@pulumi/vault 4.5.0 → 4.6.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +1 -1
- package/ad/getAccessCredentials.d.ts +18 -2
- package/ad/getAccessCredentials.js +5 -0
- package/ad/getAccessCredentials.js.map +1 -1
- package/ad/index.js +14 -7
- package/ad/index.js.map +1 -1
- package/ad/secretBackend.d.ts +68 -68
- package/ad/secretBackend.js +1 -0
- package/ad/secretBackend.js.map +1 -1
- package/ad/secretLibrary.d.ts +12 -12
- package/ad/secretLibrary.js +1 -0
- package/ad/secretLibrary.js.map +1 -1
- package/ad/secretRole.d.ts +10 -10
- package/ad/secretRole.js +1 -0
- package/ad/secretRole.js.map +1 -1
- package/alicloud/authBackendRole.d.ts +24 -24
- package/alicloud/authBackendRole.js +1 -0
- package/alicloud/authBackendRole.js.map +1 -1
- package/alicloud/index.js +11 -4
- package/alicloud/index.js.map +1 -1
- package/approle/authBackendLogin.d.ts +16 -16
- package/approle/authBackendLogin.js +4 -3
- package/approle/authBackendLogin.js.map +1 -1
- package/approle/authBackendRole.d.ts +39 -39
- package/approle/authBackendRole.js +2 -1
- package/approle/authBackendRole.js.map +1 -1
- package/approle/authBackendRoleSecretID.d.ts +17 -17
- package/approle/authBackendRoleSecretID.js +3 -2
- package/approle/authBackendRoleSecretID.js.map +1 -1
- package/approle/getAuthBackendRoleId.d.ts +17 -2
- package/approle/getAuthBackendRoleId.js +5 -0
- package/approle/getAuthBackendRoleId.js.map +1 -1
- package/approle/index.js +14 -7
- package/approle/index.js.map +1 -1
- package/audit.d.ts +10 -10
- package/audit.js +1 -0
- package/audit.js.map +1 -1
- package/authBackend.d.ts +17 -17
- package/authBackend.js +1 -0
- package/authBackend.js.map +1 -1
- package/aws/authBackendCert.d.ts +8 -8
- package/aws/authBackendCert.js +1 -0
- package/aws/authBackendCert.js.map +1 -1
- package/aws/authBackendClient.d.ts +16 -16
- package/aws/authBackendClient.js +1 -0
- package/aws/authBackendClient.js.map +1 -1
- package/aws/authBackendIdentityWhitelist.d.ts +6 -6
- package/aws/authBackendIdentityWhitelist.js +1 -0
- package/aws/authBackendIdentityWhitelist.js.map +1 -1
- package/aws/authBackendLogin.d.ts +28 -28
- package/aws/authBackendLogin.js +1 -0
- package/aws/authBackendLogin.js.map +1 -1
- package/aws/authBackendRole.d.ts +62 -62
- package/aws/authBackendRole.js +1 -0
- package/aws/authBackendRole.js.map +1 -1
- package/aws/authBackendRoleTag.d.ts +16 -16
- package/aws/authBackendRoleTag.js +1 -0
- package/aws/authBackendRoleTag.js.map +1 -1
- package/aws/authBackendRoletagBlacklist.d.ts +6 -6
- package/aws/authBackendRoletagBlacklist.js +1 -0
- package/aws/authBackendRoletagBlacklist.js.map +1 -1
- package/aws/authBackendStsRole.d.ts +6 -6
- package/aws/authBackendStsRole.js +1 -0
- package/aws/authBackendStsRole.js.map +1 -1
- package/aws/getAccessCredentials.d.ts +42 -6
- package/aws/getAccessCredentials.js +5 -0
- package/aws/getAccessCredentials.js.map +1 -1
- package/aws/index.js +21 -14
- package/aws/index.js.map +1 -1
- package/aws/secretBackend.d.ts +18 -18
- package/aws/secretBackend.js +1 -0
- package/aws/secretBackend.js.map +1 -1
- package/aws/secretBackendRole.d.ts +18 -18
- package/aws/secretBackendRole.js +1 -0
- package/aws/secretBackendRole.js.map +1 -1
- package/azure/authBackendConfig.d.ts +12 -12
- package/azure/authBackendConfig.js +1 -0
- package/azure/authBackendConfig.js.map +1 -1
- package/azure/authBackendRole.d.ts +45 -45
- package/azure/authBackendRole.js +1 -0
- package/azure/authBackendRole.js.map +1 -1
- package/azure/backend.d.ts +14 -14
- package/azure/backend.js +1 -0
- package/azure/backend.js.map +1 -1
- package/azure/backendRole.d.ts +16 -16
- package/azure/backendRole.js +1 -0
- package/azure/backendRole.js.map +1 -1
- package/azure/getAccessCredentials.d.ts +47 -6
- package/azure/getAccessCredentials.js +5 -0
- package/azure/getAccessCredentials.js.map +1 -1
- package/azure/index.js +15 -8
- package/azure/index.js.map +1 -1
- package/certAuthBackendRole.d.ts +50 -50
- package/certAuthBackendRole.js +1 -0
- package/certAuthBackendRole.js.map +1 -1
- package/config/index.js +11 -4
- package/config/index.js.map +1 -1
- package/config/vars.d.ts +13 -13
- package/config/vars.js +82 -53
- package/config/vars.js.map +1 -1
- package/consul/index.js +12 -5
- package/consul/index.js.map +1 -1
- package/consul/secretBackend.d.ts +22 -22
- package/consul/secretBackend.js +1 -0
- package/consul/secretBackend.js.map +1 -1
- package/consul/secretBackendRole.d.ts +16 -16
- package/consul/secretBackendRole.js +1 -0
- package/consul/secretBackendRole.js.map +1 -1
- package/database/index.js +13 -6
- package/database/index.js.map +1 -1
- package/database/secretBackendConnection.d.ts +38 -38
- package/database/secretBackendConnection.js +1 -0
- package/database/secretBackendConnection.js.map +1 -1
- package/database/secretBackendRole.d.ts +18 -18
- package/database/secretBackendRole.js +1 -0
- package/database/secretBackendRole.js.map +1 -1
- package/database/secretBackendStaticRole.d.ts +12 -12
- package/database/secretBackendStaticRole.js +1 -0
- package/database/secretBackendStaticRole.js.map +1 -1
- package/egpPolicy.d.ts +8 -8
- package/egpPolicy.js +1 -0
- package/egpPolicy.js.map +1 -1
- package/gcp/authBackend.d.ts +16 -16
- package/gcp/authBackend.js +1 -0
- package/gcp/authBackend.js.map +1 -1
- package/gcp/authBackendRole.d.ts +50 -50
- package/gcp/authBackendRole.js +1 -0
- package/gcp/authBackendRole.js.map +1 -1
- package/gcp/getAuthBackendRole.d.ts +80 -12
- package/gcp/getAuthBackendRole.js +6 -1
- package/gcp/getAuthBackendRole.js.map +1 -1
- package/gcp/index.js +16 -9
- package/gcp/index.js.map +1 -1
- package/gcp/secretBackend.d.ts +12 -12
- package/gcp/secretBackend.js +1 -0
- package/gcp/secretBackend.js.map +1 -1
- package/gcp/secretRoleset.d.ts +13 -13
- package/gcp/secretRoleset.js +1 -0
- package/gcp/secretRoleset.js.map +1 -1
- package/gcp/secretStaticAccount.d.ts +39 -13
- package/gcp/secretStaticAccount.js +27 -0
- package/gcp/secretStaticAccount.js.map +1 -1
- package/generic/endpoint.d.ts +14 -14
- package/generic/endpoint.js +1 -0
- package/generic/endpoint.js.map +1 -1
- package/generic/getSecret.d.ts +22 -2
- package/generic/getSecret.js +5 -0
- package/generic/getSecret.js.map +1 -1
- package/generic/index.js +13 -6
- package/generic/index.js.map +1 -1
- package/generic/secret.d.ts +7 -7
- package/generic/secret.js +1 -0
- package/generic/secret.js.map +1 -1
- package/getAuthBackend.d.ts +13 -3
- package/getAuthBackend.js +6 -1
- package/getAuthBackend.js.map +1 -1
- package/getNomadAccessToken.d.ts +18 -2
- package/getNomadAccessToken.js +5 -0
- package/getNomadAccessToken.js.map +1 -1
- package/getPolicyDocument.d.ts +8 -1
- package/getPolicyDocument.js +5 -0
- package/getPolicyDocument.js.map +1 -1
- package/github/authBackend.d.ts +44 -35
- package/github/authBackend.js +3 -2
- package/github/authBackend.js.map +1 -1
- package/github/index.js +13 -6
- package/github/index.js.map +1 -1
- package/github/team.d.ts +24 -24
- package/github/team.js +1 -0
- package/github/team.js.map +1 -1
- package/github/user.d.ts +24 -24
- package/github/user.js +1 -0
- package/github/user.js.map +1 -1
- package/identity/entity.d.ts +10 -10
- package/identity/entity.js +1 -0
- package/identity/entity.js.map +1 -1
- package/identity/entityAlias.d.ts +6 -6
- package/identity/entityAlias.js +1 -0
- package/identity/entityAlias.js.map +1 -1
- package/identity/entityPolicies.d.ts +7 -7
- package/identity/entityPolicies.js +1 -0
- package/identity/entityPolicies.js.map +1 -1
- package/identity/getEntity.d.ts +33 -5
- package/identity/getEntity.js +5 -0
- package/identity/getEntity.js.map +1 -1
- package/identity/getGroup.d.ts +33 -5
- package/identity/getGroup.js +5 -0
- package/identity/getGroup.js.map +1 -1
- package/identity/group.d.ts +16 -16
- package/identity/group.js +1 -0
- package/identity/group.js.map +1 -1
- package/identity/groupAlias.d.ts +6 -6
- package/identity/groupAlias.js +1 -0
- package/identity/groupAlias.js.map +1 -1
- package/identity/groupMemberEntityIds.d.ts +7 -7
- package/identity/groupMemberEntityIds.js +1 -0
- package/identity/groupMemberEntityIds.js.map +1 -1
- package/identity/groupPolicies.d.ts +7 -7
- package/identity/groupPolicies.js +1 -0
- package/identity/groupPolicies.js.map +1 -1
- package/identity/index.js +23 -16
- package/identity/index.js.map +1 -1
- package/identity/oidc.d.ts +2 -2
- package/identity/oidc.js +1 -0
- package/identity/oidc.js.map +1 -1
- package/identity/oidcKey.d.ts +10 -10
- package/identity/oidcKey.js +1 -0
- package/identity/oidcKey.js.map +1 -1
- package/identity/oidcKeyAllowedClientID.d.ts +4 -4
- package/identity/oidcKeyAllowedClientID.js +1 -0
- package/identity/oidcKeyAllowedClientID.js.map +1 -1
- package/identity/oidcRole.d.ts +10 -10
- package/identity/oidcRole.js +1 -0
- package/identity/oidcRole.js.map +1 -1
- package/index.js +31 -23
- package/index.js.map +1 -1
- package/jwt/authBackend.d.ts +33 -33
- package/jwt/authBackend.js +1 -0
- package/jwt/authBackend.js.map +1 -1
- package/jwt/authBackendRole.d.ts +64 -64
- package/jwt/authBackendRole.js +1 -0
- package/jwt/authBackendRole.js.map +1 -1
- package/jwt/index.js +12 -5
- package/jwt/index.js.map +1 -1
- package/kubernetes/authBackendConfig.d.ts +16 -16
- package/kubernetes/authBackendConfig.js +1 -0
- package/kubernetes/authBackendConfig.js.map +1 -1
- package/kubernetes/authBackendRole.d.ts +40 -40
- package/kubernetes/authBackendRole.js +1 -0
- package/kubernetes/authBackendRole.js.map +1 -1
- package/kubernetes/getAuthBackendConfig.d.ts +36 -7
- package/kubernetes/getAuthBackendConfig.js +5 -0
- package/kubernetes/getAuthBackendConfig.js.map +1 -1
- package/kubernetes/getAuthBackendRole.d.ts +115 -18
- package/kubernetes/getAuthBackendRole.js +5 -0
- package/kubernetes/getAuthBackendRole.js.map +1 -1
- package/kubernetes/index.js +14 -7
- package/kubernetes/index.js.map +1 -1
- package/ldap/authBackend.d.ts +63 -63
- package/ldap/authBackend.js +1 -0
- package/ldap/authBackend.js.map +1 -1
- package/ldap/authBackendGroup.d.ts +6 -6
- package/ldap/authBackendGroup.js +1 -0
- package/ldap/authBackendGroup.js.map +1 -1
- package/ldap/authBackendUser.d.ts +8 -8
- package/ldap/authBackendUser.js +1 -0
- package/ldap/authBackendUser.js.map +1 -1
- package/ldap/index.js +13 -6
- package/ldap/index.js.map +1 -1
- package/mfaDuo.d.ts +14 -14
- package/mfaDuo.js +1 -0
- package/mfaDuo.js.map +1 -1
- package/mount.d.ts +19 -19
- package/mount.js +1 -0
- package/mount.js.map +1 -1
- package/namespace.d.ts +3 -3
- package/namespace.js +1 -0
- package/namespace.js.map +1 -1
- package/nomadSecretBackend.d.ts +26 -26
- package/nomadSecretBackend.js +1 -0
- package/nomadSecretBackend.js.map +1 -1
- package/nomadSecretRole.d.ts +10 -10
- package/nomadSecretRole.js +1 -0
- package/nomadSecretRole.js.map +1 -1
- package/okta/authBackend.d.ts +21 -21
- package/okta/authBackend.js +1 -0
- package/okta/authBackend.js.map +1 -1
- package/okta/authBackendGroup.d.ts +6 -6
- package/okta/authBackendGroup.js +1 -0
- package/okta/authBackendGroup.js.map +1 -1
- package/okta/authBackendUser.d.ts +16 -8
- package/okta/authBackendUser.js +9 -0
- package/okta/authBackendUser.js.map +1 -1
- package/okta/index.js +13 -6
- package/okta/index.js.map +1 -1
- package/package.json +4 -3
- package/package.json.bak +3 -2
- package/package.json.dev +4 -3
- package/passwordPolicy.d.ts +4 -4
- package/passwordPolicy.js +1 -0
- package/passwordPolicy.js.map +1 -1
- package/pkisecret/index.js +21 -14
- package/pkisecret/index.js.map +1 -1
- package/pkisecret/secretBackend.d.ts +8 -8
- package/pkisecret/secretBackend.js +1 -0
- package/pkisecret/secretBackend.js.map +1 -1
- package/pkisecret/secretBackendCert.d.ts +33 -33
- package/pkisecret/secretBackendCert.js +1 -0
- package/pkisecret/secretBackendCert.js.map +1 -1
- package/pkisecret/secretBackendConfigCa.d.ts +4 -4
- package/pkisecret/secretBackendConfigCa.js +1 -0
- package/pkisecret/secretBackendConfigCa.js.map +1 -1
- package/pkisecret/secretBackendConfigUrls.d.ts +10 -10
- package/pkisecret/secretBackendConfigUrls.js +3 -2
- package/pkisecret/secretBackendConfigUrls.js.map +1 -1
- package/pkisecret/secretBackendCrlConfig.d.ts +7 -7
- package/pkisecret/secretBackendCrlConfig.js +2 -1
- package/pkisecret/secretBackendCrlConfig.js.map +1 -1
- package/pkisecret/secretBackendIntermediateCertRequest.d.ts +41 -41
- package/pkisecret/secretBackendIntermediateCertRequest.js +1 -0
- package/pkisecret/secretBackendIntermediateCertRequest.js.map +1 -1
- package/pkisecret/secretBackendIntermediateSetSigned.d.ts +4 -4
- package/pkisecret/secretBackendIntermediateSetSigned.js +1 -0
- package/pkisecret/secretBackendIntermediateSetSigned.js.map +1 -1
- package/pkisecret/secretBackendRole.d.ts +78 -78
- package/pkisecret/secretBackendRole.js +3 -2
- package/pkisecret/secretBackendRole.js.map +1 -1
- package/pkisecret/secretBackendRootCert.d.ts +47 -47
- package/pkisecret/secretBackendRootCert.js +1 -0
- package/pkisecret/secretBackendRootCert.js.map +1 -1
- package/pkisecret/secretBackendRootSignIntermediate.d.ts +45 -45
- package/pkisecret/secretBackendRootSignIntermediate.js +2 -1
- package/pkisecret/secretBackendRootSignIntermediate.js.map +1 -1
- package/pkisecret/secretBackendSign.d.ts +31 -31
- package/pkisecret/secretBackendSign.js +1 -0
- package/pkisecret/secretBackendSign.js.map +1 -1
- package/policy.d.ts +4 -4
- package/policy.js +1 -0
- package/policy.js.map +1 -1
- package/provider.d.ts +41 -13
- package/provider.js +4 -3
- package/provider.js.map +1 -1
- package/quotaLeaseCount.d.ts +6 -6
- package/quotaLeaseCount.js +1 -0
- package/quotaLeaseCount.js.map +1 -1
- package/quotaRateLimit.d.ts +6 -6
- package/quotaRateLimit.js +1 -0
- package/quotaRateLimit.js.map +1 -1
- package/rabbitmq/index.js +12 -5
- package/rabbitmq/index.js.map +1 -1
- package/rabbitmq/secretBackend.d.ts +16 -16
- package/rabbitmq/secretBackend.js +1 -0
- package/rabbitmq/secretBackend.js.map +1 -1
- package/rabbitmq/secretBackendRole.d.ts +8 -8
- package/rabbitmq/secretBackendRole.js +1 -0
- package/rabbitmq/secretBackendRole.js.map +1 -1
- package/raftSnapshotAgentConfig.d.ts +54 -54
- package/raftSnapshotAgentConfig.js +1 -0
- package/raftSnapshotAgentConfig.js.map +1 -1
- package/rgpPolicy.d.ts +6 -6
- package/rgpPolicy.js +1 -0
- package/rgpPolicy.js.map +1 -1
- package/ssh/index.js +12 -5
- package/ssh/index.js.map +1 -1
- package/ssh/secretBackendCa.d.ts +8 -8
- package/ssh/secretBackendCa.js +1 -0
- package/ssh/secretBackendCa.js.map +1 -1
- package/ssh/secretBackendRole.d.ts +44 -44
- package/ssh/secretBackendRole.js +1 -0
- package/ssh/secretBackendRole.js.map +1 -1
- package/token.d.ts +34 -34
- package/token.js +1 -0
- package/token.js.map +1 -1
- package/tokenauth/authBackendRole.d.ts +39 -39
- package/tokenauth/authBackendRole.js +1 -0
- package/tokenauth/authBackendRole.js.map +1 -1
- package/tokenauth/index.js +11 -4
- package/tokenauth/index.js.map +1 -1
- package/transform/alphabet.d.ts +6 -6
- package/transform/alphabet.js +1 -0
- package/transform/alphabet.js.map +1 -1
- package/transform/getDecode.d.ts +50 -8
- package/transform/getDecode.js +5 -0
- package/transform/getDecode.js.map +1 -1
- package/transform/getEncode.d.ts +50 -8
- package/transform/getEncode.js +5 -0
- package/transform/getEncode.js.map +1 -1
- package/transform/index.js +16 -9
- package/transform/index.js.map +1 -1
- package/transform/role.d.ts +6 -6
- package/transform/role.js +1 -0
- package/transform/role.js.map +1 -1
- package/transform/template.d.ts +10 -10
- package/transform/template.js +1 -0
- package/transform/template.js.map +1 -1
- package/transform/transformation.d.ts +16 -16
- package/transform/transformation.js +1 -0
- package/transform/transformation.js.map +1 -1
- package/transit/getDecrypt.d.ts +27 -5
- package/transit/getDecrypt.js +6 -1
- package/transit/getDecrypt.js.map +1 -1
- package/transit/getEncrypt.d.ts +31 -5
- package/transit/getEncrypt.js +5 -0
- package/transit/getEncrypt.js.map +1 -1
- package/transit/index.js +14 -7
- package/transit/index.js.map +1 -1
- package/transit/secretBackendKey.d.ts +27 -27
- package/transit/secretBackendKey.js +1 -0
- package/transit/secretBackendKey.js.map +1 -1
- package/transit/secretCacheConfig.d.ts +4 -4
- package/transit/secretCacheConfig.js +1 -0
- package/transit/secretCacheConfig.js.map +1 -1
- package/types/index.js +1 -0
- package/types/index.js.map +1 -1
- package/types/input.d.ts +54 -0
- package/types/output.d.ts +0 -16
- package/utilities.js +1 -0
- package/utilities.js.map +1 -1
package/azure/backendRole.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"backendRole.js","sourceRoot":"","sources":["../../azure/backendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF
|
|
1
|
+
{"version":3,"file":"backendRole.js","sourceRoot":"","sources":["../../azure/backendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAEzC,0CAA0C;AAE1C,MAAa,WAAY,SAAQ,MAAM,CAAC,cAAc;IAwElD,YAAY,IAAY,EAAE,WAAgD,EAAE,IAAmC;QAC3G,IAAI,MAAM,GAAkB,EAAE,CAAC;QAC/B,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA2C,CAAC;YAC1D,MAAM,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACjD;aAAM;YACH,MAAM,IAAI,GAAG,WAA0C,CAAC;YACxD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,MAAM,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9C,MAAM,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/C;QACD,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;YACf,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE,EAAC,CAAC,CAAC;SACxE;QACD,KAAK,CAAC,WAAW,CAAC,YAAY,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,CAAC,CAAC;IACxD,CAAC;IAtGD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAwB,EAAE,IAAmC;QACtH,OAAO,IAAI,WAAW,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAClE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,WAAW,CAAC,YAAY,CAAC;IAC5D,CAAC;;AA1BL,kCAwGC;AA1FG,gBAAgB;AACO,wBAAY,GAAG,qCAAqC,CAAC"}
|
|
@@ -8,37 +8,37 @@ export interface GetAccessCredentialsArgs {
|
|
|
8
8
|
* The path to the Azure secret backend to
|
|
9
9
|
* read credentials from, with no leading or trailing `/`s.
|
|
10
10
|
*/
|
|
11
|
-
|
|
11
|
+
backend: string;
|
|
12
12
|
/**
|
|
13
13
|
* If 'validate_creds' is true,
|
|
14
14
|
* the number of seconds after which to give up validating credentials. Defaults
|
|
15
15
|
* to 1,200 (20 minutes).
|
|
16
16
|
*/
|
|
17
|
-
|
|
17
|
+
maxCredValidationSeconds?: number;
|
|
18
18
|
/**
|
|
19
19
|
* If 'validate_creds' is true,
|
|
20
20
|
* the number of seconds to wait between each test of generated credentials.
|
|
21
21
|
* Defaults to 7.
|
|
22
22
|
*/
|
|
23
|
-
|
|
23
|
+
numSecondsBetweenTests?: number;
|
|
24
24
|
/**
|
|
25
25
|
* If 'validate_creds' is true,
|
|
26
26
|
* the number of sequential successes required to validate generated
|
|
27
27
|
* credentials. Defaults to 8.
|
|
28
28
|
*/
|
|
29
|
-
|
|
29
|
+
numSequentialSuccesses?: number;
|
|
30
30
|
/**
|
|
31
31
|
* The name of the Azure secret backend role to read
|
|
32
32
|
* credentials from, with no leading or trailing `/`s.
|
|
33
33
|
*/
|
|
34
|
-
|
|
34
|
+
role: string;
|
|
35
35
|
/**
|
|
36
36
|
* Whether generated credentials should be
|
|
37
37
|
* validated before being returned. Defaults to `false`, which returns
|
|
38
38
|
* credentials without checking whether they have fully propagated throughout
|
|
39
39
|
* Azure Active Directory. Designating `true` activates testing.
|
|
40
40
|
*/
|
|
41
|
-
|
|
41
|
+
validateCreds?: boolean;
|
|
42
42
|
}
|
|
43
43
|
/**
|
|
44
44
|
* A collection of values returned by getAccessCredentials.
|
|
@@ -75,3 +75,44 @@ export interface GetAccessCredentialsResult {
|
|
|
75
75
|
readonly role: string;
|
|
76
76
|
readonly validateCreds?: boolean;
|
|
77
77
|
}
|
|
78
|
+
export declare function getAccessCredentialsOutput(args: GetAccessCredentialsOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output<GetAccessCredentialsResult>;
|
|
79
|
+
/**
|
|
80
|
+
* A collection of arguments for invoking getAccessCredentials.
|
|
81
|
+
*/
|
|
82
|
+
export interface GetAccessCredentialsOutputArgs {
|
|
83
|
+
/**
|
|
84
|
+
* The path to the Azure secret backend to
|
|
85
|
+
* read credentials from, with no leading or trailing `/`s.
|
|
86
|
+
*/
|
|
87
|
+
backend: pulumi.Input<string>;
|
|
88
|
+
/**
|
|
89
|
+
* If 'validate_creds' is true,
|
|
90
|
+
* the number of seconds after which to give up validating credentials. Defaults
|
|
91
|
+
* to 1,200 (20 minutes).
|
|
92
|
+
*/
|
|
93
|
+
maxCredValidationSeconds?: pulumi.Input<number>;
|
|
94
|
+
/**
|
|
95
|
+
* If 'validate_creds' is true,
|
|
96
|
+
* the number of seconds to wait between each test of generated credentials.
|
|
97
|
+
* Defaults to 7.
|
|
98
|
+
*/
|
|
99
|
+
numSecondsBetweenTests?: pulumi.Input<number>;
|
|
100
|
+
/**
|
|
101
|
+
* If 'validate_creds' is true,
|
|
102
|
+
* the number of sequential successes required to validate generated
|
|
103
|
+
* credentials. Defaults to 8.
|
|
104
|
+
*/
|
|
105
|
+
numSequentialSuccesses?: pulumi.Input<number>;
|
|
106
|
+
/**
|
|
107
|
+
* The name of the Azure secret backend role to read
|
|
108
|
+
* credentials from, with no leading or trailing `/`s.
|
|
109
|
+
*/
|
|
110
|
+
role: pulumi.Input<string>;
|
|
111
|
+
/**
|
|
112
|
+
* Whether generated credentials should be
|
|
113
|
+
* validated before being returned. Defaults to `false`, which returns
|
|
114
|
+
* credentials without checking whether they have fully propagated throughout
|
|
115
|
+
* Azure Active Directory. Designating `true` activates testing.
|
|
116
|
+
*/
|
|
117
|
+
validateCreds?: pulumi.Input<boolean>;
|
|
118
|
+
}
|
|
@@ -2,6 +2,7 @@
|
|
|
2
2
|
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
3
|
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
4
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.getAccessCredentialsOutput = exports.getAccessCredentials = void 0;
|
|
5
6
|
const pulumi = require("@pulumi/pulumi");
|
|
6
7
|
const utilities = require("../utilities");
|
|
7
8
|
function getAccessCredentials(args, opts) {
|
|
@@ -21,4 +22,8 @@ function getAccessCredentials(args, opts) {
|
|
|
21
22
|
}, opts);
|
|
22
23
|
}
|
|
23
24
|
exports.getAccessCredentials = getAccessCredentials;
|
|
25
|
+
function getAccessCredentialsOutput(args, opts) {
|
|
26
|
+
return pulumi.output(args).apply(a => getAccessCredentials(a, opts));
|
|
27
|
+
}
|
|
28
|
+
exports.getAccessCredentialsOutput = getAccessCredentialsOutput;
|
|
24
29
|
//# sourceMappingURL=getAccessCredentials.js.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getAccessCredentials.js","sourceRoot":"","sources":["../../azure/getAccessCredentials.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF
|
|
1
|
+
{"version":3,"file":"getAccessCredentials.js","sourceRoot":"","sources":["../../azure/getAccessCredentials.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,SAAgB,oBAAoB,CAAC,IAA8B,EAAE,IAA2B;IAC5F,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;QACf,IAAI,CAAC,OAAO,GAAG,SAAS,CAAC,UAAU,EAAE,CAAC;KACzC;IACD,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,uDAAuD,EAAE;QAClF,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,0BAA0B,EAAE,IAAI,CAAC,wBAAwB;QACzD,wBAAwB,EAAE,IAAI,CAAC,sBAAsB;QACrD,wBAAwB,EAAE,IAAI,CAAC,sBAAsB;QACrD,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,eAAe,EAAE,IAAI,CAAC,aAAa;KACtC,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAhBD,oDAgBC;AA+ED,SAAgB,0BAA0B,CAAC,IAAoC,EAAE,IAA2B;IACxG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,oBAAoB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACxE,CAAC;AAFD,gEAEC"}
|
package/azure/index.js
CHANGED
|
@@ -1,18 +1,25 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
3
|
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
-
function
|
|
5
|
-
|
|
6
|
-
}
|
|
4
|
+
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
5
|
+
if (k2 === undefined) k2 = k;
|
|
6
|
+
Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } });
|
|
7
|
+
}) : (function(o, m, k, k2) {
|
|
8
|
+
if (k2 === undefined) k2 = k;
|
|
9
|
+
o[k2] = m[k];
|
|
10
|
+
}));
|
|
11
|
+
var __exportStar = (this && this.__exportStar) || function(m, exports) {
|
|
12
|
+
for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
|
|
13
|
+
};
|
|
7
14
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
8
15
|
const pulumi = require("@pulumi/pulumi");
|
|
9
16
|
const utilities = require("../utilities");
|
|
10
17
|
// Export members:
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
|
|
14
|
-
|
|
15
|
-
|
|
18
|
+
__exportStar(require("./authBackendConfig"), exports);
|
|
19
|
+
__exportStar(require("./authBackendRole"), exports);
|
|
20
|
+
__exportStar(require("./backend"), exports);
|
|
21
|
+
__exportStar(require("./backendRole"), exports);
|
|
22
|
+
__exportStar(require("./getAccessCredentials"), exports);
|
|
16
23
|
// Import resources to register:
|
|
17
24
|
const authBackendConfig_1 = require("./authBackendConfig");
|
|
18
25
|
const authBackendRole_1 = require("./authBackendRole");
|
package/azure/index.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../azure/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../azure/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;;;;;;;;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,kBAAkB;AAClB,sDAAoC;AACpC,oDAAkC;AAClC,4CAA0B;AAC1B,gDAA8B;AAC9B,yDAAuC;AAEvC,gCAAgC;AAChC,2DAAwD;AACxD,uDAAoD;AACpD,uCAAoC;AACpC,+CAA4C;AAE5C,MAAM,OAAO,GAAG;IACZ,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE;IAC/B,SAAS,EAAE,CAAC,IAAY,EAAE,IAAY,EAAE,GAAW,EAAmB,EAAE;QACpE,QAAQ,IAAI,EAAE;YACV,KAAK,iDAAiD;gBAClD,OAAO,IAAI,qCAAiB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC/D,KAAK,6CAA6C;gBAC9C,OAAO,IAAI,iCAAe,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC7D,KAAK,6BAA6B;gBAC9B,OAAO,IAAI,iBAAO,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACrD,KAAK,qCAAqC;gBACtC,OAAO,IAAI,yBAAW,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACzD;gBACI,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,EAAE,CAAC,CAAC;SACxD;IACL,CAAC;CACJ,CAAC;AACF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,yBAAyB,EAAE,OAAO,CAAC,CAAA;AAClF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,uBAAuB,EAAE,OAAO,CAAC,CAAA;AAChF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,eAAe,EAAE,OAAO,CAAC,CAAA;AACxE,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,mBAAmB,EAAE,OAAO,CAAC,CAAA"}
|
package/certAuthBackendRole.d.ts
CHANGED
|
@@ -193,57 +193,57 @@ export interface CertAuthBackendRoleState {
|
|
|
193
193
|
/**
|
|
194
194
|
* Allowed the common names for authenticated client certificates
|
|
195
195
|
*/
|
|
196
|
-
|
|
196
|
+
allowedCommonNames?: pulumi.Input<pulumi.Input<string>[]>;
|
|
197
197
|
/**
|
|
198
198
|
* Allowed alternative dns names for authenticated client certificates
|
|
199
199
|
*/
|
|
200
|
-
|
|
200
|
+
allowedDnsSans?: pulumi.Input<pulumi.Input<string>[]>;
|
|
201
201
|
/**
|
|
202
202
|
* Allowed emails for authenticated client certificates
|
|
203
203
|
*/
|
|
204
|
-
|
|
204
|
+
allowedEmailSans?: pulumi.Input<pulumi.Input<string>[]>;
|
|
205
205
|
/**
|
|
206
206
|
* Allowed subject names for authenticated client certificates
|
|
207
207
|
*/
|
|
208
|
-
|
|
208
|
+
allowedNames?: pulumi.Input<pulumi.Input<string>[]>;
|
|
209
209
|
/**
|
|
210
210
|
* Allowed organization units for authenticated client certificates
|
|
211
211
|
*/
|
|
212
|
-
|
|
212
|
+
allowedOrganizationUnits?: pulumi.Input<pulumi.Input<string>[]>;
|
|
213
213
|
/**
|
|
214
214
|
* Allowed URIs for authenticated client certificates
|
|
215
215
|
*/
|
|
216
|
-
|
|
216
|
+
allowedUriSans?: pulumi.Input<pulumi.Input<string>[]>;
|
|
217
217
|
/**
|
|
218
218
|
* Path to the mounted Cert auth backend
|
|
219
219
|
*/
|
|
220
|
-
|
|
220
|
+
backend?: pulumi.Input<string>;
|
|
221
221
|
/**
|
|
222
222
|
* Restriction usage of the
|
|
223
223
|
* certificates to client IPs falling within the range of the specified CIDRs
|
|
224
224
|
*
|
|
225
225
|
* @deprecated use `token_bound_cidrs` instead if you are running Vault >= 1.2
|
|
226
226
|
*/
|
|
227
|
-
|
|
227
|
+
boundCidrs?: pulumi.Input<pulumi.Input<string>[]>;
|
|
228
228
|
/**
|
|
229
229
|
* CA certificate used to validate client certificates
|
|
230
230
|
*/
|
|
231
|
-
|
|
231
|
+
certificate?: pulumi.Input<string>;
|
|
232
232
|
/**
|
|
233
233
|
* The name to display on tokens issued under this role.
|
|
234
234
|
*/
|
|
235
|
-
|
|
235
|
+
displayName?: pulumi.Input<string>;
|
|
236
236
|
/**
|
|
237
237
|
* The maximum allowed lifetime of tokens
|
|
238
238
|
* issued using this role, provided as a number of seconds.
|
|
239
239
|
*
|
|
240
240
|
* @deprecated use `token_max_ttl` instead if you are running Vault >= 1.2
|
|
241
241
|
*/
|
|
242
|
-
|
|
242
|
+
maxTtl?: pulumi.Input<string>;
|
|
243
243
|
/**
|
|
244
244
|
* Name of the role
|
|
245
245
|
*/
|
|
246
|
-
|
|
246
|
+
name?: pulumi.Input<string>;
|
|
247
247
|
/**
|
|
248
248
|
* If set, indicates that the
|
|
249
249
|
* token generated using this role should never expire. The token should be renewed within the
|
|
@@ -252,64 +252,64 @@ export interface CertAuthBackendRoleState {
|
|
|
252
252
|
*
|
|
253
253
|
* @deprecated use `token_period` instead if you are running Vault >= 1.2
|
|
254
254
|
*/
|
|
255
|
-
|
|
255
|
+
period?: pulumi.Input<string>;
|
|
256
256
|
/**
|
|
257
257
|
* An array of strings
|
|
258
258
|
* specifying the policies to be set on tokens issued using this role.
|
|
259
259
|
*
|
|
260
260
|
* @deprecated use `token_policies` instead if you are running Vault >= 1.2
|
|
261
261
|
*/
|
|
262
|
-
|
|
262
|
+
policies?: pulumi.Input<pulumi.Input<string>[]>;
|
|
263
263
|
/**
|
|
264
264
|
* TLS extensions required on client certificates
|
|
265
265
|
*/
|
|
266
|
-
|
|
266
|
+
requiredExtensions?: pulumi.Input<pulumi.Input<string>[]>;
|
|
267
267
|
/**
|
|
268
268
|
* List of CIDR blocks; if set, specifies blocks of IP
|
|
269
269
|
* addresses which can authenticate successfully, and ties the resulting token to these blocks
|
|
270
270
|
* as well.
|
|
271
271
|
*/
|
|
272
|
-
|
|
272
|
+
tokenBoundCidrs?: pulumi.Input<pulumi.Input<string>[]>;
|
|
273
273
|
/**
|
|
274
274
|
* If set, will encode an
|
|
275
275
|
* [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
|
276
276
|
* onto the token in number of seconds. This is a hard cap even if `tokenTtl` and
|
|
277
277
|
* `tokenMaxTtl` would otherwise allow a renewal.
|
|
278
278
|
*/
|
|
279
|
-
|
|
279
|
+
tokenExplicitMaxTtl?: pulumi.Input<number>;
|
|
280
280
|
/**
|
|
281
281
|
* The maximum lifetime for generated tokens in number of seconds.
|
|
282
282
|
* Its current value will be referenced at renewal time.
|
|
283
283
|
*/
|
|
284
|
-
|
|
284
|
+
tokenMaxTtl?: pulumi.Input<number>;
|
|
285
285
|
/**
|
|
286
286
|
* If set, the default policy will not be set on
|
|
287
287
|
* generated tokens; otherwise it will be added to the policies set in token_policies.
|
|
288
288
|
*/
|
|
289
|
-
|
|
289
|
+
tokenNoDefaultPolicy?: pulumi.Input<boolean>;
|
|
290
290
|
/**
|
|
291
291
|
* The
|
|
292
292
|
* [period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
|
|
293
293
|
* if any, in number of seconds to set on the token.
|
|
294
294
|
*/
|
|
295
|
-
|
|
295
|
+
tokenNumUses?: pulumi.Input<number>;
|
|
296
296
|
/**
|
|
297
297
|
* If set, indicates that the
|
|
298
298
|
* token generated using this role should never expire. The token should be renewed within the
|
|
299
299
|
* duration specified by this value. At each renewal, the token's TTL will be set to the
|
|
300
300
|
* value of this field. Specified in seconds.
|
|
301
301
|
*/
|
|
302
|
-
|
|
302
|
+
tokenPeriod?: pulumi.Input<number>;
|
|
303
303
|
/**
|
|
304
304
|
* List of policies to encode onto generated tokens. Depending
|
|
305
305
|
* on the auth method, this list may be supplemented by user/group/other values.
|
|
306
306
|
*/
|
|
307
|
-
|
|
307
|
+
tokenPolicies?: pulumi.Input<pulumi.Input<string>[]>;
|
|
308
308
|
/**
|
|
309
309
|
* The incremental lifetime for generated tokens in number of seconds.
|
|
310
310
|
* Its current value will be referenced at renewal time.
|
|
311
311
|
*/
|
|
312
|
-
|
|
312
|
+
tokenTtl?: pulumi.Input<number>;
|
|
313
313
|
/**
|
|
314
314
|
* The type of token that should be generated. Can be `service`,
|
|
315
315
|
* `batch`, or `default` to use the mount's tuned default (which unless changed will be
|
|
@@ -317,14 +317,14 @@ export interface CertAuthBackendRoleState {
|
|
|
317
317
|
* `default-service` and `default-batch` which specify the type to return unless the client
|
|
318
318
|
* requests a different type at generation time.
|
|
319
319
|
*/
|
|
320
|
-
|
|
320
|
+
tokenType?: pulumi.Input<string>;
|
|
321
321
|
/**
|
|
322
322
|
* The TTL period of tokens issued
|
|
323
323
|
* using this role, provided as a number of seconds.
|
|
324
324
|
*
|
|
325
325
|
* @deprecated use `token_ttl` instead if you are running Vault >= 1.2
|
|
326
326
|
*/
|
|
327
|
-
|
|
327
|
+
ttl?: pulumi.Input<string>;
|
|
328
328
|
}
|
|
329
329
|
/**
|
|
330
330
|
* The set of arguments for constructing a CertAuthBackendRole resource.
|
|
@@ -333,57 +333,57 @@ export interface CertAuthBackendRoleArgs {
|
|
|
333
333
|
/**
|
|
334
334
|
* Allowed the common names for authenticated client certificates
|
|
335
335
|
*/
|
|
336
|
-
|
|
336
|
+
allowedCommonNames?: pulumi.Input<pulumi.Input<string>[]>;
|
|
337
337
|
/**
|
|
338
338
|
* Allowed alternative dns names for authenticated client certificates
|
|
339
339
|
*/
|
|
340
|
-
|
|
340
|
+
allowedDnsSans?: pulumi.Input<pulumi.Input<string>[]>;
|
|
341
341
|
/**
|
|
342
342
|
* Allowed emails for authenticated client certificates
|
|
343
343
|
*/
|
|
344
|
-
|
|
344
|
+
allowedEmailSans?: pulumi.Input<pulumi.Input<string>[]>;
|
|
345
345
|
/**
|
|
346
346
|
* Allowed subject names for authenticated client certificates
|
|
347
347
|
*/
|
|
348
|
-
|
|
348
|
+
allowedNames?: pulumi.Input<pulumi.Input<string>[]>;
|
|
349
349
|
/**
|
|
350
350
|
* Allowed organization units for authenticated client certificates
|
|
351
351
|
*/
|
|
352
|
-
|
|
352
|
+
allowedOrganizationUnits?: pulumi.Input<pulumi.Input<string>[]>;
|
|
353
353
|
/**
|
|
354
354
|
* Allowed URIs for authenticated client certificates
|
|
355
355
|
*/
|
|
356
|
-
|
|
356
|
+
allowedUriSans?: pulumi.Input<pulumi.Input<string>[]>;
|
|
357
357
|
/**
|
|
358
358
|
* Path to the mounted Cert auth backend
|
|
359
359
|
*/
|
|
360
|
-
|
|
360
|
+
backend?: pulumi.Input<string>;
|
|
361
361
|
/**
|
|
362
362
|
* Restriction usage of the
|
|
363
363
|
* certificates to client IPs falling within the range of the specified CIDRs
|
|
364
364
|
*
|
|
365
365
|
* @deprecated use `token_bound_cidrs` instead if you are running Vault >= 1.2
|
|
366
366
|
*/
|
|
367
|
-
|
|
367
|
+
boundCidrs?: pulumi.Input<pulumi.Input<string>[]>;
|
|
368
368
|
/**
|
|
369
369
|
* CA certificate used to validate client certificates
|
|
370
370
|
*/
|
|
371
|
-
|
|
371
|
+
certificate: pulumi.Input<string>;
|
|
372
372
|
/**
|
|
373
373
|
* The name to display on tokens issued under this role.
|
|
374
374
|
*/
|
|
375
|
-
|
|
375
|
+
displayName?: pulumi.Input<string>;
|
|
376
376
|
/**
|
|
377
377
|
* The maximum allowed lifetime of tokens
|
|
378
378
|
* issued using this role, provided as a number of seconds.
|
|
379
379
|
*
|
|
380
380
|
* @deprecated use `token_max_ttl` instead if you are running Vault >= 1.2
|
|
381
381
|
*/
|
|
382
|
-
|
|
382
|
+
maxTtl?: pulumi.Input<string>;
|
|
383
383
|
/**
|
|
384
384
|
* Name of the role
|
|
385
385
|
*/
|
|
386
|
-
|
|
386
|
+
name?: pulumi.Input<string>;
|
|
387
387
|
/**
|
|
388
388
|
* If set, indicates that the
|
|
389
389
|
* token generated using this role should never expire. The token should be renewed within the
|
|
@@ -392,64 +392,64 @@ export interface CertAuthBackendRoleArgs {
|
|
|
392
392
|
*
|
|
393
393
|
* @deprecated use `token_period` instead if you are running Vault >= 1.2
|
|
394
394
|
*/
|
|
395
|
-
|
|
395
|
+
period?: pulumi.Input<string>;
|
|
396
396
|
/**
|
|
397
397
|
* An array of strings
|
|
398
398
|
* specifying the policies to be set on tokens issued using this role.
|
|
399
399
|
*
|
|
400
400
|
* @deprecated use `token_policies` instead if you are running Vault >= 1.2
|
|
401
401
|
*/
|
|
402
|
-
|
|
402
|
+
policies?: pulumi.Input<pulumi.Input<string>[]>;
|
|
403
403
|
/**
|
|
404
404
|
* TLS extensions required on client certificates
|
|
405
405
|
*/
|
|
406
|
-
|
|
406
|
+
requiredExtensions?: pulumi.Input<pulumi.Input<string>[]>;
|
|
407
407
|
/**
|
|
408
408
|
* List of CIDR blocks; if set, specifies blocks of IP
|
|
409
409
|
* addresses which can authenticate successfully, and ties the resulting token to these blocks
|
|
410
410
|
* as well.
|
|
411
411
|
*/
|
|
412
|
-
|
|
412
|
+
tokenBoundCidrs?: pulumi.Input<pulumi.Input<string>[]>;
|
|
413
413
|
/**
|
|
414
414
|
* If set, will encode an
|
|
415
415
|
* [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
|
416
416
|
* onto the token in number of seconds. This is a hard cap even if `tokenTtl` and
|
|
417
417
|
* `tokenMaxTtl` would otherwise allow a renewal.
|
|
418
418
|
*/
|
|
419
|
-
|
|
419
|
+
tokenExplicitMaxTtl?: pulumi.Input<number>;
|
|
420
420
|
/**
|
|
421
421
|
* The maximum lifetime for generated tokens in number of seconds.
|
|
422
422
|
* Its current value will be referenced at renewal time.
|
|
423
423
|
*/
|
|
424
|
-
|
|
424
|
+
tokenMaxTtl?: pulumi.Input<number>;
|
|
425
425
|
/**
|
|
426
426
|
* If set, the default policy will not be set on
|
|
427
427
|
* generated tokens; otherwise it will be added to the policies set in token_policies.
|
|
428
428
|
*/
|
|
429
|
-
|
|
429
|
+
tokenNoDefaultPolicy?: pulumi.Input<boolean>;
|
|
430
430
|
/**
|
|
431
431
|
* The
|
|
432
432
|
* [period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
|
|
433
433
|
* if any, in number of seconds to set on the token.
|
|
434
434
|
*/
|
|
435
|
-
|
|
435
|
+
tokenNumUses?: pulumi.Input<number>;
|
|
436
436
|
/**
|
|
437
437
|
* If set, indicates that the
|
|
438
438
|
* token generated using this role should never expire. The token should be renewed within the
|
|
439
439
|
* duration specified by this value. At each renewal, the token's TTL will be set to the
|
|
440
440
|
* value of this field. Specified in seconds.
|
|
441
441
|
*/
|
|
442
|
-
|
|
442
|
+
tokenPeriod?: pulumi.Input<number>;
|
|
443
443
|
/**
|
|
444
444
|
* List of policies to encode onto generated tokens. Depending
|
|
445
445
|
* on the auth method, this list may be supplemented by user/group/other values.
|
|
446
446
|
*/
|
|
447
|
-
|
|
447
|
+
tokenPolicies?: pulumi.Input<pulumi.Input<string>[]>;
|
|
448
448
|
/**
|
|
449
449
|
* The incremental lifetime for generated tokens in number of seconds.
|
|
450
450
|
* Its current value will be referenced at renewal time.
|
|
451
451
|
*/
|
|
452
|
-
|
|
452
|
+
tokenTtl?: pulumi.Input<number>;
|
|
453
453
|
/**
|
|
454
454
|
* The type of token that should be generated. Can be `service`,
|
|
455
455
|
* `batch`, or `default` to use the mount's tuned default (which unless changed will be
|
|
@@ -457,12 +457,12 @@ export interface CertAuthBackendRoleArgs {
|
|
|
457
457
|
* `default-service` and `default-batch` which specify the type to return unless the client
|
|
458
458
|
* requests a different type at generation time.
|
|
459
459
|
*/
|
|
460
|
-
|
|
460
|
+
tokenType?: pulumi.Input<string>;
|
|
461
461
|
/**
|
|
462
462
|
* The TTL period of tokens issued
|
|
463
463
|
* using this role, provided as a number of seconds.
|
|
464
464
|
*
|
|
465
465
|
* @deprecated use `token_ttl` instead if you are running Vault >= 1.2
|
|
466
466
|
*/
|
|
467
|
-
|
|
467
|
+
ttl?: pulumi.Input<string>;
|
|
468
468
|
}
|
package/certAuthBackendRole.js
CHANGED
|
@@ -2,6 +2,7 @@
|
|
|
2
2
|
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
3
|
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
4
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.CertAuthBackendRole = void 0;
|
|
5
6
|
const pulumi = require("@pulumi/pulumi");
|
|
6
7
|
const utilities = require("./utilities");
|
|
7
8
|
/**
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"certAuthBackendRole.js","sourceRoot":"","sources":["../certAuthBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF
|
|
1
|
+
{"version":3,"file":"certAuthBackendRole.js","sourceRoot":"","sources":["../certAuthBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;GA0BG;AACH,MAAa,mBAAoB,SAAQ,MAAM,CAAC,cAAc;IA4K1D,YAAY,IAAY,EAAE,WAAgE,EAAE,IAAmC;QAC3H,IAAI,MAAM,GAAkB,EAAE,CAAC;QAC/B,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAmD,CAAC;YAClE,MAAM,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,MAAM,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,MAAM,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,MAAM,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,MAAM,CAAC,0BAA0B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,MAAM,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,MAAM,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,MAAM,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,MAAM,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,sBAAsB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,MAAM,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,MAAM,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACjD;aAAM;YACH,MAAM,IAAI,GAAG,WAAkD,CAAC;YAChE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,WAAW,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACxD,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,MAAM,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,MAAM,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,MAAM,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,MAAM,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,0BAA0B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,MAAM,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,MAAM,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9C,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,MAAM,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,MAAM,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,sBAAsB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,MAAM,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,MAAM,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/C;QACD,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;YACf,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE,EAAC,CAAC,CAAC;SACxE;QACD,KAAK,CAAC,mBAAmB,CAAC,YAAY,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,CAAC,CAAC;IAChE,CAAC;IA5OD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAgC,EAAE,IAAmC;QAC9H,OAAO,IAAI,mBAAmB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC1E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,mBAAmB,CAAC,YAAY,CAAC;IACpE,CAAC;;AA1BL,kDA8OC;AAhOG,gBAAgB;AACO,gCAAY,GAAG,qDAAqD,CAAC"}
|
package/config/index.js
CHANGED
|
@@ -1,10 +1,17 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
3
|
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
-
function
|
|
5
|
-
|
|
6
|
-
}
|
|
4
|
+
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
5
|
+
if (k2 === undefined) k2 = k;
|
|
6
|
+
Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } });
|
|
7
|
+
}) : (function(o, m, k, k2) {
|
|
8
|
+
if (k2 === undefined) k2 = k;
|
|
9
|
+
o[k2] = m[k];
|
|
10
|
+
}));
|
|
11
|
+
var __exportStar = (this && this.__exportStar) || function(m, exports) {
|
|
12
|
+
for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
|
|
13
|
+
};
|
|
7
14
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
8
15
|
// Export members:
|
|
9
|
-
|
|
16
|
+
__exportStar(require("./vars"), exports);
|
|
10
17
|
//# sourceMappingURL=index.js.map
|
package/config/index.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../config/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../config/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;;;;;;;;;;AAEjF,kBAAkB;AAClB,yCAAuB"}
|
package/config/vars.d.ts
CHANGED
|
@@ -2,52 +2,52 @@ import { output as outputs } from "../types";
|
|
|
2
2
|
/**
|
|
3
3
|
* If true, adds the value of the `address` argument to the Terraform process environment.
|
|
4
4
|
*/
|
|
5
|
-
export declare
|
|
5
|
+
export declare const addAddressToEnv: string | undefined;
|
|
6
6
|
/**
|
|
7
7
|
* URL of the root of the target Vault server.
|
|
8
8
|
*/
|
|
9
|
-
export declare
|
|
9
|
+
export declare const address: string | undefined;
|
|
10
10
|
/**
|
|
11
11
|
* Login to vault with an existing auth method using auth/<mount>/login
|
|
12
12
|
*/
|
|
13
|
-
export declare
|
|
13
|
+
export declare const authLogins: outputs.config.AuthLogins[] | undefined;
|
|
14
14
|
/**
|
|
15
15
|
* Path to directory containing CA certificate files to validate the server's certificate.
|
|
16
16
|
*/
|
|
17
|
-
export declare
|
|
17
|
+
export declare const caCertDir: string | undefined;
|
|
18
18
|
/**
|
|
19
19
|
* Path to a CA certificate file to validate the server's certificate.
|
|
20
20
|
*/
|
|
21
|
-
export declare
|
|
21
|
+
export declare const caCertFile: string | undefined;
|
|
22
22
|
/**
|
|
23
23
|
* Client authentication credentials.
|
|
24
24
|
*/
|
|
25
|
-
export declare
|
|
25
|
+
export declare const clientAuths: outputs.config.ClientAuths[] | undefined;
|
|
26
26
|
/**
|
|
27
27
|
* The headers to send with each Vault request.
|
|
28
28
|
*/
|
|
29
|
-
export declare
|
|
29
|
+
export declare const headers: outputs.config.Headers[] | undefined;
|
|
30
30
|
/**
|
|
31
31
|
* Maximum TTL for secret leases requested by this provider
|
|
32
32
|
*/
|
|
33
|
-
export declare
|
|
33
|
+
export declare const maxLeaseTtlSeconds: number;
|
|
34
34
|
/**
|
|
35
35
|
* Maximum number of retries when a 5xx error code is encountered.
|
|
36
36
|
*/
|
|
37
|
-
export declare
|
|
37
|
+
export declare const maxRetries: number;
|
|
38
38
|
/**
|
|
39
39
|
* The namespace to use. Available only for Vault Enterprise
|
|
40
40
|
*/
|
|
41
|
-
export declare
|
|
41
|
+
export declare const namespace: string | undefined;
|
|
42
42
|
/**
|
|
43
43
|
* Set this to true only if the target Vault server is an insecure development instance.
|
|
44
44
|
*/
|
|
45
|
-
export declare
|
|
45
|
+
export declare const skipTlsVerify: boolean | undefined;
|
|
46
46
|
/**
|
|
47
47
|
* Token to use to authenticate to Vault.
|
|
48
48
|
*/
|
|
49
|
-
export declare
|
|
49
|
+
export declare const token: string | undefined;
|
|
50
50
|
/**
|
|
51
51
|
* Token name to use for creating the Vault child token.
|
|
52
52
|
*/
|
|
53
|
-
export declare
|
|
53
|
+
export declare const tokenName: string | undefined;
|