
- package/identity/oidcKey.js.map +1 -1
- package/identity/oidcKeyAllowedClientID.d.ts +4 -4
- package/identity/oidcKeyAllowedClientID.js +1 -0
- package/identity/oidcKeyAllowedClientID.js.map +1 -1
- package/identity/oidcRole.d.ts +10 -10
- package/identity/oidcRole.js +1 -0
- package/identity/oidcRole.js.map +1 -1
- package/index.js +31 -23
- package/index.js.map +1 -1
- package/jwt/authBackend.d.ts +33 -33
- package/jwt/authBackend.js +1 -0
- package/jwt/authBackend.js.map +1 -1
- package/jwt/authBackendRole.d.ts +64 -64
- package/jwt/authBackendRole.js +1 -0
- package/jwt/authBackendRole.js.map +1 -1
- package/jwt/index.js +12 -5
- package/jwt/index.js.map +1 -1
- package/kubernetes/authBackendConfig.d.ts +16 -16
- package/kubernetes/authBackendConfig.js +1 -0
- package/kubernetes/authBackendConfig.js.map +1 -1
- package/kubernetes/authBackendRole.d.ts +40 -40
- package/kubernetes/authBackendRole.js +1 -0
- package/kubernetes/authBackendRole.js.map +1 -1
- package/kubernetes/getAuthBackendConfig.d.ts +36 -7
- package/kubernetes/getAuthBackendConfig.js +5 -0
- package/kubernetes/getAuthBackendConfig.js.map +1 -1
- package/kubernetes/getAuthBackendRole.d.ts +115 -18
- package/kubernetes/getAuthBackendRole.js +5 -0
- package/kubernetes/getAuthBackendRole.js.map +1 -1
- package/kubernetes/index.js +14 -7
- package/kubernetes/index.js.map +1 -1
- package/ldap/authBackend.d.ts +63 -63
- package/ldap/authBackend.js +1 -0
- package/ldap/authBackend.js.map +1 -1
- package/ldap/authBackendGroup.d.ts +6 -6
- package/ldap/authBackendGroup.js +1 -0
- package/ldap/authBackendGroup.js.map +1 -1
- package/ldap/authBackendUser.d.ts +8 -8
- package/ldap/authBackendUser.js +1 -0
- package/ldap/authBackendUser.js.map +1 -1
- package/ldap/index.js +13 -6
- package/ldap/index.js.map +1 -1
- package/mfaDuo.d.ts +14 -14
- package/mfaDuo.js +1 -0
- package/mfaDuo.js.map +1 -1
- package/mount.d.ts +19 -19
- package/mount.js +1 -0
- package/mount.js.map +1 -1
- package/namespace.d.ts +3 -3
- package/namespace.js +1 -0
- package/namespace.js.map +1 -1
- package/nomadSecretBackend.d.ts +26 -26
- package/nomadSecretBackend.js +1 -0
- package/nomadSecretBackend.js.map +1 -1
- package/nomadSecretRole.d.ts +10 -10
- package/nomadSecretRole.js +1 -0
- package/nomadSecretRole.js.map +1 -1
- package/okta/authBackend.d.ts +21 -21
- package/okta/authBackend.js +1 -0
- package/okta/authBackend.js.map +1 -1
- package/okta/authBackendGroup.d.ts +6 -6
- package/okta/authBackendGroup.js +1 -0
- package/okta/authBackendGroup.js.map +1 -1
- package/okta/authBackendUser.d.ts +16 -8
- package/okta/authBackendUser.js +9 -0
- package/okta/authBackendUser.js.map +1 -1
- package/okta/index.js +13 -6
- package/okta/index.js.map +1 -1
- package/package.json +4 -3
- package/package.json.bak +3 -2
- package/package.json.dev +4 -3
- package/passwordPolicy.d.ts +4 -4
- package/passwordPolicy.js +1 -0
- package/passwordPolicy.js.map +1 -1
- package/pkisecret/index.js +21 -14
- package/pkisecret/index.js.map +1 -1
- package/pkisecret/secretBackend.d.ts +8 -8
- package/pkisecret/secretBackend.js +1 -0
- package/pkisecret/secretBackend.js.map +1 -1
- package/pkisecret/secretBackendCert.d.ts +33 -33
- package/pkisecret/secretBackendCert.js +1 -0
- package/pkisecret/secretBackendCert.js.map +1 -1
- package/pkisecret/secretBackendConfigCa.d.ts +4 -4
- package/pkisecret/secretBackendConfigCa.js +1 -0
- package/pkisecret/secretBackendConfigCa.js.map +1 -1
- package/pkisecret/secretBackendConfigUrls.d.ts +10 -10
- package/pkisecret/secretBackendConfigUrls.js +3 -2
- package/pkisecret/secretBackendConfigUrls.js.map +1 -1
- package/pkisecret/secretBackendCrlConfig.d.ts +7 -7
- package/pkisecret/secretBackendCrlConfig.js +2 -1
- package/pkisecret/secretBackendCrlConfig.js.map +1 -1
- package/pkisecret/secretBackendIntermediateCertRequest.d.ts +41 -41
- package/pkisecret/secretBackendIntermediateCertRequest.js +1 -0
- package/pkisecret/secretBackendIntermediateCertRequest.js.map +1 -1
- package/pkisecret/secretBackendIntermediateSetSigned.d.ts +4 -4
- package/pkisecret/secretBackendIntermediateSetSigned.js +1 -0
- package/pkisecret/secretBackendIntermediateSetSigned.js.map +1 -1
- package/pkisecret/secretBackendRole.d.ts +78 -78
- package/pkisecret/secretBackendRole.js +3 -2
- package/pkisecret/secretBackendRole.js.map +1 -1
- package/pkisecret/secretBackendRootCert.d.ts +47 -47
- package/pkisecret/secretBackendRootCert.js +1 -0
- package/pkisecret/secretBackendRootCert.js.map +1 -1
- package/pkisecret/secretBackendRootSignIntermediate.d.ts +45 -45
- package/pkisecret/secretBackendRootSignIntermediate.js +2 -1
- package/pkisecret/secretBackendRootSignIntermediate.js.map +1 -1
- package/pkisecret/secretBackendSign.d.ts +31 -31
- package/pkisecret/secretBackendSign.js +1 -0
- package/pkisecret/secretBackendSign.js.map +1 -1
- package/policy.d.ts +4 -4
- package/policy.js +1 -0
- package/policy.js.map +1 -1
- package/provider.d.ts +41 -13
- package/provider.js +4 -3
- package/provider.js.map +1 -1
- package/quotaLeaseCount.d.ts +6 -6
- package/quotaLeaseCount.js +1 -0
- package/quotaLeaseCount.js.map +1 -1
- package/quotaRateLimit.d.ts +6 -6
- package/quotaRateLimit.js +1 -0
- package/quotaRateLimit.js.map +1 -1
- package/rabbitmq/index.js +12 -5
- package/rabbitmq/index.js.map +1 -1
- package/rabbitmq/secretBackend.d.ts +16 -16
- package/rabbitmq/secretBackend.js +1 -0
- package/rabbitmq/secretBackend.js.map +1 -1
- package/rabbitmq/secretBackendRole.d.ts +8 -8
- package/rabbitmq/secretBackendRole.js +1 -0
- package/rabbitmq/secretBackendRole.js.map +1 -1
- package/raftSnapshotAgentConfig.d.ts +54 -54
- package/raftSnapshotAgentConfig.js +1 -0
- package/raftSnapshotAgentConfig.js.map +1 -1
- package/rgpPolicy.d.ts +6 -6
- package/rgpPolicy.js +1 -0
- package/rgpPolicy.js.map +1 -1
- package/ssh/index.js +12 -5
- package/ssh/index.js.map +1 -1
- package/ssh/secretBackendCa.d.ts +8 -8
- package/ssh/secretBackendCa.js +1 -0
- package/ssh/secretBackendCa.js.map +1 -1
- package/ssh/secretBackendRole.d.ts +44 -44
- package/ssh/secretBackendRole.js +1 -0
- package/ssh/secretBackendRole.js.map +1 -1
- package/token.d.ts +34 -34
- package/token.js +1 -0
- package/token.js.map +1 -1
- package/tokenauth/authBackendRole.d.ts +39 -39
- package/tokenauth/authBackendRole.js +1 -0
- package/tokenauth/authBackendRole.js.map +1 -1
- package/tokenauth/index.js +11 -4
- package/tokenauth/index.js.map +1 -1
- package/transform/alphabet.d.ts +6 -6
- package/transform/alphabet.js +1 -0
- package/transform/alphabet.js.map +1 -1
- package/transform/getDecode.d.ts +50 -8
- package/transform/getDecode.js +5 -0
- package/transform/getDecode.js.map +1 -1
- package/transform/getEncode.d.ts +50 -8
- package/transform/getEncode.js +5 -0
- package/transform/getEncode.js.map +1 -1
- package/transform/index.js +16 -9
- package/transform/index.js.map +1 -1
- package/transform/role.d.ts +6 -6
- package/transform/role.js +1 -0
- package/transform/role.js.map +1 -1
- package/transform/template.d.ts +10 -10
- package/transform/template.js +1 -0
- package/transform/template.js.map +1 -1
- package/transform/transformation.d.ts +16 -16
- package/transform/transformation.js +1 -0
- package/transform/transformation.js.map +1 -1
- package/transit/getDecrypt.d.ts +27 -5
- package/transit/getDecrypt.js +6 -1
- package/transit/getDecrypt.js.map +1 -1
- package/transit/getEncrypt.d.ts +31 -5
- package/transit/getEncrypt.js +5 -0
- package/transit/getEncrypt.js.map +1 -1
- package/transit/index.js +14 -7
- package/transit/index.js.map +1 -1
- package/transit/secretBackendKey.d.ts +27 -27
- package/transit/secretBackendKey.js +1 -0
- package/transit/secretBackendKey.js.map +1 -1
- package/transit/secretCacheConfig.d.ts +4 -4
- package/transit/secretCacheConfig.js +1 -0
- package/transit/secretCacheConfig.js.map +1 -1
- package/types/index.js +1 -0
- package/types/index.js.map +1 -1
- package/types/input.d.ts +54 -0
- package/types/output.d.ts +0 -16
- package/utilities.js +1 -0
- package/utilities.js.map +1 -1
|
@@ -122,82 +122,82 @@ export interface SecretBackendConnectionState {
|
|
|
122
122
|
* A list of roles that are allowed to use this
|
|
123
123
|
* connection.
|
|
124
124
|
*/
|
|
125
|
-
|
|
125
|
+
allowedRoles?: pulumi.Input<pulumi.Input<string>[]>;
|
|
126
126
|
/**
|
|
127
127
|
* The unique name of the Vault mount to configure.
|
|
128
128
|
*/
|
|
129
|
-
|
|
129
|
+
backend?: pulumi.Input<string>;
|
|
130
130
|
/**
|
|
131
131
|
* A nested block containing configuration options for Cassandra connections.
|
|
132
132
|
*/
|
|
133
|
-
|
|
133
|
+
cassandra?: pulumi.Input<inputs.database.SecretBackendConnectionCassandra>;
|
|
134
134
|
/**
|
|
135
135
|
* A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
|
136
136
|
*/
|
|
137
|
-
|
|
137
|
+
data?: pulumi.Input<{
|
|
138
138
|
[key: string]: any;
|
|
139
139
|
}>;
|
|
140
140
|
/**
|
|
141
141
|
* A nested block containing configuration options for Elasticsearch connections.
|
|
142
142
|
*/
|
|
143
|
-
|
|
143
|
+
elasticsearch?: pulumi.Input<inputs.database.SecretBackendConnectionElasticsearch>;
|
|
144
144
|
/**
|
|
145
145
|
* A nested block containing configuration options for SAP HanaDB connections.
|
|
146
146
|
*/
|
|
147
|
-
|
|
147
|
+
hana?: pulumi.Input<inputs.database.SecretBackendConnectionHana>;
|
|
148
148
|
/**
|
|
149
149
|
* A nested block containing configuration options for MongoDB connections.
|
|
150
150
|
*/
|
|
151
|
-
|
|
151
|
+
mongodb?: pulumi.Input<inputs.database.SecretBackendConnectionMongodb>;
|
|
152
152
|
/**
|
|
153
153
|
* A nested block containing configuration options for MongoDB Atlas connections.
|
|
154
154
|
*/
|
|
155
|
-
|
|
155
|
+
mongodbatlas?: pulumi.Input<inputs.database.SecretBackendConnectionMongodbatlas>;
|
|
156
156
|
/**
|
|
157
157
|
* A nested block containing configuration options for MSSQL connections.
|
|
158
158
|
*/
|
|
159
|
-
|
|
159
|
+
mssql?: pulumi.Input<inputs.database.SecretBackendConnectionMssql>;
|
|
160
160
|
/**
|
|
161
161
|
* A nested block containing configuration options for MySQL connections.
|
|
162
162
|
*/
|
|
163
|
-
|
|
163
|
+
mysql?: pulumi.Input<inputs.database.SecretBackendConnectionMysql>;
|
|
164
164
|
/**
|
|
165
165
|
* A nested block containing configuration options for Aurora MySQL connections.
|
|
166
166
|
*/
|
|
167
|
-
|
|
167
|
+
mysqlAurora?: pulumi.Input<inputs.database.SecretBackendConnectionMysqlAurora>;
|
|
168
168
|
/**
|
|
169
169
|
* A nested block containing configuration options for legacy MySQL connections.
|
|
170
170
|
*/
|
|
171
|
-
|
|
171
|
+
mysqlLegacy?: pulumi.Input<inputs.database.SecretBackendConnectionMysqlLegacy>;
|
|
172
172
|
/**
|
|
173
173
|
* A nested block containing configuration options for RDS MySQL connections.
|
|
174
174
|
*/
|
|
175
|
-
|
|
175
|
+
mysqlRds?: pulumi.Input<inputs.database.SecretBackendConnectionMysqlRds>;
|
|
176
176
|
/**
|
|
177
177
|
* A unique name to give the database connection.
|
|
178
178
|
*/
|
|
179
|
-
|
|
179
|
+
name?: pulumi.Input<string>;
|
|
180
180
|
/**
|
|
181
181
|
* A nested block containing configuration options for Oracle connections.
|
|
182
182
|
*/
|
|
183
|
-
|
|
183
|
+
oracle?: pulumi.Input<inputs.database.SecretBackendConnectionOracle>;
|
|
184
184
|
/**
|
|
185
185
|
* A nested block containing configuration options for PostgreSQL connections.
|
|
186
186
|
*/
|
|
187
|
-
|
|
187
|
+
postgresql?: pulumi.Input<inputs.database.SecretBackendConnectionPostgresql>;
|
|
188
188
|
/**
|
|
189
189
|
* A list of database statements to be executed to rotate the root user's credentials.
|
|
190
190
|
*/
|
|
191
|
-
|
|
191
|
+
rootRotationStatements?: pulumi.Input<pulumi.Input<string>[]>;
|
|
192
192
|
/**
|
|
193
193
|
* A nested block containing configuration options for Snowflake connections.
|
|
194
194
|
*/
|
|
195
|
-
|
|
195
|
+
snowflake?: pulumi.Input<inputs.database.SecretBackendConnectionSnowflake>;
|
|
196
196
|
/**
|
|
197
197
|
* Whether the connection should be verified on
|
|
198
198
|
* initial configuration or not.
|
|
199
199
|
*/
|
|
200
|
-
|
|
200
|
+
verifyConnection?: pulumi.Input<boolean>;
|
|
201
201
|
}
|
|
202
202
|
/**
|
|
203
203
|
* The set of arguments for constructing a SecretBackendConnection resource.
|
|
@@ -207,80 +207,80 @@ export interface SecretBackendConnectionArgs {
|
|
|
207
207
|
* A list of roles that are allowed to use this
|
|
208
208
|
* connection.
|
|
209
209
|
*/
|
|
210
|
-
|
|
210
|
+
allowedRoles?: pulumi.Input<pulumi.Input<string>[]>;
|
|
211
211
|
/**
|
|
212
212
|
* The unique name of the Vault mount to configure.
|
|
213
213
|
*/
|
|
214
|
-
|
|
214
|
+
backend: pulumi.Input<string>;
|
|
215
215
|
/**
|
|
216
216
|
* A nested block containing configuration options for Cassandra connections.
|
|
217
217
|
*/
|
|
218
|
-
|
|
218
|
+
cassandra?: pulumi.Input<inputs.database.SecretBackendConnectionCassandra>;
|
|
219
219
|
/**
|
|
220
220
|
* A map of sensitive data to pass to the endpoint. Useful for templated connection strings.
|
|
221
221
|
*/
|
|
222
|
-
|
|
222
|
+
data?: pulumi.Input<{
|
|
223
223
|
[key: string]: any;
|
|
224
224
|
}>;
|
|
225
225
|
/**
|
|
226
226
|
* A nested block containing configuration options for Elasticsearch connections.
|
|
227
227
|
*/
|
|
228
|
-
|
|
228
|
+
elasticsearch?: pulumi.Input<inputs.database.SecretBackendConnectionElasticsearch>;
|
|
229
229
|
/**
|
|
230
230
|
* A nested block containing configuration options for SAP HanaDB connections.
|
|
231
231
|
*/
|
|
232
|
-
|
|
232
|
+
hana?: pulumi.Input<inputs.database.SecretBackendConnectionHana>;
|
|
233
233
|
/**
|
|
234
234
|
* A nested block containing configuration options for MongoDB connections.
|
|
235
235
|
*/
|
|
236
|
-
|
|
236
|
+
mongodb?: pulumi.Input<inputs.database.SecretBackendConnectionMongodb>;
|
|
237
237
|
/**
|
|
238
238
|
* A nested block containing configuration options for MongoDB Atlas connections.
|
|
239
239
|
*/
|
|
240
|
-
|
|
240
|
+
mongodbatlas?: pulumi.Input<inputs.database.SecretBackendConnectionMongodbatlas>;
|
|
241
241
|
/**
|
|
242
242
|
* A nested block containing configuration options for MSSQL connections.
|
|
243
243
|
*/
|
|
244
|
-
|
|
244
|
+
mssql?: pulumi.Input<inputs.database.SecretBackendConnectionMssql>;
|
|
245
245
|
/**
|
|
246
246
|
* A nested block containing configuration options for MySQL connections.
|
|
247
247
|
*/
|
|
248
|
-
|
|
248
|
+
mysql?: pulumi.Input<inputs.database.SecretBackendConnectionMysql>;
|
|
249
249
|
/**
|
|
250
250
|
* A nested block containing configuration options for Aurora MySQL connections.
|
|
251
251
|
*/
|
|
252
|
-
|
|
252
|
+
mysqlAurora?: pulumi.Input<inputs.database.SecretBackendConnectionMysqlAurora>;
|
|
253
253
|
/**
|
|
254
254
|
* A nested block containing configuration options for legacy MySQL connections.
|
|
255
255
|
*/
|
|
256
|
-
|
|
256
|
+
mysqlLegacy?: pulumi.Input<inputs.database.SecretBackendConnectionMysqlLegacy>;
|
|
257
257
|
/**
|
|
258
258
|
* A nested block containing configuration options for RDS MySQL connections.
|
|
259
259
|
*/
|
|
260
|
-
|
|
260
|
+
mysqlRds?: pulumi.Input<inputs.database.SecretBackendConnectionMysqlRds>;
|
|
261
261
|
/**
|
|
262
262
|
* A unique name to give the database connection.
|
|
263
263
|
*/
|
|
264
|
-
|
|
264
|
+
name?: pulumi.Input<string>;
|
|
265
265
|
/**
|
|
266
266
|
* A nested block containing configuration options for Oracle connections.
|
|
267
267
|
*/
|
|
268
|
-
|
|
268
|
+
oracle?: pulumi.Input<inputs.database.SecretBackendConnectionOracle>;
|
|
269
269
|
/**
|
|
270
270
|
* A nested block containing configuration options for PostgreSQL connections.
|
|
271
271
|
*/
|
|
272
|
-
|
|
272
|
+
postgresql?: pulumi.Input<inputs.database.SecretBackendConnectionPostgresql>;
|
|
273
273
|
/**
|
|
274
274
|
* A list of database statements to be executed to rotate the root user's credentials.
|
|
275
275
|
*/
|
|
276
|
-
|
|
276
|
+
rootRotationStatements?: pulumi.Input<pulumi.Input<string>[]>;
|
|
277
277
|
/**
|
|
278
278
|
* A nested block containing configuration options for Snowflake connections.
|
|
279
279
|
*/
|
|
280
|
-
|
|
280
|
+
snowflake?: pulumi.Input<inputs.database.SecretBackendConnectionSnowflake>;
|
|
281
281
|
/**
|
|
282
282
|
* Whether the connection should be verified on
|
|
283
283
|
* initial configuration or not.
|
|
284
284
|
*/
|
|
285
|
-
|
|
285
|
+
verifyConnection?: pulumi.Input<boolean>;
|
|
286
286
|
}
|
|
@@ -2,6 +2,7 @@
|
|
|
2
2
|
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
3
|
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
4
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.SecretBackendConnection = void 0;
|
|
5
6
|
const pulumi = require("@pulumi/pulumi");
|
|
6
7
|
const utilities = require("../utilities");
|
|
7
8
|
/**
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretBackendConnection.js","sourceRoot":"","sources":["../../database/secretBackendConnection.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF
|
|
1
|
+
{"version":3,"file":"secretBackendConnection.js","sourceRoot":"","sources":["../../database/secretBackendConnection.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAEzC,0CAA0C;AAE1C;;;;;;;;GAQG;AACH,MAAa,uBAAwB,SAAQ,MAAM,CAAC,cAAc;IAmH9D,YAAY,IAAY,EAAE,WAAwE,EAAE,IAAmC;QACnI,IAAI,MAAM,GAAkB,EAAE,CAAC;QAC/B,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAuD,CAAC;YACtE,MAAM,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,MAAM,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,MAAM,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,MAAM,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,MAAM,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3E;aAAM;YACH,MAAM,IAAI,GAAG,WAAsD,CAAC;YACpE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,MAAM,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9C,MAAM,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,MAAM,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9C,MAAM,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9C,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,MAAM,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;SACzE;QACD,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;YACf,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE,EAAC,CAAC,CAAC;SACxE;QACD,KAAK,CAAC,uBAAuB,CAAC,YAAY,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,CAAC,CAAC;IACpE,CAAC;IAvKD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAoC,EAAE,IAAmC;QAClI,OAAO,IAAI,uBAAuB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC9E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,uBAAuB,CAAC,YAAY,CAAC;IACxE,CAAC;;AA1BL,0DAyKC;AA3JG,gBAAgB;AACO,oCAAY,GAAG,gEAAgE,CAAC"}
|
|
@@ -83,46 +83,46 @@ export interface SecretBackendRoleState {
|
|
|
83
83
|
/**
|
|
84
84
|
* The unique name of the Vault mount to configure.
|
|
85
85
|
*/
|
|
86
|
-
|
|
86
|
+
backend?: pulumi.Input<string>;
|
|
87
87
|
/**
|
|
88
88
|
* The database statements to execute when
|
|
89
89
|
* creating a user.
|
|
90
90
|
*/
|
|
91
|
-
|
|
91
|
+
creationStatements?: pulumi.Input<pulumi.Input<string>[]>;
|
|
92
92
|
/**
|
|
93
93
|
* The unique name of the database connection to use for
|
|
94
94
|
* the role.
|
|
95
95
|
*/
|
|
96
|
-
|
|
96
|
+
dbName?: pulumi.Input<string>;
|
|
97
97
|
/**
|
|
98
98
|
* The default number of seconds for leases for this
|
|
99
99
|
* role.
|
|
100
100
|
*/
|
|
101
|
-
|
|
101
|
+
defaultTtl?: pulumi.Input<number>;
|
|
102
102
|
/**
|
|
103
103
|
* The maximum number of seconds for leases for this
|
|
104
104
|
* role.
|
|
105
105
|
*/
|
|
106
|
-
|
|
106
|
+
maxTtl?: pulumi.Input<number>;
|
|
107
107
|
/**
|
|
108
108
|
* A unique name to give the role.
|
|
109
109
|
*/
|
|
110
|
-
|
|
110
|
+
name?: pulumi.Input<string>;
|
|
111
111
|
/**
|
|
112
112
|
* The database statements to execute when
|
|
113
113
|
* renewing a user.
|
|
114
114
|
*/
|
|
115
|
-
|
|
115
|
+
renewStatements?: pulumi.Input<pulumi.Input<string>[]>;
|
|
116
116
|
/**
|
|
117
117
|
* The database statements to execute when
|
|
118
118
|
* revoking a user.
|
|
119
119
|
*/
|
|
120
|
-
|
|
120
|
+
revocationStatements?: pulumi.Input<pulumi.Input<string>[]>;
|
|
121
121
|
/**
|
|
122
122
|
* The database statements to execute when
|
|
123
123
|
* rolling back creation due to an error.
|
|
124
124
|
*/
|
|
125
|
-
|
|
125
|
+
rollbackStatements?: pulumi.Input<pulumi.Input<string>[]>;
|
|
126
126
|
}
|
|
127
127
|
/**
|
|
128
128
|
* The set of arguments for constructing a SecretBackendRole resource.
|
|
@@ -131,44 +131,44 @@ export interface SecretBackendRoleArgs {
|
|
|
131
131
|
/**
|
|
132
132
|
* The unique name of the Vault mount to configure.
|
|
133
133
|
*/
|
|
134
|
-
|
|
134
|
+
backend: pulumi.Input<string>;
|
|
135
135
|
/**
|
|
136
136
|
* The database statements to execute when
|
|
137
137
|
* creating a user.
|
|
138
138
|
*/
|
|
139
|
-
|
|
139
|
+
creationStatements: pulumi.Input<pulumi.Input<string>[]>;
|
|
140
140
|
/**
|
|
141
141
|
* The unique name of the database connection to use for
|
|
142
142
|
* the role.
|
|
143
143
|
*/
|
|
144
|
-
|
|
144
|
+
dbName: pulumi.Input<string>;
|
|
145
145
|
/**
|
|
146
146
|
* The default number of seconds for leases for this
|
|
147
147
|
* role.
|
|
148
148
|
*/
|
|
149
|
-
|
|
149
|
+
defaultTtl?: pulumi.Input<number>;
|
|
150
150
|
/**
|
|
151
151
|
* The maximum number of seconds for leases for this
|
|
152
152
|
* role.
|
|
153
153
|
*/
|
|
154
|
-
|
|
154
|
+
maxTtl?: pulumi.Input<number>;
|
|
155
155
|
/**
|
|
156
156
|
* A unique name to give the role.
|
|
157
157
|
*/
|
|
158
|
-
|
|
158
|
+
name?: pulumi.Input<string>;
|
|
159
159
|
/**
|
|
160
160
|
* The database statements to execute when
|
|
161
161
|
* renewing a user.
|
|
162
162
|
*/
|
|
163
|
-
|
|
163
|
+
renewStatements?: pulumi.Input<pulumi.Input<string>[]>;
|
|
164
164
|
/**
|
|
165
165
|
* The database statements to execute when
|
|
166
166
|
* revoking a user.
|
|
167
167
|
*/
|
|
168
|
-
|
|
168
|
+
revocationStatements?: pulumi.Input<pulumi.Input<string>[]>;
|
|
169
169
|
/**
|
|
170
170
|
* The database statements to execute when
|
|
171
171
|
* rolling back creation due to an error.
|
|
172
172
|
*/
|
|
173
|
-
|
|
173
|
+
rollbackStatements?: pulumi.Input<pulumi.Input<string>[]>;
|
|
174
174
|
}
|
|
@@ -2,6 +2,7 @@
|
|
|
2
2
|
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
3
|
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
4
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.SecretBackendRole = void 0;
|
|
5
6
|
const pulumi = require("@pulumi/pulumi");
|
|
6
7
|
const utilities = require("../utilities");
|
|
7
8
|
/**
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretBackendRole.js","sourceRoot":"","sources":["../../database/secretBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF
|
|
1
|
+
{"version":3,"file":"secretBackendRole.js","sourceRoot":"","sources":["../../database/secretBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;GAQG;AACH,MAAa,iBAAkB,SAAQ,MAAM,CAAC,cAAc;IAgFxD,YAAY,IAAY,EAAE,WAA4D,EAAE,IAAmC;QACvH,IAAI,MAAM,GAAkB,EAAE,CAAC;QAC/B,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAiD,CAAC;YAChE,MAAM,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,MAAM,CAAC,sBAAsB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,MAAM,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/E;aAAM;YACH,MAAM,IAAI,GAAG,WAAgD,CAAC;YAC9D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,kBAAkB,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC/D,MAAM,IAAI,KAAK,CAAC,gDAAgD,CAAC,CAAC;aACrE;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,MAAM,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9C,MAAM,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,MAAM,CAAC,sBAAsB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,MAAM,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7E;QACD,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;YACf,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE,EAAC,CAAC,CAAC;SACxE;QACD,KAAK,CAAC,iBAAiB,CAAC,YAAY,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,CAAC,CAAC;IAC9D,CAAC;IAtHD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA8B,EAAE,IAAmC;QAC5H,OAAO,IAAI,iBAAiB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACxE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,iBAAiB,CAAC,YAAY,CAAC;IAClE,CAAC;;AA1BL,8CAwHC;AA1GG,gBAAgB;AACO,8BAAY,GAAG,oDAAoD,CAAC"}
|
|
@@ -94,27 +94,27 @@ export interface SecretBackendStaticRoleState {
|
|
|
94
94
|
/**
|
|
95
95
|
* The unique name of the Vault mount to configure.
|
|
96
96
|
*/
|
|
97
|
-
|
|
97
|
+
backend?: pulumi.Input<string>;
|
|
98
98
|
/**
|
|
99
99
|
* The unique name of the database connection to use for the static role.
|
|
100
100
|
*/
|
|
101
|
-
|
|
101
|
+
dbName?: pulumi.Input<string>;
|
|
102
102
|
/**
|
|
103
103
|
* A unique name to give the static role.
|
|
104
104
|
*/
|
|
105
|
-
|
|
105
|
+
name?: pulumi.Input<string>;
|
|
106
106
|
/**
|
|
107
107
|
* The amount of time Vault should wait before rotating the password, in seconds.
|
|
108
108
|
*/
|
|
109
|
-
|
|
109
|
+
rotationPeriod?: pulumi.Input<number>;
|
|
110
110
|
/**
|
|
111
111
|
* Database statements to execute to rotate the password for the configured database user.
|
|
112
112
|
*/
|
|
113
|
-
|
|
113
|
+
rotationStatements?: pulumi.Input<pulumi.Input<string>[]>;
|
|
114
114
|
/**
|
|
115
115
|
* The database username that this static role corresponds to.
|
|
116
116
|
*/
|
|
117
|
-
|
|
117
|
+
username?: pulumi.Input<string>;
|
|
118
118
|
}
|
|
119
119
|
/**
|
|
120
120
|
* The set of arguments for constructing a SecretBackendStaticRole resource.
|
|
@@ -123,25 +123,25 @@ export interface SecretBackendStaticRoleArgs {
|
|
|
123
123
|
/**
|
|
124
124
|
* The unique name of the Vault mount to configure.
|
|
125
125
|
*/
|
|
126
|
-
|
|
126
|
+
backend: pulumi.Input<string>;
|
|
127
127
|
/**
|
|
128
128
|
* The unique name of the database connection to use for the static role.
|
|
129
129
|
*/
|
|
130
|
-
|
|
130
|
+
dbName: pulumi.Input<string>;
|
|
131
131
|
/**
|
|
132
132
|
* A unique name to give the static role.
|
|
133
133
|
*/
|
|
134
|
-
|
|
134
|
+
name?: pulumi.Input<string>;
|
|
135
135
|
/**
|
|
136
136
|
* The amount of time Vault should wait before rotating the password, in seconds.
|
|
137
137
|
*/
|
|
138
|
-
|
|
138
|
+
rotationPeriod: pulumi.Input<number>;
|
|
139
139
|
/**
|
|
140
140
|
* Database statements to execute to rotate the password for the configured database user.
|
|
141
141
|
*/
|
|
142
|
-
|
|
142
|
+
rotationStatements?: pulumi.Input<pulumi.Input<string>[]>;
|
|
143
143
|
/**
|
|
144
144
|
* The database username that this static role corresponds to.
|
|
145
145
|
*/
|
|
146
|
-
|
|
146
|
+
username: pulumi.Input<string>;
|
|
147
147
|
}
|
|
@@ -2,6 +2,7 @@
|
|
|
2
2
|
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
3
|
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
4
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.SecretBackendStaticRole = void 0;
|
|
5
6
|
const pulumi = require("@pulumi/pulumi");
|
|
6
7
|
const utilities = require("../utilities");
|
|
7
8
|
/**
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretBackendStaticRole.js","sourceRoot":"","sources":["../../database/secretBackendStaticRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF
|
|
1
|
+
{"version":3,"file":"secretBackendStaticRole.js","sourceRoot":"","sources":["../../database/secretBackendStaticRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAsCG;AACH,MAAa,uBAAwB,SAAQ,MAAM,CAAC,cAAc;IA6D9D,YAAY,IAAY,EAAE,WAAwE,EAAE,IAAmC;QACnI,IAAI,MAAM,GAAkB,EAAE,CAAC;QAC/B,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAuD,CAAC;YACtE,MAAM,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,MAAM,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,MAAM,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3D;aAAM;YACH,MAAM,IAAI,GAAG,WAAsD,CAAC;YACpE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,cAAc,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC3D,MAAM,IAAI,KAAK,CAAC,4CAA4C,CAAC,CAAC;aACjE;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,MAAM,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9C,MAAM,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,MAAM,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,MAAM,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;SACzD;QACD,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;YACf,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE,EAAC,CAAC,CAAC;SACxE;QACD,KAAK,CAAC,uBAAuB,CAAC,YAAY,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,CAAC,CAAC;IACpE,CAAC;IAhGD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAoC,EAAE,IAAmC;QAClI,OAAO,IAAI,uBAAuB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC9E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,uBAAuB,CAAC,YAAY,CAAC;IACxE,CAAC;;AA1BL,0DAkGC;AApFG,gBAAgB;AACO,oCAAY,GAAG,gEAAgE,CAAC"}
|
package/egpPolicy.d.ts
CHANGED
|
@@ -68,19 +68,19 @@ export interface EgpPolicyState {
|
|
|
68
68
|
/**
|
|
69
69
|
* Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
|
|
70
70
|
*/
|
|
71
|
-
|
|
71
|
+
enforcementLevel?: pulumi.Input<string>;
|
|
72
72
|
/**
|
|
73
73
|
* The name of the policy
|
|
74
74
|
*/
|
|
75
|
-
|
|
75
|
+
name?: pulumi.Input<string>;
|
|
76
76
|
/**
|
|
77
77
|
* List of paths to which the policy will be applied to
|
|
78
78
|
*/
|
|
79
|
-
|
|
79
|
+
paths?: pulumi.Input<pulumi.Input<string>[]>;
|
|
80
80
|
/**
|
|
81
81
|
* String containing a Sentinel policy
|
|
82
82
|
*/
|
|
83
|
-
|
|
83
|
+
policy?: pulumi.Input<string>;
|
|
84
84
|
}
|
|
85
85
|
/**
|
|
86
86
|
* The set of arguments for constructing a EgpPolicy resource.
|
|
@@ -89,17 +89,17 @@ export interface EgpPolicyArgs {
|
|
|
89
89
|
/**
|
|
90
90
|
* Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
|
|
91
91
|
*/
|
|
92
|
-
|
|
92
|
+
enforcementLevel: pulumi.Input<string>;
|
|
93
93
|
/**
|
|
94
94
|
* The name of the policy
|
|
95
95
|
*/
|
|
96
|
-
|
|
96
|
+
name?: pulumi.Input<string>;
|
|
97
97
|
/**
|
|
98
98
|
* List of paths to which the policy will be applied to
|
|
99
99
|
*/
|
|
100
|
-
|
|
100
|
+
paths: pulumi.Input<pulumi.Input<string>[]>;
|
|
101
101
|
/**
|
|
102
102
|
* String containing a Sentinel policy
|
|
103
103
|
*/
|
|
104
|
-
|
|
104
|
+
policy: pulumi.Input<string>;
|
|
105
105
|
}
|
package/egpPolicy.js
CHANGED
|
@@ -2,6 +2,7 @@
|
|
|
2
2
|
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
3
|
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
4
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.EgpPolicy = void 0;
|
|
5
6
|
const pulumi = require("@pulumi/pulumi");
|
|
6
7
|
const utilities = require("./utilities");
|
|
7
8
|
/**
|
package/egpPolicy.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"egpPolicy.js","sourceRoot":"","sources":["../egpPolicy.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF
|
|
1
|
+
{"version":3,"file":"egpPolicy.js","sourceRoot":"","sources":["../egpPolicy.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;GAoBG;AACH,MAAa,SAAU,SAAQ,MAAM,CAAC,cAAc;IAqDhD,YAAY,IAAY,EAAE,WAA4C,EAAE,IAAmC;QACvG,IAAI,MAAM,GAAkB,EAAE,CAAC;QAC/B,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAyC,CAAC;YACxD,MAAM,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,MAAM,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SACvD;aAAM;YACH,MAAM,IAAI,GAAG,WAAwC,CAAC;YACtD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,gBAAgB,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7D,MAAM,IAAI,KAAK,CAAC,8CAA8C,CAAC,CAAC;aACnE;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,KAAK,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,MAAM,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,MAAM,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9C,MAAM,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SACrD;QACD,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;YACf,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE,EAAC,CAAC,CAAC;SACxE;QACD,KAAK,CAAC,SAAS,CAAC,YAAY,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,CAAC,CAAC;IACtD,CAAC;IAjFD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAsB,EAAE,IAAmC;QACpH,OAAO,IAAI,SAAS,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAChE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,SAAS,CAAC,YAAY,CAAC;IAC1D,CAAC;;AA1BL,8BAmFC;AArEG,gBAAgB;AACO,sBAAY,GAAG,iCAAiC,CAAC"}
|
package/gcp/authBackend.d.ts
CHANGED
|
@@ -84,35 +84,35 @@ export interface AuthBackendState {
|
|
|
84
84
|
/**
|
|
85
85
|
* The clients email associated with the credentials
|
|
86
86
|
*/
|
|
87
|
-
|
|
87
|
+
clientEmail?: pulumi.Input<string>;
|
|
88
88
|
/**
|
|
89
89
|
* The Client ID of the credentials
|
|
90
90
|
*/
|
|
91
|
-
|
|
91
|
+
clientId?: pulumi.Input<string>;
|
|
92
92
|
/**
|
|
93
93
|
* A JSON string containing the contents of a GCP credentials file. If this value is empty, Vault will try to use Application Default Credentials from the machine on which the Vault server is running.
|
|
94
94
|
*/
|
|
95
|
-
|
|
95
|
+
credentials?: pulumi.Input<string>;
|
|
96
96
|
/**
|
|
97
97
|
* A description of the auth method.
|
|
98
98
|
*/
|
|
99
|
-
|
|
99
|
+
description?: pulumi.Input<string>;
|
|
100
100
|
/**
|
|
101
101
|
* Specifies if the auth method is local only.
|
|
102
102
|
*/
|
|
103
|
-
|
|
103
|
+
local?: pulumi.Input<boolean>;
|
|
104
104
|
/**
|
|
105
105
|
* The path to mount the auth method — this defaults to 'gcp'.
|
|
106
106
|
*/
|
|
107
|
-
|
|
107
|
+
path?: pulumi.Input<string>;
|
|
108
108
|
/**
|
|
109
109
|
* The ID of the private key from the credentials
|
|
110
110
|
*/
|
|
111
|
-
|
|
111
|
+
privateKeyId?: pulumi.Input<string>;
|
|
112
112
|
/**
|
|
113
113
|
* The GCP Project ID
|
|
114
114
|
*/
|
|
115
|
-
|
|
115
|
+
projectId?: pulumi.Input<string>;
|
|
116
116
|
}
|
|
117
117
|
/**
|
|
118
118
|
* The set of arguments for constructing a AuthBackend resource.
|
|
@@ -121,33 +121,33 @@ export interface AuthBackendArgs {
|
|
|
121
121
|
/**
|
|
122
122
|
* The clients email associated with the credentials
|
|
123
123
|
*/
|
|
124
|
-
|
|
124
|
+
clientEmail?: pulumi.Input<string>;
|
|
125
125
|
/**
|
|
126
126
|
* The Client ID of the credentials
|
|
127
127
|
*/
|
|
128
|
-
|
|
128
|
+
clientId?: pulumi.Input<string>;
|
|
129
129
|
/**
|
|
130
130
|
* A JSON string containing the contents of a GCP credentials file. If this value is empty, Vault will try to use Application Default Credentials from the machine on which the Vault server is running.
|
|
131
131
|
*/
|
|
132
|
-
|
|
132
|
+
credentials?: pulumi.Input<string>;
|
|
133
133
|
/**
|
|
134
134
|
* A description of the auth method.
|
|
135
135
|
*/
|
|
136
|
-
|
|
136
|
+
description?: pulumi.Input<string>;
|
|
137
137
|
/**
|
|
138
138
|
* Specifies if the auth method is local only.
|
|
139
139
|
*/
|
|
140
|
-
|
|
140
|
+
local?: pulumi.Input<boolean>;
|
|
141
141
|
/**
|
|
142
142
|
* The path to mount the auth method — this defaults to 'gcp'.
|
|
143
143
|
*/
|
|
144
|
-
|
|
144
|
+
path?: pulumi.Input<string>;
|
|
145
145
|
/**
|
|
146
146
|
* The ID of the private key from the credentials
|
|
147
147
|
*/
|
|
148
|
-
|
|
148
|
+
privateKeyId?: pulumi.Input<string>;
|
|
149
149
|
/**
|
|
150
150
|
* The GCP Project ID
|
|
151
151
|
*/
|
|
152
|
-
|
|
152
|
+
projectId?: pulumi.Input<string>;
|
|
153
153
|
}
|
package/gcp/authBackend.js
CHANGED
|
@@ -2,6 +2,7 @@
|
|
|
2
2
|
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
3
|
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
4
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.AuthBackend = void 0;
|
|
5
6
|
const pulumi = require("@pulumi/pulumi");
|
|
6
7
|
const utilities = require("../utilities");
|
|
7
8
|
/**
|
package/gcp/authBackend.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"authBackend.js","sourceRoot":"","sources":["../../gcp/authBackend.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF
|
|
1
|
+
{"version":3,"file":"authBackend.js","sourceRoot":"","sources":["../../gcp/authBackend.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;GAoBG;AACH,MAAa,WAAY,SAAQ,MAAM,CAAC,cAAc;IAqElD,YAAY,IAAY,EAAE,WAAgD,EAAE,IAAmC;QAC3G,IAAI,MAAM,GAAkB,EAAE,CAAC;QAC/B,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA2C,CAAC;YAC1D,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,MAAM,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7D;aAAM;YACH,MAAM,IAAI,GAAG,WAA0C,CAAC;YACxD,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9C,MAAM,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3D;QACD,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;YACf,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE,EAAC,CAAC,CAAC;SACxE;QACD,KAAK,CAAC,WAAW,CAAC,YAAY,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,CAAC,CAAC;IACxD,CAAC;IAhGD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAwB,EAAE,IAAmC;QACtH,OAAO,IAAI,WAAW,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAClE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,WAAW,CAAC,YAAY,CAAC;IAC5D,CAAC;;AA1BL,kCAkGC;AApFG,gBAAgB;AACO,wBAAY,GAAG,mCAAmC,CAAC"}
|