@pulumi/vault 4.5.0 → 4.6.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +1 -1
- package/ad/getAccessCredentials.d.ts +18 -2
- package/ad/getAccessCredentials.js +5 -0
- package/ad/getAccessCredentials.js.map +1 -1
- package/ad/index.js +14 -7
- package/ad/index.js.map +1 -1
- package/ad/secretBackend.d.ts +68 -68
- package/ad/secretBackend.js +1 -0
- package/ad/secretBackend.js.map +1 -1
- package/ad/secretLibrary.d.ts +12 -12
- package/ad/secretLibrary.js +1 -0
- package/ad/secretLibrary.js.map +1 -1
- package/ad/secretRole.d.ts +10 -10
- package/ad/secretRole.js +1 -0
- package/ad/secretRole.js.map +1 -1
- package/alicloud/authBackendRole.d.ts +24 -24
- package/alicloud/authBackendRole.js +1 -0
- package/alicloud/authBackendRole.js.map +1 -1
- package/alicloud/index.js +11 -4
- package/alicloud/index.js.map +1 -1
- package/approle/authBackendLogin.d.ts +16 -16
- package/approle/authBackendLogin.js +4 -3
- package/approle/authBackendLogin.js.map +1 -1
- package/approle/authBackendRole.d.ts +39 -39
- package/approle/authBackendRole.js +2 -1
- package/approle/authBackendRole.js.map +1 -1
- package/approle/authBackendRoleSecretID.d.ts +17 -17
- package/approle/authBackendRoleSecretID.js +3 -2
- package/approle/authBackendRoleSecretID.js.map +1 -1
- package/approle/getAuthBackendRoleId.d.ts +17 -2
- package/approle/getAuthBackendRoleId.js +5 -0
- package/approle/getAuthBackendRoleId.js.map +1 -1
- package/approle/index.js +14 -7
- package/approle/index.js.map +1 -1
- package/audit.d.ts +10 -10
- package/audit.js +1 -0
- package/audit.js.map +1 -1
- package/authBackend.d.ts +17 -17
- package/authBackend.js +1 -0
- package/authBackend.js.map +1 -1
- package/aws/authBackendCert.d.ts +8 -8
- package/aws/authBackendCert.js +1 -0
- package/aws/authBackendCert.js.map +1 -1
- package/aws/authBackendClient.d.ts +16 -16
- package/aws/authBackendClient.js +1 -0
- package/aws/authBackendClient.js.map +1 -1
- package/aws/authBackendIdentityWhitelist.d.ts +6 -6
- package/aws/authBackendIdentityWhitelist.js +1 -0
- package/aws/authBackendIdentityWhitelist.js.map +1 -1
- package/aws/authBackendLogin.d.ts +28 -28
- package/aws/authBackendLogin.js +1 -0
- package/aws/authBackendLogin.js.map +1 -1
- package/aws/authBackendRole.d.ts +62 -62
- package/aws/authBackendRole.js +1 -0
- package/aws/authBackendRole.js.map +1 -1
- package/aws/authBackendRoleTag.d.ts +16 -16
- package/aws/authBackendRoleTag.js +1 -0
- package/aws/authBackendRoleTag.js.map +1 -1
- package/aws/authBackendRoletagBlacklist.d.ts +6 -6
- package/aws/authBackendRoletagBlacklist.js +1 -0
- package/aws/authBackendRoletagBlacklist.js.map +1 -1
- package/aws/authBackendStsRole.d.ts +6 -6
- package/aws/authBackendStsRole.js +1 -0
- package/aws/authBackendStsRole.js.map +1 -1
- package/aws/getAccessCredentials.d.ts +42 -6
- package/aws/getAccessCredentials.js +5 -0
- package/aws/getAccessCredentials.js.map +1 -1
- package/aws/index.js +21 -14
- package/aws/index.js.map +1 -1
- package/aws/secretBackend.d.ts +18 -18
- package/aws/secretBackend.js +1 -0
- package/aws/secretBackend.js.map +1 -1
- package/aws/secretBackendRole.d.ts +18 -18
- package/aws/secretBackendRole.js +1 -0
- package/aws/secretBackendRole.js.map +1 -1
- package/azure/authBackendConfig.d.ts +12 -12
- package/azure/authBackendConfig.js +1 -0
- package/azure/authBackendConfig.js.map +1 -1
- package/azure/authBackendRole.d.ts +45 -45
- package/azure/authBackendRole.js +1 -0
- package/azure/authBackendRole.js.map +1 -1
- package/azure/backend.d.ts +14 -14
- package/azure/backend.js +1 -0
- package/azure/backend.js.map +1 -1
- package/azure/backendRole.d.ts +16 -16
- package/azure/backendRole.js +1 -0
- package/azure/backendRole.js.map +1 -1
- package/azure/getAccessCredentials.d.ts +47 -6
- package/azure/getAccessCredentials.js +5 -0
- package/azure/getAccessCredentials.js.map +1 -1
- package/azure/index.js +15 -8
- package/azure/index.js.map +1 -1
- package/certAuthBackendRole.d.ts +50 -50
- package/certAuthBackendRole.js +1 -0
- package/certAuthBackendRole.js.map +1 -1
- package/config/index.js +11 -4
- package/config/index.js.map +1 -1
- package/config/vars.d.ts +13 -13
- package/config/vars.js +82 -53
- package/config/vars.js.map +1 -1
- package/consul/index.js +12 -5
- package/consul/index.js.map +1 -1
- package/consul/secretBackend.d.ts +22 -22
- package/consul/secretBackend.js +1 -0
- package/consul/secretBackend.js.map +1 -1
- package/consul/secretBackendRole.d.ts +16 -16
- package/consul/secretBackendRole.js +1 -0
- package/consul/secretBackendRole.js.map +1 -1
- package/database/index.js +13 -6
- package/database/index.js.map +1 -1
- package/database/secretBackendConnection.d.ts +38 -38
- package/database/secretBackendConnection.js +1 -0
- package/database/secretBackendConnection.js.map +1 -1
- package/database/secretBackendRole.d.ts +18 -18
- package/database/secretBackendRole.js +1 -0
- package/database/secretBackendRole.js.map +1 -1
- package/database/secretBackendStaticRole.d.ts +12 -12
- package/database/secretBackendStaticRole.js +1 -0
- package/database/secretBackendStaticRole.js.map +1 -1
- package/egpPolicy.d.ts +8 -8
- package/egpPolicy.js +1 -0
- package/egpPolicy.js.map +1 -1
- package/gcp/authBackend.d.ts +16 -16
- package/gcp/authBackend.js +1 -0
- package/gcp/authBackend.js.map +1 -1
- package/gcp/authBackendRole.d.ts +50 -50
- package/gcp/authBackendRole.js +1 -0
- package/gcp/authBackendRole.js.map +1 -1
- package/gcp/getAuthBackendRole.d.ts +80 -12
- package/gcp/getAuthBackendRole.js +6 -1
- package/gcp/getAuthBackendRole.js.map +1 -1
- package/gcp/index.js +16 -9
- package/gcp/index.js.map +1 -1
- package/gcp/secretBackend.d.ts +12 -12
- package/gcp/secretBackend.js +1 -0
- package/gcp/secretBackend.js.map +1 -1
- package/gcp/secretRoleset.d.ts +13 -13
- package/gcp/secretRoleset.js +1 -0
- package/gcp/secretRoleset.js.map +1 -1
- package/gcp/secretStaticAccount.d.ts +39 -13
- package/gcp/secretStaticAccount.js +27 -0
- package/gcp/secretStaticAccount.js.map +1 -1
- package/generic/endpoint.d.ts +14 -14
- package/generic/endpoint.js +1 -0
- package/generic/endpoint.js.map +1 -1
- package/generic/getSecret.d.ts +22 -2
- package/generic/getSecret.js +5 -0
- package/generic/getSecret.js.map +1 -1
- package/generic/index.js +13 -6
- package/generic/index.js.map +1 -1
- package/generic/secret.d.ts +7 -7
- package/generic/secret.js +1 -0
- package/generic/secret.js.map +1 -1
- package/getAuthBackend.d.ts +13 -3
- package/getAuthBackend.js +6 -1
- package/getAuthBackend.js.map +1 -1
- package/getNomadAccessToken.d.ts +18 -2
- package/getNomadAccessToken.js +5 -0
- package/getNomadAccessToken.js.map +1 -1
- package/getPolicyDocument.d.ts +8 -1
- package/getPolicyDocument.js +5 -0
- package/getPolicyDocument.js.map +1 -1
- package/github/authBackend.d.ts +44 -35
- package/github/authBackend.js +3 -2
- package/github/authBackend.js.map +1 -1
- package/github/index.js +13 -6
- package/github/index.js.map +1 -1
- package/github/team.d.ts +24 -24
- package/github/team.js +1 -0
- package/github/team.js.map +1 -1
- package/github/user.d.ts +24 -24
- package/github/user.js +1 -0
- package/github/user.js.map +1 -1
- package/identity/entity.d.ts +10 -10
- package/identity/entity.js +1 -0
- package/identity/entity.js.map +1 -1
- package/identity/entityAlias.d.ts +6 -6
- package/identity/entityAlias.js +1 -0
- package/identity/entityAlias.js.map +1 -1
- package/identity/entityPolicies.d.ts +7 -7
- package/identity/entityPolicies.js +1 -0
- package/identity/entityPolicies.js.map +1 -1
- package/identity/getEntity.d.ts +33 -5
- package/identity/getEntity.js +5 -0
- package/identity/getEntity.js.map +1 -1
- package/identity/getGroup.d.ts +33 -5
- package/identity/getGroup.js +5 -0
- package/identity/getGroup.js.map +1 -1
- package/identity/group.d.ts +16 -16
- package/identity/group.js +1 -0
- package/identity/group.js.map +1 -1
- package/identity/groupAlias.d.ts +6 -6
- package/identity/groupAlias.js +1 -0
- package/identity/groupAlias.js.map +1 -1
- package/identity/groupMemberEntityIds.d.ts +7 -7
- package/identity/groupMemberEntityIds.js +1 -0
- package/identity/groupMemberEntityIds.js.map +1 -1
- package/identity/groupPolicies.d.ts +7 -7
- package/identity/groupPolicies.js +1 -0
- package/identity/groupPolicies.js.map +1 -1
- package/identity/index.js +23 -16
- package/identity/index.js.map +1 -1
- package/identity/oidc.d.ts +2 -2
- package/identity/oidc.js +1 -0
- package/identity/oidc.js.map +1 -1
- package/identity/oidcKey.d.ts +10 -10
- package/identity/oidcKey.js +1 -0
- package/identity/oidcKey.js.map +1 -1
- package/identity/oidcKeyAllowedClientID.d.ts +4 -4
- package/identity/oidcKeyAllowedClientID.js +1 -0
- package/identity/oidcKeyAllowedClientID.js.map +1 -1
- package/identity/oidcRole.d.ts +10 -10
- package/identity/oidcRole.js +1 -0
- package/identity/oidcRole.js.map +1 -1
- package/index.js +31 -23
- package/index.js.map +1 -1
- package/jwt/authBackend.d.ts +33 -33
- package/jwt/authBackend.js +1 -0
- package/jwt/authBackend.js.map +1 -1
- package/jwt/authBackendRole.d.ts +64 -64
- package/jwt/authBackendRole.js +1 -0
- package/jwt/authBackendRole.js.map +1 -1
- package/jwt/index.js +12 -5
- package/jwt/index.js.map +1 -1
- package/kubernetes/authBackendConfig.d.ts +16 -16
- package/kubernetes/authBackendConfig.js +1 -0
- package/kubernetes/authBackendConfig.js.map +1 -1
- package/kubernetes/authBackendRole.d.ts +40 -40
- package/kubernetes/authBackendRole.js +1 -0
- package/kubernetes/authBackendRole.js.map +1 -1
- package/kubernetes/getAuthBackendConfig.d.ts +36 -7
- package/kubernetes/getAuthBackendConfig.js +5 -0
- package/kubernetes/getAuthBackendConfig.js.map +1 -1
- package/kubernetes/getAuthBackendRole.d.ts +115 -18
- package/kubernetes/getAuthBackendRole.js +5 -0
- package/kubernetes/getAuthBackendRole.js.map +1 -1
- package/kubernetes/index.js +14 -7
- package/kubernetes/index.js.map +1 -1
- package/ldap/authBackend.d.ts +63 -63
- package/ldap/authBackend.js +1 -0
- package/ldap/authBackend.js.map +1 -1
- package/ldap/authBackendGroup.d.ts +6 -6
- package/ldap/authBackendGroup.js +1 -0
- package/ldap/authBackendGroup.js.map +1 -1
- package/ldap/authBackendUser.d.ts +8 -8
- package/ldap/authBackendUser.js +1 -0
- package/ldap/authBackendUser.js.map +1 -1
- package/ldap/index.js +13 -6
- package/ldap/index.js.map +1 -1
- package/mfaDuo.d.ts +14 -14
- package/mfaDuo.js +1 -0
- package/mfaDuo.js.map +1 -1
- package/mount.d.ts +19 -19
- package/mount.js +1 -0
- package/mount.js.map +1 -1
- package/namespace.d.ts +3 -3
- package/namespace.js +1 -0
- package/namespace.js.map +1 -1
- package/nomadSecretBackend.d.ts +26 -26
- package/nomadSecretBackend.js +1 -0
- package/nomadSecretBackend.js.map +1 -1
- package/nomadSecretRole.d.ts +10 -10
- package/nomadSecretRole.js +1 -0
- package/nomadSecretRole.js.map +1 -1
- package/okta/authBackend.d.ts +21 -21
- package/okta/authBackend.js +1 -0
- package/okta/authBackend.js.map +1 -1
- package/okta/authBackendGroup.d.ts +6 -6
- package/okta/authBackendGroup.js +1 -0
- package/okta/authBackendGroup.js.map +1 -1
- package/okta/authBackendUser.d.ts +16 -8
- package/okta/authBackendUser.js +9 -0
- package/okta/authBackendUser.js.map +1 -1
- package/okta/index.js +13 -6
- package/okta/index.js.map +1 -1
- package/package.json +4 -3
- package/package.json.bak +3 -2
- package/package.json.dev +4 -3
- package/passwordPolicy.d.ts +4 -4
- package/passwordPolicy.js +1 -0
- package/passwordPolicy.js.map +1 -1
- package/pkisecret/index.js +21 -14
- package/pkisecret/index.js.map +1 -1
- package/pkisecret/secretBackend.d.ts +8 -8
- package/pkisecret/secretBackend.js +1 -0
- package/pkisecret/secretBackend.js.map +1 -1
- package/pkisecret/secretBackendCert.d.ts +33 -33
- package/pkisecret/secretBackendCert.js +1 -0
- package/pkisecret/secretBackendCert.js.map +1 -1
- package/pkisecret/secretBackendConfigCa.d.ts +4 -4
- package/pkisecret/secretBackendConfigCa.js +1 -0
- package/pkisecret/secretBackendConfigCa.js.map +1 -1
- package/pkisecret/secretBackendConfigUrls.d.ts +10 -10
- package/pkisecret/secretBackendConfigUrls.js +3 -2
- package/pkisecret/secretBackendConfigUrls.js.map +1 -1
- package/pkisecret/secretBackendCrlConfig.d.ts +7 -7
- package/pkisecret/secretBackendCrlConfig.js +2 -1
- package/pkisecret/secretBackendCrlConfig.js.map +1 -1
- package/pkisecret/secretBackendIntermediateCertRequest.d.ts +41 -41
- package/pkisecret/secretBackendIntermediateCertRequest.js +1 -0
- package/pkisecret/secretBackendIntermediateCertRequest.js.map +1 -1
- package/pkisecret/secretBackendIntermediateSetSigned.d.ts +4 -4
- package/pkisecret/secretBackendIntermediateSetSigned.js +1 -0
- package/pkisecret/secretBackendIntermediateSetSigned.js.map +1 -1
- package/pkisecret/secretBackendRole.d.ts +78 -78
- package/pkisecret/secretBackendRole.js +3 -2
- package/pkisecret/secretBackendRole.js.map +1 -1
- package/pkisecret/secretBackendRootCert.d.ts +47 -47
- package/pkisecret/secretBackendRootCert.js +1 -0
- package/pkisecret/secretBackendRootCert.js.map +1 -1
- package/pkisecret/secretBackendRootSignIntermediate.d.ts +45 -45
- package/pkisecret/secretBackendRootSignIntermediate.js +2 -1
- package/pkisecret/secretBackendRootSignIntermediate.js.map +1 -1
- package/pkisecret/secretBackendSign.d.ts +31 -31
- package/pkisecret/secretBackendSign.js +1 -0
- package/pkisecret/secretBackendSign.js.map +1 -1
- package/policy.d.ts +4 -4
- package/policy.js +1 -0
- package/policy.js.map +1 -1
- package/provider.d.ts +41 -13
- package/provider.js +4 -3
- package/provider.js.map +1 -1
- package/quotaLeaseCount.d.ts +6 -6
- package/quotaLeaseCount.js +1 -0
- package/quotaLeaseCount.js.map +1 -1
- package/quotaRateLimit.d.ts +6 -6
- package/quotaRateLimit.js +1 -0
- package/quotaRateLimit.js.map +1 -1
- package/rabbitmq/index.js +12 -5
- package/rabbitmq/index.js.map +1 -1
- package/rabbitmq/secretBackend.d.ts +16 -16
- package/rabbitmq/secretBackend.js +1 -0
- package/rabbitmq/secretBackend.js.map +1 -1
- package/rabbitmq/secretBackendRole.d.ts +8 -8
- package/rabbitmq/secretBackendRole.js +1 -0
- package/rabbitmq/secretBackendRole.js.map +1 -1
- package/raftSnapshotAgentConfig.d.ts +54 -54
- package/raftSnapshotAgentConfig.js +1 -0
- package/raftSnapshotAgentConfig.js.map +1 -1
- package/rgpPolicy.d.ts +6 -6
- package/rgpPolicy.js +1 -0
- package/rgpPolicy.js.map +1 -1
- package/ssh/index.js +12 -5
- package/ssh/index.js.map +1 -1
- package/ssh/secretBackendCa.d.ts +8 -8
- package/ssh/secretBackendCa.js +1 -0
- package/ssh/secretBackendCa.js.map +1 -1
- package/ssh/secretBackendRole.d.ts +44 -44
- package/ssh/secretBackendRole.js +1 -0
- package/ssh/secretBackendRole.js.map +1 -1
- package/token.d.ts +34 -34
- package/token.js +1 -0
- package/token.js.map +1 -1
- package/tokenauth/authBackendRole.d.ts +39 -39
- package/tokenauth/authBackendRole.js +1 -0
- package/tokenauth/authBackendRole.js.map +1 -1
- package/tokenauth/index.js +11 -4
- package/tokenauth/index.js.map +1 -1
- package/transform/alphabet.d.ts +6 -6
- package/transform/alphabet.js +1 -0
- package/transform/alphabet.js.map +1 -1
- package/transform/getDecode.d.ts +50 -8
- package/transform/getDecode.js +5 -0
- package/transform/getDecode.js.map +1 -1
- package/transform/getEncode.d.ts +50 -8
- package/transform/getEncode.js +5 -0
- package/transform/getEncode.js.map +1 -1
- package/transform/index.js +16 -9
- package/transform/index.js.map +1 -1
- package/transform/role.d.ts +6 -6
- package/transform/role.js +1 -0
- package/transform/role.js.map +1 -1
- package/transform/template.d.ts +10 -10
- package/transform/template.js +1 -0
- package/transform/template.js.map +1 -1
- package/transform/transformation.d.ts +16 -16
- package/transform/transformation.js +1 -0
- package/transform/transformation.js.map +1 -1
- package/transit/getDecrypt.d.ts +27 -5
- package/transit/getDecrypt.js +6 -1
- package/transit/getDecrypt.js.map +1 -1
- package/transit/getEncrypt.d.ts +31 -5
- package/transit/getEncrypt.js +5 -0
- package/transit/getEncrypt.js.map +1 -1
- package/transit/index.js +14 -7
- package/transit/index.js.map +1 -1
- package/transit/secretBackendKey.d.ts +27 -27
- package/transit/secretBackendKey.js +1 -0
- package/transit/secretBackendKey.js.map +1 -1
- package/transit/secretCacheConfig.d.ts +4 -4
- package/transit/secretCacheConfig.js +1 -0
- package/transit/secretCacheConfig.js.map +1 -1
- package/types/index.js +1 -0
- package/types/index.js.map +1 -1
- package/types/input.d.ts +54 -0
- package/types/output.d.ts +0 -16
- package/utilities.js +1 -0
- package/utilities.js.map +1 -1
package/config/vars.js
CHANGED
|
@@ -4,57 +4,86 @@
|
|
|
4
4
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
5
|
const pulumi = require("@pulumi/pulumi");
|
|
6
6
|
const utilities = require("../utilities");
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
|
|
14
|
-
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
|
|
18
|
-
|
|
19
|
-
|
|
20
|
-
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
|
|
33
|
-
|
|
34
|
-
|
|
35
|
-
|
|
36
|
-
|
|
37
|
-
|
|
38
|
-
|
|
39
|
-
|
|
40
|
-
|
|
41
|
-
|
|
42
|
-
|
|
43
|
-
|
|
44
|
-
|
|
45
|
-
|
|
46
|
-
|
|
47
|
-
|
|
48
|
-
|
|
49
|
-
|
|
50
|
-
|
|
51
|
-
|
|
52
|
-
|
|
53
|
-
|
|
54
|
-
|
|
55
|
-
|
|
56
|
-
|
|
57
|
-
|
|
58
|
-
|
|
59
|
-
|
|
7
|
+
const __config = new pulumi.Config("vault");
|
|
8
|
+
Object.defineProperty(exports, "addAddressToEnv", {
|
|
9
|
+
get() {
|
|
10
|
+
return __config.get("addAddressToEnv");
|
|
11
|
+
},
|
|
12
|
+
enumerable: true,
|
|
13
|
+
});
|
|
14
|
+
Object.defineProperty(exports, "address", {
|
|
15
|
+
get() {
|
|
16
|
+
return __config.get("address");
|
|
17
|
+
},
|
|
18
|
+
enumerable: true,
|
|
19
|
+
});
|
|
20
|
+
Object.defineProperty(exports, "authLogins", {
|
|
21
|
+
get() {
|
|
22
|
+
return __config.getObject("authLogins");
|
|
23
|
+
},
|
|
24
|
+
enumerable: true,
|
|
25
|
+
});
|
|
26
|
+
Object.defineProperty(exports, "caCertDir", {
|
|
27
|
+
get() {
|
|
28
|
+
return __config.get("caCertDir");
|
|
29
|
+
},
|
|
30
|
+
enumerable: true,
|
|
31
|
+
});
|
|
32
|
+
Object.defineProperty(exports, "caCertFile", {
|
|
33
|
+
get() {
|
|
34
|
+
return __config.get("caCertFile");
|
|
35
|
+
},
|
|
36
|
+
enumerable: true,
|
|
37
|
+
});
|
|
38
|
+
Object.defineProperty(exports, "clientAuths", {
|
|
39
|
+
get() {
|
|
40
|
+
return __config.getObject("clientAuths");
|
|
41
|
+
},
|
|
42
|
+
enumerable: true,
|
|
43
|
+
});
|
|
44
|
+
Object.defineProperty(exports, "headers", {
|
|
45
|
+
get() {
|
|
46
|
+
return __config.getObject("headers");
|
|
47
|
+
},
|
|
48
|
+
enumerable: true,
|
|
49
|
+
});
|
|
50
|
+
Object.defineProperty(exports, "maxLeaseTtlSeconds", {
|
|
51
|
+
get() {
|
|
52
|
+
var _a;
|
|
53
|
+
return (_a = __config.getObject("maxLeaseTtlSeconds")) !== null && _a !== void 0 ? _a : (utilities.getEnvNumber("TERRAFORM_VAULT_MAX_TTL") || 1200);
|
|
54
|
+
},
|
|
55
|
+
enumerable: true,
|
|
56
|
+
});
|
|
57
|
+
Object.defineProperty(exports, "maxRetries", {
|
|
58
|
+
get() {
|
|
59
|
+
var _a;
|
|
60
|
+
return (_a = __config.getObject("maxRetries")) !== null && _a !== void 0 ? _a : (utilities.getEnvNumber("VAULT_MAX_RETRIES") || 2);
|
|
61
|
+
},
|
|
62
|
+
enumerable: true,
|
|
63
|
+
});
|
|
64
|
+
Object.defineProperty(exports, "namespace", {
|
|
65
|
+
get() {
|
|
66
|
+
return __config.get("namespace");
|
|
67
|
+
},
|
|
68
|
+
enumerable: true,
|
|
69
|
+
});
|
|
70
|
+
Object.defineProperty(exports, "skipTlsVerify", {
|
|
71
|
+
get() {
|
|
72
|
+
var _a;
|
|
73
|
+
return (_a = __config.getObject("skipTlsVerify")) !== null && _a !== void 0 ? _a : utilities.getEnvBoolean("VAULT_SKIP_VERIFY");
|
|
74
|
+
},
|
|
75
|
+
enumerable: true,
|
|
76
|
+
});
|
|
77
|
+
Object.defineProperty(exports, "token", {
|
|
78
|
+
get() {
|
|
79
|
+
return __config.get("token");
|
|
80
|
+
},
|
|
81
|
+
enumerable: true,
|
|
82
|
+
});
|
|
83
|
+
Object.defineProperty(exports, "tokenName", {
|
|
84
|
+
get() {
|
|
85
|
+
return __config.get("tokenName");
|
|
86
|
+
},
|
|
87
|
+
enumerable: true,
|
|
88
|
+
});
|
|
60
89
|
//# sourceMappingURL=vars.js.map
|
package/config/vars.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"vars.js","sourceRoot":"","sources":["../../config/vars.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;AAEjF,yCAAyC;AAEzC,0CAA0C;
|
|
1
|
+
{"version":3,"file":"vars.js","sourceRoot":"","sources":["../../config/vars.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;AAEjF,yCAAyC;AAEzC,0CAA0C;AAG1C,MAAM,QAAQ,GAAG,IAAI,MAAM,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC;AAM5C,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,iBAAiB,EAAE;IAC9C,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,iBAAiB,CAAC,CAAC;IAC3C,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,SAAS,EAAE;IACtC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,SAAS,CAAC,CAAC;IACnC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,YAAY,EAAE;IACzC,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAA8B,YAAY,CAAC,CAAC;IACzE,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,WAAW,EAAE;IACxC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC;IACrC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,YAAY,EAAE;IACzC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,YAAY,CAAC,CAAC;IACtC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,aAAa,EAAE;IAC1C,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAA+B,aAAa,CAAC,CAAC;IAC3E,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,SAAS,EAAE;IACtC,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAA2B,SAAS,CAAC,CAAC;IACnE,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,oBAAoB,EAAE;IACjD,GAAG;;QACC,OAAO,MAAA,QAAQ,CAAC,SAAS,CAAS,oBAAoB,CAAC,mCAAI,CAAM,SAAS,CAAC,YAAY,CAAC,yBAAyB,CAAC,IAAI,IAAI,CAAC,CAAC;IAChI,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,YAAY,EAAE;IACzC,GAAG;;QACC,OAAO,MAAA,QAAQ,CAAC,SAAS,CAAS,YAAY,CAAC,mCAAI,CAAM,SAAS,CAAC,YAAY,CAAC,mBAAmB,CAAC,IAAI,CAAC,CAAC,CAAC;IAC/G,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,WAAW,EAAE;IACxC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC;IACrC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,eAAe,EAAE;IAC5C,GAAG;;QACC,OAAO,MAAA,QAAQ,CAAC,SAAS,CAAU,eAAe,CAAC,mCAAS,SAAS,CAAC,aAAa,CAAC,mBAAmB,CAAC,CAAC;IAC7G,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,OAAO,EAAE;IACpC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,OAAO,CAAC,CAAC;IACjC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,WAAW,EAAE;IACxC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC;IACrC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC"}
|
package/consul/index.js
CHANGED
|
@@ -1,15 +1,22 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
3
|
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
-
function
|
|
5
|
-
|
|
6
|
-
}
|
|
4
|
+
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
5
|
+
if (k2 === undefined) k2 = k;
|
|
6
|
+
Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } });
|
|
7
|
+
}) : (function(o, m, k, k2) {
|
|
8
|
+
if (k2 === undefined) k2 = k;
|
|
9
|
+
o[k2] = m[k];
|
|
10
|
+
}));
|
|
11
|
+
var __exportStar = (this && this.__exportStar) || function(m, exports) {
|
|
12
|
+
for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
|
|
13
|
+
};
|
|
7
14
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
8
15
|
const pulumi = require("@pulumi/pulumi");
|
|
9
16
|
const utilities = require("../utilities");
|
|
10
17
|
// Export members:
|
|
11
|
-
|
|
12
|
-
|
|
18
|
+
__exportStar(require("./secretBackend"), exports);
|
|
19
|
+
__exportStar(require("./secretBackendRole"), exports);
|
|
13
20
|
// Import resources to register:
|
|
14
21
|
const secretBackend_1 = require("./secretBackend");
|
|
15
22
|
const secretBackendRole_1 = require("./secretBackendRole");
|
package/consul/index.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../consul/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../consul/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;;;;;;;;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,kBAAkB;AAClB,kDAAgC;AAChC,sDAAoC;AAEpC,gCAAgC;AAChC,mDAAgD;AAChD,2DAAwD;AAExD,MAAM,OAAO,GAAG;IACZ,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE;IAC/B,SAAS,EAAE,CAAC,IAAY,EAAE,IAAY,EAAE,GAAW,EAAmB,EAAE;QACpE,QAAQ,IAAI,EAAE;YACV,KAAK,0CAA0C;gBAC3C,OAAO,IAAI,6BAAa,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC3D,KAAK,kDAAkD;gBACnD,OAAO,IAAI,qCAAiB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC/D;gBACI,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,EAAE,CAAC,CAAC;SACxD;IACL,CAAC;CACJ,CAAC;AACF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,sBAAsB,EAAE,OAAO,CAAC,CAAA;AAC/E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,0BAA0B,EAAE,OAAO,CAAC,CAAA"}
|
|
@@ -85,48 +85,48 @@ export interface SecretBackendState {
|
|
|
85
85
|
/**
|
|
86
86
|
* Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
|
|
87
87
|
*/
|
|
88
|
-
|
|
88
|
+
address?: pulumi.Input<string>;
|
|
89
89
|
/**
|
|
90
90
|
* CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
|
|
91
91
|
*/
|
|
92
|
-
|
|
92
|
+
caCert?: pulumi.Input<string>;
|
|
93
93
|
/**
|
|
94
94
|
* Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key.
|
|
95
95
|
*/
|
|
96
|
-
|
|
96
|
+
clientCert?: pulumi.Input<string>;
|
|
97
97
|
/**
|
|
98
98
|
* Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert.
|
|
99
99
|
*/
|
|
100
|
-
|
|
100
|
+
clientKey?: pulumi.Input<string>;
|
|
101
101
|
/**
|
|
102
102
|
* The default TTL for credentials issued by this backend.
|
|
103
103
|
*/
|
|
104
|
-
|
|
104
|
+
defaultLeaseTtlSeconds?: pulumi.Input<number>;
|
|
105
105
|
/**
|
|
106
106
|
* A human-friendly description for this backend.
|
|
107
107
|
*/
|
|
108
|
-
|
|
108
|
+
description?: pulumi.Input<string>;
|
|
109
109
|
/**
|
|
110
110
|
* Specifies if the secret backend is local only.
|
|
111
111
|
*/
|
|
112
|
-
|
|
112
|
+
local?: pulumi.Input<boolean>;
|
|
113
113
|
/**
|
|
114
114
|
* The maximum TTL that can be requested
|
|
115
115
|
* for credentials issued by this backend.
|
|
116
116
|
*/
|
|
117
|
-
|
|
117
|
+
maxLeaseTtlSeconds?: pulumi.Input<number>;
|
|
118
118
|
/**
|
|
119
119
|
* The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults to `consul`.
|
|
120
120
|
*/
|
|
121
|
-
|
|
121
|
+
path?: pulumi.Input<string>;
|
|
122
122
|
/**
|
|
123
123
|
* Specifies the URL scheme to use. Defaults to `http`.
|
|
124
124
|
*/
|
|
125
|
-
|
|
125
|
+
scheme?: pulumi.Input<string>;
|
|
126
126
|
/**
|
|
127
127
|
* The Consul management token this backend should use to issue new tokens.
|
|
128
128
|
*/
|
|
129
|
-
|
|
129
|
+
token?: pulumi.Input<string>;
|
|
130
130
|
}
|
|
131
131
|
/**
|
|
132
132
|
* The set of arguments for constructing a SecretBackend resource.
|
|
@@ -135,46 +135,46 @@ export interface SecretBackendArgs {
|
|
|
135
135
|
/**
|
|
136
136
|
* Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
|
|
137
137
|
*/
|
|
138
|
-
|
|
138
|
+
address: pulumi.Input<string>;
|
|
139
139
|
/**
|
|
140
140
|
* CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
|
|
141
141
|
*/
|
|
142
|
-
|
|
142
|
+
caCert?: pulumi.Input<string>;
|
|
143
143
|
/**
|
|
144
144
|
* Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_key.
|
|
145
145
|
*/
|
|
146
|
-
|
|
146
|
+
clientCert?: pulumi.Input<string>;
|
|
147
147
|
/**
|
|
148
148
|
* Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set you need to also set client_cert.
|
|
149
149
|
*/
|
|
150
|
-
|
|
150
|
+
clientKey?: pulumi.Input<string>;
|
|
151
151
|
/**
|
|
152
152
|
* The default TTL for credentials issued by this backend.
|
|
153
153
|
*/
|
|
154
|
-
|
|
154
|
+
defaultLeaseTtlSeconds?: pulumi.Input<number>;
|
|
155
155
|
/**
|
|
156
156
|
* A human-friendly description for this backend.
|
|
157
157
|
*/
|
|
158
|
-
|
|
158
|
+
description?: pulumi.Input<string>;
|
|
159
159
|
/**
|
|
160
160
|
* Specifies if the secret backend is local only.
|
|
161
161
|
*/
|
|
162
|
-
|
|
162
|
+
local?: pulumi.Input<boolean>;
|
|
163
163
|
/**
|
|
164
164
|
* The maximum TTL that can be requested
|
|
165
165
|
* for credentials issued by this backend.
|
|
166
166
|
*/
|
|
167
|
-
|
|
167
|
+
maxLeaseTtlSeconds?: pulumi.Input<number>;
|
|
168
168
|
/**
|
|
169
169
|
* The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults to `consul`.
|
|
170
170
|
*/
|
|
171
|
-
|
|
171
|
+
path?: pulumi.Input<string>;
|
|
172
172
|
/**
|
|
173
173
|
* Specifies the URL scheme to use. Defaults to `http`.
|
|
174
174
|
*/
|
|
175
|
-
|
|
175
|
+
scheme?: pulumi.Input<string>;
|
|
176
176
|
/**
|
|
177
177
|
* The Consul management token this backend should use to issue new tokens.
|
|
178
178
|
*/
|
|
179
|
-
|
|
179
|
+
token: pulumi.Input<string>;
|
|
180
180
|
}
|
package/consul/secretBackend.js
CHANGED
|
@@ -2,6 +2,7 @@
|
|
|
2
2
|
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
3
|
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
4
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.SecretBackend = void 0;
|
|
5
6
|
const pulumi = require("@pulumi/pulumi");
|
|
6
7
|
const utilities = require("../utilities");
|
|
7
8
|
/**
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretBackend.js","sourceRoot":"","sources":["../../consul/secretBackend.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF
|
|
1
|
+
{"version":3,"file":"secretBackend.js","sourceRoot":"","sources":["../../consul/secretBackend.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;GAQG;AACH,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;IAkFpD,YAAY,IAAY,EAAE,WAAoD,EAAE,IAAmC;QAC/G,IAAI,MAAM,GAAkB,EAAE,CAAC;QAC/B,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA6C,CAAC;YAC5D,MAAM,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,MAAM,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;SACrD;aAAM;YACH,MAAM,IAAI,GAAG,WAA4C,CAAC;YAC1D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,KAAK,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,MAAM,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,MAAM,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9C,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;SACnD;QACD,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;YACf,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE,EAAC,CAAC,CAAC;SACxE;QACD,KAAK,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,CAAC,CAAC;IAC1D,CAAC;IAzHD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA0B,EAAE,IAAmC;QACxH,OAAO,IAAI,aAAa,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACpE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,aAAa,CAAC,YAAY,CAAC;IAC9D,CAAC;;AA1BL,sCA2HC;AA7GG,gBAAgB;AACO,0BAAY,GAAG,0CAA0C,CAAC"}
|
|
@@ -94,37 +94,37 @@ export interface SecretBackendRoleState {
|
|
|
94
94
|
/**
|
|
95
95
|
* The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
|
|
96
96
|
*/
|
|
97
|
-
|
|
97
|
+
backend?: pulumi.Input<string>;
|
|
98
98
|
/**
|
|
99
99
|
* Indicates that the token should not be replicated globally and instead be local to the current datacenter.
|
|
100
100
|
*/
|
|
101
|
-
|
|
101
|
+
local?: pulumi.Input<boolean>;
|
|
102
102
|
/**
|
|
103
103
|
* Maximum TTL for leases associated with this role, in seconds.
|
|
104
104
|
*/
|
|
105
|
-
|
|
105
|
+
maxTtl?: pulumi.Input<number>;
|
|
106
106
|
/**
|
|
107
107
|
* The name of the Consul secrets engine role to create.
|
|
108
108
|
*/
|
|
109
|
-
|
|
109
|
+
name?: pulumi.Input<string>;
|
|
110
110
|
/**
|
|
111
111
|
* The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. **Deprecated**
|
|
112
112
|
*
|
|
113
113
|
* @deprecated use `backend` instead
|
|
114
114
|
*/
|
|
115
|
-
|
|
115
|
+
path?: pulumi.Input<string>;
|
|
116
116
|
/**
|
|
117
117
|
* The list of Consul ACL policies to associate with these roles.
|
|
118
118
|
*/
|
|
119
|
-
|
|
119
|
+
policies?: pulumi.Input<pulumi.Input<string>[]>;
|
|
120
120
|
/**
|
|
121
121
|
* Specifies the type of token to create when using this role. Valid values are "client" or "management".
|
|
122
122
|
*/
|
|
123
|
-
|
|
123
|
+
tokenType?: pulumi.Input<string>;
|
|
124
124
|
/**
|
|
125
125
|
* Specifies the TTL for this role.
|
|
126
126
|
*/
|
|
127
|
-
|
|
127
|
+
ttl?: pulumi.Input<number>;
|
|
128
128
|
}
|
|
129
129
|
/**
|
|
130
130
|
* The set of arguments for constructing a SecretBackendRole resource.
|
|
@@ -133,35 +133,35 @@ export interface SecretBackendRoleArgs {
|
|
|
133
133
|
/**
|
|
134
134
|
* The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
|
|
135
135
|
*/
|
|
136
|
-
|
|
136
|
+
backend?: pulumi.Input<string>;
|
|
137
137
|
/**
|
|
138
138
|
* Indicates that the token should not be replicated globally and instead be local to the current datacenter.
|
|
139
139
|
*/
|
|
140
|
-
|
|
140
|
+
local?: pulumi.Input<boolean>;
|
|
141
141
|
/**
|
|
142
142
|
* Maximum TTL for leases associated with this role, in seconds.
|
|
143
143
|
*/
|
|
144
|
-
|
|
144
|
+
maxTtl?: pulumi.Input<number>;
|
|
145
145
|
/**
|
|
146
146
|
* The name of the Consul secrets engine role to create.
|
|
147
147
|
*/
|
|
148
|
-
|
|
148
|
+
name?: pulumi.Input<string>;
|
|
149
149
|
/**
|
|
150
150
|
* The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. **Deprecated**
|
|
151
151
|
*
|
|
152
152
|
* @deprecated use `backend` instead
|
|
153
153
|
*/
|
|
154
|
-
|
|
154
|
+
path?: pulumi.Input<string>;
|
|
155
155
|
/**
|
|
156
156
|
* The list of Consul ACL policies to associate with these roles.
|
|
157
157
|
*/
|
|
158
|
-
|
|
158
|
+
policies: pulumi.Input<pulumi.Input<string>[]>;
|
|
159
159
|
/**
|
|
160
160
|
* Specifies the type of token to create when using this role. Valid values are "client" or "management".
|
|
161
161
|
*/
|
|
162
|
-
|
|
162
|
+
tokenType?: pulumi.Input<string>;
|
|
163
163
|
/**
|
|
164
164
|
* Specifies the TTL for this role.
|
|
165
165
|
*/
|
|
166
|
-
|
|
166
|
+
ttl?: pulumi.Input<number>;
|
|
167
167
|
}
|
|
@@ -2,6 +2,7 @@
|
|
|
2
2
|
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
3
|
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
4
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.SecretBackendRole = void 0;
|
|
5
6
|
const pulumi = require("@pulumi/pulumi");
|
|
6
7
|
const utilities = require("../utilities");
|
|
7
8
|
/**
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretBackendRole.js","sourceRoot":"","sources":["../../consul/secretBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF
|
|
1
|
+
{"version":3,"file":"secretBackendRole.js","sourceRoot":"","sources":["../../consul/secretBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA4BG;AACH,MAAa,iBAAkB,SAAQ,MAAM,CAAC,cAAc;IAuExD,YAAY,IAAY,EAAE,WAA4D,EAAE,IAAmC;QACvH,IAAI,MAAM,GAAkB,EAAE,CAAC;QAC/B,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAiD,CAAC;YAChE,MAAM,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACjD;aAAM;YACH,MAAM,IAAI,GAAG,WAAgD,CAAC;YAC9D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,MAAM,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9C,MAAM,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9C,MAAM,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/C;QACD,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;YACf,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE,EAAC,CAAC,CAAC;SACxE;QACD,KAAK,CAAC,iBAAiB,CAAC,YAAY,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,CAAC,CAAC;IAC9D,CAAC;IArGD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA8B,EAAE,IAAmC;QAC5H,OAAO,IAAI,iBAAiB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACxE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,iBAAiB,CAAC,YAAY,CAAC;IAClE,CAAC;;AA1BL,8CAuGC;AAzFG,gBAAgB;AACO,8BAAY,GAAG,kDAAkD,CAAC"}
|
package/database/index.js
CHANGED
|
@@ -1,16 +1,23 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
3
|
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
-
function
|
|
5
|
-
|
|
6
|
-
}
|
|
4
|
+
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
5
|
+
if (k2 === undefined) k2 = k;
|
|
6
|
+
Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } });
|
|
7
|
+
}) : (function(o, m, k, k2) {
|
|
8
|
+
if (k2 === undefined) k2 = k;
|
|
9
|
+
o[k2] = m[k];
|
|
10
|
+
}));
|
|
11
|
+
var __exportStar = (this && this.__exportStar) || function(m, exports) {
|
|
12
|
+
for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
|
|
13
|
+
};
|
|
7
14
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
8
15
|
const pulumi = require("@pulumi/pulumi");
|
|
9
16
|
const utilities = require("../utilities");
|
|
10
17
|
// Export members:
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
|
|
18
|
+
__exportStar(require("./secretBackendConnection"), exports);
|
|
19
|
+
__exportStar(require("./secretBackendRole"), exports);
|
|
20
|
+
__exportStar(require("./secretBackendStaticRole"), exports);
|
|
14
21
|
// Import resources to register:
|
|
15
22
|
const secretBackendConnection_1 = require("./secretBackendConnection");
|
|
16
23
|
const secretBackendRole_1 = require("./secretBackendRole");
|
package/database/index.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../database/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../database/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;;;;;;;;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,kBAAkB;AAClB,4DAA0C;AAC1C,sDAAoC;AACpC,4DAA0C;AAE1C,gCAAgC;AAChC,uEAAoE;AACpE,2DAAwD;AACxD,uEAAoE;AAEpE,MAAM,OAAO,GAAG;IACZ,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE;IAC/B,SAAS,EAAE,CAAC,IAAY,EAAE,IAAY,EAAE,GAAW,EAAmB,EAAE;QACpE,QAAQ,IAAI,EAAE;YACV,KAAK,gEAAgE;gBACjE,OAAO,IAAI,iDAAuB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACrE,KAAK,oDAAoD;gBACrD,OAAO,IAAI,qCAAiB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC/D,KAAK,gEAAgE;gBACjE,OAAO,IAAI,iDAAuB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACrE;gBACI,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,EAAE,CAAC,CAAC;SACxD;IACL,CAAC;CACJ,CAAC;AACF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,kCAAkC,EAAE,OAAO,CAAC,CAAA;AAC3F,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,4BAA4B,EAAE,OAAO,CAAC,CAAA;AACrF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,kCAAkC,EAAE,OAAO,CAAC,CAAA"}
|