@pulumi/vault 4.5.0 → 4.6.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (398) hide show
  1. package/README.md +1 -1
  2. package/ad/getAccessCredentials.d.ts +18 -2
  3. package/ad/getAccessCredentials.js +5 -0
  4. package/ad/getAccessCredentials.js.map +1 -1
  5. package/ad/index.js +14 -7
  6. package/ad/index.js.map +1 -1
  7. package/ad/secretBackend.d.ts +68 -68
  8. package/ad/secretBackend.js +1 -0
  9. package/ad/secretBackend.js.map +1 -1
  10. package/ad/secretLibrary.d.ts +12 -12
  11. package/ad/secretLibrary.js +1 -0
  12. package/ad/secretLibrary.js.map +1 -1
  13. package/ad/secretRole.d.ts +10 -10
  14. package/ad/secretRole.js +1 -0
  15. package/ad/secretRole.js.map +1 -1
  16. package/alicloud/authBackendRole.d.ts +24 -24
  17. package/alicloud/authBackendRole.js +1 -0
  18. package/alicloud/authBackendRole.js.map +1 -1
  19. package/alicloud/index.js +11 -4
  20. package/alicloud/index.js.map +1 -1
  21. package/approle/authBackendLogin.d.ts +16 -16
  22. package/approle/authBackendLogin.js +4 -3
  23. package/approle/authBackendLogin.js.map +1 -1
  24. package/approle/authBackendRole.d.ts +39 -39
  25. package/approle/authBackendRole.js +2 -1
  26. package/approle/authBackendRole.js.map +1 -1
  27. package/approle/authBackendRoleSecretID.d.ts +17 -17
  28. package/approle/authBackendRoleSecretID.js +3 -2
  29. package/approle/authBackendRoleSecretID.js.map +1 -1
  30. package/approle/getAuthBackendRoleId.d.ts +17 -2
  31. package/approle/getAuthBackendRoleId.js +5 -0
  32. package/approle/getAuthBackendRoleId.js.map +1 -1
  33. package/approle/index.js +14 -7
  34. package/approle/index.js.map +1 -1
  35. package/audit.d.ts +10 -10
  36. package/audit.js +1 -0
  37. package/audit.js.map +1 -1
  38. package/authBackend.d.ts +17 -17
  39. package/authBackend.js +1 -0
  40. package/authBackend.js.map +1 -1
  41. package/aws/authBackendCert.d.ts +8 -8
  42. package/aws/authBackendCert.js +1 -0
  43. package/aws/authBackendCert.js.map +1 -1
  44. package/aws/authBackendClient.d.ts +16 -16
  45. package/aws/authBackendClient.js +1 -0
  46. package/aws/authBackendClient.js.map +1 -1
  47. package/aws/authBackendIdentityWhitelist.d.ts +6 -6
  48. package/aws/authBackendIdentityWhitelist.js +1 -0
  49. package/aws/authBackendIdentityWhitelist.js.map +1 -1
  50. package/aws/authBackendLogin.d.ts +28 -28
  51. package/aws/authBackendLogin.js +1 -0
  52. package/aws/authBackendLogin.js.map +1 -1
  53. package/aws/authBackendRole.d.ts +62 -62
  54. package/aws/authBackendRole.js +1 -0
  55. package/aws/authBackendRole.js.map +1 -1
  56. package/aws/authBackendRoleTag.d.ts +16 -16
  57. package/aws/authBackendRoleTag.js +1 -0
  58. package/aws/authBackendRoleTag.js.map +1 -1
  59. package/aws/authBackendRoletagBlacklist.d.ts +6 -6
  60. package/aws/authBackendRoletagBlacklist.js +1 -0
  61. package/aws/authBackendRoletagBlacklist.js.map +1 -1
  62. package/aws/authBackendStsRole.d.ts +6 -6
  63. package/aws/authBackendStsRole.js +1 -0
  64. package/aws/authBackendStsRole.js.map +1 -1
  65. package/aws/getAccessCredentials.d.ts +42 -6
  66. package/aws/getAccessCredentials.js +5 -0
  67. package/aws/getAccessCredentials.js.map +1 -1
  68. package/aws/index.js +21 -14
  69. package/aws/index.js.map +1 -1
  70. package/aws/secretBackend.d.ts +18 -18
  71. package/aws/secretBackend.js +1 -0
  72. package/aws/secretBackend.js.map +1 -1
  73. package/aws/secretBackendRole.d.ts +18 -18
  74. package/aws/secretBackendRole.js +1 -0
  75. package/aws/secretBackendRole.js.map +1 -1
  76. package/azure/authBackendConfig.d.ts +12 -12
  77. package/azure/authBackendConfig.js +1 -0
  78. package/azure/authBackendConfig.js.map +1 -1
  79. package/azure/authBackendRole.d.ts +45 -45
  80. package/azure/authBackendRole.js +1 -0
  81. package/azure/authBackendRole.js.map +1 -1
  82. package/azure/backend.d.ts +14 -14
  83. package/azure/backend.js +1 -0
  84. package/azure/backend.js.map +1 -1
  85. package/azure/backendRole.d.ts +16 -16
  86. package/azure/backendRole.js +1 -0
  87. package/azure/backendRole.js.map +1 -1
  88. package/azure/getAccessCredentials.d.ts +47 -6
  89. package/azure/getAccessCredentials.js +5 -0
  90. package/azure/getAccessCredentials.js.map +1 -1
  91. package/azure/index.js +15 -8
  92. package/azure/index.js.map +1 -1
  93. package/certAuthBackendRole.d.ts +50 -50
  94. package/certAuthBackendRole.js +1 -0
  95. package/certAuthBackendRole.js.map +1 -1
  96. package/config/index.js +11 -4
  97. package/config/index.js.map +1 -1
  98. package/config/vars.d.ts +13 -13
  99. package/config/vars.js +82 -53
  100. package/config/vars.js.map +1 -1
  101. package/consul/index.js +12 -5
  102. package/consul/index.js.map +1 -1
  103. package/consul/secretBackend.d.ts +22 -22
  104. package/consul/secretBackend.js +1 -0
  105. package/consul/secretBackend.js.map +1 -1
  106. package/consul/secretBackendRole.d.ts +16 -16
  107. package/consul/secretBackendRole.js +1 -0
  108. package/consul/secretBackendRole.js.map +1 -1
  109. package/database/index.js +13 -6
  110. package/database/index.js.map +1 -1
  111. package/database/secretBackendConnection.d.ts +38 -38
  112. package/database/secretBackendConnection.js +1 -0
  113. package/database/secretBackendConnection.js.map +1 -1
  114. package/database/secretBackendRole.d.ts +18 -18
  115. package/database/secretBackendRole.js +1 -0
  116. package/database/secretBackendRole.js.map +1 -1
  117. package/database/secretBackendStaticRole.d.ts +12 -12
  118. package/database/secretBackendStaticRole.js +1 -0
  119. package/database/secretBackendStaticRole.js.map +1 -1
  120. package/egpPolicy.d.ts +8 -8
  121. package/egpPolicy.js +1 -0
  122. package/egpPolicy.js.map +1 -1
  123. package/gcp/authBackend.d.ts +16 -16
  124. package/gcp/authBackend.js +1 -0
  125. package/gcp/authBackend.js.map +1 -1
  126. package/gcp/authBackendRole.d.ts +50 -50
  127. package/gcp/authBackendRole.js +1 -0
  128. package/gcp/authBackendRole.js.map +1 -1
  129. package/gcp/getAuthBackendRole.d.ts +80 -12
  130. package/gcp/getAuthBackendRole.js +6 -1
  131. package/gcp/getAuthBackendRole.js.map +1 -1
  132. package/gcp/index.js +16 -9
  133. package/gcp/index.js.map +1 -1
  134. package/gcp/secretBackend.d.ts +12 -12
  135. package/gcp/secretBackend.js +1 -0
  136. package/gcp/secretBackend.js.map +1 -1
  137. package/gcp/secretRoleset.d.ts +13 -13
  138. package/gcp/secretRoleset.js +1 -0
  139. package/gcp/secretRoleset.js.map +1 -1
  140. package/gcp/secretStaticAccount.d.ts +39 -13
  141. package/gcp/secretStaticAccount.js +27 -0
  142. package/gcp/secretStaticAccount.js.map +1 -1
  143. package/generic/endpoint.d.ts +14 -14
  144. package/generic/endpoint.js +1 -0
  145. package/generic/endpoint.js.map +1 -1
  146. package/generic/getSecret.d.ts +22 -2
  147. package/generic/getSecret.js +5 -0
  148. package/generic/getSecret.js.map +1 -1
  149. package/generic/index.js +13 -6
  150. package/generic/index.js.map +1 -1
  151. package/generic/secret.d.ts +7 -7
  152. package/generic/secret.js +1 -0
  153. package/generic/secret.js.map +1 -1
  154. package/getAuthBackend.d.ts +13 -3
  155. package/getAuthBackend.js +6 -1
  156. package/getAuthBackend.js.map +1 -1
  157. package/getNomadAccessToken.d.ts +18 -2
  158. package/getNomadAccessToken.js +5 -0
  159. package/getNomadAccessToken.js.map +1 -1
  160. package/getPolicyDocument.d.ts +8 -1
  161. package/getPolicyDocument.js +5 -0
  162. package/getPolicyDocument.js.map +1 -1
  163. package/github/authBackend.d.ts +44 -35
  164. package/github/authBackend.js +3 -2
  165. package/github/authBackend.js.map +1 -1
  166. package/github/index.js +13 -6
  167. package/github/index.js.map +1 -1
  168. package/github/team.d.ts +24 -24
  169. package/github/team.js +1 -0
  170. package/github/team.js.map +1 -1
  171. package/github/user.d.ts +24 -24
  172. package/github/user.js +1 -0
  173. package/github/user.js.map +1 -1
  174. package/identity/entity.d.ts +10 -10
  175. package/identity/entity.js +1 -0
  176. package/identity/entity.js.map +1 -1
  177. package/identity/entityAlias.d.ts +6 -6
  178. package/identity/entityAlias.js +1 -0
  179. package/identity/entityAlias.js.map +1 -1
  180. package/identity/entityPolicies.d.ts +7 -7
  181. package/identity/entityPolicies.js +1 -0
  182. package/identity/entityPolicies.js.map +1 -1
  183. package/identity/getEntity.d.ts +33 -5
  184. package/identity/getEntity.js +5 -0
  185. package/identity/getEntity.js.map +1 -1
  186. package/identity/getGroup.d.ts +33 -5
  187. package/identity/getGroup.js +5 -0
  188. package/identity/getGroup.js.map +1 -1
  189. package/identity/group.d.ts +16 -16
  190. package/identity/group.js +1 -0
  191. package/identity/group.js.map +1 -1
  192. package/identity/groupAlias.d.ts +6 -6
  193. package/identity/groupAlias.js +1 -0
  194. package/identity/groupAlias.js.map +1 -1
  195. package/identity/groupMemberEntityIds.d.ts +7 -7
  196. package/identity/groupMemberEntityIds.js +1 -0
  197. package/identity/groupMemberEntityIds.js.map +1 -1
  198. package/identity/groupPolicies.d.ts +7 -7
  199. package/identity/groupPolicies.js +1 -0
  200. package/identity/groupPolicies.js.map +1 -1
  201. package/identity/index.js +23 -16
  202. package/identity/index.js.map +1 -1
  203. package/identity/oidc.d.ts +2 -2
  204. package/identity/oidc.js +1 -0
  205. package/identity/oidc.js.map +1 -1
  206. package/identity/oidcKey.d.ts +10 -10
  207. package/identity/oidcKey.js +1 -0
  208. package/identity/oidcKey.js.map +1 -1
  209. package/identity/oidcKeyAllowedClientID.d.ts +4 -4
  210. package/identity/oidcKeyAllowedClientID.js +1 -0
  211. package/identity/oidcKeyAllowedClientID.js.map +1 -1
  212. package/identity/oidcRole.d.ts +10 -10
  213. package/identity/oidcRole.js +1 -0
  214. package/identity/oidcRole.js.map +1 -1
  215. package/index.js +31 -23
  216. package/index.js.map +1 -1
  217. package/jwt/authBackend.d.ts +33 -33
  218. package/jwt/authBackend.js +1 -0
  219. package/jwt/authBackend.js.map +1 -1
  220. package/jwt/authBackendRole.d.ts +64 -64
  221. package/jwt/authBackendRole.js +1 -0
  222. package/jwt/authBackendRole.js.map +1 -1
  223. package/jwt/index.js +12 -5
  224. package/jwt/index.js.map +1 -1
  225. package/kubernetes/authBackendConfig.d.ts +16 -16
  226. package/kubernetes/authBackendConfig.js +1 -0
  227. package/kubernetes/authBackendConfig.js.map +1 -1
  228. package/kubernetes/authBackendRole.d.ts +40 -40
  229. package/kubernetes/authBackendRole.js +1 -0
  230. package/kubernetes/authBackendRole.js.map +1 -1
  231. package/kubernetes/getAuthBackendConfig.d.ts +36 -7
  232. package/kubernetes/getAuthBackendConfig.js +5 -0
  233. package/kubernetes/getAuthBackendConfig.js.map +1 -1
  234. package/kubernetes/getAuthBackendRole.d.ts +115 -18
  235. package/kubernetes/getAuthBackendRole.js +5 -0
  236. package/kubernetes/getAuthBackendRole.js.map +1 -1
  237. package/kubernetes/index.js +14 -7
  238. package/kubernetes/index.js.map +1 -1
  239. package/ldap/authBackend.d.ts +63 -63
  240. package/ldap/authBackend.js +1 -0
  241. package/ldap/authBackend.js.map +1 -1
  242. package/ldap/authBackendGroup.d.ts +6 -6
  243. package/ldap/authBackendGroup.js +1 -0
  244. package/ldap/authBackendGroup.js.map +1 -1
  245. package/ldap/authBackendUser.d.ts +8 -8
  246. package/ldap/authBackendUser.js +1 -0
  247. package/ldap/authBackendUser.js.map +1 -1
  248. package/ldap/index.js +13 -6
  249. package/ldap/index.js.map +1 -1
  250. package/mfaDuo.d.ts +14 -14
  251. package/mfaDuo.js +1 -0
  252. package/mfaDuo.js.map +1 -1
  253. package/mount.d.ts +19 -19
  254. package/mount.js +1 -0
  255. package/mount.js.map +1 -1
  256. package/namespace.d.ts +3 -3
  257. package/namespace.js +1 -0
  258. package/namespace.js.map +1 -1
  259. package/nomadSecretBackend.d.ts +26 -26
  260. package/nomadSecretBackend.js +1 -0
  261. package/nomadSecretBackend.js.map +1 -1
  262. package/nomadSecretRole.d.ts +10 -10
  263. package/nomadSecretRole.js +1 -0
  264. package/nomadSecretRole.js.map +1 -1
  265. package/okta/authBackend.d.ts +21 -21
  266. package/okta/authBackend.js +1 -0
  267. package/okta/authBackend.js.map +1 -1
  268. package/okta/authBackendGroup.d.ts +6 -6
  269. package/okta/authBackendGroup.js +1 -0
  270. package/okta/authBackendGroup.js.map +1 -1
  271. package/okta/authBackendUser.d.ts +16 -8
  272. package/okta/authBackendUser.js +9 -0
  273. package/okta/authBackendUser.js.map +1 -1
  274. package/okta/index.js +13 -6
  275. package/okta/index.js.map +1 -1
  276. package/package.json +4 -3
  277. package/package.json.bak +3 -2
  278. package/package.json.dev +4 -3
  279. package/passwordPolicy.d.ts +4 -4
  280. package/passwordPolicy.js +1 -0
  281. package/passwordPolicy.js.map +1 -1
  282. package/pkisecret/index.js +21 -14
  283. package/pkisecret/index.js.map +1 -1
  284. package/pkisecret/secretBackend.d.ts +8 -8
  285. package/pkisecret/secretBackend.js +1 -0
  286. package/pkisecret/secretBackend.js.map +1 -1
  287. package/pkisecret/secretBackendCert.d.ts +33 -33
  288. package/pkisecret/secretBackendCert.js +1 -0
  289. package/pkisecret/secretBackendCert.js.map +1 -1
  290. package/pkisecret/secretBackendConfigCa.d.ts +4 -4
  291. package/pkisecret/secretBackendConfigCa.js +1 -0
  292. package/pkisecret/secretBackendConfigCa.js.map +1 -1
  293. package/pkisecret/secretBackendConfigUrls.d.ts +10 -10
  294. package/pkisecret/secretBackendConfigUrls.js +3 -2
  295. package/pkisecret/secretBackendConfigUrls.js.map +1 -1
  296. package/pkisecret/secretBackendCrlConfig.d.ts +7 -7
  297. package/pkisecret/secretBackendCrlConfig.js +2 -1
  298. package/pkisecret/secretBackendCrlConfig.js.map +1 -1
  299. package/pkisecret/secretBackendIntermediateCertRequest.d.ts +41 -41
  300. package/pkisecret/secretBackendIntermediateCertRequest.js +1 -0
  301. package/pkisecret/secretBackendIntermediateCertRequest.js.map +1 -1
  302. package/pkisecret/secretBackendIntermediateSetSigned.d.ts +4 -4
  303. package/pkisecret/secretBackendIntermediateSetSigned.js +1 -0
  304. package/pkisecret/secretBackendIntermediateSetSigned.js.map +1 -1
  305. package/pkisecret/secretBackendRole.d.ts +78 -78
  306. package/pkisecret/secretBackendRole.js +3 -2
  307. package/pkisecret/secretBackendRole.js.map +1 -1
  308. package/pkisecret/secretBackendRootCert.d.ts +47 -47
  309. package/pkisecret/secretBackendRootCert.js +1 -0
  310. package/pkisecret/secretBackendRootCert.js.map +1 -1
  311. package/pkisecret/secretBackendRootSignIntermediate.d.ts +45 -45
  312. package/pkisecret/secretBackendRootSignIntermediate.js +2 -1
  313. package/pkisecret/secretBackendRootSignIntermediate.js.map +1 -1
  314. package/pkisecret/secretBackendSign.d.ts +31 -31
  315. package/pkisecret/secretBackendSign.js +1 -0
  316. package/pkisecret/secretBackendSign.js.map +1 -1
  317. package/policy.d.ts +4 -4
  318. package/policy.js +1 -0
  319. package/policy.js.map +1 -1
  320. package/provider.d.ts +41 -13
  321. package/provider.js +4 -3
  322. package/provider.js.map +1 -1
  323. package/quotaLeaseCount.d.ts +6 -6
  324. package/quotaLeaseCount.js +1 -0
  325. package/quotaLeaseCount.js.map +1 -1
  326. package/quotaRateLimit.d.ts +6 -6
  327. package/quotaRateLimit.js +1 -0
  328. package/quotaRateLimit.js.map +1 -1
  329. package/rabbitmq/index.js +12 -5
  330. package/rabbitmq/index.js.map +1 -1
  331. package/rabbitmq/secretBackend.d.ts +16 -16
  332. package/rabbitmq/secretBackend.js +1 -0
  333. package/rabbitmq/secretBackend.js.map +1 -1
  334. package/rabbitmq/secretBackendRole.d.ts +8 -8
  335. package/rabbitmq/secretBackendRole.js +1 -0
  336. package/rabbitmq/secretBackendRole.js.map +1 -1
  337. package/raftSnapshotAgentConfig.d.ts +54 -54
  338. package/raftSnapshotAgentConfig.js +1 -0
  339. package/raftSnapshotAgentConfig.js.map +1 -1
  340. package/rgpPolicy.d.ts +6 -6
  341. package/rgpPolicy.js +1 -0
  342. package/rgpPolicy.js.map +1 -1
  343. package/ssh/index.js +12 -5
  344. package/ssh/index.js.map +1 -1
  345. package/ssh/secretBackendCa.d.ts +8 -8
  346. package/ssh/secretBackendCa.js +1 -0
  347. package/ssh/secretBackendCa.js.map +1 -1
  348. package/ssh/secretBackendRole.d.ts +44 -44
  349. package/ssh/secretBackendRole.js +1 -0
  350. package/ssh/secretBackendRole.js.map +1 -1
  351. package/token.d.ts +34 -34
  352. package/token.js +1 -0
  353. package/token.js.map +1 -1
  354. package/tokenauth/authBackendRole.d.ts +39 -39
  355. package/tokenauth/authBackendRole.js +1 -0
  356. package/tokenauth/authBackendRole.js.map +1 -1
  357. package/tokenauth/index.js +11 -4
  358. package/tokenauth/index.js.map +1 -1
  359. package/transform/alphabet.d.ts +6 -6
  360. package/transform/alphabet.js +1 -0
  361. package/transform/alphabet.js.map +1 -1
  362. package/transform/getDecode.d.ts +50 -8
  363. package/transform/getDecode.js +5 -0
  364. package/transform/getDecode.js.map +1 -1
  365. package/transform/getEncode.d.ts +50 -8
  366. package/transform/getEncode.js +5 -0
  367. package/transform/getEncode.js.map +1 -1
  368. package/transform/index.js +16 -9
  369. package/transform/index.js.map +1 -1
  370. package/transform/role.d.ts +6 -6
  371. package/transform/role.js +1 -0
  372. package/transform/role.js.map +1 -1
  373. package/transform/template.d.ts +10 -10
  374. package/transform/template.js +1 -0
  375. package/transform/template.js.map +1 -1
  376. package/transform/transformation.d.ts +16 -16
  377. package/transform/transformation.js +1 -0
  378. package/transform/transformation.js.map +1 -1
  379. package/transit/getDecrypt.d.ts +27 -5
  380. package/transit/getDecrypt.js +6 -1
  381. package/transit/getDecrypt.js.map +1 -1
  382. package/transit/getEncrypt.d.ts +31 -5
  383. package/transit/getEncrypt.js +5 -0
  384. package/transit/getEncrypt.js.map +1 -1
  385. package/transit/index.js +14 -7
  386. package/transit/index.js.map +1 -1
  387. package/transit/secretBackendKey.d.ts +27 -27
  388. package/transit/secretBackendKey.js +1 -0
  389. package/transit/secretBackendKey.js.map +1 -1
  390. package/transit/secretCacheConfig.d.ts +4 -4
  391. package/transit/secretCacheConfig.js +1 -0
  392. package/transit/secretCacheConfig.js.map +1 -1
  393. package/types/index.js +1 -0
  394. package/types/index.js.map +1 -1
  395. package/types/input.d.ts +54 -0
  396. package/types/output.d.ts +0 -16
  397. package/utilities.js +1 -0
  398. package/utilities.js.map +1 -1
package/config/vars.js CHANGED
@@ -4,57 +4,86 @@
4
4
  Object.defineProperty(exports, "__esModule", { value: true });
5
5
  const pulumi = require("@pulumi/pulumi");
6
6
  const utilities = require("../utilities");
7
- let __config = new pulumi.Config("vault");
8
- /**
9
- * If true, adds the value of the `address` argument to the Terraform process environment.
10
- */
11
- exports.addAddressToEnv = __config.get("addAddressToEnv");
12
- /**
13
- * URL of the root of the target Vault server.
14
- */
15
- exports.address = __config.get("address");
16
- /**
17
- * Login to vault with an existing auth method using auth/<mount>/login
18
- */
19
- exports.authLogins = __config.getObject("authLogins");
20
- /**
21
- * Path to directory containing CA certificate files to validate the server's certificate.
22
- */
23
- exports.caCertDir = __config.get("caCertDir");
24
- /**
25
- * Path to a CA certificate file to validate the server's certificate.
26
- */
27
- exports.caCertFile = __config.get("caCertFile");
28
- /**
29
- * Client authentication credentials.
30
- */
31
- exports.clientAuths = __config.getObject("clientAuths");
32
- /**
33
- * The headers to send with each Vault request.
34
- */
35
- exports.headers = __config.getObject("headers");
36
- /**
37
- * Maximum TTL for secret leases requested by this provider
38
- */
39
- exports.maxLeaseTtlSeconds = __config.getObject("maxLeaseTtlSeconds") || (utilities.getEnvNumber("TERRAFORM_VAULT_MAX_TTL") || 1200);
40
- /**
41
- * Maximum number of retries when a 5xx error code is encountered.
42
- */
43
- exports.maxRetries = __config.getObject("maxRetries") || (utilities.getEnvNumber("VAULT_MAX_RETRIES") || 2);
44
- /**
45
- * The namespace to use. Available only for Vault Enterprise
46
- */
47
- exports.namespace = __config.get("namespace");
48
- /**
49
- * Set this to true only if the target Vault server is an insecure development instance.
50
- */
51
- exports.skipTlsVerify = __config.getObject("skipTlsVerify") || utilities.getEnvBoolean("VAULT_SKIP_VERIFY");
52
- /**
53
- * Token to use to authenticate to Vault.
54
- */
55
- exports.token = __config.get("token");
56
- /**
57
- * Token name to use for creating the Vault child token.
58
- */
59
- exports.tokenName = __config.get("tokenName");
7
+ const __config = new pulumi.Config("vault");
8
+ Object.defineProperty(exports, "addAddressToEnv", {
9
+ get() {
10
+ return __config.get("addAddressToEnv");
11
+ },
12
+ enumerable: true,
13
+ });
14
+ Object.defineProperty(exports, "address", {
15
+ get() {
16
+ return __config.get("address");
17
+ },
18
+ enumerable: true,
19
+ });
20
+ Object.defineProperty(exports, "authLogins", {
21
+ get() {
22
+ return __config.getObject("authLogins");
23
+ },
24
+ enumerable: true,
25
+ });
26
+ Object.defineProperty(exports, "caCertDir", {
27
+ get() {
28
+ return __config.get("caCertDir");
29
+ },
30
+ enumerable: true,
31
+ });
32
+ Object.defineProperty(exports, "caCertFile", {
33
+ get() {
34
+ return __config.get("caCertFile");
35
+ },
36
+ enumerable: true,
37
+ });
38
+ Object.defineProperty(exports, "clientAuths", {
39
+ get() {
40
+ return __config.getObject("clientAuths");
41
+ },
42
+ enumerable: true,
43
+ });
44
+ Object.defineProperty(exports, "headers", {
45
+ get() {
46
+ return __config.getObject("headers");
47
+ },
48
+ enumerable: true,
49
+ });
50
+ Object.defineProperty(exports, "maxLeaseTtlSeconds", {
51
+ get() {
52
+ var _a;
53
+ return (_a = __config.getObject("maxLeaseTtlSeconds")) !== null && _a !== void 0 ? _a : (utilities.getEnvNumber("TERRAFORM_VAULT_MAX_TTL") || 1200);
54
+ },
55
+ enumerable: true,
56
+ });
57
+ Object.defineProperty(exports, "maxRetries", {
58
+ get() {
59
+ var _a;
60
+ return (_a = __config.getObject("maxRetries")) !== null && _a !== void 0 ? _a : (utilities.getEnvNumber("VAULT_MAX_RETRIES") || 2);
61
+ },
62
+ enumerable: true,
63
+ });
64
+ Object.defineProperty(exports, "namespace", {
65
+ get() {
66
+ return __config.get("namespace");
67
+ },
68
+ enumerable: true,
69
+ });
70
+ Object.defineProperty(exports, "skipTlsVerify", {
71
+ get() {
72
+ var _a;
73
+ return (_a = __config.getObject("skipTlsVerify")) !== null && _a !== void 0 ? _a : utilities.getEnvBoolean("VAULT_SKIP_VERIFY");
74
+ },
75
+ enumerable: true,
76
+ });
77
+ Object.defineProperty(exports, "token", {
78
+ get() {
79
+ return __config.get("token");
80
+ },
81
+ enumerable: true,
82
+ });
83
+ Object.defineProperty(exports, "tokenName", {
84
+ get() {
85
+ return __config.get("tokenName");
86
+ },
87
+ enumerable: true,
88
+ });
60
89
  //# sourceMappingURL=vars.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"vars.js","sourceRoot":"","sources":["../../config/vars.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;AAEjF,yCAAyC;AAEzC,0CAA0C;AAE1C,IAAI,QAAQ,GAAG,IAAI,MAAM,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC;AAE1C;;GAEG;AACQ,QAAA,eAAe,GAAuB,QAAQ,CAAC,GAAG,CAAC,iBAAiB,CAAC,CAAC;AACjF;;GAEG;AACQ,QAAA,OAAO,GAAuB,QAAQ,CAAC,GAAG,CAAC,SAAS,CAAC,CAAC;AACjE;;GAEG;AACQ,QAAA,UAAU,GAA4C,QAAQ,CAAC,SAAS,CAA8B,YAAY,CAAC,CAAC;AAC/H;;GAEG;AACQ,QAAA,SAAS,GAAuB,QAAQ,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC;AACrE;;GAEG;AACQ,QAAA,UAAU,GAAuB,QAAQ,CAAC,GAAG,CAAC,YAAY,CAAC,CAAC;AACvE;;GAEG;AACQ,QAAA,WAAW,GAA6C,QAAQ,CAAC,SAAS,CAA+B,aAAa,CAAC,CAAC;AACnI;;GAEG;AACQ,QAAA,OAAO,GAAyC,QAAQ,CAAC,SAAS,CAA2B,SAAS,CAAC,CAAC;AACnH;;GAEG;AACQ,QAAA,kBAAkB,GAAuB,QAAQ,CAAC,SAAS,CAAS,oBAAoB,CAAC,IAAI,CAAM,SAAS,CAAC,YAAY,CAAC,yBAAyB,CAAC,IAAI,IAAI,CAAC,CAAC;AACzK;;GAEG;AACQ,QAAA,UAAU,GAAuB,QAAQ,CAAC,SAAS,CAAS,YAAY,CAAC,IAAI,CAAM,SAAS,CAAC,YAAY,CAAC,mBAAmB,CAAC,IAAI,CAAC,CAAC,CAAC;AAChJ;;GAEG;AACQ,QAAA,SAAS,GAAuB,QAAQ,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC;AACrE;;GAEG;AACQ,QAAA,aAAa,GAAwB,QAAQ,CAAC,SAAS,CAAU,eAAe,CAAC,IAAS,SAAS,CAAC,aAAa,CAAC,mBAAmB,CAAC,CAAC;AAClJ;;GAEG;AACQ,QAAA,KAAK,GAAuB,QAAQ,CAAC,GAAG,CAAC,OAAO,CAAC,CAAC;AAC7D;;GAEG;AACQ,QAAA,SAAS,GAAuB,QAAQ,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC"}
1
+ {"version":3,"file":"vars.js","sourceRoot":"","sources":["../../config/vars.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;AAEjF,yCAAyC;AAEzC,0CAA0C;AAG1C,MAAM,QAAQ,GAAG,IAAI,MAAM,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC;AAM5C,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,iBAAiB,EAAE;IAC9C,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,iBAAiB,CAAC,CAAC;IAC3C,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,SAAS,EAAE;IACtC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,SAAS,CAAC,CAAC;IACnC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,YAAY,EAAE;IACzC,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAA8B,YAAY,CAAC,CAAC;IACzE,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,WAAW,EAAE;IACxC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC;IACrC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,YAAY,EAAE;IACzC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,YAAY,CAAC,CAAC;IACtC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,aAAa,EAAE;IAC1C,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAA+B,aAAa,CAAC,CAAC;IAC3E,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,SAAS,EAAE;IACtC,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAA2B,SAAS,CAAC,CAAC;IACnE,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,oBAAoB,EAAE;IACjD,GAAG;;QACC,OAAO,MAAA,QAAQ,CAAC,SAAS,CAAS,oBAAoB,CAAC,mCAAI,CAAM,SAAS,CAAC,YAAY,CAAC,yBAAyB,CAAC,IAAI,IAAI,CAAC,CAAC;IAChI,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,YAAY,EAAE;IACzC,GAAG;;QACC,OAAO,MAAA,QAAQ,CAAC,SAAS,CAAS,YAAY,CAAC,mCAAI,CAAM,SAAS,CAAC,YAAY,CAAC,mBAAmB,CAAC,IAAI,CAAC,CAAC,CAAC;IAC/G,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,WAAW,EAAE;IACxC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC;IACrC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,eAAe,EAAE;IAC5C,GAAG;;QACC,OAAO,MAAA,QAAQ,CAAC,SAAS,CAAU,eAAe,CAAC,mCAAS,SAAS,CAAC,aAAa,CAAC,mBAAmB,CAAC,CAAC;IAC7G,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,OAAO,EAAE;IACpC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,OAAO,CAAC,CAAC;IACjC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,WAAW,EAAE;IACxC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC;IACrC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC"}
package/consul/index.js CHANGED
@@ -1,15 +1,22 @@
1
1
  "use strict";
2
2
  // *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  // *** Do not edit by hand unless you're certain you know what you are doing! ***
4
- function __export(m) {
5
- for (var p in m) if (!exports.hasOwnProperty(p)) exports[p] = m[p];
6
- }
4
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
5
+ if (k2 === undefined) k2 = k;
6
+ Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } });
7
+ }) : (function(o, m, k, k2) {
8
+ if (k2 === undefined) k2 = k;
9
+ o[k2] = m[k];
10
+ }));
11
+ var __exportStar = (this && this.__exportStar) || function(m, exports) {
12
+ for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
13
+ };
7
14
  Object.defineProperty(exports, "__esModule", { value: true });
8
15
  const pulumi = require("@pulumi/pulumi");
9
16
  const utilities = require("../utilities");
10
17
  // Export members:
11
- __export(require("./secretBackend"));
12
- __export(require("./secretBackendRole"));
18
+ __exportStar(require("./secretBackend"), exports);
19
+ __exportStar(require("./secretBackendRole"), exports);
13
20
  // Import resources to register:
14
21
  const secretBackend_1 = require("./secretBackend");
15
22
  const secretBackendRole_1 = require("./secretBackendRole");
@@ -1 +1 @@
1
- {"version":3,"file":"index.js","sourceRoot":"","sources":["../../consul/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,kBAAkB;AAClB,qCAAgC;AAChC,yCAAoC;AAEpC,gCAAgC;AAChC,mDAAgD;AAChD,2DAAwD;AAExD,MAAM,OAAO,GAAG;IACZ,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE;IAC/B,SAAS,EAAE,CAAC,IAAY,EAAE,IAAY,EAAE,GAAW,EAAmB,EAAE;QACpE,QAAQ,IAAI,EAAE;YACV,KAAK,0CAA0C;gBAC3C,OAAO,IAAI,6BAAa,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC3D,KAAK,kDAAkD;gBACnD,OAAO,IAAI,qCAAiB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC/D;gBACI,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,EAAE,CAAC,CAAC;SACxD;IACL,CAAC;CACJ,CAAC;AACF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,sBAAsB,EAAE,OAAO,CAAC,CAAA;AAC/E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,0BAA0B,EAAE,OAAO,CAAC,CAAA"}
1
+ {"version":3,"file":"index.js","sourceRoot":"","sources":["../../consul/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;;;;;;;;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,kBAAkB;AAClB,kDAAgC;AAChC,sDAAoC;AAEpC,gCAAgC;AAChC,mDAAgD;AAChD,2DAAwD;AAExD,MAAM,OAAO,GAAG;IACZ,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE;IAC/B,SAAS,EAAE,CAAC,IAAY,EAAE,IAAY,EAAE,GAAW,EAAmB,EAAE;QACpE,QAAQ,IAAI,EAAE;YACV,KAAK,0CAA0C;gBAC3C,OAAO,IAAI,6BAAa,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC3D,KAAK,kDAAkD;gBACnD,OAAO,IAAI,qCAAiB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC/D;gBACI,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,EAAE,CAAC,CAAC;SACxD;IACL,CAAC;CACJ,CAAC;AACF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,sBAAsB,EAAE,OAAO,CAAC,CAAA;AAC/E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,0BAA0B,EAAE,OAAO,CAAC,CAAA"}
@@ -85,48 +85,48 @@ export interface SecretBackendState {
85
85
  /**
86
86
  * Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
87
87
  */
88
- readonly address?: pulumi.Input<string>;
88
+ address?: pulumi.Input<string>;
89
89
  /**
90
90
  * CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
91
91
  */
92
- readonly caCert?: pulumi.Input<string>;
92
+ caCert?: pulumi.Input<string>;
93
93
  /**
94
94
  * Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key.
95
95
  */
96
- readonly clientCert?: pulumi.Input<string>;
96
+ clientCert?: pulumi.Input<string>;
97
97
  /**
98
98
  * Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert.
99
99
  */
100
- readonly clientKey?: pulumi.Input<string>;
100
+ clientKey?: pulumi.Input<string>;
101
101
  /**
102
102
  * The default TTL for credentials issued by this backend.
103
103
  */
104
- readonly defaultLeaseTtlSeconds?: pulumi.Input<number>;
104
+ defaultLeaseTtlSeconds?: pulumi.Input<number>;
105
105
  /**
106
106
  * A human-friendly description for this backend.
107
107
  */
108
- readonly description?: pulumi.Input<string>;
108
+ description?: pulumi.Input<string>;
109
109
  /**
110
110
  * Specifies if the secret backend is local only.
111
111
  */
112
- readonly local?: pulumi.Input<boolean>;
112
+ local?: pulumi.Input<boolean>;
113
113
  /**
114
114
  * The maximum TTL that can be requested
115
115
  * for credentials issued by this backend.
116
116
  */
117
- readonly maxLeaseTtlSeconds?: pulumi.Input<number>;
117
+ maxLeaseTtlSeconds?: pulumi.Input<number>;
118
118
  /**
119
119
  * The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults to `consul`.
120
120
  */
121
- readonly path?: pulumi.Input<string>;
121
+ path?: pulumi.Input<string>;
122
122
  /**
123
123
  * Specifies the URL scheme to use. Defaults to `http`.
124
124
  */
125
- readonly scheme?: pulumi.Input<string>;
125
+ scheme?: pulumi.Input<string>;
126
126
  /**
127
127
  * The Consul management token this backend should use to issue new tokens.
128
128
  */
129
- readonly token?: pulumi.Input<string>;
129
+ token?: pulumi.Input<string>;
130
130
  }
131
131
  /**
132
132
  * The set of arguments for constructing a SecretBackend resource.
@@ -135,46 +135,46 @@ export interface SecretBackendArgs {
135
135
  /**
136
136
  * Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
137
137
  */
138
- readonly address: pulumi.Input<string>;
138
+ address: pulumi.Input<string>;
139
139
  /**
140
140
  * CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
141
141
  */
142
- readonly caCert?: pulumi.Input<string>;
142
+ caCert?: pulumi.Input<string>;
143
143
  /**
144
144
  * Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key.
145
145
  */
146
- readonly clientCert?: pulumi.Input<string>;
146
+ clientCert?: pulumi.Input<string>;
147
147
  /**
148
148
  * Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert.
149
149
  */
150
- readonly clientKey?: pulumi.Input<string>;
150
+ clientKey?: pulumi.Input<string>;
151
151
  /**
152
152
  * The default TTL for credentials issued by this backend.
153
153
  */
154
- readonly defaultLeaseTtlSeconds?: pulumi.Input<number>;
154
+ defaultLeaseTtlSeconds?: pulumi.Input<number>;
155
155
  /**
156
156
  * A human-friendly description for this backend.
157
157
  */
158
- readonly description?: pulumi.Input<string>;
158
+ description?: pulumi.Input<string>;
159
159
  /**
160
160
  * Specifies if the secret backend is local only.
161
161
  */
162
- readonly local?: pulumi.Input<boolean>;
162
+ local?: pulumi.Input<boolean>;
163
163
  /**
164
164
  * The maximum TTL that can be requested
165
165
  * for credentials issued by this backend.
166
166
  */
167
- readonly maxLeaseTtlSeconds?: pulumi.Input<number>;
167
+ maxLeaseTtlSeconds?: pulumi.Input<number>;
168
168
  /**
169
169
  * The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults to `consul`.
170
170
  */
171
- readonly path?: pulumi.Input<string>;
171
+ path?: pulumi.Input<string>;
172
172
  /**
173
173
  * Specifies the URL scheme to use. Defaults to `http`.
174
174
  */
175
- readonly scheme?: pulumi.Input<string>;
175
+ scheme?: pulumi.Input<string>;
176
176
  /**
177
177
  * The Consul management token this backend should use to issue new tokens.
178
178
  */
179
- readonly token: pulumi.Input<string>;
179
+ token: pulumi.Input<string>;
180
180
  }
@@ -2,6 +2,7 @@
2
2
  // *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  // *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
  Object.defineProperty(exports, "__esModule", { value: true });
5
+ exports.SecretBackend = void 0;
5
6
  const pulumi = require("@pulumi/pulumi");
6
7
  const utilities = require("../utilities");
7
8
  /**
@@ -1 +1 @@
1
- {"version":3,"file":"secretBackend.js","sourceRoot":"","sources":["../../consul/secretBackend.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;GAQG;AACH,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;IAkFpD,YAAY,IAAY,EAAE,WAAoD,EAAE,IAAmC;QAC/G,IAAI,MAAM,GAAkB,EAAE,CAAC;QAC/B,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA6C,CAAC;YAC5D,MAAM,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,MAAM,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;SACrD;aAAM;YACH,MAAM,IAAI,GAAG,WAA4C,CAAC;YAC1D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,KAAK,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,MAAM,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,MAAM,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9C,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;SACnD;QACD,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;YACf,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE,EAAC,CAAC,CAAC;SACxE;QACD,KAAK,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,CAAC,CAAC;IAC1D,CAAC;IAzHD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA0B,EAAE,IAAmC;QACxH,OAAO,IAAI,aAAa,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACpE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,aAAa,CAAC,YAAY,CAAC;IAC9D,CAAC;;AA1BL,sCA2HC;AA7GG,gBAAgB;AACO,0BAAY,GAAG,0CAA0C,CAAC"}
1
+ {"version":3,"file":"secretBackend.js","sourceRoot":"","sources":["../../consul/secretBackend.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;GAQG;AACH,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;IAkFpD,YAAY,IAAY,EAAE,WAAoD,EAAE,IAAmC;QAC/G,IAAI,MAAM,GAAkB,EAAE,CAAC;QAC/B,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA6C,CAAC;YAC5D,MAAM,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,MAAM,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;SACrD;aAAM;YACH,MAAM,IAAI,GAAG,WAA4C,CAAC;YAC1D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,KAAK,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,MAAM,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,MAAM,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9C,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;SACnD;QACD,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;YACf,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE,EAAC,CAAC,CAAC;SACxE;QACD,KAAK,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,CAAC,CAAC;IAC1D,CAAC;IAzHD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA0B,EAAE,IAAmC;QACxH,OAAO,IAAI,aAAa,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACpE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,aAAa,CAAC,YAAY,CAAC;IAC9D,CAAC;;AA1BL,sCA2HC;AA7GG,gBAAgB;AACO,0BAAY,GAAG,0CAA0C,CAAC"}
@@ -94,37 +94,37 @@ export interface SecretBackendRoleState {
94
94
  /**
95
95
  * The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
96
96
  */
97
- readonly backend?: pulumi.Input<string>;
97
+ backend?: pulumi.Input<string>;
98
98
  /**
99
99
  * Indicates that the token should not be replicated globally and instead be local to the current datacenter.
100
100
  */
101
- readonly local?: pulumi.Input<boolean>;
101
+ local?: pulumi.Input<boolean>;
102
102
  /**
103
103
  * Maximum TTL for leases associated with this role, in seconds.
104
104
  */
105
- readonly maxTtl?: pulumi.Input<number>;
105
+ maxTtl?: pulumi.Input<number>;
106
106
  /**
107
107
  * The name of the Consul secrets engine role to create.
108
108
  */
109
- readonly name?: pulumi.Input<string>;
109
+ name?: pulumi.Input<string>;
110
110
  /**
111
111
  * The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. **Deprecated**
112
112
  *
113
113
  * @deprecated use `backend` instead
114
114
  */
115
- readonly path?: pulumi.Input<string>;
115
+ path?: pulumi.Input<string>;
116
116
  /**
117
117
  * The list of Consul ACL policies to associate with these roles.
118
118
  */
119
- readonly policies?: pulumi.Input<pulumi.Input<string>[]>;
119
+ policies?: pulumi.Input<pulumi.Input<string>[]>;
120
120
  /**
121
121
  * Specifies the type of token to create when using this role. Valid values are "client" or "management".
122
122
  */
123
- readonly tokenType?: pulumi.Input<string>;
123
+ tokenType?: pulumi.Input<string>;
124
124
  /**
125
125
  * Specifies the TTL for this role.
126
126
  */
127
- readonly ttl?: pulumi.Input<number>;
127
+ ttl?: pulumi.Input<number>;
128
128
  }
129
129
  /**
130
130
  * The set of arguments for constructing a SecretBackendRole resource.
@@ -133,35 +133,35 @@ export interface SecretBackendRoleArgs {
133
133
  /**
134
134
  * The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
135
135
  */
136
- readonly backend?: pulumi.Input<string>;
136
+ backend?: pulumi.Input<string>;
137
137
  /**
138
138
  * Indicates that the token should not be replicated globally and instead be local to the current datacenter.
139
139
  */
140
- readonly local?: pulumi.Input<boolean>;
140
+ local?: pulumi.Input<boolean>;
141
141
  /**
142
142
  * Maximum TTL for leases associated with this role, in seconds.
143
143
  */
144
- readonly maxTtl?: pulumi.Input<number>;
144
+ maxTtl?: pulumi.Input<number>;
145
145
  /**
146
146
  * The name of the Consul secrets engine role to create.
147
147
  */
148
- readonly name?: pulumi.Input<string>;
148
+ name?: pulumi.Input<string>;
149
149
  /**
150
150
  * The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. **Deprecated**
151
151
  *
152
152
  * @deprecated use `backend` instead
153
153
  */
154
- readonly path?: pulumi.Input<string>;
154
+ path?: pulumi.Input<string>;
155
155
  /**
156
156
  * The list of Consul ACL policies to associate with these roles.
157
157
  */
158
- readonly policies: pulumi.Input<pulumi.Input<string>[]>;
158
+ policies: pulumi.Input<pulumi.Input<string>[]>;
159
159
  /**
160
160
  * Specifies the type of token to create when using this role. Valid values are "client" or "management".
161
161
  */
162
- readonly tokenType?: pulumi.Input<string>;
162
+ tokenType?: pulumi.Input<string>;
163
163
  /**
164
164
  * Specifies the TTL for this role.
165
165
  */
166
- readonly ttl?: pulumi.Input<number>;
166
+ ttl?: pulumi.Input<number>;
167
167
  }
@@ -2,6 +2,7 @@
2
2
  // *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  // *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
  Object.defineProperty(exports, "__esModule", { value: true });
5
+ exports.SecretBackendRole = void 0;
5
6
  const pulumi = require("@pulumi/pulumi");
6
7
  const utilities = require("../utilities");
7
8
  /**
@@ -1 +1 @@
1
- {"version":3,"file":"secretBackendRole.js","sourceRoot":"","sources":["../../consul/secretBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA4BG;AACH,MAAa,iBAAkB,SAAQ,MAAM,CAAC,cAAc;IAuExD,YAAY,IAAY,EAAE,WAA4D,EAAE,IAAmC;QACvH,IAAI,MAAM,GAAkB,EAAE,CAAC;QAC/B,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAiD,CAAC;YAChE,MAAM,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACjD;aAAM;YACH,MAAM,IAAI,GAAG,WAAgD,CAAC;YAC9D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,MAAM,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9C,MAAM,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9C,MAAM,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/C;QACD,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;YACf,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE,EAAC,CAAC,CAAC;SACxE;QACD,KAAK,CAAC,iBAAiB,CAAC,YAAY,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,CAAC,CAAC;IAC9D,CAAC;IArGD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA8B,EAAE,IAAmC;QAC5H,OAAO,IAAI,iBAAiB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACxE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,iBAAiB,CAAC,YAAY,CAAC;IAClE,CAAC;;AA1BL,8CAuGC;AAzFG,gBAAgB;AACO,8BAAY,GAAG,kDAAkD,CAAC"}
1
+ {"version":3,"file":"secretBackendRole.js","sourceRoot":"","sources":["../../consul/secretBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA4BG;AACH,MAAa,iBAAkB,SAAQ,MAAM,CAAC,cAAc;IAuExD,YAAY,IAAY,EAAE,WAA4D,EAAE,IAAmC;QACvH,IAAI,MAAM,GAAkB,EAAE,CAAC;QAC/B,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAiD,CAAC;YAChE,MAAM,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACjD;aAAM;YACH,MAAM,IAAI,GAAG,WAAgD,CAAC;YAC9D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,MAAM,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9C,MAAM,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9C,MAAM,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/C;QACD,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;YACf,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE,EAAC,CAAC,CAAC;SACxE;QACD,KAAK,CAAC,iBAAiB,CAAC,YAAY,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,CAAC,CAAC;IAC9D,CAAC;IArGD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA8B,EAAE,IAAmC;QAC5H,OAAO,IAAI,iBAAiB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACxE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,iBAAiB,CAAC,YAAY,CAAC;IAClE,CAAC;;AA1BL,8CAuGC;AAzFG,gBAAgB;AACO,8BAAY,GAAG,kDAAkD,CAAC"}
package/database/index.js CHANGED
@@ -1,16 +1,23 @@
1
1
  "use strict";
2
2
  // *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  // *** Do not edit by hand unless you're certain you know what you are doing! ***
4
- function __export(m) {
5
- for (var p in m) if (!exports.hasOwnProperty(p)) exports[p] = m[p];
6
- }
4
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
5
+ if (k2 === undefined) k2 = k;
6
+ Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } });
7
+ }) : (function(o, m, k, k2) {
8
+ if (k2 === undefined) k2 = k;
9
+ o[k2] = m[k];
10
+ }));
11
+ var __exportStar = (this && this.__exportStar) || function(m, exports) {
12
+ for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
13
+ };
7
14
  Object.defineProperty(exports, "__esModule", { value: true });
8
15
  const pulumi = require("@pulumi/pulumi");
9
16
  const utilities = require("../utilities");
10
17
  // Export members:
11
- __export(require("./secretBackendConnection"));
12
- __export(require("./secretBackendRole"));
13
- __export(require("./secretBackendStaticRole"));
18
+ __exportStar(require("./secretBackendConnection"), exports);
19
+ __exportStar(require("./secretBackendRole"), exports);
20
+ __exportStar(require("./secretBackendStaticRole"), exports);
14
21
  // Import resources to register:
15
22
  const secretBackendConnection_1 = require("./secretBackendConnection");
16
23
  const secretBackendRole_1 = require("./secretBackendRole");
@@ -1 +1 @@
1
- {"version":3,"file":"index.js","sourceRoot":"","sources":["../../database/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,kBAAkB;AAClB,+CAA0C;AAC1C,yCAAoC;AACpC,+CAA0C;AAE1C,gCAAgC;AAChC,uEAAoE;AACpE,2DAAwD;AACxD,uEAAoE;AAEpE,MAAM,OAAO,GAAG;IACZ,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE;IAC/B,SAAS,EAAE,CAAC,IAAY,EAAE,IAAY,EAAE,GAAW,EAAmB,EAAE;QACpE,QAAQ,IAAI,EAAE;YACV,KAAK,gEAAgE;gBACjE,OAAO,IAAI,iDAAuB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACrE,KAAK,oDAAoD;gBACrD,OAAO,IAAI,qCAAiB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC/D,KAAK,gEAAgE;gBACjE,OAAO,IAAI,iDAAuB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACrE;gBACI,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,EAAE,CAAC,CAAC;SACxD;IACL,CAAC;CACJ,CAAC;AACF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,kCAAkC,EAAE,OAAO,CAAC,CAAA;AAC3F,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,4BAA4B,EAAE,OAAO,CAAC,CAAA;AACrF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,kCAAkC,EAAE,OAAO,CAAC,CAAA"}
1
+ {"version":3,"file":"index.js","sourceRoot":"","sources":["../../database/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;;;;;;;;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,kBAAkB;AAClB,4DAA0C;AAC1C,sDAAoC;AACpC,4DAA0C;AAE1C,gCAAgC;AAChC,uEAAoE;AACpE,2DAAwD;AACxD,uEAAoE;AAEpE,MAAM,OAAO,GAAG;IACZ,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE;IAC/B,SAAS,EAAE,CAAC,IAAY,EAAE,IAAY,EAAE,GAAW,EAAmB,EAAE;QACpE,QAAQ,IAAI,EAAE;YACV,KAAK,gEAAgE;gBACjE,OAAO,IAAI,iDAAuB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACrE,KAAK,oDAAoD;gBACrD,OAAO,IAAI,qCAAiB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC/D,KAAK,gEAAgE;gBACjE,OAAO,IAAI,iDAAuB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACrE;gBACI,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,EAAE,CAAC,CAAC;SACxD;IACL,CAAC;CACJ,CAAC;AACF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,kCAAkC,EAAE,OAAO,CAAC,CAAA;AAC3F,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,4BAA4B,EAAE,OAAO,CAAC,CAAA;AACrF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,kCAAkC,EAAE,OAAO,CAAC,CAAA"}