@pulumi/vault 5.6.0 → 5.7.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/ad/getAccessCredentials.d.ts +15 -0
- package/ad/getAccessCredentials.js +1 -0
- package/ad/getAccessCredentials.js.map +1 -1
- package/ad/index.d.ts +12 -4
- package/ad/index.js +13 -26
- package/ad/index.js.map +1 -1
- package/ad/secretBackend.d.ts +39 -0
- package/ad/secretBackend.js +9 -3
- package/ad/secretBackend.js.map +1 -1
- package/ad/secretLibrary.d.ts +21 -0
- package/ad/secretLibrary.js +2 -0
- package/ad/secretLibrary.js.map +1 -1
- package/ad/secretRole.d.ts +21 -0
- package/ad/secretRole.js +2 -0
- package/ad/secretRole.js.map +1 -1
- package/alicloud/authBackendRole.d.ts +21 -0
- package/alicloud/authBackendRole.js +2 -0
- package/alicloud/authBackendRole.js.map +1 -1
- package/alicloud/index.d.ts +3 -1
- package/alicloud/index.js +4 -19
- package/alicloud/index.js.map +1 -1
- package/approle/authBackendLogin.d.ts +22 -1
- package/approle/authBackendLogin.js +3 -1
- package/approle/authBackendLogin.js.map +1 -1
- package/approle/authBackendRole.d.ts +21 -0
- package/approle/authBackendRole.js +2 -0
- package/approle/authBackendRole.js.map +1 -1
- package/approle/{authBackendRoleSecretID.d.ts → authBackendRoleSecretId.d.ts} +33 -12
- package/approle/{authBackendRoleSecretID.js → authBackendRoleSecretId.js} +16 -12
- package/approle/authBackendRoleSecretId.js.map +1 -0
- package/approle/getAuthBackendRoleId.d.ts +15 -0
- package/approle/getAuthBackendRoleId.js +1 -0
- package/approle/getAuthBackendRoleId.js.map +1 -1
- package/approle/index.d.ts +12 -4
- package/approle/index.js +15 -28
- package/approle/index.js.map +1 -1
- package/audit.d.ts +21 -0
- package/audit.js +2 -0
- package/audit.js.map +1 -1
- package/authBackend.d.ts +47 -10
- package/authBackend.js +4 -0
- package/authBackend.js.map +1 -1
- package/aws/authBackendCert.d.ts +21 -0
- package/aws/authBackendCert.js +2 -0
- package/aws/authBackendCert.js.map +1 -1
- package/aws/authBackendClient.d.ts +21 -0
- package/aws/authBackendClient.js +6 -2
- package/aws/authBackendClient.js.map +1 -1
- package/aws/authBackendIdentityWhitelist.d.ts +21 -0
- package/aws/authBackendIdentityWhitelist.js +2 -0
- package/aws/authBackendIdentityWhitelist.js.map +1 -1
- package/aws/authBackendLogin.d.ts +21 -0
- package/aws/authBackendLogin.js +4 -0
- package/aws/authBackendLogin.js.map +1 -1
- package/aws/authBackendRole.d.ts +21 -0
- package/aws/authBackendRole.js +2 -0
- package/aws/authBackendRole.js.map +1 -1
- package/aws/authBackendRoleTag.d.ts +21 -0
- package/aws/authBackendRoleTag.js +2 -0
- package/aws/authBackendRoleTag.js.map +1 -1
- package/aws/authBackendRoletagBlacklist.d.ts +21 -0
- package/aws/authBackendRoletagBlacklist.js +2 -0
- package/aws/authBackendRoletagBlacklist.js.map +1 -1
- package/aws/authBackendStsRole.d.ts +21 -0
- package/aws/authBackendStsRole.js +2 -0
- package/aws/authBackendStsRole.js.map +1 -1
- package/aws/getAccessCredentials.d.ts +15 -0
- package/aws/getAccessCredentials.js +1 -0
- package/aws/getAccessCredentials.js.map +1 -1
- package/aws/index.d.ts +33 -11
- package/aws/index.js +34 -47
- package/aws/index.js.map +1 -1
- package/aws/secretBackend.d.ts +36 -12
- package/aws/secretBackend.js +8 -14
- package/aws/secretBackend.js.map +1 -1
- package/aws/secretBackendRole.d.ts +21 -0
- package/aws/secretBackendRole.js +2 -0
- package/aws/secretBackendRole.js.map +1 -1
- package/azure/authBackendConfig.d.ts +21 -0
- package/azure/authBackendConfig.js +7 -3
- package/azure/authBackendConfig.js.map +1 -1
- package/azure/authBackendRole.d.ts +21 -0
- package/azure/authBackendRole.js +2 -0
- package/azure/authBackendRole.js.map +1 -1
- package/azure/backend.d.ts +36 -0
- package/azure/backend.js +10 -4
- package/azure/backend.js.map +1 -1
- package/azure/backendRole.d.ts +23 -1
- package/azure/backendRole.js +2 -0
- package/azure/backendRole.js.map +1 -1
- package/azure/getAccessCredentials.d.ts +15 -0
- package/azure/getAccessCredentials.js +1 -0
- package/azure/getAccessCredentials.js.map +1 -1
- package/azure/index.d.ts +15 -5
- package/azure/index.js +16 -29
- package/azure/index.js.map +1 -1
- package/certAuthBackendRole.d.ts +39 -3
- package/certAuthBackendRole.js +4 -0
- package/certAuthBackendRole.js.map +1 -1
- package/config/vars.d.ts +43 -3
- package/config/vars.js +64 -4
- package/config/vars.js.map +1 -1
- package/consul/index.d.ts +6 -2
- package/consul/index.js +7 -22
- package/consul/index.js.map +1 -1
- package/consul/secretBackend.d.ts +87 -15
- package/consul/secretBackend.js +24 -7
- package/consul/secretBackend.js.map +1 -1
- package/consul/secretBackendRole.d.ts +93 -10
- package/consul/secretBackendRole.js +14 -1
- package/consul/secretBackendRole.js.map +1 -1
- package/database/index.d.ts +12 -4
- package/database/index.js +13 -28
- package/database/index.js.map +1 -1
- package/database/secretBackendConnection.d.ts +35 -1
- package/database/secretBackendConnection.js +4 -0
- package/database/secretBackendConnection.js.map +1 -1
- package/database/secretBackendRole.d.ts +21 -0
- package/database/secretBackendRole.js +2 -0
- package/database/secretBackendRole.js.map +1 -1
- package/database/secretBackendStaticRole.d.ts +21 -0
- package/database/secretBackendStaticRole.js +2 -0
- package/database/secretBackendStaticRole.js.map +1 -1
- package/database/secretsMount.d.ts +41 -1
- package/database/secretsMount.js +6 -0
- package/database/secretsMount.js.map +1 -1
- package/egpPolicy.d.ts +21 -0
- package/egpPolicy.js +2 -0
- package/egpPolicy.js.map +1 -1
- package/gcp/authBackend.d.ts +71 -1
- package/gcp/authBackend.js +18 -2
- package/gcp/authBackend.js.map +1 -1
- package/gcp/authBackendRole.d.ts +21 -0
- package/gcp/authBackendRole.js +2 -0
- package/gcp/authBackendRole.js.map +1 -1
- package/gcp/getAuthBackendRole.d.ts +15 -0
- package/gcp/getAuthBackendRole.js +1 -0
- package/gcp/getAuthBackendRole.js.map +1 -1
- package/gcp/index.d.ts +18 -6
- package/gcp/index.js +19 -32
- package/gcp/index.js.map +1 -1
- package/gcp/secretBackend.d.ts +36 -0
- package/gcp/secretBackend.js +7 -1
- package/gcp/secretBackend.js.map +1 -1
- package/gcp/secretRoleset.d.ts +23 -1
- package/gcp/secretRoleset.js +2 -0
- package/gcp/secretRoleset.js.map +1 -1
- package/gcp/secretStaticAccount.d.ts +23 -1
- package/gcp/secretStaticAccount.js +2 -0
- package/gcp/secretStaticAccount.js.map +1 -1
- package/generic/endpoint.d.ts +21 -0
- package/generic/endpoint.js +5 -1
- package/generic/endpoint.js.map +1 -1
- package/generic/getSecret.d.ts +15 -0
- package/generic/getSecret.js +1 -0
- package/generic/getSecret.js.map +1 -1
- package/generic/index.d.ts +9 -3
- package/generic/index.js +10 -23
- package/generic/index.js.map +1 -1
- package/generic/secret.d.ts +21 -0
- package/generic/secret.js +5 -1
- package/generic/secret.js.map +1 -1
- package/getAuthBackend.d.ts +16 -1
- package/getAuthBackend.js +1 -0
- package/getAuthBackend.js.map +1 -1
- package/getNomadAccessToken.d.ts +15 -0
- package/getNomadAccessToken.js +1 -0
- package/getNomadAccessToken.js.map +1 -1
- package/getPolicyDocument.d.ts +5 -1
- package/getPolicyDocument.js +1 -0
- package/getPolicyDocument.js.map +1 -1
- package/github/authBackend.d.ts +38 -1
- package/github/authBackend.js +4 -0
- package/github/authBackend.js.map +1 -1
- package/github/index.d.ts +9 -3
- package/github/index.js +10 -25
- package/github/index.js.map +1 -1
- package/github/team.d.ts +21 -0
- package/github/team.js +2 -0
- package/github/team.js.map +1 -1
- package/github/user.d.ts +21 -0
- package/github/user.js +2 -0
- package/github/user.js.map +1 -1
- package/identity/entity.d.ts +21 -0
- package/identity/entity.js +2 -0
- package/identity/entity.js.map +1 -1
- package/identity/entityAlias.d.ts +21 -0
- package/identity/entityAlias.js +2 -0
- package/identity/entityAlias.js.map +1 -1
- package/identity/entityPolicies.d.ts +21 -0
- package/identity/entityPolicies.js +2 -0
- package/identity/entityPolicies.js.map +1 -1
- package/identity/getEntity.d.ts +16 -1
- package/identity/getEntity.js +1 -0
- package/identity/getEntity.js.map +1 -1
- package/identity/getGroup.d.ts +15 -0
- package/identity/getGroup.js +1 -0
- package/identity/getGroup.js.map +1 -1
- package/identity/getOidcClientCreds.d.ts +15 -0
- package/identity/getOidcClientCreds.js +1 -0
- package/identity/getOidcClientCreds.js.map +1 -1
- package/identity/getOidcOpenidConfig.d.ts +15 -0
- package/identity/getOidcOpenidConfig.js +1 -0
- package/identity/getOidcOpenidConfig.js.map +1 -1
- package/identity/getOidcPublicKeys.d.ts +15 -0
- package/identity/getOidcPublicKeys.js +1 -0
- package/identity/getOidcPublicKeys.js.map +1 -1
- package/identity/group.d.ts +21 -0
- package/identity/group.js +2 -0
- package/identity/group.js.map +1 -1
- package/identity/groupAlias.d.ts +21 -0
- package/identity/groupAlias.js +2 -0
- package/identity/groupAlias.js.map +1 -1
- package/identity/groupMemberEntityIds.d.ts +21 -0
- package/identity/groupMemberEntityIds.js +2 -0
- package/identity/groupMemberEntityIds.js.map +1 -1
- package/identity/groupPolicies.d.ts +21 -0
- package/identity/groupPolicies.js +2 -0
- package/identity/groupPolicies.js.map +1 -1
- package/identity/index.d.ts +75 -20
- package/identity/index.js +86 -66
- package/identity/index.js.map +1 -1
- package/identity/mfaDuo.d.ts +200 -0
- package/identity/mfaDuo.js +110 -0
- package/identity/mfaDuo.js.map +1 -0
- package/identity/mfaLoginEnforcement.d.ts +170 -0
- package/identity/mfaLoginEnforcement.js +96 -0
- package/identity/mfaLoginEnforcement.js.map +1 -0
- package/identity/mfaOkta.d.ts +188 -0
- package/identity/mfaOkta.js +105 -0
- package/identity/mfaOkta.js.map +1 -0
- package/identity/mfaPingid.d.ts +190 -0
- package/identity/mfaPingid.js +102 -0
- package/identity/mfaPingid.js.map +1 -0
- package/identity/mfaTotp.d.ts +218 -0
- package/identity/mfaTotp.js +104 -0
- package/identity/mfaTotp.js.map +1 -0
- package/identity/oidc.d.ts +21 -0
- package/identity/oidc.js +2 -0
- package/identity/oidc.js.map +1 -1
- package/identity/oidcAssignment.d.ts +23 -2
- package/identity/oidcAssignment.js +4 -2
- package/identity/oidcAssignment.js.map +1 -1
- package/identity/oidcClient.d.ts +21 -0
- package/identity/oidcClient.js +4 -0
- package/identity/oidcClient.js.map +1 -1
- package/identity/oidcKey.d.ts +21 -0
- package/identity/oidcKey.js +2 -0
- package/identity/oidcKey.js.map +1 -1
- package/identity/oidcKeyAllowedClientID.d.ts +21 -0
- package/identity/oidcKeyAllowedClientID.js +2 -0
- package/identity/oidcKeyAllowedClientID.js.map +1 -1
- package/identity/oidcProvider.d.ts +21 -0
- package/identity/oidcProvider.js +2 -0
- package/identity/oidcProvider.js.map +1 -1
- package/identity/oidcRole.d.ts +21 -0
- package/identity/oidcRole.js +2 -0
- package/identity/oidcRole.js.map +1 -1
- package/identity/oidcScope.d.ts +22 -3
- package/identity/oidcScope.js +3 -3
- package/identity/oidcScope.js.map +1 -1
- package/index.d.ts +75 -25
- package/index.js +78 -83
- package/index.js.map +1 -1
- package/jwt/authBackend.d.ts +38 -1
- package/jwt/authBackend.js +7 -1
- package/jwt/authBackend.js.map +1 -1
- package/jwt/authBackendRole.d.ts +57 -0
- package/jwt/authBackendRole.js +6 -0
- package/jwt/authBackendRole.js.map +1 -1
- package/jwt/index.d.ts +6 -2
- package/jwt/index.js +7 -22
- package/jwt/index.js.map +1 -1
- package/kmip/index.d.ts +9 -3
- package/kmip/index.js +10 -25
- package/kmip/index.js.map +1 -1
- package/kmip/secretBackend.d.ts +36 -0
- package/kmip/secretBackend.js +4 -0
- package/kmip/secretBackend.js.map +1 -1
- package/kmip/secretRole.d.ts +21 -0
- package/kmip/secretRole.js +2 -0
- package/kmip/secretRole.js.map +1 -1
- package/kmip/secretScope.d.ts +21 -0
- package/kmip/secretScope.js +2 -0
- package/kmip/secretScope.js.map +1 -1
- package/kubernetes/authBackendConfig.d.ts +21 -0
- package/kubernetes/authBackendConfig.js +5 -1
- package/kubernetes/authBackendConfig.js.map +1 -1
- package/kubernetes/authBackendRole.d.ts +21 -0
- package/kubernetes/authBackendRole.js +2 -0
- package/kubernetes/authBackendRole.js.map +1 -1
- package/kubernetes/getAuthBackendConfig.d.ts +15 -0
- package/kubernetes/getAuthBackendConfig.js +1 -0
- package/kubernetes/getAuthBackendConfig.js.map +1 -1
- package/kubernetes/getAuthBackendRole.d.ts +15 -0
- package/kubernetes/getAuthBackendRole.js +1 -0
- package/kubernetes/getAuthBackendRole.js.map +1 -1
- package/kubernetes/getServiceAccountToken.d.ts +46 -0
- package/kubernetes/getServiceAccountToken.js +27 -0
- package/kubernetes/getServiceAccountToken.js.map +1 -0
- package/kubernetes/index.d.ts +21 -4
- package/kubernetes/index.js +26 -24
- package/kubernetes/index.js.map +1 -1
- package/kubernetes/secretBackend.d.ts +303 -0
- package/kubernetes/secretBackend.js +114 -0
- package/kubernetes/secretBackend.js.map +1 -0
- package/kubernetes/secretBackendRole.d.ts +367 -0
- package/kubernetes/secretBackendRole.js +191 -0
- package/kubernetes/secretBackendRole.js.map +1 -0
- package/kv/getSecret.d.ts +104 -0
- package/kv/getSecret.js +53 -0
- package/kv/getSecret.js.map +1 -0
- package/kv/getSecretSubkeysV2.d.ts +42 -0
- package/kv/getSecretSubkeysV2.js +26 -0
- package/kv/getSecretSubkeysV2.js.map +1 -0
- package/kv/getSecretV2.d.ts +139 -0
- package/kv/getSecretV2.js +58 -0
- package/kv/getSecretV2.js.map +1 -0
- package/kv/getSecretsList.d.ts +85 -0
- package/kv/getSecretsList.js +58 -0
- package/kv/getSecretsList.js.map +1 -0
- package/kv/getSecretsListV2.d.ts +114 -0
- package/kv/getSecretsListV2.js +69 -0
- package/kv/getSecretsListV2.js.map +1 -0
- package/kv/index.d.ts +24 -0
- package/kv/index.js +47 -0
- package/kv/index.js.map +1 -0
- package/kv/secret.d.ts +145 -0
- package/kv/secret.js +106 -0
- package/kv/secret.js.map +1 -0
- package/kv/secretBackendV2.d.ts +154 -0
- package/kv/secretBackendV2.js +103 -0
- package/kv/secretBackendV2.js.map +1 -0
- package/kv/secretV2.d.ts +257 -0
- package/kv/secretV2.js +122 -0
- package/kv/secretV2.js.map +1 -0
- package/ldap/authBackend.d.ts +48 -0
- package/ldap/authBackend.js +10 -2
- package/ldap/authBackend.js.map +1 -1
- package/ldap/authBackendGroup.d.ts +21 -0
- package/ldap/authBackendGroup.js +2 -0
- package/ldap/authBackendGroup.js.map +1 -1
- package/ldap/authBackendUser.d.ts +21 -0
- package/ldap/authBackendUser.js +2 -0
- package/ldap/authBackendUser.js.map +1 -1
- package/ldap/index.d.ts +9 -3
- package/ldap/index.js +10 -25
- package/ldap/index.js.map +1 -1
- package/managed/index.d.ts +3 -0
- package/managed/index.js +22 -0
- package/managed/index.js.map +1 -0
- package/managed/keys.d.ts +104 -0
- package/managed/keys.js +64 -0
- package/managed/keys.js.map +1 -0
- package/mfaDuo.d.ts +21 -0
- package/mfaDuo.js +6 -2
- package/mfaDuo.js.map +1 -1
- package/mfaOkta.d.ts +21 -0
- package/mfaOkta.js +5 -1
- package/mfaOkta.js.map +1 -1
- package/mfaPingid.d.ts +21 -0
- package/mfaPingid.js +2 -0
- package/mfaPingid.js.map +1 -1
- package/mfaTotp.d.ts +21 -0
- package/mfaTotp.js +2 -0
- package/mfaTotp.js.map +1 -1
- package/mount.d.ts +33 -0
- package/mount.js +4 -0
- package/mount.js.map +1 -1
- package/namespace.d.ts +32 -18
- package/namespace.js +5 -16
- package/namespace.js.map +1 -1
- package/nomadSecretBackend.d.ts +36 -0
- package/nomadSecretBackend.js +9 -3
- package/nomadSecretBackend.js.map +1 -1
- package/nomadSecretRole.d.ts +21 -0
- package/nomadSecretRole.js +2 -0
- package/nomadSecretRole.js.map +1 -1
- package/okta/authBackend.d.ts +38 -1
- package/okta/authBackend.js +7 -1
- package/okta/authBackend.js.map +1 -1
- package/okta/authBackendGroup.d.ts +21 -0
- package/okta/authBackendGroup.js +2 -0
- package/okta/authBackendGroup.js.map +1 -1
- package/okta/authBackendUser.d.ts +21 -0
- package/okta/authBackendUser.js +2 -0
- package/okta/authBackendUser.js.map +1 -1
- package/okta/index.d.ts +9 -3
- package/okta/index.js +10 -25
- package/okta/index.js.map +1 -1
- package/package.json +2 -2
- package/package.json.dev +2 -2
- package/passwordPolicy.d.ts +21 -0
- package/passwordPolicy.js +2 -0
- package/passwordPolicy.js.map +1 -1
- package/pkisecret/index.d.ts +30 -10
- package/pkisecret/index.js +31 -46
- package/pkisecret/index.js.map +1 -1
- package/pkisecret/secretBackendCert.d.ts +29 -0
- package/pkisecret/secretBackendCert.js +6 -0
- package/pkisecret/secretBackendCert.js.map +1 -1
- package/pkisecret/secretBackendConfigCa.d.ts +21 -0
- package/pkisecret/secretBackendConfigCa.js +5 -1
- package/pkisecret/secretBackendConfigCa.js.map +1 -1
- package/pkisecret/secretBackendConfigUrls.d.ts +21 -0
- package/pkisecret/secretBackendConfigUrls.js +2 -0
- package/pkisecret/secretBackendConfigUrls.js.map +1 -1
- package/pkisecret/secretBackendCrlConfig.d.ts +21 -0
- package/pkisecret/secretBackendCrlConfig.js +2 -0
- package/pkisecret/secretBackendCrlConfig.js.map +1 -1
- package/pkisecret/secretBackendIntermediateCertRequest.d.ts +54 -0
- package/pkisecret/secretBackendIntermediateCertRequest.js +8 -0
- package/pkisecret/secretBackendIntermediateCertRequest.js.map +1 -1
- package/pkisecret/secretBackendIntermediateSetSigned.d.ts +21 -0
- package/pkisecret/secretBackendIntermediateSetSigned.js +2 -0
- package/pkisecret/secretBackendIntermediateSetSigned.js.map +1 -1
- package/pkisecret/secretBackendRole.d.ts +24 -3
- package/pkisecret/secretBackendRole.js +2 -0
- package/pkisecret/secretBackendRole.js.map +1 -1
- package/pkisecret/secretBackendRootCert.d.ts +57 -3
- package/pkisecret/secretBackendRootCert.js +6 -0
- package/pkisecret/secretBackendRootCert.js.map +1 -1
- package/pkisecret/secretBackendRootSignIntermediate.d.ts +21 -0
- package/pkisecret/secretBackendRootSignIntermediate.js +2 -0
- package/pkisecret/secretBackendRootSignIntermediate.js.map +1 -1
- package/pkisecret/secretBackendSign.d.ts +29 -0
- package/pkisecret/secretBackendSign.js +4 -0
- package/pkisecret/secretBackendSign.js.map +1 -1
- package/policy.d.ts +21 -0
- package/policy.js +2 -0
- package/policy.js.map +1 -1
- package/provider.d.ts +43 -3
- package/provider.js +13 -3
- package/provider.js.map +1 -1
- package/quotaLeaseCount.d.ts +21 -0
- package/quotaLeaseCount.js +2 -0
- package/quotaLeaseCount.js.map +1 -1
- package/quotaRateLimit.d.ts +48 -0
- package/quotaRateLimit.js +6 -0
- package/quotaRateLimit.js.map +1 -1
- package/rabbitmq/index.d.ts +6 -2
- package/rabbitmq/index.js +7 -22
- package/rabbitmq/index.js.map +1 -1
- package/rabbitmq/secretBackend.d.ts +36 -0
- package/rabbitmq/secretBackend.js +8 -2
- package/rabbitmq/secretBackend.js.map +1 -1
- package/rabbitmq/secretBackendRole.d.ts +23 -1
- package/rabbitmq/secretBackendRole.js +2 -0
- package/rabbitmq/secretBackendRole.js.map +1 -1
- package/raftAutopilot.d.ts +21 -0
- package/raftAutopilot.js +2 -0
- package/raftAutopilot.js.map +1 -1
- package/raftSnapshotAgentConfig.d.ts +62 -0
- package/raftSnapshotAgentConfig.js +43 -0
- package/raftSnapshotAgentConfig.js.map +1 -1
- package/rgpPolicy.d.ts +21 -0
- package/rgpPolicy.js +2 -0
- package/rgpPolicy.js.map +1 -1
- package/ssh/index.d.ts +6 -2
- package/ssh/index.js +7 -22
- package/ssh/index.js.map +1 -1
- package/ssh/secretBackendCa.d.ts +29 -0
- package/ssh/secretBackendCa.js +13 -1
- package/ssh/secretBackendCa.js.map +1 -1
- package/ssh/secretBackendRole.d.ts +23 -1
- package/ssh/secretBackendRole.js +2 -0
- package/ssh/secretBackendRole.js.map +1 -1
- package/terraformcloud/index.d.ts +9 -3
- package/terraformcloud/index.js +10 -25
- package/terraformcloud/index.js.map +1 -1
- package/terraformcloud/secretBackend.d.ts +36 -0
- package/terraformcloud/secretBackend.js +7 -1
- package/terraformcloud/secretBackend.js.map +1 -1
- package/terraformcloud/secretCreds.d.ts +21 -0
- package/terraformcloud/secretCreds.js +4 -0
- package/terraformcloud/secretCreds.js.map +1 -1
- package/terraformcloud/secretRole.d.ts +21 -0
- package/terraformcloud/secretRole.js +2 -0
- package/terraformcloud/secretRole.js.map +1 -1
- package/token.d.ts +42 -0
- package/token.js +9 -0
- package/token.js.map +1 -1
- package/tokenauth/authBackendRole.d.ts +21 -0
- package/tokenauth/authBackendRole.js +2 -0
- package/tokenauth/authBackendRole.js.map +1 -1
- package/tokenauth/index.d.ts +3 -1
- package/tokenauth/index.js +4 -19
- package/tokenauth/index.js.map +1 -1
- package/transform/index.d.ts +18 -6
- package/transform/index.js +19 -30
- package/transform/index.js.map +1 -1
- package/transform/transformation.d.ts +0 -25
- package/transform/transformation.js +0 -25
- package/transform/transformation.js.map +1 -1
- package/transit/getDecrypt.d.ts +3 -0
- package/transit/getDecrypt.js +1 -0
- package/transit/getDecrypt.js.map +1 -1
- package/transit/getEncrypt.d.ts +3 -0
- package/transit/getEncrypt.js +1 -0
- package/transit/getEncrypt.js.map +1 -1
- package/transit/index.d.ts +12 -4
- package/transit/index.js +13 -24
- package/transit/index.js.map +1 -1
- package/transit/secretBackendKey.d.ts +21 -0
- package/transit/secretBackendKey.js +2 -0
- package/transit/secretBackendKey.js.map +1 -1
- package/transit/secretCacheConfig.d.ts +21 -0
- package/transit/secretCacheConfig.js +2 -0
- package/transit/secretCacheConfig.js.map +1 -1
- package/types/index.js.map +1 -1
- package/types/input.d.ts +408 -4
- package/types/output.d.ts +409 -5
- package/utilities.js +13 -1
- package/utilities.js.map +1 -1
- package/approle/authBackendRoleSecretID.js.map +0 -1
package/okta/authBackend.d.ts
CHANGED
|
@@ -1,5 +1,6 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
-
import
|
|
2
|
+
import * as inputs from "../types/input";
|
|
3
|
+
import * as outputs from "../types/output";
|
|
3
4
|
/**
|
|
4
5
|
* Provides a resource for managing an
|
|
5
6
|
* [Okta auth backend within Vault](https://www.vaultproject.io/docs/auth/okta.html).
|
|
@@ -68,6 +69,11 @@ export declare class AuthBackend extends pulumi.CustomResource {
|
|
|
68
69
|
* The description of the auth backend
|
|
69
70
|
*/
|
|
70
71
|
readonly description: pulumi.Output<string | undefined>;
|
|
72
|
+
/**
|
|
73
|
+
* If set, opts out of mount migration on path updates.
|
|
74
|
+
* See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
|
75
|
+
*/
|
|
76
|
+
readonly disableRemount: pulumi.Output<boolean | undefined>;
|
|
71
77
|
/**
|
|
72
78
|
* Associate Okta groups with policies within Vault.
|
|
73
79
|
* See below for more details.
|
|
@@ -78,6 +84,13 @@ export declare class AuthBackend extends pulumi.CustomResource {
|
|
|
78
84
|
* [See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
|
79
85
|
*/
|
|
80
86
|
readonly maxTtl: pulumi.Output<string | undefined>;
|
|
87
|
+
/**
|
|
88
|
+
* The namespace to provision the resource in.
|
|
89
|
+
* The value should not contain leading or trailing forward slashes.
|
|
90
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
91
|
+
* *Available only for Vault Enterprise*.
|
|
92
|
+
*/
|
|
93
|
+
readonly namespace: pulumi.Output<string | undefined>;
|
|
81
94
|
/**
|
|
82
95
|
* The Okta organization. This will be the first part of the url `https://XXX.okta.com`
|
|
83
96
|
*/
|
|
@@ -130,6 +143,11 @@ export interface AuthBackendState {
|
|
|
130
143
|
* The description of the auth backend
|
|
131
144
|
*/
|
|
132
145
|
description?: pulumi.Input<string>;
|
|
146
|
+
/**
|
|
147
|
+
* If set, opts out of mount migration on path updates.
|
|
148
|
+
* See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
|
149
|
+
*/
|
|
150
|
+
disableRemount?: pulumi.Input<boolean>;
|
|
133
151
|
/**
|
|
134
152
|
* Associate Okta groups with policies within Vault.
|
|
135
153
|
* See below for more details.
|
|
@@ -140,6 +158,13 @@ export interface AuthBackendState {
|
|
|
140
158
|
* [See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
|
141
159
|
*/
|
|
142
160
|
maxTtl?: pulumi.Input<string>;
|
|
161
|
+
/**
|
|
162
|
+
* The namespace to provision the resource in.
|
|
163
|
+
* The value should not contain leading or trailing forward slashes.
|
|
164
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
165
|
+
* *Available only for Vault Enterprise*.
|
|
166
|
+
*/
|
|
167
|
+
namespace?: pulumi.Input<string>;
|
|
143
168
|
/**
|
|
144
169
|
* The Okta organization. This will be the first part of the url `https://XXX.okta.com`
|
|
145
170
|
*/
|
|
@@ -180,6 +205,11 @@ export interface AuthBackendArgs {
|
|
|
180
205
|
* The description of the auth backend
|
|
181
206
|
*/
|
|
182
207
|
description?: pulumi.Input<string>;
|
|
208
|
+
/**
|
|
209
|
+
* If set, opts out of mount migration on path updates.
|
|
210
|
+
* See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
|
211
|
+
*/
|
|
212
|
+
disableRemount?: pulumi.Input<boolean>;
|
|
183
213
|
/**
|
|
184
214
|
* Associate Okta groups with policies within Vault.
|
|
185
215
|
* See below for more details.
|
|
@@ -190,6 +220,13 @@ export interface AuthBackendArgs {
|
|
|
190
220
|
* [See the documentation for info on valid duration formats](https://golang.org/pkg/time/#ParseDuration).
|
|
191
221
|
*/
|
|
192
222
|
maxTtl?: pulumi.Input<string>;
|
|
223
|
+
/**
|
|
224
|
+
* The namespace to provision the resource in.
|
|
225
|
+
* The value should not contain leading or trailing forward slashes.
|
|
226
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
227
|
+
* *Available only for Vault Enterprise*.
|
|
228
|
+
*/
|
|
229
|
+
namespace?: pulumi.Input<string>;
|
|
193
230
|
/**
|
|
194
231
|
* The Okta organization. This will be the first part of the url `https://XXX.okta.com`
|
|
195
232
|
*/
|
package/okta/authBackend.js
CHANGED
|
@@ -51,8 +51,10 @@ class AuthBackend extends pulumi.CustomResource {
|
|
|
51
51
|
resourceInputs["baseUrl"] = state ? state.baseUrl : undefined;
|
|
52
52
|
resourceInputs["bypassOktaMfa"] = state ? state.bypassOktaMfa : undefined;
|
|
53
53
|
resourceInputs["description"] = state ? state.description : undefined;
|
|
54
|
+
resourceInputs["disableRemount"] = state ? state.disableRemount : undefined;
|
|
54
55
|
resourceInputs["groups"] = state ? state.groups : undefined;
|
|
55
56
|
resourceInputs["maxTtl"] = state ? state.maxTtl : undefined;
|
|
57
|
+
resourceInputs["namespace"] = state ? state.namespace : undefined;
|
|
56
58
|
resourceInputs["organization"] = state ? state.organization : undefined;
|
|
57
59
|
resourceInputs["path"] = state ? state.path : undefined;
|
|
58
60
|
resourceInputs["token"] = state ? state.token : undefined;
|
|
@@ -67,16 +69,20 @@ class AuthBackend extends pulumi.CustomResource {
|
|
|
67
69
|
resourceInputs["baseUrl"] = args ? args.baseUrl : undefined;
|
|
68
70
|
resourceInputs["bypassOktaMfa"] = args ? args.bypassOktaMfa : undefined;
|
|
69
71
|
resourceInputs["description"] = args ? args.description : undefined;
|
|
72
|
+
resourceInputs["disableRemount"] = args ? args.disableRemount : undefined;
|
|
70
73
|
resourceInputs["groups"] = args ? args.groups : undefined;
|
|
71
74
|
resourceInputs["maxTtl"] = args ? args.maxTtl : undefined;
|
|
75
|
+
resourceInputs["namespace"] = args ? args.namespace : undefined;
|
|
72
76
|
resourceInputs["organization"] = args ? args.organization : undefined;
|
|
73
77
|
resourceInputs["path"] = args ? args.path : undefined;
|
|
74
|
-
resourceInputs["token"] = args ? args.token : undefined;
|
|
78
|
+
resourceInputs["token"] = (args === null || args === void 0 ? void 0 : args.token) ? pulumi.secret(args.token) : undefined;
|
|
75
79
|
resourceInputs["ttl"] = args ? args.ttl : undefined;
|
|
76
80
|
resourceInputs["users"] = args ? args.users : undefined;
|
|
77
81
|
resourceInputs["accessor"] = undefined /*out*/;
|
|
78
82
|
}
|
|
79
83
|
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
84
|
+
const secretOpts = { additionalSecretOutputs: ["token"] };
|
|
85
|
+
opts = pulumi.mergeOptions(opts, secretOpts);
|
|
80
86
|
super(AuthBackend.__pulumiType, name, resourceInputs, opts);
|
|
81
87
|
}
|
|
82
88
|
/**
|
package/okta/authBackend.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"authBackend.js","sourceRoot":"","sources":["../../okta/authBackend.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;
|
|
1
|
+
{"version":3,"file":"authBackend.js","sourceRoot":"","sources":["../../okta/authBackend.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAmCG;AACH,MAAa,WAAY,SAAQ,MAAM,CAAC,cAAc;IAkGlD,YAAY,IAAY,EAAE,WAAgD,EAAE,IAAmC;QAC3G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA2C,CAAC;YAC1D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7D;aAAM;YACH,MAAM,IAAI,GAAG,WAA0C,CAAC;YACxD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,YAAY,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACzD,MAAM,IAAI,KAAK,CAAC,0CAA0C,CAAC,CAAC;aAC/D;YACD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,OAAO,CAAC,GAAG,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,KAAK,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,UAAU,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAClD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,OAAO,CAAC,EAAE,CAAC;QAC1D,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,WAAW,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAChE,CAAC;IA1ID;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAwB,EAAE,IAAmC;QACtH,OAAO,IAAI,WAAW,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAClE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,WAAW,CAAC,YAAY,CAAC;IAC5D,CAAC;;AA1BL,kCA4IC;AA9HG,gBAAgB;AACO,wBAAY,GAAG,oCAAoC,CAAC"}
|
|
@@ -51,6 +51,13 @@ export declare class AuthBackendGroup extends pulumi.CustomResource {
|
|
|
51
51
|
* Name of the group within the Okta
|
|
52
52
|
*/
|
|
53
53
|
readonly groupName: pulumi.Output<string>;
|
|
54
|
+
/**
|
|
55
|
+
* The namespace to provision the resource in.
|
|
56
|
+
* The value should not contain leading or trailing forward slashes.
|
|
57
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
58
|
+
* *Available only for Vault Enterprise*.
|
|
59
|
+
*/
|
|
60
|
+
readonly namespace: pulumi.Output<string | undefined>;
|
|
54
61
|
/**
|
|
55
62
|
* The path where the Okta auth backend is mounted
|
|
56
63
|
*/
|
|
@@ -76,6 +83,13 @@ export interface AuthBackendGroupState {
|
|
|
76
83
|
* Name of the group within the Okta
|
|
77
84
|
*/
|
|
78
85
|
groupName?: pulumi.Input<string>;
|
|
86
|
+
/**
|
|
87
|
+
* The namespace to provision the resource in.
|
|
88
|
+
* The value should not contain leading or trailing forward slashes.
|
|
89
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
90
|
+
* *Available only for Vault Enterprise*.
|
|
91
|
+
*/
|
|
92
|
+
namespace?: pulumi.Input<string>;
|
|
79
93
|
/**
|
|
80
94
|
* The path where the Okta auth backend is mounted
|
|
81
95
|
*/
|
|
@@ -93,6 +107,13 @@ export interface AuthBackendGroupArgs {
|
|
|
93
107
|
* Name of the group within the Okta
|
|
94
108
|
*/
|
|
95
109
|
groupName: pulumi.Input<string>;
|
|
110
|
+
/**
|
|
111
|
+
* The namespace to provision the resource in.
|
|
112
|
+
* The value should not contain leading or trailing forward slashes.
|
|
113
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
114
|
+
* *Available only for Vault Enterprise*.
|
|
115
|
+
*/
|
|
116
|
+
namespace?: pulumi.Input<string>;
|
|
96
117
|
/**
|
|
97
118
|
* The path where the Okta auth backend is mounted
|
|
98
119
|
*/
|
package/okta/authBackendGroup.js
CHANGED
|
@@ -44,6 +44,7 @@ class AuthBackendGroup extends pulumi.CustomResource {
|
|
|
44
44
|
if (opts.id) {
|
|
45
45
|
const state = argsOrState;
|
|
46
46
|
resourceInputs["groupName"] = state ? state.groupName : undefined;
|
|
47
|
+
resourceInputs["namespace"] = state ? state.namespace : undefined;
|
|
47
48
|
resourceInputs["path"] = state ? state.path : undefined;
|
|
48
49
|
resourceInputs["policies"] = state ? state.policies : undefined;
|
|
49
50
|
}
|
|
@@ -56,6 +57,7 @@ class AuthBackendGroup extends pulumi.CustomResource {
|
|
|
56
57
|
throw new Error("Missing required property 'path'");
|
|
57
58
|
}
|
|
58
59
|
resourceInputs["groupName"] = args ? args.groupName : undefined;
|
|
60
|
+
resourceInputs["namespace"] = args ? args.namespace : undefined;
|
|
59
61
|
resourceInputs["path"] = args ? args.path : undefined;
|
|
60
62
|
resourceInputs["policies"] = args ? args.policies : undefined;
|
|
61
63
|
}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"authBackendGroup.js","sourceRoot":"","sources":["../../okta/authBackendGroup.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA+BG;AACH,MAAa,gBAAiB,SAAQ,MAAM,CAAC,cAAc;
|
|
1
|
+
{"version":3,"file":"authBackendGroup.js","sourceRoot":"","sources":["../../okta/authBackendGroup.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA+BG;AACH,MAAa,gBAAiB,SAAQ,MAAM,CAAC,cAAc;IAwDvD,YAAY,IAAY,EAAE,WAA0D,EAAE,IAAmC;QACrH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAgD,CAAC;YAC/D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;SACnE;aAAM;YACH,MAAM,IAAI,GAAG,WAA+C,CAAC;YAC7D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,SAAS,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACtD,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;SACjE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,gBAAgB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACrE,CAAC;IA/ED;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA6B,EAAE,IAAmC;QAC3H,OAAO,IAAI,gBAAgB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACvE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,gBAAgB,CAAC,YAAY,CAAC;IACjE,CAAC;;AA1BL,4CAiFC;AAnEG,gBAAgB;AACO,6BAAY,GAAG,8CAA8C,CAAC"}
|
|
@@ -51,6 +51,13 @@ export declare class AuthBackendUser extends pulumi.CustomResource {
|
|
|
51
51
|
* List of Okta groups to associate with this user
|
|
52
52
|
*/
|
|
53
53
|
readonly groups: pulumi.Output<string[] | undefined>;
|
|
54
|
+
/**
|
|
55
|
+
* The namespace to provision the resource in.
|
|
56
|
+
* The value should not contain leading or trailing forward slashes.
|
|
57
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
58
|
+
* *Available only for Vault Enterprise*.
|
|
59
|
+
*/
|
|
60
|
+
readonly namespace: pulumi.Output<string | undefined>;
|
|
54
61
|
/**
|
|
55
62
|
* The path where the Okta auth backend is mounted
|
|
56
63
|
*/
|
|
@@ -80,6 +87,13 @@ export interface AuthBackendUserState {
|
|
|
80
87
|
* List of Okta groups to associate with this user
|
|
81
88
|
*/
|
|
82
89
|
groups?: pulumi.Input<pulumi.Input<string>[]>;
|
|
90
|
+
/**
|
|
91
|
+
* The namespace to provision the resource in.
|
|
92
|
+
* The value should not contain leading or trailing forward slashes.
|
|
93
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
94
|
+
* *Available only for Vault Enterprise*.
|
|
95
|
+
*/
|
|
96
|
+
namespace?: pulumi.Input<string>;
|
|
83
97
|
/**
|
|
84
98
|
* The path where the Okta auth backend is mounted
|
|
85
99
|
*/
|
|
@@ -101,6 +115,13 @@ export interface AuthBackendUserArgs {
|
|
|
101
115
|
* List of Okta groups to associate with this user
|
|
102
116
|
*/
|
|
103
117
|
groups?: pulumi.Input<pulumi.Input<string>[]>;
|
|
118
|
+
/**
|
|
119
|
+
* The namespace to provision the resource in.
|
|
120
|
+
* The value should not contain leading or trailing forward slashes.
|
|
121
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
122
|
+
* *Available only for Vault Enterprise*.
|
|
123
|
+
*/
|
|
124
|
+
namespace?: pulumi.Input<string>;
|
|
104
125
|
/**
|
|
105
126
|
* The path where the Okta auth backend is mounted
|
|
106
127
|
*/
|
package/okta/authBackendUser.js
CHANGED
|
@@ -44,6 +44,7 @@ class AuthBackendUser extends pulumi.CustomResource {
|
|
|
44
44
|
if (opts.id) {
|
|
45
45
|
const state = argsOrState;
|
|
46
46
|
resourceInputs["groups"] = state ? state.groups : undefined;
|
|
47
|
+
resourceInputs["namespace"] = state ? state.namespace : undefined;
|
|
47
48
|
resourceInputs["path"] = state ? state.path : undefined;
|
|
48
49
|
resourceInputs["policies"] = state ? state.policies : undefined;
|
|
49
50
|
resourceInputs["username"] = state ? state.username : undefined;
|
|
@@ -57,6 +58,7 @@ class AuthBackendUser extends pulumi.CustomResource {
|
|
|
57
58
|
throw new Error("Missing required property 'username'");
|
|
58
59
|
}
|
|
59
60
|
resourceInputs["groups"] = args ? args.groups : undefined;
|
|
61
|
+
resourceInputs["namespace"] = args ? args.namespace : undefined;
|
|
60
62
|
resourceInputs["path"] = args ? args.path : undefined;
|
|
61
63
|
resourceInputs["policies"] = args ? args.policies : undefined;
|
|
62
64
|
resourceInputs["username"] = args ? args.username : undefined;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"authBackendUser.js","sourceRoot":"","sources":["../../okta/authBackendUser.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA+BG;AACH,MAAa,eAAgB,SAAQ,MAAM,CAAC,cAAc;
|
|
1
|
+
{"version":3,"file":"authBackendUser.js","sourceRoot":"","sources":["../../okta/authBackendUser.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA+BG;AACH,MAAa,eAAgB,SAAQ,MAAM,CAAC,cAAc;IA4DtD,YAAY,IAAY,EAAE,WAAwD,EAAE,IAAmC;QACnH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA+C,CAAC;YAC9D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;SACnE;aAAM;YACH,MAAM,IAAI,GAAG,WAA8C,CAAC;YAC5D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;SACjE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,eAAe,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACpE,CAAC;IArFD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA4B,EAAE,IAAmC;QAC1H,OAAO,IAAI,eAAe,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACtE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,eAAe,CAAC,YAAY,CAAC;IAChE,CAAC;;AA1BL,0CAuFC;AAzEG,gBAAgB;AACO,4BAAY,GAAG,4CAA4C,CAAC"}
|
package/okta/index.d.ts
CHANGED
|
@@ -1,3 +1,9 @@
|
|
|
1
|
-
export
|
|
2
|
-
export
|
|
3
|
-
export
|
|
1
|
+
export { AuthBackendArgs, AuthBackendState } from "./authBackend";
|
|
2
|
+
export declare type AuthBackend = import("./authBackend").AuthBackend;
|
|
3
|
+
export declare const AuthBackend: typeof import("./authBackend").AuthBackend;
|
|
4
|
+
export { AuthBackendGroupArgs, AuthBackendGroupState } from "./authBackendGroup";
|
|
5
|
+
export declare type AuthBackendGroup = import("./authBackendGroup").AuthBackendGroup;
|
|
6
|
+
export declare const AuthBackendGroup: typeof import("./authBackendGroup").AuthBackendGroup;
|
|
7
|
+
export { AuthBackendUserArgs, AuthBackendUserState } from "./authBackendUser";
|
|
8
|
+
export declare type AuthBackendUser = import("./authBackendUser").AuthBackendUser;
|
|
9
|
+
export declare const AuthBackendUser: typeof import("./authBackendUser").AuthBackendUser;
|
package/okta/index.js
CHANGED
|
@@ -1,41 +1,26 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
3
|
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
-
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
5
|
-
if (k2 === undefined) k2 = k;
|
|
6
|
-
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
7
|
-
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
8
|
-
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
9
|
-
}
|
|
10
|
-
Object.defineProperty(o, k2, desc);
|
|
11
|
-
}) : (function(o, m, k, k2) {
|
|
12
|
-
if (k2 === undefined) k2 = k;
|
|
13
|
-
o[k2] = m[k];
|
|
14
|
-
}));
|
|
15
|
-
var __exportStar = (this && this.__exportStar) || function(m, exports) {
|
|
16
|
-
for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
|
|
17
|
-
};
|
|
18
4
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.AuthBackendUser = exports.AuthBackendGroup = exports.AuthBackend = void 0;
|
|
19
6
|
const pulumi = require("@pulumi/pulumi");
|
|
20
7
|
const utilities = require("../utilities");
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
|
|
26
|
-
|
|
27
|
-
const authBackendGroup_1 = require("./authBackendGroup");
|
|
28
|
-
const authBackendUser_1 = require("./authBackendUser");
|
|
8
|
+
exports.AuthBackend = null;
|
|
9
|
+
exports.AuthBackendGroup = null;
|
|
10
|
+
exports.AuthBackendUser = null;
|
|
11
|
+
utilities.lazyLoad(exports, ["AuthBackend"], () => require("./authBackend"));
|
|
12
|
+
utilities.lazyLoad(exports, ["AuthBackendGroup"], () => require("./authBackendGroup"));
|
|
13
|
+
utilities.lazyLoad(exports, ["AuthBackendUser"], () => require("./authBackendUser"));
|
|
29
14
|
const _module = {
|
|
30
15
|
version: utilities.getVersion(),
|
|
31
16
|
construct: (name, type, urn) => {
|
|
32
17
|
switch (type) {
|
|
33
18
|
case "vault:okta/authBackend:AuthBackend":
|
|
34
|
-
return new
|
|
19
|
+
return new exports.AuthBackend(name, undefined, { urn });
|
|
35
20
|
case "vault:okta/authBackendGroup:AuthBackendGroup":
|
|
36
|
-
return new
|
|
21
|
+
return new exports.AuthBackendGroup(name, undefined, { urn });
|
|
37
22
|
case "vault:okta/authBackendUser:AuthBackendUser":
|
|
38
|
-
return new
|
|
23
|
+
return new exports.AuthBackendUser(name, undefined, { urn });
|
|
39
24
|
default:
|
|
40
25
|
throw new Error(`unknown resource type ${type}`);
|
|
41
26
|
}
|
package/okta/index.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../okta/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../okta/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAK7B,QAAA,WAAW,GAA+C,IAAW,CAAC;AAItE,QAAA,gBAAgB,GAAyD,IAAW,CAAC;AAIrF,QAAA,eAAe,GAAuD,IAAW,CAAC;AAE/F,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,aAAa,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,eAAe,CAAC,CAAC,CAAC;AAC7E,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,kBAAkB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,oBAAoB,CAAC,CAAC,CAAC;AACvF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,iBAAiB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,mBAAmB,CAAC,CAAC,CAAC;AAErF,MAAM,OAAO,GAAG;IACZ,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE;IAC/B,SAAS,EAAE,CAAC,IAAY,EAAE,IAAY,EAAE,GAAW,EAAmB,EAAE;QACpE,QAAQ,IAAI,EAAE;YACV,KAAK,oCAAoC;gBACrC,OAAO,IAAI,mBAAW,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACzD,KAAK,8CAA8C;gBAC/C,OAAO,IAAI,wBAAgB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC9D,KAAK,4CAA4C;gBAC7C,OAAO,IAAI,uBAAe,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC7D;gBACI,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,EAAE,CAAC,CAAC;SACxD;IACL,CAAC;CACJ,CAAC;AACF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,kBAAkB,EAAE,OAAO,CAAC,CAAA;AAC3E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,uBAAuB,EAAE,OAAO,CAAC,CAAA;AAChF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,sBAAsB,EAAE,OAAO,CAAC,CAAA"}
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@pulumi/vault",
|
|
3
|
-
"version": "v5.
|
|
3
|
+
"version": "v5.7.0",
|
|
4
4
|
"description": "A Pulumi package for creating and managing vault cloud resources.",
|
|
5
5
|
"keywords": [
|
|
6
6
|
"pulumi",
|
|
@@ -11,7 +11,7 @@
|
|
|
11
11
|
"license": "Apache-2.0",
|
|
12
12
|
"scripts": {
|
|
13
13
|
"build": "tsc",
|
|
14
|
-
"install": "node scripts/install-pulumi-plugin.js resource vault v5.
|
|
14
|
+
"install": "node scripts/install-pulumi-plugin.js resource vault v5.7.0"
|
|
15
15
|
},
|
|
16
16
|
"dependencies": {
|
|
17
17
|
"@pulumi/pulumi": "^3.0.0"
|
package/package.json.dev
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@pulumi/vault",
|
|
3
|
-
"version": "v5.
|
|
3
|
+
"version": "v5.7.0",
|
|
4
4
|
"description": "A Pulumi package for creating and managing vault cloud resources.",
|
|
5
5
|
"keywords": [
|
|
6
6
|
"pulumi",
|
|
@@ -11,7 +11,7 @@
|
|
|
11
11
|
"license": "Apache-2.0",
|
|
12
12
|
"scripts": {
|
|
13
13
|
"build": "tsc",
|
|
14
|
-
"install": "node scripts/install-pulumi-plugin.js resource vault v5.
|
|
14
|
+
"install": "node scripts/install-pulumi-plugin.js resource vault v5.7.0"
|
|
15
15
|
},
|
|
16
16
|
"dependencies": {
|
|
17
17
|
"@pulumi/pulumi": "^3.0.0"
|
package/passwordPolicy.d.ts
CHANGED
|
@@ -47,6 +47,13 @@ export declare class PasswordPolicy extends pulumi.CustomResource {
|
|
|
47
47
|
* The name of the password policy.
|
|
48
48
|
*/
|
|
49
49
|
readonly name: pulumi.Output<string>;
|
|
50
|
+
/**
|
|
51
|
+
* The namespace to provision the resource in.
|
|
52
|
+
* The value should not contain leading or trailing forward slashes.
|
|
53
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
54
|
+
* *Available only for Vault Enterprise*.
|
|
55
|
+
*/
|
|
56
|
+
readonly namespace: pulumi.Output<string | undefined>;
|
|
50
57
|
/**
|
|
51
58
|
* String containing a password policy.
|
|
52
59
|
*/
|
|
@@ -68,6 +75,13 @@ export interface PasswordPolicyState {
|
|
|
68
75
|
* The name of the password policy.
|
|
69
76
|
*/
|
|
70
77
|
name?: pulumi.Input<string>;
|
|
78
|
+
/**
|
|
79
|
+
* The namespace to provision the resource in.
|
|
80
|
+
* The value should not contain leading or trailing forward slashes.
|
|
81
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
82
|
+
* *Available only for Vault Enterprise*.
|
|
83
|
+
*/
|
|
84
|
+
namespace?: pulumi.Input<string>;
|
|
71
85
|
/**
|
|
72
86
|
* String containing a password policy.
|
|
73
87
|
*/
|
|
@@ -81,6 +95,13 @@ export interface PasswordPolicyArgs {
|
|
|
81
95
|
* The name of the password policy.
|
|
82
96
|
*/
|
|
83
97
|
name?: pulumi.Input<string>;
|
|
98
|
+
/**
|
|
99
|
+
* The namespace to provision the resource in.
|
|
100
|
+
* The value should not contain leading or trailing forward slashes.
|
|
101
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
102
|
+
* *Available only for Vault Enterprise*.
|
|
103
|
+
*/
|
|
104
|
+
namespace?: pulumi.Input<string>;
|
|
84
105
|
/**
|
|
85
106
|
* String containing a password policy.
|
|
86
107
|
*/
|
package/passwordPolicy.js
CHANGED
|
@@ -40,6 +40,7 @@ class PasswordPolicy extends pulumi.CustomResource {
|
|
|
40
40
|
if (opts.id) {
|
|
41
41
|
const state = argsOrState;
|
|
42
42
|
resourceInputs["name"] = state ? state.name : undefined;
|
|
43
|
+
resourceInputs["namespace"] = state ? state.namespace : undefined;
|
|
43
44
|
resourceInputs["policy"] = state ? state.policy : undefined;
|
|
44
45
|
}
|
|
45
46
|
else {
|
|
@@ -48,6 +49,7 @@ class PasswordPolicy extends pulumi.CustomResource {
|
|
|
48
49
|
throw new Error("Missing required property 'policy'");
|
|
49
50
|
}
|
|
50
51
|
resourceInputs["name"] = args ? args.name : undefined;
|
|
52
|
+
resourceInputs["namespace"] = args ? args.namespace : undefined;
|
|
51
53
|
resourceInputs["policy"] = args ? args.policy : undefined;
|
|
52
54
|
}
|
|
53
55
|
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
package/passwordPolicy.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"passwordPolicy.js","sourceRoot":"","sources":["../passwordPolicy.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2BG;AACH,MAAa,cAAe,SAAQ,MAAM,CAAC,cAAc;
|
|
1
|
+
{"version":3,"file":"passwordPolicy.js","sourceRoot":"","sources":["../passwordPolicy.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2BG;AACH,MAAa,cAAe,SAAQ,MAAM,CAAC,cAAc;IAoDrD,YAAY,IAAY,EAAE,WAAsD,EAAE,IAAmC;QACjH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA8C,CAAC;YAC7D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAA6C,CAAC;YAC3D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,cAAc,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACnE,CAAC;IAtED;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA2B,EAAE,IAAmC;QACzH,OAAO,IAAI,cAAc,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACrE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,cAAc,CAAC,YAAY,CAAC;IAC/D,CAAC;;AA1BL,wCAwEC;AA1DG,gBAAgB;AACO,2BAAY,GAAG,2CAA2C,CAAC"}
|
package/pkisecret/index.d.ts
CHANGED
|
@@ -1,10 +1,30 @@
|
|
|
1
|
-
export
|
|
2
|
-
export
|
|
3
|
-
export
|
|
4
|
-
export
|
|
5
|
-
export
|
|
6
|
-
export
|
|
7
|
-
export
|
|
8
|
-
export
|
|
9
|
-
export
|
|
10
|
-
export
|
|
1
|
+
export { SecretBackendCertArgs, SecretBackendCertState } from "./secretBackendCert";
|
|
2
|
+
export declare type SecretBackendCert = import("./secretBackendCert").SecretBackendCert;
|
|
3
|
+
export declare const SecretBackendCert: typeof import("./secretBackendCert").SecretBackendCert;
|
|
4
|
+
export { SecretBackendConfigCaArgs, SecretBackendConfigCaState } from "./secretBackendConfigCa";
|
|
5
|
+
export declare type SecretBackendConfigCa = import("./secretBackendConfigCa").SecretBackendConfigCa;
|
|
6
|
+
export declare const SecretBackendConfigCa: typeof import("./secretBackendConfigCa").SecretBackendConfigCa;
|
|
7
|
+
export { SecretBackendConfigUrlsArgs, SecretBackendConfigUrlsState } from "./secretBackendConfigUrls";
|
|
8
|
+
export declare type SecretBackendConfigUrls = import("./secretBackendConfigUrls").SecretBackendConfigUrls;
|
|
9
|
+
export declare const SecretBackendConfigUrls: typeof import("./secretBackendConfigUrls").SecretBackendConfigUrls;
|
|
10
|
+
export { SecretBackendCrlConfigArgs, SecretBackendCrlConfigState } from "./secretBackendCrlConfig";
|
|
11
|
+
export declare type SecretBackendCrlConfig = import("./secretBackendCrlConfig").SecretBackendCrlConfig;
|
|
12
|
+
export declare const SecretBackendCrlConfig: typeof import("./secretBackendCrlConfig").SecretBackendCrlConfig;
|
|
13
|
+
export { SecretBackendIntermediateCertRequestArgs, SecretBackendIntermediateCertRequestState } from "./secretBackendIntermediateCertRequest";
|
|
14
|
+
export declare type SecretBackendIntermediateCertRequest = import("./secretBackendIntermediateCertRequest").SecretBackendIntermediateCertRequest;
|
|
15
|
+
export declare const SecretBackendIntermediateCertRequest: typeof import("./secretBackendIntermediateCertRequest").SecretBackendIntermediateCertRequest;
|
|
16
|
+
export { SecretBackendIntermediateSetSignedArgs, SecretBackendIntermediateSetSignedState } from "./secretBackendIntermediateSetSigned";
|
|
17
|
+
export declare type SecretBackendIntermediateSetSigned = import("./secretBackendIntermediateSetSigned").SecretBackendIntermediateSetSigned;
|
|
18
|
+
export declare const SecretBackendIntermediateSetSigned: typeof import("./secretBackendIntermediateSetSigned").SecretBackendIntermediateSetSigned;
|
|
19
|
+
export { SecretBackendRoleArgs, SecretBackendRoleState } from "./secretBackendRole";
|
|
20
|
+
export declare type SecretBackendRole = import("./secretBackendRole").SecretBackendRole;
|
|
21
|
+
export declare const SecretBackendRole: typeof import("./secretBackendRole").SecretBackendRole;
|
|
22
|
+
export { SecretBackendRootCertArgs, SecretBackendRootCertState } from "./secretBackendRootCert";
|
|
23
|
+
export declare type SecretBackendRootCert = import("./secretBackendRootCert").SecretBackendRootCert;
|
|
24
|
+
export declare const SecretBackendRootCert: typeof import("./secretBackendRootCert").SecretBackendRootCert;
|
|
25
|
+
export { SecretBackendRootSignIntermediateArgs, SecretBackendRootSignIntermediateState } from "./secretBackendRootSignIntermediate";
|
|
26
|
+
export declare type SecretBackendRootSignIntermediate = import("./secretBackendRootSignIntermediate").SecretBackendRootSignIntermediate;
|
|
27
|
+
export declare const SecretBackendRootSignIntermediate: typeof import("./secretBackendRootSignIntermediate").SecretBackendRootSignIntermediate;
|
|
28
|
+
export { SecretBackendSignArgs, SecretBackendSignState } from "./secretBackendSign";
|
|
29
|
+
export declare type SecretBackendSign = import("./secretBackendSign").SecretBackendSign;
|
|
30
|
+
export declare const SecretBackendSign: typeof import("./secretBackendSign").SecretBackendSign;
|
package/pkisecret/index.js
CHANGED
|
@@ -1,69 +1,54 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
3
|
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
-
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
5
|
-
if (k2 === undefined) k2 = k;
|
|
6
|
-
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
7
|
-
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
8
|
-
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
9
|
-
}
|
|
10
|
-
Object.defineProperty(o, k2, desc);
|
|
11
|
-
}) : (function(o, m, k, k2) {
|
|
12
|
-
if (k2 === undefined) k2 = k;
|
|
13
|
-
o[k2] = m[k];
|
|
14
|
-
}));
|
|
15
|
-
var __exportStar = (this && this.__exportStar) || function(m, exports) {
|
|
16
|
-
for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
|
|
17
|
-
};
|
|
18
4
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.SecretBackendSign = exports.SecretBackendRootSignIntermediate = exports.SecretBackendRootCert = exports.SecretBackendRole = exports.SecretBackendIntermediateSetSigned = exports.SecretBackendIntermediateCertRequest = exports.SecretBackendCrlConfig = exports.SecretBackendConfigUrls = exports.SecretBackendConfigCa = exports.SecretBackendCert = void 0;
|
|
19
6
|
const pulumi = require("@pulumi/pulumi");
|
|
20
7
|
const utilities = require("../utilities");
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
|
|
33
|
-
|
|
34
|
-
|
|
35
|
-
|
|
36
|
-
|
|
37
|
-
|
|
38
|
-
|
|
39
|
-
|
|
40
|
-
|
|
41
|
-
const secretBackendRootSignIntermediate_1 = require("./secretBackendRootSignIntermediate");
|
|
42
|
-
const secretBackendSign_1 = require("./secretBackendSign");
|
|
8
|
+
exports.SecretBackendCert = null;
|
|
9
|
+
exports.SecretBackendConfigCa = null;
|
|
10
|
+
exports.SecretBackendConfigUrls = null;
|
|
11
|
+
exports.SecretBackendCrlConfig = null;
|
|
12
|
+
exports.SecretBackendIntermediateCertRequest = null;
|
|
13
|
+
exports.SecretBackendIntermediateSetSigned = null;
|
|
14
|
+
exports.SecretBackendRole = null;
|
|
15
|
+
exports.SecretBackendRootCert = null;
|
|
16
|
+
exports.SecretBackendRootSignIntermediate = null;
|
|
17
|
+
exports.SecretBackendSign = null;
|
|
18
|
+
utilities.lazyLoad(exports, ["SecretBackendCert"], () => require("./secretBackendCert"));
|
|
19
|
+
utilities.lazyLoad(exports, ["SecretBackendConfigCa"], () => require("./secretBackendConfigCa"));
|
|
20
|
+
utilities.lazyLoad(exports, ["SecretBackendConfigUrls"], () => require("./secretBackendConfigUrls"));
|
|
21
|
+
utilities.lazyLoad(exports, ["SecretBackendCrlConfig"], () => require("./secretBackendCrlConfig"));
|
|
22
|
+
utilities.lazyLoad(exports, ["SecretBackendIntermediateCertRequest"], () => require("./secretBackendIntermediateCertRequest"));
|
|
23
|
+
utilities.lazyLoad(exports, ["SecretBackendIntermediateSetSigned"], () => require("./secretBackendIntermediateSetSigned"));
|
|
24
|
+
utilities.lazyLoad(exports, ["SecretBackendRole"], () => require("./secretBackendRole"));
|
|
25
|
+
utilities.lazyLoad(exports, ["SecretBackendRootCert"], () => require("./secretBackendRootCert"));
|
|
26
|
+
utilities.lazyLoad(exports, ["SecretBackendRootSignIntermediate"], () => require("./secretBackendRootSignIntermediate"));
|
|
27
|
+
utilities.lazyLoad(exports, ["SecretBackendSign"], () => require("./secretBackendSign"));
|
|
43
28
|
const _module = {
|
|
44
29
|
version: utilities.getVersion(),
|
|
45
30
|
construct: (name, type, urn) => {
|
|
46
31
|
switch (type) {
|
|
47
32
|
case "vault:pkiSecret/secretBackendCert:SecretBackendCert":
|
|
48
|
-
return new
|
|
33
|
+
return new exports.SecretBackendCert(name, undefined, { urn });
|
|
49
34
|
case "vault:pkiSecret/secretBackendConfigCa:SecretBackendConfigCa":
|
|
50
|
-
return new
|
|
35
|
+
return new exports.SecretBackendConfigCa(name, undefined, { urn });
|
|
51
36
|
case "vault:pkiSecret/secretBackendConfigUrls:SecretBackendConfigUrls":
|
|
52
|
-
return new
|
|
37
|
+
return new exports.SecretBackendConfigUrls(name, undefined, { urn });
|
|
53
38
|
case "vault:pkiSecret/secretBackendCrlConfig:SecretBackendCrlConfig":
|
|
54
|
-
return new
|
|
39
|
+
return new exports.SecretBackendCrlConfig(name, undefined, { urn });
|
|
55
40
|
case "vault:pkiSecret/secretBackendIntermediateCertRequest:SecretBackendIntermediateCertRequest":
|
|
56
|
-
return new
|
|
41
|
+
return new exports.SecretBackendIntermediateCertRequest(name, undefined, { urn });
|
|
57
42
|
case "vault:pkiSecret/secretBackendIntermediateSetSigned:SecretBackendIntermediateSetSigned":
|
|
58
|
-
return new
|
|
43
|
+
return new exports.SecretBackendIntermediateSetSigned(name, undefined, { urn });
|
|
59
44
|
case "vault:pkiSecret/secretBackendRole:SecretBackendRole":
|
|
60
|
-
return new
|
|
45
|
+
return new exports.SecretBackendRole(name, undefined, { urn });
|
|
61
46
|
case "vault:pkiSecret/secretBackendRootCert:SecretBackendRootCert":
|
|
62
|
-
return new
|
|
47
|
+
return new exports.SecretBackendRootCert(name, undefined, { urn });
|
|
63
48
|
case "vault:pkiSecret/secretBackendRootSignIntermediate:SecretBackendRootSignIntermediate":
|
|
64
|
-
return new
|
|
49
|
+
return new exports.SecretBackendRootSignIntermediate(name, undefined, { urn });
|
|
65
50
|
case "vault:pkiSecret/secretBackendSign:SecretBackendSign":
|
|
66
|
-
return new
|
|
51
|
+
return new exports.SecretBackendSign(name, undefined, { urn });
|
|
67
52
|
default:
|
|
68
53
|
throw new Error(`unknown resource type ${type}`);
|
|
69
54
|
}
|