@pulumi/vault 5.6.0 → 5.7.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/ad/getAccessCredentials.d.ts +15 -0
- package/ad/getAccessCredentials.js +1 -0
- package/ad/getAccessCredentials.js.map +1 -1
- package/ad/index.d.ts +12 -4
- package/ad/index.js +13 -26
- package/ad/index.js.map +1 -1
- package/ad/secretBackend.d.ts +39 -0
- package/ad/secretBackend.js +9 -3
- package/ad/secretBackend.js.map +1 -1
- package/ad/secretLibrary.d.ts +21 -0
- package/ad/secretLibrary.js +2 -0
- package/ad/secretLibrary.js.map +1 -1
- package/ad/secretRole.d.ts +21 -0
- package/ad/secretRole.js +2 -0
- package/ad/secretRole.js.map +1 -1
- package/alicloud/authBackendRole.d.ts +21 -0
- package/alicloud/authBackendRole.js +2 -0
- package/alicloud/authBackendRole.js.map +1 -1
- package/alicloud/index.d.ts +3 -1
- package/alicloud/index.js +4 -19
- package/alicloud/index.js.map +1 -1
- package/approle/authBackendLogin.d.ts +22 -1
- package/approle/authBackendLogin.js +3 -1
- package/approle/authBackendLogin.js.map +1 -1
- package/approle/authBackendRole.d.ts +21 -0
- package/approle/authBackendRole.js +2 -0
- package/approle/authBackendRole.js.map +1 -1
- package/approle/{authBackendRoleSecretID.d.ts → authBackendRoleSecretId.d.ts} +33 -12
- package/approle/{authBackendRoleSecretID.js → authBackendRoleSecretId.js} +16 -12
- package/approle/authBackendRoleSecretId.js.map +1 -0
- package/approle/getAuthBackendRoleId.d.ts +15 -0
- package/approle/getAuthBackendRoleId.js +1 -0
- package/approle/getAuthBackendRoleId.js.map +1 -1
- package/approle/index.d.ts +12 -4
- package/approle/index.js +15 -28
- package/approle/index.js.map +1 -1
- package/audit.d.ts +21 -0
- package/audit.js +2 -0
- package/audit.js.map +1 -1
- package/authBackend.d.ts +47 -10
- package/authBackend.js +4 -0
- package/authBackend.js.map +1 -1
- package/aws/authBackendCert.d.ts +21 -0
- package/aws/authBackendCert.js +2 -0
- package/aws/authBackendCert.js.map +1 -1
- package/aws/authBackendClient.d.ts +21 -0
- package/aws/authBackendClient.js +6 -2
- package/aws/authBackendClient.js.map +1 -1
- package/aws/authBackendIdentityWhitelist.d.ts +21 -0
- package/aws/authBackendIdentityWhitelist.js +2 -0
- package/aws/authBackendIdentityWhitelist.js.map +1 -1
- package/aws/authBackendLogin.d.ts +21 -0
- package/aws/authBackendLogin.js +4 -0
- package/aws/authBackendLogin.js.map +1 -1
- package/aws/authBackendRole.d.ts +21 -0
- package/aws/authBackendRole.js +2 -0
- package/aws/authBackendRole.js.map +1 -1
- package/aws/authBackendRoleTag.d.ts +21 -0
- package/aws/authBackendRoleTag.js +2 -0
- package/aws/authBackendRoleTag.js.map +1 -1
- package/aws/authBackendRoletagBlacklist.d.ts +21 -0
- package/aws/authBackendRoletagBlacklist.js +2 -0
- package/aws/authBackendRoletagBlacklist.js.map +1 -1
- package/aws/authBackendStsRole.d.ts +21 -0
- package/aws/authBackendStsRole.js +2 -0
- package/aws/authBackendStsRole.js.map +1 -1
- package/aws/getAccessCredentials.d.ts +15 -0
- package/aws/getAccessCredentials.js +1 -0
- package/aws/getAccessCredentials.js.map +1 -1
- package/aws/index.d.ts +33 -11
- package/aws/index.js +34 -47
- package/aws/index.js.map +1 -1
- package/aws/secretBackend.d.ts +36 -12
- package/aws/secretBackend.js +8 -14
- package/aws/secretBackend.js.map +1 -1
- package/aws/secretBackendRole.d.ts +21 -0
- package/aws/secretBackendRole.js +2 -0
- package/aws/secretBackendRole.js.map +1 -1
- package/azure/authBackendConfig.d.ts +21 -0
- package/azure/authBackendConfig.js +7 -3
- package/azure/authBackendConfig.js.map +1 -1
- package/azure/authBackendRole.d.ts +21 -0
- package/azure/authBackendRole.js +2 -0
- package/azure/authBackendRole.js.map +1 -1
- package/azure/backend.d.ts +36 -0
- package/azure/backend.js +10 -4
- package/azure/backend.js.map +1 -1
- package/azure/backendRole.d.ts +23 -1
- package/azure/backendRole.js +2 -0
- package/azure/backendRole.js.map +1 -1
- package/azure/getAccessCredentials.d.ts +15 -0
- package/azure/getAccessCredentials.js +1 -0
- package/azure/getAccessCredentials.js.map +1 -1
- package/azure/index.d.ts +15 -5
- package/azure/index.js +16 -29
- package/azure/index.js.map +1 -1
- package/certAuthBackendRole.d.ts +39 -3
- package/certAuthBackendRole.js +4 -0
- package/certAuthBackendRole.js.map +1 -1
- package/config/vars.d.ts +43 -3
- package/config/vars.js +64 -4
- package/config/vars.js.map +1 -1
- package/consul/index.d.ts +6 -2
- package/consul/index.js +7 -22
- package/consul/index.js.map +1 -1
- package/consul/secretBackend.d.ts +87 -15
- package/consul/secretBackend.js +24 -7
- package/consul/secretBackend.js.map +1 -1
- package/consul/secretBackendRole.d.ts +93 -10
- package/consul/secretBackendRole.js +14 -1
- package/consul/secretBackendRole.js.map +1 -1
- package/database/index.d.ts +12 -4
- package/database/index.js +13 -28
- package/database/index.js.map +1 -1
- package/database/secretBackendConnection.d.ts +35 -1
- package/database/secretBackendConnection.js +4 -0
- package/database/secretBackendConnection.js.map +1 -1
- package/database/secretBackendRole.d.ts +21 -0
- package/database/secretBackendRole.js +2 -0
- package/database/secretBackendRole.js.map +1 -1
- package/database/secretBackendStaticRole.d.ts +21 -0
- package/database/secretBackendStaticRole.js +2 -0
- package/database/secretBackendStaticRole.js.map +1 -1
- package/database/secretsMount.d.ts +41 -1
- package/database/secretsMount.js +6 -0
- package/database/secretsMount.js.map +1 -1
- package/egpPolicy.d.ts +21 -0
- package/egpPolicy.js +2 -0
- package/egpPolicy.js.map +1 -1
- package/gcp/authBackend.d.ts +71 -1
- package/gcp/authBackend.js +18 -2
- package/gcp/authBackend.js.map +1 -1
- package/gcp/authBackendRole.d.ts +21 -0
- package/gcp/authBackendRole.js +2 -0
- package/gcp/authBackendRole.js.map +1 -1
- package/gcp/getAuthBackendRole.d.ts +15 -0
- package/gcp/getAuthBackendRole.js +1 -0
- package/gcp/getAuthBackendRole.js.map +1 -1
- package/gcp/index.d.ts +18 -6
- package/gcp/index.js +19 -32
- package/gcp/index.js.map +1 -1
- package/gcp/secretBackend.d.ts +36 -0
- package/gcp/secretBackend.js +7 -1
- package/gcp/secretBackend.js.map +1 -1
- package/gcp/secretRoleset.d.ts +23 -1
- package/gcp/secretRoleset.js +2 -0
- package/gcp/secretRoleset.js.map +1 -1
- package/gcp/secretStaticAccount.d.ts +23 -1
- package/gcp/secretStaticAccount.js +2 -0
- package/gcp/secretStaticAccount.js.map +1 -1
- package/generic/endpoint.d.ts +21 -0
- package/generic/endpoint.js +5 -1
- package/generic/endpoint.js.map +1 -1
- package/generic/getSecret.d.ts +15 -0
- package/generic/getSecret.js +1 -0
- package/generic/getSecret.js.map +1 -1
- package/generic/index.d.ts +9 -3
- package/generic/index.js +10 -23
- package/generic/index.js.map +1 -1
- package/generic/secret.d.ts +21 -0
- package/generic/secret.js +5 -1
- package/generic/secret.js.map +1 -1
- package/getAuthBackend.d.ts +16 -1
- package/getAuthBackend.js +1 -0
- package/getAuthBackend.js.map +1 -1
- package/getNomadAccessToken.d.ts +15 -0
- package/getNomadAccessToken.js +1 -0
- package/getNomadAccessToken.js.map +1 -1
- package/getPolicyDocument.d.ts +5 -1
- package/getPolicyDocument.js +1 -0
- package/getPolicyDocument.js.map +1 -1
- package/github/authBackend.d.ts +38 -1
- package/github/authBackend.js +4 -0
- package/github/authBackend.js.map +1 -1
- package/github/index.d.ts +9 -3
- package/github/index.js +10 -25
- package/github/index.js.map +1 -1
- package/github/team.d.ts +21 -0
- package/github/team.js +2 -0
- package/github/team.js.map +1 -1
- package/github/user.d.ts +21 -0
- package/github/user.js +2 -0
- package/github/user.js.map +1 -1
- package/identity/entity.d.ts +21 -0
- package/identity/entity.js +2 -0
- package/identity/entity.js.map +1 -1
- package/identity/entityAlias.d.ts +21 -0
- package/identity/entityAlias.js +2 -0
- package/identity/entityAlias.js.map +1 -1
- package/identity/entityPolicies.d.ts +21 -0
- package/identity/entityPolicies.js +2 -0
- package/identity/entityPolicies.js.map +1 -1
- package/identity/getEntity.d.ts +16 -1
- package/identity/getEntity.js +1 -0
- package/identity/getEntity.js.map +1 -1
- package/identity/getGroup.d.ts +15 -0
- package/identity/getGroup.js +1 -0
- package/identity/getGroup.js.map +1 -1
- package/identity/getOidcClientCreds.d.ts +15 -0
- package/identity/getOidcClientCreds.js +1 -0
- package/identity/getOidcClientCreds.js.map +1 -1
- package/identity/getOidcOpenidConfig.d.ts +15 -0
- package/identity/getOidcOpenidConfig.js +1 -0
- package/identity/getOidcOpenidConfig.js.map +1 -1
- package/identity/getOidcPublicKeys.d.ts +15 -0
- package/identity/getOidcPublicKeys.js +1 -0
- package/identity/getOidcPublicKeys.js.map +1 -1
- package/identity/group.d.ts +21 -0
- package/identity/group.js +2 -0
- package/identity/group.js.map +1 -1
- package/identity/groupAlias.d.ts +21 -0
- package/identity/groupAlias.js +2 -0
- package/identity/groupAlias.js.map +1 -1
- package/identity/groupMemberEntityIds.d.ts +21 -0
- package/identity/groupMemberEntityIds.js +2 -0
- package/identity/groupMemberEntityIds.js.map +1 -1
- package/identity/groupPolicies.d.ts +21 -0
- package/identity/groupPolicies.js +2 -0
- package/identity/groupPolicies.js.map +1 -1
- package/identity/index.d.ts +75 -20
- package/identity/index.js +86 -66
- package/identity/index.js.map +1 -1
- package/identity/mfaDuo.d.ts +200 -0
- package/identity/mfaDuo.js +110 -0
- package/identity/mfaDuo.js.map +1 -0
- package/identity/mfaLoginEnforcement.d.ts +170 -0
- package/identity/mfaLoginEnforcement.js +96 -0
- package/identity/mfaLoginEnforcement.js.map +1 -0
- package/identity/mfaOkta.d.ts +188 -0
- package/identity/mfaOkta.js +105 -0
- package/identity/mfaOkta.js.map +1 -0
- package/identity/mfaPingid.d.ts +190 -0
- package/identity/mfaPingid.js +102 -0
- package/identity/mfaPingid.js.map +1 -0
- package/identity/mfaTotp.d.ts +218 -0
- package/identity/mfaTotp.js +104 -0
- package/identity/mfaTotp.js.map +1 -0
- package/identity/oidc.d.ts +21 -0
- package/identity/oidc.js +2 -0
- package/identity/oidc.js.map +1 -1
- package/identity/oidcAssignment.d.ts +23 -2
- package/identity/oidcAssignment.js +4 -2
- package/identity/oidcAssignment.js.map +1 -1
- package/identity/oidcClient.d.ts +21 -0
- package/identity/oidcClient.js +4 -0
- package/identity/oidcClient.js.map +1 -1
- package/identity/oidcKey.d.ts +21 -0
- package/identity/oidcKey.js +2 -0
- package/identity/oidcKey.js.map +1 -1
- package/identity/oidcKeyAllowedClientID.d.ts +21 -0
- package/identity/oidcKeyAllowedClientID.js +2 -0
- package/identity/oidcKeyAllowedClientID.js.map +1 -1
- package/identity/oidcProvider.d.ts +21 -0
- package/identity/oidcProvider.js +2 -0
- package/identity/oidcProvider.js.map +1 -1
- package/identity/oidcRole.d.ts +21 -0
- package/identity/oidcRole.js +2 -0
- package/identity/oidcRole.js.map +1 -1
- package/identity/oidcScope.d.ts +22 -3
- package/identity/oidcScope.js +3 -3
- package/identity/oidcScope.js.map +1 -1
- package/index.d.ts +75 -25
- package/index.js +78 -83
- package/index.js.map +1 -1
- package/jwt/authBackend.d.ts +38 -1
- package/jwt/authBackend.js +7 -1
- package/jwt/authBackend.js.map +1 -1
- package/jwt/authBackendRole.d.ts +57 -0
- package/jwt/authBackendRole.js +6 -0
- package/jwt/authBackendRole.js.map +1 -1
- package/jwt/index.d.ts +6 -2
- package/jwt/index.js +7 -22
- package/jwt/index.js.map +1 -1
- package/kmip/index.d.ts +9 -3
- package/kmip/index.js +10 -25
- package/kmip/index.js.map +1 -1
- package/kmip/secretBackend.d.ts +36 -0
- package/kmip/secretBackend.js +4 -0
- package/kmip/secretBackend.js.map +1 -1
- package/kmip/secretRole.d.ts +21 -0
- package/kmip/secretRole.js +2 -0
- package/kmip/secretRole.js.map +1 -1
- package/kmip/secretScope.d.ts +21 -0
- package/kmip/secretScope.js +2 -0
- package/kmip/secretScope.js.map +1 -1
- package/kubernetes/authBackendConfig.d.ts +21 -0
- package/kubernetes/authBackendConfig.js +5 -1
- package/kubernetes/authBackendConfig.js.map +1 -1
- package/kubernetes/authBackendRole.d.ts +21 -0
- package/kubernetes/authBackendRole.js +2 -0
- package/kubernetes/authBackendRole.js.map +1 -1
- package/kubernetes/getAuthBackendConfig.d.ts +15 -0
- package/kubernetes/getAuthBackendConfig.js +1 -0
- package/kubernetes/getAuthBackendConfig.js.map +1 -1
- package/kubernetes/getAuthBackendRole.d.ts +15 -0
- package/kubernetes/getAuthBackendRole.js +1 -0
- package/kubernetes/getAuthBackendRole.js.map +1 -1
- package/kubernetes/getServiceAccountToken.d.ts +46 -0
- package/kubernetes/getServiceAccountToken.js +27 -0
- package/kubernetes/getServiceAccountToken.js.map +1 -0
- package/kubernetes/index.d.ts +21 -4
- package/kubernetes/index.js +26 -24
- package/kubernetes/index.js.map +1 -1
- package/kubernetes/secretBackend.d.ts +303 -0
- package/kubernetes/secretBackend.js +114 -0
- package/kubernetes/secretBackend.js.map +1 -0
- package/kubernetes/secretBackendRole.d.ts +367 -0
- package/kubernetes/secretBackendRole.js +191 -0
- package/kubernetes/secretBackendRole.js.map +1 -0
- package/kv/getSecret.d.ts +104 -0
- package/kv/getSecret.js +53 -0
- package/kv/getSecret.js.map +1 -0
- package/kv/getSecretSubkeysV2.d.ts +42 -0
- package/kv/getSecretSubkeysV2.js +26 -0
- package/kv/getSecretSubkeysV2.js.map +1 -0
- package/kv/getSecretV2.d.ts +139 -0
- package/kv/getSecretV2.js +58 -0
- package/kv/getSecretV2.js.map +1 -0
- package/kv/getSecretsList.d.ts +85 -0
- package/kv/getSecretsList.js +58 -0
- package/kv/getSecretsList.js.map +1 -0
- package/kv/getSecretsListV2.d.ts +114 -0
- package/kv/getSecretsListV2.js +69 -0
- package/kv/getSecretsListV2.js.map +1 -0
- package/kv/index.d.ts +24 -0
- package/kv/index.js +47 -0
- package/kv/index.js.map +1 -0
- package/kv/secret.d.ts +145 -0
- package/kv/secret.js +106 -0
- package/kv/secret.js.map +1 -0
- package/kv/secretBackendV2.d.ts +154 -0
- package/kv/secretBackendV2.js +103 -0
- package/kv/secretBackendV2.js.map +1 -0
- package/kv/secretV2.d.ts +257 -0
- package/kv/secretV2.js +122 -0
- package/kv/secretV2.js.map +1 -0
- package/ldap/authBackend.d.ts +48 -0
- package/ldap/authBackend.js +10 -2
- package/ldap/authBackend.js.map +1 -1
- package/ldap/authBackendGroup.d.ts +21 -0
- package/ldap/authBackendGroup.js +2 -0
- package/ldap/authBackendGroup.js.map +1 -1
- package/ldap/authBackendUser.d.ts +21 -0
- package/ldap/authBackendUser.js +2 -0
- package/ldap/authBackendUser.js.map +1 -1
- package/ldap/index.d.ts +9 -3
- package/ldap/index.js +10 -25
- package/ldap/index.js.map +1 -1
- package/managed/index.d.ts +3 -0
- package/managed/index.js +22 -0
- package/managed/index.js.map +1 -0
- package/managed/keys.d.ts +104 -0
- package/managed/keys.js +64 -0
- package/managed/keys.js.map +1 -0
- package/mfaDuo.d.ts +21 -0
- package/mfaDuo.js +6 -2
- package/mfaDuo.js.map +1 -1
- package/mfaOkta.d.ts +21 -0
- package/mfaOkta.js +5 -1
- package/mfaOkta.js.map +1 -1
- package/mfaPingid.d.ts +21 -0
- package/mfaPingid.js +2 -0
- package/mfaPingid.js.map +1 -1
- package/mfaTotp.d.ts +21 -0
- package/mfaTotp.js +2 -0
- package/mfaTotp.js.map +1 -1
- package/mount.d.ts +33 -0
- package/mount.js +4 -0
- package/mount.js.map +1 -1
- package/namespace.d.ts +32 -18
- package/namespace.js +5 -16
- package/namespace.js.map +1 -1
- package/nomadSecretBackend.d.ts +36 -0
- package/nomadSecretBackend.js +9 -3
- package/nomadSecretBackend.js.map +1 -1
- package/nomadSecretRole.d.ts +21 -0
- package/nomadSecretRole.js +2 -0
- package/nomadSecretRole.js.map +1 -1
- package/okta/authBackend.d.ts +38 -1
- package/okta/authBackend.js +7 -1
- package/okta/authBackend.js.map +1 -1
- package/okta/authBackendGroup.d.ts +21 -0
- package/okta/authBackendGroup.js +2 -0
- package/okta/authBackendGroup.js.map +1 -1
- package/okta/authBackendUser.d.ts +21 -0
- package/okta/authBackendUser.js +2 -0
- package/okta/authBackendUser.js.map +1 -1
- package/okta/index.d.ts +9 -3
- package/okta/index.js +10 -25
- package/okta/index.js.map +1 -1
- package/package.json +2 -2
- package/package.json.dev +2 -2
- package/passwordPolicy.d.ts +21 -0
- package/passwordPolicy.js +2 -0
- package/passwordPolicy.js.map +1 -1
- package/pkisecret/index.d.ts +30 -10
- package/pkisecret/index.js +31 -46
- package/pkisecret/index.js.map +1 -1
- package/pkisecret/secretBackendCert.d.ts +29 -0
- package/pkisecret/secretBackendCert.js +6 -0
- package/pkisecret/secretBackendCert.js.map +1 -1
- package/pkisecret/secretBackendConfigCa.d.ts +21 -0
- package/pkisecret/secretBackendConfigCa.js +5 -1
- package/pkisecret/secretBackendConfigCa.js.map +1 -1
- package/pkisecret/secretBackendConfigUrls.d.ts +21 -0
- package/pkisecret/secretBackendConfigUrls.js +2 -0
- package/pkisecret/secretBackendConfigUrls.js.map +1 -1
- package/pkisecret/secretBackendCrlConfig.d.ts +21 -0
- package/pkisecret/secretBackendCrlConfig.js +2 -0
- package/pkisecret/secretBackendCrlConfig.js.map +1 -1
- package/pkisecret/secretBackendIntermediateCertRequest.d.ts +54 -0
- package/pkisecret/secretBackendIntermediateCertRequest.js +8 -0
- package/pkisecret/secretBackendIntermediateCertRequest.js.map +1 -1
- package/pkisecret/secretBackendIntermediateSetSigned.d.ts +21 -0
- package/pkisecret/secretBackendIntermediateSetSigned.js +2 -0
- package/pkisecret/secretBackendIntermediateSetSigned.js.map +1 -1
- package/pkisecret/secretBackendRole.d.ts +24 -3
- package/pkisecret/secretBackendRole.js +2 -0
- package/pkisecret/secretBackendRole.js.map +1 -1
- package/pkisecret/secretBackendRootCert.d.ts +57 -3
- package/pkisecret/secretBackendRootCert.js +6 -0
- package/pkisecret/secretBackendRootCert.js.map +1 -1
- package/pkisecret/secretBackendRootSignIntermediate.d.ts +21 -0
- package/pkisecret/secretBackendRootSignIntermediate.js +2 -0
- package/pkisecret/secretBackendRootSignIntermediate.js.map +1 -1
- package/pkisecret/secretBackendSign.d.ts +29 -0
- package/pkisecret/secretBackendSign.js +4 -0
- package/pkisecret/secretBackendSign.js.map +1 -1
- package/policy.d.ts +21 -0
- package/policy.js +2 -0
- package/policy.js.map +1 -1
- package/provider.d.ts +43 -3
- package/provider.js +13 -3
- package/provider.js.map +1 -1
- package/quotaLeaseCount.d.ts +21 -0
- package/quotaLeaseCount.js +2 -0
- package/quotaLeaseCount.js.map +1 -1
- package/quotaRateLimit.d.ts +48 -0
- package/quotaRateLimit.js +6 -0
- package/quotaRateLimit.js.map +1 -1
- package/rabbitmq/index.d.ts +6 -2
- package/rabbitmq/index.js +7 -22
- package/rabbitmq/index.js.map +1 -1
- package/rabbitmq/secretBackend.d.ts +36 -0
- package/rabbitmq/secretBackend.js +8 -2
- package/rabbitmq/secretBackend.js.map +1 -1
- package/rabbitmq/secretBackendRole.d.ts +23 -1
- package/rabbitmq/secretBackendRole.js +2 -0
- package/rabbitmq/secretBackendRole.js.map +1 -1
- package/raftAutopilot.d.ts +21 -0
- package/raftAutopilot.js +2 -0
- package/raftAutopilot.js.map +1 -1
- package/raftSnapshotAgentConfig.d.ts +62 -0
- package/raftSnapshotAgentConfig.js +43 -0
- package/raftSnapshotAgentConfig.js.map +1 -1
- package/rgpPolicy.d.ts +21 -0
- package/rgpPolicy.js +2 -0
- package/rgpPolicy.js.map +1 -1
- package/ssh/index.d.ts +6 -2
- package/ssh/index.js +7 -22
- package/ssh/index.js.map +1 -1
- package/ssh/secretBackendCa.d.ts +29 -0
- package/ssh/secretBackendCa.js +13 -1
- package/ssh/secretBackendCa.js.map +1 -1
- package/ssh/secretBackendRole.d.ts +23 -1
- package/ssh/secretBackendRole.js +2 -0
- package/ssh/secretBackendRole.js.map +1 -1
- package/terraformcloud/index.d.ts +9 -3
- package/terraformcloud/index.js +10 -25
- package/terraformcloud/index.js.map +1 -1
- package/terraformcloud/secretBackend.d.ts +36 -0
- package/terraformcloud/secretBackend.js +7 -1
- package/terraformcloud/secretBackend.js.map +1 -1
- package/terraformcloud/secretCreds.d.ts +21 -0
- package/terraformcloud/secretCreds.js +4 -0
- package/terraformcloud/secretCreds.js.map +1 -1
- package/terraformcloud/secretRole.d.ts +21 -0
- package/terraformcloud/secretRole.js +2 -0
- package/terraformcloud/secretRole.js.map +1 -1
- package/token.d.ts +42 -0
- package/token.js +9 -0
- package/token.js.map +1 -1
- package/tokenauth/authBackendRole.d.ts +21 -0
- package/tokenauth/authBackendRole.js +2 -0
- package/tokenauth/authBackendRole.js.map +1 -1
- package/tokenauth/index.d.ts +3 -1
- package/tokenauth/index.js +4 -19
- package/tokenauth/index.js.map +1 -1
- package/transform/index.d.ts +18 -6
- package/transform/index.js +19 -30
- package/transform/index.js.map +1 -1
- package/transform/transformation.d.ts +0 -25
- package/transform/transformation.js +0 -25
- package/transform/transformation.js.map +1 -1
- package/transit/getDecrypt.d.ts +3 -0
- package/transit/getDecrypt.js +1 -0
- package/transit/getDecrypt.js.map +1 -1
- package/transit/getEncrypt.d.ts +3 -0
- package/transit/getEncrypt.js +1 -0
- package/transit/getEncrypt.js.map +1 -1
- package/transit/index.d.ts +12 -4
- package/transit/index.js +13 -24
- package/transit/index.js.map +1 -1
- package/transit/secretBackendKey.d.ts +21 -0
- package/transit/secretBackendKey.js +2 -0
- package/transit/secretBackendKey.js.map +1 -1
- package/transit/secretCacheConfig.d.ts +21 -0
- package/transit/secretCacheConfig.js +2 -0
- package/transit/secretCacheConfig.js.map +1 -1
- package/types/index.js.map +1 -1
- package/types/input.d.ts +408 -4
- package/types/output.d.ts +409 -5
- package/utilities.js +13 -1
- package/utilities.js.map +1 -1
- package/approle/authBackendRoleSecretID.js.map +0 -1
package/index.js
CHANGED
|
@@ -1,49 +1,62 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
3
|
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
-
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
5
|
-
if (k2 === undefined) k2 = k;
|
|
6
|
-
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
7
|
-
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
8
|
-
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
9
|
-
}
|
|
10
|
-
Object.defineProperty(o, k2, desc);
|
|
11
|
-
}) : (function(o, m, k, k2) {
|
|
12
|
-
if (k2 === undefined) k2 = k;
|
|
13
|
-
o[k2] = m[k];
|
|
14
|
-
}));
|
|
15
|
-
var __exportStar = (this && this.__exportStar) || function(m, exports) {
|
|
16
|
-
for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
|
|
17
|
-
};
|
|
18
4
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
19
|
-
exports.
|
|
5
|
+
exports.terraformcloud = exports.ssh = exports.rabbitmq = exports.pkisecret = exports.okta = exports.managed = exports.ldap = exports.kv = exports.kubernetes = exports.kmip = exports.jwt = exports.identity = exports.github = exports.generic = exports.gcp = exports.database = exports.consul = exports.config = exports.azure = exports.aws = exports.approle = exports.alicloud = exports.ad = exports.Token = exports.RgpPolicy = exports.RaftSnapshotAgentConfig = exports.RaftAutopilot = exports.QuotaRateLimit = exports.QuotaLeaseCount = exports.Provider = exports.Policy = exports.PasswordPolicy = exports.NomadSecretRole = exports.NomadSecretBackend = exports.Namespace = exports.Mount = exports.MfaTotp = exports.MfaPingid = exports.MfaOkta = exports.MfaDuo = exports.getPolicyDocumentOutput = exports.getPolicyDocument = exports.getNomadAccessTokenOutput = exports.getNomadAccessToken = exports.getAuthBackendOutput = exports.getAuthBackend = exports.EgpPolicy = exports.CertAuthBackendRole = exports.AuthBackend = exports.Audit = void 0;
|
|
6
|
+
exports.types = exports.transit = exports.transform = exports.tokenauth = void 0;
|
|
20
7
|
const pulumi = require("@pulumi/pulumi");
|
|
21
8
|
const utilities = require("./utilities");
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
|
|
33
|
-
|
|
34
|
-
|
|
35
|
-
|
|
36
|
-
|
|
37
|
-
|
|
38
|
-
|
|
39
|
-
|
|
40
|
-
|
|
41
|
-
|
|
42
|
-
|
|
43
|
-
|
|
44
|
-
|
|
45
|
-
|
|
46
|
-
|
|
9
|
+
exports.Audit = null;
|
|
10
|
+
exports.AuthBackend = null;
|
|
11
|
+
exports.CertAuthBackendRole = null;
|
|
12
|
+
exports.EgpPolicy = null;
|
|
13
|
+
exports.getAuthBackend = null;
|
|
14
|
+
exports.getAuthBackendOutput = null;
|
|
15
|
+
exports.getNomadAccessToken = null;
|
|
16
|
+
exports.getNomadAccessTokenOutput = null;
|
|
17
|
+
exports.getPolicyDocument = null;
|
|
18
|
+
exports.getPolicyDocumentOutput = null;
|
|
19
|
+
exports.MfaDuo = null;
|
|
20
|
+
exports.MfaOkta = null;
|
|
21
|
+
exports.MfaPingid = null;
|
|
22
|
+
exports.MfaTotp = null;
|
|
23
|
+
exports.Mount = null;
|
|
24
|
+
exports.Namespace = null;
|
|
25
|
+
exports.NomadSecretBackend = null;
|
|
26
|
+
exports.NomadSecretRole = null;
|
|
27
|
+
exports.PasswordPolicy = null;
|
|
28
|
+
exports.Policy = null;
|
|
29
|
+
exports.Provider = null;
|
|
30
|
+
exports.QuotaLeaseCount = null;
|
|
31
|
+
exports.QuotaRateLimit = null;
|
|
32
|
+
exports.RaftAutopilot = null;
|
|
33
|
+
exports.RaftSnapshotAgentConfig = null;
|
|
34
|
+
exports.RgpPolicy = null;
|
|
35
|
+
exports.Token = null;
|
|
36
|
+
utilities.lazyLoad(exports, ["Audit"], () => require("./audit"));
|
|
37
|
+
utilities.lazyLoad(exports, ["AuthBackend"], () => require("./authBackend"));
|
|
38
|
+
utilities.lazyLoad(exports, ["CertAuthBackendRole"], () => require("./certAuthBackendRole"));
|
|
39
|
+
utilities.lazyLoad(exports, ["EgpPolicy"], () => require("./egpPolicy"));
|
|
40
|
+
utilities.lazyLoad(exports, ["getAuthBackend", "getAuthBackendOutput"], () => require("./getAuthBackend"));
|
|
41
|
+
utilities.lazyLoad(exports, ["getNomadAccessToken", "getNomadAccessTokenOutput"], () => require("./getNomadAccessToken"));
|
|
42
|
+
utilities.lazyLoad(exports, ["getPolicyDocument", "getPolicyDocumentOutput"], () => require("./getPolicyDocument"));
|
|
43
|
+
utilities.lazyLoad(exports, ["MfaDuo"], () => require("./mfaDuo"));
|
|
44
|
+
utilities.lazyLoad(exports, ["MfaOkta"], () => require("./mfaOkta"));
|
|
45
|
+
utilities.lazyLoad(exports, ["MfaPingid"], () => require("./mfaPingid"));
|
|
46
|
+
utilities.lazyLoad(exports, ["MfaTotp"], () => require("./mfaTotp"));
|
|
47
|
+
utilities.lazyLoad(exports, ["Mount"], () => require("./mount"));
|
|
48
|
+
utilities.lazyLoad(exports, ["Namespace"], () => require("./namespace"));
|
|
49
|
+
utilities.lazyLoad(exports, ["NomadSecretBackend"], () => require("./nomadSecretBackend"));
|
|
50
|
+
utilities.lazyLoad(exports, ["NomadSecretRole"], () => require("./nomadSecretRole"));
|
|
51
|
+
utilities.lazyLoad(exports, ["PasswordPolicy"], () => require("./passwordPolicy"));
|
|
52
|
+
utilities.lazyLoad(exports, ["Policy"], () => require("./policy"));
|
|
53
|
+
utilities.lazyLoad(exports, ["Provider"], () => require("./provider"));
|
|
54
|
+
utilities.lazyLoad(exports, ["QuotaLeaseCount"], () => require("./quotaLeaseCount"));
|
|
55
|
+
utilities.lazyLoad(exports, ["QuotaRateLimit"], () => require("./quotaRateLimit"));
|
|
56
|
+
utilities.lazyLoad(exports, ["RaftAutopilot"], () => require("./raftAutopilot"));
|
|
57
|
+
utilities.lazyLoad(exports, ["RaftSnapshotAgentConfig"], () => require("./raftSnapshotAgentConfig"));
|
|
58
|
+
utilities.lazyLoad(exports, ["RgpPolicy"], () => require("./rgpPolicy"));
|
|
59
|
+
utilities.lazyLoad(exports, ["Token"], () => require("./token"));
|
|
47
60
|
// Export sub-modules:
|
|
48
61
|
const ad = require("./ad");
|
|
49
62
|
exports.ad = ad;
|
|
@@ -75,8 +88,12 @@ const kmip = require("./kmip");
|
|
|
75
88
|
exports.kmip = kmip;
|
|
76
89
|
const kubernetes = require("./kubernetes");
|
|
77
90
|
exports.kubernetes = kubernetes;
|
|
91
|
+
const kv = require("./kv");
|
|
92
|
+
exports.kv = kv;
|
|
78
93
|
const ldap = require("./ldap");
|
|
79
94
|
exports.ldap = ldap;
|
|
95
|
+
const managed = require("./managed");
|
|
96
|
+
exports.managed = managed;
|
|
80
97
|
const okta = require("./okta");
|
|
81
98
|
exports.okta = okta;
|
|
82
99
|
const pkisecret = require("./pkisecret");
|
|
@@ -95,71 +112,50 @@ const transit = require("./transit");
|
|
|
95
112
|
exports.transit = transit;
|
|
96
113
|
const types = require("./types");
|
|
97
114
|
exports.types = types;
|
|
98
|
-
// Import resources to register:
|
|
99
|
-
const audit_1 = require("./audit");
|
|
100
|
-
const authBackend_1 = require("./authBackend");
|
|
101
|
-
const certAuthBackendRole_1 = require("./certAuthBackendRole");
|
|
102
|
-
const egpPolicy_1 = require("./egpPolicy");
|
|
103
|
-
const mfaDuo_1 = require("./mfaDuo");
|
|
104
|
-
const mfaOkta_1 = require("./mfaOkta");
|
|
105
|
-
const mfaPingid_1 = require("./mfaPingid");
|
|
106
|
-
const mfaTotp_1 = require("./mfaTotp");
|
|
107
|
-
const mount_1 = require("./mount");
|
|
108
|
-
const namespace_1 = require("./namespace");
|
|
109
|
-
const nomadSecretBackend_1 = require("./nomadSecretBackend");
|
|
110
|
-
const nomadSecretRole_1 = require("./nomadSecretRole");
|
|
111
|
-
const passwordPolicy_1 = require("./passwordPolicy");
|
|
112
|
-
const policy_1 = require("./policy");
|
|
113
|
-
const quotaLeaseCount_1 = require("./quotaLeaseCount");
|
|
114
|
-
const quotaRateLimit_1 = require("./quotaRateLimit");
|
|
115
|
-
const raftAutopilot_1 = require("./raftAutopilot");
|
|
116
|
-
const raftSnapshotAgentConfig_1 = require("./raftSnapshotAgentConfig");
|
|
117
|
-
const rgpPolicy_1 = require("./rgpPolicy");
|
|
118
|
-
const token_1 = require("./token");
|
|
119
115
|
const _module = {
|
|
120
116
|
version: utilities.getVersion(),
|
|
121
117
|
construct: (name, type, urn) => {
|
|
122
118
|
switch (type) {
|
|
123
119
|
case "vault:index/audit:Audit":
|
|
124
|
-
return new
|
|
120
|
+
return new exports.Audit(name, undefined, { urn });
|
|
125
121
|
case "vault:index/authBackend:AuthBackend":
|
|
126
|
-
return new
|
|
122
|
+
return new exports.AuthBackend(name, undefined, { urn });
|
|
127
123
|
case "vault:index/certAuthBackendRole:CertAuthBackendRole":
|
|
128
|
-
return new
|
|
124
|
+
return new exports.CertAuthBackendRole(name, undefined, { urn });
|
|
129
125
|
case "vault:index/egpPolicy:EgpPolicy":
|
|
130
|
-
return new
|
|
126
|
+
return new exports.EgpPolicy(name, undefined, { urn });
|
|
131
127
|
case "vault:index/mfaDuo:MfaDuo":
|
|
132
|
-
return new
|
|
128
|
+
return new exports.MfaDuo(name, undefined, { urn });
|
|
133
129
|
case "vault:index/mfaOkta:MfaOkta":
|
|
134
|
-
return new
|
|
130
|
+
return new exports.MfaOkta(name, undefined, { urn });
|
|
135
131
|
case "vault:index/mfaPingid:MfaPingid":
|
|
136
|
-
return new
|
|
132
|
+
return new exports.MfaPingid(name, undefined, { urn });
|
|
137
133
|
case "vault:index/mfaTotp:MfaTotp":
|
|
138
|
-
return new
|
|
134
|
+
return new exports.MfaTotp(name, undefined, { urn });
|
|
139
135
|
case "vault:index/mount:Mount":
|
|
140
|
-
return new
|
|
136
|
+
return new exports.Mount(name, undefined, { urn });
|
|
141
137
|
case "vault:index/namespace:Namespace":
|
|
142
|
-
return new
|
|
138
|
+
return new exports.Namespace(name, undefined, { urn });
|
|
143
139
|
case "vault:index/nomadSecretBackend:NomadSecretBackend":
|
|
144
|
-
return new
|
|
140
|
+
return new exports.NomadSecretBackend(name, undefined, { urn });
|
|
145
141
|
case "vault:index/nomadSecretRole:NomadSecretRole":
|
|
146
|
-
return new
|
|
142
|
+
return new exports.NomadSecretRole(name, undefined, { urn });
|
|
147
143
|
case "vault:index/passwordPolicy:PasswordPolicy":
|
|
148
|
-
return new
|
|
144
|
+
return new exports.PasswordPolicy(name, undefined, { urn });
|
|
149
145
|
case "vault:index/policy:Policy":
|
|
150
|
-
return new
|
|
146
|
+
return new exports.Policy(name, undefined, { urn });
|
|
151
147
|
case "vault:index/quotaLeaseCount:QuotaLeaseCount":
|
|
152
|
-
return new
|
|
148
|
+
return new exports.QuotaLeaseCount(name, undefined, { urn });
|
|
153
149
|
case "vault:index/quotaRateLimit:QuotaRateLimit":
|
|
154
|
-
return new
|
|
150
|
+
return new exports.QuotaRateLimit(name, undefined, { urn });
|
|
155
151
|
case "vault:index/raftAutopilot:RaftAutopilot":
|
|
156
|
-
return new
|
|
152
|
+
return new exports.RaftAutopilot(name, undefined, { urn });
|
|
157
153
|
case "vault:index/raftSnapshotAgentConfig:RaftSnapshotAgentConfig":
|
|
158
|
-
return new
|
|
154
|
+
return new exports.RaftSnapshotAgentConfig(name, undefined, { urn });
|
|
159
155
|
case "vault:index/rgpPolicy:RgpPolicy":
|
|
160
|
-
return new
|
|
156
|
+
return new exports.RgpPolicy(name, undefined, { urn });
|
|
161
157
|
case "vault:index/token:Token":
|
|
162
|
-
return new
|
|
158
|
+
return new exports.Token(name, undefined, { urn });
|
|
163
159
|
default:
|
|
164
160
|
throw new Error(`unknown resource type ${type}`);
|
|
165
161
|
}
|
|
@@ -185,14 +181,13 @@ pulumi.runtime.registerResourceModule("vault", "index/raftAutopilot", _module);
|
|
|
185
181
|
pulumi.runtime.registerResourceModule("vault", "index/raftSnapshotAgentConfig", _module);
|
|
186
182
|
pulumi.runtime.registerResourceModule("vault", "index/rgpPolicy", _module);
|
|
187
183
|
pulumi.runtime.registerResourceModule("vault", "index/token", _module);
|
|
188
|
-
const provider_1 = require("./provider");
|
|
189
184
|
pulumi.runtime.registerResourcePackage("vault", {
|
|
190
185
|
version: utilities.getVersion(),
|
|
191
186
|
constructProvider: (name, type, urn) => {
|
|
192
187
|
if (type !== "pulumi:providers:vault") {
|
|
193
188
|
throw new Error(`unknown provider type ${type}`);
|
|
194
189
|
}
|
|
195
|
-
return new
|
|
190
|
+
return new exports.Provider(name, undefined, { urn });
|
|
196
191
|
},
|
|
197
192
|
});
|
|
198
193
|
//# sourceMappingURL=index.js.map
|
package/index.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAK5B,QAAA,KAAK,GAAmC,IAAW,CAAC;AAIpD,QAAA,WAAW,GAA+C,IAAW,CAAC;AAItE,QAAA,mBAAmB,GAA+D,IAAW,CAAC;AAI9F,QAAA,SAAS,GAA2C,IAAW,CAAC;AAGhE,QAAA,cAAc,GAAqD,IAAW,CAAC;AAC/E,QAAA,oBAAoB,GAA2D,IAAW,CAAC;AAG3F,QAAA,mBAAmB,GAA+D,IAAW,CAAC;AAC9F,QAAA,yBAAyB,GAAqE,IAAW,CAAC;AAG1G,QAAA,iBAAiB,GAA2D,IAAW,CAAC;AACxF,QAAA,uBAAuB,GAAiE,IAAW,CAAC;AAIpG,QAAA,MAAM,GAAqC,IAAW,CAAC;AAIvD,QAAA,OAAO,GAAuC,IAAW,CAAC;AAI1D,QAAA,SAAS,GAA2C,IAAW,CAAC;AAIhE,QAAA,OAAO,GAAuC,IAAW,CAAC;AAI1D,QAAA,KAAK,GAAmC,IAAW,CAAC;AAIpD,QAAA,SAAS,GAA2C,IAAW,CAAC;AAIhE,QAAA,kBAAkB,GAA6D,IAAW,CAAC;AAI3F,QAAA,eAAe,GAAuD,IAAW,CAAC;AAIlF,QAAA,cAAc,GAAqD,IAAW,CAAC;AAI/E,QAAA,MAAM,GAAqC,IAAW,CAAC;AAIvD,QAAA,QAAQ,GAAyC,IAAW,CAAC;AAI7D,QAAA,eAAe,GAAuD,IAAW,CAAC;AAIlF,QAAA,cAAc,GAAqD,IAAW,CAAC;AAI/E,QAAA,aAAa,GAAmD,IAAW,CAAC;AAI5E,QAAA,uBAAuB,GAAuE,IAAW,CAAC;AAI1G,QAAA,SAAS,GAA2C,IAAW,CAAC;AAIhE,QAAA,KAAK,GAAmC,IAAW,CAAC;AAEjE,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,SAAS,CAAC,CAAC,CAAC;AACjE,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,aAAa,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,eAAe,CAAC,CAAC,CAAC;AAC7E,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,qBAAqB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,uBAAuB,CAAC,CAAC,CAAC;AAC7F,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,WAAW,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,aAAa,CAAC,CAAC,CAAC;AACzE,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,gBAAgB,EAAC,sBAAsB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,kBAAkB,CAAC,CAAC,CAAC;AAC1G,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,qBAAqB,EAAC,2BAA2B,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,uBAAuB,CAAC,CAAC,CAAC;AACzH,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,mBAAmB,EAAC,yBAAyB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,qBAAqB,CAAC,CAAC,CAAC;AACnH,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,QAAQ,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC,CAAC;AACnE,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,SAAS,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,WAAW,CAAC,CAAC,CAAC;AACrE,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,WAAW,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,aAAa,CAAC,CAAC,CAAC;AACzE,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,SAAS,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,WAAW,CAAC,CAAC,CAAC;AACrE,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,SAAS,CAAC,CAAC,CAAC;AACjE,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,WAAW,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,aAAa,CAAC,CAAC,CAAC;AACzE,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,oBAAoB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,sBAAsB,CAAC,CAAC,CAAC;AAC3F,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,iBAAiB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,mBAAmB,CAAC,CAAC,CAAC;AACrF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,gBAAgB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,kBAAkB,CAAC,CAAC,CAAC;AACnF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,QAAQ,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC,CAAC;AACnE,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,UAAU,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,YAAY,CAAC,CAAC,CAAC;AACvE,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,iBAAiB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,mBAAmB,CAAC,CAAC,CAAC;AACrF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,gBAAgB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,kBAAkB,CAAC,CAAC,CAAC;AACnF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,eAAe,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,iBAAiB,CAAC,CAAC,CAAC;AACjF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,yBAAyB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,2BAA2B,CAAC,CAAC,CAAC;AACrG,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,WAAW,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,aAAa,CAAC,CAAC,CAAC;AACzE,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,SAAS,CAAC,CAAC,CAAC;AAEjE,sBAAsB;AACtB,2BAA2B;AA6BvB,gBAAE;AA5BN,uCAAuC;AA6BnC,4BAAQ;AA5BZ,qCAAqC;AA6BjC,0BAAO;AA5BX,6BAA6B;AA6BzB,kBAAG;AA5BP,iCAAiC;AA6B7B,sBAAK;AA5BT,mCAAmC;AA6B/B,wBAAM;AA5BV,mCAAmC;AA6B/B,wBAAM;AA5BV,uCAAuC;AA6BnC,4BAAQ;AA5BZ,6BAA6B;AA6BzB,kBAAG;AA5BP,qCAAqC;AA6BjC,0BAAO;AA5BX,mCAAmC;AA6B/B,wBAAM;AA5BV,uCAAuC;AA6BnC,4BAAQ;AA5BZ,6BAA6B;AA6BzB,kBAAG;AA5BP,+BAA+B;AA6B3B,oBAAI;AA5BR,2CAA2C;AA6BvC,gCAAU;AA5Bd,2BAA2B;AA6BvB,gBAAE;AA5BN,+BAA+B;AA6B3B,oBAAI;AA5BR,qCAAqC;AA6BjC,0BAAO;AA5BX,+BAA+B;AA6B3B,oBAAI;AA5BR,yCAAyC;AA6BrC,8BAAS;AA5Bb,uCAAuC;AA6BnC,4BAAQ;AA5BZ,6BAA6B;AA6BzB,kBAAG;AA5BP,mDAAmD;AA6B/C,wCAAc;AA5BlB,yCAAyC;AA6BrC,8BAAS;AA5Bb,yCAAyC;AA6BrC,8BAAS;AA5Bb,qCAAqC;AA6BjC,0BAAO;AA5BX,iCAAiC;AA6B7B,sBAAK;AAGT,MAAM,OAAO,GAAG;IACZ,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE;IAC/B,SAAS,EAAE,CAAC,IAAY,EAAE,IAAY,EAAE,GAAW,EAAmB,EAAE;QACpE,QAAQ,IAAI,EAAE;YACV,KAAK,yBAAyB;gBAC1B,OAAO,IAAI,aAAK,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACnD,KAAK,qCAAqC;gBACtC,OAAO,IAAI,mBAAW,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACzD,KAAK,qDAAqD;gBACtD,OAAO,IAAI,2BAAmB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACjE,KAAK,iCAAiC;gBAClC,OAAO,IAAI,iBAAS,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACvD,KAAK,2BAA2B;gBAC5B,OAAO,IAAI,cAAM,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACpD,KAAK,6BAA6B;gBAC9B,OAAO,IAAI,eAAO,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACrD,KAAK,iCAAiC;gBAClC,OAAO,IAAI,iBAAS,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACvD,KAAK,6BAA6B;gBAC9B,OAAO,IAAI,eAAO,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACrD,KAAK,yBAAyB;gBAC1B,OAAO,IAAI,aAAK,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACnD,KAAK,iCAAiC;gBAClC,OAAO,IAAI,iBAAS,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACvD,KAAK,mDAAmD;gBACpD,OAAO,IAAI,0BAAkB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAChE,KAAK,6CAA6C;gBAC9C,OAAO,IAAI,uBAAe,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC7D,KAAK,2CAA2C;gBAC5C,OAAO,IAAI,sBAAc,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC5D,KAAK,2BAA2B;gBAC5B,OAAO,IAAI,cAAM,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACpD,KAAK,6CAA6C;gBAC9C,OAAO,IAAI,uBAAe,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC7D,KAAK,2CAA2C;gBAC5C,OAAO,IAAI,sBAAc,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC5D,KAAK,yCAAyC;gBAC1C,OAAO,IAAI,qBAAa,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC3D,KAAK,6DAA6D;gBAC9D,OAAO,IAAI,+BAAuB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACrE,KAAK,iCAAiC;gBAClC,OAAO,IAAI,iBAAS,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACvD,KAAK,yBAAyB;gBAC1B,OAAO,IAAI,aAAK,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACnD;gBACI,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,EAAE,CAAC,CAAC;SACxD;IACL,CAAC;CACJ,CAAC;AACF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,aAAa,EAAE,OAAO,CAAC,CAAA;AACtE,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,mBAAmB,EAAE,OAAO,CAAC,CAAA;AAC5E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,2BAA2B,EAAE,OAAO,CAAC,CAAA;AACpF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,iBAAiB,EAAE,OAAO,CAAC,CAAA;AAC1E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,cAAc,EAAE,OAAO,CAAC,CAAA;AACvE,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,eAAe,EAAE,OAAO,CAAC,CAAA;AACxE,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,iBAAiB,EAAE,OAAO,CAAC,CAAA;AAC1E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,eAAe,EAAE,OAAO,CAAC,CAAA;AACxE,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,aAAa,EAAE,OAAO,CAAC,CAAA;AACtE,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,iBAAiB,EAAE,OAAO,CAAC,CAAA;AAC1E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,0BAA0B,EAAE,OAAO,CAAC,CAAA;AACnF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,uBAAuB,EAAE,OAAO,CAAC,CAAA;AAChF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,sBAAsB,EAAE,OAAO,CAAC,CAAA;AAC/E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,cAAc,EAAE,OAAO,CAAC,CAAA;AACvE,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,uBAAuB,EAAE,OAAO,CAAC,CAAA;AAChF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,sBAAsB,EAAE,OAAO,CAAC,CAAA;AAC/E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,qBAAqB,EAAE,OAAO,CAAC,CAAA;AAC9E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,+BAA+B,EAAE,OAAO,CAAC,CAAA;AACxF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,iBAAiB,EAAE,OAAO,CAAC,CAAA;AAC1E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,aAAa,EAAE,OAAO,CAAC,CAAA;AACtE,MAAM,CAAC,OAAO,CAAC,uBAAuB,CAAC,OAAO,EAAE;IAC5C,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE;IAC/B,iBAAiB,EAAE,CAAC,IAAY,EAAE,IAAY,EAAE,GAAW,EAA2B,EAAE;QACpF,IAAI,IAAI,KAAK,wBAAwB,EAAE;YACnC,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,EAAE,CAAC,CAAC;SACpD;QACD,OAAO,IAAI,gBAAQ,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAC;IACvD,CAAC;CACJ,CAAC,CAAC"}
|
package/jwt/authBackend.d.ts
CHANGED
|
@@ -1,5 +1,6 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
-
import
|
|
2
|
+
import * as inputs from "../types/input";
|
|
3
|
+
import * as outputs from "../types/output";
|
|
3
4
|
/**
|
|
4
5
|
* Provides a resource for managing an
|
|
5
6
|
* [JWT auth backend within Vault](https://www.vaultproject.io/docs/auth/jwt.html).
|
|
@@ -106,6 +107,11 @@ export declare class AuthBackend extends pulumi.CustomResource {
|
|
|
106
107
|
* The description of the auth backend
|
|
107
108
|
*/
|
|
108
109
|
readonly description: pulumi.Output<string | undefined>;
|
|
110
|
+
/**
|
|
111
|
+
* If set, opts out of mount migration on path updates.
|
|
112
|
+
* See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
|
113
|
+
*/
|
|
114
|
+
readonly disableRemount: pulumi.Output<boolean | undefined>;
|
|
109
115
|
/**
|
|
110
116
|
* The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used.
|
|
111
117
|
*/
|
|
@@ -126,6 +132,13 @@ export declare class AuthBackend extends pulumi.CustomResource {
|
|
|
126
132
|
* Specifies if the auth method is local only.
|
|
127
133
|
*/
|
|
128
134
|
readonly local: pulumi.Output<boolean | undefined>;
|
|
135
|
+
/**
|
|
136
|
+
* The namespace to provision the resource in.
|
|
137
|
+
* The value should not contain leading or trailing forward slashes.
|
|
138
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
139
|
+
* *Available only for Vault Enterprise*.
|
|
140
|
+
*/
|
|
141
|
+
readonly namespace: pulumi.Output<string | undefined>;
|
|
129
142
|
/**
|
|
130
143
|
* Pass namespace in the OIDC state parameter instead of as a separate query parameter. With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs
|
|
131
144
|
*/
|
|
@@ -198,6 +211,11 @@ export interface AuthBackendState {
|
|
|
198
211
|
* The description of the auth backend
|
|
199
212
|
*/
|
|
200
213
|
description?: pulumi.Input<string>;
|
|
214
|
+
/**
|
|
215
|
+
* If set, opts out of mount migration on path updates.
|
|
216
|
+
* See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
|
217
|
+
*/
|
|
218
|
+
disableRemount?: pulumi.Input<boolean>;
|
|
201
219
|
/**
|
|
202
220
|
* The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used.
|
|
203
221
|
*/
|
|
@@ -218,6 +236,13 @@ export interface AuthBackendState {
|
|
|
218
236
|
* Specifies if the auth method is local only.
|
|
219
237
|
*/
|
|
220
238
|
local?: pulumi.Input<boolean>;
|
|
239
|
+
/**
|
|
240
|
+
* The namespace to provision the resource in.
|
|
241
|
+
* The value should not contain leading or trailing forward slashes.
|
|
242
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
243
|
+
* *Available only for Vault Enterprise*.
|
|
244
|
+
*/
|
|
245
|
+
namespace?: pulumi.Input<string>;
|
|
221
246
|
/**
|
|
222
247
|
* Pass namespace in the OIDC state parameter instead of as a separate query parameter. With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs
|
|
223
248
|
*/
|
|
@@ -278,6 +303,11 @@ export interface AuthBackendArgs {
|
|
|
278
303
|
* The description of the auth backend
|
|
279
304
|
*/
|
|
280
305
|
description?: pulumi.Input<string>;
|
|
306
|
+
/**
|
|
307
|
+
* If set, opts out of mount migration on path updates.
|
|
308
|
+
* See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
|
309
|
+
*/
|
|
310
|
+
disableRemount?: pulumi.Input<boolean>;
|
|
281
311
|
/**
|
|
282
312
|
* The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used.
|
|
283
313
|
*/
|
|
@@ -298,6 +328,13 @@ export interface AuthBackendArgs {
|
|
|
298
328
|
* Specifies if the auth method is local only.
|
|
299
329
|
*/
|
|
300
330
|
local?: pulumi.Input<boolean>;
|
|
331
|
+
/**
|
|
332
|
+
* The namespace to provision the resource in.
|
|
333
|
+
* The value should not contain leading or trailing forward slashes.
|
|
334
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
335
|
+
* *Available only for Vault Enterprise*.
|
|
336
|
+
*/
|
|
337
|
+
namespace?: pulumi.Input<string>;
|
|
301
338
|
/**
|
|
302
339
|
* Pass namespace in the OIDC state parameter instead of as a separate query parameter. With this setting, the allowed redirect URL(s) in Vault and on the provider side should not contain a namespace query parameter. This means only one redirect URL entry needs to be maintained on the OIDC provider side for all vault namespaces that will be authenticating against it. Defaults to true for new configs
|
|
303
340
|
*/
|
package/jwt/authBackend.js
CHANGED
|
@@ -89,11 +89,13 @@ class AuthBackend extends pulumi.CustomResource {
|
|
|
89
89
|
resourceInputs["boundIssuer"] = state ? state.boundIssuer : undefined;
|
|
90
90
|
resourceInputs["defaultRole"] = state ? state.defaultRole : undefined;
|
|
91
91
|
resourceInputs["description"] = state ? state.description : undefined;
|
|
92
|
+
resourceInputs["disableRemount"] = state ? state.disableRemount : undefined;
|
|
92
93
|
resourceInputs["jwksCaPem"] = state ? state.jwksCaPem : undefined;
|
|
93
94
|
resourceInputs["jwksUrl"] = state ? state.jwksUrl : undefined;
|
|
94
95
|
resourceInputs["jwtSupportedAlgs"] = state ? state.jwtSupportedAlgs : undefined;
|
|
95
96
|
resourceInputs["jwtValidationPubkeys"] = state ? state.jwtValidationPubkeys : undefined;
|
|
96
97
|
resourceInputs["local"] = state ? state.local : undefined;
|
|
98
|
+
resourceInputs["namespace"] = state ? state.namespace : undefined;
|
|
97
99
|
resourceInputs["namespaceInState"] = state ? state.namespaceInState : undefined;
|
|
98
100
|
resourceInputs["oidcClientId"] = state ? state.oidcClientId : undefined;
|
|
99
101
|
resourceInputs["oidcClientSecret"] = state ? state.oidcClientSecret : undefined;
|
|
@@ -111,14 +113,16 @@ class AuthBackend extends pulumi.CustomResource {
|
|
|
111
113
|
resourceInputs["boundIssuer"] = args ? args.boundIssuer : undefined;
|
|
112
114
|
resourceInputs["defaultRole"] = args ? args.defaultRole : undefined;
|
|
113
115
|
resourceInputs["description"] = args ? args.description : undefined;
|
|
116
|
+
resourceInputs["disableRemount"] = args ? args.disableRemount : undefined;
|
|
114
117
|
resourceInputs["jwksCaPem"] = args ? args.jwksCaPem : undefined;
|
|
115
118
|
resourceInputs["jwksUrl"] = args ? args.jwksUrl : undefined;
|
|
116
119
|
resourceInputs["jwtSupportedAlgs"] = args ? args.jwtSupportedAlgs : undefined;
|
|
117
120
|
resourceInputs["jwtValidationPubkeys"] = args ? args.jwtValidationPubkeys : undefined;
|
|
118
121
|
resourceInputs["local"] = args ? args.local : undefined;
|
|
122
|
+
resourceInputs["namespace"] = args ? args.namespace : undefined;
|
|
119
123
|
resourceInputs["namespaceInState"] = args ? args.namespaceInState : undefined;
|
|
120
124
|
resourceInputs["oidcClientId"] = args ? args.oidcClientId : undefined;
|
|
121
|
-
resourceInputs["oidcClientSecret"] = args ? args.oidcClientSecret : undefined;
|
|
125
|
+
resourceInputs["oidcClientSecret"] = (args === null || args === void 0 ? void 0 : args.oidcClientSecret) ? pulumi.secret(args.oidcClientSecret) : undefined;
|
|
122
126
|
resourceInputs["oidcDiscoveryCaPem"] = args ? args.oidcDiscoveryCaPem : undefined;
|
|
123
127
|
resourceInputs["oidcDiscoveryUrl"] = args ? args.oidcDiscoveryUrl : undefined;
|
|
124
128
|
resourceInputs["oidcResponseMode"] = args ? args.oidcResponseMode : undefined;
|
|
@@ -130,6 +134,8 @@ class AuthBackend extends pulumi.CustomResource {
|
|
|
130
134
|
resourceInputs["accessor"] = undefined /*out*/;
|
|
131
135
|
}
|
|
132
136
|
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
137
|
+
const secretOpts = { additionalSecretOutputs: ["oidcClientSecret"] };
|
|
138
|
+
opts = pulumi.mergeOptions(opts, secretOpts);
|
|
133
139
|
super(AuthBackend.__pulumiType, name, resourceInputs, opts);
|
|
134
140
|
}
|
|
135
141
|
/**
|
package/jwt/authBackend.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"authBackend.js","sourceRoot":"","sources":["../../jwt/authBackend.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;
|
|
1
|
+
{"version":3,"file":"authBackend.js","sourceRoot":"","sources":["../../jwt/authBackend.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAyEG;AACH,MAAa,WAAY,SAAQ,MAAM,CAAC,cAAc;IA8HlD,YAAY,IAAY,EAAE,WAAgD,EAAE,IAAmC;QAC3G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA2C,CAAC;YAC1D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3D;aAAM;YACH,MAAM,IAAI,GAAG,WAA0C,CAAC;YACxD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,kBAAkB,CAAC,GAAG,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,gBAAgB,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAC/G,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,UAAU,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAClD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,kBAAkB,CAAC,EAAE,CAAC;QACrE,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,WAAW,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAChE,CAAC;IArLD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAwB,EAAE,IAAmC;QACtH,OAAO,IAAI,WAAW,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAClE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,WAAW,CAAC,YAAY,CAAC;IAC5D,CAAC;;AA1BL,kCAuLC;AAzKG,gBAAgB;AACO,wBAAY,GAAG,mCAAmC,CAAC"}
|
package/jwt/authBackendRole.d.ts
CHANGED
|
@@ -142,6 +142,18 @@ export declare class AuthBackendRole extends pulumi.CustomResource {
|
|
|
142
142
|
* value must be a list of strings.
|
|
143
143
|
*/
|
|
144
144
|
readonly groupsClaim: pulumi.Output<string | undefined>;
|
|
145
|
+
/**
|
|
146
|
+
* Specifies the allowable elapsed time in seconds since the last time
|
|
147
|
+
* the user was actively authenticated with the OIDC provider.
|
|
148
|
+
*/
|
|
149
|
+
readonly maxAge: pulumi.Output<number | undefined>;
|
|
150
|
+
/**
|
|
151
|
+
* The namespace to provision the resource in.
|
|
152
|
+
* The value should not contain leading or trailing forward slashes.
|
|
153
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
154
|
+
* *Available only for Vault Enterprise*.
|
|
155
|
+
*/
|
|
156
|
+
readonly namespace: pulumi.Output<string | undefined>;
|
|
145
157
|
/**
|
|
146
158
|
* The amount of leeway to add to not before (`nbf`) claims to account for
|
|
147
159
|
* clock skew, in seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
|
|
@@ -220,6 +232,13 @@ export declare class AuthBackendRole extends pulumi.CustomResource {
|
|
|
220
232
|
* due to a successful login.
|
|
221
233
|
*/
|
|
222
234
|
readonly userClaim: pulumi.Output<string>;
|
|
235
|
+
/**
|
|
236
|
+
* Specifies if the `userClaim` value uses
|
|
237
|
+
* [JSON pointer](https://www.vaultproject.io/docs/auth/jwt#claim-specifications-and-json-pointer)
|
|
238
|
+
* syntax for referencing claims. By default, the `userClaim` value will not use JSON pointer.
|
|
239
|
+
* Requires Vault 1.11+.
|
|
240
|
+
*/
|
|
241
|
+
readonly userClaimJsonPointer: pulumi.Output<boolean | undefined>;
|
|
223
242
|
/**
|
|
224
243
|
* Log received OIDC tokens and claims when debug-level
|
|
225
244
|
* logging is active. Not recommended in production since sensitive information may be present
|
|
@@ -303,6 +322,18 @@ export interface AuthBackendRoleState {
|
|
|
303
322
|
* value must be a list of strings.
|
|
304
323
|
*/
|
|
305
324
|
groupsClaim?: pulumi.Input<string>;
|
|
325
|
+
/**
|
|
326
|
+
* Specifies the allowable elapsed time in seconds since the last time
|
|
327
|
+
* the user was actively authenticated with the OIDC provider.
|
|
328
|
+
*/
|
|
329
|
+
maxAge?: pulumi.Input<number>;
|
|
330
|
+
/**
|
|
331
|
+
* The namespace to provision the resource in.
|
|
332
|
+
* The value should not contain leading or trailing forward slashes.
|
|
333
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
334
|
+
* *Available only for Vault Enterprise*.
|
|
335
|
+
*/
|
|
336
|
+
namespace?: pulumi.Input<string>;
|
|
306
337
|
/**
|
|
307
338
|
* The amount of leeway to add to not before (`nbf`) claims to account for
|
|
308
339
|
* clock skew, in seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
|
|
@@ -381,6 +412,13 @@ export interface AuthBackendRoleState {
|
|
|
381
412
|
* due to a successful login.
|
|
382
413
|
*/
|
|
383
414
|
userClaim?: pulumi.Input<string>;
|
|
415
|
+
/**
|
|
416
|
+
* Specifies if the `userClaim` value uses
|
|
417
|
+
* [JSON pointer](https://www.vaultproject.io/docs/auth/jwt#claim-specifications-and-json-pointer)
|
|
418
|
+
* syntax for referencing claims. By default, the `userClaim` value will not use JSON pointer.
|
|
419
|
+
* Requires Vault 1.11+.
|
|
420
|
+
*/
|
|
421
|
+
userClaimJsonPointer?: pulumi.Input<boolean>;
|
|
384
422
|
/**
|
|
385
423
|
* Log received OIDC tokens and claims when debug-level
|
|
386
424
|
* logging is active. Not recommended in production since sensitive information may be present
|
|
@@ -456,6 +494,18 @@ export interface AuthBackendRoleArgs {
|
|
|
456
494
|
* value must be a list of strings.
|
|
457
495
|
*/
|
|
458
496
|
groupsClaim?: pulumi.Input<string>;
|
|
497
|
+
/**
|
|
498
|
+
* Specifies the allowable elapsed time in seconds since the last time
|
|
499
|
+
* the user was actively authenticated with the OIDC provider.
|
|
500
|
+
*/
|
|
501
|
+
maxAge?: pulumi.Input<number>;
|
|
502
|
+
/**
|
|
503
|
+
* The namespace to provision the resource in.
|
|
504
|
+
* The value should not contain leading or trailing forward slashes.
|
|
505
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
506
|
+
* *Available only for Vault Enterprise*.
|
|
507
|
+
*/
|
|
508
|
+
namespace?: pulumi.Input<string>;
|
|
459
509
|
/**
|
|
460
510
|
* The amount of leeway to add to not before (`nbf`) claims to account for
|
|
461
511
|
* clock skew, in seconds. Defaults to `60` seconds if set to `0` and can be disabled if set to `-1`.
|
|
@@ -534,6 +584,13 @@ export interface AuthBackendRoleArgs {
|
|
|
534
584
|
* due to a successful login.
|
|
535
585
|
*/
|
|
536
586
|
userClaim: pulumi.Input<string>;
|
|
587
|
+
/**
|
|
588
|
+
* Specifies if the `userClaim` value uses
|
|
589
|
+
* [JSON pointer](https://www.vaultproject.io/docs/auth/jwt#claim-specifications-and-json-pointer)
|
|
590
|
+
* syntax for referencing claims. By default, the `userClaim` value will not use JSON pointer.
|
|
591
|
+
* Requires Vault 1.11+.
|
|
592
|
+
*/
|
|
593
|
+
userClaimJsonPointer?: pulumi.Input<boolean>;
|
|
537
594
|
/**
|
|
538
595
|
* Log received OIDC tokens and claims when debug-level
|
|
539
596
|
* logging is active. Not recommended in production since sensitive information may be present
|
package/jwt/authBackendRole.js
CHANGED
|
@@ -85,6 +85,8 @@ class AuthBackendRole extends pulumi.CustomResource {
|
|
|
85
85
|
resourceInputs["disableBoundClaimsParsing"] = state ? state.disableBoundClaimsParsing : undefined;
|
|
86
86
|
resourceInputs["expirationLeeway"] = state ? state.expirationLeeway : undefined;
|
|
87
87
|
resourceInputs["groupsClaim"] = state ? state.groupsClaim : undefined;
|
|
88
|
+
resourceInputs["maxAge"] = state ? state.maxAge : undefined;
|
|
89
|
+
resourceInputs["namespace"] = state ? state.namespace : undefined;
|
|
88
90
|
resourceInputs["notBeforeLeeway"] = state ? state.notBeforeLeeway : undefined;
|
|
89
91
|
resourceInputs["oidcScopes"] = state ? state.oidcScopes : undefined;
|
|
90
92
|
resourceInputs["roleName"] = state ? state.roleName : undefined;
|
|
@@ -99,6 +101,7 @@ class AuthBackendRole extends pulumi.CustomResource {
|
|
|
99
101
|
resourceInputs["tokenTtl"] = state ? state.tokenTtl : undefined;
|
|
100
102
|
resourceInputs["tokenType"] = state ? state.tokenType : undefined;
|
|
101
103
|
resourceInputs["userClaim"] = state ? state.userClaim : undefined;
|
|
104
|
+
resourceInputs["userClaimJsonPointer"] = state ? state.userClaimJsonPointer : undefined;
|
|
102
105
|
resourceInputs["verboseOidcLogging"] = state ? state.verboseOidcLogging : undefined;
|
|
103
106
|
}
|
|
104
107
|
else {
|
|
@@ -120,6 +123,8 @@ class AuthBackendRole extends pulumi.CustomResource {
|
|
|
120
123
|
resourceInputs["disableBoundClaimsParsing"] = args ? args.disableBoundClaimsParsing : undefined;
|
|
121
124
|
resourceInputs["expirationLeeway"] = args ? args.expirationLeeway : undefined;
|
|
122
125
|
resourceInputs["groupsClaim"] = args ? args.groupsClaim : undefined;
|
|
126
|
+
resourceInputs["maxAge"] = args ? args.maxAge : undefined;
|
|
127
|
+
resourceInputs["namespace"] = args ? args.namespace : undefined;
|
|
123
128
|
resourceInputs["notBeforeLeeway"] = args ? args.notBeforeLeeway : undefined;
|
|
124
129
|
resourceInputs["oidcScopes"] = args ? args.oidcScopes : undefined;
|
|
125
130
|
resourceInputs["roleName"] = args ? args.roleName : undefined;
|
|
@@ -134,6 +139,7 @@ class AuthBackendRole extends pulumi.CustomResource {
|
|
|
134
139
|
resourceInputs["tokenTtl"] = args ? args.tokenTtl : undefined;
|
|
135
140
|
resourceInputs["tokenType"] = args ? args.tokenType : undefined;
|
|
136
141
|
resourceInputs["userClaim"] = args ? args.userClaim : undefined;
|
|
142
|
+
resourceInputs["userClaimJsonPointer"] = args ? args.userClaimJsonPointer : undefined;
|
|
137
143
|
resourceInputs["verboseOidcLogging"] = args ? args.verboseOidcLogging : undefined;
|
|
138
144
|
}
|
|
139
145
|
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"authBackendRole.js","sourceRoot":"","sources":["../../jwt/authBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA8DG;AACH,MAAa,eAAgB,SAAQ,MAAM,CAAC,cAAc;
|
|
1
|
+
{"version":3,"file":"authBackendRole.js","sourceRoot":"","sources":["../../jwt/authBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA8DG;AACH,MAAa,eAAgB,SAAQ,MAAM,CAAC,cAAc;IAwMtD,YAAY,IAAY,EAAE,WAAwD,EAAE,IAAmC;QACnH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA+C,CAAC;YAC9D,cAAc,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,2BAA2B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,yBAAyB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClG,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;SACvF;aAAM;YACH,MAAM,IAAI,GAAG,WAA8C,CAAC;YAC5D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,SAAS,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACtD,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,cAAc,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,2BAA2B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,yBAAyB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;SACrF;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,eAAe,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACpE,CAAC;IAjRD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA4B,EAAE,IAAmC;QAC1H,OAAO,IAAI,eAAe,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACtE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,eAAe,CAAC,YAAY,CAAC;IAChE,CAAC;;AA1BL,0CAmRC;AArQG,gBAAgB;AACO,4BAAY,GAAG,2CAA2C,CAAC"}
|
package/jwt/index.d.ts
CHANGED
|
@@ -1,2 +1,6 @@
|
|
|
1
|
-
export
|
|
2
|
-
export
|
|
1
|
+
export { AuthBackendArgs, AuthBackendState } from "./authBackend";
|
|
2
|
+
export declare type AuthBackend = import("./authBackend").AuthBackend;
|
|
3
|
+
export declare const AuthBackend: typeof import("./authBackend").AuthBackend;
|
|
4
|
+
export { AuthBackendRoleArgs, AuthBackendRoleState } from "./authBackendRole";
|
|
5
|
+
export declare type AuthBackendRole = import("./authBackendRole").AuthBackendRole;
|
|
6
|
+
export declare const AuthBackendRole: typeof import("./authBackendRole").AuthBackendRole;
|