@pulumi/vault 5.5.0 → 5.6.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/approle/getAuthBackendRoleId.d.ts +10 -5
- package/approle/getAuthBackendRoleId.js +10 -5
- package/approle/getAuthBackendRoleId.js.map +1 -1
- package/certAuthBackendRole.d.ts +1 -1
- package/certAuthBackendRole.js +1 -1
- package/gcp/authBackend.d.ts +1 -1
- package/gcp/authBackend.js +1 -1
- package/gcp/secretBackend.d.ts +1 -1
- package/gcp/secretBackend.js +1 -1
- package/gcp/secretRoleset.d.ts +1 -1
- package/gcp/secretRoleset.js +1 -1
- package/gcp/secretStaticAccount.d.ts +1 -1
- package/gcp/secretStaticAccount.js +1 -1
- package/package.json +4 -3
- package/package.json.bak +2 -1
- package/package.json.dev +4 -3
- package/types/input.d.ts +24 -24
|
@@ -8,11 +8,16 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
8
8
|
* import * as pulumi from "@pulumi/pulumi";
|
|
9
9
|
* import * as vault from "@pulumi/vault";
|
|
10
10
|
*
|
|
11
|
-
*
|
|
12
|
-
*
|
|
13
|
-
*
|
|
14
|
-
*
|
|
15
|
-
*
|
|
11
|
+
* export = async () => {
|
|
12
|
+
* const role = await vault.appRole.getAuthBackendRoleId({
|
|
13
|
+
* backend: "my-approle-backend",
|
|
14
|
+
* roleName: "my-role",
|
|
15
|
+
* });
|
|
16
|
+
* const role_id = role.roleId;
|
|
17
|
+
* return {
|
|
18
|
+
* "role-id": role_id,
|
|
19
|
+
* };
|
|
20
|
+
* }
|
|
16
21
|
* ```
|
|
17
22
|
*/
|
|
18
23
|
export declare function getAuthBackendRoleId(args: GetAuthBackendRoleIdArgs, opts?: pulumi.InvokeOptions): Promise<GetAuthBackendRoleIdResult>;
|
|
@@ -14,11 +14,16 @@ const utilities = require("../utilities");
|
|
|
14
14
|
* import * as pulumi from "@pulumi/pulumi";
|
|
15
15
|
* import * as vault from "@pulumi/vault";
|
|
16
16
|
*
|
|
17
|
-
*
|
|
18
|
-
*
|
|
19
|
-
*
|
|
20
|
-
*
|
|
21
|
-
*
|
|
17
|
+
* export = async () => {
|
|
18
|
+
* const role = await vault.appRole.getAuthBackendRoleId({
|
|
19
|
+
* backend: "my-approle-backend",
|
|
20
|
+
* roleName: "my-role",
|
|
21
|
+
* });
|
|
22
|
+
* const role_id = role.roleId;
|
|
23
|
+
* return {
|
|
24
|
+
* "role-id": role_id,
|
|
25
|
+
* };
|
|
26
|
+
* }
|
|
22
27
|
* ```
|
|
23
28
|
*/
|
|
24
29
|
function getAuthBackendRoleId(args, opts) {
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getAuthBackendRoleId.js","sourceRoot":"","sources":["../../approle/getAuthBackendRoleId.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"getAuthBackendRoleId.js","sourceRoot":"","sources":["../../approle/getAuthBackendRoleId.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;GAoBG;AACH,SAAgB,oBAAoB,CAAC,IAA8B,EAAE,IAA2B;IAC5F,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,yDAAyD,EAAE;QACpF,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,UAAU,EAAE,IAAI,CAAC,QAAQ;KAC5B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAVD,oDAUC;AAiCD,SAAgB,0BAA0B,CAAC,IAAoC,EAAE,IAA2B;IACxG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,oBAAoB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACxE,CAAC;AAFD,gEAEC"}
|
package/certAuthBackendRole.d.ts
CHANGED
|
@@ -6,8 +6,8 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
6
6
|
*
|
|
7
7
|
* ```typescript
|
|
8
8
|
* import * as pulumi from "@pulumi/pulumi";
|
|
9
|
+
* import * as fs from "fs";
|
|
9
10
|
* import * as vault from "@pulumi/vault";
|
|
10
|
-
* import * from "fs";
|
|
11
11
|
*
|
|
12
12
|
* const certAuthBackend = new vault.AuthBackend("certAuthBackend", {
|
|
13
13
|
* path: "cert",
|
package/certAuthBackendRole.js
CHANGED
|
@@ -12,8 +12,8 @@ const utilities = require("./utilities");
|
|
|
12
12
|
*
|
|
13
13
|
* ```typescript
|
|
14
14
|
* import * as pulumi from "@pulumi/pulumi";
|
|
15
|
+
* import * as fs from "fs";
|
|
15
16
|
* import * as vault from "@pulumi/vault";
|
|
16
|
-
* import * from "fs";
|
|
17
17
|
*
|
|
18
18
|
* const certAuthBackend = new vault.AuthBackend("certAuthBackend", {
|
|
19
19
|
* path: "cert",
|
package/gcp/authBackend.d.ts
CHANGED
|
@@ -6,8 +6,8 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
6
6
|
*
|
|
7
7
|
* ```typescript
|
|
8
8
|
* import * as pulumi from "@pulumi/pulumi";
|
|
9
|
+
* import * as fs from "fs";
|
|
9
10
|
* import * as vault from "@pulumi/vault";
|
|
10
|
-
* import * from "fs";
|
|
11
11
|
*
|
|
12
12
|
* const gcp = new vault.gcp.AuthBackend("gcp", {credentials: fs.readFileSync("vault-gcp-credentials.json")});
|
|
13
13
|
* ```
|
package/gcp/authBackend.js
CHANGED
|
@@ -12,8 +12,8 @@ const utilities = require("../utilities");
|
|
|
12
12
|
*
|
|
13
13
|
* ```typescript
|
|
14
14
|
* import * as pulumi from "@pulumi/pulumi";
|
|
15
|
+
* import * as fs from "fs";
|
|
15
16
|
* import * as vault from "@pulumi/vault";
|
|
16
|
-
* import * from "fs";
|
|
17
17
|
*
|
|
18
18
|
* const gcp = new vault.gcp.AuthBackend("gcp", {credentials: fs.readFileSync("vault-gcp-credentials.json")});
|
|
19
19
|
* ```
|
package/gcp/secretBackend.d.ts
CHANGED
|
@@ -4,8 +4,8 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
4
4
|
*
|
|
5
5
|
* ```typescript
|
|
6
6
|
* import * as pulumi from "@pulumi/pulumi";
|
|
7
|
+
* import * as fs from "fs";
|
|
7
8
|
* import * as vault from "@pulumi/vault";
|
|
8
|
-
* import * from "fs";
|
|
9
9
|
*
|
|
10
10
|
* const gcp = new vault.gcp.SecretBackend("gcp", {credentials: fs.readFileSync("credentials.json")});
|
|
11
11
|
* ```
|
package/gcp/secretBackend.js
CHANGED
|
@@ -10,8 +10,8 @@ const utilities = require("../utilities");
|
|
|
10
10
|
*
|
|
11
11
|
* ```typescript
|
|
12
12
|
* import * as pulumi from "@pulumi/pulumi";
|
|
13
|
+
* import * as fs from "fs";
|
|
13
14
|
* import * as vault from "@pulumi/vault";
|
|
14
|
-
* import * from "fs";
|
|
15
15
|
*
|
|
16
16
|
* const gcp = new vault.gcp.SecretBackend("gcp", {credentials: fs.readFileSync("credentials.json")});
|
|
17
17
|
* ```
|
package/gcp/secretRoleset.d.ts
CHANGED
|
@@ -9,8 +9,8 @@ import { input as inputs, output as outputs } from "../types";
|
|
|
9
9
|
*
|
|
10
10
|
* ```typescript
|
|
11
11
|
* import * as pulumi from "@pulumi/pulumi";
|
|
12
|
+
* import * as fs from "fs";
|
|
12
13
|
* import * as vault from "@pulumi/vault";
|
|
13
|
-
* import * from "fs";
|
|
14
14
|
*
|
|
15
15
|
* const project = "my-awesome-project";
|
|
16
16
|
* const gcp = new vault.gcp.SecretBackend("gcp", {
|
package/gcp/secretRoleset.js
CHANGED
|
@@ -14,8 +14,8 @@ const utilities = require("../utilities");
|
|
|
14
14
|
*
|
|
15
15
|
* ```typescript
|
|
16
16
|
* import * as pulumi from "@pulumi/pulumi";
|
|
17
|
+
* import * as fs from "fs";
|
|
17
18
|
* import * as vault from "@pulumi/vault";
|
|
18
|
-
* import * from "fs";
|
|
19
19
|
*
|
|
20
20
|
* const project = "my-awesome-project";
|
|
21
21
|
* const gcp = new vault.gcp.SecretBackend("gcp", {
|
|
@@ -10,9 +10,9 @@ import { input as inputs, output as outputs } from "../types";
|
|
|
10
10
|
*
|
|
11
11
|
* ```typescript
|
|
12
12
|
* import * as pulumi from "@pulumi/pulumi";
|
|
13
|
+
* import * as fs from "fs";
|
|
13
14
|
* import * as gcp from "@pulumi/gcp";
|
|
14
15
|
* import * as vault from "@pulumi/vault";
|
|
15
|
-
* import * from "fs";
|
|
16
16
|
*
|
|
17
17
|
* const _this = new gcp.serviceaccount.Account("this", {accountId: "my-awesome-account"});
|
|
18
18
|
* const gcp = new vault.gcp.SecretBackend("gcp", {
|
|
@@ -15,9 +15,9 @@ const utilities = require("../utilities");
|
|
|
15
15
|
*
|
|
16
16
|
* ```typescript
|
|
17
17
|
* import * as pulumi from "@pulumi/pulumi";
|
|
18
|
+
* import * as fs from "fs";
|
|
18
19
|
* import * as gcp from "@pulumi/gcp";
|
|
19
20
|
* import * as vault from "@pulumi/vault";
|
|
20
|
-
* import * from "fs";
|
|
21
21
|
*
|
|
22
22
|
* const _this = new gcp.serviceaccount.Account("this", {accountId: "my-awesome-account"});
|
|
23
23
|
* const gcp = new vault.gcp.SecretBackend("gcp", {
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@pulumi/vault",
|
|
3
|
-
"version": "v5.
|
|
3
|
+
"version": "v5.6.0",
|
|
4
4
|
"description": "A Pulumi package for creating and managing vault cloud resources.",
|
|
5
5
|
"keywords": [
|
|
6
6
|
"pulumi",
|
|
@@ -11,7 +11,7 @@
|
|
|
11
11
|
"license": "Apache-2.0",
|
|
12
12
|
"scripts": {
|
|
13
13
|
"build": "tsc",
|
|
14
|
-
"install": "node scripts/install-pulumi-plugin.js resource vault v5.
|
|
14
|
+
"install": "node scripts/install-pulumi-plugin.js resource vault v5.6.0"
|
|
15
15
|
},
|
|
16
16
|
"dependencies": {
|
|
17
17
|
"@pulumi/pulumi": "^3.0.0"
|
|
@@ -22,6 +22,7 @@
|
|
|
22
22
|
"typescript": "^4.3.5"
|
|
23
23
|
},
|
|
24
24
|
"pulumi": {
|
|
25
|
-
"resource": true
|
|
25
|
+
"resource": true,
|
|
26
|
+
"name": "vault"
|
|
26
27
|
}
|
|
27
28
|
}
|
package/package.json.bak
CHANGED
package/package.json.dev
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@pulumi/vault",
|
|
3
|
-
"version": "v5.
|
|
3
|
+
"version": "v5.6.0",
|
|
4
4
|
"description": "A Pulumi package for creating and managing vault cloud resources.",
|
|
5
5
|
"keywords": [
|
|
6
6
|
"pulumi",
|
|
@@ -11,7 +11,7 @@
|
|
|
11
11
|
"license": "Apache-2.0",
|
|
12
12
|
"scripts": {
|
|
13
13
|
"build": "tsc",
|
|
14
|
-
"install": "node scripts/install-pulumi-plugin.js resource vault v5.
|
|
14
|
+
"install": "node scripts/install-pulumi-plugin.js resource vault v5.6.0"
|
|
15
15
|
},
|
|
16
16
|
"dependencies": {
|
|
17
17
|
"@pulumi/pulumi": "^3.0.0"
|
|
@@ -22,6 +22,7 @@
|
|
|
22
22
|
"typescript": "^4.3.5"
|
|
23
23
|
},
|
|
24
24
|
"pulumi": {
|
|
25
|
-
"resource": true
|
|
25
|
+
"resource": true,
|
|
26
|
+
"name": "vault"
|
|
26
27
|
}
|
|
27
28
|
}
|
package/types/input.d.ts
CHANGED
|
@@ -44,73 +44,73 @@ export interface AuthBackendTune {
|
|
|
44
44
|
*/
|
|
45
45
|
tokenType?: pulumi.Input<string>;
|
|
46
46
|
}
|
|
47
|
-
export interface
|
|
47
|
+
export interface GetPolicyDocumentRule {
|
|
48
48
|
/**
|
|
49
49
|
* Whitelists a list of keys and values that are permitted on the given path. See Parameters below.
|
|
50
50
|
*/
|
|
51
|
-
allowedParameters?:
|
|
51
|
+
allowedParameters?: inputs.GetPolicyDocumentRuleAllowedParameter[];
|
|
52
52
|
/**
|
|
53
53
|
* A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
|
|
54
54
|
*/
|
|
55
|
-
capabilities:
|
|
55
|
+
capabilities: string[];
|
|
56
56
|
/**
|
|
57
57
|
* Blacklists a list of parameter and values. Any values specified here take precedence over `allowedParameter`. See Parameters below.
|
|
58
58
|
*/
|
|
59
|
-
deniedParameters?:
|
|
59
|
+
deniedParameters?: inputs.GetPolicyDocumentRuleDeniedParameter[];
|
|
60
60
|
/**
|
|
61
61
|
* Description of the rule. Will be added as a comment to rendered rule.
|
|
62
62
|
*/
|
|
63
|
-
description?:
|
|
63
|
+
description?: string;
|
|
64
64
|
/**
|
|
65
65
|
* The maximum allowed TTL that clients can specify for a wrapped response.
|
|
66
66
|
*/
|
|
67
|
-
maxWrappingTtl?:
|
|
67
|
+
maxWrappingTtl?: string;
|
|
68
68
|
/**
|
|
69
69
|
* The minimum allowed TTL that clients can specify for a wrapped response.
|
|
70
70
|
*/
|
|
71
|
-
minWrappingTtl?:
|
|
71
|
+
minWrappingTtl?: string;
|
|
72
72
|
/**
|
|
73
73
|
* A path in Vault that this rule applies to.
|
|
74
74
|
*/
|
|
75
|
-
path:
|
|
75
|
+
path: string;
|
|
76
76
|
/**
|
|
77
77
|
* A list of parameters that must be specified.
|
|
78
78
|
*/
|
|
79
|
-
requiredParameters?:
|
|
79
|
+
requiredParameters?: string[];
|
|
80
80
|
}
|
|
81
|
-
export interface
|
|
81
|
+
export interface GetPolicyDocumentRuleArgs {
|
|
82
82
|
/**
|
|
83
83
|
* Whitelists a list of keys and values that are permitted on the given path. See Parameters below.
|
|
84
84
|
*/
|
|
85
|
-
allowedParameters?: inputs.
|
|
85
|
+
allowedParameters?: pulumi.Input<pulumi.Input<inputs.GetPolicyDocumentRuleAllowedParameterArgs>[]>;
|
|
86
86
|
/**
|
|
87
87
|
* A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
|
|
88
88
|
*/
|
|
89
|
-
capabilities: string[]
|
|
89
|
+
capabilities: pulumi.Input<pulumi.Input<string>[]>;
|
|
90
90
|
/**
|
|
91
91
|
* Blacklists a list of parameter and values. Any values specified here take precedence over `allowedParameter`. See Parameters below.
|
|
92
92
|
*/
|
|
93
|
-
deniedParameters?: inputs.
|
|
93
|
+
deniedParameters?: pulumi.Input<pulumi.Input<inputs.GetPolicyDocumentRuleDeniedParameterArgs>[]>;
|
|
94
94
|
/**
|
|
95
95
|
* Description of the rule. Will be added as a comment to rendered rule.
|
|
96
96
|
*/
|
|
97
|
-
description?: string
|
|
97
|
+
description?: pulumi.Input<string>;
|
|
98
98
|
/**
|
|
99
99
|
* The maximum allowed TTL that clients can specify for a wrapped response.
|
|
100
100
|
*/
|
|
101
|
-
maxWrappingTtl?: string
|
|
101
|
+
maxWrappingTtl?: pulumi.Input<string>;
|
|
102
102
|
/**
|
|
103
103
|
* The minimum allowed TTL that clients can specify for a wrapped response.
|
|
104
104
|
*/
|
|
105
|
-
minWrappingTtl?: string
|
|
105
|
+
minWrappingTtl?: pulumi.Input<string>;
|
|
106
106
|
/**
|
|
107
107
|
* A path in Vault that this rule applies to.
|
|
108
108
|
*/
|
|
109
|
-
path: string
|
|
109
|
+
path: pulumi.Input<string>;
|
|
110
110
|
/**
|
|
111
111
|
* A list of parameters that must be specified.
|
|
112
112
|
*/
|
|
113
|
-
requiredParameters?: string[]
|
|
113
|
+
requiredParameters?: pulumi.Input<pulumi.Input<string>[]>;
|
|
114
114
|
}
|
|
115
115
|
export interface GetPolicyDocumentRuleAllowedParameterArgs {
|
|
116
116
|
/**
|
|
@@ -132,25 +132,25 @@ export interface GetPolicyDocumentRuleAllowedParameter {
|
|
|
132
132
|
*/
|
|
133
133
|
values: string[];
|
|
134
134
|
}
|
|
135
|
-
export interface
|
|
135
|
+
export interface GetPolicyDocumentRuleDeniedParameterArgs {
|
|
136
136
|
/**
|
|
137
137
|
* name of permitted or denied parameter.
|
|
138
138
|
*/
|
|
139
|
-
key: string
|
|
139
|
+
key: pulumi.Input<string>;
|
|
140
140
|
/**
|
|
141
141
|
* list of values what are permitted or denied by policy rule.
|
|
142
142
|
*/
|
|
143
|
-
values: string[]
|
|
143
|
+
values: pulumi.Input<pulumi.Input<string>[]>;
|
|
144
144
|
}
|
|
145
|
-
export interface
|
|
145
|
+
export interface GetPolicyDocumentRuleDeniedParameter {
|
|
146
146
|
/**
|
|
147
147
|
* name of permitted or denied parameter.
|
|
148
148
|
*/
|
|
149
|
-
key:
|
|
149
|
+
key: string;
|
|
150
150
|
/**
|
|
151
151
|
* list of values what are permitted or denied by policy rule.
|
|
152
152
|
*/
|
|
153
|
-
values:
|
|
153
|
+
values: string[];
|
|
154
154
|
}
|
|
155
155
|
export interface ProviderAuthLogin {
|
|
156
156
|
method?: pulumi.Input<string>;
|