@pulumi/vault 4.5.0 → 4.6.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (398) hide show
  1. package/README.md +1 -1
  2. package/ad/getAccessCredentials.d.ts +18 -2
  3. package/ad/getAccessCredentials.js +5 -0
  4. package/ad/getAccessCredentials.js.map +1 -1
  5. package/ad/index.js +14 -7
  6. package/ad/index.js.map +1 -1
  7. package/ad/secretBackend.d.ts +68 -68
  8. package/ad/secretBackend.js +1 -0
  9. package/ad/secretBackend.js.map +1 -1
  10. package/ad/secretLibrary.d.ts +12 -12
  11. package/ad/secretLibrary.js +1 -0
  12. package/ad/secretLibrary.js.map +1 -1
  13. package/ad/secretRole.d.ts +10 -10
  14. package/ad/secretRole.js +1 -0
  15. package/ad/secretRole.js.map +1 -1
  16. package/alicloud/authBackendRole.d.ts +24 -24
  17. package/alicloud/authBackendRole.js +1 -0
  18. package/alicloud/authBackendRole.js.map +1 -1
  19. package/alicloud/index.js +11 -4
  20. package/alicloud/index.js.map +1 -1
  21. package/approle/authBackendLogin.d.ts +16 -16
  22. package/approle/authBackendLogin.js +4 -3
  23. package/approle/authBackendLogin.js.map +1 -1
  24. package/approle/authBackendRole.d.ts +39 -39
  25. package/approle/authBackendRole.js +2 -1
  26. package/approle/authBackendRole.js.map +1 -1
  27. package/approle/authBackendRoleSecretID.d.ts +17 -17
  28. package/approle/authBackendRoleSecretID.js +3 -2
  29. package/approle/authBackendRoleSecretID.js.map +1 -1
  30. package/approle/getAuthBackendRoleId.d.ts +17 -2
  31. package/approle/getAuthBackendRoleId.js +5 -0
  32. package/approle/getAuthBackendRoleId.js.map +1 -1
  33. package/approle/index.js +14 -7
  34. package/approle/index.js.map +1 -1
  35. package/audit.d.ts +10 -10
  36. package/audit.js +1 -0
  37. package/audit.js.map +1 -1
  38. package/authBackend.d.ts +17 -17
  39. package/authBackend.js +1 -0
  40. package/authBackend.js.map +1 -1
  41. package/aws/authBackendCert.d.ts +8 -8
  42. package/aws/authBackendCert.js +1 -0
  43. package/aws/authBackendCert.js.map +1 -1
  44. package/aws/authBackendClient.d.ts +16 -16
  45. package/aws/authBackendClient.js +1 -0
  46. package/aws/authBackendClient.js.map +1 -1
  47. package/aws/authBackendIdentityWhitelist.d.ts +6 -6
  48. package/aws/authBackendIdentityWhitelist.js +1 -0
  49. package/aws/authBackendIdentityWhitelist.js.map +1 -1
  50. package/aws/authBackendLogin.d.ts +28 -28
  51. package/aws/authBackendLogin.js +1 -0
  52. package/aws/authBackendLogin.js.map +1 -1
  53. package/aws/authBackendRole.d.ts +62 -62
  54. package/aws/authBackendRole.js +1 -0
  55. package/aws/authBackendRole.js.map +1 -1
  56. package/aws/authBackendRoleTag.d.ts +16 -16
  57. package/aws/authBackendRoleTag.js +1 -0
  58. package/aws/authBackendRoleTag.js.map +1 -1
  59. package/aws/authBackendRoletagBlacklist.d.ts +6 -6
  60. package/aws/authBackendRoletagBlacklist.js +1 -0
  61. package/aws/authBackendRoletagBlacklist.js.map +1 -1
  62. package/aws/authBackendStsRole.d.ts +6 -6
  63. package/aws/authBackendStsRole.js +1 -0
  64. package/aws/authBackendStsRole.js.map +1 -1
  65. package/aws/getAccessCredentials.d.ts +42 -6
  66. package/aws/getAccessCredentials.js +5 -0
  67. package/aws/getAccessCredentials.js.map +1 -1
  68. package/aws/index.js +21 -14
  69. package/aws/index.js.map +1 -1
  70. package/aws/secretBackend.d.ts +18 -18
  71. package/aws/secretBackend.js +1 -0
  72. package/aws/secretBackend.js.map +1 -1
  73. package/aws/secretBackendRole.d.ts +18 -18
  74. package/aws/secretBackendRole.js +1 -0
  75. package/aws/secretBackendRole.js.map +1 -1
  76. package/azure/authBackendConfig.d.ts +12 -12
  77. package/azure/authBackendConfig.js +1 -0
  78. package/azure/authBackendConfig.js.map +1 -1
  79. package/azure/authBackendRole.d.ts +45 -45
  80. package/azure/authBackendRole.js +1 -0
  81. package/azure/authBackendRole.js.map +1 -1
  82. package/azure/backend.d.ts +14 -14
  83. package/azure/backend.js +1 -0
  84. package/azure/backend.js.map +1 -1
  85. package/azure/backendRole.d.ts +16 -16
  86. package/azure/backendRole.js +1 -0
  87. package/azure/backendRole.js.map +1 -1
  88. package/azure/getAccessCredentials.d.ts +47 -6
  89. package/azure/getAccessCredentials.js +5 -0
  90. package/azure/getAccessCredentials.js.map +1 -1
  91. package/azure/index.js +15 -8
  92. package/azure/index.js.map +1 -1
  93. package/certAuthBackendRole.d.ts +50 -50
  94. package/certAuthBackendRole.js +1 -0
  95. package/certAuthBackendRole.js.map +1 -1
  96. package/config/index.js +11 -4
  97. package/config/index.js.map +1 -1
  98. package/config/vars.d.ts +13 -13
  99. package/config/vars.js +82 -53
  100. package/config/vars.js.map +1 -1
  101. package/consul/index.js +12 -5
  102. package/consul/index.js.map +1 -1
  103. package/consul/secretBackend.d.ts +22 -22
  104. package/consul/secretBackend.js +1 -0
  105. package/consul/secretBackend.js.map +1 -1
  106. package/consul/secretBackendRole.d.ts +16 -16
  107. package/consul/secretBackendRole.js +1 -0
  108. package/consul/secretBackendRole.js.map +1 -1
  109. package/database/index.js +13 -6
  110. package/database/index.js.map +1 -1
  111. package/database/secretBackendConnection.d.ts +38 -38
  112. package/database/secretBackendConnection.js +1 -0
  113. package/database/secretBackendConnection.js.map +1 -1
  114. package/database/secretBackendRole.d.ts +18 -18
  115. package/database/secretBackendRole.js +1 -0
  116. package/database/secretBackendRole.js.map +1 -1
  117. package/database/secretBackendStaticRole.d.ts +12 -12
  118. package/database/secretBackendStaticRole.js +1 -0
  119. package/database/secretBackendStaticRole.js.map +1 -1
  120. package/egpPolicy.d.ts +8 -8
  121. package/egpPolicy.js +1 -0
  122. package/egpPolicy.js.map +1 -1
  123. package/gcp/authBackend.d.ts +16 -16
  124. package/gcp/authBackend.js +1 -0
  125. package/gcp/authBackend.js.map +1 -1
  126. package/gcp/authBackendRole.d.ts +50 -50
  127. package/gcp/authBackendRole.js +1 -0
  128. package/gcp/authBackendRole.js.map +1 -1
  129. package/gcp/getAuthBackendRole.d.ts +80 -12
  130. package/gcp/getAuthBackendRole.js +6 -1
  131. package/gcp/getAuthBackendRole.js.map +1 -1
  132. package/gcp/index.js +16 -9
  133. package/gcp/index.js.map +1 -1
  134. package/gcp/secretBackend.d.ts +12 -12
  135. package/gcp/secretBackend.js +1 -0
  136. package/gcp/secretBackend.js.map +1 -1
  137. package/gcp/secretRoleset.d.ts +13 -13
  138. package/gcp/secretRoleset.js +1 -0
  139. package/gcp/secretRoleset.js.map +1 -1
  140. package/gcp/secretStaticAccount.d.ts +39 -13
  141. package/gcp/secretStaticAccount.js +27 -0
  142. package/gcp/secretStaticAccount.js.map +1 -1
  143. package/generic/endpoint.d.ts +14 -14
  144. package/generic/endpoint.js +1 -0
  145. package/generic/endpoint.js.map +1 -1
  146. package/generic/getSecret.d.ts +22 -2
  147. package/generic/getSecret.js +5 -0
  148. package/generic/getSecret.js.map +1 -1
  149. package/generic/index.js +13 -6
  150. package/generic/index.js.map +1 -1
  151. package/generic/secret.d.ts +7 -7
  152. package/generic/secret.js +1 -0
  153. package/generic/secret.js.map +1 -1
  154. package/getAuthBackend.d.ts +13 -3
  155. package/getAuthBackend.js +6 -1
  156. package/getAuthBackend.js.map +1 -1
  157. package/getNomadAccessToken.d.ts +18 -2
  158. package/getNomadAccessToken.js +5 -0
  159. package/getNomadAccessToken.js.map +1 -1
  160. package/getPolicyDocument.d.ts +8 -1
  161. package/getPolicyDocument.js +5 -0
  162. package/getPolicyDocument.js.map +1 -1
  163. package/github/authBackend.d.ts +44 -35
  164. package/github/authBackend.js +3 -2
  165. package/github/authBackend.js.map +1 -1
  166. package/github/index.js +13 -6
  167. package/github/index.js.map +1 -1
  168. package/github/team.d.ts +24 -24
  169. package/github/team.js +1 -0
  170. package/github/team.js.map +1 -1
  171. package/github/user.d.ts +24 -24
  172. package/github/user.js +1 -0
  173. package/github/user.js.map +1 -1
  174. package/identity/entity.d.ts +10 -10
  175. package/identity/entity.js +1 -0
  176. package/identity/entity.js.map +1 -1
  177. package/identity/entityAlias.d.ts +6 -6
  178. package/identity/entityAlias.js +1 -0
  179. package/identity/entityAlias.js.map +1 -1
  180. package/identity/entityPolicies.d.ts +7 -7
  181. package/identity/entityPolicies.js +1 -0
  182. package/identity/entityPolicies.js.map +1 -1
  183. package/identity/getEntity.d.ts +33 -5
  184. package/identity/getEntity.js +5 -0
  185. package/identity/getEntity.js.map +1 -1
  186. package/identity/getGroup.d.ts +33 -5
  187. package/identity/getGroup.js +5 -0
  188. package/identity/getGroup.js.map +1 -1
  189. package/identity/group.d.ts +16 -16
  190. package/identity/group.js +1 -0
  191. package/identity/group.js.map +1 -1
  192. package/identity/groupAlias.d.ts +6 -6
  193. package/identity/groupAlias.js +1 -0
  194. package/identity/groupAlias.js.map +1 -1
  195. package/identity/groupMemberEntityIds.d.ts +7 -7
  196. package/identity/groupMemberEntityIds.js +1 -0
  197. package/identity/groupMemberEntityIds.js.map +1 -1
  198. package/identity/groupPolicies.d.ts +7 -7
  199. package/identity/groupPolicies.js +1 -0
  200. package/identity/groupPolicies.js.map +1 -1
  201. package/identity/index.js +23 -16
  202. package/identity/index.js.map +1 -1
  203. package/identity/oidc.d.ts +2 -2
  204. package/identity/oidc.js +1 -0
  205. package/identity/oidc.js.map +1 -1
  206. package/identity/oidcKey.d.ts +10 -10
  207. package/identity/oidcKey.js +1 -0
  208. package/identity/oidcKey.js.map +1 -1
  209. package/identity/oidcKeyAllowedClientID.d.ts +4 -4
  210. package/identity/oidcKeyAllowedClientID.js +1 -0
  211. package/identity/oidcKeyAllowedClientID.js.map +1 -1
  212. package/identity/oidcRole.d.ts +10 -10
  213. package/identity/oidcRole.js +1 -0
  214. package/identity/oidcRole.js.map +1 -1
  215. package/index.js +31 -23
  216. package/index.js.map +1 -1
  217. package/jwt/authBackend.d.ts +33 -33
  218. package/jwt/authBackend.js +1 -0
  219. package/jwt/authBackend.js.map +1 -1
  220. package/jwt/authBackendRole.d.ts +64 -64
  221. package/jwt/authBackendRole.js +1 -0
  222. package/jwt/authBackendRole.js.map +1 -1
  223. package/jwt/index.js +12 -5
  224. package/jwt/index.js.map +1 -1
  225. package/kubernetes/authBackendConfig.d.ts +16 -16
  226. package/kubernetes/authBackendConfig.js +1 -0
  227. package/kubernetes/authBackendConfig.js.map +1 -1
  228. package/kubernetes/authBackendRole.d.ts +40 -40
  229. package/kubernetes/authBackendRole.js +1 -0
  230. package/kubernetes/authBackendRole.js.map +1 -1
  231. package/kubernetes/getAuthBackendConfig.d.ts +36 -7
  232. package/kubernetes/getAuthBackendConfig.js +5 -0
  233. package/kubernetes/getAuthBackendConfig.js.map +1 -1
  234. package/kubernetes/getAuthBackendRole.d.ts +115 -18
  235. package/kubernetes/getAuthBackendRole.js +5 -0
  236. package/kubernetes/getAuthBackendRole.js.map +1 -1
  237. package/kubernetes/index.js +14 -7
  238. package/kubernetes/index.js.map +1 -1
  239. package/ldap/authBackend.d.ts +63 -63
  240. package/ldap/authBackend.js +1 -0
  241. package/ldap/authBackend.js.map +1 -1
  242. package/ldap/authBackendGroup.d.ts +6 -6
  243. package/ldap/authBackendGroup.js +1 -0
  244. package/ldap/authBackendGroup.js.map +1 -1
  245. package/ldap/authBackendUser.d.ts +8 -8
  246. package/ldap/authBackendUser.js +1 -0
  247. package/ldap/authBackendUser.js.map +1 -1
  248. package/ldap/index.js +13 -6
  249. package/ldap/index.js.map +1 -1
  250. package/mfaDuo.d.ts +14 -14
  251. package/mfaDuo.js +1 -0
  252. package/mfaDuo.js.map +1 -1
  253. package/mount.d.ts +19 -19
  254. package/mount.js +1 -0
  255. package/mount.js.map +1 -1
  256. package/namespace.d.ts +3 -3
  257. package/namespace.js +1 -0
  258. package/namespace.js.map +1 -1
  259. package/nomadSecretBackend.d.ts +26 -26
  260. package/nomadSecretBackend.js +1 -0
  261. package/nomadSecretBackend.js.map +1 -1
  262. package/nomadSecretRole.d.ts +10 -10
  263. package/nomadSecretRole.js +1 -0
  264. package/nomadSecretRole.js.map +1 -1
  265. package/okta/authBackend.d.ts +21 -21
  266. package/okta/authBackend.js +1 -0
  267. package/okta/authBackend.js.map +1 -1
  268. package/okta/authBackendGroup.d.ts +6 -6
  269. package/okta/authBackendGroup.js +1 -0
  270. package/okta/authBackendGroup.js.map +1 -1
  271. package/okta/authBackendUser.d.ts +16 -8
  272. package/okta/authBackendUser.js +9 -0
  273. package/okta/authBackendUser.js.map +1 -1
  274. package/okta/index.js +13 -6
  275. package/okta/index.js.map +1 -1
  276. package/package.json +4 -3
  277. package/package.json.bak +3 -2
  278. package/package.json.dev +4 -3
  279. package/passwordPolicy.d.ts +4 -4
  280. package/passwordPolicy.js +1 -0
  281. package/passwordPolicy.js.map +1 -1
  282. package/pkisecret/index.js +21 -14
  283. package/pkisecret/index.js.map +1 -1
  284. package/pkisecret/secretBackend.d.ts +8 -8
  285. package/pkisecret/secretBackend.js +1 -0
  286. package/pkisecret/secretBackend.js.map +1 -1
  287. package/pkisecret/secretBackendCert.d.ts +33 -33
  288. package/pkisecret/secretBackendCert.js +1 -0
  289. package/pkisecret/secretBackendCert.js.map +1 -1
  290. package/pkisecret/secretBackendConfigCa.d.ts +4 -4
  291. package/pkisecret/secretBackendConfigCa.js +1 -0
  292. package/pkisecret/secretBackendConfigCa.js.map +1 -1
  293. package/pkisecret/secretBackendConfigUrls.d.ts +10 -10
  294. package/pkisecret/secretBackendConfigUrls.js +3 -2
  295. package/pkisecret/secretBackendConfigUrls.js.map +1 -1
  296. package/pkisecret/secretBackendCrlConfig.d.ts +7 -7
  297. package/pkisecret/secretBackendCrlConfig.js +2 -1
  298. package/pkisecret/secretBackendCrlConfig.js.map +1 -1
  299. package/pkisecret/secretBackendIntermediateCertRequest.d.ts +41 -41
  300. package/pkisecret/secretBackendIntermediateCertRequest.js +1 -0
  301. package/pkisecret/secretBackendIntermediateCertRequest.js.map +1 -1
  302. package/pkisecret/secretBackendIntermediateSetSigned.d.ts +4 -4
  303. package/pkisecret/secretBackendIntermediateSetSigned.js +1 -0
  304. package/pkisecret/secretBackendIntermediateSetSigned.js.map +1 -1
  305. package/pkisecret/secretBackendRole.d.ts +78 -78
  306. package/pkisecret/secretBackendRole.js +3 -2
  307. package/pkisecret/secretBackendRole.js.map +1 -1
  308. package/pkisecret/secretBackendRootCert.d.ts +47 -47
  309. package/pkisecret/secretBackendRootCert.js +1 -0
  310. package/pkisecret/secretBackendRootCert.js.map +1 -1
  311. package/pkisecret/secretBackendRootSignIntermediate.d.ts +45 -45
  312. package/pkisecret/secretBackendRootSignIntermediate.js +2 -1
  313. package/pkisecret/secretBackendRootSignIntermediate.js.map +1 -1
  314. package/pkisecret/secretBackendSign.d.ts +31 -31
  315. package/pkisecret/secretBackendSign.js +1 -0
  316. package/pkisecret/secretBackendSign.js.map +1 -1
  317. package/policy.d.ts +4 -4
  318. package/policy.js +1 -0
  319. package/policy.js.map +1 -1
  320. package/provider.d.ts +41 -13
  321. package/provider.js +4 -3
  322. package/provider.js.map +1 -1
  323. package/quotaLeaseCount.d.ts +6 -6
  324. package/quotaLeaseCount.js +1 -0
  325. package/quotaLeaseCount.js.map +1 -1
  326. package/quotaRateLimit.d.ts +6 -6
  327. package/quotaRateLimit.js +1 -0
  328. package/quotaRateLimit.js.map +1 -1
  329. package/rabbitmq/index.js +12 -5
  330. package/rabbitmq/index.js.map +1 -1
  331. package/rabbitmq/secretBackend.d.ts +16 -16
  332. package/rabbitmq/secretBackend.js +1 -0
  333. package/rabbitmq/secretBackend.js.map +1 -1
  334. package/rabbitmq/secretBackendRole.d.ts +8 -8
  335. package/rabbitmq/secretBackendRole.js +1 -0
  336. package/rabbitmq/secretBackendRole.js.map +1 -1
  337. package/raftSnapshotAgentConfig.d.ts +54 -54
  338. package/raftSnapshotAgentConfig.js +1 -0
  339. package/raftSnapshotAgentConfig.js.map +1 -1
  340. package/rgpPolicy.d.ts +6 -6
  341. package/rgpPolicy.js +1 -0
  342. package/rgpPolicy.js.map +1 -1
  343. package/ssh/index.js +12 -5
  344. package/ssh/index.js.map +1 -1
  345. package/ssh/secretBackendCa.d.ts +8 -8
  346. package/ssh/secretBackendCa.js +1 -0
  347. package/ssh/secretBackendCa.js.map +1 -1
  348. package/ssh/secretBackendRole.d.ts +44 -44
  349. package/ssh/secretBackendRole.js +1 -0
  350. package/ssh/secretBackendRole.js.map +1 -1
  351. package/token.d.ts +34 -34
  352. package/token.js +1 -0
  353. package/token.js.map +1 -1
  354. package/tokenauth/authBackendRole.d.ts +39 -39
  355. package/tokenauth/authBackendRole.js +1 -0
  356. package/tokenauth/authBackendRole.js.map +1 -1
  357. package/tokenauth/index.js +11 -4
  358. package/tokenauth/index.js.map +1 -1
  359. package/transform/alphabet.d.ts +6 -6
  360. package/transform/alphabet.js +1 -0
  361. package/transform/alphabet.js.map +1 -1
  362. package/transform/getDecode.d.ts +50 -8
  363. package/transform/getDecode.js +5 -0
  364. package/transform/getDecode.js.map +1 -1
  365. package/transform/getEncode.d.ts +50 -8
  366. package/transform/getEncode.js +5 -0
  367. package/transform/getEncode.js.map +1 -1
  368. package/transform/index.js +16 -9
  369. package/transform/index.js.map +1 -1
  370. package/transform/role.d.ts +6 -6
  371. package/transform/role.js +1 -0
  372. package/transform/role.js.map +1 -1
  373. package/transform/template.d.ts +10 -10
  374. package/transform/template.js +1 -0
  375. package/transform/template.js.map +1 -1
  376. package/transform/transformation.d.ts +16 -16
  377. package/transform/transformation.js +1 -0
  378. package/transform/transformation.js.map +1 -1
  379. package/transit/getDecrypt.d.ts +27 -5
  380. package/transit/getDecrypt.js +6 -1
  381. package/transit/getDecrypt.js.map +1 -1
  382. package/transit/getEncrypt.d.ts +31 -5
  383. package/transit/getEncrypt.js +5 -0
  384. package/transit/getEncrypt.js.map +1 -1
  385. package/transit/index.js +14 -7
  386. package/transit/index.js.map +1 -1
  387. package/transit/secretBackendKey.d.ts +27 -27
  388. package/transit/secretBackendKey.js +1 -0
  389. package/transit/secretBackendKey.js.map +1 -1
  390. package/transit/secretCacheConfig.d.ts +4 -4
  391. package/transit/secretCacheConfig.js +1 -0
  392. package/transit/secretCacheConfig.js.map +1 -1
  393. package/types/index.js +1 -0
  394. package/types/index.js.map +1 -1
  395. package/types/input.d.ts +54 -0
  396. package/types/output.d.ts +0 -16
  397. package/utilities.js +1 -0
  398. package/utilities.js.map +1 -1
@@ -184,40 +184,40 @@ export interface AuthBackendRoleState {
184
184
  /**
185
185
  * Audience claim to verify in the JWT.
186
186
  */
187
- readonly audience?: pulumi.Input<string>;
187
+ audience?: pulumi.Input<string>;
188
188
  /**
189
189
  * Unique name of the kubernetes backend to configure.
190
190
  */
191
- readonly backend?: pulumi.Input<string>;
191
+ backend?: pulumi.Input<string>;
192
192
  /**
193
193
  * If set, a list of
194
194
  * CIDRs valid as the source address for login requests. This value is also encoded into any resulting token.
195
195
  *
196
196
  * @deprecated use `token_bound_cidrs` instead if you are running Vault >= 1.2
197
197
  */
198
- readonly boundCidrs?: pulumi.Input<pulumi.Input<string>[]>;
198
+ boundCidrs?: pulumi.Input<pulumi.Input<string>[]>;
199
199
  /**
200
200
  * List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and boundServiceAccountNamespaces can not be "*".
201
201
  */
202
- readonly boundServiceAccountNames?: pulumi.Input<pulumi.Input<string>[]>;
202
+ boundServiceAccountNames?: pulumi.Input<pulumi.Input<string>[]>;
203
203
  /**
204
204
  * List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and boundServiceAccountNames can not be set to "*".
205
205
  */
206
- readonly boundServiceAccountNamespaces?: pulumi.Input<pulumi.Input<string>[]>;
206
+ boundServiceAccountNamespaces?: pulumi.Input<pulumi.Input<string>[]>;
207
207
  /**
208
208
  * The maximum allowed lifetime of tokens
209
209
  * issued using this role, provided as a number of seconds.
210
210
  *
211
211
  * @deprecated use `token_max_ttl` instead if you are running Vault >= 1.2
212
212
  */
213
- readonly maxTtl?: pulumi.Input<number>;
213
+ maxTtl?: pulumi.Input<number>;
214
214
  /**
215
215
  * If set, puts a use-count
216
216
  * limitation on the issued token.
217
217
  *
218
218
  * @deprecated use `token_num_uses` instead if you are running Vault >= 1.2
219
219
  */
220
- readonly numUses?: pulumi.Input<number>;
220
+ numUses?: pulumi.Input<number>;
221
221
  /**
222
222
  * If set, indicates that the
223
223
  * token generated using this role should never expire. The token should be renewed within the
@@ -226,64 +226,64 @@ export interface AuthBackendRoleState {
226
226
  *
227
227
  * @deprecated use `token_period` instead if you are running Vault >= 1.2
228
228
  */
229
- readonly period?: pulumi.Input<number>;
229
+ period?: pulumi.Input<number>;
230
230
  /**
231
231
  * An array of strings
232
232
  * specifying the policies to be set on tokens issued using this role.
233
233
  *
234
234
  * @deprecated use `token_policies` instead if you are running Vault >= 1.2
235
235
  */
236
- readonly policies?: pulumi.Input<pulumi.Input<string>[]>;
236
+ policies?: pulumi.Input<pulumi.Input<string>[]>;
237
237
  /**
238
238
  * Name of the role.
239
239
  */
240
- readonly roleName?: pulumi.Input<string>;
240
+ roleName?: pulumi.Input<string>;
241
241
  /**
242
242
  * List of CIDR blocks; if set, specifies blocks of IP
243
243
  * addresses which can authenticate successfully, and ties the resulting token to these blocks
244
244
  * as well.
245
245
  */
246
- readonly tokenBoundCidrs?: pulumi.Input<pulumi.Input<string>[]>;
246
+ tokenBoundCidrs?: pulumi.Input<pulumi.Input<string>[]>;
247
247
  /**
248
248
  * If set, will encode an
249
249
  * [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
250
250
  * onto the token in number of seconds. This is a hard cap even if `tokenTtl` and
251
251
  * `tokenMaxTtl` would otherwise allow a renewal.
252
252
  */
253
- readonly tokenExplicitMaxTtl?: pulumi.Input<number>;
253
+ tokenExplicitMaxTtl?: pulumi.Input<number>;
254
254
  /**
255
255
  * The maximum lifetime for generated tokens in number of seconds.
256
256
  * Its current value will be referenced at renewal time.
257
257
  */
258
- readonly tokenMaxTtl?: pulumi.Input<number>;
258
+ tokenMaxTtl?: pulumi.Input<number>;
259
259
  /**
260
260
  * If set, the default policy will not be set on
261
261
  * generated tokens; otherwise it will be added to the policies set in token_policies.
262
262
  */
263
- readonly tokenNoDefaultPolicy?: pulumi.Input<boolean>;
263
+ tokenNoDefaultPolicy?: pulumi.Input<boolean>;
264
264
  /**
265
265
  * The
266
266
  * [period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
267
267
  * if any, in number of seconds to set on the token.
268
268
  */
269
- readonly tokenNumUses?: pulumi.Input<number>;
269
+ tokenNumUses?: pulumi.Input<number>;
270
270
  /**
271
271
  * If set, indicates that the
272
272
  * token generated using this role should never expire. The token should be renewed within the
273
273
  * duration specified by this value. At each renewal, the token's TTL will be set to the
274
274
  * value of this field. Specified in seconds.
275
275
  */
276
- readonly tokenPeriod?: pulumi.Input<number>;
276
+ tokenPeriod?: pulumi.Input<number>;
277
277
  /**
278
278
  * List of policies to encode onto generated tokens. Depending
279
279
  * on the auth method, this list may be supplemented by user/group/other values.
280
280
  */
281
- readonly tokenPolicies?: pulumi.Input<pulumi.Input<string>[]>;
281
+ tokenPolicies?: pulumi.Input<pulumi.Input<string>[]>;
282
282
  /**
283
283
  * The incremental lifetime for generated tokens in number of seconds.
284
284
  * Its current value will be referenced at renewal time.
285
285
  */
286
- readonly tokenTtl?: pulumi.Input<number>;
286
+ tokenTtl?: pulumi.Input<number>;
287
287
  /**
288
288
  * The type of token that should be generated. Can be `service`,
289
289
  * `batch`, or `default` to use the mount's tuned default (which unless changed will be
@@ -291,14 +291,14 @@ export interface AuthBackendRoleState {
291
291
  * `default-service` and `default-batch` which specify the type to return unless the client
292
292
  * requests a different type at generation time.
293
293
  */
294
- readonly tokenType?: pulumi.Input<string>;
294
+ tokenType?: pulumi.Input<string>;
295
295
  /**
296
296
  * The TTL period of tokens issued
297
297
  * using this role, provided as a number of seconds.
298
298
  *
299
299
  * @deprecated use `token_ttl` instead if you are running Vault >= 1.2
300
300
  */
301
- readonly ttl?: pulumi.Input<number>;
301
+ ttl?: pulumi.Input<number>;
302
302
  }
303
303
  /**
304
304
  * The set of arguments for constructing a AuthBackendRole resource.
@@ -307,40 +307,40 @@ export interface AuthBackendRoleArgs {
307
307
  /**
308
308
  * Audience claim to verify in the JWT.
309
309
  */
310
- readonly audience?: pulumi.Input<string>;
310
+ audience?: pulumi.Input<string>;
311
311
  /**
312
312
  * Unique name of the kubernetes backend to configure.
313
313
  */
314
- readonly backend?: pulumi.Input<string>;
314
+ backend?: pulumi.Input<string>;
315
315
  /**
316
316
  * If set, a list of
317
317
  * CIDRs valid as the source address for login requests. This value is also encoded into any resulting token.
318
318
  *
319
319
  * @deprecated use `token_bound_cidrs` instead if you are running Vault >= 1.2
320
320
  */
321
- readonly boundCidrs?: pulumi.Input<pulumi.Input<string>[]>;
321
+ boundCidrs?: pulumi.Input<pulumi.Input<string>[]>;
322
322
  /**
323
323
  * List of service account names able to access this role. If set to `["*"]` all names are allowed, both this and boundServiceAccountNamespaces can not be "*".
324
324
  */
325
- readonly boundServiceAccountNames: pulumi.Input<pulumi.Input<string>[]>;
325
+ boundServiceAccountNames: pulumi.Input<pulumi.Input<string>[]>;
326
326
  /**
327
327
  * List of namespaces allowed to access this role. If set to `["*"]` all namespaces are allowed, both this and boundServiceAccountNames can not be set to "*".
328
328
  */
329
- readonly boundServiceAccountNamespaces: pulumi.Input<pulumi.Input<string>[]>;
329
+ boundServiceAccountNamespaces: pulumi.Input<pulumi.Input<string>[]>;
330
330
  /**
331
331
  * The maximum allowed lifetime of tokens
332
332
  * issued using this role, provided as a number of seconds.
333
333
  *
334
334
  * @deprecated use `token_max_ttl` instead if you are running Vault >= 1.2
335
335
  */
336
- readonly maxTtl?: pulumi.Input<number>;
336
+ maxTtl?: pulumi.Input<number>;
337
337
  /**
338
338
  * If set, puts a use-count
339
339
  * limitation on the issued token.
340
340
  *
341
341
  * @deprecated use `token_num_uses` instead if you are running Vault >= 1.2
342
342
  */
343
- readonly numUses?: pulumi.Input<number>;
343
+ numUses?: pulumi.Input<number>;
344
344
  /**
345
345
  * If set, indicates that the
346
346
  * token generated using this role should never expire. The token should be renewed within the
@@ -349,64 +349,64 @@ export interface AuthBackendRoleArgs {
349
349
  *
350
350
  * @deprecated use `token_period` instead if you are running Vault >= 1.2
351
351
  */
352
- readonly period?: pulumi.Input<number>;
352
+ period?: pulumi.Input<number>;
353
353
  /**
354
354
  * An array of strings
355
355
  * specifying the policies to be set on tokens issued using this role.
356
356
  *
357
357
  * @deprecated use `token_policies` instead if you are running Vault >= 1.2
358
358
  */
359
- readonly policies?: pulumi.Input<pulumi.Input<string>[]>;
359
+ policies?: pulumi.Input<pulumi.Input<string>[]>;
360
360
  /**
361
361
  * Name of the role.
362
362
  */
363
- readonly roleName: pulumi.Input<string>;
363
+ roleName: pulumi.Input<string>;
364
364
  /**
365
365
  * List of CIDR blocks; if set, specifies blocks of IP
366
366
  * addresses which can authenticate successfully, and ties the resulting token to these blocks
367
367
  * as well.
368
368
  */
369
- readonly tokenBoundCidrs?: pulumi.Input<pulumi.Input<string>[]>;
369
+ tokenBoundCidrs?: pulumi.Input<pulumi.Input<string>[]>;
370
370
  /**
371
371
  * If set, will encode an
372
372
  * [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
373
373
  * onto the token in number of seconds. This is a hard cap even if `tokenTtl` and
374
374
  * `tokenMaxTtl` would otherwise allow a renewal.
375
375
  */
376
- readonly tokenExplicitMaxTtl?: pulumi.Input<number>;
376
+ tokenExplicitMaxTtl?: pulumi.Input<number>;
377
377
  /**
378
378
  * The maximum lifetime for generated tokens in number of seconds.
379
379
  * Its current value will be referenced at renewal time.
380
380
  */
381
- readonly tokenMaxTtl?: pulumi.Input<number>;
381
+ tokenMaxTtl?: pulumi.Input<number>;
382
382
  /**
383
383
  * If set, the default policy will not be set on
384
384
  * generated tokens; otherwise it will be added to the policies set in token_policies.
385
385
  */
386
- readonly tokenNoDefaultPolicy?: pulumi.Input<boolean>;
386
+ tokenNoDefaultPolicy?: pulumi.Input<boolean>;
387
387
  /**
388
388
  * The
389
389
  * [period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
390
390
  * if any, in number of seconds to set on the token.
391
391
  */
392
- readonly tokenNumUses?: pulumi.Input<number>;
392
+ tokenNumUses?: pulumi.Input<number>;
393
393
  /**
394
394
  * If set, indicates that the
395
395
  * token generated using this role should never expire. The token should be renewed within the
396
396
  * duration specified by this value. At each renewal, the token's TTL will be set to the
397
397
  * value of this field. Specified in seconds.
398
398
  */
399
- readonly tokenPeriod?: pulumi.Input<number>;
399
+ tokenPeriod?: pulumi.Input<number>;
400
400
  /**
401
401
  * List of policies to encode onto generated tokens. Depending
402
402
  * on the auth method, this list may be supplemented by user/group/other values.
403
403
  */
404
- readonly tokenPolicies?: pulumi.Input<pulumi.Input<string>[]>;
404
+ tokenPolicies?: pulumi.Input<pulumi.Input<string>[]>;
405
405
  /**
406
406
  * The incremental lifetime for generated tokens in number of seconds.
407
407
  * Its current value will be referenced at renewal time.
408
408
  */
409
- readonly tokenTtl?: pulumi.Input<number>;
409
+ tokenTtl?: pulumi.Input<number>;
410
410
  /**
411
411
  * The type of token that should be generated. Can be `service`,
412
412
  * `batch`, or `default` to use the mount's tuned default (which unless changed will be
@@ -414,12 +414,12 @@ export interface AuthBackendRoleArgs {
414
414
  * `default-service` and `default-batch` which specify the type to return unless the client
415
415
  * requests a different type at generation time.
416
416
  */
417
- readonly tokenType?: pulumi.Input<string>;
417
+ tokenType?: pulumi.Input<string>;
418
418
  /**
419
419
  * The TTL period of tokens issued
420
420
  * using this role, provided as a number of seconds.
421
421
  *
422
422
  * @deprecated use `token_ttl` instead if you are running Vault >= 1.2
423
423
  */
424
- readonly ttl?: pulumi.Input<number>;
424
+ ttl?: pulumi.Input<number>;
425
425
  }
@@ -2,6 +2,7 @@
2
2
  // *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  // *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
  Object.defineProperty(exports, "__esModule", { value: true });
5
+ exports.AuthBackendRole = void 0;
5
6
  const pulumi = require("@pulumi/pulumi");
6
7
  const utilities = require("../utilities");
7
8
  /**
@@ -1 +1 @@
1
- {"version":3,"file":"authBackendRole.js","sourceRoot":"","sources":["../../kubernetes/authBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAkCG;AACH,MAAa,eAAgB,SAAQ,MAAM,CAAC,cAAc;IA2JtD,YAAY,IAAY,EAAE,WAAwD,EAAE,IAAmC;QACnH,IAAI,MAAM,GAAkB,EAAE,CAAC;QAC/B,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA+C,CAAC;YAC9D,MAAM,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,0BAA0B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,MAAM,CAAC,+BAA+B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,6BAA6B,CAAC,CAAC,CAAC,SAAS,CAAC;YAClG,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,MAAM,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,sBAAsB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,MAAM,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,MAAM,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACjD;aAAM;YACH,MAAM,IAAI,GAAG,WAA8C,CAAC;YAC5D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,wBAAwB,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrE,MAAM,IAAI,KAAK,CAAC,sDAAsD,CAAC,CAAC;aAC3E;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,6BAA6B,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1E,MAAM,IAAI,KAAK,CAAC,2DAA2D,CAAC,CAAC;aAChF;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,MAAM,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,0BAA0B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,MAAM,CAAC,+BAA+B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,6BAA6B,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,MAAM,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,sBAAsB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,MAAM,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,MAAM,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/C;QACD,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;YACf,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE,EAAC,CAAC,CAAC;SACxE;QACD,KAAK,CAAC,eAAe,CAAC,YAAY,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,CAAC,CAAC;IAC5D,CAAC;IAvND;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA4B,EAAE,IAAmC;QAC1H,OAAO,IAAI,eAAe,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACtE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,eAAe,CAAC,YAAY,CAAC;IAChE,CAAC;;AA1BL,0CAyNC;AA3MG,gBAAgB;AACO,4BAAY,GAAG,kDAAkD,CAAC"}
1
+ {"version":3,"file":"authBackendRole.js","sourceRoot":"","sources":["../../kubernetes/authBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAkCG;AACH,MAAa,eAAgB,SAAQ,MAAM,CAAC,cAAc;IA2JtD,YAAY,IAAY,EAAE,WAAwD,EAAE,IAAmC;QACnH,IAAI,MAAM,GAAkB,EAAE,CAAC;QAC/B,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA+C,CAAC;YAC9D,MAAM,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,0BAA0B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,MAAM,CAAC,+BAA+B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,6BAA6B,CAAC,CAAC,CAAC,SAAS,CAAC;YAClG,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,MAAM,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,sBAAsB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,MAAM,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,MAAM,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACjD;aAAM;YACH,MAAM,IAAI,GAAG,WAA8C,CAAC;YAC5D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,wBAAwB,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrE,MAAM,IAAI,KAAK,CAAC,sDAAsD,CAAC,CAAC;aAC3E;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,6BAA6B,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1E,MAAM,IAAI,KAAK,CAAC,2DAA2D,CAAC,CAAC;aAChF;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,MAAM,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,0BAA0B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,MAAM,CAAC,+BAA+B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,6BAA6B,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,MAAM,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,sBAAsB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,MAAM,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,MAAM,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/C;QACD,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;YACf,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE,EAAC,CAAC,CAAC;SACxE;QACD,KAAK,CAAC,eAAe,CAAC,YAAY,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,CAAC,CAAC;IAC5D,CAAC;IAvND;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA4B,EAAE,IAAmC;QAC1H,OAAO,IAAI,eAAe,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACtE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,eAAe,CAAC,YAAY,CAAC;IAChE,CAAC;;AA1BL,0CAyNC;AA3MG,gBAAgB;AACO,4BAAY,GAAG,kDAAkD,CAAC"}
@@ -13,25 +13,25 @@ export interface GetAuthBackendConfigArgs {
13
13
  * The unique name for the Kubernetes backend the config to
14
14
  * retrieve Role attributes for resides in. Defaults to "kubernetes".
15
15
  */
16
- readonly backend?: string;
17
- readonly disableIssValidation?: boolean;
18
- readonly disableLocalCaJwt?: boolean;
16
+ backend?: string;
17
+ disableIssValidation?: boolean;
18
+ disableLocalCaJwt?: boolean;
19
19
  /**
20
20
  * Optional JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
21
21
  */
22
- readonly issuer?: string;
22
+ issuer?: string;
23
23
  /**
24
24
  * PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
25
25
  */
26
- readonly kubernetesCaCert?: string;
26
+ kubernetesCaCert?: string;
27
27
  /**
28
28
  * Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
29
29
  */
30
- readonly kubernetesHost?: string;
30
+ kubernetesHost?: string;
31
31
  /**
32
32
  * Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
33
33
  */
34
- readonly pemKeys?: string[];
34
+ pemKeys?: string[];
35
35
  }
36
36
  /**
37
37
  * A collection of values returned by getAuthBackendConfig.
@@ -61,3 +61,32 @@ export interface GetAuthBackendConfigResult {
61
61
  */
62
62
  readonly pemKeys: string[];
63
63
  }
64
+ export declare function getAuthBackendConfigOutput(args?: GetAuthBackendConfigOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output<GetAuthBackendConfigResult>;
65
+ /**
66
+ * A collection of arguments for invoking getAuthBackendConfig.
67
+ */
68
+ export interface GetAuthBackendConfigOutputArgs {
69
+ /**
70
+ * The unique name for the Kubernetes backend the config to
71
+ * retrieve Role attributes for resides in. Defaults to "kubernetes".
72
+ */
73
+ backend?: pulumi.Input<string>;
74
+ disableIssValidation?: pulumi.Input<boolean>;
75
+ disableLocalCaJwt?: pulumi.Input<boolean>;
76
+ /**
77
+ * Optional JWT issuer. If no issuer is specified, `kubernetes.io/serviceaccount` will be used as the default issuer.
78
+ */
79
+ issuer?: pulumi.Input<string>;
80
+ /**
81
+ * PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
82
+ */
83
+ kubernetesCaCert?: pulumi.Input<string>;
84
+ /**
85
+ * Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
86
+ */
87
+ kubernetesHost?: pulumi.Input<string>;
88
+ /**
89
+ * Optional list of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
90
+ */
91
+ pemKeys?: pulumi.Input<pulumi.Input<string>[]>;
92
+ }
@@ -2,6 +2,7 @@
2
2
  // *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  // *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
  Object.defineProperty(exports, "__esModule", { value: true });
5
+ exports.getAuthBackendConfigOutput = exports.getAuthBackendConfig = void 0;
5
6
  const pulumi = require("@pulumi/pulumi");
6
7
  const utilities = require("../utilities");
7
8
  /**
@@ -28,4 +29,8 @@ function getAuthBackendConfig(args, opts) {
28
29
  }, opts);
29
30
  }
30
31
  exports.getAuthBackendConfig = getAuthBackendConfig;
32
+ function getAuthBackendConfigOutput(args, opts) {
33
+ return pulumi.output(args).apply(a => getAuthBackendConfig(a, opts));
34
+ }
35
+ exports.getAuthBackendConfigOutput = getAuthBackendConfigOutput;
31
36
  //# sourceMappingURL=getAuthBackendConfig.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"getAuthBackendConfig.js","sourceRoot":"","sources":["../../kubernetes/getAuthBackendConfig.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;AAEjF,yCAAyC;AAEzC,0CAA0C;AAE1C;;;;GAIG;AACH,SAAgB,oBAAoB,CAAC,IAA+B,EAAE,IAA2B;IAC7F,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;IAClB,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;QACf,IAAI,CAAC,OAAO,GAAG,SAAS,CAAC,UAAU,EAAE,CAAC;KACzC;IACD,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,4DAA4D,EAAE;QACvF,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,sBAAsB,EAAE,IAAI,CAAC,oBAAoB;QACjD,mBAAmB,EAAE,IAAI,CAAC,iBAAiB;QAC3C,QAAQ,EAAE,IAAI,CAAC,MAAM;QACrB,kBAAkB,EAAE,IAAI,CAAC,gBAAgB;QACzC,gBAAgB,EAAE,IAAI,CAAC,cAAc;QACrC,SAAS,EAAE,IAAI,CAAC,OAAO;KAC1B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAlBD,oDAkBC"}
1
+ {"version":3,"file":"getAuthBackendConfig.js","sourceRoot":"","sources":["../../kubernetes/getAuthBackendConfig.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;GAIG;AACH,SAAgB,oBAAoB,CAAC,IAA+B,EAAE,IAA2B;IAC7F,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;IAClB,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;QACf,IAAI,CAAC,OAAO,GAAG,SAAS,CAAC,UAAU,EAAE,CAAC;KACzC;IACD,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,4DAA4D,EAAE;QACvF,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,sBAAsB,EAAE,IAAI,CAAC,oBAAoB;QACjD,mBAAmB,EAAE,IAAI,CAAC,iBAAiB;QAC3C,QAAQ,EAAE,IAAI,CAAC,MAAM;QACrB,kBAAkB,EAAE,IAAI,CAAC,gBAAgB;QACzC,gBAAgB,EAAE,IAAI,CAAC,cAAc;QACrC,SAAS,EAAE,IAAI,CAAC,OAAO;KAC1B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAlBD,oDAkBC;AA4DD,SAAgB,0BAA0B,CAAC,IAAqC,EAAE,IAA2B;IACzG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,oBAAoB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACxE,CAAC;AAFD,gEAEC"}
@@ -25,82 +25,82 @@ export interface GetAuthBackendRoleArgs {
25
25
  /**
26
26
  * (Optional) Audience claim to verify in the JWT.
27
27
  */
28
- readonly audience?: string;
28
+ audience?: string;
29
29
  /**
30
30
  * The unique name for the Kubernetes backend the role to
31
31
  * retrieve Role attributes for resides in. Defaults to "kubernetes".
32
32
  */
33
- readonly backend?: string;
33
+ backend?: string;
34
34
  /**
35
35
  * @deprecated use `token_bound_cidrs` instead if you are running Vault >= 1.2
36
36
  */
37
- readonly boundCidrs?: string[];
37
+ boundCidrs?: string[];
38
38
  /**
39
39
  * @deprecated use `token_max_ttl` instead if you are running Vault >= 1.2
40
40
  */
41
- readonly maxTtl?: number;
41
+ maxTtl?: number;
42
42
  /**
43
43
  * @deprecated use `token_num_uses` instead if you are running Vault >= 1.2
44
44
  */
45
- readonly numUses?: number;
45
+ numUses?: number;
46
46
  /**
47
47
  * @deprecated use `token_period` instead if you are running Vault >= 1.2
48
48
  */
49
- readonly period?: number;
49
+ period?: number;
50
50
  /**
51
51
  * @deprecated use `token_policies` instead if you are running Vault >= 1.2
52
52
  */
53
- readonly policies?: string[];
53
+ policies?: string[];
54
54
  /**
55
55
  * The name of the role to retrieve the Role attributes for.
56
56
  */
57
- readonly roleName: string;
57
+ roleName: string;
58
58
  /**
59
59
  * List of CIDR blocks; if set, specifies blocks of IP
60
60
  * addresses which can authenticate successfully, and ties the resulting token to these blocks
61
61
  * as well.
62
62
  */
63
- readonly tokenBoundCidrs?: string[];
63
+ tokenBoundCidrs?: string[];
64
64
  /**
65
65
  * If set, will encode an
66
66
  * [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
67
67
  * onto the token in number of seconds. This is a hard cap even if `tokenTtl` and
68
68
  * `tokenMaxTtl` would otherwise allow a renewal.
69
69
  */
70
- readonly tokenExplicitMaxTtl?: number;
70
+ tokenExplicitMaxTtl?: number;
71
71
  /**
72
72
  * The maximum lifetime for generated tokens in number of seconds.
73
73
  * Its current value will be referenced at renewal time.
74
74
  */
75
- readonly tokenMaxTtl?: number;
75
+ tokenMaxTtl?: number;
76
76
  /**
77
77
  * If set, the default policy will not be set on
78
78
  * generated tokens; otherwise it will be added to the policies set in token_policies.
79
79
  */
80
- readonly tokenNoDefaultPolicy?: boolean;
80
+ tokenNoDefaultPolicy?: boolean;
81
81
  /**
82
82
  * The
83
83
  * [period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
84
84
  * if any, in number of seconds to set on the token.
85
85
  */
86
- readonly tokenNumUses?: number;
86
+ tokenNumUses?: number;
87
87
  /**
88
88
  * (Optional) If set, indicates that the
89
89
  * token generated using this role should never expire. The token should be renewed within the
90
90
  * duration specified by this value. At each renewal, the token's TTL will be set to the
91
91
  * value of this field. Specified in seconds.
92
92
  */
93
- readonly tokenPeriod?: number;
93
+ tokenPeriod?: number;
94
94
  /**
95
95
  * List of policies to encode onto generated tokens. Depending
96
96
  * on the auth method, this list may be supplemented by user/group/other values.
97
97
  */
98
- readonly tokenPolicies?: string[];
98
+ tokenPolicies?: string[];
99
99
  /**
100
100
  * The incremental lifetime for generated tokens in number of seconds.
101
101
  * Its current value will be referenced at renewal time.
102
102
  */
103
- readonly tokenTtl?: number;
103
+ tokenTtl?: number;
104
104
  /**
105
105
  * The type of token that should be generated. Can be `service`,
106
106
  * `batch`, or `default` to use the mount's tuned default (which unless changed will be
@@ -108,11 +108,11 @@ export interface GetAuthBackendRoleArgs {
108
108
  * `default-service` and `default-batch` which specify the type to return unless the client
109
109
  * requests a different type at generation time.
110
110
  */
111
- readonly tokenType?: string;
111
+ tokenType?: string;
112
112
  /**
113
113
  * @deprecated use `token_ttl` instead if you are running Vault >= 1.2
114
114
  */
115
- readonly ttl?: number;
115
+ ttl?: number;
116
116
  }
117
117
  /**
118
118
  * A collection of values returned by getAuthBackendRole.
@@ -215,3 +215,100 @@ export interface GetAuthBackendRoleResult {
215
215
  */
216
216
  readonly ttl?: number;
217
217
  }
218
+ export declare function getAuthBackendRoleOutput(args: GetAuthBackendRoleOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output<GetAuthBackendRoleResult>;
219
+ /**
220
+ * A collection of arguments for invoking getAuthBackendRole.
221
+ */
222
+ export interface GetAuthBackendRoleOutputArgs {
223
+ /**
224
+ * (Optional) Audience claim to verify in the JWT.
225
+ */
226
+ audience?: pulumi.Input<string>;
227
+ /**
228
+ * The unique name for the Kubernetes backend the role to
229
+ * retrieve Role attributes for resides in. Defaults to "kubernetes".
230
+ */
231
+ backend?: pulumi.Input<string>;
232
+ /**
233
+ * @deprecated use `token_bound_cidrs` instead if you are running Vault >= 1.2
234
+ */
235
+ boundCidrs?: pulumi.Input<pulumi.Input<string>[]>;
236
+ /**
237
+ * @deprecated use `token_max_ttl` instead if you are running Vault >= 1.2
238
+ */
239
+ maxTtl?: pulumi.Input<number>;
240
+ /**
241
+ * @deprecated use `token_num_uses` instead if you are running Vault >= 1.2
242
+ */
243
+ numUses?: pulumi.Input<number>;
244
+ /**
245
+ * @deprecated use `token_period` instead if you are running Vault >= 1.2
246
+ */
247
+ period?: pulumi.Input<number>;
248
+ /**
249
+ * @deprecated use `token_policies` instead if you are running Vault >= 1.2
250
+ */
251
+ policies?: pulumi.Input<pulumi.Input<string>[]>;
252
+ /**
253
+ * The name of the role to retrieve the Role attributes for.
254
+ */
255
+ roleName: pulumi.Input<string>;
256
+ /**
257
+ * List of CIDR blocks; if set, specifies blocks of IP
258
+ * addresses which can authenticate successfully, and ties the resulting token to these blocks
259
+ * as well.
260
+ */
261
+ tokenBoundCidrs?: pulumi.Input<pulumi.Input<string>[]>;
262
+ /**
263
+ * If set, will encode an
264
+ * [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
265
+ * onto the token in number of seconds. This is a hard cap even if `tokenTtl` and
266
+ * `tokenMaxTtl` would otherwise allow a renewal.
267
+ */
268
+ tokenExplicitMaxTtl?: pulumi.Input<number>;
269
+ /**
270
+ * The maximum lifetime for generated tokens in number of seconds.
271
+ * Its current value will be referenced at renewal time.
272
+ */
273
+ tokenMaxTtl?: pulumi.Input<number>;
274
+ /**
275
+ * If set, the default policy will not be set on
276
+ * generated tokens; otherwise it will be added to the policies set in token_policies.
277
+ */
278
+ tokenNoDefaultPolicy?: pulumi.Input<boolean>;
279
+ /**
280
+ * The
281
+ * [period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
282
+ * if any, in number of seconds to set on the token.
283
+ */
284
+ tokenNumUses?: pulumi.Input<number>;
285
+ /**
286
+ * (Optional) If set, indicates that the
287
+ * token generated using this role should never expire. The token should be renewed within the
288
+ * duration specified by this value. At each renewal, the token's TTL will be set to the
289
+ * value of this field. Specified in seconds.
290
+ */
291
+ tokenPeriod?: pulumi.Input<number>;
292
+ /**
293
+ * List of policies to encode onto generated tokens. Depending
294
+ * on the auth method, this list may be supplemented by user/group/other values.
295
+ */
296
+ tokenPolicies?: pulumi.Input<pulumi.Input<string>[]>;
297
+ /**
298
+ * The incremental lifetime for generated tokens in number of seconds.
299
+ * Its current value will be referenced at renewal time.
300
+ */
301
+ tokenTtl?: pulumi.Input<number>;
302
+ /**
303
+ * The type of token that should be generated. Can be `service`,
304
+ * `batch`, or `default` to use the mount's tuned default (which unless changed will be
305
+ * `service` tokens). For token store roles, there are two additional possibilities:
306
+ * `default-service` and `default-batch` which specify the type to return unless the client
307
+ * requests a different type at generation time.
308
+ */
309
+ tokenType?: pulumi.Input<string>;
310
+ /**
311
+ * @deprecated use `token_ttl` instead if you are running Vault >= 1.2
312
+ */
313
+ ttl?: pulumi.Input<number>;
314
+ }
@@ -2,6 +2,7 @@
2
2
  // *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  // *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
  Object.defineProperty(exports, "__esModule", { value: true });
5
+ exports.getAuthBackendRoleOutput = exports.getAuthBackendRole = void 0;
5
6
  const pulumi = require("@pulumi/pulumi");
6
7
  const utilities = require("../utilities");
7
8
  /**
@@ -51,4 +52,8 @@ function getAuthBackendRole(args, opts) {
51
52
  }, opts);
52
53
  }
53
54
  exports.getAuthBackendRole = getAuthBackendRole;
55
+ function getAuthBackendRoleOutput(args, opts) {
56
+ return pulumi.output(args).apply(a => getAuthBackendRole(a, opts));
57
+ }
58
+ exports.getAuthBackendRoleOutput = getAuthBackendRoleOutput;
54
59
  //# sourceMappingURL=getAuthBackendRole.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"getAuthBackendRole.js","sourceRoot":"","sources":["../../kubernetes/getAuthBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;AAEjF,yCAAyC;AAEzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;GAiBG;AACH,SAAgB,kBAAkB,CAAC,IAA4B,EAAE,IAA2B;IACxF,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;QACf,IAAI,CAAC,OAAO,GAAG,SAAS,CAAC,UAAU,EAAE,CAAC;KACzC;IACD,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,wDAAwD,EAAE;QACnF,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,YAAY,EAAE,IAAI,CAAC,UAAU;QAC7B,QAAQ,EAAE,IAAI,CAAC,MAAM;QACrB,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,QAAQ,EAAE,IAAI,CAAC,MAAM;QACrB,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,iBAAiB,EAAE,IAAI,CAAC,eAAe;QACvC,qBAAqB,EAAE,IAAI,CAAC,mBAAmB;QAC/C,aAAa,EAAE,IAAI,CAAC,WAAW;QAC/B,sBAAsB,EAAE,IAAI,CAAC,oBAAoB;QACjD,cAAc,EAAE,IAAI,CAAC,YAAY;QACjC,aAAa,EAAE,IAAI,CAAC,WAAW;QAC/B,eAAe,EAAE,IAAI,CAAC,aAAa;QACnC,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,WAAW,EAAE,IAAI,CAAC,SAAS;QAC3B,KAAK,EAAE,IAAI,CAAC,GAAG;KAClB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AA5BD,gDA4BC"}
1
+ {"version":3,"file":"getAuthBackendRole.js","sourceRoot":"","sources":["../../kubernetes/getAuthBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;GAiBG;AACH,SAAgB,kBAAkB,CAAC,IAA4B,EAAE,IAA2B;IACxF,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;QACf,IAAI,CAAC,OAAO,GAAG,SAAS,CAAC,UAAU,EAAE,CAAC;KACzC;IACD,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,wDAAwD,EAAE;QACnF,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,YAAY,EAAE,IAAI,CAAC,UAAU;QAC7B,QAAQ,EAAE,IAAI,CAAC,MAAM;QACrB,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,QAAQ,EAAE,IAAI,CAAC,MAAM;QACrB,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,iBAAiB,EAAE,IAAI,CAAC,eAAe;QACvC,qBAAqB,EAAE,IAAI,CAAC,mBAAmB;QAC/C,aAAa,EAAE,IAAI,CAAC,WAAW;QAC/B,sBAAsB,EAAE,IAAI,CAAC,oBAAoB;QACjD,cAAc,EAAE,IAAI,CAAC,YAAY;QACjC,aAAa,EAAE,IAAI,CAAC,WAAW;QAC/B,eAAe,EAAE,IAAI,CAAC,aAAa;QACnC,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,WAAW,EAAE,IAAI,CAAC,SAAS;QAC3B,KAAK,EAAE,IAAI,CAAC,GAAG;KAClB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AA5BD,gDA4BC;AAyMD,SAAgB,wBAAwB,CAAC,IAAkC,EAAE,IAA2B;IACpG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,kBAAkB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACtE,CAAC;AAFD,4DAEC"}