@pulumi/vault 5.0.0 → 5.2.0-alpha.1641576176
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/ad/secretRole.d.ts +37 -16
- package/ad/secretRole.js +9 -0
- package/ad/secretRole.js.map +1 -1
- package/approle/authBackendLogin.d.ts +1 -1
- package/approle/authBackendLogin.js +1 -1
- package/approle/authBackendRoleSecretID.d.ts +1 -1
- package/approle/authBackendRoleSecretID.js +1 -1
- package/config/vars.d.ts +10 -2
- package/config/vars.js +12 -0
- package/config/vars.js.map +1 -1
- package/database/secretBackendConnection.d.ts +12 -0
- package/database/secretBackendConnection.js +2 -0
- package/database/secretBackendConnection.js.map +1 -1
- package/generic/secret.d.ts +24 -3
- package/generic/secret.js +2 -0
- package/generic/secret.js.map +1 -1
- package/identity/entityAlias.d.ts +18 -0
- package/identity/entityAlias.js +2 -0
- package/identity/entityAlias.js.map +1 -1
- package/jwt/authBackend.d.ts +36 -0
- package/jwt/authBackend.js +6 -0
- package/jwt/authBackend.js.map +1 -1
- package/package.json +2 -2
- package/package.json.dev +1 -1
- package/provider.d.ts +11 -3
- package/provider.js +2 -0
- package/provider.js.map +1 -1
- package/types/input.d.ts +53 -0
- package/types/output.d.ts +53 -0
package/ad/secretRole.d.ts
CHANGED
|
@@ -1,4 +1,13 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
/**
|
|
3
|
+
* ## Import
|
|
4
|
+
*
|
|
5
|
+
* AD secret backend roles can be imported using the `path`, e.g.
|
|
6
|
+
*
|
|
7
|
+
* ```sh
|
|
8
|
+
* $ pulumi import vault:ad/secretRole:SecretRole role ad/roles/bob
|
|
9
|
+
* ```
|
|
10
|
+
*/
|
|
2
11
|
export declare class SecretRole extends pulumi.CustomResource {
|
|
3
12
|
/**
|
|
4
13
|
* Get an existing SecretRole resource's state with the given name, ID, and optional extra
|
|
@@ -16,27 +25,31 @@ export declare class SecretRole extends pulumi.CustomResource {
|
|
|
16
25
|
*/
|
|
17
26
|
static isInstance(obj: any): obj is SecretRole;
|
|
18
27
|
/**
|
|
19
|
-
* The
|
|
28
|
+
* The path the AD secret backend is mounted at,
|
|
29
|
+
* with no leading or trailing `/`s.
|
|
20
30
|
*/
|
|
21
31
|
readonly backend: pulumi.Output<string>;
|
|
22
32
|
/**
|
|
23
|
-
*
|
|
33
|
+
* Timestamp of the last password rotation by Vault.
|
|
24
34
|
*/
|
|
25
35
|
readonly lastVaultRotation: pulumi.Output<string>;
|
|
26
36
|
/**
|
|
27
|
-
*
|
|
37
|
+
* Timestamp of the last password set by Vault.
|
|
28
38
|
*/
|
|
29
39
|
readonly passwordLastSet: pulumi.Output<string>;
|
|
30
40
|
/**
|
|
31
|
-
*
|
|
41
|
+
* The name to identify this role within the backend.
|
|
42
|
+
* Must be unique within the backend.
|
|
32
43
|
*/
|
|
33
44
|
readonly role: pulumi.Output<string>;
|
|
34
45
|
/**
|
|
35
|
-
*
|
|
46
|
+
* Specifies the name of the Active Directory service
|
|
47
|
+
* account mapped to this role.
|
|
36
48
|
*/
|
|
37
49
|
readonly serviceAccountName: pulumi.Output<string>;
|
|
38
50
|
/**
|
|
39
|
-
*
|
|
51
|
+
* The password time-to-live in seconds. Defaults to the configuration
|
|
52
|
+
* ttl if not provided.
|
|
40
53
|
*/
|
|
41
54
|
readonly ttl: pulumi.Output<number | undefined>;
|
|
42
55
|
/**
|
|
@@ -53,27 +66,31 @@ export declare class SecretRole extends pulumi.CustomResource {
|
|
|
53
66
|
*/
|
|
54
67
|
export interface SecretRoleState {
|
|
55
68
|
/**
|
|
56
|
-
* The
|
|
69
|
+
* The path the AD secret backend is mounted at,
|
|
70
|
+
* with no leading or trailing `/`s.
|
|
57
71
|
*/
|
|
58
72
|
backend?: pulumi.Input<string>;
|
|
59
73
|
/**
|
|
60
|
-
*
|
|
74
|
+
* Timestamp of the last password rotation by Vault.
|
|
61
75
|
*/
|
|
62
76
|
lastVaultRotation?: pulumi.Input<string>;
|
|
63
77
|
/**
|
|
64
|
-
*
|
|
78
|
+
* Timestamp of the last password set by Vault.
|
|
65
79
|
*/
|
|
66
80
|
passwordLastSet?: pulumi.Input<string>;
|
|
67
81
|
/**
|
|
68
|
-
*
|
|
82
|
+
* The name to identify this role within the backend.
|
|
83
|
+
* Must be unique within the backend.
|
|
69
84
|
*/
|
|
70
85
|
role?: pulumi.Input<string>;
|
|
71
86
|
/**
|
|
72
|
-
*
|
|
87
|
+
* Specifies the name of the Active Directory service
|
|
88
|
+
* account mapped to this role.
|
|
73
89
|
*/
|
|
74
90
|
serviceAccountName?: pulumi.Input<string>;
|
|
75
91
|
/**
|
|
76
|
-
*
|
|
92
|
+
* The password time-to-live in seconds. Defaults to the configuration
|
|
93
|
+
* ttl if not provided.
|
|
77
94
|
*/
|
|
78
95
|
ttl?: pulumi.Input<number>;
|
|
79
96
|
}
|
|
@@ -82,19 +99,23 @@ export interface SecretRoleState {
|
|
|
82
99
|
*/
|
|
83
100
|
export interface SecretRoleArgs {
|
|
84
101
|
/**
|
|
85
|
-
* The
|
|
102
|
+
* The path the AD secret backend is mounted at,
|
|
103
|
+
* with no leading or trailing `/`s.
|
|
86
104
|
*/
|
|
87
105
|
backend: pulumi.Input<string>;
|
|
88
106
|
/**
|
|
89
|
-
*
|
|
107
|
+
* The name to identify this role within the backend.
|
|
108
|
+
* Must be unique within the backend.
|
|
90
109
|
*/
|
|
91
110
|
role: pulumi.Input<string>;
|
|
92
111
|
/**
|
|
93
|
-
*
|
|
112
|
+
* Specifies the name of the Active Directory service
|
|
113
|
+
* account mapped to this role.
|
|
94
114
|
*/
|
|
95
115
|
serviceAccountName: pulumi.Input<string>;
|
|
96
116
|
/**
|
|
97
|
-
*
|
|
117
|
+
* The password time-to-live in seconds. Defaults to the configuration
|
|
118
|
+
* ttl if not provided.
|
|
98
119
|
*/
|
|
99
120
|
ttl?: pulumi.Input<number>;
|
|
100
121
|
}
|
package/ad/secretRole.js
CHANGED
|
@@ -5,6 +5,15 @@ Object.defineProperty(exports, "__esModule", { value: true });
|
|
|
5
5
|
exports.SecretRole = void 0;
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("../utilities");
|
|
8
|
+
/**
|
|
9
|
+
* ## Import
|
|
10
|
+
*
|
|
11
|
+
* AD secret backend roles can be imported using the `path`, e.g.
|
|
12
|
+
*
|
|
13
|
+
* ```sh
|
|
14
|
+
* $ pulumi import vault:ad/secretRole:SecretRole role ad/roles/bob
|
|
15
|
+
* ```
|
|
16
|
+
*/
|
|
8
17
|
class SecretRole extends pulumi.CustomResource {
|
|
9
18
|
constructor(name, argsOrState, opts) {
|
|
10
19
|
let inputs = {};
|
package/ad/secretRole.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretRole.js","sourceRoot":"","sources":["../../ad/secretRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,MAAa,UAAW,SAAQ,MAAM,CAAC,cAAc;
|
|
1
|
+
{"version":3,"file":"secretRole.js","sourceRoot":"","sources":["../../ad/secretRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;GAQG;AACH,MAAa,UAAW,SAAQ,MAAM,CAAC,cAAc;IAiEjD,YAAY,IAAY,EAAE,WAA8C,EAAE,IAAmC;QACzG,IAAI,MAAM,GAAkB,EAAE,CAAC;QAC/B,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA0C,CAAC;YACzD,MAAM,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,MAAM,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,MAAM,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,MAAM,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACjD;aAAM;YACH,MAAM,IAAI,GAAG,WAAyC,CAAC;YACvD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,kBAAkB,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC/D,MAAM,IAAI,KAAK,CAAC,gDAAgD,CAAC,CAAC;aACrE;YACD,MAAM,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9C,MAAM,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,MAAM,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5C,MAAM,CAAC,mBAAmB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAChD,MAAM,CAAC,iBAAiB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACjD;QACD,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;YACf,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE,EAAC,CAAC,CAAC;SACxE;QACD,KAAK,CAAC,UAAU,CAAC,YAAY,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,CAAC,CAAC;IACvD,CAAC;IAjGD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAuB,EAAE,IAAmC;QACrH,OAAO,IAAI,UAAU,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACjE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,UAAU,CAAC,YAAY,CAAC;IAC3D,CAAC;;AA1BL,gCAmGC;AArFG,gBAAgB;AACO,uBAAY,GAAG,gCAAgC,CAAC"}
|
package/config/vars.d.ts
CHANGED
|
@@ -28,7 +28,7 @@ export declare const clientAuths: outputs.config.ClientAuths[] | undefined;
|
|
|
28
28
|
*/
|
|
29
29
|
export declare const headers: outputs.config.Headers[] | undefined;
|
|
30
30
|
/**
|
|
31
|
-
* Maximum TTL for secret leases requested by this provider
|
|
31
|
+
* Maximum TTL for secret leases requested by this provider.
|
|
32
32
|
*/
|
|
33
33
|
export declare const maxLeaseTtlSeconds: number;
|
|
34
34
|
/**
|
|
@@ -36,9 +36,17 @@ export declare const maxLeaseTtlSeconds: number;
|
|
|
36
36
|
*/
|
|
37
37
|
export declare const maxRetries: number;
|
|
38
38
|
/**
|
|
39
|
-
*
|
|
39
|
+
* Maximum number of retries for Client Controlled Consistency related operations
|
|
40
|
+
*/
|
|
41
|
+
export declare const maxRetriesCcc: number | undefined;
|
|
42
|
+
/**
|
|
43
|
+
* The namespace to use. Available only for Vault Enterprise.
|
|
40
44
|
*/
|
|
41
45
|
export declare const namespace: string | undefined;
|
|
46
|
+
/**
|
|
47
|
+
* Set this to true to prevent the creation of ephemeral child token used by this provider.
|
|
48
|
+
*/
|
|
49
|
+
export declare const skipChildToken: boolean | undefined;
|
|
42
50
|
/**
|
|
43
51
|
* Set this to true only if the target Vault server is an insecure development instance.
|
|
44
52
|
*/
|
package/config/vars.js
CHANGED
|
@@ -61,12 +61,24 @@ Object.defineProperty(exports, "maxRetries", {
|
|
|
61
61
|
},
|
|
62
62
|
enumerable: true,
|
|
63
63
|
});
|
|
64
|
+
Object.defineProperty(exports, "maxRetriesCcc", {
|
|
65
|
+
get() {
|
|
66
|
+
return __config.getObject("maxRetriesCcc");
|
|
67
|
+
},
|
|
68
|
+
enumerable: true,
|
|
69
|
+
});
|
|
64
70
|
Object.defineProperty(exports, "namespace", {
|
|
65
71
|
get() {
|
|
66
72
|
return __config.get("namespace");
|
|
67
73
|
},
|
|
68
74
|
enumerable: true,
|
|
69
75
|
});
|
|
76
|
+
Object.defineProperty(exports, "skipChildToken", {
|
|
77
|
+
get() {
|
|
78
|
+
return __config.getObject("skipChildToken");
|
|
79
|
+
},
|
|
80
|
+
enumerable: true,
|
|
81
|
+
});
|
|
70
82
|
Object.defineProperty(exports, "skipTlsVerify", {
|
|
71
83
|
get() {
|
|
72
84
|
var _a;
|
package/config/vars.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"vars.js","sourceRoot":"","sources":["../../config/vars.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;AAEjF,yCAAyC;AAEzC,0CAA0C;AAG1C,MAAM,QAAQ,GAAG,IAAI,MAAM,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC;AAM5C,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,iBAAiB,EAAE;IAC9C,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,iBAAiB,CAAC,CAAC;IAC3C,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,SAAS,EAAE;IACtC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,SAAS,CAAC,CAAC;IACnC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,YAAY,EAAE;IACzC,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAA8B,YAAY,CAAC,CAAC;IACzE,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,WAAW,EAAE;IACxC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC;IACrC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,YAAY,EAAE;IACzC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,YAAY,CAAC,CAAC;IACtC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,aAAa,EAAE;IAC1C,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAA+B,aAAa,CAAC,CAAC;IAC3E,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,SAAS,EAAE;IACtC,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAA2B,SAAS,CAAC,CAAC;IACnE,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,oBAAoB,EAAE;IACjD,GAAG;;QACC,OAAO,MAAA,QAAQ,CAAC,SAAS,CAAS,oBAAoB,CAAC,mCAAI,CAAM,SAAS,CAAC,YAAY,CAAC,yBAAyB,CAAC,IAAI,IAAI,CAAC,CAAC;IAChI,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,YAAY,EAAE;IACzC,GAAG;;QACC,OAAO,MAAA,QAAQ,CAAC,SAAS,CAAS,YAAY,CAAC,mCAAI,CAAM,SAAS,CAAC,YAAY,CAAC,mBAAmB,CAAC,IAAI,CAAC,CAAC,CAAC;IAC/G,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,WAAW,EAAE;IACxC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC;IACrC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,eAAe,EAAE;IAC5C,GAAG;;QACC,OAAO,MAAA,QAAQ,CAAC,SAAS,CAAU,eAAe,CAAC,mCAAS,SAAS,CAAC,aAAa,CAAC,mBAAmB,CAAC,CAAC;IAC7G,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,OAAO,EAAE;IACpC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,OAAO,CAAC,CAAC;IACjC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,WAAW,EAAE;IACxC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC;IACrC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC"}
|
|
1
|
+
{"version":3,"file":"vars.js","sourceRoot":"","sources":["../../config/vars.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;AAEjF,yCAAyC;AAEzC,0CAA0C;AAG1C,MAAM,QAAQ,GAAG,IAAI,MAAM,CAAC,MAAM,CAAC,OAAO,CAAC,CAAC;AAM5C,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,iBAAiB,EAAE;IAC9C,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,iBAAiB,CAAC,CAAC;IAC3C,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,SAAS,EAAE;IACtC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,SAAS,CAAC,CAAC;IACnC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,YAAY,EAAE;IACzC,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAA8B,YAAY,CAAC,CAAC;IACzE,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,WAAW,EAAE;IACxC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC;IACrC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,YAAY,EAAE;IACzC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,YAAY,CAAC,CAAC;IACtC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,aAAa,EAAE;IAC1C,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAA+B,aAAa,CAAC,CAAC;IAC3E,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,SAAS,EAAE;IACtC,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAA2B,SAAS,CAAC,CAAC;IACnE,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,oBAAoB,EAAE;IACjD,GAAG;;QACC,OAAO,MAAA,QAAQ,CAAC,SAAS,CAAS,oBAAoB,CAAC,mCAAI,CAAM,SAAS,CAAC,YAAY,CAAC,yBAAyB,CAAC,IAAI,IAAI,CAAC,CAAC;IAChI,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,YAAY,EAAE;IACzC,GAAG;;QACC,OAAO,MAAA,QAAQ,CAAC,SAAS,CAAS,YAAY,CAAC,mCAAI,CAAM,SAAS,CAAC,YAAY,CAAC,mBAAmB,CAAC,IAAI,CAAC,CAAC,CAAC;IAC/G,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,eAAe,EAAE;IAC5C,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAAS,eAAe,CAAC,CAAC;IACvD,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,WAAW,EAAE;IACxC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC;IACrC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,gBAAgB,EAAE;IAC7C,GAAG;QACC,OAAO,QAAQ,CAAC,SAAS,CAAU,gBAAgB,CAAC,CAAC;IACzD,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,eAAe,EAAE;IAC5C,GAAG;;QACC,OAAO,MAAA,QAAQ,CAAC,SAAS,CAAU,eAAe,CAAC,mCAAS,SAAS,CAAC,aAAa,CAAC,mBAAmB,CAAC,CAAC;IAC7G,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,OAAO,EAAE;IACpC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,OAAO,CAAC,CAAC;IACjC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC;AAMH,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,WAAW,EAAE;IACxC,GAAG;QACC,OAAO,QAAQ,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC;IACrC,CAAC;IACD,UAAU,EAAE,IAAI;CACnB,CAAC,CAAC"}
|
|
@@ -52,6 +52,10 @@ export declare class SecretBackendConnection extends pulumi.CustomResource {
|
|
|
52
52
|
* A nested block containing configuration options for SAP HanaDB connections.
|
|
53
53
|
*/
|
|
54
54
|
readonly hana: pulumi.Output<outputs.database.SecretBackendConnectionHana | undefined>;
|
|
55
|
+
/**
|
|
56
|
+
* A nested block containing configuration options for InfluxDB connections.
|
|
57
|
+
*/
|
|
58
|
+
readonly influxdb: pulumi.Output<outputs.database.SecretBackendConnectionInfluxdb | undefined>;
|
|
55
59
|
/**
|
|
56
60
|
* A nested block containing configuration options for MongoDB connections.
|
|
57
61
|
*/
|
|
@@ -145,6 +149,10 @@ export interface SecretBackendConnectionState {
|
|
|
145
149
|
* A nested block containing configuration options for SAP HanaDB connections.
|
|
146
150
|
*/
|
|
147
151
|
hana?: pulumi.Input<inputs.database.SecretBackendConnectionHana>;
|
|
152
|
+
/**
|
|
153
|
+
* A nested block containing configuration options for InfluxDB connections.
|
|
154
|
+
*/
|
|
155
|
+
influxdb?: pulumi.Input<inputs.database.SecretBackendConnectionInfluxdb>;
|
|
148
156
|
/**
|
|
149
157
|
* A nested block containing configuration options for MongoDB connections.
|
|
150
158
|
*/
|
|
@@ -230,6 +238,10 @@ export interface SecretBackendConnectionArgs {
|
|
|
230
238
|
* A nested block containing configuration options for SAP HanaDB connections.
|
|
231
239
|
*/
|
|
232
240
|
hana?: pulumi.Input<inputs.database.SecretBackendConnectionHana>;
|
|
241
|
+
/**
|
|
242
|
+
* A nested block containing configuration options for InfluxDB connections.
|
|
243
|
+
*/
|
|
244
|
+
influxdb?: pulumi.Input<inputs.database.SecretBackendConnectionInfluxdb>;
|
|
233
245
|
/**
|
|
234
246
|
* A nested block containing configuration options for MongoDB connections.
|
|
235
247
|
*/
|
|
@@ -26,6 +26,7 @@ class SecretBackendConnection extends pulumi.CustomResource {
|
|
|
26
26
|
inputs["data"] = state ? state.data : undefined;
|
|
27
27
|
inputs["elasticsearch"] = state ? state.elasticsearch : undefined;
|
|
28
28
|
inputs["hana"] = state ? state.hana : undefined;
|
|
29
|
+
inputs["influxdb"] = state ? state.influxdb : undefined;
|
|
29
30
|
inputs["mongodb"] = state ? state.mongodb : undefined;
|
|
30
31
|
inputs["mongodbatlas"] = state ? state.mongodbatlas : undefined;
|
|
31
32
|
inputs["mssql"] = state ? state.mssql : undefined;
|
|
@@ -51,6 +52,7 @@ class SecretBackendConnection extends pulumi.CustomResource {
|
|
|
51
52
|
inputs["data"] = args ? args.data : undefined;
|
|
52
53
|
inputs["elasticsearch"] = args ? args.elasticsearch : undefined;
|
|
53
54
|
inputs["hana"] = args ? args.hana : undefined;
|
|
55
|
+
inputs["influxdb"] = args ? args.influxdb : undefined;
|
|
54
56
|
inputs["mongodb"] = args ? args.mongodb : undefined;
|
|
55
57
|
inputs["mongodbatlas"] = args ? args.mongodbatlas : undefined;
|
|
56
58
|
inputs["mssql"] = args ? args.mssql : undefined;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretBackendConnection.js","sourceRoot":"","sources":["../../database/secretBackendConnection.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAEzC,0CAA0C;AAE1C;;;;;;;;GAQG;AACH,MAAa,uBAAwB,SAAQ,MAAM,CAAC,cAAc;
|
|
1
|
+
{"version":3,"file":"secretBackendConnection.js","sourceRoot":"","sources":["../../database/secretBackendConnection.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAEzC,0CAA0C;AAE1C;;;;;;;;GAQG;AACH,MAAa,uBAAwB,SAAQ,MAAM,CAAC,cAAc;IAuH9D,YAAY,IAAY,EAAE,WAAwE,EAAE,IAAmC;QACnI,IAAI,MAAM,GAAkB,EAAE,CAAC;QAC/B,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAuD,CAAC;YACtE,MAAM,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,MAAM,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,MAAM,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,MAAM,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,MAAM,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3E;aAAM;YACH,MAAM,IAAI,GAAG,WAAsD,CAAC;YACpE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,MAAM,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9C,MAAM,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,MAAM,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9C,MAAM,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9C,MAAM,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,MAAM,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;SACzE;QACD,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;YACf,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE,EAAC,CAAC,CAAC;SACxE;QACD,KAAK,CAAC,uBAAuB,CAAC,YAAY,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,CAAC,CAAC;IACpE,CAAC;IA7KD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAoC,EAAE,IAAmC;QAClI,OAAO,IAAI,uBAAuB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC9E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,uBAAuB,CAAC,YAAY,CAAC;IACxE,CAAC;;AA1BL,0DA+KC;AAjKG,gBAAgB;AACO,oCAAY,GAAG,gEAAgE,CAAC"}
|
package/generic/secret.d.ts
CHANGED
|
@@ -39,7 +39,14 @@ export declare class Secret extends pulumi.CustomResource {
|
|
|
39
39
|
*/
|
|
40
40
|
readonly dataJson: pulumi.Output<string>;
|
|
41
41
|
/**
|
|
42
|
-
*
|
|
42
|
+
* true/false. Only applicable for kv-v2 stores.
|
|
43
|
+
* If set to `true`, permanently deletes all versions for
|
|
44
|
+
* the specified key. The default behavior is to only delete the latest version of the
|
|
45
|
+
* secret.
|
|
46
|
+
*/
|
|
47
|
+
readonly deleteAllVersions: pulumi.Output<boolean | undefined>;
|
|
48
|
+
/**
|
|
49
|
+
* true/false. Set this to true if your vault
|
|
43
50
|
* authentication is not able to read the data. Setting this to `true` will
|
|
44
51
|
* break drift detection. Defaults to false.
|
|
45
52
|
*/
|
|
@@ -80,7 +87,14 @@ export interface SecretState {
|
|
|
80
87
|
*/
|
|
81
88
|
dataJson?: pulumi.Input<string>;
|
|
82
89
|
/**
|
|
83
|
-
*
|
|
90
|
+
* true/false. Only applicable for kv-v2 stores.
|
|
91
|
+
* If set to `true`, permanently deletes all versions for
|
|
92
|
+
* the specified key. The default behavior is to only delete the latest version of the
|
|
93
|
+
* secret.
|
|
94
|
+
*/
|
|
95
|
+
deleteAllVersions?: pulumi.Input<boolean>;
|
|
96
|
+
/**
|
|
97
|
+
* true/false. Set this to true if your vault
|
|
84
98
|
* authentication is not able to read the data. Setting this to `true` will
|
|
85
99
|
* break drift detection. Defaults to false.
|
|
86
100
|
*/
|
|
@@ -104,7 +118,14 @@ export interface SecretArgs {
|
|
|
104
118
|
*/
|
|
105
119
|
dataJson: pulumi.Input<string>;
|
|
106
120
|
/**
|
|
107
|
-
*
|
|
121
|
+
* true/false. Only applicable for kv-v2 stores.
|
|
122
|
+
* If set to `true`, permanently deletes all versions for
|
|
123
|
+
* the specified key. The default behavior is to only delete the latest version of the
|
|
124
|
+
* secret.
|
|
125
|
+
*/
|
|
126
|
+
deleteAllVersions?: pulumi.Input<boolean>;
|
|
127
|
+
/**
|
|
128
|
+
* true/false. Set this to true if your vault
|
|
108
129
|
* authentication is not able to read the data. Setting this to `true` will
|
|
109
130
|
* break drift detection. Defaults to false.
|
|
110
131
|
*/
|
package/generic/secret.js
CHANGED
|
@@ -22,6 +22,7 @@ class Secret extends pulumi.CustomResource {
|
|
|
22
22
|
const state = argsOrState;
|
|
23
23
|
inputs["data"] = state ? state.data : undefined;
|
|
24
24
|
inputs["dataJson"] = state ? state.dataJson : undefined;
|
|
25
|
+
inputs["deleteAllVersions"] = state ? state.deleteAllVersions : undefined;
|
|
25
26
|
inputs["disableRead"] = state ? state.disableRead : undefined;
|
|
26
27
|
inputs["path"] = state ? state.path : undefined;
|
|
27
28
|
}
|
|
@@ -34,6 +35,7 @@ class Secret extends pulumi.CustomResource {
|
|
|
34
35
|
throw new Error("Missing required property 'path'");
|
|
35
36
|
}
|
|
36
37
|
inputs["dataJson"] = args ? args.dataJson : undefined;
|
|
38
|
+
inputs["deleteAllVersions"] = args ? args.deleteAllVersions : undefined;
|
|
37
39
|
inputs["disableRead"] = args ? args.disableRead : undefined;
|
|
38
40
|
inputs["path"] = args ? args.path : undefined;
|
|
39
41
|
inputs["data"] = undefined /*out*/;
|
package/generic/secret.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secret.js","sourceRoot":"","sources":["../../generic/secret.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;GAQG;AACH,MAAa,MAAO,SAAQ,MAAM,CAAC,cAAc;
|
|
1
|
+
{"version":3,"file":"secret.js","sourceRoot":"","sources":["../../generic/secret.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;GAQG;AACH,MAAa,MAAO,SAAQ,MAAM,CAAC,cAAc;IAsE7C,YAAY,IAAY,EAAE,WAAsC,EAAE,IAAmC;QACjG,IAAI,MAAM,GAAkB,EAAE,CAAC;QAC/B,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAsC,CAAC;YACrD,MAAM,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;SACnD;aAAM;YACH,MAAM,IAAI,GAAG,WAAqC,CAAC;YACnD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,MAAM,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,mBAAmB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9C,MAAM,CAAC,MAAM,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACtC;QACD,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;YACf,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE,EAAC,CAAC,CAAC;SACxE;QACD,KAAK,CAAC,MAAM,CAAC,YAAY,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,CAAC,CAAC;IACnD,CAAC;IAjGD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAmB,EAAE,IAAmC;QACjH,OAAO,IAAI,MAAM,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC7D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,MAAM,CAAC,YAAY,CAAC;IACvD,CAAC;;AA1BL,wBAmGC;AArFG,gBAAgB;AACO,mBAAY,GAAG,6BAA6B,CAAC"}
|
|
@@ -28,6 +28,12 @@ export declare class EntityAlias extends pulumi.CustomResource {
|
|
|
28
28
|
* Entity ID to which this alias belongs to.
|
|
29
29
|
*/
|
|
30
30
|
readonly canonicalId: pulumi.Output<string>;
|
|
31
|
+
/**
|
|
32
|
+
* Custom metadata to be associated with this alias.
|
|
33
|
+
*/
|
|
34
|
+
readonly customMetadata: pulumi.Output<{
|
|
35
|
+
[key: string]: string;
|
|
36
|
+
} | undefined>;
|
|
31
37
|
/**
|
|
32
38
|
* Accessor of the mount to which the alias should belong to.
|
|
33
39
|
*/
|
|
@@ -53,6 +59,12 @@ export interface EntityAliasState {
|
|
|
53
59
|
* Entity ID to which this alias belongs to.
|
|
54
60
|
*/
|
|
55
61
|
canonicalId?: pulumi.Input<string>;
|
|
62
|
+
/**
|
|
63
|
+
* Custom metadata to be associated with this alias.
|
|
64
|
+
*/
|
|
65
|
+
customMetadata?: pulumi.Input<{
|
|
66
|
+
[key: string]: pulumi.Input<string>;
|
|
67
|
+
}>;
|
|
56
68
|
/**
|
|
57
69
|
* Accessor of the mount to which the alias should belong to.
|
|
58
70
|
*/
|
|
@@ -70,6 +82,12 @@ export interface EntityAliasArgs {
|
|
|
70
82
|
* Entity ID to which this alias belongs to.
|
|
71
83
|
*/
|
|
72
84
|
canonicalId: pulumi.Input<string>;
|
|
85
|
+
/**
|
|
86
|
+
* Custom metadata to be associated with this alias.
|
|
87
|
+
*/
|
|
88
|
+
customMetadata?: pulumi.Input<{
|
|
89
|
+
[key: string]: pulumi.Input<string>;
|
|
90
|
+
}>;
|
|
73
91
|
/**
|
|
74
92
|
* Accessor of the mount to which the alias should belong to.
|
|
75
93
|
*/
|
package/identity/entityAlias.js
CHANGED
|
@@ -21,6 +21,7 @@ class EntityAlias extends pulumi.CustomResource {
|
|
|
21
21
|
if (opts.id) {
|
|
22
22
|
const state = argsOrState;
|
|
23
23
|
inputs["canonicalId"] = state ? state.canonicalId : undefined;
|
|
24
|
+
inputs["customMetadata"] = state ? state.customMetadata : undefined;
|
|
24
25
|
inputs["mountAccessor"] = state ? state.mountAccessor : undefined;
|
|
25
26
|
inputs["name"] = state ? state.name : undefined;
|
|
26
27
|
}
|
|
@@ -33,6 +34,7 @@ class EntityAlias extends pulumi.CustomResource {
|
|
|
33
34
|
throw new Error("Missing required property 'mountAccessor'");
|
|
34
35
|
}
|
|
35
36
|
inputs["canonicalId"] = args ? args.canonicalId : undefined;
|
|
37
|
+
inputs["customMetadata"] = args ? args.customMetadata : undefined;
|
|
36
38
|
inputs["mountAccessor"] = args ? args.mountAccessor : undefined;
|
|
37
39
|
inputs["name"] = args ? args.name : undefined;
|
|
38
40
|
}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"entityAlias.js","sourceRoot":"","sources":["../../identity/entityAlias.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;GAQG;AACH,MAAa,WAAY,SAAQ,MAAM,CAAC,cAAc;
|
|
1
|
+
{"version":3,"file":"entityAlias.js","sourceRoot":"","sources":["../../identity/entityAlias.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;GAQG;AACH,MAAa,WAAY,SAAQ,MAAM,CAAC,cAAc;IAqDlD,YAAY,IAAY,EAAE,WAAgD,EAAE,IAAmC;QAC3G,IAAI,MAAM,GAAkB,EAAE,CAAC;QAC/B,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA2C,CAAC;YAC1D,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,MAAM,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,MAAM,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;SACnD;aAAM;YACH,MAAM,IAAI,GAAG,WAA0C,CAAC;YACxD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,WAAW,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACxD,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,aAAa,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1D,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;aAChE;YACD,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,MAAM,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,MAAM,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;SACjD;QACD,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;YACf,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE,EAAC,CAAC,CAAC;SACxE;QACD,KAAK,CAAC,WAAW,CAAC,YAAY,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,CAAC,CAAC;IACxD,CAAC;IA9ED;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAwB,EAAE,IAAmC;QACtH,OAAO,IAAI,WAAW,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAClE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,WAAW,CAAC,YAAY,CAAC;IAC5D,CAAC;;AA1BL,kCAgFC;AAlEG,gBAAgB;AACO,wBAAY,GAAG,wCAAwC,CAAC"}
|
package/jwt/authBackend.d.ts
CHANGED
|
@@ -126,6 +126,10 @@ export declare class AuthBackend extends pulumi.CustomResource {
|
|
|
126
126
|
* Specifies if the auth method is local only.
|
|
127
127
|
*/
|
|
128
128
|
readonly local: pulumi.Output<boolean | undefined>;
|
|
129
|
+
/**
|
|
130
|
+
* Pass namespace in the OIDC state parameter instead of as a separate query parameter. With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs
|
|
131
|
+
*/
|
|
132
|
+
readonly namespaceInState: pulumi.Output<boolean | undefined>;
|
|
129
133
|
/**
|
|
130
134
|
* Client ID used for OIDC backends
|
|
131
135
|
*/
|
|
@@ -142,6 +146,14 @@ export declare class AuthBackend extends pulumi.CustomResource {
|
|
|
142
146
|
* The OIDC Discovery URL, without any .well-known component (base path). Cannot be used in combination with `jwtValidationPubkeys`
|
|
143
147
|
*/
|
|
144
148
|
readonly oidcDiscoveryUrl: pulumi.Output<string | undefined>;
|
|
149
|
+
/**
|
|
150
|
+
* The response mode to be used in the OAuth2 request. Allowed values are `query` and `formPost`. Defaults to `query`. If using Vault namespaces, and `oidcResponseMode` is `formPost`, then `namespaceInState` should be set to `false`.
|
|
151
|
+
*/
|
|
152
|
+
readonly oidcResponseMode: pulumi.Output<string | undefined>;
|
|
153
|
+
/**
|
|
154
|
+
* List of response types to request. Allowed values are 'code' and 'id_token'. Defaults to `["code"]`. Note: `idToken` may only be used if `oidcResponseMode` is set to `formPost`.
|
|
155
|
+
*/
|
|
156
|
+
readonly oidcResponseTypes: pulumi.Output<string[] | undefined>;
|
|
145
157
|
/**
|
|
146
158
|
* Path to mount the JWT/OIDC auth backend
|
|
147
159
|
*/
|
|
@@ -206,6 +218,10 @@ export interface AuthBackendState {
|
|
|
206
218
|
* Specifies if the auth method is local only.
|
|
207
219
|
*/
|
|
208
220
|
local?: pulumi.Input<boolean>;
|
|
221
|
+
/**
|
|
222
|
+
* Pass namespace in the OIDC state parameter instead of as a separate query parameter. With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs
|
|
223
|
+
*/
|
|
224
|
+
namespaceInState?: pulumi.Input<boolean>;
|
|
209
225
|
/**
|
|
210
226
|
* Client ID used for OIDC backends
|
|
211
227
|
*/
|
|
@@ -222,6 +238,14 @@ export interface AuthBackendState {
|
|
|
222
238
|
* The OIDC Discovery URL, without any .well-known component (base path). Cannot be used in combination with `jwtValidationPubkeys`
|
|
223
239
|
*/
|
|
224
240
|
oidcDiscoveryUrl?: pulumi.Input<string>;
|
|
241
|
+
/**
|
|
242
|
+
* The response mode to be used in the OAuth2 request. Allowed values are `query` and `formPost`. Defaults to `query`. If using Vault namespaces, and `oidcResponseMode` is `formPost`, then `namespaceInState` should be set to `false`.
|
|
243
|
+
*/
|
|
244
|
+
oidcResponseMode?: pulumi.Input<string>;
|
|
245
|
+
/**
|
|
246
|
+
* List of response types to request. Allowed values are 'code' and 'id_token'. Defaults to `["code"]`. Note: `idToken` may only be used if `oidcResponseMode` is set to `formPost`.
|
|
247
|
+
*/
|
|
248
|
+
oidcResponseTypes?: pulumi.Input<pulumi.Input<string>[]>;
|
|
225
249
|
/**
|
|
226
250
|
* Path to mount the JWT/OIDC auth backend
|
|
227
251
|
*/
|
|
@@ -274,6 +298,10 @@ export interface AuthBackendArgs {
|
|
|
274
298
|
* Specifies if the auth method is local only.
|
|
275
299
|
*/
|
|
276
300
|
local?: pulumi.Input<boolean>;
|
|
301
|
+
/**
|
|
302
|
+
* Pass namespace in the OIDC state parameter instead of as a separate query parameter. With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs
|
|
303
|
+
*/
|
|
304
|
+
namespaceInState?: pulumi.Input<boolean>;
|
|
277
305
|
/**
|
|
278
306
|
* Client ID used for OIDC backends
|
|
279
307
|
*/
|
|
@@ -290,6 +318,14 @@ export interface AuthBackendArgs {
|
|
|
290
318
|
* The OIDC Discovery URL, without any .well-known component (base path). Cannot be used in combination with `jwtValidationPubkeys`
|
|
291
319
|
*/
|
|
292
320
|
oidcDiscoveryUrl?: pulumi.Input<string>;
|
|
321
|
+
/**
|
|
322
|
+
* The response mode to be used in the OAuth2 request. Allowed values are `query` and `formPost`. Defaults to `query`. If using Vault namespaces, and `oidcResponseMode` is `formPost`, then `namespaceInState` should be set to `false`.
|
|
323
|
+
*/
|
|
324
|
+
oidcResponseMode?: pulumi.Input<string>;
|
|
325
|
+
/**
|
|
326
|
+
* List of response types to request. Allowed values are 'code' and 'id_token'. Defaults to `["code"]`. Note: `idToken` may only be used if `oidcResponseMode` is set to `formPost`.
|
|
327
|
+
*/
|
|
328
|
+
oidcResponseTypes?: pulumi.Input<pulumi.Input<string>[]>;
|
|
293
329
|
/**
|
|
294
330
|
* Path to mount the JWT/OIDC auth backend
|
|
295
331
|
*/
|
package/jwt/authBackend.js
CHANGED
|
@@ -94,10 +94,13 @@ class AuthBackend extends pulumi.CustomResource {
|
|
|
94
94
|
inputs["jwtSupportedAlgs"] = state ? state.jwtSupportedAlgs : undefined;
|
|
95
95
|
inputs["jwtValidationPubkeys"] = state ? state.jwtValidationPubkeys : undefined;
|
|
96
96
|
inputs["local"] = state ? state.local : undefined;
|
|
97
|
+
inputs["namespaceInState"] = state ? state.namespaceInState : undefined;
|
|
97
98
|
inputs["oidcClientId"] = state ? state.oidcClientId : undefined;
|
|
98
99
|
inputs["oidcClientSecret"] = state ? state.oidcClientSecret : undefined;
|
|
99
100
|
inputs["oidcDiscoveryCaPem"] = state ? state.oidcDiscoveryCaPem : undefined;
|
|
100
101
|
inputs["oidcDiscoveryUrl"] = state ? state.oidcDiscoveryUrl : undefined;
|
|
102
|
+
inputs["oidcResponseMode"] = state ? state.oidcResponseMode : undefined;
|
|
103
|
+
inputs["oidcResponseTypes"] = state ? state.oidcResponseTypes : undefined;
|
|
101
104
|
inputs["path"] = state ? state.path : undefined;
|
|
102
105
|
inputs["providerConfig"] = state ? state.providerConfig : undefined;
|
|
103
106
|
inputs["tune"] = state ? state.tune : undefined;
|
|
@@ -113,10 +116,13 @@ class AuthBackend extends pulumi.CustomResource {
|
|
|
113
116
|
inputs["jwtSupportedAlgs"] = args ? args.jwtSupportedAlgs : undefined;
|
|
114
117
|
inputs["jwtValidationPubkeys"] = args ? args.jwtValidationPubkeys : undefined;
|
|
115
118
|
inputs["local"] = args ? args.local : undefined;
|
|
119
|
+
inputs["namespaceInState"] = args ? args.namespaceInState : undefined;
|
|
116
120
|
inputs["oidcClientId"] = args ? args.oidcClientId : undefined;
|
|
117
121
|
inputs["oidcClientSecret"] = args ? args.oidcClientSecret : undefined;
|
|
118
122
|
inputs["oidcDiscoveryCaPem"] = args ? args.oidcDiscoveryCaPem : undefined;
|
|
119
123
|
inputs["oidcDiscoveryUrl"] = args ? args.oidcDiscoveryUrl : undefined;
|
|
124
|
+
inputs["oidcResponseMode"] = args ? args.oidcResponseMode : undefined;
|
|
125
|
+
inputs["oidcResponseTypes"] = args ? args.oidcResponseTypes : undefined;
|
|
120
126
|
inputs["path"] = args ? args.path : undefined;
|
|
121
127
|
inputs["providerConfig"] = args ? args.providerConfig : undefined;
|
|
122
128
|
inputs["tune"] = args ? args.tune : undefined;
|
package/jwt/authBackend.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"authBackend.js","sourceRoot":"","sources":["../../jwt/authBackend.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAEzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAyEG;AACH,MAAa,WAAY,SAAQ,MAAM,CAAC,cAAc;
|
|
1
|
+
{"version":3,"file":"authBackend.js","sourceRoot":"","sources":["../../jwt/authBackend.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAEzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAyEG;AACH,MAAa,WAAY,SAAQ,MAAM,CAAC,cAAc;IAkHlD,YAAY,IAAY,EAAE,WAAgD,EAAE,IAAmC;QAC3G,IAAI,MAAM,GAAkB,EAAE,CAAC;QAC/B,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA2C,CAAC;YAC1D,MAAM,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,MAAM,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,MAAM,CAAC,sBAAsB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,MAAM,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,MAAM,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,MAAM,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,MAAM,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,MAAM,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,MAAM,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,MAAM,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,MAAM,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,MAAM,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,MAAM,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;SACnD;aAAM;YACH,MAAM,IAAI,GAAG,WAA0C,CAAC;YACxD,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,MAAM,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,MAAM,CAAC,sBAAsB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,MAAM,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,MAAM,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,MAAM,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,MAAM,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,MAAM,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,MAAM,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,MAAM,CAAC,mBAAmB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,MAAM,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9C,MAAM,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,MAAM,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9C,MAAM,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9C,MAAM,CAAC,UAAU,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAC1C;QACD,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;YACf,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE,EAAC,CAAC,CAAC;SACxE;QACD,KAAK,CAAC,WAAW,CAAC,YAAY,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,CAAC,CAAC;IACxD,CAAC;IArKD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAwB,EAAE,IAAmC;QACtH,OAAO,IAAI,WAAW,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAClE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,WAAW,CAAC,YAAY,CAAC;IAC5D,CAAC;;AA1BL,kCAuKC;AAzJG,gBAAgB;AACO,wBAAY,GAAG,mCAAmC,CAAC"}
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@pulumi/vault",
|
|
3
|
-
"version": "v5.0.
|
|
3
|
+
"version": "v5.2.0-alpha.1641576176+c4811198",
|
|
4
4
|
"description": "A Pulumi package for creating and managing vault cloud resources.",
|
|
5
5
|
"keywords": [
|
|
6
6
|
"pulumi",
|
|
@@ -11,7 +11,7 @@
|
|
|
11
11
|
"license": "Apache-2.0",
|
|
12
12
|
"scripts": {
|
|
13
13
|
"build": "tsc",
|
|
14
|
-
"install": "node scripts/install-pulumi-plugin.js resource vault v5.0.
|
|
14
|
+
"install": "node scripts/install-pulumi-plugin.js resource vault v5.2.0-alpha.1641576176+c4811198"
|
|
15
15
|
},
|
|
16
16
|
"dependencies": {
|
|
17
17
|
"@pulumi/pulumi": "^3.0.0"
|
package/package.json.dev
CHANGED
package/provider.d.ts
CHANGED
|
@@ -29,7 +29,7 @@ export declare class Provider extends pulumi.ProviderResource {
|
|
|
29
29
|
*/
|
|
30
30
|
readonly caCertFile: pulumi.Output<string | undefined>;
|
|
31
31
|
/**
|
|
32
|
-
* The namespace to use. Available only for Vault Enterprise
|
|
32
|
+
* The namespace to use. Available only for Vault Enterprise.
|
|
33
33
|
*/
|
|
34
34
|
readonly namespace: pulumi.Output<string | undefined>;
|
|
35
35
|
/**
|
|
@@ -82,7 +82,7 @@ export interface ProviderArgs {
|
|
|
82
82
|
*/
|
|
83
83
|
headers?: pulumi.Input<pulumi.Input<inputs.ProviderHeader>[]>;
|
|
84
84
|
/**
|
|
85
|
-
* Maximum TTL for secret leases requested by this provider
|
|
85
|
+
* Maximum TTL for secret leases requested by this provider.
|
|
86
86
|
*/
|
|
87
87
|
maxLeaseTtlSeconds?: pulumi.Input<number>;
|
|
88
88
|
/**
|
|
@@ -90,9 +90,17 @@ export interface ProviderArgs {
|
|
|
90
90
|
*/
|
|
91
91
|
maxRetries?: pulumi.Input<number>;
|
|
92
92
|
/**
|
|
93
|
-
*
|
|
93
|
+
* Maximum number of retries for Client Controlled Consistency related operations
|
|
94
|
+
*/
|
|
95
|
+
maxRetriesCcc?: pulumi.Input<number>;
|
|
96
|
+
/**
|
|
97
|
+
* The namespace to use. Available only for Vault Enterprise.
|
|
94
98
|
*/
|
|
95
99
|
namespace?: pulumi.Input<string>;
|
|
100
|
+
/**
|
|
101
|
+
* Set this to true to prevent the creation of ephemeral child token used by this provider.
|
|
102
|
+
*/
|
|
103
|
+
skipChildToken?: pulumi.Input<boolean>;
|
|
96
104
|
/**
|
|
97
105
|
* Set this to true only if the target Vault server is an insecure development instance.
|
|
98
106
|
*/
|
package/provider.js
CHANGED
|
@@ -39,7 +39,9 @@ class Provider extends pulumi.ProviderResource {
|
|
|
39
39
|
inputs["headers"] = pulumi.output(args ? args.headers : undefined).apply(JSON.stringify);
|
|
40
40
|
inputs["maxLeaseTtlSeconds"] = pulumi.output((_a = (args ? args.maxLeaseTtlSeconds : undefined)) !== null && _a !== void 0 ? _a : (utilities.getEnvNumber("TERRAFORM_VAULT_MAX_TTL") || 1200)).apply(JSON.stringify);
|
|
41
41
|
inputs["maxRetries"] = pulumi.output((_b = (args ? args.maxRetries : undefined)) !== null && _b !== void 0 ? _b : (utilities.getEnvNumber("VAULT_MAX_RETRIES") || 2)).apply(JSON.stringify);
|
|
42
|
+
inputs["maxRetriesCcc"] = pulumi.output(args ? args.maxRetriesCcc : undefined).apply(JSON.stringify);
|
|
42
43
|
inputs["namespace"] = args ? args.namespace : undefined;
|
|
44
|
+
inputs["skipChildToken"] = pulumi.output(args ? args.skipChildToken : undefined).apply(JSON.stringify);
|
|
43
45
|
inputs["skipTlsVerify"] = pulumi.output((_c = (args ? args.skipTlsVerify : undefined)) !== null && _c !== void 0 ? _c : utilities.getEnvBoolean("VAULT_SKIP_VERIFY")).apply(JSON.stringify);
|
|
44
46
|
inputs["token"] = args ? args.token : undefined;
|
|
45
47
|
inputs["tokenName"] = args ? args.tokenName : undefined;
|
package/provider.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"provider.js","sourceRoot":"","sources":["../provider.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAEzC,yCAAyC;AAEzC;;;;;GAKG;AACH,MAAa,QAAS,SAAQ,MAAM,CAAC,gBAAgB;IA4CjD;;;;;;OAMG;IACH,YAAY,IAAY,EAAE,IAAkB,EAAE,IAA6B;;QACvE,IAAI,MAAM,GAAkB,EAAE,CAAC;QAC/B,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB;YACI,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,KAAK,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,MAAM,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,MAAM,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,YAAY,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC/F,MAAM,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,aAAa,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACjG,MAAM,CAAC,SAAS,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACzF,MAAM,CAAC,oBAAoB,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,MAAA,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC,mCAAI,CAAM,SAAS,CAAC,YAAY,CAAC,yBAAyB,CAAC,IAAI,IAAI,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACrL,MAAM,CAAC,YAAY,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,MAAA,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC,mCAAI,CAAM,SAAS,CAAC,YAAY,CAAC,mBAAmB,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC5J,MAAM,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,eAAe,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,MAAA,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC,mCAAS,SAAS,CAAC,aAAa,CAAC,mBAAmB,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC5J,MAAM,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3D;QACD,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;YACf,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE,EAAC,CAAC,CAAC;SACxE;QACD,KAAK,CAAC,QAAQ,CAAC,YAAY,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,CAAC,CAAC;IACrD,CAAC;
|
|
1
|
+
{"version":3,"file":"provider.js","sourceRoot":"","sources":["../provider.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAEzC,yCAAyC;AAEzC;;;;;GAKG;AACH,MAAa,QAAS,SAAQ,MAAM,CAAC,gBAAgB;IA4CjD;;;;;;OAMG;IACH,YAAY,IAAY,EAAE,IAAkB,EAAE,IAA6B;;QACvE,IAAI,MAAM,GAAkB,EAAE,CAAC;QAC/B,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB;YACI,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,KAAK,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,MAAM,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,MAAM,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,MAAM,CAAC,YAAY,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC/F,MAAM,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,MAAM,CAAC,aAAa,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACjG,MAAM,CAAC,SAAS,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACzF,MAAM,CAAC,oBAAoB,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,MAAA,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC,mCAAI,CAAM,SAAS,CAAC,YAAY,CAAC,yBAAyB,CAAC,IAAI,IAAI,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACrL,MAAM,CAAC,YAAY,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,MAAA,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC,mCAAI,CAAM,SAAS,CAAC,YAAY,CAAC,mBAAmB,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC5J,MAAM,CAAC,eAAe,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACrG,MAAM,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,MAAM,CAAC,gBAAgB,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACvG,MAAM,CAAC,eAAe,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,MAAA,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC,mCAAS,SAAS,CAAC,aAAa,CAAC,mBAAmB,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC5J,MAAM,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAChD,MAAM,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3D;QACD,IAAI,CAAC,IAAI,CAAC,OAAO,EAAE;YACf,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,EAAE,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE,EAAC,CAAC,CAAC;SACxE;QACD,KAAK,CAAC,QAAQ,CAAC,YAAY,EAAE,IAAI,EAAE,MAAM,EAAE,IAAI,CAAC,CAAC;IACrD,CAAC;IA7ED;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,QAAQ,CAAC,YAAY,CAAC;IACzD,CAAC;;AAbL,4BAkFC;AAjFG,gBAAgB;AACO,qBAAY,GAAG,OAAO,CAAC"}
|
package/types/input.d.ts
CHANGED
|
@@ -267,6 +267,52 @@ export declare namespace database {
|
|
|
267
267
|
*/
|
|
268
268
|
maxOpenConnections?: pulumi.Input<number>;
|
|
269
269
|
}
|
|
270
|
+
interface SecretBackendConnectionInfluxdb {
|
|
271
|
+
/**
|
|
272
|
+
* The number of seconds to use as a connection
|
|
273
|
+
* timeout.
|
|
274
|
+
*/
|
|
275
|
+
connectTimeout?: pulumi.Input<number>;
|
|
276
|
+
/**
|
|
277
|
+
* The host to connect to.
|
|
278
|
+
*/
|
|
279
|
+
host: pulumi.Input<string>;
|
|
280
|
+
/**
|
|
281
|
+
* Whether to skip verification of the server
|
|
282
|
+
* certificate when using TLS.
|
|
283
|
+
*/
|
|
284
|
+
insecureTls?: pulumi.Input<boolean>;
|
|
285
|
+
/**
|
|
286
|
+
* The password to be used in the connection.
|
|
287
|
+
*/
|
|
288
|
+
password: pulumi.Input<string>;
|
|
289
|
+
/**
|
|
290
|
+
* Concatenated PEM blocks configuring the certificate
|
|
291
|
+
* chain.
|
|
292
|
+
*/
|
|
293
|
+
pemBundle?: pulumi.Input<string>;
|
|
294
|
+
/**
|
|
295
|
+
* A JSON structure configuring the certificate chain.
|
|
296
|
+
*/
|
|
297
|
+
pemJson?: pulumi.Input<string>;
|
|
298
|
+
/**
|
|
299
|
+
* The default port to connect to if no port is specified as
|
|
300
|
+
* part of the host.
|
|
301
|
+
*/
|
|
302
|
+
port?: pulumi.Input<number>;
|
|
303
|
+
/**
|
|
304
|
+
* Whether to use TLS when connecting to Cassandra.
|
|
305
|
+
*/
|
|
306
|
+
tls?: pulumi.Input<boolean>;
|
|
307
|
+
/**
|
|
308
|
+
* The username to be used in the connection (the account admin level).
|
|
309
|
+
*/
|
|
310
|
+
username: pulumi.Input<string>;
|
|
311
|
+
/**
|
|
312
|
+
* - [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
|
313
|
+
*/
|
|
314
|
+
usernameTemplate?: pulumi.Input<string>;
|
|
315
|
+
}
|
|
270
316
|
interface SecretBackendConnectionMongodb {
|
|
271
317
|
/**
|
|
272
318
|
* A URL containing connection information. See
|
|
@@ -317,6 +363,13 @@ export declare namespace database {
|
|
|
317
363
|
* for an example.
|
|
318
364
|
*/
|
|
319
365
|
connectionUrl?: pulumi.Input<string>;
|
|
366
|
+
/**
|
|
367
|
+
* For Vault v1.9+. Set to true when the target is a
|
|
368
|
+
* Contained Database, e.g. AzureSQL.
|
|
369
|
+
* See the [Vault
|
|
370
|
+
* docs](https://www.vaultproject.io/api/secret/databases/mssql#contained_db)
|
|
371
|
+
*/
|
|
372
|
+
containedDb?: pulumi.Input<boolean>;
|
|
320
373
|
/**
|
|
321
374
|
* The maximum number of seconds to keep
|
|
322
375
|
* a connection alive for.
|
package/types/output.d.ts
CHANGED
|
@@ -212,6 +212,52 @@ export declare namespace database {
|
|
|
212
212
|
*/
|
|
213
213
|
maxOpenConnections?: number;
|
|
214
214
|
}
|
|
215
|
+
interface SecretBackendConnectionInfluxdb {
|
|
216
|
+
/**
|
|
217
|
+
* The number of seconds to use as a connection
|
|
218
|
+
* timeout.
|
|
219
|
+
*/
|
|
220
|
+
connectTimeout?: number;
|
|
221
|
+
/**
|
|
222
|
+
* The host to connect to.
|
|
223
|
+
*/
|
|
224
|
+
host: string;
|
|
225
|
+
/**
|
|
226
|
+
* Whether to skip verification of the server
|
|
227
|
+
* certificate when using TLS.
|
|
228
|
+
*/
|
|
229
|
+
insecureTls?: boolean;
|
|
230
|
+
/**
|
|
231
|
+
* The password to be used in the connection.
|
|
232
|
+
*/
|
|
233
|
+
password: string;
|
|
234
|
+
/**
|
|
235
|
+
* Concatenated PEM blocks configuring the certificate
|
|
236
|
+
* chain.
|
|
237
|
+
*/
|
|
238
|
+
pemBundle?: string;
|
|
239
|
+
/**
|
|
240
|
+
* A JSON structure configuring the certificate chain.
|
|
241
|
+
*/
|
|
242
|
+
pemJson?: string;
|
|
243
|
+
/**
|
|
244
|
+
* The default port to connect to if no port is specified as
|
|
245
|
+
* part of the host.
|
|
246
|
+
*/
|
|
247
|
+
port?: number;
|
|
248
|
+
/**
|
|
249
|
+
* Whether to use TLS when connecting to Cassandra.
|
|
250
|
+
*/
|
|
251
|
+
tls?: boolean;
|
|
252
|
+
/**
|
|
253
|
+
* The username to be used in the connection (the account admin level).
|
|
254
|
+
*/
|
|
255
|
+
username: string;
|
|
256
|
+
/**
|
|
257
|
+
* - [Template](https://www.vaultproject.io/docs/concepts/username-templating) describing how dynamic usernames are generated.
|
|
258
|
+
*/
|
|
259
|
+
usernameTemplate?: string;
|
|
260
|
+
}
|
|
215
261
|
interface SecretBackendConnectionMongodb {
|
|
216
262
|
/**
|
|
217
263
|
* A URL containing connection information. See
|
|
@@ -262,6 +308,13 @@ export declare namespace database {
|
|
|
262
308
|
* for an example.
|
|
263
309
|
*/
|
|
264
310
|
connectionUrl?: string;
|
|
311
|
+
/**
|
|
312
|
+
* For Vault v1.9+. Set to true when the target is a
|
|
313
|
+
* Contained Database, e.g. AzureSQL.
|
|
314
|
+
* See the [Vault
|
|
315
|
+
* docs](https://www.vaultproject.io/api/secret/databases/mssql#contained_db)
|
|
316
|
+
*/
|
|
317
|
+
containedDb?: boolean;
|
|
265
318
|
/**
|
|
266
319
|
* The maximum number of seconds to keep
|
|
267
320
|
* a connection alive for.
|