@pulumi/vault 5.3.0 → 5.4.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/approle/authBackendRoleSecretID.d.ts +15 -0
- package/approle/authBackendRoleSecretID.js +2 -0
- package/approle/authBackendRoleSecretID.js.map +1 -1
- package/azure/getAccessCredentials.d.ts +26 -4
- package/azure/getAccessCredentials.js +2 -0
- package/azure/getAccessCredentials.js.map +1 -1
- package/consul/secretBackendRole.d.ts +48 -3
- package/consul/secretBackendRole.js +6 -3
- package/consul/secretBackendRole.js.map +1 -1
- package/database/secretBackendConnection.d.ts +3 -9
- package/database/secretBackendConnection.js.map +1 -1
- package/github/authBackend.d.ts +15 -0
- package/github/authBackend.js +2 -0
- package/github/authBackend.js.map +1 -1
- package/identity/getOidcClientCreds.d.ts +39 -0
- package/identity/getOidcClientCreds.js +22 -0
- package/identity/getOidcClientCreds.js.map +1 -0
- package/identity/getOidcOpenidConfig.d.ts +81 -0
- package/identity/getOidcOpenidConfig.js +22 -0
- package/identity/getOidcOpenidConfig.js.map +1 -0
- package/identity/getOidcPublicKeys.d.ts +38 -0
- package/identity/getOidcPublicKeys.js +22 -0
- package/identity/getOidcPublicKeys.js.map +1 -0
- package/identity/index.d.ts +7 -0
- package/identity/index.js +23 -0
- package/identity/index.js.map +1 -1
- package/identity/oidcAssignment.d.ts +104 -0
- package/identity/oidcAssignment.js +85 -0
- package/identity/oidcAssignment.js.map +1 -0
- package/identity/oidcClient.d.ts +188 -0
- package/identity/oidcClient.js +99 -0
- package/identity/oidcClient.js.map +1 -0
- package/identity/oidcProvider.d.ts +163 -0
- package/identity/oidcProvider.js +111 -0
- package/identity/oidcProvider.js.map +1 -0
- package/identity/oidcScope.d.ts +98 -0
- package/identity/oidcScope.js +79 -0
- package/identity/oidcScope.js.map +1 -0
- package/package.json +2 -2
- package/package.json.dev +2 -2
- package/transit/secretBackendKey.d.ts +15 -0
- package/transit/secretBackendKey.js +2 -0
- package/transit/secretBackendKey.js.map +1 -1
- package/types/input.d.ts +16 -0
- package/types/output.d.ts +16 -0
|
@@ -73,6 +73,11 @@ export declare class AuthBackendRoleSecretID extends pulumi.CustomResource {
|
|
|
73
73
|
* mode. Defaults to Vault auto-generating SecretIDs.
|
|
74
74
|
*/
|
|
75
75
|
readonly secretId: pulumi.Output<string>;
|
|
76
|
+
/**
|
|
77
|
+
* Use the wrapped secret-id accessor as the id of this resource. If false, a fresh secret-id will be regenerated whenever
|
|
78
|
+
* the wrapping token is expired or invalidated through unwrapping.
|
|
79
|
+
*/
|
|
80
|
+
readonly withWrappedAccessor: pulumi.Output<boolean | undefined>;
|
|
76
81
|
/**
|
|
77
82
|
* The unique ID for the response-wrapped SecretID that can
|
|
78
83
|
* be safely logged.
|
|
@@ -129,6 +134,11 @@ export interface AuthBackendRoleSecretIDState {
|
|
|
129
134
|
* mode. Defaults to Vault auto-generating SecretIDs.
|
|
130
135
|
*/
|
|
131
136
|
secretId?: pulumi.Input<string>;
|
|
137
|
+
/**
|
|
138
|
+
* Use the wrapped secret-id accessor as the id of this resource. If false, a fresh secret-id will be regenerated whenever
|
|
139
|
+
* the wrapping token is expired or invalidated through unwrapping.
|
|
140
|
+
*/
|
|
141
|
+
withWrappedAccessor?: pulumi.Input<boolean>;
|
|
132
142
|
/**
|
|
133
143
|
* The unique ID for the response-wrapped SecretID that can
|
|
134
144
|
* be safely logged.
|
|
@@ -173,6 +183,11 @@ export interface AuthBackendRoleSecretIDArgs {
|
|
|
173
183
|
* mode. Defaults to Vault auto-generating SecretIDs.
|
|
174
184
|
*/
|
|
175
185
|
secretId?: pulumi.Input<string>;
|
|
186
|
+
/**
|
|
187
|
+
* Use the wrapped secret-id accessor as the id of this resource. If false, a fresh secret-id will be regenerated whenever
|
|
188
|
+
* the wrapping token is expired or invalidated through unwrapping.
|
|
189
|
+
*/
|
|
190
|
+
withWrappedAccessor?: pulumi.Input<boolean>;
|
|
176
191
|
/**
|
|
177
192
|
* If set, the SecretID response will be
|
|
178
193
|
* [response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)
|
|
@@ -48,6 +48,7 @@ class AuthBackendRoleSecretID extends pulumi.CustomResource {
|
|
|
48
48
|
resourceInputs["metadata"] = state ? state.metadata : undefined;
|
|
49
49
|
resourceInputs["roleName"] = state ? state.roleName : undefined;
|
|
50
50
|
resourceInputs["secretId"] = state ? state.secretId : undefined;
|
|
51
|
+
resourceInputs["withWrappedAccessor"] = state ? state.withWrappedAccessor : undefined;
|
|
51
52
|
resourceInputs["wrappingAccessor"] = state ? state.wrappingAccessor : undefined;
|
|
52
53
|
resourceInputs["wrappingToken"] = state ? state.wrappingToken : undefined;
|
|
53
54
|
resourceInputs["wrappingTtl"] = state ? state.wrappingTtl : undefined;
|
|
@@ -62,6 +63,7 @@ class AuthBackendRoleSecretID extends pulumi.CustomResource {
|
|
|
62
63
|
resourceInputs["metadata"] = args ? args.metadata : undefined;
|
|
63
64
|
resourceInputs["roleName"] = args ? args.roleName : undefined;
|
|
64
65
|
resourceInputs["secretId"] = args ? args.secretId : undefined;
|
|
66
|
+
resourceInputs["withWrappedAccessor"] = args ? args.withWrappedAccessor : undefined;
|
|
65
67
|
resourceInputs["wrappingTtl"] = args ? args.wrappingTtl : undefined;
|
|
66
68
|
resourceInputs["accessor"] = undefined /*out*/;
|
|
67
69
|
resourceInputs["wrappingAccessor"] = undefined /*out*/;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"authBackendRoleSecretID.js","sourceRoot":"","sources":["../../approle/authBackendRoleSecretID.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA8BG;AACH,MAAa,uBAAwB,SAAQ,MAAM,CAAC,cAAc;
|
|
1
|
+
{"version":3,"file":"authBackendRoleSecretID.js","sourceRoot":"","sources":["../../approle/authBackendRoleSecretID.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA8BG;AACH,MAAa,uBAAwB,SAAQ,MAAM,CAAC,cAAc;IAqF9D,YAAY,IAAY,EAAE,WAAwE,EAAE,IAAmC;QACnI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAuD,CAAC;YACtE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;SACzE;aAAM;YACH,MAAM,IAAI,GAAG,WAAsD,CAAC;YACpE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,UAAU,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC/C,cAAc,CAAC,kBAAkB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACvD,cAAc,CAAC,eAAe,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACvD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,uBAAuB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC5E,CAAC;IArHD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAoC,EAAE,IAAmC;QAClI,OAAO,IAAI,uBAAuB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC9E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,uBAAuB,CAAC,YAAY,CAAC;IACxE,CAAC;;AA1BL,0DAuHC;AAzGG,gBAAgB;AACO,oCAAY,GAAG,+DAA+D,CAAC"}
|
|
@@ -12,13 +12,13 @@ export interface GetAccessCredentialsArgs {
|
|
|
12
12
|
/**
|
|
13
13
|
* If 'validate_creds' is true,
|
|
14
14
|
* the number of seconds after which to give up validating credentials. Defaults
|
|
15
|
-
* to
|
|
15
|
+
* to 300.
|
|
16
16
|
*/
|
|
17
17
|
maxCredValidationSeconds?: number;
|
|
18
18
|
/**
|
|
19
19
|
* If 'validate_creds' is true,
|
|
20
20
|
* the number of seconds to wait between each test of generated credentials.
|
|
21
|
-
* Defaults to
|
|
21
|
+
* Defaults to 1.
|
|
22
22
|
*/
|
|
23
23
|
numSecondsBetweenTests?: number;
|
|
24
24
|
/**
|
|
@@ -32,6 +32,16 @@ export interface GetAccessCredentialsArgs {
|
|
|
32
32
|
* credentials from, with no leading or trailing `/`s.
|
|
33
33
|
*/
|
|
34
34
|
role: string;
|
|
35
|
+
/**
|
|
36
|
+
* The subscription ID to use during credential
|
|
37
|
+
* validation. Defaults to the subscription ID configured in the Vault `backend`.
|
|
38
|
+
*/
|
|
39
|
+
subscriptionId?: string;
|
|
40
|
+
/**
|
|
41
|
+
* The tenant ID to use during credential validation.
|
|
42
|
+
* Defaults to the tenant ID configured in the Vault `backend`.
|
|
43
|
+
*/
|
|
44
|
+
tenantId?: string;
|
|
35
45
|
/**
|
|
36
46
|
* Whether generated credentials should be
|
|
37
47
|
* validated before being returned. Defaults to `false`, which returns
|
|
@@ -73,6 +83,8 @@ export interface GetAccessCredentialsResult {
|
|
|
73
83
|
readonly numSecondsBetweenTests?: number;
|
|
74
84
|
readonly numSequentialSuccesses?: number;
|
|
75
85
|
readonly role: string;
|
|
86
|
+
readonly subscriptionId?: string;
|
|
87
|
+
readonly tenantId?: string;
|
|
76
88
|
readonly validateCreds?: boolean;
|
|
77
89
|
}
|
|
78
90
|
export declare function getAccessCredentialsOutput(args: GetAccessCredentialsOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output<GetAccessCredentialsResult>;
|
|
@@ -88,13 +100,13 @@ export interface GetAccessCredentialsOutputArgs {
|
|
|
88
100
|
/**
|
|
89
101
|
* If 'validate_creds' is true,
|
|
90
102
|
* the number of seconds after which to give up validating credentials. Defaults
|
|
91
|
-
* to
|
|
103
|
+
* to 300.
|
|
92
104
|
*/
|
|
93
105
|
maxCredValidationSeconds?: pulumi.Input<number>;
|
|
94
106
|
/**
|
|
95
107
|
* If 'validate_creds' is true,
|
|
96
108
|
* the number of seconds to wait between each test of generated credentials.
|
|
97
|
-
* Defaults to
|
|
109
|
+
* Defaults to 1.
|
|
98
110
|
*/
|
|
99
111
|
numSecondsBetweenTests?: pulumi.Input<number>;
|
|
100
112
|
/**
|
|
@@ -108,6 +120,16 @@ export interface GetAccessCredentialsOutputArgs {
|
|
|
108
120
|
* credentials from, with no leading or trailing `/`s.
|
|
109
121
|
*/
|
|
110
122
|
role: pulumi.Input<string>;
|
|
123
|
+
/**
|
|
124
|
+
* The subscription ID to use during credential
|
|
125
|
+
* validation. Defaults to the subscription ID configured in the Vault `backend`.
|
|
126
|
+
*/
|
|
127
|
+
subscriptionId?: pulumi.Input<string>;
|
|
128
|
+
/**
|
|
129
|
+
* The tenant ID to use during credential validation.
|
|
130
|
+
* Defaults to the tenant ID configured in the Vault `backend`.
|
|
131
|
+
*/
|
|
132
|
+
tenantId?: pulumi.Input<string>;
|
|
111
133
|
/**
|
|
112
134
|
* Whether generated credentials should be
|
|
113
135
|
* validated before being returned. Defaults to `false`, which returns
|
|
@@ -16,6 +16,8 @@ function getAccessCredentials(args, opts) {
|
|
|
16
16
|
"numSecondsBetweenTests": args.numSecondsBetweenTests,
|
|
17
17
|
"numSequentialSuccesses": args.numSequentialSuccesses,
|
|
18
18
|
"role": args.role,
|
|
19
|
+
"subscriptionId": args.subscriptionId,
|
|
20
|
+
"tenantId": args.tenantId,
|
|
19
21
|
"validateCreds": args.validateCreds,
|
|
20
22
|
}, opts);
|
|
21
23
|
}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getAccessCredentials.js","sourceRoot":"","sources":["../../azure/getAccessCredentials.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,SAAgB,oBAAoB,CAAC,IAA8B,EAAE,IAA2B;IAC5F,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,uDAAuD,EAAE;QAClF,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,0BAA0B,EAAE,IAAI,CAAC,wBAAwB;QACzD,wBAAwB,EAAE,IAAI,CAAC,sBAAsB;QACrD,wBAAwB,EAAE,IAAI,CAAC,sBAAsB;QACrD,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,eAAe,EAAE,IAAI,CAAC,aAAa;KACtC,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;
|
|
1
|
+
{"version":3,"file":"getAccessCredentials.js","sourceRoot":"","sources":["../../azure/getAccessCredentials.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,SAAgB,oBAAoB,CAAC,IAA8B,EAAE,IAA2B;IAC5F,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,uDAAuD,EAAE;QAClF,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,0BAA0B,EAAE,IAAI,CAAC,wBAAwB;QACzD,wBAAwB,EAAE,IAAI,CAAC,sBAAsB;QACrD,wBAAwB,EAAE,IAAI,CAAC,sBAAsB;QACrD,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,gBAAgB,EAAE,IAAI,CAAC,cAAc;QACrC,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,eAAe,EAAE,IAAI,CAAC,aAAa;KACtC,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAhBD,oDAgBC;AA2FD,SAAgB,0BAA0B,CAAC,IAAoC,EAAE,IAA2B;IACxG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,oBAAoB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACxE,CAAC;AAFD,gEAEC"}
|
|
@@ -48,6 +48,16 @@ export declare class SecretBackendRole extends pulumi.CustomResource {
|
|
|
48
48
|
* The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
|
|
49
49
|
*/
|
|
50
50
|
readonly backend: pulumi.Output<string | undefined>;
|
|
51
|
+
/**
|
|
52
|
+
* The Consul namespace that the token will be created in.
|
|
53
|
+
* Applicable for Vault 1.10+ and Consul 1.7+",
|
|
54
|
+
*/
|
|
55
|
+
readonly consulNamespace: pulumi.Output<string>;
|
|
56
|
+
/**
|
|
57
|
+
* Set of Consul roles to attach to the token.
|
|
58
|
+
* Applicable for Vault 1.10+ with Consul 1.5+.
|
|
59
|
+
*/
|
|
60
|
+
readonly consulRoles: pulumi.Output<string[] | undefined>;
|
|
51
61
|
/**
|
|
52
62
|
* Indicates that the token should not be replicated globally and instead be local to the current datacenter.
|
|
53
63
|
*/
|
|
@@ -60,10 +70,15 @@ export declare class SecretBackendRole extends pulumi.CustomResource {
|
|
|
60
70
|
* The name of the Consul secrets engine role to create.
|
|
61
71
|
*/
|
|
62
72
|
readonly name: pulumi.Output<string>;
|
|
73
|
+
/**
|
|
74
|
+
* The admin partition that the token will be created in.
|
|
75
|
+
* Applicable for Vault 1.10+ and Consul 1.11+",
|
|
76
|
+
*/
|
|
77
|
+
readonly partition: pulumi.Output<string>;
|
|
63
78
|
/**
|
|
64
79
|
* The list of Consul ACL policies to associate with these roles.
|
|
65
80
|
*/
|
|
66
|
-
readonly policies: pulumi.Output<string[]>;
|
|
81
|
+
readonly policies: pulumi.Output<string[] | undefined>;
|
|
67
82
|
/**
|
|
68
83
|
* Specifies the type of token to create when using this role. Valid values are "client" or "management".
|
|
69
84
|
*/
|
|
@@ -79,7 +94,7 @@ export declare class SecretBackendRole extends pulumi.CustomResource {
|
|
|
79
94
|
* @param args The arguments to use to populate this resource's properties.
|
|
80
95
|
* @param opts A bag of options that control this resource's behavior.
|
|
81
96
|
*/
|
|
82
|
-
constructor(name: string, args
|
|
97
|
+
constructor(name: string, args?: SecretBackendRoleArgs, opts?: pulumi.CustomResourceOptions);
|
|
83
98
|
}
|
|
84
99
|
/**
|
|
85
100
|
* Input properties used for looking up and filtering SecretBackendRole resources.
|
|
@@ -89,6 +104,16 @@ export interface SecretBackendRoleState {
|
|
|
89
104
|
* The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
|
|
90
105
|
*/
|
|
91
106
|
backend?: pulumi.Input<string>;
|
|
107
|
+
/**
|
|
108
|
+
* The Consul namespace that the token will be created in.
|
|
109
|
+
* Applicable for Vault 1.10+ and Consul 1.7+",
|
|
110
|
+
*/
|
|
111
|
+
consulNamespace?: pulumi.Input<string>;
|
|
112
|
+
/**
|
|
113
|
+
* Set of Consul roles to attach to the token.
|
|
114
|
+
* Applicable for Vault 1.10+ with Consul 1.5+.
|
|
115
|
+
*/
|
|
116
|
+
consulRoles?: pulumi.Input<pulumi.Input<string>[]>;
|
|
92
117
|
/**
|
|
93
118
|
* Indicates that the token should not be replicated globally and instead be local to the current datacenter.
|
|
94
119
|
*/
|
|
@@ -101,6 +126,11 @@ export interface SecretBackendRoleState {
|
|
|
101
126
|
* The name of the Consul secrets engine role to create.
|
|
102
127
|
*/
|
|
103
128
|
name?: pulumi.Input<string>;
|
|
129
|
+
/**
|
|
130
|
+
* The admin partition that the token will be created in.
|
|
131
|
+
* Applicable for Vault 1.10+ and Consul 1.11+",
|
|
132
|
+
*/
|
|
133
|
+
partition?: pulumi.Input<string>;
|
|
104
134
|
/**
|
|
105
135
|
* The list of Consul ACL policies to associate with these roles.
|
|
106
136
|
*/
|
|
@@ -122,6 +152,16 @@ export interface SecretBackendRoleArgs {
|
|
|
122
152
|
* The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
|
|
123
153
|
*/
|
|
124
154
|
backend?: pulumi.Input<string>;
|
|
155
|
+
/**
|
|
156
|
+
* The Consul namespace that the token will be created in.
|
|
157
|
+
* Applicable for Vault 1.10+ and Consul 1.7+",
|
|
158
|
+
*/
|
|
159
|
+
consulNamespace?: pulumi.Input<string>;
|
|
160
|
+
/**
|
|
161
|
+
* Set of Consul roles to attach to the token.
|
|
162
|
+
* Applicable for Vault 1.10+ with Consul 1.5+.
|
|
163
|
+
*/
|
|
164
|
+
consulRoles?: pulumi.Input<pulumi.Input<string>[]>;
|
|
125
165
|
/**
|
|
126
166
|
* Indicates that the token should not be replicated globally and instead be local to the current datacenter.
|
|
127
167
|
*/
|
|
@@ -134,10 +174,15 @@ export interface SecretBackendRoleArgs {
|
|
|
134
174
|
* The name of the Consul secrets engine role to create.
|
|
135
175
|
*/
|
|
136
176
|
name?: pulumi.Input<string>;
|
|
177
|
+
/**
|
|
178
|
+
* The admin partition that the token will be created in.
|
|
179
|
+
* Applicable for Vault 1.10+ and Consul 1.11+",
|
|
180
|
+
*/
|
|
181
|
+
partition?: pulumi.Input<string>;
|
|
137
182
|
/**
|
|
138
183
|
* The list of Consul ACL policies to associate with these roles.
|
|
139
184
|
*/
|
|
140
|
-
policies
|
|
185
|
+
policies?: pulumi.Input<pulumi.Input<string>[]>;
|
|
141
186
|
/**
|
|
142
187
|
* Specifies the type of token to create when using this role. Valid values are "client" or "management".
|
|
143
188
|
*/
|
|
@@ -41,22 +41,25 @@ class SecretBackendRole extends pulumi.CustomResource {
|
|
|
41
41
|
if (opts.id) {
|
|
42
42
|
const state = argsOrState;
|
|
43
43
|
resourceInputs["backend"] = state ? state.backend : undefined;
|
|
44
|
+
resourceInputs["consulNamespace"] = state ? state.consulNamespace : undefined;
|
|
45
|
+
resourceInputs["consulRoles"] = state ? state.consulRoles : undefined;
|
|
44
46
|
resourceInputs["local"] = state ? state.local : undefined;
|
|
45
47
|
resourceInputs["maxTtl"] = state ? state.maxTtl : undefined;
|
|
46
48
|
resourceInputs["name"] = state ? state.name : undefined;
|
|
49
|
+
resourceInputs["partition"] = state ? state.partition : undefined;
|
|
47
50
|
resourceInputs["policies"] = state ? state.policies : undefined;
|
|
48
51
|
resourceInputs["tokenType"] = state ? state.tokenType : undefined;
|
|
49
52
|
resourceInputs["ttl"] = state ? state.ttl : undefined;
|
|
50
53
|
}
|
|
51
54
|
else {
|
|
52
55
|
const args = argsOrState;
|
|
53
|
-
if ((!args || args.policies === undefined) && !opts.urn) {
|
|
54
|
-
throw new Error("Missing required property 'policies'");
|
|
55
|
-
}
|
|
56
56
|
resourceInputs["backend"] = args ? args.backend : undefined;
|
|
57
|
+
resourceInputs["consulNamespace"] = args ? args.consulNamespace : undefined;
|
|
58
|
+
resourceInputs["consulRoles"] = args ? args.consulRoles : undefined;
|
|
57
59
|
resourceInputs["local"] = args ? args.local : undefined;
|
|
58
60
|
resourceInputs["maxTtl"] = args ? args.maxTtl : undefined;
|
|
59
61
|
resourceInputs["name"] = args ? args.name : undefined;
|
|
62
|
+
resourceInputs["partition"] = args ? args.partition : undefined;
|
|
60
63
|
resourceInputs["policies"] = args ? args.policies : undefined;
|
|
61
64
|
resourceInputs["tokenType"] = args ? args.tokenType : undefined;
|
|
62
65
|
resourceInputs["ttl"] = args ? args.ttl : undefined;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretBackendRole.js","sourceRoot":"","sources":["../../consul/secretBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA4BG;AACH,MAAa,iBAAkB,SAAQ,MAAM,CAAC,cAAc;
|
|
1
|
+
{"version":3,"file":"secretBackendRole.js","sourceRoot":"","sources":["../../consul/secretBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA4BG;AACH,MAAa,iBAAkB,SAAQ,MAAM,CAAC,cAAc;IAgFxD,YAAY,IAAY,EAAE,WAA4D,EAAE,IAAmC;QACvH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAiD,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACzD;aAAM;YACH,MAAM,IAAI,GAAG,WAAgD,CAAC;YAC9D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACvD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,iBAAiB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACtE,CAAC;IA7GD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA8B,EAAE,IAAmC;QAC5H,OAAO,IAAI,iBAAiB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACxE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,iBAAiB,CAAC,YAAY,CAAC;IAClE,CAAC;;AA1BL,8CA+GC;AAjGG,gBAAgB;AACO,8BAAY,GAAG,kDAAkD,CAAC"}
|
|
@@ -97,9 +97,7 @@ export declare class SecretBackendConnection extends pulumi.CustomResource {
|
|
|
97
97
|
*/
|
|
98
98
|
readonly oracle: pulumi.Output<outputs.database.SecretBackendConnectionOracle | undefined>;
|
|
99
99
|
/**
|
|
100
|
-
* Specifies the name of the plugin to use.
|
|
101
|
-
* to match the corresponding database engine directive.
|
|
102
|
-
* For example the `pluginName` for the `mysqlAurora` engine must begin with `mysql-aurora`. Note the hyphenation.
|
|
100
|
+
* Specifies the name of the plugin to use.
|
|
103
101
|
*/
|
|
104
102
|
readonly pluginName: pulumi.Output<string>;
|
|
105
103
|
/**
|
|
@@ -208,9 +206,7 @@ export interface SecretBackendConnectionState {
|
|
|
208
206
|
*/
|
|
209
207
|
oracle?: pulumi.Input<inputs.database.SecretBackendConnectionOracle>;
|
|
210
208
|
/**
|
|
211
|
-
* Specifies the name of the plugin to use.
|
|
212
|
-
* to match the corresponding database engine directive.
|
|
213
|
-
* For example the `pluginName` for the `mysqlAurora` engine must begin with `mysql-aurora`. Note the hyphenation.
|
|
209
|
+
* Specifies the name of the plugin to use.
|
|
214
210
|
*/
|
|
215
211
|
pluginName?: pulumi.Input<string>;
|
|
216
212
|
/**
|
|
@@ -311,9 +307,7 @@ export interface SecretBackendConnectionArgs {
|
|
|
311
307
|
*/
|
|
312
308
|
oracle?: pulumi.Input<inputs.database.SecretBackendConnectionOracle>;
|
|
313
309
|
/**
|
|
314
|
-
* Specifies the name of the plugin to use.
|
|
315
|
-
* to match the corresponding database engine directive.
|
|
316
|
-
* For example the `pluginName` for the `mysqlAurora` engine must begin with `mysql-aurora`. Note the hyphenation.
|
|
310
|
+
* Specifies the name of the plugin to use.
|
|
317
311
|
*/
|
|
318
312
|
pluginName?: pulumi.Input<string>;
|
|
319
313
|
/**
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretBackendConnection.js","sourceRoot":"","sources":["../../database/secretBackendConnection.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAEzC,0CAA0C;AAE1C;;;;;;;;GAQG;AACH,MAAa,uBAAwB,SAAQ,MAAM,CAAC,cAAc;
|
|
1
|
+
{"version":3,"file":"secretBackendConnection.js","sourceRoot":"","sources":["../../database/secretBackendConnection.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAEzC,0CAA0C;AAE1C;;;;;;;;GAQG;AACH,MAAa,uBAAwB,SAAQ,MAAM,CAAC,cAAc;IAmI9D,YAAY,IAAY,EAAE,WAAwE,EAAE,IAAmC;QACnI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAuD,CAAC;YACtE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;SACnF;aAAM;YACH,MAAM,IAAI,GAAG,WAAsD,CAAC;YACpE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;SACjF;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,uBAAuB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC5E,CAAC;IA7LD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAoC,EAAE,IAAmC;QAClI,OAAO,IAAI,uBAAuB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC9E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,uBAAuB,CAAC,YAAY,CAAC;IACxE,CAAC;;AA1BL,0DA+LC;AAjLG,gBAAgB;AACO,oCAAY,GAAG,gEAAgE,CAAC"}
|
package/github/authBackend.d.ts
CHANGED
|
@@ -58,6 +58,11 @@ export declare class AuthBackend extends pulumi.CustomResource {
|
|
|
58
58
|
* The organization configured users must be part of.
|
|
59
59
|
*/
|
|
60
60
|
readonly organization: pulumi.Output<string>;
|
|
61
|
+
/**
|
|
62
|
+
* The ID of the organization users must be part of.
|
|
63
|
+
* Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
|
|
64
|
+
*/
|
|
65
|
+
readonly organizationId: pulumi.Output<number>;
|
|
61
66
|
/**
|
|
62
67
|
* Path where the auth backend is mounted. Defaults to `auth/github`
|
|
63
68
|
* if not specified.
|
|
@@ -149,6 +154,11 @@ export interface AuthBackendState {
|
|
|
149
154
|
* The organization configured users must be part of.
|
|
150
155
|
*/
|
|
151
156
|
organization?: pulumi.Input<string>;
|
|
157
|
+
/**
|
|
158
|
+
* The ID of the organization users must be part of.
|
|
159
|
+
* Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
|
|
160
|
+
*/
|
|
161
|
+
organizationId?: pulumi.Input<number>;
|
|
152
162
|
/**
|
|
153
163
|
* Path where the auth backend is mounted. Defaults to `auth/github`
|
|
154
164
|
* if not specified.
|
|
@@ -228,6 +238,11 @@ export interface AuthBackendArgs {
|
|
|
228
238
|
* The organization configured users must be part of.
|
|
229
239
|
*/
|
|
230
240
|
organization: pulumi.Input<string>;
|
|
241
|
+
/**
|
|
242
|
+
* The ID of the organization users must be part of.
|
|
243
|
+
* Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
|
|
244
|
+
*/
|
|
245
|
+
organizationId?: pulumi.Input<number>;
|
|
231
246
|
/**
|
|
232
247
|
* Path where the auth backend is mounted. Defaults to `auth/github`
|
|
233
248
|
* if not specified.
|
package/github/authBackend.js
CHANGED
|
@@ -39,6 +39,7 @@ class AuthBackend extends pulumi.CustomResource {
|
|
|
39
39
|
resourceInputs["baseUrl"] = state ? state.baseUrl : undefined;
|
|
40
40
|
resourceInputs["description"] = state ? state.description : undefined;
|
|
41
41
|
resourceInputs["organization"] = state ? state.organization : undefined;
|
|
42
|
+
resourceInputs["organizationId"] = state ? state.organizationId : undefined;
|
|
42
43
|
resourceInputs["path"] = state ? state.path : undefined;
|
|
43
44
|
resourceInputs["tokenBoundCidrs"] = state ? state.tokenBoundCidrs : undefined;
|
|
44
45
|
resourceInputs["tokenExplicitMaxTtl"] = state ? state.tokenExplicitMaxTtl : undefined;
|
|
@@ -59,6 +60,7 @@ class AuthBackend extends pulumi.CustomResource {
|
|
|
59
60
|
resourceInputs["baseUrl"] = args ? args.baseUrl : undefined;
|
|
60
61
|
resourceInputs["description"] = args ? args.description : undefined;
|
|
61
62
|
resourceInputs["organization"] = args ? args.organization : undefined;
|
|
63
|
+
resourceInputs["organizationId"] = args ? args.organizationId : undefined;
|
|
62
64
|
resourceInputs["path"] = args ? args.path : undefined;
|
|
63
65
|
resourceInputs["tokenBoundCidrs"] = args ? args.tokenBoundCidrs : undefined;
|
|
64
66
|
resourceInputs["tokenExplicitMaxTtl"] = args ? args.tokenExplicitMaxTtl : undefined;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"authBackend.js","sourceRoot":"","sources":["../../github/authBackend.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAEzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;GAuBG;AACH,MAAa,WAAY,SAAQ,MAAM,CAAC,cAAc;
|
|
1
|
+
{"version":3,"file":"authBackend.js","sourceRoot":"","sources":["../../github/authBackend.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAEzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;GAuBG;AACH,MAAa,WAAY,SAAQ,MAAM,CAAC,cAAc;IAwHlD,YAAY,IAAY,EAAE,WAAgD,EAAE,IAAmC;QAC3G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA2C,CAAC;YAC1D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3D;aAAM;YACH,MAAM,IAAI,GAAG,WAA0C,CAAC;YACxD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,YAAY,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACzD,MAAM,IAAI,KAAK,CAAC,0CAA0C,CAAC,CAAC;aAC/D;YACD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,UAAU,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAClD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,WAAW,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAChE,CAAC;IApKD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAwB,EAAE,IAAmC;QACtH,OAAO,IAAI,WAAW,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAClE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,WAAW,CAAC,YAAY,CAAC;IAC5D,CAAC;;AA1BL,kCAsKC;AAxJG,gBAAgB;AACO,wBAAY,GAAG,sCAAsC,CAAC"}
|
|
@@ -0,0 +1,39 @@
|
|
|
1
|
+
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
export declare function getOidcClientCreds(args: GetOidcClientCredsArgs, opts?: pulumi.InvokeOptions): Promise<GetOidcClientCredsResult>;
|
|
3
|
+
/**
|
|
4
|
+
* A collection of arguments for invoking getOidcClientCreds.
|
|
5
|
+
*/
|
|
6
|
+
export interface GetOidcClientCredsArgs {
|
|
7
|
+
/**
|
|
8
|
+
* The name of the OIDC Client in Vault.
|
|
9
|
+
*/
|
|
10
|
+
name: string;
|
|
11
|
+
}
|
|
12
|
+
/**
|
|
13
|
+
* A collection of values returned by getOidcClientCreds.
|
|
14
|
+
*/
|
|
15
|
+
export interface GetOidcClientCredsResult {
|
|
16
|
+
/**
|
|
17
|
+
* The Client ID returned by Vault.
|
|
18
|
+
*/
|
|
19
|
+
readonly clientId: string;
|
|
20
|
+
/**
|
|
21
|
+
* The Client Secret Key returned by Vault.
|
|
22
|
+
*/
|
|
23
|
+
readonly clientSecret: string;
|
|
24
|
+
/**
|
|
25
|
+
* The provider-assigned unique ID for this managed resource.
|
|
26
|
+
*/
|
|
27
|
+
readonly id: string;
|
|
28
|
+
readonly name: string;
|
|
29
|
+
}
|
|
30
|
+
export declare function getOidcClientCredsOutput(args: GetOidcClientCredsOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output<GetOidcClientCredsResult>;
|
|
31
|
+
/**
|
|
32
|
+
* A collection of arguments for invoking getOidcClientCreds.
|
|
33
|
+
*/
|
|
34
|
+
export interface GetOidcClientCredsOutputArgs {
|
|
35
|
+
/**
|
|
36
|
+
* The name of the OIDC Client in Vault.
|
|
37
|
+
*/
|
|
38
|
+
name: pulumi.Input<string>;
|
|
39
|
+
}
|
|
@@ -0,0 +1,22 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
|
+
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.getOidcClientCredsOutput = exports.getOidcClientCreds = void 0;
|
|
6
|
+
const pulumi = require("@pulumi/pulumi");
|
|
7
|
+
const utilities = require("../utilities");
|
|
8
|
+
function getOidcClientCreds(args, opts) {
|
|
9
|
+
if (!opts) {
|
|
10
|
+
opts = {};
|
|
11
|
+
}
|
|
12
|
+
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
13
|
+
return pulumi.runtime.invoke("vault:identity/getOidcClientCreds:getOidcClientCreds", {
|
|
14
|
+
"name": args.name,
|
|
15
|
+
}, opts);
|
|
16
|
+
}
|
|
17
|
+
exports.getOidcClientCreds = getOidcClientCreds;
|
|
18
|
+
function getOidcClientCredsOutput(args, opts) {
|
|
19
|
+
return pulumi.output(args).apply(a => getOidcClientCreds(a, opts));
|
|
20
|
+
}
|
|
21
|
+
exports.getOidcClientCredsOutput = getOidcClientCredsOutput;
|
|
22
|
+
//# sourceMappingURL=getOidcClientCreds.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"getOidcClientCreds.js","sourceRoot":"","sources":["../../identity/getOidcClientCreds.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,SAAgB,kBAAkB,CAAC,IAA4B,EAAE,IAA2B;IACxF,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,sDAAsD,EAAE;QACjF,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AATD,gDASC;AA+BD,SAAgB,wBAAwB,CAAC,IAAkC,EAAE,IAA2B;IACpG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,kBAAkB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACtE,CAAC;AAFD,4DAEC"}
|
|
@@ -0,0 +1,81 @@
|
|
|
1
|
+
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
export declare function getOidcOpenidConfig(args: GetOidcOpenidConfigArgs, opts?: pulumi.InvokeOptions): Promise<GetOidcOpenidConfigResult>;
|
|
3
|
+
/**
|
|
4
|
+
* A collection of arguments for invoking getOidcOpenidConfig.
|
|
5
|
+
*/
|
|
6
|
+
export interface GetOidcOpenidConfigArgs {
|
|
7
|
+
/**
|
|
8
|
+
* The name of the OIDC Provider in Vault.
|
|
9
|
+
*/
|
|
10
|
+
name: string;
|
|
11
|
+
}
|
|
12
|
+
/**
|
|
13
|
+
* A collection of values returned by getOidcOpenidConfig.
|
|
14
|
+
*/
|
|
15
|
+
export interface GetOidcOpenidConfigResult {
|
|
16
|
+
/**
|
|
17
|
+
* The Authorization Endpoint for the provider.
|
|
18
|
+
*/
|
|
19
|
+
readonly authorizationEndpoint: string;
|
|
20
|
+
/**
|
|
21
|
+
* The grant types supported by the provider.
|
|
22
|
+
*/
|
|
23
|
+
readonly grantTypesSupporteds: string[];
|
|
24
|
+
/**
|
|
25
|
+
* The provider-assigned unique ID for this managed resource.
|
|
26
|
+
*/
|
|
27
|
+
readonly id: string;
|
|
28
|
+
/**
|
|
29
|
+
* The signing algorithms supported by
|
|
30
|
+
* the provider.
|
|
31
|
+
*/
|
|
32
|
+
readonly idTokenSigningAlgValuesSupporteds: string[];
|
|
33
|
+
/**
|
|
34
|
+
* The URL of the issuer for the provider.
|
|
35
|
+
*/
|
|
36
|
+
readonly issuer: string;
|
|
37
|
+
/**
|
|
38
|
+
* The well known keys URI for the provider.
|
|
39
|
+
*/
|
|
40
|
+
readonly jwksUri: string;
|
|
41
|
+
readonly name: string;
|
|
42
|
+
/**
|
|
43
|
+
* Specifies whether Request URI Parameter is
|
|
44
|
+
* supported by the provider.
|
|
45
|
+
*/
|
|
46
|
+
readonly requestUriParameterSupported: boolean;
|
|
47
|
+
/**
|
|
48
|
+
* The response types supported by the provider.
|
|
49
|
+
*/
|
|
50
|
+
readonly responseTypesSupporteds: string[];
|
|
51
|
+
/**
|
|
52
|
+
* The scopes supported by the provider.
|
|
53
|
+
*/
|
|
54
|
+
readonly scopesSupporteds: string[];
|
|
55
|
+
/**
|
|
56
|
+
* The subject types supported by the provider.
|
|
57
|
+
*/
|
|
58
|
+
readonly subjectTypesSupporteds: string[];
|
|
59
|
+
/**
|
|
60
|
+
* The Token Endpoint for the provider.
|
|
61
|
+
*/
|
|
62
|
+
readonly tokenEndpoint: string;
|
|
63
|
+
/**
|
|
64
|
+
* The token endpoint auth methods supported by the provider.
|
|
65
|
+
*/
|
|
66
|
+
readonly tokenEndpointAuthMethodsSupporteds: string[];
|
|
67
|
+
/**
|
|
68
|
+
* The User Info Endpoint for the provider
|
|
69
|
+
*/
|
|
70
|
+
readonly userinfoEndpoint: string;
|
|
71
|
+
}
|
|
72
|
+
export declare function getOidcOpenidConfigOutput(args: GetOidcOpenidConfigOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output<GetOidcOpenidConfigResult>;
|
|
73
|
+
/**
|
|
74
|
+
* A collection of arguments for invoking getOidcOpenidConfig.
|
|
75
|
+
*/
|
|
76
|
+
export interface GetOidcOpenidConfigOutputArgs {
|
|
77
|
+
/**
|
|
78
|
+
* The name of the OIDC Provider in Vault.
|
|
79
|
+
*/
|
|
80
|
+
name: pulumi.Input<string>;
|
|
81
|
+
}
|
|
@@ -0,0 +1,22 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
|
+
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.getOidcOpenidConfigOutput = exports.getOidcOpenidConfig = void 0;
|
|
6
|
+
const pulumi = require("@pulumi/pulumi");
|
|
7
|
+
const utilities = require("../utilities");
|
|
8
|
+
function getOidcOpenidConfig(args, opts) {
|
|
9
|
+
if (!opts) {
|
|
10
|
+
opts = {};
|
|
11
|
+
}
|
|
12
|
+
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
13
|
+
return pulumi.runtime.invoke("vault:identity/getOidcOpenidConfig:getOidcOpenidConfig", {
|
|
14
|
+
"name": args.name,
|
|
15
|
+
}, opts);
|
|
16
|
+
}
|
|
17
|
+
exports.getOidcOpenidConfig = getOidcOpenidConfig;
|
|
18
|
+
function getOidcOpenidConfigOutput(args, opts) {
|
|
19
|
+
return pulumi.output(args).apply(a => getOidcOpenidConfig(a, opts));
|
|
20
|
+
}
|
|
21
|
+
exports.getOidcOpenidConfigOutput = getOidcOpenidConfigOutput;
|
|
22
|
+
//# sourceMappingURL=getOidcOpenidConfig.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"getOidcOpenidConfig.js","sourceRoot":"","sources":["../../identity/getOidcOpenidConfig.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,SAAgB,mBAAmB,CAAC,IAA6B,EAAE,IAA2B;IAC1F,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,wDAAwD,EAAE;QACnF,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AATD,kDASC;AAyED,SAAgB,yBAAyB,CAAC,IAAmC,EAAE,IAA2B;IACtG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,mBAAmB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACvE,CAAC;AAFD,8DAEC"}
|