@pulumi/vault 5.6.0 → 5.7.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/ad/getAccessCredentials.d.ts +15 -0
- package/ad/getAccessCredentials.js +1 -0
- package/ad/getAccessCredentials.js.map +1 -1
- package/ad/index.d.ts +12 -4
- package/ad/index.js +13 -26
- package/ad/index.js.map +1 -1
- package/ad/secretBackend.d.ts +39 -0
- package/ad/secretBackend.js +9 -3
- package/ad/secretBackend.js.map +1 -1
- package/ad/secretLibrary.d.ts +21 -0
- package/ad/secretLibrary.js +2 -0
- package/ad/secretLibrary.js.map +1 -1
- package/ad/secretRole.d.ts +21 -0
- package/ad/secretRole.js +2 -0
- package/ad/secretRole.js.map +1 -1
- package/alicloud/authBackendRole.d.ts +21 -0
- package/alicloud/authBackendRole.js +2 -0
- package/alicloud/authBackendRole.js.map +1 -1
- package/alicloud/index.d.ts +3 -1
- package/alicloud/index.js +4 -19
- package/alicloud/index.js.map +1 -1
- package/approle/authBackendLogin.d.ts +22 -1
- package/approle/authBackendLogin.js +3 -1
- package/approle/authBackendLogin.js.map +1 -1
- package/approle/authBackendRole.d.ts +21 -0
- package/approle/authBackendRole.js +2 -0
- package/approle/authBackendRole.js.map +1 -1
- package/approle/{authBackendRoleSecretID.d.ts → authBackendRoleSecretId.d.ts} +33 -12
- package/approle/{authBackendRoleSecretID.js → authBackendRoleSecretId.js} +16 -12
- package/approle/authBackendRoleSecretId.js.map +1 -0
- package/approle/getAuthBackendRoleId.d.ts +15 -0
- package/approle/getAuthBackendRoleId.js +1 -0
- package/approle/getAuthBackendRoleId.js.map +1 -1
- package/approle/index.d.ts +12 -4
- package/approle/index.js +15 -28
- package/approle/index.js.map +1 -1
- package/audit.d.ts +21 -0
- package/audit.js +2 -0
- package/audit.js.map +1 -1
- package/authBackend.d.ts +47 -10
- package/authBackend.js +4 -0
- package/authBackend.js.map +1 -1
- package/aws/authBackendCert.d.ts +21 -0
- package/aws/authBackendCert.js +2 -0
- package/aws/authBackendCert.js.map +1 -1
- package/aws/authBackendClient.d.ts +21 -0
- package/aws/authBackendClient.js +6 -2
- package/aws/authBackendClient.js.map +1 -1
- package/aws/authBackendIdentityWhitelist.d.ts +21 -0
- package/aws/authBackendIdentityWhitelist.js +2 -0
- package/aws/authBackendIdentityWhitelist.js.map +1 -1
- package/aws/authBackendLogin.d.ts +21 -0
- package/aws/authBackendLogin.js +4 -0
- package/aws/authBackendLogin.js.map +1 -1
- package/aws/authBackendRole.d.ts +21 -0
- package/aws/authBackendRole.js +2 -0
- package/aws/authBackendRole.js.map +1 -1
- package/aws/authBackendRoleTag.d.ts +21 -0
- package/aws/authBackendRoleTag.js +2 -0
- package/aws/authBackendRoleTag.js.map +1 -1
- package/aws/authBackendRoletagBlacklist.d.ts +21 -0
- package/aws/authBackendRoletagBlacklist.js +2 -0
- package/aws/authBackendRoletagBlacklist.js.map +1 -1
- package/aws/authBackendStsRole.d.ts +21 -0
- package/aws/authBackendStsRole.js +2 -0
- package/aws/authBackendStsRole.js.map +1 -1
- package/aws/getAccessCredentials.d.ts +15 -0
- package/aws/getAccessCredentials.js +1 -0
- package/aws/getAccessCredentials.js.map +1 -1
- package/aws/index.d.ts +33 -11
- package/aws/index.js +34 -47
- package/aws/index.js.map +1 -1
- package/aws/secretBackend.d.ts +36 -12
- package/aws/secretBackend.js +8 -14
- package/aws/secretBackend.js.map +1 -1
- package/aws/secretBackendRole.d.ts +21 -0
- package/aws/secretBackendRole.js +2 -0
- package/aws/secretBackendRole.js.map +1 -1
- package/azure/authBackendConfig.d.ts +21 -0
- package/azure/authBackendConfig.js +7 -3
- package/azure/authBackendConfig.js.map +1 -1
- package/azure/authBackendRole.d.ts +21 -0
- package/azure/authBackendRole.js +2 -0
- package/azure/authBackendRole.js.map +1 -1
- package/azure/backend.d.ts +36 -0
- package/azure/backend.js +10 -4
- package/azure/backend.js.map +1 -1
- package/azure/backendRole.d.ts +23 -1
- package/azure/backendRole.js +2 -0
- package/azure/backendRole.js.map +1 -1
- package/azure/getAccessCredentials.d.ts +15 -0
- package/azure/getAccessCredentials.js +1 -0
- package/azure/getAccessCredentials.js.map +1 -1
- package/azure/index.d.ts +15 -5
- package/azure/index.js +16 -29
- package/azure/index.js.map +1 -1
- package/certAuthBackendRole.d.ts +39 -3
- package/certAuthBackendRole.js +4 -0
- package/certAuthBackendRole.js.map +1 -1
- package/config/vars.d.ts +43 -3
- package/config/vars.js +64 -4
- package/config/vars.js.map +1 -1
- package/consul/index.d.ts +6 -2
- package/consul/index.js +7 -22
- package/consul/index.js.map +1 -1
- package/consul/secretBackend.d.ts +87 -15
- package/consul/secretBackend.js +24 -7
- package/consul/secretBackend.js.map +1 -1
- package/consul/secretBackendRole.d.ts +93 -10
- package/consul/secretBackendRole.js +14 -1
- package/consul/secretBackendRole.js.map +1 -1
- package/database/index.d.ts +12 -4
- package/database/index.js +13 -28
- package/database/index.js.map +1 -1
- package/database/secretBackendConnection.d.ts +35 -1
- package/database/secretBackendConnection.js +4 -0
- package/database/secretBackendConnection.js.map +1 -1
- package/database/secretBackendRole.d.ts +21 -0
- package/database/secretBackendRole.js +2 -0
- package/database/secretBackendRole.js.map +1 -1
- package/database/secretBackendStaticRole.d.ts +21 -0
- package/database/secretBackendStaticRole.js +2 -0
- package/database/secretBackendStaticRole.js.map +1 -1
- package/database/secretsMount.d.ts +41 -1
- package/database/secretsMount.js +6 -0
- package/database/secretsMount.js.map +1 -1
- package/egpPolicy.d.ts +21 -0
- package/egpPolicy.js +2 -0
- package/egpPolicy.js.map +1 -1
- package/gcp/authBackend.d.ts +71 -1
- package/gcp/authBackend.js +18 -2
- package/gcp/authBackend.js.map +1 -1
- package/gcp/authBackendRole.d.ts +21 -0
- package/gcp/authBackendRole.js +2 -0
- package/gcp/authBackendRole.js.map +1 -1
- package/gcp/getAuthBackendRole.d.ts +15 -0
- package/gcp/getAuthBackendRole.js +1 -0
- package/gcp/getAuthBackendRole.js.map +1 -1
- package/gcp/index.d.ts +18 -6
- package/gcp/index.js +19 -32
- package/gcp/index.js.map +1 -1
- package/gcp/secretBackend.d.ts +36 -0
- package/gcp/secretBackend.js +7 -1
- package/gcp/secretBackend.js.map +1 -1
- package/gcp/secretRoleset.d.ts +23 -1
- package/gcp/secretRoleset.js +2 -0
- package/gcp/secretRoleset.js.map +1 -1
- package/gcp/secretStaticAccount.d.ts +23 -1
- package/gcp/secretStaticAccount.js +2 -0
- package/gcp/secretStaticAccount.js.map +1 -1
- package/generic/endpoint.d.ts +21 -0
- package/generic/endpoint.js +5 -1
- package/generic/endpoint.js.map +1 -1
- package/generic/getSecret.d.ts +15 -0
- package/generic/getSecret.js +1 -0
- package/generic/getSecret.js.map +1 -1
- package/generic/index.d.ts +9 -3
- package/generic/index.js +10 -23
- package/generic/index.js.map +1 -1
- package/generic/secret.d.ts +21 -0
- package/generic/secret.js +5 -1
- package/generic/secret.js.map +1 -1
- package/getAuthBackend.d.ts +16 -1
- package/getAuthBackend.js +1 -0
- package/getAuthBackend.js.map +1 -1
- package/getNomadAccessToken.d.ts +15 -0
- package/getNomadAccessToken.js +1 -0
- package/getNomadAccessToken.js.map +1 -1
- package/getPolicyDocument.d.ts +5 -1
- package/getPolicyDocument.js +1 -0
- package/getPolicyDocument.js.map +1 -1
- package/github/authBackend.d.ts +38 -1
- package/github/authBackend.js +4 -0
- package/github/authBackend.js.map +1 -1
- package/github/index.d.ts +9 -3
- package/github/index.js +10 -25
- package/github/index.js.map +1 -1
- package/github/team.d.ts +21 -0
- package/github/team.js +2 -0
- package/github/team.js.map +1 -1
- package/github/user.d.ts +21 -0
- package/github/user.js +2 -0
- package/github/user.js.map +1 -1
- package/identity/entity.d.ts +21 -0
- package/identity/entity.js +2 -0
- package/identity/entity.js.map +1 -1
- package/identity/entityAlias.d.ts +21 -0
- package/identity/entityAlias.js +2 -0
- package/identity/entityAlias.js.map +1 -1
- package/identity/entityPolicies.d.ts +21 -0
- package/identity/entityPolicies.js +2 -0
- package/identity/entityPolicies.js.map +1 -1
- package/identity/getEntity.d.ts +16 -1
- package/identity/getEntity.js +1 -0
- package/identity/getEntity.js.map +1 -1
- package/identity/getGroup.d.ts +15 -0
- package/identity/getGroup.js +1 -0
- package/identity/getGroup.js.map +1 -1
- package/identity/getOidcClientCreds.d.ts +15 -0
- package/identity/getOidcClientCreds.js +1 -0
- package/identity/getOidcClientCreds.js.map +1 -1
- package/identity/getOidcOpenidConfig.d.ts +15 -0
- package/identity/getOidcOpenidConfig.js +1 -0
- package/identity/getOidcOpenidConfig.js.map +1 -1
- package/identity/getOidcPublicKeys.d.ts +15 -0
- package/identity/getOidcPublicKeys.js +1 -0
- package/identity/getOidcPublicKeys.js.map +1 -1
- package/identity/group.d.ts +21 -0
- package/identity/group.js +2 -0
- package/identity/group.js.map +1 -1
- package/identity/groupAlias.d.ts +21 -0
- package/identity/groupAlias.js +2 -0
- package/identity/groupAlias.js.map +1 -1
- package/identity/groupMemberEntityIds.d.ts +21 -0
- package/identity/groupMemberEntityIds.js +2 -0
- package/identity/groupMemberEntityIds.js.map +1 -1
- package/identity/groupPolicies.d.ts +21 -0
- package/identity/groupPolicies.js +2 -0
- package/identity/groupPolicies.js.map +1 -1
- package/identity/index.d.ts +75 -20
- package/identity/index.js +86 -66
- package/identity/index.js.map +1 -1
- package/identity/mfaDuo.d.ts +200 -0
- package/identity/mfaDuo.js +110 -0
- package/identity/mfaDuo.js.map +1 -0
- package/identity/mfaLoginEnforcement.d.ts +170 -0
- package/identity/mfaLoginEnforcement.js +96 -0
- package/identity/mfaLoginEnforcement.js.map +1 -0
- package/identity/mfaOkta.d.ts +188 -0
- package/identity/mfaOkta.js +105 -0
- package/identity/mfaOkta.js.map +1 -0
- package/identity/mfaPingid.d.ts +190 -0
- package/identity/mfaPingid.js +102 -0
- package/identity/mfaPingid.js.map +1 -0
- package/identity/mfaTotp.d.ts +218 -0
- package/identity/mfaTotp.js +104 -0
- package/identity/mfaTotp.js.map +1 -0
- package/identity/oidc.d.ts +21 -0
- package/identity/oidc.js +2 -0
- package/identity/oidc.js.map +1 -1
- package/identity/oidcAssignment.d.ts +23 -2
- package/identity/oidcAssignment.js +4 -2
- package/identity/oidcAssignment.js.map +1 -1
- package/identity/oidcClient.d.ts +21 -0
- package/identity/oidcClient.js +4 -0
- package/identity/oidcClient.js.map +1 -1
- package/identity/oidcKey.d.ts +21 -0
- package/identity/oidcKey.js +2 -0
- package/identity/oidcKey.js.map +1 -1
- package/identity/oidcKeyAllowedClientID.d.ts +21 -0
- package/identity/oidcKeyAllowedClientID.js +2 -0
- package/identity/oidcKeyAllowedClientID.js.map +1 -1
- package/identity/oidcProvider.d.ts +21 -0
- package/identity/oidcProvider.js +2 -0
- package/identity/oidcProvider.js.map +1 -1
- package/identity/oidcRole.d.ts +21 -0
- package/identity/oidcRole.js +2 -0
- package/identity/oidcRole.js.map +1 -1
- package/identity/oidcScope.d.ts +22 -3
- package/identity/oidcScope.js +3 -3
- package/identity/oidcScope.js.map +1 -1
- package/index.d.ts +75 -25
- package/index.js +78 -83
- package/index.js.map +1 -1
- package/jwt/authBackend.d.ts +38 -1
- package/jwt/authBackend.js +7 -1
- package/jwt/authBackend.js.map +1 -1
- package/jwt/authBackendRole.d.ts +57 -0
- package/jwt/authBackendRole.js +6 -0
- package/jwt/authBackendRole.js.map +1 -1
- package/jwt/index.d.ts +6 -2
- package/jwt/index.js +7 -22
- package/jwt/index.js.map +1 -1
- package/kmip/index.d.ts +9 -3
- package/kmip/index.js +10 -25
- package/kmip/index.js.map +1 -1
- package/kmip/secretBackend.d.ts +36 -0
- package/kmip/secretBackend.js +4 -0
- package/kmip/secretBackend.js.map +1 -1
- package/kmip/secretRole.d.ts +21 -0
- package/kmip/secretRole.js +2 -0
- package/kmip/secretRole.js.map +1 -1
- package/kmip/secretScope.d.ts +21 -0
- package/kmip/secretScope.js +2 -0
- package/kmip/secretScope.js.map +1 -1
- package/kubernetes/authBackendConfig.d.ts +21 -0
- package/kubernetes/authBackendConfig.js +5 -1
- package/kubernetes/authBackendConfig.js.map +1 -1
- package/kubernetes/authBackendRole.d.ts +21 -0
- package/kubernetes/authBackendRole.js +2 -0
- package/kubernetes/authBackendRole.js.map +1 -1
- package/kubernetes/getAuthBackendConfig.d.ts +15 -0
- package/kubernetes/getAuthBackendConfig.js +1 -0
- package/kubernetes/getAuthBackendConfig.js.map +1 -1
- package/kubernetes/getAuthBackendRole.d.ts +15 -0
- package/kubernetes/getAuthBackendRole.js +1 -0
- package/kubernetes/getAuthBackendRole.js.map +1 -1
- package/kubernetes/getServiceAccountToken.d.ts +46 -0
- package/kubernetes/getServiceAccountToken.js +27 -0
- package/kubernetes/getServiceAccountToken.js.map +1 -0
- package/kubernetes/index.d.ts +21 -4
- package/kubernetes/index.js +26 -24
- package/kubernetes/index.js.map +1 -1
- package/kubernetes/secretBackend.d.ts +303 -0
- package/kubernetes/secretBackend.js +114 -0
- package/kubernetes/secretBackend.js.map +1 -0
- package/kubernetes/secretBackendRole.d.ts +367 -0
- package/kubernetes/secretBackendRole.js +191 -0
- package/kubernetes/secretBackendRole.js.map +1 -0
- package/kv/getSecret.d.ts +104 -0
- package/kv/getSecret.js +53 -0
- package/kv/getSecret.js.map +1 -0
- package/kv/getSecretSubkeysV2.d.ts +42 -0
- package/kv/getSecretSubkeysV2.js +26 -0
- package/kv/getSecretSubkeysV2.js.map +1 -0
- package/kv/getSecretV2.d.ts +139 -0
- package/kv/getSecretV2.js +58 -0
- package/kv/getSecretV2.js.map +1 -0
- package/kv/getSecretsList.d.ts +85 -0
- package/kv/getSecretsList.js +58 -0
- package/kv/getSecretsList.js.map +1 -0
- package/kv/getSecretsListV2.d.ts +114 -0
- package/kv/getSecretsListV2.js +69 -0
- package/kv/getSecretsListV2.js.map +1 -0
- package/kv/index.d.ts +24 -0
- package/kv/index.js +47 -0
- package/kv/index.js.map +1 -0
- package/kv/secret.d.ts +145 -0
- package/kv/secret.js +106 -0
- package/kv/secret.js.map +1 -0
- package/kv/secretBackendV2.d.ts +154 -0
- package/kv/secretBackendV2.js +103 -0
- package/kv/secretBackendV2.js.map +1 -0
- package/kv/secretV2.d.ts +257 -0
- package/kv/secretV2.js +122 -0
- package/kv/secretV2.js.map +1 -0
- package/ldap/authBackend.d.ts +48 -0
- package/ldap/authBackend.js +10 -2
- package/ldap/authBackend.js.map +1 -1
- package/ldap/authBackendGroup.d.ts +21 -0
- package/ldap/authBackendGroup.js +2 -0
- package/ldap/authBackendGroup.js.map +1 -1
- package/ldap/authBackendUser.d.ts +21 -0
- package/ldap/authBackendUser.js +2 -0
- package/ldap/authBackendUser.js.map +1 -1
- package/ldap/index.d.ts +9 -3
- package/ldap/index.js +10 -25
- package/ldap/index.js.map +1 -1
- package/managed/index.d.ts +3 -0
- package/managed/index.js +22 -0
- package/managed/index.js.map +1 -0
- package/managed/keys.d.ts +104 -0
- package/managed/keys.js +64 -0
- package/managed/keys.js.map +1 -0
- package/mfaDuo.d.ts +21 -0
- package/mfaDuo.js +6 -2
- package/mfaDuo.js.map +1 -1
- package/mfaOkta.d.ts +21 -0
- package/mfaOkta.js +5 -1
- package/mfaOkta.js.map +1 -1
- package/mfaPingid.d.ts +21 -0
- package/mfaPingid.js +2 -0
- package/mfaPingid.js.map +1 -1
- package/mfaTotp.d.ts +21 -0
- package/mfaTotp.js +2 -0
- package/mfaTotp.js.map +1 -1
- package/mount.d.ts +33 -0
- package/mount.js +4 -0
- package/mount.js.map +1 -1
- package/namespace.d.ts +32 -18
- package/namespace.js +5 -16
- package/namespace.js.map +1 -1
- package/nomadSecretBackend.d.ts +36 -0
- package/nomadSecretBackend.js +9 -3
- package/nomadSecretBackend.js.map +1 -1
- package/nomadSecretRole.d.ts +21 -0
- package/nomadSecretRole.js +2 -0
- package/nomadSecretRole.js.map +1 -1
- package/okta/authBackend.d.ts +38 -1
- package/okta/authBackend.js +7 -1
- package/okta/authBackend.js.map +1 -1
- package/okta/authBackendGroup.d.ts +21 -0
- package/okta/authBackendGroup.js +2 -0
- package/okta/authBackendGroup.js.map +1 -1
- package/okta/authBackendUser.d.ts +21 -0
- package/okta/authBackendUser.js +2 -0
- package/okta/authBackendUser.js.map +1 -1
- package/okta/index.d.ts +9 -3
- package/okta/index.js +10 -25
- package/okta/index.js.map +1 -1
- package/package.json +2 -2
- package/package.json.dev +2 -2
- package/passwordPolicy.d.ts +21 -0
- package/passwordPolicy.js +2 -0
- package/passwordPolicy.js.map +1 -1
- package/pkisecret/index.d.ts +30 -10
- package/pkisecret/index.js +31 -46
- package/pkisecret/index.js.map +1 -1
- package/pkisecret/secretBackendCert.d.ts +29 -0
- package/pkisecret/secretBackendCert.js +6 -0
- package/pkisecret/secretBackendCert.js.map +1 -1
- package/pkisecret/secretBackendConfigCa.d.ts +21 -0
- package/pkisecret/secretBackendConfigCa.js +5 -1
- package/pkisecret/secretBackendConfigCa.js.map +1 -1
- package/pkisecret/secretBackendConfigUrls.d.ts +21 -0
- package/pkisecret/secretBackendConfigUrls.js +2 -0
- package/pkisecret/secretBackendConfigUrls.js.map +1 -1
- package/pkisecret/secretBackendCrlConfig.d.ts +21 -0
- package/pkisecret/secretBackendCrlConfig.js +2 -0
- package/pkisecret/secretBackendCrlConfig.js.map +1 -1
- package/pkisecret/secretBackendIntermediateCertRequest.d.ts +54 -0
- package/pkisecret/secretBackendIntermediateCertRequest.js +8 -0
- package/pkisecret/secretBackendIntermediateCertRequest.js.map +1 -1
- package/pkisecret/secretBackendIntermediateSetSigned.d.ts +21 -0
- package/pkisecret/secretBackendIntermediateSetSigned.js +2 -0
- package/pkisecret/secretBackendIntermediateSetSigned.js.map +1 -1
- package/pkisecret/secretBackendRole.d.ts +24 -3
- package/pkisecret/secretBackendRole.js +2 -0
- package/pkisecret/secretBackendRole.js.map +1 -1
- package/pkisecret/secretBackendRootCert.d.ts +57 -3
- package/pkisecret/secretBackendRootCert.js +6 -0
- package/pkisecret/secretBackendRootCert.js.map +1 -1
- package/pkisecret/secretBackendRootSignIntermediate.d.ts +21 -0
- package/pkisecret/secretBackendRootSignIntermediate.js +2 -0
- package/pkisecret/secretBackendRootSignIntermediate.js.map +1 -1
- package/pkisecret/secretBackendSign.d.ts +29 -0
- package/pkisecret/secretBackendSign.js +4 -0
- package/pkisecret/secretBackendSign.js.map +1 -1
- package/policy.d.ts +21 -0
- package/policy.js +2 -0
- package/policy.js.map +1 -1
- package/provider.d.ts +43 -3
- package/provider.js +13 -3
- package/provider.js.map +1 -1
- package/quotaLeaseCount.d.ts +21 -0
- package/quotaLeaseCount.js +2 -0
- package/quotaLeaseCount.js.map +1 -1
- package/quotaRateLimit.d.ts +48 -0
- package/quotaRateLimit.js +6 -0
- package/quotaRateLimit.js.map +1 -1
- package/rabbitmq/index.d.ts +6 -2
- package/rabbitmq/index.js +7 -22
- package/rabbitmq/index.js.map +1 -1
- package/rabbitmq/secretBackend.d.ts +36 -0
- package/rabbitmq/secretBackend.js +8 -2
- package/rabbitmq/secretBackend.js.map +1 -1
- package/rabbitmq/secretBackendRole.d.ts +23 -1
- package/rabbitmq/secretBackendRole.js +2 -0
- package/rabbitmq/secretBackendRole.js.map +1 -1
- package/raftAutopilot.d.ts +21 -0
- package/raftAutopilot.js +2 -0
- package/raftAutopilot.js.map +1 -1
- package/raftSnapshotAgentConfig.d.ts +62 -0
- package/raftSnapshotAgentConfig.js +43 -0
- package/raftSnapshotAgentConfig.js.map +1 -1
- package/rgpPolicy.d.ts +21 -0
- package/rgpPolicy.js +2 -0
- package/rgpPolicy.js.map +1 -1
- package/ssh/index.d.ts +6 -2
- package/ssh/index.js +7 -22
- package/ssh/index.js.map +1 -1
- package/ssh/secretBackendCa.d.ts +29 -0
- package/ssh/secretBackendCa.js +13 -1
- package/ssh/secretBackendCa.js.map +1 -1
- package/ssh/secretBackendRole.d.ts +23 -1
- package/ssh/secretBackendRole.js +2 -0
- package/ssh/secretBackendRole.js.map +1 -1
- package/terraformcloud/index.d.ts +9 -3
- package/terraformcloud/index.js +10 -25
- package/terraformcloud/index.js.map +1 -1
- package/terraformcloud/secretBackend.d.ts +36 -0
- package/terraformcloud/secretBackend.js +7 -1
- package/terraformcloud/secretBackend.js.map +1 -1
- package/terraformcloud/secretCreds.d.ts +21 -0
- package/terraformcloud/secretCreds.js +4 -0
- package/terraformcloud/secretCreds.js.map +1 -1
- package/terraformcloud/secretRole.d.ts +21 -0
- package/terraformcloud/secretRole.js +2 -0
- package/terraformcloud/secretRole.js.map +1 -1
- package/token.d.ts +42 -0
- package/token.js +9 -0
- package/token.js.map +1 -1
- package/tokenauth/authBackendRole.d.ts +21 -0
- package/tokenauth/authBackendRole.js +2 -0
- package/tokenauth/authBackendRole.js.map +1 -1
- package/tokenauth/index.d.ts +3 -1
- package/tokenauth/index.js +4 -19
- package/tokenauth/index.js.map +1 -1
- package/transform/index.d.ts +18 -6
- package/transform/index.js +19 -30
- package/transform/index.js.map +1 -1
- package/transform/transformation.d.ts +0 -25
- package/transform/transformation.js +0 -25
- package/transform/transformation.js.map +1 -1
- package/transit/getDecrypt.d.ts +3 -0
- package/transit/getDecrypt.js +1 -0
- package/transit/getDecrypt.js.map +1 -1
- package/transit/getEncrypt.d.ts +3 -0
- package/transit/getEncrypt.js +1 -0
- package/transit/getEncrypt.js.map +1 -1
- package/transit/index.d.ts +12 -4
- package/transit/index.js +13 -24
- package/transit/index.js.map +1 -1
- package/transit/secretBackendKey.d.ts +21 -0
- package/transit/secretBackendKey.js +2 -0
- package/transit/secretBackendKey.js.map +1 -1
- package/transit/secretCacheConfig.d.ts +21 -0
- package/transit/secretCacheConfig.js +2 -0
- package/transit/secretCacheConfig.js.map +1 -1
- package/types/index.js.map +1 -1
- package/types/input.d.ts +408 -4
- package/types/output.d.ts +409 -5
- package/utilities.js +13 -1
- package/utilities.js.map +1 -1
- package/approle/authBackendRoleSecretID.js.map +0 -1
|
@@ -157,6 +157,13 @@ export declare class SecretBackendRole extends pulumi.CustomResource {
|
|
|
157
157
|
* The name to identify this role within the backend. Must be unique within the backend.
|
|
158
158
|
*/
|
|
159
159
|
readonly name: pulumi.Output<string>;
|
|
160
|
+
/**
|
|
161
|
+
* The namespace to provision the resource in.
|
|
162
|
+
* The value should not contain leading or trailing forward slashes.
|
|
163
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
164
|
+
* *Available only for Vault Enterprise*.
|
|
165
|
+
*/
|
|
166
|
+
readonly namespace: pulumi.Output<string | undefined>;
|
|
160
167
|
/**
|
|
161
168
|
* Flag to not store certificates in the storage backend
|
|
162
169
|
*/
|
|
@@ -174,7 +181,7 @@ export declare class SecretBackendRole extends pulumi.CustomResource {
|
|
|
174
181
|
*/
|
|
175
182
|
readonly organizations: pulumi.Output<string[] | undefined>;
|
|
176
183
|
/**
|
|
177
|
-
* Specify the list of allowed policies
|
|
184
|
+
* Specify the list of allowed policies OIDs. Use with Vault 1.10 or before. For Vault 1.11+, use `policyIdentifier` blocks instead
|
|
178
185
|
*/
|
|
179
186
|
readonly policyIdentifiers: pulumi.Output<string[] | undefined>;
|
|
180
187
|
/**
|
|
@@ -327,6 +334,13 @@ export interface SecretBackendRoleState {
|
|
|
327
334
|
* The name to identify this role within the backend. Must be unique within the backend.
|
|
328
335
|
*/
|
|
329
336
|
name?: pulumi.Input<string>;
|
|
337
|
+
/**
|
|
338
|
+
* The namespace to provision the resource in.
|
|
339
|
+
* The value should not contain leading or trailing forward slashes.
|
|
340
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
341
|
+
* *Available only for Vault Enterprise*.
|
|
342
|
+
*/
|
|
343
|
+
namespace?: pulumi.Input<string>;
|
|
330
344
|
/**
|
|
331
345
|
* Flag to not store certificates in the storage backend
|
|
332
346
|
*/
|
|
@@ -344,7 +358,7 @@ export interface SecretBackendRoleState {
|
|
|
344
358
|
*/
|
|
345
359
|
organizations?: pulumi.Input<pulumi.Input<string>[]>;
|
|
346
360
|
/**
|
|
347
|
-
* Specify the list of allowed policies
|
|
361
|
+
* Specify the list of allowed policies OIDs. Use with Vault 1.10 or before. For Vault 1.11+, use `policyIdentifier` blocks instead
|
|
348
362
|
*/
|
|
349
363
|
policyIdentifiers?: pulumi.Input<pulumi.Input<string>[]>;
|
|
350
364
|
/**
|
|
@@ -489,6 +503,13 @@ export interface SecretBackendRoleArgs {
|
|
|
489
503
|
* The name to identify this role within the backend. Must be unique within the backend.
|
|
490
504
|
*/
|
|
491
505
|
name?: pulumi.Input<string>;
|
|
506
|
+
/**
|
|
507
|
+
* The namespace to provision the resource in.
|
|
508
|
+
* The value should not contain leading or trailing forward slashes.
|
|
509
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
510
|
+
* *Available only for Vault Enterprise*.
|
|
511
|
+
*/
|
|
512
|
+
namespace?: pulumi.Input<string>;
|
|
492
513
|
/**
|
|
493
514
|
* Flag to not store certificates in the storage backend
|
|
494
515
|
*/
|
|
@@ -506,7 +527,7 @@ export interface SecretBackendRoleArgs {
|
|
|
506
527
|
*/
|
|
507
528
|
organizations?: pulumi.Input<pulumi.Input<string>[]>;
|
|
508
529
|
/**
|
|
509
|
-
* Specify the list of allowed policies
|
|
530
|
+
* Specify the list of allowed policies OIDs. Use with Vault 1.10 or before. For Vault 1.11+, use `policyIdentifier` blocks instead
|
|
510
531
|
*/
|
|
511
532
|
policyIdentifiers?: pulumi.Input<pulumi.Input<string>[]>;
|
|
512
533
|
/**
|
|
@@ -74,6 +74,7 @@ class SecretBackendRole extends pulumi.CustomResource {
|
|
|
74
74
|
resourceInputs["localities"] = state ? state.localities : undefined;
|
|
75
75
|
resourceInputs["maxTtl"] = state ? state.maxTtl : undefined;
|
|
76
76
|
resourceInputs["name"] = state ? state.name : undefined;
|
|
77
|
+
resourceInputs["namespace"] = state ? state.namespace : undefined;
|
|
77
78
|
resourceInputs["noStore"] = state ? state.noStore : undefined;
|
|
78
79
|
resourceInputs["notBeforeDuration"] = state ? state.notBeforeDuration : undefined;
|
|
79
80
|
resourceInputs["organizationUnit"] = state ? state.organizationUnit : undefined;
|
|
@@ -119,6 +120,7 @@ class SecretBackendRole extends pulumi.CustomResource {
|
|
|
119
120
|
resourceInputs["localities"] = args ? args.localities : undefined;
|
|
120
121
|
resourceInputs["maxTtl"] = args ? args.maxTtl : undefined;
|
|
121
122
|
resourceInputs["name"] = args ? args.name : undefined;
|
|
123
|
+
resourceInputs["namespace"] = args ? args.namespace : undefined;
|
|
122
124
|
resourceInputs["noStore"] = args ? args.noStore : undefined;
|
|
123
125
|
resourceInputs["notBeforeDuration"] = args ? args.notBeforeDuration : undefined;
|
|
124
126
|
resourceInputs["organizationUnit"] = args ? args.organizationUnit : undefined;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretBackendRole.js","sourceRoot":"","sources":["../../pkisecret/secretBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAoCG;AACH,MAAa,iBAAkB,SAAQ,MAAM,CAAC,cAAc;
|
|
1
|
+
{"version":3,"file":"secretBackendRole.js","sourceRoot":"","sources":["../../pkisecret/secretBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAoCG;AACH,MAAa,iBAAkB,SAAQ,MAAM,CAAC,cAAc;IAyMxD,YAAY,IAAY,EAAE,WAA4D,EAAE,IAAmC;QACvH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAiD,CAAC;YAChE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,+BAA+B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,6BAA6B,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1G,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;SACvE;aAAM;YACH,MAAM,IAAI,GAAG,WAAgD,CAAC;YAC9D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,+BAA+B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,6BAA6B,CAAC,CAAC,CAAC,SAAS,CAAC;YACxG,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;SACrE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,iBAAiB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACtE,CAAC;IArSD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA8B,EAAE,IAAmC;QAC5H,OAAO,IAAI,iBAAiB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACxE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,iBAAiB,CAAC,YAAY,CAAC;IAClE,CAAC;;AA1BL,8CAuSC;AAzRG,gBAAgB;AACO,8BAAY,GAAG,qDAAqD,CAAC"}
|
|
@@ -87,10 +87,27 @@ export declare class SecretBackendRootCert extends pulumi.CustomResource {
|
|
|
87
87
|
* The locality
|
|
88
88
|
*/
|
|
89
89
|
readonly locality: pulumi.Output<string | undefined>;
|
|
90
|
+
/**
|
|
91
|
+
* The ID of the previously configured managed key. This field is
|
|
92
|
+
* required if `type` is `kms` and it conflicts with `managedKeyName`
|
|
93
|
+
*/
|
|
94
|
+
readonly managedKeyId: pulumi.Output<string>;
|
|
95
|
+
/**
|
|
96
|
+
* The name of the previously configured managed key. This field is
|
|
97
|
+
* required if `type` is `kms` and it conflicts with `managedKeyId`
|
|
98
|
+
*/
|
|
99
|
+
readonly managedKeyName: pulumi.Output<string>;
|
|
90
100
|
/**
|
|
91
101
|
* The maximum path length to encode in the generated certificate
|
|
92
102
|
*/
|
|
93
103
|
readonly maxPathLength: pulumi.Output<number | undefined>;
|
|
104
|
+
/**
|
|
105
|
+
* The namespace to provision the resource in.
|
|
106
|
+
* The value should not contain leading or trailing forward slashes.
|
|
107
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
108
|
+
* *Available only for Vault Enterprise*.
|
|
109
|
+
*/
|
|
110
|
+
readonly namespace: pulumi.Output<string | undefined>;
|
|
94
111
|
/**
|
|
95
112
|
* The organization
|
|
96
113
|
*/
|
|
@@ -138,7 +155,8 @@ export declare class SecretBackendRootCert extends pulumi.CustomResource {
|
|
|
138
155
|
*/
|
|
139
156
|
readonly ttl: pulumi.Output<string | undefined>;
|
|
140
157
|
/**
|
|
141
|
-
* Type of intermediate to create. Must be either \"exported\"
|
|
158
|
+
* Type of intermediate to create. Must be either \"exported\", \"internal\"
|
|
159
|
+
* or \"kms\"
|
|
142
160
|
*/
|
|
143
161
|
readonly type: pulumi.Output<string>;
|
|
144
162
|
/**
|
|
@@ -206,10 +224,27 @@ export interface SecretBackendRootCertState {
|
|
|
206
224
|
* The locality
|
|
207
225
|
*/
|
|
208
226
|
locality?: pulumi.Input<string>;
|
|
227
|
+
/**
|
|
228
|
+
* The ID of the previously configured managed key. This field is
|
|
229
|
+
* required if `type` is `kms` and it conflicts with `managedKeyName`
|
|
230
|
+
*/
|
|
231
|
+
managedKeyId?: pulumi.Input<string>;
|
|
232
|
+
/**
|
|
233
|
+
* The name of the previously configured managed key. This field is
|
|
234
|
+
* required if `type` is `kms` and it conflicts with `managedKeyId`
|
|
235
|
+
*/
|
|
236
|
+
managedKeyName?: pulumi.Input<string>;
|
|
209
237
|
/**
|
|
210
238
|
* The maximum path length to encode in the generated certificate
|
|
211
239
|
*/
|
|
212
240
|
maxPathLength?: pulumi.Input<number>;
|
|
241
|
+
/**
|
|
242
|
+
* The namespace to provision the resource in.
|
|
243
|
+
* The value should not contain leading or trailing forward slashes.
|
|
244
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
245
|
+
* *Available only for Vault Enterprise*.
|
|
246
|
+
*/
|
|
247
|
+
namespace?: pulumi.Input<string>;
|
|
213
248
|
/**
|
|
214
249
|
* The organization
|
|
215
250
|
*/
|
|
@@ -257,7 +292,8 @@ export interface SecretBackendRootCertState {
|
|
|
257
292
|
*/
|
|
258
293
|
ttl?: pulumi.Input<string>;
|
|
259
294
|
/**
|
|
260
|
-
* Type of intermediate to create. Must be either \"exported\"
|
|
295
|
+
* Type of intermediate to create. Must be either \"exported\", \"internal\"
|
|
296
|
+
* or \"kms\"
|
|
261
297
|
*/
|
|
262
298
|
type?: pulumi.Input<string>;
|
|
263
299
|
/**
|
|
@@ -309,10 +345,27 @@ export interface SecretBackendRootCertArgs {
|
|
|
309
345
|
* The locality
|
|
310
346
|
*/
|
|
311
347
|
locality?: pulumi.Input<string>;
|
|
348
|
+
/**
|
|
349
|
+
* The ID of the previously configured managed key. This field is
|
|
350
|
+
* required if `type` is `kms` and it conflicts with `managedKeyName`
|
|
351
|
+
*/
|
|
352
|
+
managedKeyId?: pulumi.Input<string>;
|
|
353
|
+
/**
|
|
354
|
+
* The name of the previously configured managed key. This field is
|
|
355
|
+
* required if `type` is `kms` and it conflicts with `managedKeyId`
|
|
356
|
+
*/
|
|
357
|
+
managedKeyName?: pulumi.Input<string>;
|
|
312
358
|
/**
|
|
313
359
|
* The maximum path length to encode in the generated certificate
|
|
314
360
|
*/
|
|
315
361
|
maxPathLength?: pulumi.Input<number>;
|
|
362
|
+
/**
|
|
363
|
+
* The namespace to provision the resource in.
|
|
364
|
+
* The value should not contain leading or trailing forward slashes.
|
|
365
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
366
|
+
* *Available only for Vault Enterprise*.
|
|
367
|
+
*/
|
|
368
|
+
namespace?: pulumi.Input<string>;
|
|
316
369
|
/**
|
|
317
370
|
* The organization
|
|
318
371
|
*/
|
|
@@ -350,7 +403,8 @@ export interface SecretBackendRootCertArgs {
|
|
|
350
403
|
*/
|
|
351
404
|
ttl?: pulumi.Input<string>;
|
|
352
405
|
/**
|
|
353
|
-
* Type of intermediate to create. Must be either \"exported\"
|
|
406
|
+
* Type of intermediate to create. Must be either \"exported\", \"internal\"
|
|
407
|
+
* or \"kms\"
|
|
354
408
|
*/
|
|
355
409
|
type: pulumi.Input<string>;
|
|
356
410
|
/**
|
|
@@ -47,7 +47,10 @@ class SecretBackendRootCert extends pulumi.CustomResource {
|
|
|
47
47
|
resourceInputs["keyBits"] = state ? state.keyBits : undefined;
|
|
48
48
|
resourceInputs["keyType"] = state ? state.keyType : undefined;
|
|
49
49
|
resourceInputs["locality"] = state ? state.locality : undefined;
|
|
50
|
+
resourceInputs["managedKeyId"] = state ? state.managedKeyId : undefined;
|
|
51
|
+
resourceInputs["managedKeyName"] = state ? state.managedKeyName : undefined;
|
|
50
52
|
resourceInputs["maxPathLength"] = state ? state.maxPathLength : undefined;
|
|
53
|
+
resourceInputs["namespace"] = state ? state.namespace : undefined;
|
|
51
54
|
resourceInputs["organization"] = state ? state.organization : undefined;
|
|
52
55
|
resourceInputs["otherSans"] = state ? state.otherSans : undefined;
|
|
53
56
|
resourceInputs["ou"] = state ? state.ou : undefined;
|
|
@@ -83,7 +86,10 @@ class SecretBackendRootCert extends pulumi.CustomResource {
|
|
|
83
86
|
resourceInputs["keyBits"] = args ? args.keyBits : undefined;
|
|
84
87
|
resourceInputs["keyType"] = args ? args.keyType : undefined;
|
|
85
88
|
resourceInputs["locality"] = args ? args.locality : undefined;
|
|
89
|
+
resourceInputs["managedKeyId"] = args ? args.managedKeyId : undefined;
|
|
90
|
+
resourceInputs["managedKeyName"] = args ? args.managedKeyName : undefined;
|
|
86
91
|
resourceInputs["maxPathLength"] = args ? args.maxPathLength : undefined;
|
|
92
|
+
resourceInputs["namespace"] = args ? args.namespace : undefined;
|
|
87
93
|
resourceInputs["organization"] = args ? args.organization : undefined;
|
|
88
94
|
resourceInputs["otherSans"] = args ? args.otherSans : undefined;
|
|
89
95
|
resourceInputs["ou"] = args ? args.ou : undefined;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretBackendRootCert.js","sourceRoot":"","sources":["../../pkisecret/secretBackendRootCert.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;GAuBG;AACH,MAAa,qBAAsB,SAAQ,MAAM,CAAC,cAAc;
|
|
1
|
+
{"version":3,"file":"secretBackendRootCert.js","sourceRoot":"","sources":["../../pkisecret/secretBackendRootCert.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;GAuBG;AACH,MAAa,qBAAsB,SAAQ,MAAM,CAAC,cAAc;IAiK5D,YAAY,IAAY,EAAE,WAAoE,EAAE,IAAmC;QAC/H,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAqD,CAAC;YACpE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,IAAI,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,EAAE,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,cAAc,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;SACjE;aAAM;YACH,MAAM,IAAI,GAAG,WAAoD,CAAC;YAClE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,UAAU,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACvD,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,IAAI,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,cAAc,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,aAAa,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAClD,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAChD,cAAc,CAAC,QAAQ,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC7C,cAAc,CAAC,cAAc,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACtD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,qBAAqB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC1E,CAAC;IA7OD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAkC,EAAE,IAAmC;QAChI,OAAO,IAAI,qBAAqB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC5E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,qBAAqB,CAAC,YAAY,CAAC;IACtE,CAAC;;AA1BL,sDA+OC;AAjOG,gBAAgB;AACO,kCAAY,GAAG,6DAA6D,CAAC"}
|
|
@@ -96,6 +96,13 @@ export declare class SecretBackendRootSignIntermediate extends pulumi.CustomReso
|
|
|
96
96
|
* The maximum path length to encode in the generated certificate
|
|
97
97
|
*/
|
|
98
98
|
readonly maxPathLength: pulumi.Output<number | undefined>;
|
|
99
|
+
/**
|
|
100
|
+
* The namespace to provision the resource in.
|
|
101
|
+
* The value should not contain leading or trailing forward slashes.
|
|
102
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
103
|
+
* *Available only for Vault Enterprise*.
|
|
104
|
+
*/
|
|
105
|
+
readonly namespace: pulumi.Output<string | undefined>;
|
|
99
106
|
/**
|
|
100
107
|
* The organization
|
|
101
108
|
*/
|
|
@@ -220,6 +227,13 @@ export interface SecretBackendRootSignIntermediateState {
|
|
|
220
227
|
* The maximum path length to encode in the generated certificate
|
|
221
228
|
*/
|
|
222
229
|
maxPathLength?: pulumi.Input<number>;
|
|
230
|
+
/**
|
|
231
|
+
* The namespace to provision the resource in.
|
|
232
|
+
* The value should not contain leading or trailing forward slashes.
|
|
233
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
234
|
+
* *Available only for Vault Enterprise*.
|
|
235
|
+
*/
|
|
236
|
+
namespace?: pulumi.Input<string>;
|
|
223
237
|
/**
|
|
224
238
|
* The organization
|
|
225
239
|
*/
|
|
@@ -319,6 +333,13 @@ export interface SecretBackendRootSignIntermediateArgs {
|
|
|
319
333
|
* The maximum path length to encode in the generated certificate
|
|
320
334
|
*/
|
|
321
335
|
maxPathLength?: pulumi.Input<number>;
|
|
336
|
+
/**
|
|
337
|
+
* The namespace to provision the resource in.
|
|
338
|
+
* The value should not contain leading or trailing forward slashes.
|
|
339
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
340
|
+
* *Available only for Vault Enterprise*.
|
|
341
|
+
*/
|
|
342
|
+
namespace?: pulumi.Input<string>;
|
|
322
343
|
/**
|
|
323
344
|
* The organization
|
|
324
345
|
*/
|
|
@@ -49,6 +49,7 @@ class SecretBackendRootSignIntermediate extends pulumi.CustomResource {
|
|
|
49
49
|
resourceInputs["issuingCa"] = state ? state.issuingCa : undefined;
|
|
50
50
|
resourceInputs["locality"] = state ? state.locality : undefined;
|
|
51
51
|
resourceInputs["maxPathLength"] = state ? state.maxPathLength : undefined;
|
|
52
|
+
resourceInputs["namespace"] = state ? state.namespace : undefined;
|
|
52
53
|
resourceInputs["organization"] = state ? state.organization : undefined;
|
|
53
54
|
resourceInputs["otherSans"] = state ? state.otherSans : undefined;
|
|
54
55
|
resourceInputs["ou"] = state ? state.ou : undefined;
|
|
@@ -84,6 +85,7 @@ class SecretBackendRootSignIntermediate extends pulumi.CustomResource {
|
|
|
84
85
|
resourceInputs["ipSans"] = args ? args.ipSans : undefined;
|
|
85
86
|
resourceInputs["locality"] = args ? args.locality : undefined;
|
|
86
87
|
resourceInputs["maxPathLength"] = args ? args.maxPathLength : undefined;
|
|
88
|
+
resourceInputs["namespace"] = args ? args.namespace : undefined;
|
|
87
89
|
resourceInputs["organization"] = args ? args.organization : undefined;
|
|
88
90
|
resourceInputs["otherSans"] = args ? args.otherSans : undefined;
|
|
89
91
|
resourceInputs["ou"] = args ? args.ou : undefined;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretBackendRootSignIntermediate.js","sourceRoot":"","sources":["../../pkisecret/secretBackendRootSignIntermediate.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;GAuBG;AACH,MAAa,iCAAkC,SAAQ,MAAM,CAAC,cAAc;
|
|
1
|
+
{"version":3,"file":"secretBackendRootSignIntermediate.js","sourceRoot":"","sources":["../../pkisecret/secretBackendRootSignIntermediate.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;GAuBG;AACH,MAAa,iCAAkC,SAAQ,MAAM,CAAC,cAAc;IA2JxE,YAAY,IAAY,EAAE,WAA4F,EAAE,IAAmC;QACvJ,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAiE,CAAC;YAChF,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,IAAI,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,EAAE,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,cAAc,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3E;aAAM;YACH,MAAM,IAAI,GAAG,WAAgE,CAAC;YAC9E,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,UAAU,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACvD,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,GAAG,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAChD,MAAM,IAAI,KAAK,CAAC,iCAAiC,CAAC,CAAC;aACtD;YACD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,IAAI,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC,CAAC,SAAS,CAAC;YAClD,cAAc,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,UAAU,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC/C,cAAc,CAAC,aAAa,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAClD,cAAc,CAAC,mBAAmB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACxD,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAChD,cAAc,CAAC,QAAQ,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC7C,cAAc,CAAC,cAAc,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACtD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,iCAAiC,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACtF,CAAC;IArOD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA8C,EAAE,IAAmC;QAC5I,OAAO,IAAI,iCAAiC,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACxF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,iCAAiC,CAAC,YAAY,CAAC;IAClF,CAAC;;AA1BL,8EAuOC;AAzNG,gBAAgB;AACO,8CAAY,GAAG,qFAAqF,CAAC"}
|
|
@@ -117,10 +117,21 @@ export declare class SecretBackendSign extends pulumi.CustomResource {
|
|
|
117
117
|
* Name of the role to create the certificate against
|
|
118
118
|
*/
|
|
119
119
|
readonly name: pulumi.Output<string>;
|
|
120
|
+
/**
|
|
121
|
+
* The namespace to provision the resource in.
|
|
122
|
+
* The value should not contain leading or trailing forward slashes.
|
|
123
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
124
|
+
* *Available only for Vault Enterprise*.
|
|
125
|
+
*/
|
|
126
|
+
readonly namespace: pulumi.Output<string | undefined>;
|
|
120
127
|
/**
|
|
121
128
|
* List of other SANs
|
|
122
129
|
*/
|
|
123
130
|
readonly otherSans: pulumi.Output<string[] | undefined>;
|
|
131
|
+
/**
|
|
132
|
+
* `true` if the current time (during refresh) is after the start of the early renewal window declared by `minSecondsRemaining`, and `false` otherwise; if `autoRenew` is set to `true` then the provider will plan to replace the certificate once renewal is pending.
|
|
133
|
+
*/
|
|
134
|
+
readonly renewPending: pulumi.Output<boolean>;
|
|
124
135
|
/**
|
|
125
136
|
* The serial number.
|
|
126
137
|
*
|
|
@@ -208,10 +219,21 @@ export interface SecretBackendSignState {
|
|
|
208
219
|
* Name of the role to create the certificate against
|
|
209
220
|
*/
|
|
210
221
|
name?: pulumi.Input<string>;
|
|
222
|
+
/**
|
|
223
|
+
* The namespace to provision the resource in.
|
|
224
|
+
* The value should not contain leading or trailing forward slashes.
|
|
225
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
226
|
+
* *Available only for Vault Enterprise*.
|
|
227
|
+
*/
|
|
228
|
+
namespace?: pulumi.Input<string>;
|
|
211
229
|
/**
|
|
212
230
|
* List of other SANs
|
|
213
231
|
*/
|
|
214
232
|
otherSans?: pulumi.Input<pulumi.Input<string>[]>;
|
|
233
|
+
/**
|
|
234
|
+
* `true` if the current time (during refresh) is after the start of the early renewal window declared by `minSecondsRemaining`, and `false` otherwise; if `autoRenew` is set to `true` then the provider will plan to replace the certificate once renewal is pending.
|
|
235
|
+
*/
|
|
236
|
+
renewPending?: pulumi.Input<boolean>;
|
|
215
237
|
/**
|
|
216
238
|
* The serial number.
|
|
217
239
|
*
|
|
@@ -275,6 +297,13 @@ export interface SecretBackendSignArgs {
|
|
|
275
297
|
* Name of the role to create the certificate against
|
|
276
298
|
*/
|
|
277
299
|
name?: pulumi.Input<string>;
|
|
300
|
+
/**
|
|
301
|
+
* The namespace to provision the resource in.
|
|
302
|
+
* The value should not contain leading or trailing forward slashes.
|
|
303
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
304
|
+
* *Available only for Vault Enterprise*.
|
|
305
|
+
*/
|
|
306
|
+
namespace?: pulumi.Input<string>;
|
|
278
307
|
/**
|
|
279
308
|
* List of other SANs
|
|
280
309
|
*/
|
|
@@ -71,7 +71,9 @@ class SecretBackendSign extends pulumi.CustomResource {
|
|
|
71
71
|
resourceInputs["issuingCa"] = state ? state.issuingCa : undefined;
|
|
72
72
|
resourceInputs["minSecondsRemaining"] = state ? state.minSecondsRemaining : undefined;
|
|
73
73
|
resourceInputs["name"] = state ? state.name : undefined;
|
|
74
|
+
resourceInputs["namespace"] = state ? state.namespace : undefined;
|
|
74
75
|
resourceInputs["otherSans"] = state ? state.otherSans : undefined;
|
|
76
|
+
resourceInputs["renewPending"] = state ? state.renewPending : undefined;
|
|
75
77
|
resourceInputs["serial"] = state ? state.serial : undefined;
|
|
76
78
|
resourceInputs["serialNumber"] = state ? state.serialNumber : undefined;
|
|
77
79
|
resourceInputs["ttl"] = state ? state.ttl : undefined;
|
|
@@ -98,6 +100,7 @@ class SecretBackendSign extends pulumi.CustomResource {
|
|
|
98
100
|
resourceInputs["ipSans"] = args ? args.ipSans : undefined;
|
|
99
101
|
resourceInputs["minSecondsRemaining"] = args ? args.minSecondsRemaining : undefined;
|
|
100
102
|
resourceInputs["name"] = args ? args.name : undefined;
|
|
103
|
+
resourceInputs["namespace"] = args ? args.namespace : undefined;
|
|
101
104
|
resourceInputs["otherSans"] = args ? args.otherSans : undefined;
|
|
102
105
|
resourceInputs["ttl"] = args ? args.ttl : undefined;
|
|
103
106
|
resourceInputs["uriSans"] = args ? args.uriSans : undefined;
|
|
@@ -105,6 +108,7 @@ class SecretBackendSign extends pulumi.CustomResource {
|
|
|
105
108
|
resourceInputs["certificate"] = undefined /*out*/;
|
|
106
109
|
resourceInputs["expiration"] = undefined /*out*/;
|
|
107
110
|
resourceInputs["issuingCa"] = undefined /*out*/;
|
|
111
|
+
resourceInputs["renewPending"] = undefined /*out*/;
|
|
108
112
|
resourceInputs["serial"] = undefined /*out*/;
|
|
109
113
|
resourceInputs["serialNumber"] = undefined /*out*/;
|
|
110
114
|
}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretBackendSign.js","sourceRoot":"","sources":["../../pkisecret/secretBackendSign.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA6CG;AACH,MAAa,iBAAkB,SAAQ,MAAM,CAAC,cAAc;
|
|
1
|
+
{"version":3,"file":"secretBackendSign.js","sourceRoot":"","sources":["../../pkisecret/secretBackendSign.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA6CG;AACH,MAAa,iBAAkB,SAAQ,MAAM,CAAC,cAAc;IA8HxD,YAAY,IAAY,EAAE,WAA4D,EAAE,IAAmC;QACvH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAiD,CAAC;YAChE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;SACjE;aAAM;YACH,MAAM,IAAI,GAAG,WAAgD,CAAC;YAC9D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,UAAU,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACvD,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,GAAG,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAChD,MAAM,IAAI,KAAK,CAAC,iCAAiC,CAAC,CAAC;aACtD;YACD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,UAAU,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC/C,cAAc,CAAC,aAAa,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAClD,cAAc,CAAC,YAAY,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACjD,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAChD,cAAc,CAAC,cAAc,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACnD,cAAc,CAAC,QAAQ,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC7C,cAAc,CAAC,cAAc,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACtD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,iBAAiB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACtE,CAAC;IA1LD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA8B,EAAE,IAAmC;QAC5H,OAAO,IAAI,iBAAiB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACxE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,iBAAiB,CAAC,YAAY,CAAC;IAClE,CAAC;;AA1BL,8CA4LC;AA9KG,gBAAgB;AACO,8BAAY,GAAG,qDAAqD,CAAC"}
|
package/policy.d.ts
CHANGED
|
@@ -28,6 +28,13 @@ export declare class Policy extends pulumi.CustomResource {
|
|
|
28
28
|
* The name of the policy
|
|
29
29
|
*/
|
|
30
30
|
readonly name: pulumi.Output<string>;
|
|
31
|
+
/**
|
|
32
|
+
* The namespace to provision the resource in.
|
|
33
|
+
* The value should not contain leading or trailing forward slashes.
|
|
34
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
35
|
+
* *Available only for Vault Enterprise*.
|
|
36
|
+
*/
|
|
37
|
+
readonly namespace: pulumi.Output<string | undefined>;
|
|
31
38
|
/**
|
|
32
39
|
* String containing a Vault policy
|
|
33
40
|
*/
|
|
@@ -49,6 +56,13 @@ export interface PolicyState {
|
|
|
49
56
|
* The name of the policy
|
|
50
57
|
*/
|
|
51
58
|
name?: pulumi.Input<string>;
|
|
59
|
+
/**
|
|
60
|
+
* The namespace to provision the resource in.
|
|
61
|
+
* The value should not contain leading or trailing forward slashes.
|
|
62
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
63
|
+
* *Available only for Vault Enterprise*.
|
|
64
|
+
*/
|
|
65
|
+
namespace?: pulumi.Input<string>;
|
|
52
66
|
/**
|
|
53
67
|
* String containing a Vault policy
|
|
54
68
|
*/
|
|
@@ -62,6 +76,13 @@ export interface PolicyArgs {
|
|
|
62
76
|
* The name of the policy
|
|
63
77
|
*/
|
|
64
78
|
name?: pulumi.Input<string>;
|
|
79
|
+
/**
|
|
80
|
+
* The namespace to provision the resource in.
|
|
81
|
+
* The value should not contain leading or trailing forward slashes.
|
|
82
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
83
|
+
* *Available only for Vault Enterprise*.
|
|
84
|
+
*/
|
|
85
|
+
namespace?: pulumi.Input<string>;
|
|
65
86
|
/**
|
|
66
87
|
* String containing a Vault policy
|
|
67
88
|
*/
|
package/policy.js
CHANGED
|
@@ -21,6 +21,7 @@ class Policy extends pulumi.CustomResource {
|
|
|
21
21
|
if (opts.id) {
|
|
22
22
|
const state = argsOrState;
|
|
23
23
|
resourceInputs["name"] = state ? state.name : undefined;
|
|
24
|
+
resourceInputs["namespace"] = state ? state.namespace : undefined;
|
|
24
25
|
resourceInputs["policy"] = state ? state.policy : undefined;
|
|
25
26
|
}
|
|
26
27
|
else {
|
|
@@ -29,6 +30,7 @@ class Policy extends pulumi.CustomResource {
|
|
|
29
30
|
throw new Error("Missing required property 'policy'");
|
|
30
31
|
}
|
|
31
32
|
resourceInputs["name"] = args ? args.name : undefined;
|
|
33
|
+
resourceInputs["namespace"] = args ? args.namespace : undefined;
|
|
32
34
|
resourceInputs["policy"] = args ? args.policy : undefined;
|
|
33
35
|
}
|
|
34
36
|
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
package/policy.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"policy.js","sourceRoot":"","sources":["../policy.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;GAQG;AACH,MAAa,MAAO,SAAQ,MAAM,CAAC,cAAc;
|
|
1
|
+
{"version":3,"file":"policy.js","sourceRoot":"","sources":["../policy.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;GAQG;AACH,MAAa,MAAO,SAAQ,MAAM,CAAC,cAAc;IAoD7C,YAAY,IAAY,EAAE,WAAsC,EAAE,IAAmC;QACjG,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAsC,CAAC;YACrD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAAqC,CAAC;YACnD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,MAAM,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC3D,CAAC;IAtED;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAmB,EAAE,IAAmC;QACjH,OAAO,IAAI,MAAM,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC7D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,MAAM,CAAC,YAAY,CAAC;IACvD,CAAC;;AA1BL,wBAwEC;AA1DG,gBAAgB;AACO,mBAAY,GAAG,2BAA2B,CAAC"}
|
package/provider.d.ts
CHANGED
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
-
import
|
|
2
|
+
import * as inputs from "./types/input";
|
|
3
3
|
/**
|
|
4
4
|
* The provider type for the vault package. By default, resources use package-wide configuration
|
|
5
5
|
* settings, however an explicit `Provider` instance may be created and passed during resource
|
|
@@ -68,7 +68,47 @@ export interface ProviderArgs {
|
|
|
68
68
|
/**
|
|
69
69
|
* Login to vault with an existing auth method using auth/<mount>/login
|
|
70
70
|
*/
|
|
71
|
-
|
|
71
|
+
authLogin?: pulumi.Input<inputs.ProviderAuthLogin>;
|
|
72
|
+
/**
|
|
73
|
+
* Login to vault using the AWS method
|
|
74
|
+
*/
|
|
75
|
+
authLoginAws?: pulumi.Input<inputs.ProviderAuthLoginAws>;
|
|
76
|
+
/**
|
|
77
|
+
* Login to vault using the azure method
|
|
78
|
+
*/
|
|
79
|
+
authLoginAzure?: pulumi.Input<inputs.ProviderAuthLoginAzure>;
|
|
80
|
+
/**
|
|
81
|
+
* Login to vault using the cert method
|
|
82
|
+
*/
|
|
83
|
+
authLoginCert?: pulumi.Input<inputs.ProviderAuthLoginCert>;
|
|
84
|
+
/**
|
|
85
|
+
* Login to vault using the gcp method
|
|
86
|
+
*/
|
|
87
|
+
authLoginGcp?: pulumi.Input<inputs.ProviderAuthLoginGcp>;
|
|
88
|
+
/**
|
|
89
|
+
* Login to vault using the jwt method
|
|
90
|
+
*/
|
|
91
|
+
authLoginJwt?: pulumi.Input<inputs.ProviderAuthLoginJwt>;
|
|
92
|
+
/**
|
|
93
|
+
* Login to vault using the kerberos method
|
|
94
|
+
*/
|
|
95
|
+
authLoginKerberos?: pulumi.Input<inputs.ProviderAuthLoginKerberos>;
|
|
96
|
+
/**
|
|
97
|
+
* Login to vault using the OCI method
|
|
98
|
+
*/
|
|
99
|
+
authLoginOci?: pulumi.Input<inputs.ProviderAuthLoginOci>;
|
|
100
|
+
/**
|
|
101
|
+
* Login to vault using the oidc method
|
|
102
|
+
*/
|
|
103
|
+
authLoginOidc?: pulumi.Input<inputs.ProviderAuthLoginOidc>;
|
|
104
|
+
/**
|
|
105
|
+
* Login to vault using the radius method
|
|
106
|
+
*/
|
|
107
|
+
authLoginRadius?: pulumi.Input<inputs.ProviderAuthLoginRadius>;
|
|
108
|
+
/**
|
|
109
|
+
* Login to vault using the userpass method
|
|
110
|
+
*/
|
|
111
|
+
authLoginUserpass?: pulumi.Input<inputs.ProviderAuthLoginUserpass>;
|
|
72
112
|
/**
|
|
73
113
|
* Path to directory containing CA certificate files to validate the server's certificate.
|
|
74
114
|
*/
|
|
@@ -80,7 +120,7 @@ export interface ProviderArgs {
|
|
|
80
120
|
/**
|
|
81
121
|
* Client authentication credentials.
|
|
82
122
|
*/
|
|
83
|
-
|
|
123
|
+
clientAuth?: pulumi.Input<inputs.ProviderClientAuth>;
|
|
84
124
|
/**
|
|
85
125
|
* The headers to send with each Vault request.
|
|
86
126
|
*/
|