@pulumi/vault 5.4.0 → 5.4.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/ad/secretBackend.d.ts +16 -0
- package/ad/secretBackend.js +16 -0
- package/ad/secretBackend.js.map +1 -1
- package/ad/secretLibrary.d.ts +62 -18
- package/ad/secretLibrary.js +35 -0
- package/ad/secretLibrary.js.map +1 -1
- package/ad/secretRole.d.ts +22 -0
- package/ad/secretRole.js +22 -0
- package/ad/secretRole.js.map +1 -1
- package/approle/authBackendRoleSecretID.d.ts +12 -10
- package/approle/authBackendRoleSecretID.js +3 -4
- package/approle/authBackendRoleSecretID.js.map +1 -1
- package/aws/authBackendClient.d.ts +14 -0
- package/aws/authBackendClient.js +14 -0
- package/aws/authBackendClient.js.map +1 -1
- package/aws/authBackendStsRole.d.ts +14 -0
- package/aws/authBackendStsRole.js +14 -0
- package/aws/authBackendStsRole.js.map +1 -1
- package/aws/getAccessCredentials.d.ts +31 -0
- package/aws/getAccessCredentials.js +31 -0
- package/aws/getAccessCredentials.js.map +1 -1
- package/aws/secretBackend.d.ts +12 -0
- package/aws/secretBackend.js +12 -0
- package/aws/secretBackend.js.map +1 -1
- package/aws/secretBackendRole.d.ts +27 -0
- package/aws/secretBackendRole.js +27 -0
- package/aws/secretBackendRole.js.map +1 -1
- package/azure/authBackendConfig.d.ts +16 -0
- package/azure/authBackendConfig.js +16 -0
- package/azure/authBackendConfig.js.map +1 -1
- package/azure/backend.d.ts +33 -0
- package/azure/backend.js +33 -0
- package/azure/backend.js.map +1 -1
- package/azure/backendRole.d.ts +32 -0
- package/azure/backendRole.js +32 -0
- package/azure/backendRole.js.map +1 -1
- package/azure/getAccessCredentials.d.ts +40 -0
- package/azure/getAccessCredentials.js +22 -0
- package/azure/getAccessCredentials.js.map +1 -1
- package/consul/secretBackend.d.ts +14 -0
- package/consul/secretBackend.js +14 -0
- package/consul/secretBackend.js.map +1 -1
- package/database/secretBackendConnection.d.ts +22 -0
- package/database/secretBackendConnection.js +22 -0
- package/database/secretBackendConnection.js.map +1 -1
- package/database/secretBackendRole.d.ts +27 -0
- package/database/secretBackendRole.js +27 -0
- package/database/secretBackendRole.js.map +1 -1
- package/gcp/secretBackend.d.ts +11 -0
- package/gcp/secretBackend.js +11 -0
- package/gcp/secretBackend.js.map +1 -1
- package/generic/endpoint.d.ts +52 -0
- package/generic/endpoint.js +52 -0
- package/generic/endpoint.js.map +1 -1
- package/generic/getSecret.d.ts +15 -0
- package/generic/getSecret.js +15 -0
- package/generic/getSecret.js.map +1 -1
- package/getNomadAccessToken.d.ts +27 -0
- package/getNomadAccessToken.js +27 -0
- package/getNomadAccessToken.js.map +1 -1
- package/identity/entity.d.ts +14 -0
- package/identity/entity.js +14 -0
- package/identity/entity.js.map +1 -1
- package/identity/entityAlias.d.ts +12 -0
- package/identity/entityAlias.js +12 -0
- package/identity/entityAlias.js.map +1 -1
- package/identity/getEntity.d.ts +15 -0
- package/identity/getEntity.js +15 -0
- package/identity/getEntity.js.map +1 -1
- package/identity/getGroup.d.ts +15 -0
- package/identity/getGroup.js +15 -0
- package/identity/getGroup.js.map +1 -1
- package/identity/getOidcClientCreds.d.ts +21 -0
- package/identity/getOidcClientCreds.js +21 -0
- package/identity/getOidcClientCreds.js.map +1 -1
- package/identity/getOidcOpenidConfig.d.ts +28 -0
- package/identity/getOidcOpenidConfig.js +28 -0
- package/identity/getOidcOpenidConfig.js.map +1 -1
- package/identity/getOidcPublicKeys.d.ts +28 -0
- package/identity/getOidcPublicKeys.js +28 -0
- package/identity/getOidcPublicKeys.js.map +1 -1
- package/identity/oidcKey.d.ts +14 -0
- package/identity/oidcKey.js +14 -0
- package/identity/oidcKey.js.map +1 -1
- package/identity/oidcKeyAllowedClientID.d.ts +15 -0
- package/identity/oidcKeyAllowedClientID.js +15 -0
- package/identity/oidcKeyAllowedClientID.js.map +1 -1
- package/identity/oidcRole.d.ts +36 -0
- package/identity/oidcRole.js +36 -0
- package/identity/oidcRole.js.map +1 -1
- package/nomadSecretBackend.d.ts +18 -0
- package/nomadSecretBackend.js +18 -0
- package/nomadSecretBackend.js.map +1 -1
- package/nomadSecretRole.d.ts +22 -0
- package/nomadSecretRole.js +22 -0
- package/nomadSecretRole.js.map +1 -1
- package/package.json +2 -2
- package/package.json.dev +2 -2
- package/pkisecret/secretBackendCert.d.ts +15 -0
- package/pkisecret/secretBackendCert.js +15 -0
- package/pkisecret/secretBackendCert.js.map +1 -1
- package/pkisecret/secretBackendConfigCa.d.ts +63 -0
- package/pkisecret/secretBackendConfigCa.js +63 -0
- package/pkisecret/secretBackendConfigCa.js.map +1 -1
- package/pkisecret/secretBackendIntermediateCertRequest.d.ts +16 -0
- package/pkisecret/secretBackendIntermediateCertRequest.js +16 -0
- package/pkisecret/secretBackendIntermediateCertRequest.js.map +1 -1
- package/pkisecret/secretBackendIntermediateSetSigned.d.ts +13 -0
- package/pkisecret/secretBackendIntermediateSetSigned.js +13 -0
- package/pkisecret/secretBackendIntermediateSetSigned.js.map +1 -1
- package/pkisecret/secretBackendRootCert.d.ts +24 -0
- package/pkisecret/secretBackendRootCert.js +24 -0
- package/pkisecret/secretBackendRootCert.js.map +1 -1
- package/pkisecret/secretBackendSign.d.ts +43 -0
- package/pkisecret/secretBackendSign.js +43 -0
- package/pkisecret/secretBackendSign.js.map +1 -1
- package/rabbitmq/secretBackend.d.ts +37 -0
- package/rabbitmq/secretBackend.js +17 -0
- package/rabbitmq/secretBackend.js.map +1 -1
- package/rabbitmq/secretBackendRole.d.ts +31 -0
- package/rabbitmq/secretBackendRole.js +31 -0
- package/rabbitmq/secretBackendRole.js.map +1 -1
- package/raftSnapshotAgentConfig.d.ts +16 -0
- package/raftSnapshotAgentConfig.js +16 -0
- package/raftSnapshotAgentConfig.js.map +1 -1
- package/terraformcloud/secretBackend.d.ts +13 -0
- package/terraformcloud/secretBackend.js +13 -0
- package/terraformcloud/secretBackend.js.map +1 -1
- package/terraformcloud/secretCreds.d.ts +23 -0
- package/terraformcloud/secretCreds.js +23 -0
- package/terraformcloud/secretCreds.js.map +1 -1
- package/terraformcloud/secretRole.d.ts +18 -0
- package/terraformcloud/secretRole.js +18 -0
- package/terraformcloud/secretRole.js.map +1 -1
- package/token.d.ts +19 -0
- package/token.js +19 -0
- package/token.js.map +1 -1
package/ad/secretBackend.d.ts
CHANGED
|
@@ -1,5 +1,21 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
/**
|
|
3
|
+
* ## Example Usage
|
|
4
|
+
*
|
|
5
|
+
* ```typescript
|
|
6
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
7
|
+
* import * as vault from "@pulumi/vault";
|
|
8
|
+
*
|
|
9
|
+
* const config = new vault.ad.SecretBackend("config", {
|
|
10
|
+
* backend: "ad",
|
|
11
|
+
* binddn: "CN=Administrator,CN=Users,DC=corp,DC=example,DC=net",
|
|
12
|
+
* bindpass: "SuperSecretPassw0rd",
|
|
13
|
+
* insecureTls: true,
|
|
14
|
+
* url: "ldaps://ad",
|
|
15
|
+
* userdn: "CN=Users,DC=corp,DC=example,DC=net",
|
|
16
|
+
* });
|
|
17
|
+
* ```
|
|
18
|
+
*
|
|
3
19
|
* ## Import
|
|
4
20
|
*
|
|
5
21
|
* AD secret backend can be imported using the `backend`, e.g.
|
package/ad/secretBackend.js
CHANGED
|
@@ -6,6 +6,22 @@ exports.SecretBackend = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("../utilities");
|
|
8
8
|
/**
|
|
9
|
+
* ## Example Usage
|
|
10
|
+
*
|
|
11
|
+
* ```typescript
|
|
12
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
13
|
+
* import * as vault from "@pulumi/vault";
|
|
14
|
+
*
|
|
15
|
+
* const config = new vault.ad.SecretBackend("config", {
|
|
16
|
+
* backend: "ad",
|
|
17
|
+
* binddn: "CN=Administrator,CN=Users,DC=corp,DC=example,DC=net",
|
|
18
|
+
* bindpass: "SuperSecretPassw0rd",
|
|
19
|
+
* insecureTls: true,
|
|
20
|
+
* url: "ldaps://ad",
|
|
21
|
+
* userdn: "CN=Users,DC=corp,DC=example,DC=net",
|
|
22
|
+
* });
|
|
23
|
+
* ```
|
|
24
|
+
*
|
|
9
25
|
* ## Import
|
|
10
26
|
*
|
|
11
27
|
* AD secret backend can be imported using the `backend`, e.g.
|
package/ad/secretBackend.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretBackend.js","sourceRoot":"","sources":["../../ad/secretBackend.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"secretBackend.js","sourceRoot":"","sources":["../../ad/secretBackend.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;GAwBG;AACH,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;IAqMpD,YAAY,IAAY,EAAE,WAAoD,EAAE,IAAmC;QAC/G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA6C,CAAC;YAC5D,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,qBAAqB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,0BAA0B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAA4C,CAAC;YAC1D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,qBAAqB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,cAAc,CAAC,0BAA0B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAClE,CAAC;IAxRD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA0B,EAAE,IAAmC;QACxH,OAAO,IAAI,aAAa,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACpE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,aAAa,CAAC,YAAY,CAAC;IAC9D,CAAC;;AA1BL,sCA0RC;AA5QG,gBAAgB;AACO,0BAAY,GAAG,sCAAsC,CAAC"}
|
package/ad/secretLibrary.d.ts
CHANGED
|
@@ -1,4 +1,39 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
/**
|
|
3
|
+
* ## Example Usage
|
|
4
|
+
*
|
|
5
|
+
* ```typescript
|
|
6
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
7
|
+
* import * as vault from "@pulumi/vault";
|
|
8
|
+
*
|
|
9
|
+
* const config = new vault.ad.SecretBackend("config", {
|
|
10
|
+
* backend: "ad",
|
|
11
|
+
* binddn: "CN=Administrator,CN=Users,DC=corp,DC=example,DC=net",
|
|
12
|
+
* bindpass: "SuperSecretPassw0rd",
|
|
13
|
+
* url: "ldaps://ad",
|
|
14
|
+
* insecureTls: "true",
|
|
15
|
+
* userdn: "CN=Users,DC=corp,DC=example,DC=net",
|
|
16
|
+
* });
|
|
17
|
+
* const qa = new vault.ad.SecretLibrary("qa", {
|
|
18
|
+
* backend: config.backend,
|
|
19
|
+
* serviceAccountNames: [
|
|
20
|
+
* "Bob",
|
|
21
|
+
* "Mary",
|
|
22
|
+
* ],
|
|
23
|
+
* ttl: 60,
|
|
24
|
+
* disableCheckInEnforcement: true,
|
|
25
|
+
* maxTtl: 120,
|
|
26
|
+
* });
|
|
27
|
+
* ```
|
|
28
|
+
*
|
|
29
|
+
* ## Import
|
|
30
|
+
*
|
|
31
|
+
* AD secret backend libraries can be imported using the `path`, e.g.
|
|
32
|
+
*
|
|
33
|
+
* ```sh
|
|
34
|
+
* $ pulumi import vault:ad/secretLibrary:SecretLibrary role ad/library/bob
|
|
35
|
+
* ```
|
|
36
|
+
*/
|
|
2
37
|
export declare class SecretLibrary extends pulumi.CustomResource {
|
|
3
38
|
/**
|
|
4
39
|
* Get an existing SecretLibrary resource's state with the given name, ID, and optional extra
|
|
@@ -16,7 +51,8 @@ export declare class SecretLibrary extends pulumi.CustomResource {
|
|
|
16
51
|
*/
|
|
17
52
|
static isInstance(obj: any): obj is SecretLibrary;
|
|
18
53
|
/**
|
|
19
|
-
* The
|
|
54
|
+
* The path the AD secret backend is mounted at,
|
|
55
|
+
* with no leading or trailing `/`s.
|
|
20
56
|
*/
|
|
21
57
|
readonly backend: pulumi.Output<string>;
|
|
22
58
|
/**
|
|
@@ -24,20 +60,22 @@ export declare class SecretLibrary extends pulumi.CustomResource {
|
|
|
24
60
|
*/
|
|
25
61
|
readonly disableCheckInEnforcement: pulumi.Output<boolean | undefined>;
|
|
26
62
|
/**
|
|
27
|
-
* The maximum
|
|
63
|
+
* The maximum password time-to-live in seconds. Defaults to the configuration
|
|
64
|
+
* maxTtl if not provided.
|
|
28
65
|
*/
|
|
29
66
|
readonly maxTtl: pulumi.Output<number>;
|
|
30
67
|
/**
|
|
31
|
-
* The name
|
|
68
|
+
* The name to identify this set of service accounts.
|
|
69
|
+
* Must be unique within the backend.
|
|
32
70
|
*/
|
|
33
71
|
readonly name: pulumi.Output<string>;
|
|
34
72
|
/**
|
|
35
|
-
*
|
|
36
|
-
* in Active Directory.
|
|
73
|
+
* Specifies the slice of service accounts mapped to this set.
|
|
37
74
|
*/
|
|
38
75
|
readonly serviceAccountNames: pulumi.Output<string[]>;
|
|
39
76
|
/**
|
|
40
|
-
* The
|
|
77
|
+
* The password time-to-live in seconds. Defaults to the configuration
|
|
78
|
+
* ttl if not provided.
|
|
41
79
|
*/
|
|
42
80
|
readonly ttl: pulumi.Output<number>;
|
|
43
81
|
/**
|
|
@@ -54,7 +92,8 @@ export declare class SecretLibrary extends pulumi.CustomResource {
|
|
|
54
92
|
*/
|
|
55
93
|
export interface SecretLibraryState {
|
|
56
94
|
/**
|
|
57
|
-
* The
|
|
95
|
+
* The path the AD secret backend is mounted at,
|
|
96
|
+
* with no leading or trailing `/`s.
|
|
58
97
|
*/
|
|
59
98
|
backend?: pulumi.Input<string>;
|
|
60
99
|
/**
|
|
@@ -62,20 +101,22 @@ export interface SecretLibraryState {
|
|
|
62
101
|
*/
|
|
63
102
|
disableCheckInEnforcement?: pulumi.Input<boolean>;
|
|
64
103
|
/**
|
|
65
|
-
* The maximum
|
|
104
|
+
* The maximum password time-to-live in seconds. Defaults to the configuration
|
|
105
|
+
* maxTtl if not provided.
|
|
66
106
|
*/
|
|
67
107
|
maxTtl?: pulumi.Input<number>;
|
|
68
108
|
/**
|
|
69
|
-
* The name
|
|
109
|
+
* The name to identify this set of service accounts.
|
|
110
|
+
* Must be unique within the backend.
|
|
70
111
|
*/
|
|
71
112
|
name?: pulumi.Input<string>;
|
|
72
113
|
/**
|
|
73
|
-
*
|
|
74
|
-
* in Active Directory.
|
|
114
|
+
* Specifies the slice of service accounts mapped to this set.
|
|
75
115
|
*/
|
|
76
116
|
serviceAccountNames?: pulumi.Input<pulumi.Input<string>[]>;
|
|
77
117
|
/**
|
|
78
|
-
* The
|
|
118
|
+
* The password time-to-live in seconds. Defaults to the configuration
|
|
119
|
+
* ttl if not provided.
|
|
79
120
|
*/
|
|
80
121
|
ttl?: pulumi.Input<number>;
|
|
81
122
|
}
|
|
@@ -84,7 +125,8 @@ export interface SecretLibraryState {
|
|
|
84
125
|
*/
|
|
85
126
|
export interface SecretLibraryArgs {
|
|
86
127
|
/**
|
|
87
|
-
* The
|
|
128
|
+
* The path the AD secret backend is mounted at,
|
|
129
|
+
* with no leading or trailing `/`s.
|
|
88
130
|
*/
|
|
89
131
|
backend: pulumi.Input<string>;
|
|
90
132
|
/**
|
|
@@ -92,20 +134,22 @@ export interface SecretLibraryArgs {
|
|
|
92
134
|
*/
|
|
93
135
|
disableCheckInEnforcement?: pulumi.Input<boolean>;
|
|
94
136
|
/**
|
|
95
|
-
* The maximum
|
|
137
|
+
* The maximum password time-to-live in seconds. Defaults to the configuration
|
|
138
|
+
* maxTtl if not provided.
|
|
96
139
|
*/
|
|
97
140
|
maxTtl?: pulumi.Input<number>;
|
|
98
141
|
/**
|
|
99
|
-
* The name
|
|
142
|
+
* The name to identify this set of service accounts.
|
|
143
|
+
* Must be unique within the backend.
|
|
100
144
|
*/
|
|
101
145
|
name?: pulumi.Input<string>;
|
|
102
146
|
/**
|
|
103
|
-
*
|
|
104
|
-
* in Active Directory.
|
|
147
|
+
* Specifies the slice of service accounts mapped to this set.
|
|
105
148
|
*/
|
|
106
149
|
serviceAccountNames: pulumi.Input<pulumi.Input<string>[]>;
|
|
107
150
|
/**
|
|
108
|
-
* The
|
|
151
|
+
* The password time-to-live in seconds. Defaults to the configuration
|
|
152
|
+
* ttl if not provided.
|
|
109
153
|
*/
|
|
110
154
|
ttl?: pulumi.Input<number>;
|
|
111
155
|
}
|
package/ad/secretLibrary.js
CHANGED
|
@@ -5,6 +5,41 @@ Object.defineProperty(exports, "__esModule", { value: true });
|
|
|
5
5
|
exports.SecretLibrary = void 0;
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("../utilities");
|
|
8
|
+
/**
|
|
9
|
+
* ## Example Usage
|
|
10
|
+
*
|
|
11
|
+
* ```typescript
|
|
12
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
13
|
+
* import * as vault from "@pulumi/vault";
|
|
14
|
+
*
|
|
15
|
+
* const config = new vault.ad.SecretBackend("config", {
|
|
16
|
+
* backend: "ad",
|
|
17
|
+
* binddn: "CN=Administrator,CN=Users,DC=corp,DC=example,DC=net",
|
|
18
|
+
* bindpass: "SuperSecretPassw0rd",
|
|
19
|
+
* url: "ldaps://ad",
|
|
20
|
+
* insecureTls: "true",
|
|
21
|
+
* userdn: "CN=Users,DC=corp,DC=example,DC=net",
|
|
22
|
+
* });
|
|
23
|
+
* const qa = new vault.ad.SecretLibrary("qa", {
|
|
24
|
+
* backend: config.backend,
|
|
25
|
+
* serviceAccountNames: [
|
|
26
|
+
* "Bob",
|
|
27
|
+
* "Mary",
|
|
28
|
+
* ],
|
|
29
|
+
* ttl: 60,
|
|
30
|
+
* disableCheckInEnforcement: true,
|
|
31
|
+
* maxTtl: 120,
|
|
32
|
+
* });
|
|
33
|
+
* ```
|
|
34
|
+
*
|
|
35
|
+
* ## Import
|
|
36
|
+
*
|
|
37
|
+
* AD secret backend libraries can be imported using the `path`, e.g.
|
|
38
|
+
*
|
|
39
|
+
* ```sh
|
|
40
|
+
* $ pulumi import vault:ad/secretLibrary:SecretLibrary role ad/library/bob
|
|
41
|
+
* ```
|
|
42
|
+
*/
|
|
8
43
|
class SecretLibrary extends pulumi.CustomResource {
|
|
9
44
|
constructor(name, argsOrState, opts) {
|
|
10
45
|
let resourceInputs = {};
|
package/ad/secretLibrary.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretLibrary.js","sourceRoot":"","sources":["../../ad/secretLibrary.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;
|
|
1
|
+
{"version":3,"file":"secretLibrary.js","sourceRoot":"","sources":["../../ad/secretLibrary.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAkCG;AACH,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;IAiEpD,YAAY,IAAY,EAAE,WAAoD,EAAE,IAAmC;QAC/G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA6C,CAAC;YAC5D,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,2BAA2B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,yBAAyB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClG,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACzD;aAAM;YACH,MAAM,IAAI,GAAG,WAA4C,CAAC;YAC1D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,mBAAmB,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAChE,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,CAAC;aACtE;YACD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,2BAA2B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,yBAAyB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACvD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAClE,CAAC;IA5FD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA0B,EAAE,IAAmC;QACxH,OAAO,IAAI,aAAa,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACpE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,aAAa,CAAC,YAAY,CAAC;IAC9D,CAAC;;AA1BL,sCA8FC;AAhFG,gBAAgB;AACO,0BAAY,GAAG,sCAAsC,CAAC"}
|
package/ad/secretRole.d.ts
CHANGED
|
@@ -1,5 +1,27 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
/**
|
|
3
|
+
* ## Example Usage
|
|
4
|
+
*
|
|
5
|
+
* ```typescript
|
|
6
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
7
|
+
* import * as vault from "@pulumi/vault";
|
|
8
|
+
*
|
|
9
|
+
* const config = new vault.ad.SecretBackend("config", {
|
|
10
|
+
* backend: "ad",
|
|
11
|
+
* binddn: "CN=Administrator,CN=Users,DC=corp,DC=example,DC=net",
|
|
12
|
+
* bindpass: "SuperSecretPassw0rd",
|
|
13
|
+
* url: "ldaps://ad",
|
|
14
|
+
* insecureTls: "true",
|
|
15
|
+
* userdn: "CN=Users,DC=corp,DC=example,DC=net",
|
|
16
|
+
* });
|
|
17
|
+
* const role = new vault.ad.SecretRole("role", {
|
|
18
|
+
* backend: config.backend,
|
|
19
|
+
* role: "bob",
|
|
20
|
+
* serviceAccountName: "Bob",
|
|
21
|
+
* ttl: 60,
|
|
22
|
+
* });
|
|
23
|
+
* ```
|
|
24
|
+
*
|
|
3
25
|
* ## Import
|
|
4
26
|
*
|
|
5
27
|
* AD secret backend roles can be imported using the `path`, e.g.
|
package/ad/secretRole.js
CHANGED
|
@@ -6,6 +6,28 @@ exports.SecretRole = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("../utilities");
|
|
8
8
|
/**
|
|
9
|
+
* ## Example Usage
|
|
10
|
+
*
|
|
11
|
+
* ```typescript
|
|
12
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
13
|
+
* import * as vault from "@pulumi/vault";
|
|
14
|
+
*
|
|
15
|
+
* const config = new vault.ad.SecretBackend("config", {
|
|
16
|
+
* backend: "ad",
|
|
17
|
+
* binddn: "CN=Administrator,CN=Users,DC=corp,DC=example,DC=net",
|
|
18
|
+
* bindpass: "SuperSecretPassw0rd",
|
|
19
|
+
* url: "ldaps://ad",
|
|
20
|
+
* insecureTls: "true",
|
|
21
|
+
* userdn: "CN=Users,DC=corp,DC=example,DC=net",
|
|
22
|
+
* });
|
|
23
|
+
* const role = new vault.ad.SecretRole("role", {
|
|
24
|
+
* backend: config.backend,
|
|
25
|
+
* role: "bob",
|
|
26
|
+
* serviceAccountName: "Bob",
|
|
27
|
+
* ttl: 60,
|
|
28
|
+
* });
|
|
29
|
+
* ```
|
|
30
|
+
*
|
|
9
31
|
* ## Import
|
|
10
32
|
*
|
|
11
33
|
* AD secret backend roles can be imported using the `path`, e.g.
|
package/ad/secretRole.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretRole.js","sourceRoot":"","sources":["../../ad/secretRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"secretRole.js","sourceRoot":"","sources":["../../ad/secretRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA8BG;AACH,MAAa,UAAW,SAAQ,MAAM,CAAC,cAAc;IAiEjD,YAAY,IAAY,EAAE,WAA8C,EAAE,IAAmC;QACzG,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA0C,CAAC;YACzD,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACzD;aAAM;YACH,MAAM,IAAI,GAAG,WAAyC,CAAC;YACvD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,kBAAkB,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC/D,MAAM,IAAI,KAAK,CAAC,gDAAgD,CAAC,CAAC;aACrE;YACD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,cAAc,CAAC,mBAAmB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACxD,cAAc,CAAC,iBAAiB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACzD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,UAAU,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC/D,CAAC;IA/FD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAuB,EAAE,IAAmC;QACrH,OAAO,IAAI,UAAU,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACjE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,UAAU,CAAC,YAAY,CAAC;IAC3D,CAAC;;AA1BL,gCAiGC;AAnFG,gBAAgB;AACO,uBAAY,GAAG,gCAAgC,CAAC"}
|
|
@@ -23,10 +23,9 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
23
23
|
* const id = new vault.approle.AuthBackendRoleSecretID("id", {
|
|
24
24
|
* backend: approle.path,
|
|
25
25
|
* roleName: example.roleName,
|
|
26
|
-
* metadata:
|
|
27
|
-
*
|
|
28
|
-
*
|
|
29
|
-
* `,
|
|
26
|
+
* metadata: JSON.stringify({
|
|
27
|
+
* hello: "world",
|
|
28
|
+
* }),
|
|
30
29
|
* });
|
|
31
30
|
* ```
|
|
32
31
|
*/
|
|
@@ -74,8 +73,9 @@ export declare class AuthBackendRoleSecretID extends pulumi.CustomResource {
|
|
|
74
73
|
*/
|
|
75
74
|
readonly secretId: pulumi.Output<string>;
|
|
76
75
|
/**
|
|
77
|
-
*
|
|
78
|
-
* the wrapping token is expired or
|
|
76
|
+
* Set to `true` to use the wrapped secret-id accessor as the resource ID.
|
|
77
|
+
* If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
|
|
78
|
+
* invalidated through unwrapping.
|
|
79
79
|
*/
|
|
80
80
|
readonly withWrappedAccessor: pulumi.Output<boolean | undefined>;
|
|
81
81
|
/**
|
|
@@ -135,8 +135,9 @@ export interface AuthBackendRoleSecretIDState {
|
|
|
135
135
|
*/
|
|
136
136
|
secretId?: pulumi.Input<string>;
|
|
137
137
|
/**
|
|
138
|
-
*
|
|
139
|
-
* the wrapping token is expired or
|
|
138
|
+
* Set to `true` to use the wrapped secret-id accessor as the resource ID.
|
|
139
|
+
* If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
|
|
140
|
+
* invalidated through unwrapping.
|
|
140
141
|
*/
|
|
141
142
|
withWrappedAccessor?: pulumi.Input<boolean>;
|
|
142
143
|
/**
|
|
@@ -184,8 +185,9 @@ export interface AuthBackendRoleSecretIDArgs {
|
|
|
184
185
|
*/
|
|
185
186
|
secretId?: pulumi.Input<string>;
|
|
186
187
|
/**
|
|
187
|
-
*
|
|
188
|
-
* the wrapping token is expired or
|
|
188
|
+
* Set to `true` to use the wrapped secret-id accessor as the resource ID.
|
|
189
|
+
* If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
|
|
190
|
+
* invalidated through unwrapping.
|
|
189
191
|
*/
|
|
190
192
|
withWrappedAccessor?: pulumi.Input<boolean>;
|
|
191
193
|
/**
|
|
@@ -29,10 +29,9 @@ const utilities = require("../utilities");
|
|
|
29
29
|
* const id = new vault.approle.AuthBackendRoleSecretID("id", {
|
|
30
30
|
* backend: approle.path,
|
|
31
31
|
* roleName: example.roleName,
|
|
32
|
-
* metadata:
|
|
33
|
-
*
|
|
34
|
-
*
|
|
35
|
-
* `,
|
|
32
|
+
* metadata: JSON.stringify({
|
|
33
|
+
* hello: "world",
|
|
34
|
+
* }),
|
|
36
35
|
* });
|
|
37
36
|
* ```
|
|
38
37
|
*/
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"authBackendRoleSecretID.js","sourceRoot":"","sources":["../../approle/authBackendRoleSecretID.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"authBackendRoleSecretID.js","sourceRoot":"","sources":["../../approle/authBackendRoleSecretID.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA6BG;AACH,MAAa,uBAAwB,SAAQ,MAAM,CAAC,cAAc;IAsF9D,YAAY,IAAY,EAAE,WAAwE,EAAE,IAAmC;QACnI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAuD,CAAC;YACtE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;SACzE;aAAM;YACH,MAAM,IAAI,GAAG,WAAsD,CAAC;YACpE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,UAAU,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC/C,cAAc,CAAC,kBAAkB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACvD,cAAc,CAAC,eAAe,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACvD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,uBAAuB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC5E,CAAC;IAtHD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAoC,EAAE,IAAmC;QAClI,OAAO,IAAI,uBAAuB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC9E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,uBAAuB,CAAC,YAAY,CAAC;IACxE,CAAC;;AA1BL,0DAwHC;AA1GG,gBAAgB;AACO,oCAAY,GAAG,+DAA+D,CAAC"}
|
|
@@ -1,5 +1,19 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
/**
|
|
3
|
+
* ## Example Usage
|
|
4
|
+
*
|
|
5
|
+
* ```typescript
|
|
6
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
7
|
+
* import * as vault from "@pulumi/vault";
|
|
8
|
+
*
|
|
9
|
+
* const exampleAuthBackend = new vault.AuthBackend("exampleAuthBackend", {type: "aws"});
|
|
10
|
+
* const exampleAuthBackendClient = new vault.aws.AuthBackendClient("exampleAuthBackendClient", {
|
|
11
|
+
* backend: exampleAuthBackend.path,
|
|
12
|
+
* accessKey: "INSERT_AWS_ACCESS_KEY",
|
|
13
|
+
* secretKey: "INSERT_AWS_SECRET_KEY",
|
|
14
|
+
* });
|
|
15
|
+
* ```
|
|
16
|
+
*
|
|
3
17
|
* ## Import
|
|
4
18
|
*
|
|
5
19
|
* AWS auth backend clients can be imported using `auth/`, the `backend` path, and `/config/client` e.g.
|
package/aws/authBackendClient.js
CHANGED
|
@@ -6,6 +6,20 @@ exports.AuthBackendClient = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("../utilities");
|
|
8
8
|
/**
|
|
9
|
+
* ## Example Usage
|
|
10
|
+
*
|
|
11
|
+
* ```typescript
|
|
12
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
13
|
+
* import * as vault from "@pulumi/vault";
|
|
14
|
+
*
|
|
15
|
+
* const exampleAuthBackend = new vault.AuthBackend("exampleAuthBackend", {type: "aws"});
|
|
16
|
+
* const exampleAuthBackendClient = new vault.aws.AuthBackendClient("exampleAuthBackendClient", {
|
|
17
|
+
* backend: exampleAuthBackend.path,
|
|
18
|
+
* accessKey: "INSERT_AWS_ACCESS_KEY",
|
|
19
|
+
* secretKey: "INSERT_AWS_SECRET_KEY",
|
|
20
|
+
* });
|
|
21
|
+
* ```
|
|
22
|
+
*
|
|
9
23
|
* ## Import
|
|
10
24
|
*
|
|
11
25
|
* AWS auth backend clients can be imported using `auth/`, the `backend` path, and `/config/client` e.g.
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"authBackendClient.js","sourceRoot":"","sources":["../../aws/authBackendClient.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"authBackendClient.js","sourceRoot":"","sources":["../../aws/authBackendClient.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;GAsBG;AACH,MAAa,iBAAkB,SAAQ,MAAM,CAAC,cAAc;IA8ExD,YAAY,IAAY,EAAE,WAA4D,EAAE,IAAmC;QACvH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAiD,CAAC;YAChE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;SACrE;aAAM;YACH,MAAM,IAAI,GAAG,WAAgD,CAAC;YAC9D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;SACnE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,iBAAiB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACtE,CAAC;IAvGD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA8B,EAAE,IAAmC;QAC5H,OAAO,IAAI,iBAAiB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACxE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,iBAAiB,CAAC,YAAY,CAAC;IAClE,CAAC;;AA1BL,8CAyGC;AA3FG,gBAAgB;AACO,8BAAY,GAAG,+CAA+C,CAAC"}
|
|
@@ -1,5 +1,19 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
/**
|
|
3
|
+
* ## Example Usage
|
|
4
|
+
*
|
|
5
|
+
* ```typescript
|
|
6
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
7
|
+
* import * as vault from "@pulumi/vault";
|
|
8
|
+
*
|
|
9
|
+
* const aws = new vault.AuthBackend("aws", {type: "aws"});
|
|
10
|
+
* const role = new vault.aws.AuthBackendStsRole("role", {
|
|
11
|
+
* backend: aws.path,
|
|
12
|
+
* accountId: "1234567890",
|
|
13
|
+
* stsRole: "arn:aws:iam::1234567890:role/my-role",
|
|
14
|
+
* });
|
|
15
|
+
* ```
|
|
16
|
+
*
|
|
3
17
|
* ## Import
|
|
4
18
|
*
|
|
5
19
|
* AWS auth backend STS roles can be imported using `auth/`, the `backend` path, `/config/sts/`, and the `account_id` e.g.
|
|
@@ -6,6 +6,20 @@ exports.AuthBackendStsRole = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("../utilities");
|
|
8
8
|
/**
|
|
9
|
+
* ## Example Usage
|
|
10
|
+
*
|
|
11
|
+
* ```typescript
|
|
12
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
13
|
+
* import * as vault from "@pulumi/vault";
|
|
14
|
+
*
|
|
15
|
+
* const aws = new vault.AuthBackend("aws", {type: "aws"});
|
|
16
|
+
* const role = new vault.aws.AuthBackendStsRole("role", {
|
|
17
|
+
* backend: aws.path,
|
|
18
|
+
* accountId: "1234567890",
|
|
19
|
+
* stsRole: "arn:aws:iam::1234567890:role/my-role",
|
|
20
|
+
* });
|
|
21
|
+
* ```
|
|
22
|
+
*
|
|
9
23
|
* ## Import
|
|
10
24
|
*
|
|
11
25
|
* AWS auth backend STS roles can be imported using `auth/`, the `backend` path, `/config/sts/`, and the `account_id` e.g.
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"authBackendStsRole.js","sourceRoot":"","sources":["../../aws/authBackendStsRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"authBackendStsRole.js","sourceRoot":"","sources":["../../aws/authBackendStsRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;GAsBG;AACH,MAAa,kBAAmB,SAAQ,MAAM,CAAC,cAAc;IAmDzD,YAAY,IAAY,EAAE,WAA8D,EAAE,IAAmC;QACzH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAkD,CAAC;YACjE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;SACjE;aAAM;YACH,MAAM,IAAI,GAAG,WAAiD,CAAC;YAC/D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,SAAS,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACtD,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,kBAAkB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACvE,CAAC;IAxED;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA+B,EAAE,IAAmC;QAC7H,OAAO,IAAI,kBAAkB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACzE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,kBAAkB,CAAC,YAAY,CAAC;IACnE,CAAC;;AA1BL,gDA0EC;AA5DG,gBAAgB;AACO,+BAAY,GAAG,iDAAiD,CAAC"}
|
|
@@ -1,4 +1,35 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
/**
|
|
3
|
+
* ## Example Usage
|
|
4
|
+
*
|
|
5
|
+
* ```typescript
|
|
6
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
7
|
+
* import * as vault from "@pulumi/vault";
|
|
8
|
+
*
|
|
9
|
+
* const aws = new vault.aws.SecretBackend("aws", {
|
|
10
|
+
* accessKey: "AKIA.....",
|
|
11
|
+
* secretKey: "SECRETKEYFROMAWS",
|
|
12
|
+
* });
|
|
13
|
+
* const role = new vault.aws.SecretBackendRole("role", {
|
|
14
|
+
* backend: aws.path,
|
|
15
|
+
* policy: `{
|
|
16
|
+
* "Version": "2012-10-17",
|
|
17
|
+
* "Statement": [
|
|
18
|
+
* {
|
|
19
|
+
* "Effect": "Allow",
|
|
20
|
+
* "Action": "iam:*",
|
|
21
|
+
* "Resource": "*"
|
|
22
|
+
* }
|
|
23
|
+
* ]
|
|
24
|
+
* }
|
|
25
|
+
* `,
|
|
26
|
+
* });
|
|
27
|
+
* const creds = pulumi.all([aws.path, role.name]).apply(([path, name]) => vault.aws.getAccessCredentialsOutput({
|
|
28
|
+
* backend: path,
|
|
29
|
+
* role: name,
|
|
30
|
+
* }));
|
|
31
|
+
* ```
|
|
32
|
+
*/
|
|
2
33
|
export declare function getAccessCredentials(args: GetAccessCredentialsArgs, opts?: pulumi.InvokeOptions): Promise<GetAccessCredentialsResult>;
|
|
3
34
|
/**
|
|
4
35
|
* A collection of arguments for invoking getAccessCredentials.
|
|
@@ -5,6 +5,37 @@ Object.defineProperty(exports, "__esModule", { value: true });
|
|
|
5
5
|
exports.getAccessCredentialsOutput = exports.getAccessCredentials = void 0;
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("../utilities");
|
|
8
|
+
/**
|
|
9
|
+
* ## Example Usage
|
|
10
|
+
*
|
|
11
|
+
* ```typescript
|
|
12
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
13
|
+
* import * as vault from "@pulumi/vault";
|
|
14
|
+
*
|
|
15
|
+
* const aws = new vault.aws.SecretBackend("aws", {
|
|
16
|
+
* accessKey: "AKIA.....",
|
|
17
|
+
* secretKey: "SECRETKEYFROMAWS",
|
|
18
|
+
* });
|
|
19
|
+
* const role = new vault.aws.SecretBackendRole("role", {
|
|
20
|
+
* backend: aws.path,
|
|
21
|
+
* policy: `{
|
|
22
|
+
* "Version": "2012-10-17",
|
|
23
|
+
* "Statement": [
|
|
24
|
+
* {
|
|
25
|
+
* "Effect": "Allow",
|
|
26
|
+
* "Action": "iam:*",
|
|
27
|
+
* "Resource": "*"
|
|
28
|
+
* }
|
|
29
|
+
* ]
|
|
30
|
+
* }
|
|
31
|
+
* `,
|
|
32
|
+
* });
|
|
33
|
+
* const creds = pulumi.all([aws.path, role.name]).apply(([path, name]) => vault.aws.getAccessCredentialsOutput({
|
|
34
|
+
* backend: path,
|
|
35
|
+
* role: name,
|
|
36
|
+
* }));
|
|
37
|
+
* ```
|
|
38
|
+
*/
|
|
8
39
|
function getAccessCredentials(args, opts) {
|
|
9
40
|
if (!opts) {
|
|
10
41
|
opts = {};
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getAccessCredentials.js","sourceRoot":"","sources":["../../aws/getAccessCredentials.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,SAAgB,oBAAoB,CAAC,IAA8B,EAAE,IAA2B;IAC5F,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,qDAAqD,EAAE;QAChF,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,QAAQ,EAAE,IAAI,CAAC,MAAM;QACrB,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,KAAK,EAAE,IAAI,CAAC,GAAG;QACf,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAdD,oDAcC;AA8ED,SAAgB,0BAA0B,CAAC,IAAoC,EAAE,IAA2B;IACxG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,oBAAoB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACxE,CAAC;AAFD,gEAEC"}
|
|
1
|
+
{"version":3,"file":"getAccessCredentials.js","sourceRoot":"","sources":["../../aws/getAccessCredentials.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA8BG;AACH,SAAgB,oBAAoB,CAAC,IAA8B,EAAE,IAA2B;IAC5F,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,qDAAqD,EAAE;QAChF,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,QAAQ,EAAE,IAAI,CAAC,MAAM;QACrB,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,KAAK,EAAE,IAAI,CAAC,GAAG;QACf,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAdD,oDAcC;AA8ED,SAAgB,0BAA0B,CAAC,IAAoC,EAAE,IAA2B;IACxG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,oBAAoB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACxE,CAAC;AAFD,gEAEC"}
|