@pulumi/vault 5.5.0 → 5.6.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -8,11 +8,16 @@ import * as pulumi from "@pulumi/pulumi";
8
8
  * import * as pulumi from "@pulumi/pulumi";
9
9
  * import * as vault from "@pulumi/vault";
10
10
  *
11
- * const role = vault.appRole.getAuthBackendRoleId({
12
- * backend: "my-approle-backend",
13
- * roleName: "my-role",
14
- * });
15
- * export const role_id = role.then(role => role.roleId);
11
+ * export = async () => {
12
+ * const role = await vault.appRole.getAuthBackendRoleId({
13
+ * backend: "my-approle-backend",
14
+ * roleName: "my-role",
15
+ * });
16
+ * const role_id = role.roleId;
17
+ * return {
18
+ * "role-id": role_id,
19
+ * };
20
+ * }
16
21
  * ```
17
22
  */
18
23
  export declare function getAuthBackendRoleId(args: GetAuthBackendRoleIdArgs, opts?: pulumi.InvokeOptions): Promise<GetAuthBackendRoleIdResult>;
@@ -14,11 +14,16 @@ const utilities = require("../utilities");
14
14
  * import * as pulumi from "@pulumi/pulumi";
15
15
  * import * as vault from "@pulumi/vault";
16
16
  *
17
- * const role = vault.appRole.getAuthBackendRoleId({
18
- * backend: "my-approle-backend",
19
- * roleName: "my-role",
20
- * });
21
- * export const role_id = role.then(role => role.roleId);
17
+ * export = async () => {
18
+ * const role = await vault.appRole.getAuthBackendRoleId({
19
+ * backend: "my-approle-backend",
20
+ * roleName: "my-role",
21
+ * });
22
+ * const role_id = role.roleId;
23
+ * return {
24
+ * "role-id": role_id,
25
+ * };
26
+ * }
22
27
  * ```
23
28
  */
24
29
  function getAuthBackendRoleId(args, opts) {
@@ -1 +1 @@
1
- {"version":3,"file":"getAuthBackendRoleId.js","sourceRoot":"","sources":["../../approle/getAuthBackendRoleId.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;GAeG;AACH,SAAgB,oBAAoB,CAAC,IAA8B,EAAE,IAA2B;IAC5F,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,yDAAyD,EAAE;QACpF,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,UAAU,EAAE,IAAI,CAAC,QAAQ;KAC5B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAVD,oDAUC;AAiCD,SAAgB,0BAA0B,CAAC,IAAoC,EAAE,IAA2B;IACxG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,oBAAoB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACxE,CAAC;AAFD,gEAEC"}
1
+ {"version":3,"file":"getAuthBackendRoleId.js","sourceRoot":"","sources":["../../approle/getAuthBackendRoleId.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;GAoBG;AACH,SAAgB,oBAAoB,CAAC,IAA8B,EAAE,IAA2B;IAC5F,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,yDAAyD,EAAE;QACpF,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,UAAU,EAAE,IAAI,CAAC,QAAQ;KAC5B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAVD,oDAUC;AAiCD,SAAgB,0BAA0B,CAAC,IAAoC,EAAE,IAA2B;IACxG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,oBAAoB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACxE,CAAC;AAFD,gEAEC"}
@@ -6,8 +6,8 @@ import * as pulumi from "@pulumi/pulumi";
6
6
  *
7
7
  * ```typescript
8
8
  * import * as pulumi from "@pulumi/pulumi";
9
+ * import * as fs from "fs";
9
10
  * import * as vault from "@pulumi/vault";
10
- * import * from "fs";
11
11
  *
12
12
  * const certAuthBackend = new vault.AuthBackend("certAuthBackend", {
13
13
  * path: "cert",
@@ -12,8 +12,8 @@ const utilities = require("./utilities");
12
12
  *
13
13
  * ```typescript
14
14
  * import * as pulumi from "@pulumi/pulumi";
15
+ * import * as fs from "fs";
15
16
  * import * as vault from "@pulumi/vault";
16
- * import * from "fs";
17
17
  *
18
18
  * const certAuthBackend = new vault.AuthBackend("certAuthBackend", {
19
19
  * path: "cert",
@@ -6,8 +6,8 @@ import * as pulumi from "@pulumi/pulumi";
6
6
  *
7
7
  * ```typescript
8
8
  * import * as pulumi from "@pulumi/pulumi";
9
+ * import * as fs from "fs";
9
10
  * import * as vault from "@pulumi/vault";
10
- * import * from "fs";
11
11
  *
12
12
  * const gcp = new vault.gcp.AuthBackend("gcp", {credentials: fs.readFileSync("vault-gcp-credentials.json")});
13
13
  * ```
@@ -12,8 +12,8 @@ const utilities = require("../utilities");
12
12
  *
13
13
  * ```typescript
14
14
  * import * as pulumi from "@pulumi/pulumi";
15
+ * import * as fs from "fs";
15
16
  * import * as vault from "@pulumi/vault";
16
- * import * from "fs";
17
17
  *
18
18
  * const gcp = new vault.gcp.AuthBackend("gcp", {credentials: fs.readFileSync("vault-gcp-credentials.json")});
19
19
  * ```
@@ -4,8 +4,8 @@ import * as pulumi from "@pulumi/pulumi";
4
4
  *
5
5
  * ```typescript
6
6
  * import * as pulumi from "@pulumi/pulumi";
7
+ * import * as fs from "fs";
7
8
  * import * as vault from "@pulumi/vault";
8
- * import * from "fs";
9
9
  *
10
10
  * const gcp = new vault.gcp.SecretBackend("gcp", {credentials: fs.readFileSync("credentials.json")});
11
11
  * ```
@@ -10,8 +10,8 @@ const utilities = require("../utilities");
10
10
  *
11
11
  * ```typescript
12
12
  * import * as pulumi from "@pulumi/pulumi";
13
+ * import * as fs from "fs";
13
14
  * import * as vault from "@pulumi/vault";
14
- * import * from "fs";
15
15
  *
16
16
  * const gcp = new vault.gcp.SecretBackend("gcp", {credentials: fs.readFileSync("credentials.json")});
17
17
  * ```
@@ -9,8 +9,8 @@ import { input as inputs, output as outputs } from "../types";
9
9
  *
10
10
  * ```typescript
11
11
  * import * as pulumi from "@pulumi/pulumi";
12
+ * import * as fs from "fs";
12
13
  * import * as vault from "@pulumi/vault";
13
- * import * from "fs";
14
14
  *
15
15
  * const project = "my-awesome-project";
16
16
  * const gcp = new vault.gcp.SecretBackend("gcp", {
@@ -14,8 +14,8 @@ const utilities = require("../utilities");
14
14
  *
15
15
  * ```typescript
16
16
  * import * as pulumi from "@pulumi/pulumi";
17
+ * import * as fs from "fs";
17
18
  * import * as vault from "@pulumi/vault";
18
- * import * from "fs";
19
19
  *
20
20
  * const project = "my-awesome-project";
21
21
  * const gcp = new vault.gcp.SecretBackend("gcp", {
@@ -10,9 +10,9 @@ import { input as inputs, output as outputs } from "../types";
10
10
  *
11
11
  * ```typescript
12
12
  * import * as pulumi from "@pulumi/pulumi";
13
+ * import * as fs from "fs";
13
14
  * import * as gcp from "@pulumi/gcp";
14
15
  * import * as vault from "@pulumi/vault";
15
- * import * from "fs";
16
16
  *
17
17
  * const _this = new gcp.serviceaccount.Account("this", {accountId: "my-awesome-account"});
18
18
  * const gcp = new vault.gcp.SecretBackend("gcp", {
@@ -15,9 +15,9 @@ const utilities = require("../utilities");
15
15
  *
16
16
  * ```typescript
17
17
  * import * as pulumi from "@pulumi/pulumi";
18
+ * import * as fs from "fs";
18
19
  * import * as gcp from "@pulumi/gcp";
19
20
  * import * as vault from "@pulumi/vault";
20
- * import * from "fs";
21
21
  *
22
22
  * const _this = new gcp.serviceaccount.Account("this", {accountId: "my-awesome-account"});
23
23
  * const gcp = new vault.gcp.SecretBackend("gcp", {
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@pulumi/vault",
3
- "version": "v5.5.0",
3
+ "version": "v5.6.0",
4
4
  "description": "A Pulumi package for creating and managing vault cloud resources.",
5
5
  "keywords": [
6
6
  "pulumi",
@@ -11,7 +11,7 @@
11
11
  "license": "Apache-2.0",
12
12
  "scripts": {
13
13
  "build": "tsc",
14
- "install": "node scripts/install-pulumi-plugin.js resource vault v5.5.0"
14
+ "install": "node scripts/install-pulumi-plugin.js resource vault v5.6.0"
15
15
  },
16
16
  "dependencies": {
17
17
  "@pulumi/pulumi": "^3.0.0"
@@ -22,6 +22,7 @@
22
22
  "typescript": "^4.3.5"
23
23
  },
24
24
  "pulumi": {
25
- "resource": true
25
+ "resource": true,
26
+ "name": "vault"
26
27
  }
27
28
  }
package/package.json.bak CHANGED
@@ -22,6 +22,7 @@
22
22
  "typescript": "^4.3.5"
23
23
  },
24
24
  "pulumi": {
25
- "resource": true
25
+ "resource": true,
26
+ "name": "vault"
26
27
  }
27
28
  }
package/package.json.dev CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@pulumi/vault",
3
- "version": "v5.5.0",
3
+ "version": "v5.6.0",
4
4
  "description": "A Pulumi package for creating and managing vault cloud resources.",
5
5
  "keywords": [
6
6
  "pulumi",
@@ -11,7 +11,7 @@
11
11
  "license": "Apache-2.0",
12
12
  "scripts": {
13
13
  "build": "tsc",
14
- "install": "node scripts/install-pulumi-plugin.js resource vault v5.5.0"
14
+ "install": "node scripts/install-pulumi-plugin.js resource vault v5.6.0"
15
15
  },
16
16
  "dependencies": {
17
17
  "@pulumi/pulumi": "^3.0.0"
@@ -22,6 +22,7 @@
22
22
  "typescript": "^4.3.5"
23
23
  },
24
24
  "pulumi": {
25
- "resource": true
25
+ "resource": true,
26
+ "name": "vault"
26
27
  }
27
28
  }
package/types/input.d.ts CHANGED
@@ -44,73 +44,73 @@ export interface AuthBackendTune {
44
44
  */
45
45
  tokenType?: pulumi.Input<string>;
46
46
  }
47
- export interface GetPolicyDocumentRuleArgs {
47
+ export interface GetPolicyDocumentRule {
48
48
  /**
49
49
  * Whitelists a list of keys and values that are permitted on the given path. See Parameters below.
50
50
  */
51
- allowedParameters?: pulumi.Input<pulumi.Input<inputs.GetPolicyDocumentRuleAllowedParameterArgs>[]>;
51
+ allowedParameters?: inputs.GetPolicyDocumentRuleAllowedParameter[];
52
52
  /**
53
53
  * A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
54
54
  */
55
- capabilities: pulumi.Input<pulumi.Input<string>[]>;
55
+ capabilities: string[];
56
56
  /**
57
57
  * Blacklists a list of parameter and values. Any values specified here take precedence over `allowedParameter`. See Parameters below.
58
58
  */
59
- deniedParameters?: pulumi.Input<pulumi.Input<inputs.GetPolicyDocumentRuleDeniedParameterArgs>[]>;
59
+ deniedParameters?: inputs.GetPolicyDocumentRuleDeniedParameter[];
60
60
  /**
61
61
  * Description of the rule. Will be added as a comment to rendered rule.
62
62
  */
63
- description?: pulumi.Input<string>;
63
+ description?: string;
64
64
  /**
65
65
  * The maximum allowed TTL that clients can specify for a wrapped response.
66
66
  */
67
- maxWrappingTtl?: pulumi.Input<string>;
67
+ maxWrappingTtl?: string;
68
68
  /**
69
69
  * The minimum allowed TTL that clients can specify for a wrapped response.
70
70
  */
71
- minWrappingTtl?: pulumi.Input<string>;
71
+ minWrappingTtl?: string;
72
72
  /**
73
73
  * A path in Vault that this rule applies to.
74
74
  */
75
- path: pulumi.Input<string>;
75
+ path: string;
76
76
  /**
77
77
  * A list of parameters that must be specified.
78
78
  */
79
- requiredParameters?: pulumi.Input<pulumi.Input<string>[]>;
79
+ requiredParameters?: string[];
80
80
  }
81
- export interface GetPolicyDocumentRule {
81
+ export interface GetPolicyDocumentRuleArgs {
82
82
  /**
83
83
  * Whitelists a list of keys and values that are permitted on the given path. See Parameters below.
84
84
  */
85
- allowedParameters?: inputs.GetPolicyDocumentRuleAllowedParameter[];
85
+ allowedParameters?: pulumi.Input<pulumi.Input<inputs.GetPolicyDocumentRuleAllowedParameterArgs>[]>;
86
86
  /**
87
87
  * A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
88
88
  */
89
- capabilities: string[];
89
+ capabilities: pulumi.Input<pulumi.Input<string>[]>;
90
90
  /**
91
91
  * Blacklists a list of parameter and values. Any values specified here take precedence over `allowedParameter`. See Parameters below.
92
92
  */
93
- deniedParameters?: inputs.GetPolicyDocumentRuleDeniedParameter[];
93
+ deniedParameters?: pulumi.Input<pulumi.Input<inputs.GetPolicyDocumentRuleDeniedParameterArgs>[]>;
94
94
  /**
95
95
  * Description of the rule. Will be added as a comment to rendered rule.
96
96
  */
97
- description?: string;
97
+ description?: pulumi.Input<string>;
98
98
  /**
99
99
  * The maximum allowed TTL that clients can specify for a wrapped response.
100
100
  */
101
- maxWrappingTtl?: string;
101
+ maxWrappingTtl?: pulumi.Input<string>;
102
102
  /**
103
103
  * The minimum allowed TTL that clients can specify for a wrapped response.
104
104
  */
105
- minWrappingTtl?: string;
105
+ minWrappingTtl?: pulumi.Input<string>;
106
106
  /**
107
107
  * A path in Vault that this rule applies to.
108
108
  */
109
- path: string;
109
+ path: pulumi.Input<string>;
110
110
  /**
111
111
  * A list of parameters that must be specified.
112
112
  */
113
- requiredParameters?: string[];
113
+ requiredParameters?: pulumi.Input<pulumi.Input<string>[]>;
114
114
  }
115
115
  export interface GetPolicyDocumentRuleAllowedParameterArgs {
116
116
  /**
@@ -132,25 +132,25 @@ export interface GetPolicyDocumentRuleAllowedParameter {
132
132
  */
133
133
  values: string[];
134
134
  }
135
- export interface GetPolicyDocumentRuleDeniedParameter {
135
+ export interface GetPolicyDocumentRuleDeniedParameterArgs {
136
136
  /**
137
137
  * name of permitted or denied parameter.
138
138
  */
139
- key: string;
139
+ key: pulumi.Input<string>;
140
140
  /**
141
141
  * list of values what are permitted or denied by policy rule.
142
142
  */
143
- values: string[];
143
+ values: pulumi.Input<pulumi.Input<string>[]>;
144
144
  }
145
- export interface GetPolicyDocumentRuleDeniedParameterArgs {
145
+ export interface GetPolicyDocumentRuleDeniedParameter {
146
146
  /**
147
147
  * name of permitted or denied parameter.
148
148
  */
149
- key: pulumi.Input<string>;
149
+ key: string;
150
150
  /**
151
151
  * list of values what are permitted or denied by policy rule.
152
152
  */
153
- values: pulumi.Input<pulumi.Input<string>[]>;
153
+ values: string[];
154
154
  }
155
155
  export interface ProviderAuthLogin {
156
156
  method?: pulumi.Input<string>;