@pulumi/vault 4.5.0 → 4.6.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (398) hide show
  1. package/README.md +1 -1
  2. package/ad/getAccessCredentials.d.ts +18 -2
  3. package/ad/getAccessCredentials.js +5 -0
  4. package/ad/getAccessCredentials.js.map +1 -1
  5. package/ad/index.js +14 -7
  6. package/ad/index.js.map +1 -1
  7. package/ad/secretBackend.d.ts +68 -68
  8. package/ad/secretBackend.js +1 -0
  9. package/ad/secretBackend.js.map +1 -1
  10. package/ad/secretLibrary.d.ts +12 -12
  11. package/ad/secretLibrary.js +1 -0
  12. package/ad/secretLibrary.js.map +1 -1
  13. package/ad/secretRole.d.ts +10 -10
  14. package/ad/secretRole.js +1 -0
  15. package/ad/secretRole.js.map +1 -1
  16. package/alicloud/authBackendRole.d.ts +24 -24
  17. package/alicloud/authBackendRole.js +1 -0
  18. package/alicloud/authBackendRole.js.map +1 -1
  19. package/alicloud/index.js +11 -4
  20. package/alicloud/index.js.map +1 -1
  21. package/approle/authBackendLogin.d.ts +16 -16
  22. package/approle/authBackendLogin.js +4 -3
  23. package/approle/authBackendLogin.js.map +1 -1
  24. package/approle/authBackendRole.d.ts +39 -39
  25. package/approle/authBackendRole.js +2 -1
  26. package/approle/authBackendRole.js.map +1 -1
  27. package/approle/authBackendRoleSecretID.d.ts +17 -17
  28. package/approle/authBackendRoleSecretID.js +3 -2
  29. package/approle/authBackendRoleSecretID.js.map +1 -1
  30. package/approle/getAuthBackendRoleId.d.ts +17 -2
  31. package/approle/getAuthBackendRoleId.js +5 -0
  32. package/approle/getAuthBackendRoleId.js.map +1 -1
  33. package/approle/index.js +14 -7
  34. package/approle/index.js.map +1 -1
  35. package/audit.d.ts +10 -10
  36. package/audit.js +1 -0
  37. package/audit.js.map +1 -1
  38. package/authBackend.d.ts +17 -17
  39. package/authBackend.js +1 -0
  40. package/authBackend.js.map +1 -1
  41. package/aws/authBackendCert.d.ts +8 -8
  42. package/aws/authBackendCert.js +1 -0
  43. package/aws/authBackendCert.js.map +1 -1
  44. package/aws/authBackendClient.d.ts +16 -16
  45. package/aws/authBackendClient.js +1 -0
  46. package/aws/authBackendClient.js.map +1 -1
  47. package/aws/authBackendIdentityWhitelist.d.ts +6 -6
  48. package/aws/authBackendIdentityWhitelist.js +1 -0
  49. package/aws/authBackendIdentityWhitelist.js.map +1 -1
  50. package/aws/authBackendLogin.d.ts +28 -28
  51. package/aws/authBackendLogin.js +1 -0
  52. package/aws/authBackendLogin.js.map +1 -1
  53. package/aws/authBackendRole.d.ts +62 -62
  54. package/aws/authBackendRole.js +1 -0
  55. package/aws/authBackendRole.js.map +1 -1
  56. package/aws/authBackendRoleTag.d.ts +16 -16
  57. package/aws/authBackendRoleTag.js +1 -0
  58. package/aws/authBackendRoleTag.js.map +1 -1
  59. package/aws/authBackendRoletagBlacklist.d.ts +6 -6
  60. package/aws/authBackendRoletagBlacklist.js +1 -0
  61. package/aws/authBackendRoletagBlacklist.js.map +1 -1
  62. package/aws/authBackendStsRole.d.ts +6 -6
  63. package/aws/authBackendStsRole.js +1 -0
  64. package/aws/authBackendStsRole.js.map +1 -1
  65. package/aws/getAccessCredentials.d.ts +42 -6
  66. package/aws/getAccessCredentials.js +5 -0
  67. package/aws/getAccessCredentials.js.map +1 -1
  68. package/aws/index.js +21 -14
  69. package/aws/index.js.map +1 -1
  70. package/aws/secretBackend.d.ts +18 -18
  71. package/aws/secretBackend.js +1 -0
  72. package/aws/secretBackend.js.map +1 -1
  73. package/aws/secretBackendRole.d.ts +18 -18
  74. package/aws/secretBackendRole.js +1 -0
  75. package/aws/secretBackendRole.js.map +1 -1
  76. package/azure/authBackendConfig.d.ts +12 -12
  77. package/azure/authBackendConfig.js +1 -0
  78. package/azure/authBackendConfig.js.map +1 -1
  79. package/azure/authBackendRole.d.ts +45 -45
  80. package/azure/authBackendRole.js +1 -0
  81. package/azure/authBackendRole.js.map +1 -1
  82. package/azure/backend.d.ts +14 -14
  83. package/azure/backend.js +1 -0
  84. package/azure/backend.js.map +1 -1
  85. package/azure/backendRole.d.ts +16 -16
  86. package/azure/backendRole.js +1 -0
  87. package/azure/backendRole.js.map +1 -1
  88. package/azure/getAccessCredentials.d.ts +47 -6
  89. package/azure/getAccessCredentials.js +5 -0
  90. package/azure/getAccessCredentials.js.map +1 -1
  91. package/azure/index.js +15 -8
  92. package/azure/index.js.map +1 -1
  93. package/certAuthBackendRole.d.ts +50 -50
  94. package/certAuthBackendRole.js +1 -0
  95. package/certAuthBackendRole.js.map +1 -1
  96. package/config/index.js +11 -4
  97. package/config/index.js.map +1 -1
  98. package/config/vars.d.ts +13 -13
  99. package/config/vars.js +82 -53
  100. package/config/vars.js.map +1 -1
  101. package/consul/index.js +12 -5
  102. package/consul/index.js.map +1 -1
  103. package/consul/secretBackend.d.ts +22 -22
  104. package/consul/secretBackend.js +1 -0
  105. package/consul/secretBackend.js.map +1 -1
  106. package/consul/secretBackendRole.d.ts +16 -16
  107. package/consul/secretBackendRole.js +1 -0
  108. package/consul/secretBackendRole.js.map +1 -1
  109. package/database/index.js +13 -6
  110. package/database/index.js.map +1 -1
  111. package/database/secretBackendConnection.d.ts +38 -38
  112. package/database/secretBackendConnection.js +1 -0
  113. package/database/secretBackendConnection.js.map +1 -1
  114. package/database/secretBackendRole.d.ts +18 -18
  115. package/database/secretBackendRole.js +1 -0
  116. package/database/secretBackendRole.js.map +1 -1
  117. package/database/secretBackendStaticRole.d.ts +12 -12
  118. package/database/secretBackendStaticRole.js +1 -0
  119. package/database/secretBackendStaticRole.js.map +1 -1
  120. package/egpPolicy.d.ts +8 -8
  121. package/egpPolicy.js +1 -0
  122. package/egpPolicy.js.map +1 -1
  123. package/gcp/authBackend.d.ts +16 -16
  124. package/gcp/authBackend.js +1 -0
  125. package/gcp/authBackend.js.map +1 -1
  126. package/gcp/authBackendRole.d.ts +50 -50
  127. package/gcp/authBackendRole.js +1 -0
  128. package/gcp/authBackendRole.js.map +1 -1
  129. package/gcp/getAuthBackendRole.d.ts +80 -12
  130. package/gcp/getAuthBackendRole.js +6 -1
  131. package/gcp/getAuthBackendRole.js.map +1 -1
  132. package/gcp/index.js +16 -9
  133. package/gcp/index.js.map +1 -1
  134. package/gcp/secretBackend.d.ts +12 -12
  135. package/gcp/secretBackend.js +1 -0
  136. package/gcp/secretBackend.js.map +1 -1
  137. package/gcp/secretRoleset.d.ts +13 -13
  138. package/gcp/secretRoleset.js +1 -0
  139. package/gcp/secretRoleset.js.map +1 -1
  140. package/gcp/secretStaticAccount.d.ts +39 -13
  141. package/gcp/secretStaticAccount.js +27 -0
  142. package/gcp/secretStaticAccount.js.map +1 -1
  143. package/generic/endpoint.d.ts +14 -14
  144. package/generic/endpoint.js +1 -0
  145. package/generic/endpoint.js.map +1 -1
  146. package/generic/getSecret.d.ts +22 -2
  147. package/generic/getSecret.js +5 -0
  148. package/generic/getSecret.js.map +1 -1
  149. package/generic/index.js +13 -6
  150. package/generic/index.js.map +1 -1
  151. package/generic/secret.d.ts +7 -7
  152. package/generic/secret.js +1 -0
  153. package/generic/secret.js.map +1 -1
  154. package/getAuthBackend.d.ts +13 -3
  155. package/getAuthBackend.js +6 -1
  156. package/getAuthBackend.js.map +1 -1
  157. package/getNomadAccessToken.d.ts +18 -2
  158. package/getNomadAccessToken.js +5 -0
  159. package/getNomadAccessToken.js.map +1 -1
  160. package/getPolicyDocument.d.ts +8 -1
  161. package/getPolicyDocument.js +5 -0
  162. package/getPolicyDocument.js.map +1 -1
  163. package/github/authBackend.d.ts +44 -35
  164. package/github/authBackend.js +3 -2
  165. package/github/authBackend.js.map +1 -1
  166. package/github/index.js +13 -6
  167. package/github/index.js.map +1 -1
  168. package/github/team.d.ts +24 -24
  169. package/github/team.js +1 -0
  170. package/github/team.js.map +1 -1
  171. package/github/user.d.ts +24 -24
  172. package/github/user.js +1 -0
  173. package/github/user.js.map +1 -1
  174. package/identity/entity.d.ts +10 -10
  175. package/identity/entity.js +1 -0
  176. package/identity/entity.js.map +1 -1
  177. package/identity/entityAlias.d.ts +6 -6
  178. package/identity/entityAlias.js +1 -0
  179. package/identity/entityAlias.js.map +1 -1
  180. package/identity/entityPolicies.d.ts +7 -7
  181. package/identity/entityPolicies.js +1 -0
  182. package/identity/entityPolicies.js.map +1 -1
  183. package/identity/getEntity.d.ts +33 -5
  184. package/identity/getEntity.js +5 -0
  185. package/identity/getEntity.js.map +1 -1
  186. package/identity/getGroup.d.ts +33 -5
  187. package/identity/getGroup.js +5 -0
  188. package/identity/getGroup.js.map +1 -1
  189. package/identity/group.d.ts +16 -16
  190. package/identity/group.js +1 -0
  191. package/identity/group.js.map +1 -1
  192. package/identity/groupAlias.d.ts +6 -6
  193. package/identity/groupAlias.js +1 -0
  194. package/identity/groupAlias.js.map +1 -1
  195. package/identity/groupMemberEntityIds.d.ts +7 -7
  196. package/identity/groupMemberEntityIds.js +1 -0
  197. package/identity/groupMemberEntityIds.js.map +1 -1
  198. package/identity/groupPolicies.d.ts +7 -7
  199. package/identity/groupPolicies.js +1 -0
  200. package/identity/groupPolicies.js.map +1 -1
  201. package/identity/index.js +23 -16
  202. package/identity/index.js.map +1 -1
  203. package/identity/oidc.d.ts +2 -2
  204. package/identity/oidc.js +1 -0
  205. package/identity/oidc.js.map +1 -1
  206. package/identity/oidcKey.d.ts +10 -10
  207. package/identity/oidcKey.js +1 -0
  208. package/identity/oidcKey.js.map +1 -1
  209. package/identity/oidcKeyAllowedClientID.d.ts +4 -4
  210. package/identity/oidcKeyAllowedClientID.js +1 -0
  211. package/identity/oidcKeyAllowedClientID.js.map +1 -1
  212. package/identity/oidcRole.d.ts +10 -10
  213. package/identity/oidcRole.js +1 -0
  214. package/identity/oidcRole.js.map +1 -1
  215. package/index.js +31 -23
  216. package/index.js.map +1 -1
  217. package/jwt/authBackend.d.ts +33 -33
  218. package/jwt/authBackend.js +1 -0
  219. package/jwt/authBackend.js.map +1 -1
  220. package/jwt/authBackendRole.d.ts +64 -64
  221. package/jwt/authBackendRole.js +1 -0
  222. package/jwt/authBackendRole.js.map +1 -1
  223. package/jwt/index.js +12 -5
  224. package/jwt/index.js.map +1 -1
  225. package/kubernetes/authBackendConfig.d.ts +16 -16
  226. package/kubernetes/authBackendConfig.js +1 -0
  227. package/kubernetes/authBackendConfig.js.map +1 -1
  228. package/kubernetes/authBackendRole.d.ts +40 -40
  229. package/kubernetes/authBackendRole.js +1 -0
  230. package/kubernetes/authBackendRole.js.map +1 -1
  231. package/kubernetes/getAuthBackendConfig.d.ts +36 -7
  232. package/kubernetes/getAuthBackendConfig.js +5 -0
  233. package/kubernetes/getAuthBackendConfig.js.map +1 -1
  234. package/kubernetes/getAuthBackendRole.d.ts +115 -18
  235. package/kubernetes/getAuthBackendRole.js +5 -0
  236. package/kubernetes/getAuthBackendRole.js.map +1 -1
  237. package/kubernetes/index.js +14 -7
  238. package/kubernetes/index.js.map +1 -1
  239. package/ldap/authBackend.d.ts +63 -63
  240. package/ldap/authBackend.js +1 -0
  241. package/ldap/authBackend.js.map +1 -1
  242. package/ldap/authBackendGroup.d.ts +6 -6
  243. package/ldap/authBackendGroup.js +1 -0
  244. package/ldap/authBackendGroup.js.map +1 -1
  245. package/ldap/authBackendUser.d.ts +8 -8
  246. package/ldap/authBackendUser.js +1 -0
  247. package/ldap/authBackendUser.js.map +1 -1
  248. package/ldap/index.js +13 -6
  249. package/ldap/index.js.map +1 -1
  250. package/mfaDuo.d.ts +14 -14
  251. package/mfaDuo.js +1 -0
  252. package/mfaDuo.js.map +1 -1
  253. package/mount.d.ts +19 -19
  254. package/mount.js +1 -0
  255. package/mount.js.map +1 -1
  256. package/namespace.d.ts +3 -3
  257. package/namespace.js +1 -0
  258. package/namespace.js.map +1 -1
  259. package/nomadSecretBackend.d.ts +26 -26
  260. package/nomadSecretBackend.js +1 -0
  261. package/nomadSecretBackend.js.map +1 -1
  262. package/nomadSecretRole.d.ts +10 -10
  263. package/nomadSecretRole.js +1 -0
  264. package/nomadSecretRole.js.map +1 -1
  265. package/okta/authBackend.d.ts +21 -21
  266. package/okta/authBackend.js +1 -0
  267. package/okta/authBackend.js.map +1 -1
  268. package/okta/authBackendGroup.d.ts +6 -6
  269. package/okta/authBackendGroup.js +1 -0
  270. package/okta/authBackendGroup.js.map +1 -1
  271. package/okta/authBackendUser.d.ts +16 -8
  272. package/okta/authBackendUser.js +9 -0
  273. package/okta/authBackendUser.js.map +1 -1
  274. package/okta/index.js +13 -6
  275. package/okta/index.js.map +1 -1
  276. package/package.json +4 -3
  277. package/package.json.bak +3 -2
  278. package/package.json.dev +4 -3
  279. package/passwordPolicy.d.ts +4 -4
  280. package/passwordPolicy.js +1 -0
  281. package/passwordPolicy.js.map +1 -1
  282. package/pkisecret/index.js +21 -14
  283. package/pkisecret/index.js.map +1 -1
  284. package/pkisecret/secretBackend.d.ts +8 -8
  285. package/pkisecret/secretBackend.js +1 -0
  286. package/pkisecret/secretBackend.js.map +1 -1
  287. package/pkisecret/secretBackendCert.d.ts +33 -33
  288. package/pkisecret/secretBackendCert.js +1 -0
  289. package/pkisecret/secretBackendCert.js.map +1 -1
  290. package/pkisecret/secretBackendConfigCa.d.ts +4 -4
  291. package/pkisecret/secretBackendConfigCa.js +1 -0
  292. package/pkisecret/secretBackendConfigCa.js.map +1 -1
  293. package/pkisecret/secretBackendConfigUrls.d.ts +10 -10
  294. package/pkisecret/secretBackendConfigUrls.js +3 -2
  295. package/pkisecret/secretBackendConfigUrls.js.map +1 -1
  296. package/pkisecret/secretBackendCrlConfig.d.ts +7 -7
  297. package/pkisecret/secretBackendCrlConfig.js +2 -1
  298. package/pkisecret/secretBackendCrlConfig.js.map +1 -1
  299. package/pkisecret/secretBackendIntermediateCertRequest.d.ts +41 -41
  300. package/pkisecret/secretBackendIntermediateCertRequest.js +1 -0
  301. package/pkisecret/secretBackendIntermediateCertRequest.js.map +1 -1
  302. package/pkisecret/secretBackendIntermediateSetSigned.d.ts +4 -4
  303. package/pkisecret/secretBackendIntermediateSetSigned.js +1 -0
  304. package/pkisecret/secretBackendIntermediateSetSigned.js.map +1 -1
  305. package/pkisecret/secretBackendRole.d.ts +78 -78
  306. package/pkisecret/secretBackendRole.js +3 -2
  307. package/pkisecret/secretBackendRole.js.map +1 -1
  308. package/pkisecret/secretBackendRootCert.d.ts +47 -47
  309. package/pkisecret/secretBackendRootCert.js +1 -0
  310. package/pkisecret/secretBackendRootCert.js.map +1 -1
  311. package/pkisecret/secretBackendRootSignIntermediate.d.ts +45 -45
  312. package/pkisecret/secretBackendRootSignIntermediate.js +2 -1
  313. package/pkisecret/secretBackendRootSignIntermediate.js.map +1 -1
  314. package/pkisecret/secretBackendSign.d.ts +31 -31
  315. package/pkisecret/secretBackendSign.js +1 -0
  316. package/pkisecret/secretBackendSign.js.map +1 -1
  317. package/policy.d.ts +4 -4
  318. package/policy.js +1 -0
  319. package/policy.js.map +1 -1
  320. package/provider.d.ts +41 -13
  321. package/provider.js +4 -3
  322. package/provider.js.map +1 -1
  323. package/quotaLeaseCount.d.ts +6 -6
  324. package/quotaLeaseCount.js +1 -0
  325. package/quotaLeaseCount.js.map +1 -1
  326. package/quotaRateLimit.d.ts +6 -6
  327. package/quotaRateLimit.js +1 -0
  328. package/quotaRateLimit.js.map +1 -1
  329. package/rabbitmq/index.js +12 -5
  330. package/rabbitmq/index.js.map +1 -1
  331. package/rabbitmq/secretBackend.d.ts +16 -16
  332. package/rabbitmq/secretBackend.js +1 -0
  333. package/rabbitmq/secretBackend.js.map +1 -1
  334. package/rabbitmq/secretBackendRole.d.ts +8 -8
  335. package/rabbitmq/secretBackendRole.js +1 -0
  336. package/rabbitmq/secretBackendRole.js.map +1 -1
  337. package/raftSnapshotAgentConfig.d.ts +54 -54
  338. package/raftSnapshotAgentConfig.js +1 -0
  339. package/raftSnapshotAgentConfig.js.map +1 -1
  340. package/rgpPolicy.d.ts +6 -6
  341. package/rgpPolicy.js +1 -0
  342. package/rgpPolicy.js.map +1 -1
  343. package/ssh/index.js +12 -5
  344. package/ssh/index.js.map +1 -1
  345. package/ssh/secretBackendCa.d.ts +8 -8
  346. package/ssh/secretBackendCa.js +1 -0
  347. package/ssh/secretBackendCa.js.map +1 -1
  348. package/ssh/secretBackendRole.d.ts +44 -44
  349. package/ssh/secretBackendRole.js +1 -0
  350. package/ssh/secretBackendRole.js.map +1 -1
  351. package/token.d.ts +34 -34
  352. package/token.js +1 -0
  353. package/token.js.map +1 -1
  354. package/tokenauth/authBackendRole.d.ts +39 -39
  355. package/tokenauth/authBackendRole.js +1 -0
  356. package/tokenauth/authBackendRole.js.map +1 -1
  357. package/tokenauth/index.js +11 -4
  358. package/tokenauth/index.js.map +1 -1
  359. package/transform/alphabet.d.ts +6 -6
  360. package/transform/alphabet.js +1 -0
  361. package/transform/alphabet.js.map +1 -1
  362. package/transform/getDecode.d.ts +50 -8
  363. package/transform/getDecode.js +5 -0
  364. package/transform/getDecode.js.map +1 -1
  365. package/transform/getEncode.d.ts +50 -8
  366. package/transform/getEncode.js +5 -0
  367. package/transform/getEncode.js.map +1 -1
  368. package/transform/index.js +16 -9
  369. package/transform/index.js.map +1 -1
  370. package/transform/role.d.ts +6 -6
  371. package/transform/role.js +1 -0
  372. package/transform/role.js.map +1 -1
  373. package/transform/template.d.ts +10 -10
  374. package/transform/template.js +1 -0
  375. package/transform/template.js.map +1 -1
  376. package/transform/transformation.d.ts +16 -16
  377. package/transform/transformation.js +1 -0
  378. package/transform/transformation.js.map +1 -1
  379. package/transit/getDecrypt.d.ts +27 -5
  380. package/transit/getDecrypt.js +6 -1
  381. package/transit/getDecrypt.js.map +1 -1
  382. package/transit/getEncrypt.d.ts +31 -5
  383. package/transit/getEncrypt.js +5 -0
  384. package/transit/getEncrypt.js.map +1 -1
  385. package/transit/index.js +14 -7
  386. package/transit/index.js.map +1 -1
  387. package/transit/secretBackendKey.d.ts +27 -27
  388. package/transit/secretBackendKey.js +1 -0
  389. package/transit/secretBackendKey.js.map +1 -1
  390. package/transit/secretCacheConfig.d.ts +4 -4
  391. package/transit/secretCacheConfig.js +1 -0
  392. package/transit/secretCacheConfig.js.map +1 -1
  393. package/types/index.js +1 -0
  394. package/types/index.js.map +1 -1
  395. package/types/input.d.ts +54 -0
  396. package/types/output.d.ts +0 -16
  397. package/utilities.js +1 -0
  398. package/utilities.js.map +1 -1
@@ -1 +1 @@
1
- {"version":3,"file":"backendRole.js","sourceRoot":"","sources":["../../azure/backendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;AAEjF,yCAAyC;AAEzC,0CAA0C;AAE1C,MAAa,WAAY,SAAQ,MAAM,CAAC,cAAc;IAwElD,YAAY,IAAY,EAAE,WAAgD,EAAE,IAAmC;QAC3G,IAAI,MAAM,GAAkB,EAAE,CAAC;QAC/B,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA2C,CAAC;YAC1D,MAAM,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACjD;aAAM;YACH,MAAM,IAAI,GAAG,WAA0C,CAAC;YACxD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,MAAM,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9C,MAAM,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/C;QACD,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;YACf,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE,EAAC,CAAC,CAAC;SACxE;QACD,KAAK,CAAC,WAAW,CAAC,YAAY,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,CAAC,CAAC;IACxD,CAAC;IAtGD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAwB,EAAE,IAAmC;QACtH,OAAO,IAAI,WAAW,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAClE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,WAAW,CAAC,YAAY,CAAC;IAC5D,CAAC;;AA1BL,kCAwGC;AA1FG,gBAAgB;AACO,wBAAY,GAAG,qCAAqC,CAAC"}
1
+ {"version":3,"file":"backendRole.js","sourceRoot":"","sources":["../../azure/backendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAEzC,0CAA0C;AAE1C,MAAa,WAAY,SAAQ,MAAM,CAAC,cAAc;IAwElD,YAAY,IAAY,EAAE,WAAgD,EAAE,IAAmC;QAC3G,IAAI,MAAM,GAAkB,EAAE,CAAC;QAC/B,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA2C,CAAC;YAC1D,MAAM,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACjD;aAAM;YACH,MAAM,IAAI,GAAG,WAA0C,CAAC;YACxD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,MAAM,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9C,MAAM,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/C;QACD,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;YACf,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE,EAAC,CAAC,CAAC;SACxE;QACD,KAAK,CAAC,WAAW,CAAC,YAAY,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,CAAC,CAAC;IACxD,CAAC;IAtGD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAwB,EAAE,IAAmC;QACtH,OAAO,IAAI,WAAW,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAClE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,WAAW,CAAC,YAAY,CAAC;IAC5D,CAAC;;AA1BL,kCAwGC;AA1FG,gBAAgB;AACO,wBAAY,GAAG,qCAAqC,CAAC"}
@@ -8,37 +8,37 @@ export interface GetAccessCredentialsArgs {
8
8
  * The path to the Azure secret backend to
9
9
  * read credentials from, with no leading or trailing `/`s.
10
10
  */
11
- readonly backend: string;
11
+ backend: string;
12
12
  /**
13
13
  * If 'validate_creds' is true,
14
14
  * the number of seconds after which to give up validating credentials. Defaults
15
15
  * to 1,200 (20 minutes).
16
16
  */
17
- readonly maxCredValidationSeconds?: number;
17
+ maxCredValidationSeconds?: number;
18
18
  /**
19
19
  * If 'validate_creds' is true,
20
20
  * the number of seconds to wait between each test of generated credentials.
21
21
  * Defaults to 7.
22
22
  */
23
- readonly numSecondsBetweenTests?: number;
23
+ numSecondsBetweenTests?: number;
24
24
  /**
25
25
  * If 'validate_creds' is true,
26
26
  * the number of sequential successes required to validate generated
27
27
  * credentials. Defaults to 8.
28
28
  */
29
- readonly numSequentialSuccesses?: number;
29
+ numSequentialSuccesses?: number;
30
30
  /**
31
31
  * The name of the Azure secret backend role to read
32
32
  * credentials from, with no leading or trailing `/`s.
33
33
  */
34
- readonly role: string;
34
+ role: string;
35
35
  /**
36
36
  * Whether generated credentials should be
37
37
  * validated before being returned. Defaults to `false`, which returns
38
38
  * credentials without checking whether they have fully propagated throughout
39
39
  * Azure Active Directory. Designating `true` activates testing.
40
40
  */
41
- readonly validateCreds?: boolean;
41
+ validateCreds?: boolean;
42
42
  }
43
43
  /**
44
44
  * A collection of values returned by getAccessCredentials.
@@ -75,3 +75,44 @@ export interface GetAccessCredentialsResult {
75
75
  readonly role: string;
76
76
  readonly validateCreds?: boolean;
77
77
  }
78
+ export declare function getAccessCredentialsOutput(args: GetAccessCredentialsOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output<GetAccessCredentialsResult>;
79
+ /**
80
+ * A collection of arguments for invoking getAccessCredentials.
81
+ */
82
+ export interface GetAccessCredentialsOutputArgs {
83
+ /**
84
+ * The path to the Azure secret backend to
85
+ * read credentials from, with no leading or trailing `/`s.
86
+ */
87
+ backend: pulumi.Input<string>;
88
+ /**
89
+ * If 'validate_creds' is true,
90
+ * the number of seconds after which to give up validating credentials. Defaults
91
+ * to 1,200 (20 minutes).
92
+ */
93
+ maxCredValidationSeconds?: pulumi.Input<number>;
94
+ /**
95
+ * If 'validate_creds' is true,
96
+ * the number of seconds to wait between each test of generated credentials.
97
+ * Defaults to 7.
98
+ */
99
+ numSecondsBetweenTests?: pulumi.Input<number>;
100
+ /**
101
+ * If 'validate_creds' is true,
102
+ * the number of sequential successes required to validate generated
103
+ * credentials. Defaults to 8.
104
+ */
105
+ numSequentialSuccesses?: pulumi.Input<number>;
106
+ /**
107
+ * The name of the Azure secret backend role to read
108
+ * credentials from, with no leading or trailing `/`s.
109
+ */
110
+ role: pulumi.Input<string>;
111
+ /**
112
+ * Whether generated credentials should be
113
+ * validated before being returned. Defaults to `false`, which returns
114
+ * credentials without checking whether they have fully propagated throughout
115
+ * Azure Active Directory. Designating `true` activates testing.
116
+ */
117
+ validateCreds?: pulumi.Input<boolean>;
118
+ }
@@ -2,6 +2,7 @@
2
2
  // *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  // *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
  Object.defineProperty(exports, "__esModule", { value: true });
5
+ exports.getAccessCredentialsOutput = exports.getAccessCredentials = void 0;
5
6
  const pulumi = require("@pulumi/pulumi");
6
7
  const utilities = require("../utilities");
7
8
  function getAccessCredentials(args, opts) {
@@ -21,4 +22,8 @@ function getAccessCredentials(args, opts) {
21
22
  }, opts);
22
23
  }
23
24
  exports.getAccessCredentials = getAccessCredentials;
25
+ function getAccessCredentialsOutput(args, opts) {
26
+ return pulumi.output(args).apply(a => getAccessCredentials(a, opts));
27
+ }
28
+ exports.getAccessCredentialsOutput = getAccessCredentialsOutput;
24
29
  //# sourceMappingURL=getAccessCredentials.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"getAccessCredentials.js","sourceRoot":"","sources":["../../azure/getAccessCredentials.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;AAEjF,yCAAyC;AAEzC,0CAA0C;AAE1C,SAAgB,oBAAoB,CAAC,IAA8B,EAAE,IAA2B;IAC5F,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;QACf,IAAI,CAAC,OAAO,GAAG,SAAS,CAAC,UAAU,EAAE,CAAC;KACzC;IACD,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,uDAAuD,EAAE;QAClF,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,0BAA0B,EAAE,IAAI,CAAC,wBAAwB;QACzD,wBAAwB,EAAE,IAAI,CAAC,sBAAsB;QACrD,wBAAwB,EAAE,IAAI,CAAC,sBAAsB;QACrD,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,eAAe,EAAE,IAAI,CAAC,aAAa;KACtC,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAhBD,oDAgBC"}
1
+ {"version":3,"file":"getAccessCredentials.js","sourceRoot":"","sources":["../../azure/getAccessCredentials.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,SAAgB,oBAAoB,CAAC,IAA8B,EAAE,IAA2B;IAC5F,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;QACf,IAAI,CAAC,OAAO,GAAG,SAAS,CAAC,UAAU,EAAE,CAAC;KACzC;IACD,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,uDAAuD,EAAE;QAClF,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,0BAA0B,EAAE,IAAI,CAAC,wBAAwB;QACzD,wBAAwB,EAAE,IAAI,CAAC,sBAAsB;QACrD,wBAAwB,EAAE,IAAI,CAAC,sBAAsB;QACrD,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,eAAe,EAAE,IAAI,CAAC,aAAa;KACtC,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAhBD,oDAgBC;AA+ED,SAAgB,0BAA0B,CAAC,IAAoC,EAAE,IAA2B;IACxG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,oBAAoB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACxE,CAAC;AAFD,gEAEC"}
package/azure/index.js CHANGED
@@ -1,18 +1,25 @@
1
1
  "use strict";
2
2
  // *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  // *** Do not edit by hand unless you're certain you know what you are doing! ***
4
- function __export(m) {
5
- for (var p in m) if (!exports.hasOwnProperty(p)) exports[p] = m[p];
6
- }
4
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
5
+ if (k2 === undefined) k2 = k;
6
+ Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } });
7
+ }) : (function(o, m, k, k2) {
8
+ if (k2 === undefined) k2 = k;
9
+ o[k2] = m[k];
10
+ }));
11
+ var __exportStar = (this && this.__exportStar) || function(m, exports) {
12
+ for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
13
+ };
7
14
  Object.defineProperty(exports, "__esModule", { value: true });
8
15
  const pulumi = require("@pulumi/pulumi");
9
16
  const utilities = require("../utilities");
10
17
  // Export members:
11
- __export(require("./authBackendConfig"));
12
- __export(require("./authBackendRole"));
13
- __export(require("./backend"));
14
- __export(require("./backendRole"));
15
- __export(require("./getAccessCredentials"));
18
+ __exportStar(require("./authBackendConfig"), exports);
19
+ __exportStar(require("./authBackendRole"), exports);
20
+ __exportStar(require("./backend"), exports);
21
+ __exportStar(require("./backendRole"), exports);
22
+ __exportStar(require("./getAccessCredentials"), exports);
16
23
  // Import resources to register:
17
24
  const authBackendConfig_1 = require("./authBackendConfig");
18
25
  const authBackendRole_1 = require("./authBackendRole");
@@ -1 +1 @@
1
- {"version":3,"file":"index.js","sourceRoot":"","sources":["../../azure/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,kBAAkB;AAClB,yCAAoC;AACpC,uCAAkC;AAClC,+BAA0B;AAC1B,mCAA8B;AAC9B,4CAAuC;AAEvC,gCAAgC;AAChC,2DAAwD;AACxD,uDAAoD;AACpD,uCAAoC;AACpC,+CAA4C;AAE5C,MAAM,OAAO,GAAG;IACZ,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE;IAC/B,SAAS,EAAE,CAAC,IAAY,EAAE,IAAY,EAAE,GAAW,EAAmB,EAAE;QACpE,QAAQ,IAAI,EAAE;YACV,KAAK,iDAAiD;gBAClD,OAAO,IAAI,qCAAiB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC/D,KAAK,6CAA6C;gBAC9C,OAAO,IAAI,iCAAe,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC7D,KAAK,6BAA6B;gBAC9B,OAAO,IAAI,iBAAO,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACrD,KAAK,qCAAqC;gBACtC,OAAO,IAAI,yBAAW,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACzD;gBACI,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,EAAE,CAAC,CAAC;SACxD;IACL,CAAC;CACJ,CAAC;AACF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,yBAAyB,EAAE,OAAO,CAAC,CAAA;AAClF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,uBAAuB,EAAE,OAAO,CAAC,CAAA;AAChF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,eAAe,EAAE,OAAO,CAAC,CAAA;AACxE,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,mBAAmB,EAAE,OAAO,CAAC,CAAA"}
1
+ {"version":3,"file":"index.js","sourceRoot":"","sources":["../../azure/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;;;;;;;;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,kBAAkB;AAClB,sDAAoC;AACpC,oDAAkC;AAClC,4CAA0B;AAC1B,gDAA8B;AAC9B,yDAAuC;AAEvC,gCAAgC;AAChC,2DAAwD;AACxD,uDAAoD;AACpD,uCAAoC;AACpC,+CAA4C;AAE5C,MAAM,OAAO,GAAG;IACZ,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE;IAC/B,SAAS,EAAE,CAAC,IAAY,EAAE,IAAY,EAAE,GAAW,EAAmB,EAAE;QACpE,QAAQ,IAAI,EAAE;YACV,KAAK,iDAAiD;gBAClD,OAAO,IAAI,qCAAiB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC/D,KAAK,6CAA6C;gBAC9C,OAAO,IAAI,iCAAe,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC7D,KAAK,6BAA6B;gBAC9B,OAAO,IAAI,iBAAO,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACrD,KAAK,qCAAqC;gBACtC,OAAO,IAAI,yBAAW,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACzD;gBACI,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,EAAE,CAAC,CAAC;SACxD;IACL,CAAC;CACJ,CAAC;AACF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,yBAAyB,EAAE,OAAO,CAAC,CAAA;AAClF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,uBAAuB,EAAE,OAAO,CAAC,CAAA;AAChF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,eAAe,EAAE,OAAO,CAAC,CAAA;AACxE,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,mBAAmB,EAAE,OAAO,CAAC,CAAA"}
@@ -193,57 +193,57 @@ export interface CertAuthBackendRoleState {
193
193
  /**
194
194
  * Allowed the common names for authenticated client certificates
195
195
  */
196
- readonly allowedCommonNames?: pulumi.Input<pulumi.Input<string>[]>;
196
+ allowedCommonNames?: pulumi.Input<pulumi.Input<string>[]>;
197
197
  /**
198
198
  * Allowed alternative dns names for authenticated client certificates
199
199
  */
200
- readonly allowedDnsSans?: pulumi.Input<pulumi.Input<string>[]>;
200
+ allowedDnsSans?: pulumi.Input<pulumi.Input<string>[]>;
201
201
  /**
202
202
  * Allowed emails for authenticated client certificates
203
203
  */
204
- readonly allowedEmailSans?: pulumi.Input<pulumi.Input<string>[]>;
204
+ allowedEmailSans?: pulumi.Input<pulumi.Input<string>[]>;
205
205
  /**
206
206
  * Allowed subject names for authenticated client certificates
207
207
  */
208
- readonly allowedNames?: pulumi.Input<pulumi.Input<string>[]>;
208
+ allowedNames?: pulumi.Input<pulumi.Input<string>[]>;
209
209
  /**
210
210
  * Allowed organization units for authenticated client certificates
211
211
  */
212
- readonly allowedOrganizationUnits?: pulumi.Input<pulumi.Input<string>[]>;
212
+ allowedOrganizationUnits?: pulumi.Input<pulumi.Input<string>[]>;
213
213
  /**
214
214
  * Allowed URIs for authenticated client certificates
215
215
  */
216
- readonly allowedUriSans?: pulumi.Input<pulumi.Input<string>[]>;
216
+ allowedUriSans?: pulumi.Input<pulumi.Input<string>[]>;
217
217
  /**
218
218
  * Path to the mounted Cert auth backend
219
219
  */
220
- readonly backend?: pulumi.Input<string>;
220
+ backend?: pulumi.Input<string>;
221
221
  /**
222
222
  * Restriction usage of the
223
223
  * certificates to client IPs falling within the range of the specified CIDRs
224
224
  *
225
225
  * @deprecated use `token_bound_cidrs` instead if you are running Vault >= 1.2
226
226
  */
227
- readonly boundCidrs?: pulumi.Input<pulumi.Input<string>[]>;
227
+ boundCidrs?: pulumi.Input<pulumi.Input<string>[]>;
228
228
  /**
229
229
  * CA certificate used to validate client certificates
230
230
  */
231
- readonly certificate?: pulumi.Input<string>;
231
+ certificate?: pulumi.Input<string>;
232
232
  /**
233
233
  * The name to display on tokens issued under this role.
234
234
  */
235
- readonly displayName?: pulumi.Input<string>;
235
+ displayName?: pulumi.Input<string>;
236
236
  /**
237
237
  * The maximum allowed lifetime of tokens
238
238
  * issued using this role, provided as a number of seconds.
239
239
  *
240
240
  * @deprecated use `token_max_ttl` instead if you are running Vault >= 1.2
241
241
  */
242
- readonly maxTtl?: pulumi.Input<string>;
242
+ maxTtl?: pulumi.Input<string>;
243
243
  /**
244
244
  * Name of the role
245
245
  */
246
- readonly name?: pulumi.Input<string>;
246
+ name?: pulumi.Input<string>;
247
247
  /**
248
248
  * If set, indicates that the
249
249
  * token generated using this role should never expire. The token should be renewed within the
@@ -252,64 +252,64 @@ export interface CertAuthBackendRoleState {
252
252
  *
253
253
  * @deprecated use `token_period` instead if you are running Vault >= 1.2
254
254
  */
255
- readonly period?: pulumi.Input<string>;
255
+ period?: pulumi.Input<string>;
256
256
  /**
257
257
  * An array of strings
258
258
  * specifying the policies to be set on tokens issued using this role.
259
259
  *
260
260
  * @deprecated use `token_policies` instead if you are running Vault >= 1.2
261
261
  */
262
- readonly policies?: pulumi.Input<pulumi.Input<string>[]>;
262
+ policies?: pulumi.Input<pulumi.Input<string>[]>;
263
263
  /**
264
264
  * TLS extensions required on client certificates
265
265
  */
266
- readonly requiredExtensions?: pulumi.Input<pulumi.Input<string>[]>;
266
+ requiredExtensions?: pulumi.Input<pulumi.Input<string>[]>;
267
267
  /**
268
268
  * List of CIDR blocks; if set, specifies blocks of IP
269
269
  * addresses which can authenticate successfully, and ties the resulting token to these blocks
270
270
  * as well.
271
271
  */
272
- readonly tokenBoundCidrs?: pulumi.Input<pulumi.Input<string>[]>;
272
+ tokenBoundCidrs?: pulumi.Input<pulumi.Input<string>[]>;
273
273
  /**
274
274
  * If set, will encode an
275
275
  * [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
276
276
  * onto the token in number of seconds. This is a hard cap even if `tokenTtl` and
277
277
  * `tokenMaxTtl` would otherwise allow a renewal.
278
278
  */
279
- readonly tokenExplicitMaxTtl?: pulumi.Input<number>;
279
+ tokenExplicitMaxTtl?: pulumi.Input<number>;
280
280
  /**
281
281
  * The maximum lifetime for generated tokens in number of seconds.
282
282
  * Its current value will be referenced at renewal time.
283
283
  */
284
- readonly tokenMaxTtl?: pulumi.Input<number>;
284
+ tokenMaxTtl?: pulumi.Input<number>;
285
285
  /**
286
286
  * If set, the default policy will not be set on
287
287
  * generated tokens; otherwise it will be added to the policies set in token_policies.
288
288
  */
289
- readonly tokenNoDefaultPolicy?: pulumi.Input<boolean>;
289
+ tokenNoDefaultPolicy?: pulumi.Input<boolean>;
290
290
  /**
291
291
  * The
292
292
  * [period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
293
293
  * if any, in number of seconds to set on the token.
294
294
  */
295
- readonly tokenNumUses?: pulumi.Input<number>;
295
+ tokenNumUses?: pulumi.Input<number>;
296
296
  /**
297
297
  * If set, indicates that the
298
298
  * token generated using this role should never expire. The token should be renewed within the
299
299
  * duration specified by this value. At each renewal, the token's TTL will be set to the
300
300
  * value of this field. Specified in seconds.
301
301
  */
302
- readonly tokenPeriod?: pulumi.Input<number>;
302
+ tokenPeriod?: pulumi.Input<number>;
303
303
  /**
304
304
  * List of policies to encode onto generated tokens. Depending
305
305
  * on the auth method, this list may be supplemented by user/group/other values.
306
306
  */
307
- readonly tokenPolicies?: pulumi.Input<pulumi.Input<string>[]>;
307
+ tokenPolicies?: pulumi.Input<pulumi.Input<string>[]>;
308
308
  /**
309
309
  * The incremental lifetime for generated tokens in number of seconds.
310
310
  * Its current value will be referenced at renewal time.
311
311
  */
312
- readonly tokenTtl?: pulumi.Input<number>;
312
+ tokenTtl?: pulumi.Input<number>;
313
313
  /**
314
314
  * The type of token that should be generated. Can be `service`,
315
315
  * `batch`, or `default` to use the mount's tuned default (which unless changed will be
@@ -317,14 +317,14 @@ export interface CertAuthBackendRoleState {
317
317
  * `default-service` and `default-batch` which specify the type to return unless the client
318
318
  * requests a different type at generation time.
319
319
  */
320
- readonly tokenType?: pulumi.Input<string>;
320
+ tokenType?: pulumi.Input<string>;
321
321
  /**
322
322
  * The TTL period of tokens issued
323
323
  * using this role, provided as a number of seconds.
324
324
  *
325
325
  * @deprecated use `token_ttl` instead if you are running Vault >= 1.2
326
326
  */
327
- readonly ttl?: pulumi.Input<string>;
327
+ ttl?: pulumi.Input<string>;
328
328
  }
329
329
  /**
330
330
  * The set of arguments for constructing a CertAuthBackendRole resource.
@@ -333,57 +333,57 @@ export interface CertAuthBackendRoleArgs {
333
333
  /**
334
334
  * Allowed the common names for authenticated client certificates
335
335
  */
336
- readonly allowedCommonNames?: pulumi.Input<pulumi.Input<string>[]>;
336
+ allowedCommonNames?: pulumi.Input<pulumi.Input<string>[]>;
337
337
  /**
338
338
  * Allowed alternative dns names for authenticated client certificates
339
339
  */
340
- readonly allowedDnsSans?: pulumi.Input<pulumi.Input<string>[]>;
340
+ allowedDnsSans?: pulumi.Input<pulumi.Input<string>[]>;
341
341
  /**
342
342
  * Allowed emails for authenticated client certificates
343
343
  */
344
- readonly allowedEmailSans?: pulumi.Input<pulumi.Input<string>[]>;
344
+ allowedEmailSans?: pulumi.Input<pulumi.Input<string>[]>;
345
345
  /**
346
346
  * Allowed subject names for authenticated client certificates
347
347
  */
348
- readonly allowedNames?: pulumi.Input<pulumi.Input<string>[]>;
348
+ allowedNames?: pulumi.Input<pulumi.Input<string>[]>;
349
349
  /**
350
350
  * Allowed organization units for authenticated client certificates
351
351
  */
352
- readonly allowedOrganizationUnits?: pulumi.Input<pulumi.Input<string>[]>;
352
+ allowedOrganizationUnits?: pulumi.Input<pulumi.Input<string>[]>;
353
353
  /**
354
354
  * Allowed URIs for authenticated client certificates
355
355
  */
356
- readonly allowedUriSans?: pulumi.Input<pulumi.Input<string>[]>;
356
+ allowedUriSans?: pulumi.Input<pulumi.Input<string>[]>;
357
357
  /**
358
358
  * Path to the mounted Cert auth backend
359
359
  */
360
- readonly backend?: pulumi.Input<string>;
360
+ backend?: pulumi.Input<string>;
361
361
  /**
362
362
  * Restriction usage of the
363
363
  * certificates to client IPs falling within the range of the specified CIDRs
364
364
  *
365
365
  * @deprecated use `token_bound_cidrs` instead if you are running Vault >= 1.2
366
366
  */
367
- readonly boundCidrs?: pulumi.Input<pulumi.Input<string>[]>;
367
+ boundCidrs?: pulumi.Input<pulumi.Input<string>[]>;
368
368
  /**
369
369
  * CA certificate used to validate client certificates
370
370
  */
371
- readonly certificate: pulumi.Input<string>;
371
+ certificate: pulumi.Input<string>;
372
372
  /**
373
373
  * The name to display on tokens issued under this role.
374
374
  */
375
- readonly displayName?: pulumi.Input<string>;
375
+ displayName?: pulumi.Input<string>;
376
376
  /**
377
377
  * The maximum allowed lifetime of tokens
378
378
  * issued using this role, provided as a number of seconds.
379
379
  *
380
380
  * @deprecated use `token_max_ttl` instead if you are running Vault >= 1.2
381
381
  */
382
- readonly maxTtl?: pulumi.Input<string>;
382
+ maxTtl?: pulumi.Input<string>;
383
383
  /**
384
384
  * Name of the role
385
385
  */
386
- readonly name?: pulumi.Input<string>;
386
+ name?: pulumi.Input<string>;
387
387
  /**
388
388
  * If set, indicates that the
389
389
  * token generated using this role should never expire. The token should be renewed within the
@@ -392,64 +392,64 @@ export interface CertAuthBackendRoleArgs {
392
392
  *
393
393
  * @deprecated use `token_period` instead if you are running Vault >= 1.2
394
394
  */
395
- readonly period?: pulumi.Input<string>;
395
+ period?: pulumi.Input<string>;
396
396
  /**
397
397
  * An array of strings
398
398
  * specifying the policies to be set on tokens issued using this role.
399
399
  *
400
400
  * @deprecated use `token_policies` instead if you are running Vault >= 1.2
401
401
  */
402
- readonly policies?: pulumi.Input<pulumi.Input<string>[]>;
402
+ policies?: pulumi.Input<pulumi.Input<string>[]>;
403
403
  /**
404
404
  * TLS extensions required on client certificates
405
405
  */
406
- readonly requiredExtensions?: pulumi.Input<pulumi.Input<string>[]>;
406
+ requiredExtensions?: pulumi.Input<pulumi.Input<string>[]>;
407
407
  /**
408
408
  * List of CIDR blocks; if set, specifies blocks of IP
409
409
  * addresses which can authenticate successfully, and ties the resulting token to these blocks
410
410
  * as well.
411
411
  */
412
- readonly tokenBoundCidrs?: pulumi.Input<pulumi.Input<string>[]>;
412
+ tokenBoundCidrs?: pulumi.Input<pulumi.Input<string>[]>;
413
413
  /**
414
414
  * If set, will encode an
415
415
  * [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
416
416
  * onto the token in number of seconds. This is a hard cap even if `tokenTtl` and
417
417
  * `tokenMaxTtl` would otherwise allow a renewal.
418
418
  */
419
- readonly tokenExplicitMaxTtl?: pulumi.Input<number>;
419
+ tokenExplicitMaxTtl?: pulumi.Input<number>;
420
420
  /**
421
421
  * The maximum lifetime for generated tokens in number of seconds.
422
422
  * Its current value will be referenced at renewal time.
423
423
  */
424
- readonly tokenMaxTtl?: pulumi.Input<number>;
424
+ tokenMaxTtl?: pulumi.Input<number>;
425
425
  /**
426
426
  * If set, the default policy will not be set on
427
427
  * generated tokens; otherwise it will be added to the policies set in token_policies.
428
428
  */
429
- readonly tokenNoDefaultPolicy?: pulumi.Input<boolean>;
429
+ tokenNoDefaultPolicy?: pulumi.Input<boolean>;
430
430
  /**
431
431
  * The
432
432
  * [period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
433
433
  * if any, in number of seconds to set on the token.
434
434
  */
435
- readonly tokenNumUses?: pulumi.Input<number>;
435
+ tokenNumUses?: pulumi.Input<number>;
436
436
  /**
437
437
  * If set, indicates that the
438
438
  * token generated using this role should never expire. The token should be renewed within the
439
439
  * duration specified by this value. At each renewal, the token's TTL will be set to the
440
440
  * value of this field. Specified in seconds.
441
441
  */
442
- readonly tokenPeriod?: pulumi.Input<number>;
442
+ tokenPeriod?: pulumi.Input<number>;
443
443
  /**
444
444
  * List of policies to encode onto generated tokens. Depending
445
445
  * on the auth method, this list may be supplemented by user/group/other values.
446
446
  */
447
- readonly tokenPolicies?: pulumi.Input<pulumi.Input<string>[]>;
447
+ tokenPolicies?: pulumi.Input<pulumi.Input<string>[]>;
448
448
  /**
449
449
  * The incremental lifetime for generated tokens in number of seconds.
450
450
  * Its current value will be referenced at renewal time.
451
451
  */
452
- readonly tokenTtl?: pulumi.Input<number>;
452
+ tokenTtl?: pulumi.Input<number>;
453
453
  /**
454
454
  * The type of token that should be generated. Can be `service`,
455
455
  * `batch`, or `default` to use the mount's tuned default (which unless changed will be
@@ -457,12 +457,12 @@ export interface CertAuthBackendRoleArgs {
457
457
  * `default-service` and `default-batch` which specify the type to return unless the client
458
458
  * requests a different type at generation time.
459
459
  */
460
- readonly tokenType?: pulumi.Input<string>;
460
+ tokenType?: pulumi.Input<string>;
461
461
  /**
462
462
  * The TTL period of tokens issued
463
463
  * using this role, provided as a number of seconds.
464
464
  *
465
465
  * @deprecated use `token_ttl` instead if you are running Vault >= 1.2
466
466
  */
467
- readonly ttl?: pulumi.Input<string>;
467
+ ttl?: pulumi.Input<string>;
468
468
  }
@@ -2,6 +2,7 @@
2
2
  // *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  // *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
  Object.defineProperty(exports, "__esModule", { value: true });
5
+ exports.CertAuthBackendRole = void 0;
5
6
  const pulumi = require("@pulumi/pulumi");
6
7
  const utilities = require("./utilities");
7
8
  /**
@@ -1 +1 @@
1
- {"version":3,"file":"certAuthBackendRole.js","sourceRoot":"","sources":["../certAuthBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;GA0BG;AACH,MAAa,mBAAoB,SAAQ,MAAM,CAAC,cAAc;IA4K1D,YAAY,IAAY,EAAE,WAAgE,EAAE,IAAmC;QAC3H,IAAI,MAAM,GAAkB,EAAE,CAAC;QAC/B,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAmD,CAAC;YAClE,MAAM,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,MAAM,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,MAAM,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,MAAM,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,MAAM,CAAC,0BAA0B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,MAAM,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,MAAM,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,MAAM,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,MAAM,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,sBAAsB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,MAAM,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,MAAM,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACjD;aAAM;YACH,MAAM,IAAI,GAAG,WAAkD,CAAC;YAChE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,WAAW,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACxD,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,MAAM,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,MAAM,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,MAAM,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,MAAM,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,0BAA0B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,MAAM,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,MAAM,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9C,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,MAAM,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,MAAM,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,sBAAsB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,MAAM,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,MAAM,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/C;QACD,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;YACf,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE,EAAC,CAAC,CAAC;SACxE;QACD,KAAK,CAAC,mBAAmB,CAAC,YAAY,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,CAAC,CAAC;IAChE,CAAC;IA5OD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAgC,EAAE,IAAmC;QAC9H,OAAO,IAAI,mBAAmB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC1E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,mBAAmB,CAAC,YAAY,CAAC;IACpE,CAAC;;AA1BL,kDA8OC;AAhOG,gBAAgB;AACO,gCAAY,GAAG,qDAAqD,CAAC"}
1
+ {"version":3,"file":"certAuthBackendRole.js","sourceRoot":"","sources":["../certAuthBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;GA0BG;AACH,MAAa,mBAAoB,SAAQ,MAAM,CAAC,cAAc;IA4K1D,YAAY,IAAY,EAAE,WAAgE,EAAE,IAAmC;QAC3H,IAAI,MAAM,GAAkB,EAAE,CAAC;QAC/B,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAmD,CAAC;YAClE,MAAM,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,MAAM,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,MAAM,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,MAAM,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,MAAM,CAAC,0BAA0B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,MAAM,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,MAAM,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,MAAM,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,MAAM,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,sBAAsB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,MAAM,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,MAAM,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACjD;aAAM;YACH,MAAM,IAAI,GAAG,WAAkD,CAAC;YAChE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,WAAW,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACxD,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,MAAM,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,MAAM,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,MAAM,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,MAAM,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,0BAA0B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,MAAM,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,MAAM,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9C,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,MAAM,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,MAAM,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,sBAAsB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,MAAM,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,MAAM,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/C;QACD,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;YACf,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE,EAAC,CAAC,CAAC;SACxE;QACD,KAAK,CAAC,mBAAmB,CAAC,YAAY,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,CAAC,CAAC;IAChE,CAAC;IA5OD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAgC,EAAE,IAAmC;QAC9H,OAAO,IAAI,mBAAmB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC1E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,mBAAmB,CAAC,YAAY,CAAC;IACpE,CAAC;;AA1BL,kDA8OC;AAhOG,gBAAgB;AACO,gCAAY,GAAG,qDAAqD,CAAC"}
package/config/index.js CHANGED
@@ -1,10 +1,17 @@
1
1
  "use strict";
2
2
  // *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  // *** Do not edit by hand unless you're certain you know what you are doing! ***
4
- function __export(m) {
5
- for (var p in m) if (!exports.hasOwnProperty(p)) exports[p] = m[p];
6
- }
4
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
5
+ if (k2 === undefined) k2 = k;
6
+ Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } });
7
+ }) : (function(o, m, k, k2) {
8
+ if (k2 === undefined) k2 = k;
9
+ o[k2] = m[k];
10
+ }));
11
+ var __exportStar = (this && this.__exportStar) || function(m, exports) {
12
+ for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
13
+ };
7
14
  Object.defineProperty(exports, "__esModule", { value: true });
8
15
  // Export members:
9
- __export(require("./vars"));
16
+ __exportStar(require("./vars"), exports);
10
17
  //# sourceMappingURL=index.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"index.js","sourceRoot":"","sources":["../../config/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;;;AAEjF,kBAAkB;AAClB,4BAAuB"}
1
+ {"version":3,"file":"index.js","sourceRoot":"","sources":["../../config/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;;;;;;;;;;AAEjF,kBAAkB;AAClB,yCAAuB"}
package/config/vars.d.ts CHANGED
@@ -2,52 +2,52 @@ import { output as outputs } from "../types";
2
2
  /**
3
3
  * If true, adds the value of the `address` argument to the Terraform process environment.
4
4
  */
5
- export declare let addAddressToEnv: string | undefined;
5
+ export declare const addAddressToEnv: string | undefined;
6
6
  /**
7
7
  * URL of the root of the target Vault server.
8
8
  */
9
- export declare let address: string | undefined;
9
+ export declare const address: string | undefined;
10
10
  /**
11
11
  * Login to vault with an existing auth method using auth/<mount>/login
12
12
  */
13
- export declare let authLogins: outputs.config.AuthLogins[] | undefined;
13
+ export declare const authLogins: outputs.config.AuthLogins[] | undefined;
14
14
  /**
15
15
  * Path to directory containing CA certificate files to validate the server's certificate.
16
16
  */
17
- export declare let caCertDir: string | undefined;
17
+ export declare const caCertDir: string | undefined;
18
18
  /**
19
19
  * Path to a CA certificate file to validate the server's certificate.
20
20
  */
21
- export declare let caCertFile: string | undefined;
21
+ export declare const caCertFile: string | undefined;
22
22
  /**
23
23
  * Client authentication credentials.
24
24
  */
25
- export declare let clientAuths: outputs.config.ClientAuths[] | undefined;
25
+ export declare const clientAuths: outputs.config.ClientAuths[] | undefined;
26
26
  /**
27
27
  * The headers to send with each Vault request.
28
28
  */
29
- export declare let headers: outputs.config.Headers[] | undefined;
29
+ export declare const headers: outputs.config.Headers[] | undefined;
30
30
  /**
31
31
  * Maximum TTL for secret leases requested by this provider
32
32
  */
33
- export declare let maxLeaseTtlSeconds: number | undefined;
33
+ export declare const maxLeaseTtlSeconds: number;
34
34
  /**
35
35
  * Maximum number of retries when a 5xx error code is encountered.
36
36
  */
37
- export declare let maxRetries: number | undefined;
37
+ export declare const maxRetries: number;
38
38
  /**
39
39
  * The namespace to use. Available only for Vault Enterprise
40
40
  */
41
- export declare let namespace: string | undefined;
41
+ export declare const namespace: string | undefined;
42
42
  /**
43
43
  * Set this to true only if the target Vault server is an insecure development instance.
44
44
  */
45
- export declare let skipTlsVerify: boolean | undefined;
45
+ export declare const skipTlsVerify: boolean | undefined;
46
46
  /**
47
47
  * Token to use to authenticate to Vault.
48
48
  */
49
- export declare let token: string | undefined;
49
+ export declare const token: string | undefined;
50
50
  /**
51
51
  * Token name to use for creating the Vault child token.
52
52
  */
53
- export declare let tokenName: string | undefined;
53
+ export declare const tokenName: string | undefined;