@pulumi/vault 5.6.0 → 5.7.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/ad/getAccessCredentials.d.ts +15 -0
- package/ad/getAccessCredentials.js +1 -0
- package/ad/getAccessCredentials.js.map +1 -1
- package/ad/index.d.ts +12 -4
- package/ad/index.js +13 -26
- package/ad/index.js.map +1 -1
- package/ad/secretBackend.d.ts +39 -0
- package/ad/secretBackend.js +9 -3
- package/ad/secretBackend.js.map +1 -1
- package/ad/secretLibrary.d.ts +21 -0
- package/ad/secretLibrary.js +2 -0
- package/ad/secretLibrary.js.map +1 -1
- package/ad/secretRole.d.ts +21 -0
- package/ad/secretRole.js +2 -0
- package/ad/secretRole.js.map +1 -1
- package/alicloud/authBackendRole.d.ts +21 -0
- package/alicloud/authBackendRole.js +2 -0
- package/alicloud/authBackendRole.js.map +1 -1
- package/alicloud/index.d.ts +3 -1
- package/alicloud/index.js +4 -19
- package/alicloud/index.js.map +1 -1
- package/approle/authBackendLogin.d.ts +22 -1
- package/approle/authBackendLogin.js +3 -1
- package/approle/authBackendLogin.js.map +1 -1
- package/approle/authBackendRole.d.ts +21 -0
- package/approle/authBackendRole.js +2 -0
- package/approle/authBackendRole.js.map +1 -1
- package/approle/{authBackendRoleSecretID.d.ts → authBackendRoleSecretId.d.ts} +33 -12
- package/approle/{authBackendRoleSecretID.js → authBackendRoleSecretId.js} +16 -12
- package/approle/authBackendRoleSecretId.js.map +1 -0
- package/approle/getAuthBackendRoleId.d.ts +15 -0
- package/approle/getAuthBackendRoleId.js +1 -0
- package/approle/getAuthBackendRoleId.js.map +1 -1
- package/approle/index.d.ts +12 -4
- package/approle/index.js +15 -28
- package/approle/index.js.map +1 -1
- package/audit.d.ts +21 -0
- package/audit.js +2 -0
- package/audit.js.map +1 -1
- package/authBackend.d.ts +47 -10
- package/authBackend.js +4 -0
- package/authBackend.js.map +1 -1
- package/aws/authBackendCert.d.ts +21 -0
- package/aws/authBackendCert.js +2 -0
- package/aws/authBackendCert.js.map +1 -1
- package/aws/authBackendClient.d.ts +21 -0
- package/aws/authBackendClient.js +6 -2
- package/aws/authBackendClient.js.map +1 -1
- package/aws/authBackendIdentityWhitelist.d.ts +21 -0
- package/aws/authBackendIdentityWhitelist.js +2 -0
- package/aws/authBackendIdentityWhitelist.js.map +1 -1
- package/aws/authBackendLogin.d.ts +21 -0
- package/aws/authBackendLogin.js +4 -0
- package/aws/authBackendLogin.js.map +1 -1
- package/aws/authBackendRole.d.ts +21 -0
- package/aws/authBackendRole.js +2 -0
- package/aws/authBackendRole.js.map +1 -1
- package/aws/authBackendRoleTag.d.ts +21 -0
- package/aws/authBackendRoleTag.js +2 -0
- package/aws/authBackendRoleTag.js.map +1 -1
- package/aws/authBackendRoletagBlacklist.d.ts +21 -0
- package/aws/authBackendRoletagBlacklist.js +2 -0
- package/aws/authBackendRoletagBlacklist.js.map +1 -1
- package/aws/authBackendStsRole.d.ts +21 -0
- package/aws/authBackendStsRole.js +2 -0
- package/aws/authBackendStsRole.js.map +1 -1
- package/aws/getAccessCredentials.d.ts +15 -0
- package/aws/getAccessCredentials.js +1 -0
- package/aws/getAccessCredentials.js.map +1 -1
- package/aws/index.d.ts +33 -11
- package/aws/index.js +34 -47
- package/aws/index.js.map +1 -1
- package/aws/secretBackend.d.ts +36 -12
- package/aws/secretBackend.js +8 -14
- package/aws/secretBackend.js.map +1 -1
- package/aws/secretBackendRole.d.ts +21 -0
- package/aws/secretBackendRole.js +2 -0
- package/aws/secretBackendRole.js.map +1 -1
- package/azure/authBackendConfig.d.ts +21 -0
- package/azure/authBackendConfig.js +7 -3
- package/azure/authBackendConfig.js.map +1 -1
- package/azure/authBackendRole.d.ts +21 -0
- package/azure/authBackendRole.js +2 -0
- package/azure/authBackendRole.js.map +1 -1
- package/azure/backend.d.ts +36 -0
- package/azure/backend.js +10 -4
- package/azure/backend.js.map +1 -1
- package/azure/backendRole.d.ts +23 -1
- package/azure/backendRole.js +2 -0
- package/azure/backendRole.js.map +1 -1
- package/azure/getAccessCredentials.d.ts +15 -0
- package/azure/getAccessCredentials.js +1 -0
- package/azure/getAccessCredentials.js.map +1 -1
- package/azure/index.d.ts +15 -5
- package/azure/index.js +16 -29
- package/azure/index.js.map +1 -1
- package/certAuthBackendRole.d.ts +39 -3
- package/certAuthBackendRole.js +4 -0
- package/certAuthBackendRole.js.map +1 -1
- package/config/vars.d.ts +43 -3
- package/config/vars.js +64 -4
- package/config/vars.js.map +1 -1
- package/consul/index.d.ts +6 -2
- package/consul/index.js +7 -22
- package/consul/index.js.map +1 -1
- package/consul/secretBackend.d.ts +87 -15
- package/consul/secretBackend.js +24 -7
- package/consul/secretBackend.js.map +1 -1
- package/consul/secretBackendRole.d.ts +93 -10
- package/consul/secretBackendRole.js +14 -1
- package/consul/secretBackendRole.js.map +1 -1
- package/database/index.d.ts +12 -4
- package/database/index.js +13 -28
- package/database/index.js.map +1 -1
- package/database/secretBackendConnection.d.ts +35 -1
- package/database/secretBackendConnection.js +4 -0
- package/database/secretBackendConnection.js.map +1 -1
- package/database/secretBackendRole.d.ts +21 -0
- package/database/secretBackendRole.js +2 -0
- package/database/secretBackendRole.js.map +1 -1
- package/database/secretBackendStaticRole.d.ts +21 -0
- package/database/secretBackendStaticRole.js +2 -0
- package/database/secretBackendStaticRole.js.map +1 -1
- package/database/secretsMount.d.ts +41 -1
- package/database/secretsMount.js +6 -0
- package/database/secretsMount.js.map +1 -1
- package/egpPolicy.d.ts +21 -0
- package/egpPolicy.js +2 -0
- package/egpPolicy.js.map +1 -1
- package/gcp/authBackend.d.ts +71 -1
- package/gcp/authBackend.js +18 -2
- package/gcp/authBackend.js.map +1 -1
- package/gcp/authBackendRole.d.ts +21 -0
- package/gcp/authBackendRole.js +2 -0
- package/gcp/authBackendRole.js.map +1 -1
- package/gcp/getAuthBackendRole.d.ts +15 -0
- package/gcp/getAuthBackendRole.js +1 -0
- package/gcp/getAuthBackendRole.js.map +1 -1
- package/gcp/index.d.ts +18 -6
- package/gcp/index.js +19 -32
- package/gcp/index.js.map +1 -1
- package/gcp/secretBackend.d.ts +36 -0
- package/gcp/secretBackend.js +7 -1
- package/gcp/secretBackend.js.map +1 -1
- package/gcp/secretRoleset.d.ts +23 -1
- package/gcp/secretRoleset.js +2 -0
- package/gcp/secretRoleset.js.map +1 -1
- package/gcp/secretStaticAccount.d.ts +23 -1
- package/gcp/secretStaticAccount.js +2 -0
- package/gcp/secretStaticAccount.js.map +1 -1
- package/generic/endpoint.d.ts +21 -0
- package/generic/endpoint.js +5 -1
- package/generic/endpoint.js.map +1 -1
- package/generic/getSecret.d.ts +15 -0
- package/generic/getSecret.js +1 -0
- package/generic/getSecret.js.map +1 -1
- package/generic/index.d.ts +9 -3
- package/generic/index.js +10 -23
- package/generic/index.js.map +1 -1
- package/generic/secret.d.ts +21 -0
- package/generic/secret.js +5 -1
- package/generic/secret.js.map +1 -1
- package/getAuthBackend.d.ts +16 -1
- package/getAuthBackend.js +1 -0
- package/getAuthBackend.js.map +1 -1
- package/getNomadAccessToken.d.ts +15 -0
- package/getNomadAccessToken.js +1 -0
- package/getNomadAccessToken.js.map +1 -1
- package/getPolicyDocument.d.ts +5 -1
- package/getPolicyDocument.js +1 -0
- package/getPolicyDocument.js.map +1 -1
- package/github/authBackend.d.ts +38 -1
- package/github/authBackend.js +4 -0
- package/github/authBackend.js.map +1 -1
- package/github/index.d.ts +9 -3
- package/github/index.js +10 -25
- package/github/index.js.map +1 -1
- package/github/team.d.ts +21 -0
- package/github/team.js +2 -0
- package/github/team.js.map +1 -1
- package/github/user.d.ts +21 -0
- package/github/user.js +2 -0
- package/github/user.js.map +1 -1
- package/identity/entity.d.ts +21 -0
- package/identity/entity.js +2 -0
- package/identity/entity.js.map +1 -1
- package/identity/entityAlias.d.ts +21 -0
- package/identity/entityAlias.js +2 -0
- package/identity/entityAlias.js.map +1 -1
- package/identity/entityPolicies.d.ts +21 -0
- package/identity/entityPolicies.js +2 -0
- package/identity/entityPolicies.js.map +1 -1
- package/identity/getEntity.d.ts +16 -1
- package/identity/getEntity.js +1 -0
- package/identity/getEntity.js.map +1 -1
- package/identity/getGroup.d.ts +15 -0
- package/identity/getGroup.js +1 -0
- package/identity/getGroup.js.map +1 -1
- package/identity/getOidcClientCreds.d.ts +15 -0
- package/identity/getOidcClientCreds.js +1 -0
- package/identity/getOidcClientCreds.js.map +1 -1
- package/identity/getOidcOpenidConfig.d.ts +15 -0
- package/identity/getOidcOpenidConfig.js +1 -0
- package/identity/getOidcOpenidConfig.js.map +1 -1
- package/identity/getOidcPublicKeys.d.ts +15 -0
- package/identity/getOidcPublicKeys.js +1 -0
- package/identity/getOidcPublicKeys.js.map +1 -1
- package/identity/group.d.ts +21 -0
- package/identity/group.js +2 -0
- package/identity/group.js.map +1 -1
- package/identity/groupAlias.d.ts +21 -0
- package/identity/groupAlias.js +2 -0
- package/identity/groupAlias.js.map +1 -1
- package/identity/groupMemberEntityIds.d.ts +21 -0
- package/identity/groupMemberEntityIds.js +2 -0
- package/identity/groupMemberEntityIds.js.map +1 -1
- package/identity/groupPolicies.d.ts +21 -0
- package/identity/groupPolicies.js +2 -0
- package/identity/groupPolicies.js.map +1 -1
- package/identity/index.d.ts +75 -20
- package/identity/index.js +86 -66
- package/identity/index.js.map +1 -1
- package/identity/mfaDuo.d.ts +200 -0
- package/identity/mfaDuo.js +110 -0
- package/identity/mfaDuo.js.map +1 -0
- package/identity/mfaLoginEnforcement.d.ts +170 -0
- package/identity/mfaLoginEnforcement.js +96 -0
- package/identity/mfaLoginEnforcement.js.map +1 -0
- package/identity/mfaOkta.d.ts +188 -0
- package/identity/mfaOkta.js +105 -0
- package/identity/mfaOkta.js.map +1 -0
- package/identity/mfaPingid.d.ts +190 -0
- package/identity/mfaPingid.js +102 -0
- package/identity/mfaPingid.js.map +1 -0
- package/identity/mfaTotp.d.ts +218 -0
- package/identity/mfaTotp.js +104 -0
- package/identity/mfaTotp.js.map +1 -0
- package/identity/oidc.d.ts +21 -0
- package/identity/oidc.js +2 -0
- package/identity/oidc.js.map +1 -1
- package/identity/oidcAssignment.d.ts +23 -2
- package/identity/oidcAssignment.js +4 -2
- package/identity/oidcAssignment.js.map +1 -1
- package/identity/oidcClient.d.ts +21 -0
- package/identity/oidcClient.js +4 -0
- package/identity/oidcClient.js.map +1 -1
- package/identity/oidcKey.d.ts +21 -0
- package/identity/oidcKey.js +2 -0
- package/identity/oidcKey.js.map +1 -1
- package/identity/oidcKeyAllowedClientID.d.ts +21 -0
- package/identity/oidcKeyAllowedClientID.js +2 -0
- package/identity/oidcKeyAllowedClientID.js.map +1 -1
- package/identity/oidcProvider.d.ts +21 -0
- package/identity/oidcProvider.js +2 -0
- package/identity/oidcProvider.js.map +1 -1
- package/identity/oidcRole.d.ts +21 -0
- package/identity/oidcRole.js +2 -0
- package/identity/oidcRole.js.map +1 -1
- package/identity/oidcScope.d.ts +22 -3
- package/identity/oidcScope.js +3 -3
- package/identity/oidcScope.js.map +1 -1
- package/index.d.ts +75 -25
- package/index.js +78 -83
- package/index.js.map +1 -1
- package/jwt/authBackend.d.ts +38 -1
- package/jwt/authBackend.js +7 -1
- package/jwt/authBackend.js.map +1 -1
- package/jwt/authBackendRole.d.ts +57 -0
- package/jwt/authBackendRole.js +6 -0
- package/jwt/authBackendRole.js.map +1 -1
- package/jwt/index.d.ts +6 -2
- package/jwt/index.js +7 -22
- package/jwt/index.js.map +1 -1
- package/kmip/index.d.ts +9 -3
- package/kmip/index.js +10 -25
- package/kmip/index.js.map +1 -1
- package/kmip/secretBackend.d.ts +36 -0
- package/kmip/secretBackend.js +4 -0
- package/kmip/secretBackend.js.map +1 -1
- package/kmip/secretRole.d.ts +21 -0
- package/kmip/secretRole.js +2 -0
- package/kmip/secretRole.js.map +1 -1
- package/kmip/secretScope.d.ts +21 -0
- package/kmip/secretScope.js +2 -0
- package/kmip/secretScope.js.map +1 -1
- package/kubernetes/authBackendConfig.d.ts +21 -0
- package/kubernetes/authBackendConfig.js +5 -1
- package/kubernetes/authBackendConfig.js.map +1 -1
- package/kubernetes/authBackendRole.d.ts +21 -0
- package/kubernetes/authBackendRole.js +2 -0
- package/kubernetes/authBackendRole.js.map +1 -1
- package/kubernetes/getAuthBackendConfig.d.ts +15 -0
- package/kubernetes/getAuthBackendConfig.js +1 -0
- package/kubernetes/getAuthBackendConfig.js.map +1 -1
- package/kubernetes/getAuthBackendRole.d.ts +15 -0
- package/kubernetes/getAuthBackendRole.js +1 -0
- package/kubernetes/getAuthBackendRole.js.map +1 -1
- package/kubernetes/getServiceAccountToken.d.ts +46 -0
- package/kubernetes/getServiceAccountToken.js +27 -0
- package/kubernetes/getServiceAccountToken.js.map +1 -0
- package/kubernetes/index.d.ts +21 -4
- package/kubernetes/index.js +26 -24
- package/kubernetes/index.js.map +1 -1
- package/kubernetes/secretBackend.d.ts +303 -0
- package/kubernetes/secretBackend.js +114 -0
- package/kubernetes/secretBackend.js.map +1 -0
- package/kubernetes/secretBackendRole.d.ts +367 -0
- package/kubernetes/secretBackendRole.js +191 -0
- package/kubernetes/secretBackendRole.js.map +1 -0
- package/kv/getSecret.d.ts +104 -0
- package/kv/getSecret.js +53 -0
- package/kv/getSecret.js.map +1 -0
- package/kv/getSecretSubkeysV2.d.ts +42 -0
- package/kv/getSecretSubkeysV2.js +26 -0
- package/kv/getSecretSubkeysV2.js.map +1 -0
- package/kv/getSecretV2.d.ts +139 -0
- package/kv/getSecretV2.js +58 -0
- package/kv/getSecretV2.js.map +1 -0
- package/kv/getSecretsList.d.ts +85 -0
- package/kv/getSecretsList.js +58 -0
- package/kv/getSecretsList.js.map +1 -0
- package/kv/getSecretsListV2.d.ts +114 -0
- package/kv/getSecretsListV2.js +69 -0
- package/kv/getSecretsListV2.js.map +1 -0
- package/kv/index.d.ts +24 -0
- package/kv/index.js +47 -0
- package/kv/index.js.map +1 -0
- package/kv/secret.d.ts +145 -0
- package/kv/secret.js +106 -0
- package/kv/secret.js.map +1 -0
- package/kv/secretBackendV2.d.ts +154 -0
- package/kv/secretBackendV2.js +103 -0
- package/kv/secretBackendV2.js.map +1 -0
- package/kv/secretV2.d.ts +257 -0
- package/kv/secretV2.js +122 -0
- package/kv/secretV2.js.map +1 -0
- package/ldap/authBackend.d.ts +48 -0
- package/ldap/authBackend.js +10 -2
- package/ldap/authBackend.js.map +1 -1
- package/ldap/authBackendGroup.d.ts +21 -0
- package/ldap/authBackendGroup.js +2 -0
- package/ldap/authBackendGroup.js.map +1 -1
- package/ldap/authBackendUser.d.ts +21 -0
- package/ldap/authBackendUser.js +2 -0
- package/ldap/authBackendUser.js.map +1 -1
- package/ldap/index.d.ts +9 -3
- package/ldap/index.js +10 -25
- package/ldap/index.js.map +1 -1
- package/managed/index.d.ts +3 -0
- package/managed/index.js +22 -0
- package/managed/index.js.map +1 -0
- package/managed/keys.d.ts +104 -0
- package/managed/keys.js +64 -0
- package/managed/keys.js.map +1 -0
- package/mfaDuo.d.ts +21 -0
- package/mfaDuo.js +6 -2
- package/mfaDuo.js.map +1 -1
- package/mfaOkta.d.ts +21 -0
- package/mfaOkta.js +5 -1
- package/mfaOkta.js.map +1 -1
- package/mfaPingid.d.ts +21 -0
- package/mfaPingid.js +2 -0
- package/mfaPingid.js.map +1 -1
- package/mfaTotp.d.ts +21 -0
- package/mfaTotp.js +2 -0
- package/mfaTotp.js.map +1 -1
- package/mount.d.ts +33 -0
- package/mount.js +4 -0
- package/mount.js.map +1 -1
- package/namespace.d.ts +32 -18
- package/namespace.js +5 -16
- package/namespace.js.map +1 -1
- package/nomadSecretBackend.d.ts +36 -0
- package/nomadSecretBackend.js +9 -3
- package/nomadSecretBackend.js.map +1 -1
- package/nomadSecretRole.d.ts +21 -0
- package/nomadSecretRole.js +2 -0
- package/nomadSecretRole.js.map +1 -1
- package/okta/authBackend.d.ts +38 -1
- package/okta/authBackend.js +7 -1
- package/okta/authBackend.js.map +1 -1
- package/okta/authBackendGroup.d.ts +21 -0
- package/okta/authBackendGroup.js +2 -0
- package/okta/authBackendGroup.js.map +1 -1
- package/okta/authBackendUser.d.ts +21 -0
- package/okta/authBackendUser.js +2 -0
- package/okta/authBackendUser.js.map +1 -1
- package/okta/index.d.ts +9 -3
- package/okta/index.js +10 -25
- package/okta/index.js.map +1 -1
- package/package.json +2 -2
- package/package.json.dev +2 -2
- package/passwordPolicy.d.ts +21 -0
- package/passwordPolicy.js +2 -0
- package/passwordPolicy.js.map +1 -1
- package/pkisecret/index.d.ts +30 -10
- package/pkisecret/index.js +31 -46
- package/pkisecret/index.js.map +1 -1
- package/pkisecret/secretBackendCert.d.ts +29 -0
- package/pkisecret/secretBackendCert.js +6 -0
- package/pkisecret/secretBackendCert.js.map +1 -1
- package/pkisecret/secretBackendConfigCa.d.ts +21 -0
- package/pkisecret/secretBackendConfigCa.js +5 -1
- package/pkisecret/secretBackendConfigCa.js.map +1 -1
- package/pkisecret/secretBackendConfigUrls.d.ts +21 -0
- package/pkisecret/secretBackendConfigUrls.js +2 -0
- package/pkisecret/secretBackendConfigUrls.js.map +1 -1
- package/pkisecret/secretBackendCrlConfig.d.ts +21 -0
- package/pkisecret/secretBackendCrlConfig.js +2 -0
- package/pkisecret/secretBackendCrlConfig.js.map +1 -1
- package/pkisecret/secretBackendIntermediateCertRequest.d.ts +54 -0
- package/pkisecret/secretBackendIntermediateCertRequest.js +8 -0
- package/pkisecret/secretBackendIntermediateCertRequest.js.map +1 -1
- package/pkisecret/secretBackendIntermediateSetSigned.d.ts +21 -0
- package/pkisecret/secretBackendIntermediateSetSigned.js +2 -0
- package/pkisecret/secretBackendIntermediateSetSigned.js.map +1 -1
- package/pkisecret/secretBackendRole.d.ts +24 -3
- package/pkisecret/secretBackendRole.js +2 -0
- package/pkisecret/secretBackendRole.js.map +1 -1
- package/pkisecret/secretBackendRootCert.d.ts +57 -3
- package/pkisecret/secretBackendRootCert.js +6 -0
- package/pkisecret/secretBackendRootCert.js.map +1 -1
- package/pkisecret/secretBackendRootSignIntermediate.d.ts +21 -0
- package/pkisecret/secretBackendRootSignIntermediate.js +2 -0
- package/pkisecret/secretBackendRootSignIntermediate.js.map +1 -1
- package/pkisecret/secretBackendSign.d.ts +29 -0
- package/pkisecret/secretBackendSign.js +4 -0
- package/pkisecret/secretBackendSign.js.map +1 -1
- package/policy.d.ts +21 -0
- package/policy.js +2 -0
- package/policy.js.map +1 -1
- package/provider.d.ts +43 -3
- package/provider.js +13 -3
- package/provider.js.map +1 -1
- package/quotaLeaseCount.d.ts +21 -0
- package/quotaLeaseCount.js +2 -0
- package/quotaLeaseCount.js.map +1 -1
- package/quotaRateLimit.d.ts +48 -0
- package/quotaRateLimit.js +6 -0
- package/quotaRateLimit.js.map +1 -1
- package/rabbitmq/index.d.ts +6 -2
- package/rabbitmq/index.js +7 -22
- package/rabbitmq/index.js.map +1 -1
- package/rabbitmq/secretBackend.d.ts +36 -0
- package/rabbitmq/secretBackend.js +8 -2
- package/rabbitmq/secretBackend.js.map +1 -1
- package/rabbitmq/secretBackendRole.d.ts +23 -1
- package/rabbitmq/secretBackendRole.js +2 -0
- package/rabbitmq/secretBackendRole.js.map +1 -1
- package/raftAutopilot.d.ts +21 -0
- package/raftAutopilot.js +2 -0
- package/raftAutopilot.js.map +1 -1
- package/raftSnapshotAgentConfig.d.ts +62 -0
- package/raftSnapshotAgentConfig.js +43 -0
- package/raftSnapshotAgentConfig.js.map +1 -1
- package/rgpPolicy.d.ts +21 -0
- package/rgpPolicy.js +2 -0
- package/rgpPolicy.js.map +1 -1
- package/ssh/index.d.ts +6 -2
- package/ssh/index.js +7 -22
- package/ssh/index.js.map +1 -1
- package/ssh/secretBackendCa.d.ts +29 -0
- package/ssh/secretBackendCa.js +13 -1
- package/ssh/secretBackendCa.js.map +1 -1
- package/ssh/secretBackendRole.d.ts +23 -1
- package/ssh/secretBackendRole.js +2 -0
- package/ssh/secretBackendRole.js.map +1 -1
- package/terraformcloud/index.d.ts +9 -3
- package/terraformcloud/index.js +10 -25
- package/terraformcloud/index.js.map +1 -1
- package/terraformcloud/secretBackend.d.ts +36 -0
- package/terraformcloud/secretBackend.js +7 -1
- package/terraformcloud/secretBackend.js.map +1 -1
- package/terraformcloud/secretCreds.d.ts +21 -0
- package/terraformcloud/secretCreds.js +4 -0
- package/terraformcloud/secretCreds.js.map +1 -1
- package/terraformcloud/secretRole.d.ts +21 -0
- package/terraformcloud/secretRole.js +2 -0
- package/terraformcloud/secretRole.js.map +1 -1
- package/token.d.ts +42 -0
- package/token.js +9 -0
- package/token.js.map +1 -1
- package/tokenauth/authBackendRole.d.ts +21 -0
- package/tokenauth/authBackendRole.js +2 -0
- package/tokenauth/authBackendRole.js.map +1 -1
- package/tokenauth/index.d.ts +3 -1
- package/tokenauth/index.js +4 -19
- package/tokenauth/index.js.map +1 -1
- package/transform/index.d.ts +18 -6
- package/transform/index.js +19 -30
- package/transform/index.js.map +1 -1
- package/transform/transformation.d.ts +0 -25
- package/transform/transformation.js +0 -25
- package/transform/transformation.js.map +1 -1
- package/transit/getDecrypt.d.ts +3 -0
- package/transit/getDecrypt.js +1 -0
- package/transit/getDecrypt.js.map +1 -1
- package/transit/getEncrypt.d.ts +3 -0
- package/transit/getEncrypt.js +1 -0
- package/transit/getEncrypt.js.map +1 -1
- package/transit/index.d.ts +12 -4
- package/transit/index.js +13 -24
- package/transit/index.js.map +1 -1
- package/transit/secretBackendKey.d.ts +21 -0
- package/transit/secretBackendKey.js +2 -0
- package/transit/secretBackendKey.js.map +1 -1
- package/transit/secretCacheConfig.d.ts +21 -0
- package/transit/secretCacheConfig.js +2 -0
- package/transit/secretCacheConfig.js.map +1 -1
- package/types/index.js.map +1 -1
- package/types/input.d.ts +408 -4
- package/types/output.d.ts +409 -5
- package/utilities.js +13 -1
- package/utilities.js.map +1 -1
- package/approle/authBackendRoleSecretID.js.map +0 -1
package/kv/getSecret.js
ADDED
|
@@ -0,0 +1,53 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
|
+
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.getSecretOutput = exports.getSecret = void 0;
|
|
6
|
+
const pulumi = require("@pulumi/pulumi");
|
|
7
|
+
const utilities = require("../utilities");
|
|
8
|
+
/**
|
|
9
|
+
* ## Example Usage
|
|
10
|
+
*
|
|
11
|
+
* ```typescript
|
|
12
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
13
|
+
* import * as vault from "@pulumi/vault";
|
|
14
|
+
*
|
|
15
|
+
* const kvv1 = new vault.Mount("kvv1", {
|
|
16
|
+
* path: "kvv1",
|
|
17
|
+
* type: "kv",
|
|
18
|
+
* options: {
|
|
19
|
+
* version: "1",
|
|
20
|
+
* },
|
|
21
|
+
* description: "KV Version 1 secret engine mount",
|
|
22
|
+
* });
|
|
23
|
+
* const secret = new vault.kv.Secret("secret", {
|
|
24
|
+
* path: pulumi.interpolate`${kvv1.path}/secret`,
|
|
25
|
+
* dataJson: JSON.stringify({
|
|
26
|
+
* zip: "zap",
|
|
27
|
+
* foo: "bar",
|
|
28
|
+
* }),
|
|
29
|
+
* });
|
|
30
|
+
* const secretData = vault.kv.getSecretOutput({
|
|
31
|
+
* path: secret.path,
|
|
32
|
+
* });
|
|
33
|
+
* ```
|
|
34
|
+
* ## Required Vault Capabilities
|
|
35
|
+
*
|
|
36
|
+
* Use of this resource requires the `read` capability on the given path.
|
|
37
|
+
*/
|
|
38
|
+
function getSecret(args, opts) {
|
|
39
|
+
if (!opts) {
|
|
40
|
+
opts = {};
|
|
41
|
+
}
|
|
42
|
+
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
43
|
+
return pulumi.runtime.invoke("vault:kv/getSecret:getSecret", {
|
|
44
|
+
"namespace": args.namespace,
|
|
45
|
+
"path": args.path,
|
|
46
|
+
}, opts);
|
|
47
|
+
}
|
|
48
|
+
exports.getSecret = getSecret;
|
|
49
|
+
function getSecretOutput(args, opts) {
|
|
50
|
+
return pulumi.output(args).apply(a => getSecret(a, opts));
|
|
51
|
+
}
|
|
52
|
+
exports.getSecretOutput = getSecretOutput;
|
|
53
|
+
//# sourceMappingURL=getSecret.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"getSecret.js","sourceRoot":"","sources":["../../kv/getSecret.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA6BG;AACH,SAAgB,SAAS,CAAC,IAAmB,EAAE,IAA2B;IACtE,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,8BAA8B,EAAE;QACzD,WAAW,EAAE,IAAI,CAAC,SAAS;QAC3B,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAVD,8BAUC;AAyDD,SAAgB,eAAe,CAAC,IAAyB,EAAE,IAA2B;IAClF,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,SAAS,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AAC7D,CAAC;AAFD,0CAEC"}
|
|
@@ -0,0 +1,42 @@
|
|
|
1
|
+
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
export declare function getSecretSubkeysV2(args: GetSecretSubkeysV2Args, opts?: pulumi.InvokeOptions): Promise<GetSecretSubkeysV2Result>;
|
|
3
|
+
/**
|
|
4
|
+
* A collection of arguments for invoking getSecretSubkeysV2.
|
|
5
|
+
*/
|
|
6
|
+
export interface GetSecretSubkeysV2Args {
|
|
7
|
+
depth?: number;
|
|
8
|
+
mount: string;
|
|
9
|
+
name: string;
|
|
10
|
+
namespace?: string;
|
|
11
|
+
version?: number;
|
|
12
|
+
}
|
|
13
|
+
/**
|
|
14
|
+
* A collection of values returned by getSecretSubkeysV2.
|
|
15
|
+
*/
|
|
16
|
+
export interface GetSecretSubkeysV2Result {
|
|
17
|
+
readonly data: {
|
|
18
|
+
[key: string]: any;
|
|
19
|
+
};
|
|
20
|
+
readonly dataJson: string;
|
|
21
|
+
readonly depth?: number;
|
|
22
|
+
/**
|
|
23
|
+
* The provider-assigned unique ID for this managed resource.
|
|
24
|
+
*/
|
|
25
|
+
readonly id: string;
|
|
26
|
+
readonly mount: string;
|
|
27
|
+
readonly name: string;
|
|
28
|
+
readonly namespace?: string;
|
|
29
|
+
readonly path: string;
|
|
30
|
+
readonly version?: number;
|
|
31
|
+
}
|
|
32
|
+
export declare function getSecretSubkeysV2Output(args: GetSecretSubkeysV2OutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output<GetSecretSubkeysV2Result>;
|
|
33
|
+
/**
|
|
34
|
+
* A collection of arguments for invoking getSecretSubkeysV2.
|
|
35
|
+
*/
|
|
36
|
+
export interface GetSecretSubkeysV2OutputArgs {
|
|
37
|
+
depth?: pulumi.Input<number>;
|
|
38
|
+
mount: pulumi.Input<string>;
|
|
39
|
+
name: pulumi.Input<string>;
|
|
40
|
+
namespace?: pulumi.Input<string>;
|
|
41
|
+
version?: pulumi.Input<number>;
|
|
42
|
+
}
|
|
@@ -0,0 +1,26 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
|
+
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.getSecretSubkeysV2Output = exports.getSecretSubkeysV2 = void 0;
|
|
6
|
+
const pulumi = require("@pulumi/pulumi");
|
|
7
|
+
const utilities = require("../utilities");
|
|
8
|
+
function getSecretSubkeysV2(args, opts) {
|
|
9
|
+
if (!opts) {
|
|
10
|
+
opts = {};
|
|
11
|
+
}
|
|
12
|
+
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
13
|
+
return pulumi.runtime.invoke("vault:kv/getSecretSubkeysV2:getSecretSubkeysV2", {
|
|
14
|
+
"depth": args.depth,
|
|
15
|
+
"mount": args.mount,
|
|
16
|
+
"name": args.name,
|
|
17
|
+
"namespace": args.namespace,
|
|
18
|
+
"version": args.version,
|
|
19
|
+
}, opts);
|
|
20
|
+
}
|
|
21
|
+
exports.getSecretSubkeysV2 = getSecretSubkeysV2;
|
|
22
|
+
function getSecretSubkeysV2Output(args, opts) {
|
|
23
|
+
return pulumi.output(args).apply(a => getSecretSubkeysV2(a, opts));
|
|
24
|
+
}
|
|
25
|
+
exports.getSecretSubkeysV2Output = getSecretSubkeysV2Output;
|
|
26
|
+
//# sourceMappingURL=getSecretSubkeysV2.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"getSecretSubkeysV2.js","sourceRoot":"","sources":["../../kv/getSecretSubkeysV2.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,SAAgB,kBAAkB,CAAC,IAA4B,EAAE,IAA2B;IACxF,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,gDAAgD,EAAE;QAC3E,OAAO,EAAE,IAAI,CAAC,KAAK;QACnB,OAAO,EAAE,IAAI,CAAC,KAAK;QACnB,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,WAAW,EAAE,IAAI,CAAC,SAAS;QAC3B,SAAS,EAAE,IAAI,CAAC,OAAO;KAC1B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAbD,gDAaC;AA+BD,SAAgB,wBAAwB,CAAC,IAAkC,EAAE,IAA2B;IACpG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,kBAAkB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACtE,CAAC;AAFD,4DAEC"}
|
|
@@ -0,0 +1,139 @@
|
|
|
1
|
+
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
/**
|
|
3
|
+
* ## Example Usage
|
|
4
|
+
*
|
|
5
|
+
* ```typescript
|
|
6
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
7
|
+
* import * as vault from "@pulumi/vault";
|
|
8
|
+
*
|
|
9
|
+
* const kvv2 = new vault.Mount("kvv2", {
|
|
10
|
+
* path: "kvv2",
|
|
11
|
+
* type: "kv",
|
|
12
|
+
* options: {
|
|
13
|
+
* version: "2",
|
|
14
|
+
* },
|
|
15
|
+
* description: "KV Version 2 secret engine mount",
|
|
16
|
+
* });
|
|
17
|
+
* const secret = new vault.kv.SecretV2("secret", {
|
|
18
|
+
* mount: kvv2.path,
|
|
19
|
+
* cas: 1,
|
|
20
|
+
* deleteAllVersions: true,
|
|
21
|
+
* dataJson: JSON.stringify({
|
|
22
|
+
* zip: "zap",
|
|
23
|
+
* foo: "bar",
|
|
24
|
+
* }),
|
|
25
|
+
* });
|
|
26
|
+
* const secretData = kvv2.path.apply(path => vault.kv.getSecretV2Output({
|
|
27
|
+
* mount: path,
|
|
28
|
+
* name: vault_kv_secret_v2.test.name,
|
|
29
|
+
* }));
|
|
30
|
+
* ```
|
|
31
|
+
* ## Required Vault Capabilities
|
|
32
|
+
*
|
|
33
|
+
* Use of this resource requires the `read` capability on the given path.
|
|
34
|
+
*/
|
|
35
|
+
export declare function getSecretV2(args: GetSecretV2Args, opts?: pulumi.InvokeOptions): Promise<GetSecretV2Result>;
|
|
36
|
+
/**
|
|
37
|
+
* A collection of arguments for invoking getSecretV2.
|
|
38
|
+
*/
|
|
39
|
+
export interface GetSecretV2Args {
|
|
40
|
+
/**
|
|
41
|
+
* Path where KV-V2 engine is mounted.
|
|
42
|
+
*/
|
|
43
|
+
mount: string;
|
|
44
|
+
/**
|
|
45
|
+
* Full name of the secret. For a nested secret
|
|
46
|
+
* the name is the nested path excluding the mount and data
|
|
47
|
+
* prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
|
|
48
|
+
* the name is `foo/bar/baz`.
|
|
49
|
+
*/
|
|
50
|
+
name: string;
|
|
51
|
+
/**
|
|
52
|
+
* The namespace of the target resource.
|
|
53
|
+
* The value should not contain leading or trailing forward slashes.
|
|
54
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
55
|
+
* *Available only for Vault Enterprise*.
|
|
56
|
+
*/
|
|
57
|
+
namespace?: string;
|
|
58
|
+
/**
|
|
59
|
+
* Version of the secret to retrieve.
|
|
60
|
+
*/
|
|
61
|
+
version?: number;
|
|
62
|
+
}
|
|
63
|
+
/**
|
|
64
|
+
* A collection of values returned by getSecretV2.
|
|
65
|
+
*/
|
|
66
|
+
export interface GetSecretV2Result {
|
|
67
|
+
/**
|
|
68
|
+
* Time at which secret was created.
|
|
69
|
+
*/
|
|
70
|
+
readonly createdTime: string;
|
|
71
|
+
/**
|
|
72
|
+
* Custom metadata for the secret.
|
|
73
|
+
*/
|
|
74
|
+
readonly customMetadata: {
|
|
75
|
+
[key: string]: any;
|
|
76
|
+
};
|
|
77
|
+
/**
|
|
78
|
+
* A mapping whose keys are the top-level data keys returned from
|
|
79
|
+
* Vault and whose values are the corresponding values. This map can only
|
|
80
|
+
* represent string data, so any non-string values returned from Vault are
|
|
81
|
+
* serialized as JSON.
|
|
82
|
+
*/
|
|
83
|
+
readonly data: {
|
|
84
|
+
[key: string]: any;
|
|
85
|
+
};
|
|
86
|
+
/**
|
|
87
|
+
* JSON-encoded string that that is
|
|
88
|
+
* read as the secret data at the given path.
|
|
89
|
+
*/
|
|
90
|
+
readonly dataJson: string;
|
|
91
|
+
/**
|
|
92
|
+
* Deletion time for the secret.
|
|
93
|
+
*/
|
|
94
|
+
readonly deletionTime: string;
|
|
95
|
+
/**
|
|
96
|
+
* Indicates whether the secret has been destroyed.
|
|
97
|
+
*/
|
|
98
|
+
readonly destroyed: boolean;
|
|
99
|
+
/**
|
|
100
|
+
* The provider-assigned unique ID for this managed resource.
|
|
101
|
+
*/
|
|
102
|
+
readonly id: string;
|
|
103
|
+
readonly mount: string;
|
|
104
|
+
readonly name: string;
|
|
105
|
+
readonly namespace?: string;
|
|
106
|
+
/**
|
|
107
|
+
* Full path where the KVV2 secret is written.
|
|
108
|
+
*/
|
|
109
|
+
readonly path: string;
|
|
110
|
+
readonly version?: number;
|
|
111
|
+
}
|
|
112
|
+
export declare function getSecretV2Output(args: GetSecretV2OutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output<GetSecretV2Result>;
|
|
113
|
+
/**
|
|
114
|
+
* A collection of arguments for invoking getSecretV2.
|
|
115
|
+
*/
|
|
116
|
+
export interface GetSecretV2OutputArgs {
|
|
117
|
+
/**
|
|
118
|
+
* Path where KV-V2 engine is mounted.
|
|
119
|
+
*/
|
|
120
|
+
mount: pulumi.Input<string>;
|
|
121
|
+
/**
|
|
122
|
+
* Full name of the secret. For a nested secret
|
|
123
|
+
* the name is the nested path excluding the mount and data
|
|
124
|
+
* prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
|
|
125
|
+
* the name is `foo/bar/baz`.
|
|
126
|
+
*/
|
|
127
|
+
name: pulumi.Input<string>;
|
|
128
|
+
/**
|
|
129
|
+
* The namespace of the target resource.
|
|
130
|
+
* The value should not contain leading or trailing forward slashes.
|
|
131
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
132
|
+
* *Available only for Vault Enterprise*.
|
|
133
|
+
*/
|
|
134
|
+
namespace?: pulumi.Input<string>;
|
|
135
|
+
/**
|
|
136
|
+
* Version of the secret to retrieve.
|
|
137
|
+
*/
|
|
138
|
+
version?: pulumi.Input<number>;
|
|
139
|
+
}
|
|
@@ -0,0 +1,58 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
|
+
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.getSecretV2Output = exports.getSecretV2 = void 0;
|
|
6
|
+
const pulumi = require("@pulumi/pulumi");
|
|
7
|
+
const utilities = require("../utilities");
|
|
8
|
+
/**
|
|
9
|
+
* ## Example Usage
|
|
10
|
+
*
|
|
11
|
+
* ```typescript
|
|
12
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
13
|
+
* import * as vault from "@pulumi/vault";
|
|
14
|
+
*
|
|
15
|
+
* const kvv2 = new vault.Mount("kvv2", {
|
|
16
|
+
* path: "kvv2",
|
|
17
|
+
* type: "kv",
|
|
18
|
+
* options: {
|
|
19
|
+
* version: "2",
|
|
20
|
+
* },
|
|
21
|
+
* description: "KV Version 2 secret engine mount",
|
|
22
|
+
* });
|
|
23
|
+
* const secret = new vault.kv.SecretV2("secret", {
|
|
24
|
+
* mount: kvv2.path,
|
|
25
|
+
* cas: 1,
|
|
26
|
+
* deleteAllVersions: true,
|
|
27
|
+
* dataJson: JSON.stringify({
|
|
28
|
+
* zip: "zap",
|
|
29
|
+
* foo: "bar",
|
|
30
|
+
* }),
|
|
31
|
+
* });
|
|
32
|
+
* const secretData = kvv2.path.apply(path => vault.kv.getSecretV2Output({
|
|
33
|
+
* mount: path,
|
|
34
|
+
* name: vault_kv_secret_v2.test.name,
|
|
35
|
+
* }));
|
|
36
|
+
* ```
|
|
37
|
+
* ## Required Vault Capabilities
|
|
38
|
+
*
|
|
39
|
+
* Use of this resource requires the `read` capability on the given path.
|
|
40
|
+
*/
|
|
41
|
+
function getSecretV2(args, opts) {
|
|
42
|
+
if (!opts) {
|
|
43
|
+
opts = {};
|
|
44
|
+
}
|
|
45
|
+
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
46
|
+
return pulumi.runtime.invoke("vault:kv/getSecretV2:getSecretV2", {
|
|
47
|
+
"mount": args.mount,
|
|
48
|
+
"name": args.name,
|
|
49
|
+
"namespace": args.namespace,
|
|
50
|
+
"version": args.version,
|
|
51
|
+
}, opts);
|
|
52
|
+
}
|
|
53
|
+
exports.getSecretV2 = getSecretV2;
|
|
54
|
+
function getSecretV2Output(args, opts) {
|
|
55
|
+
return pulumi.output(args).apply(a => getSecretV2(a, opts));
|
|
56
|
+
}
|
|
57
|
+
exports.getSecretV2Output = getSecretV2Output;
|
|
58
|
+
//# sourceMappingURL=getSecretV2.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"getSecretV2.js","sourceRoot":"","sources":["../../kv/getSecretV2.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAgCG;AACH,SAAgB,WAAW,CAAC,IAAqB,EAAE,IAA2B;IAC1E,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,kCAAkC,EAAE;QAC7D,OAAO,EAAE,IAAI,CAAC,KAAK;QACnB,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,WAAW,EAAE,IAAI,CAAC,SAAS;QAC3B,SAAS,EAAE,IAAI,CAAC,OAAO;KAC1B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAZD,kCAYC;AA4ED,SAAgB,iBAAiB,CAAC,IAA2B,EAAE,IAA2B;IACtF,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,WAAW,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AAC/D,CAAC;AAFD,8CAEC"}
|
|
@@ -0,0 +1,85 @@
|
|
|
1
|
+
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
/**
|
|
3
|
+
* ## Example Usage
|
|
4
|
+
*
|
|
5
|
+
* ```typescript
|
|
6
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
7
|
+
* import * as vault from "@pulumi/vault";
|
|
8
|
+
*
|
|
9
|
+
* const kvv1 = new vault.Mount("kvv1", {
|
|
10
|
+
* path: "kvv1",
|
|
11
|
+
* type: "kv",
|
|
12
|
+
* options: {
|
|
13
|
+
* version: "1",
|
|
14
|
+
* },
|
|
15
|
+
* description: "KV Version 1 secret engine mount",
|
|
16
|
+
* });
|
|
17
|
+
* const awsSecret = new vault.kv.Secret("awsSecret", {
|
|
18
|
+
* path: pulumi.interpolate`${kvv1.path}/aws-secret`,
|
|
19
|
+
* dataJson: JSON.stringify({
|
|
20
|
+
* zip: "zap",
|
|
21
|
+
* }),
|
|
22
|
+
* });
|
|
23
|
+
* const azureSecret = new vault.kv.Secret("azureSecret", {
|
|
24
|
+
* path: pulumi.interpolate`${kvv1.path}/azure-secret`,
|
|
25
|
+
* dataJson: JSON.stringify({
|
|
26
|
+
* foo: "bar",
|
|
27
|
+
* }),
|
|
28
|
+
* });
|
|
29
|
+
* const secrets = vault.kv.getSecretsListOutput({
|
|
30
|
+
* path: kvv1.path,
|
|
31
|
+
* });
|
|
32
|
+
* ```
|
|
33
|
+
* ## Required Vault Capabilities
|
|
34
|
+
*
|
|
35
|
+
* Use of this resource requires the `read` capability on the given path.
|
|
36
|
+
*/
|
|
37
|
+
export declare function getSecretsList(args: GetSecretsListArgs, opts?: pulumi.InvokeOptions): Promise<GetSecretsListResult>;
|
|
38
|
+
/**
|
|
39
|
+
* A collection of arguments for invoking getSecretsList.
|
|
40
|
+
*/
|
|
41
|
+
export interface GetSecretsListArgs {
|
|
42
|
+
/**
|
|
43
|
+
* The namespace of the target resource.
|
|
44
|
+
* The value should not contain leading or trailing forward slashes.
|
|
45
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
46
|
+
* *Available only for Vault Enterprise*.
|
|
47
|
+
*/
|
|
48
|
+
namespace?: string;
|
|
49
|
+
/**
|
|
50
|
+
* Full KV-V1 path where secrets will be listed.
|
|
51
|
+
*/
|
|
52
|
+
path: string;
|
|
53
|
+
}
|
|
54
|
+
/**
|
|
55
|
+
* A collection of values returned by getSecretsList.
|
|
56
|
+
*/
|
|
57
|
+
export interface GetSecretsListResult {
|
|
58
|
+
/**
|
|
59
|
+
* The provider-assigned unique ID for this managed resource.
|
|
60
|
+
*/
|
|
61
|
+
readonly id: string;
|
|
62
|
+
/**
|
|
63
|
+
* List of all secret names listed under the given path.
|
|
64
|
+
*/
|
|
65
|
+
readonly names: string[];
|
|
66
|
+
readonly namespace?: string;
|
|
67
|
+
readonly path: string;
|
|
68
|
+
}
|
|
69
|
+
export declare function getSecretsListOutput(args: GetSecretsListOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output<GetSecretsListResult>;
|
|
70
|
+
/**
|
|
71
|
+
* A collection of arguments for invoking getSecretsList.
|
|
72
|
+
*/
|
|
73
|
+
export interface GetSecretsListOutputArgs {
|
|
74
|
+
/**
|
|
75
|
+
* The namespace of the target resource.
|
|
76
|
+
* The value should not contain leading or trailing forward slashes.
|
|
77
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
78
|
+
* *Available only for Vault Enterprise*.
|
|
79
|
+
*/
|
|
80
|
+
namespace?: pulumi.Input<string>;
|
|
81
|
+
/**
|
|
82
|
+
* Full KV-V1 path where secrets will be listed.
|
|
83
|
+
*/
|
|
84
|
+
path: pulumi.Input<string>;
|
|
85
|
+
}
|
|
@@ -0,0 +1,58 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
|
+
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.getSecretsListOutput = exports.getSecretsList = void 0;
|
|
6
|
+
const pulumi = require("@pulumi/pulumi");
|
|
7
|
+
const utilities = require("../utilities");
|
|
8
|
+
/**
|
|
9
|
+
* ## Example Usage
|
|
10
|
+
*
|
|
11
|
+
* ```typescript
|
|
12
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
13
|
+
* import * as vault from "@pulumi/vault";
|
|
14
|
+
*
|
|
15
|
+
* const kvv1 = new vault.Mount("kvv1", {
|
|
16
|
+
* path: "kvv1",
|
|
17
|
+
* type: "kv",
|
|
18
|
+
* options: {
|
|
19
|
+
* version: "1",
|
|
20
|
+
* },
|
|
21
|
+
* description: "KV Version 1 secret engine mount",
|
|
22
|
+
* });
|
|
23
|
+
* const awsSecret = new vault.kv.Secret("awsSecret", {
|
|
24
|
+
* path: pulumi.interpolate`${kvv1.path}/aws-secret`,
|
|
25
|
+
* dataJson: JSON.stringify({
|
|
26
|
+
* zip: "zap",
|
|
27
|
+
* }),
|
|
28
|
+
* });
|
|
29
|
+
* const azureSecret = new vault.kv.Secret("azureSecret", {
|
|
30
|
+
* path: pulumi.interpolate`${kvv1.path}/azure-secret`,
|
|
31
|
+
* dataJson: JSON.stringify({
|
|
32
|
+
* foo: "bar",
|
|
33
|
+
* }),
|
|
34
|
+
* });
|
|
35
|
+
* const secrets = vault.kv.getSecretsListOutput({
|
|
36
|
+
* path: kvv1.path,
|
|
37
|
+
* });
|
|
38
|
+
* ```
|
|
39
|
+
* ## Required Vault Capabilities
|
|
40
|
+
*
|
|
41
|
+
* Use of this resource requires the `read` capability on the given path.
|
|
42
|
+
*/
|
|
43
|
+
function getSecretsList(args, opts) {
|
|
44
|
+
if (!opts) {
|
|
45
|
+
opts = {};
|
|
46
|
+
}
|
|
47
|
+
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
48
|
+
return pulumi.runtime.invoke("vault:kv/getSecretsList:getSecretsList", {
|
|
49
|
+
"namespace": args.namespace,
|
|
50
|
+
"path": args.path,
|
|
51
|
+
}, opts);
|
|
52
|
+
}
|
|
53
|
+
exports.getSecretsList = getSecretsList;
|
|
54
|
+
function getSecretsListOutput(args, opts) {
|
|
55
|
+
return pulumi.output(args).apply(a => getSecretsList(a, opts));
|
|
56
|
+
}
|
|
57
|
+
exports.getSecretsListOutput = getSecretsListOutput;
|
|
58
|
+
//# sourceMappingURL=getSecretsList.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"getSecretsList.js","sourceRoot":"","sources":["../../kv/getSecretsList.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAkCG;AACH,SAAgB,cAAc,CAAC,IAAwB,EAAE,IAA2B;IAChF,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,wCAAwC,EAAE;QACnE,WAAW,EAAE,IAAI,CAAC,SAAS;QAC3B,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAVD,wCAUC;AAmCD,SAAgB,oBAAoB,CAAC,IAA8B,EAAE,IAA2B;IAC5F,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,cAAc,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AAClE,CAAC;AAFD,oDAEC"}
|
|
@@ -0,0 +1,114 @@
|
|
|
1
|
+
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
/**
|
|
3
|
+
* ## Example Usage
|
|
4
|
+
*
|
|
5
|
+
* ```typescript
|
|
6
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
7
|
+
* import * as vault from "@pulumi/vault";
|
|
8
|
+
*
|
|
9
|
+
* const kvv2 = new vault.Mount("kvv2", {
|
|
10
|
+
* path: "kvv2",
|
|
11
|
+
* type: "kv",
|
|
12
|
+
* options: {
|
|
13
|
+
* version: "2",
|
|
14
|
+
* },
|
|
15
|
+
* description: "KV Version 2 secret engine mount",
|
|
16
|
+
* });
|
|
17
|
+
* const awsSecret = new vault.kv.SecretV2("awsSecret", {
|
|
18
|
+
* mount: kvv2.path,
|
|
19
|
+
* dataJson: JSON.stringify({
|
|
20
|
+
* zip: "zap",
|
|
21
|
+
* }),
|
|
22
|
+
* });
|
|
23
|
+
* const azureSecret = new vault.kv.SecretV2("azureSecret", {
|
|
24
|
+
* mount: kvv2.path,
|
|
25
|
+
* dataJson: JSON.stringify({
|
|
26
|
+
* foo: "bar",
|
|
27
|
+
* }),
|
|
28
|
+
* });
|
|
29
|
+
* const nestedSecret = new vault.kv.SecretV2("nestedSecret", {
|
|
30
|
+
* mount: kvv2.path,
|
|
31
|
+
* dataJson: JSON.stringify({
|
|
32
|
+
* password: "test",
|
|
33
|
+
* }),
|
|
34
|
+
* });
|
|
35
|
+
* const secrets = vault.kv.getSecretsListV2Output({
|
|
36
|
+
* mount: kvv2.path,
|
|
37
|
+
* });
|
|
38
|
+
* const nestedSecrets = kvv2.path.apply(path => vault.kv.getSecretsListV2Output({
|
|
39
|
+
* mount: path,
|
|
40
|
+
* name: vault_kv_secret_v2.test_2.name,
|
|
41
|
+
* }));
|
|
42
|
+
* ```
|
|
43
|
+
* ## Required Vault Capabilities
|
|
44
|
+
*
|
|
45
|
+
* Use of this resource requires the `read` capability on the given path.
|
|
46
|
+
*/
|
|
47
|
+
export declare function getSecretsListV2(args: GetSecretsListV2Args, opts?: pulumi.InvokeOptions): Promise<GetSecretsListV2Result>;
|
|
48
|
+
/**
|
|
49
|
+
* A collection of arguments for invoking getSecretsListV2.
|
|
50
|
+
*/
|
|
51
|
+
export interface GetSecretsListV2Args {
|
|
52
|
+
/**
|
|
53
|
+
* Path where KV-V2 engine is mounted.
|
|
54
|
+
*/
|
|
55
|
+
mount: string;
|
|
56
|
+
/**
|
|
57
|
+
* Full name of the secret. For a nested secret
|
|
58
|
+
* the name is the nested path excluding the mount and data
|
|
59
|
+
* prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
|
|
60
|
+
* the name is `foo/bar/baz`.
|
|
61
|
+
*/
|
|
62
|
+
name?: string;
|
|
63
|
+
/**
|
|
64
|
+
* The namespace of the target resource.
|
|
65
|
+
* The value should not contain leading or trailing forward slashes.
|
|
66
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
67
|
+
* *Available only for Vault Enterprise*.
|
|
68
|
+
*/
|
|
69
|
+
namespace?: string;
|
|
70
|
+
}
|
|
71
|
+
/**
|
|
72
|
+
* A collection of values returned by getSecretsListV2.
|
|
73
|
+
*/
|
|
74
|
+
export interface GetSecretsListV2Result {
|
|
75
|
+
/**
|
|
76
|
+
* The provider-assigned unique ID for this managed resource.
|
|
77
|
+
*/
|
|
78
|
+
readonly id: string;
|
|
79
|
+
readonly mount: string;
|
|
80
|
+
readonly name?: string;
|
|
81
|
+
/**
|
|
82
|
+
* List of all secret names listed under the given path.
|
|
83
|
+
*/
|
|
84
|
+
readonly names: string[];
|
|
85
|
+
readonly namespace?: string;
|
|
86
|
+
/**
|
|
87
|
+
* Full path where the KV-V2 secrets are listed.
|
|
88
|
+
*/
|
|
89
|
+
readonly path: string;
|
|
90
|
+
}
|
|
91
|
+
export declare function getSecretsListV2Output(args: GetSecretsListV2OutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output<GetSecretsListV2Result>;
|
|
92
|
+
/**
|
|
93
|
+
* A collection of arguments for invoking getSecretsListV2.
|
|
94
|
+
*/
|
|
95
|
+
export interface GetSecretsListV2OutputArgs {
|
|
96
|
+
/**
|
|
97
|
+
* Path where KV-V2 engine is mounted.
|
|
98
|
+
*/
|
|
99
|
+
mount: pulumi.Input<string>;
|
|
100
|
+
/**
|
|
101
|
+
* Full name of the secret. For a nested secret
|
|
102
|
+
* the name is the nested path excluding the mount and data
|
|
103
|
+
* prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
|
|
104
|
+
* the name is `foo/bar/baz`.
|
|
105
|
+
*/
|
|
106
|
+
name?: pulumi.Input<string>;
|
|
107
|
+
/**
|
|
108
|
+
* The namespace of the target resource.
|
|
109
|
+
* The value should not contain leading or trailing forward slashes.
|
|
110
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
111
|
+
* *Available only for Vault Enterprise*.
|
|
112
|
+
*/
|
|
113
|
+
namespace?: pulumi.Input<string>;
|
|
114
|
+
}
|
|
@@ -0,0 +1,69 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
|
+
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.getSecretsListV2Output = exports.getSecretsListV2 = void 0;
|
|
6
|
+
const pulumi = require("@pulumi/pulumi");
|
|
7
|
+
const utilities = require("../utilities");
|
|
8
|
+
/**
|
|
9
|
+
* ## Example Usage
|
|
10
|
+
*
|
|
11
|
+
* ```typescript
|
|
12
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
13
|
+
* import * as vault from "@pulumi/vault";
|
|
14
|
+
*
|
|
15
|
+
* const kvv2 = new vault.Mount("kvv2", {
|
|
16
|
+
* path: "kvv2",
|
|
17
|
+
* type: "kv",
|
|
18
|
+
* options: {
|
|
19
|
+
* version: "2",
|
|
20
|
+
* },
|
|
21
|
+
* description: "KV Version 2 secret engine mount",
|
|
22
|
+
* });
|
|
23
|
+
* const awsSecret = new vault.kv.SecretV2("awsSecret", {
|
|
24
|
+
* mount: kvv2.path,
|
|
25
|
+
* dataJson: JSON.stringify({
|
|
26
|
+
* zip: "zap",
|
|
27
|
+
* }),
|
|
28
|
+
* });
|
|
29
|
+
* const azureSecret = new vault.kv.SecretV2("azureSecret", {
|
|
30
|
+
* mount: kvv2.path,
|
|
31
|
+
* dataJson: JSON.stringify({
|
|
32
|
+
* foo: "bar",
|
|
33
|
+
* }),
|
|
34
|
+
* });
|
|
35
|
+
* const nestedSecret = new vault.kv.SecretV2("nestedSecret", {
|
|
36
|
+
* mount: kvv2.path,
|
|
37
|
+
* dataJson: JSON.stringify({
|
|
38
|
+
* password: "test",
|
|
39
|
+
* }),
|
|
40
|
+
* });
|
|
41
|
+
* const secrets = vault.kv.getSecretsListV2Output({
|
|
42
|
+
* mount: kvv2.path,
|
|
43
|
+
* });
|
|
44
|
+
* const nestedSecrets = kvv2.path.apply(path => vault.kv.getSecretsListV2Output({
|
|
45
|
+
* mount: path,
|
|
46
|
+
* name: vault_kv_secret_v2.test_2.name,
|
|
47
|
+
* }));
|
|
48
|
+
* ```
|
|
49
|
+
* ## Required Vault Capabilities
|
|
50
|
+
*
|
|
51
|
+
* Use of this resource requires the `read` capability on the given path.
|
|
52
|
+
*/
|
|
53
|
+
function getSecretsListV2(args, opts) {
|
|
54
|
+
if (!opts) {
|
|
55
|
+
opts = {};
|
|
56
|
+
}
|
|
57
|
+
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
58
|
+
return pulumi.runtime.invoke("vault:kv/getSecretsListV2:getSecretsListV2", {
|
|
59
|
+
"mount": args.mount,
|
|
60
|
+
"name": args.name,
|
|
61
|
+
"namespace": args.namespace,
|
|
62
|
+
}, opts);
|
|
63
|
+
}
|
|
64
|
+
exports.getSecretsListV2 = getSecretsListV2;
|
|
65
|
+
function getSecretsListV2Output(args, opts) {
|
|
66
|
+
return pulumi.output(args).apply(a => getSecretsListV2(a, opts));
|
|
67
|
+
}
|
|
68
|
+
exports.getSecretsListV2Output = getSecretsListV2Output;
|
|
69
|
+
//# sourceMappingURL=getSecretsListV2.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"getSecretsListV2.js","sourceRoot":"","sources":["../../kv/getSecretsListV2.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA4CG;AACH,SAAgB,gBAAgB,CAAC,IAA0B,EAAE,IAA2B;IACpF,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,4CAA4C,EAAE;QACvE,OAAO,EAAE,IAAI,CAAC,KAAK;QACnB,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,WAAW,EAAE,IAAI,CAAC,SAAS;KAC9B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAXD,4CAWC;AA+CD,SAAgB,sBAAsB,CAAC,IAAgC,EAAE,IAA2B;IAChG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,gBAAgB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACpE,CAAC;AAFD,wDAEC"}
|