@pulumi/vault 5.6.0 → 5.7.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/ad/getAccessCredentials.d.ts +15 -0
- package/ad/getAccessCredentials.js +1 -0
- package/ad/getAccessCredentials.js.map +1 -1
- package/ad/index.d.ts +12 -4
- package/ad/index.js +13 -26
- package/ad/index.js.map +1 -1
- package/ad/secretBackend.d.ts +39 -0
- package/ad/secretBackend.js +9 -3
- package/ad/secretBackend.js.map +1 -1
- package/ad/secretLibrary.d.ts +21 -0
- package/ad/secretLibrary.js +2 -0
- package/ad/secretLibrary.js.map +1 -1
- package/ad/secretRole.d.ts +21 -0
- package/ad/secretRole.js +2 -0
- package/ad/secretRole.js.map +1 -1
- package/alicloud/authBackendRole.d.ts +21 -0
- package/alicloud/authBackendRole.js +2 -0
- package/alicloud/authBackendRole.js.map +1 -1
- package/alicloud/index.d.ts +3 -1
- package/alicloud/index.js +4 -19
- package/alicloud/index.js.map +1 -1
- package/approle/authBackendLogin.d.ts +22 -1
- package/approle/authBackendLogin.js +3 -1
- package/approle/authBackendLogin.js.map +1 -1
- package/approle/authBackendRole.d.ts +21 -0
- package/approle/authBackendRole.js +2 -0
- package/approle/authBackendRole.js.map +1 -1
- package/approle/{authBackendRoleSecretID.d.ts → authBackendRoleSecretId.d.ts} +33 -12
- package/approle/{authBackendRoleSecretID.js → authBackendRoleSecretId.js} +16 -12
- package/approle/authBackendRoleSecretId.js.map +1 -0
- package/approle/getAuthBackendRoleId.d.ts +15 -0
- package/approle/getAuthBackendRoleId.js +1 -0
- package/approle/getAuthBackendRoleId.js.map +1 -1
- package/approle/index.d.ts +12 -4
- package/approle/index.js +15 -28
- package/approle/index.js.map +1 -1
- package/audit.d.ts +21 -0
- package/audit.js +2 -0
- package/audit.js.map +1 -1
- package/authBackend.d.ts +47 -10
- package/authBackend.js +4 -0
- package/authBackend.js.map +1 -1
- package/aws/authBackendCert.d.ts +21 -0
- package/aws/authBackendCert.js +2 -0
- package/aws/authBackendCert.js.map +1 -1
- package/aws/authBackendClient.d.ts +21 -0
- package/aws/authBackendClient.js +6 -2
- package/aws/authBackendClient.js.map +1 -1
- package/aws/authBackendIdentityWhitelist.d.ts +21 -0
- package/aws/authBackendIdentityWhitelist.js +2 -0
- package/aws/authBackendIdentityWhitelist.js.map +1 -1
- package/aws/authBackendLogin.d.ts +21 -0
- package/aws/authBackendLogin.js +4 -0
- package/aws/authBackendLogin.js.map +1 -1
- package/aws/authBackendRole.d.ts +21 -0
- package/aws/authBackendRole.js +2 -0
- package/aws/authBackendRole.js.map +1 -1
- package/aws/authBackendRoleTag.d.ts +21 -0
- package/aws/authBackendRoleTag.js +2 -0
- package/aws/authBackendRoleTag.js.map +1 -1
- package/aws/authBackendRoletagBlacklist.d.ts +21 -0
- package/aws/authBackendRoletagBlacklist.js +2 -0
- package/aws/authBackendRoletagBlacklist.js.map +1 -1
- package/aws/authBackendStsRole.d.ts +21 -0
- package/aws/authBackendStsRole.js +2 -0
- package/aws/authBackendStsRole.js.map +1 -1
- package/aws/getAccessCredentials.d.ts +15 -0
- package/aws/getAccessCredentials.js +1 -0
- package/aws/getAccessCredentials.js.map +1 -1
- package/aws/index.d.ts +33 -11
- package/aws/index.js +34 -47
- package/aws/index.js.map +1 -1
- package/aws/secretBackend.d.ts +36 -12
- package/aws/secretBackend.js +8 -14
- package/aws/secretBackend.js.map +1 -1
- package/aws/secretBackendRole.d.ts +21 -0
- package/aws/secretBackendRole.js +2 -0
- package/aws/secretBackendRole.js.map +1 -1
- package/azure/authBackendConfig.d.ts +21 -0
- package/azure/authBackendConfig.js +7 -3
- package/azure/authBackendConfig.js.map +1 -1
- package/azure/authBackendRole.d.ts +21 -0
- package/azure/authBackendRole.js +2 -0
- package/azure/authBackendRole.js.map +1 -1
- package/azure/backend.d.ts +36 -0
- package/azure/backend.js +10 -4
- package/azure/backend.js.map +1 -1
- package/azure/backendRole.d.ts +23 -1
- package/azure/backendRole.js +2 -0
- package/azure/backendRole.js.map +1 -1
- package/azure/getAccessCredentials.d.ts +15 -0
- package/azure/getAccessCredentials.js +1 -0
- package/azure/getAccessCredentials.js.map +1 -1
- package/azure/index.d.ts +15 -5
- package/azure/index.js +16 -29
- package/azure/index.js.map +1 -1
- package/certAuthBackendRole.d.ts +39 -3
- package/certAuthBackendRole.js +4 -0
- package/certAuthBackendRole.js.map +1 -1
- package/config/vars.d.ts +43 -3
- package/config/vars.js +64 -4
- package/config/vars.js.map +1 -1
- package/consul/index.d.ts +6 -2
- package/consul/index.js +7 -22
- package/consul/index.js.map +1 -1
- package/consul/secretBackend.d.ts +87 -15
- package/consul/secretBackend.js +24 -7
- package/consul/secretBackend.js.map +1 -1
- package/consul/secretBackendRole.d.ts +93 -10
- package/consul/secretBackendRole.js +14 -1
- package/consul/secretBackendRole.js.map +1 -1
- package/database/index.d.ts +12 -4
- package/database/index.js +13 -28
- package/database/index.js.map +1 -1
- package/database/secretBackendConnection.d.ts +35 -1
- package/database/secretBackendConnection.js +4 -0
- package/database/secretBackendConnection.js.map +1 -1
- package/database/secretBackendRole.d.ts +21 -0
- package/database/secretBackendRole.js +2 -0
- package/database/secretBackendRole.js.map +1 -1
- package/database/secretBackendStaticRole.d.ts +21 -0
- package/database/secretBackendStaticRole.js +2 -0
- package/database/secretBackendStaticRole.js.map +1 -1
- package/database/secretsMount.d.ts +41 -1
- package/database/secretsMount.js +6 -0
- package/database/secretsMount.js.map +1 -1
- package/egpPolicy.d.ts +21 -0
- package/egpPolicy.js +2 -0
- package/egpPolicy.js.map +1 -1
- package/gcp/authBackend.d.ts +71 -1
- package/gcp/authBackend.js +18 -2
- package/gcp/authBackend.js.map +1 -1
- package/gcp/authBackendRole.d.ts +21 -0
- package/gcp/authBackendRole.js +2 -0
- package/gcp/authBackendRole.js.map +1 -1
- package/gcp/getAuthBackendRole.d.ts +15 -0
- package/gcp/getAuthBackendRole.js +1 -0
- package/gcp/getAuthBackendRole.js.map +1 -1
- package/gcp/index.d.ts +18 -6
- package/gcp/index.js +19 -32
- package/gcp/index.js.map +1 -1
- package/gcp/secretBackend.d.ts +36 -0
- package/gcp/secretBackend.js +7 -1
- package/gcp/secretBackend.js.map +1 -1
- package/gcp/secretRoleset.d.ts +23 -1
- package/gcp/secretRoleset.js +2 -0
- package/gcp/secretRoleset.js.map +1 -1
- package/gcp/secretStaticAccount.d.ts +23 -1
- package/gcp/secretStaticAccount.js +2 -0
- package/gcp/secretStaticAccount.js.map +1 -1
- package/generic/endpoint.d.ts +21 -0
- package/generic/endpoint.js +5 -1
- package/generic/endpoint.js.map +1 -1
- package/generic/getSecret.d.ts +15 -0
- package/generic/getSecret.js +1 -0
- package/generic/getSecret.js.map +1 -1
- package/generic/index.d.ts +9 -3
- package/generic/index.js +10 -23
- package/generic/index.js.map +1 -1
- package/generic/secret.d.ts +21 -0
- package/generic/secret.js +5 -1
- package/generic/secret.js.map +1 -1
- package/getAuthBackend.d.ts +16 -1
- package/getAuthBackend.js +1 -0
- package/getAuthBackend.js.map +1 -1
- package/getNomadAccessToken.d.ts +15 -0
- package/getNomadAccessToken.js +1 -0
- package/getNomadAccessToken.js.map +1 -1
- package/getPolicyDocument.d.ts +5 -1
- package/getPolicyDocument.js +1 -0
- package/getPolicyDocument.js.map +1 -1
- package/github/authBackend.d.ts +38 -1
- package/github/authBackend.js +4 -0
- package/github/authBackend.js.map +1 -1
- package/github/index.d.ts +9 -3
- package/github/index.js +10 -25
- package/github/index.js.map +1 -1
- package/github/team.d.ts +21 -0
- package/github/team.js +2 -0
- package/github/team.js.map +1 -1
- package/github/user.d.ts +21 -0
- package/github/user.js +2 -0
- package/github/user.js.map +1 -1
- package/identity/entity.d.ts +21 -0
- package/identity/entity.js +2 -0
- package/identity/entity.js.map +1 -1
- package/identity/entityAlias.d.ts +21 -0
- package/identity/entityAlias.js +2 -0
- package/identity/entityAlias.js.map +1 -1
- package/identity/entityPolicies.d.ts +21 -0
- package/identity/entityPolicies.js +2 -0
- package/identity/entityPolicies.js.map +1 -1
- package/identity/getEntity.d.ts +16 -1
- package/identity/getEntity.js +1 -0
- package/identity/getEntity.js.map +1 -1
- package/identity/getGroup.d.ts +15 -0
- package/identity/getGroup.js +1 -0
- package/identity/getGroup.js.map +1 -1
- package/identity/getOidcClientCreds.d.ts +15 -0
- package/identity/getOidcClientCreds.js +1 -0
- package/identity/getOidcClientCreds.js.map +1 -1
- package/identity/getOidcOpenidConfig.d.ts +15 -0
- package/identity/getOidcOpenidConfig.js +1 -0
- package/identity/getOidcOpenidConfig.js.map +1 -1
- package/identity/getOidcPublicKeys.d.ts +15 -0
- package/identity/getOidcPublicKeys.js +1 -0
- package/identity/getOidcPublicKeys.js.map +1 -1
- package/identity/group.d.ts +21 -0
- package/identity/group.js +2 -0
- package/identity/group.js.map +1 -1
- package/identity/groupAlias.d.ts +21 -0
- package/identity/groupAlias.js +2 -0
- package/identity/groupAlias.js.map +1 -1
- package/identity/groupMemberEntityIds.d.ts +21 -0
- package/identity/groupMemberEntityIds.js +2 -0
- package/identity/groupMemberEntityIds.js.map +1 -1
- package/identity/groupPolicies.d.ts +21 -0
- package/identity/groupPolicies.js +2 -0
- package/identity/groupPolicies.js.map +1 -1
- package/identity/index.d.ts +75 -20
- package/identity/index.js +86 -66
- package/identity/index.js.map +1 -1
- package/identity/mfaDuo.d.ts +200 -0
- package/identity/mfaDuo.js +110 -0
- package/identity/mfaDuo.js.map +1 -0
- package/identity/mfaLoginEnforcement.d.ts +170 -0
- package/identity/mfaLoginEnforcement.js +96 -0
- package/identity/mfaLoginEnforcement.js.map +1 -0
- package/identity/mfaOkta.d.ts +188 -0
- package/identity/mfaOkta.js +105 -0
- package/identity/mfaOkta.js.map +1 -0
- package/identity/mfaPingid.d.ts +190 -0
- package/identity/mfaPingid.js +102 -0
- package/identity/mfaPingid.js.map +1 -0
- package/identity/mfaTotp.d.ts +218 -0
- package/identity/mfaTotp.js +104 -0
- package/identity/mfaTotp.js.map +1 -0
- package/identity/oidc.d.ts +21 -0
- package/identity/oidc.js +2 -0
- package/identity/oidc.js.map +1 -1
- package/identity/oidcAssignment.d.ts +23 -2
- package/identity/oidcAssignment.js +4 -2
- package/identity/oidcAssignment.js.map +1 -1
- package/identity/oidcClient.d.ts +21 -0
- package/identity/oidcClient.js +4 -0
- package/identity/oidcClient.js.map +1 -1
- package/identity/oidcKey.d.ts +21 -0
- package/identity/oidcKey.js +2 -0
- package/identity/oidcKey.js.map +1 -1
- package/identity/oidcKeyAllowedClientID.d.ts +21 -0
- package/identity/oidcKeyAllowedClientID.js +2 -0
- package/identity/oidcKeyAllowedClientID.js.map +1 -1
- package/identity/oidcProvider.d.ts +21 -0
- package/identity/oidcProvider.js +2 -0
- package/identity/oidcProvider.js.map +1 -1
- package/identity/oidcRole.d.ts +21 -0
- package/identity/oidcRole.js +2 -0
- package/identity/oidcRole.js.map +1 -1
- package/identity/oidcScope.d.ts +22 -3
- package/identity/oidcScope.js +3 -3
- package/identity/oidcScope.js.map +1 -1
- package/index.d.ts +75 -25
- package/index.js +78 -83
- package/index.js.map +1 -1
- package/jwt/authBackend.d.ts +38 -1
- package/jwt/authBackend.js +7 -1
- package/jwt/authBackend.js.map +1 -1
- package/jwt/authBackendRole.d.ts +57 -0
- package/jwt/authBackendRole.js +6 -0
- package/jwt/authBackendRole.js.map +1 -1
- package/jwt/index.d.ts +6 -2
- package/jwt/index.js +7 -22
- package/jwt/index.js.map +1 -1
- package/kmip/index.d.ts +9 -3
- package/kmip/index.js +10 -25
- package/kmip/index.js.map +1 -1
- package/kmip/secretBackend.d.ts +36 -0
- package/kmip/secretBackend.js +4 -0
- package/kmip/secretBackend.js.map +1 -1
- package/kmip/secretRole.d.ts +21 -0
- package/kmip/secretRole.js +2 -0
- package/kmip/secretRole.js.map +1 -1
- package/kmip/secretScope.d.ts +21 -0
- package/kmip/secretScope.js +2 -0
- package/kmip/secretScope.js.map +1 -1
- package/kubernetes/authBackendConfig.d.ts +21 -0
- package/kubernetes/authBackendConfig.js +5 -1
- package/kubernetes/authBackendConfig.js.map +1 -1
- package/kubernetes/authBackendRole.d.ts +21 -0
- package/kubernetes/authBackendRole.js +2 -0
- package/kubernetes/authBackendRole.js.map +1 -1
- package/kubernetes/getAuthBackendConfig.d.ts +15 -0
- package/kubernetes/getAuthBackendConfig.js +1 -0
- package/kubernetes/getAuthBackendConfig.js.map +1 -1
- package/kubernetes/getAuthBackendRole.d.ts +15 -0
- package/kubernetes/getAuthBackendRole.js +1 -0
- package/kubernetes/getAuthBackendRole.js.map +1 -1
- package/kubernetes/getServiceAccountToken.d.ts +46 -0
- package/kubernetes/getServiceAccountToken.js +27 -0
- package/kubernetes/getServiceAccountToken.js.map +1 -0
- package/kubernetes/index.d.ts +21 -4
- package/kubernetes/index.js +26 -24
- package/kubernetes/index.js.map +1 -1
- package/kubernetes/secretBackend.d.ts +303 -0
- package/kubernetes/secretBackend.js +114 -0
- package/kubernetes/secretBackend.js.map +1 -0
- package/kubernetes/secretBackendRole.d.ts +367 -0
- package/kubernetes/secretBackendRole.js +191 -0
- package/kubernetes/secretBackendRole.js.map +1 -0
- package/kv/getSecret.d.ts +104 -0
- package/kv/getSecret.js +53 -0
- package/kv/getSecret.js.map +1 -0
- package/kv/getSecretSubkeysV2.d.ts +42 -0
- package/kv/getSecretSubkeysV2.js +26 -0
- package/kv/getSecretSubkeysV2.js.map +1 -0
- package/kv/getSecretV2.d.ts +139 -0
- package/kv/getSecretV2.js +58 -0
- package/kv/getSecretV2.js.map +1 -0
- package/kv/getSecretsList.d.ts +85 -0
- package/kv/getSecretsList.js +58 -0
- package/kv/getSecretsList.js.map +1 -0
- package/kv/getSecretsListV2.d.ts +114 -0
- package/kv/getSecretsListV2.js +69 -0
- package/kv/getSecretsListV2.js.map +1 -0
- package/kv/index.d.ts +24 -0
- package/kv/index.js +47 -0
- package/kv/index.js.map +1 -0
- package/kv/secret.d.ts +145 -0
- package/kv/secret.js +106 -0
- package/kv/secret.js.map +1 -0
- package/kv/secretBackendV2.d.ts +154 -0
- package/kv/secretBackendV2.js +103 -0
- package/kv/secretBackendV2.js.map +1 -0
- package/kv/secretV2.d.ts +257 -0
- package/kv/secretV2.js +122 -0
- package/kv/secretV2.js.map +1 -0
- package/ldap/authBackend.d.ts +48 -0
- package/ldap/authBackend.js +10 -2
- package/ldap/authBackend.js.map +1 -1
- package/ldap/authBackendGroup.d.ts +21 -0
- package/ldap/authBackendGroup.js +2 -0
- package/ldap/authBackendGroup.js.map +1 -1
- package/ldap/authBackendUser.d.ts +21 -0
- package/ldap/authBackendUser.js +2 -0
- package/ldap/authBackendUser.js.map +1 -1
- package/ldap/index.d.ts +9 -3
- package/ldap/index.js +10 -25
- package/ldap/index.js.map +1 -1
- package/managed/index.d.ts +3 -0
- package/managed/index.js +22 -0
- package/managed/index.js.map +1 -0
- package/managed/keys.d.ts +104 -0
- package/managed/keys.js +64 -0
- package/managed/keys.js.map +1 -0
- package/mfaDuo.d.ts +21 -0
- package/mfaDuo.js +6 -2
- package/mfaDuo.js.map +1 -1
- package/mfaOkta.d.ts +21 -0
- package/mfaOkta.js +5 -1
- package/mfaOkta.js.map +1 -1
- package/mfaPingid.d.ts +21 -0
- package/mfaPingid.js +2 -0
- package/mfaPingid.js.map +1 -1
- package/mfaTotp.d.ts +21 -0
- package/mfaTotp.js +2 -0
- package/mfaTotp.js.map +1 -1
- package/mount.d.ts +33 -0
- package/mount.js +4 -0
- package/mount.js.map +1 -1
- package/namespace.d.ts +32 -18
- package/namespace.js +5 -16
- package/namespace.js.map +1 -1
- package/nomadSecretBackend.d.ts +36 -0
- package/nomadSecretBackend.js +9 -3
- package/nomadSecretBackend.js.map +1 -1
- package/nomadSecretRole.d.ts +21 -0
- package/nomadSecretRole.js +2 -0
- package/nomadSecretRole.js.map +1 -1
- package/okta/authBackend.d.ts +38 -1
- package/okta/authBackend.js +7 -1
- package/okta/authBackend.js.map +1 -1
- package/okta/authBackendGroup.d.ts +21 -0
- package/okta/authBackendGroup.js +2 -0
- package/okta/authBackendGroup.js.map +1 -1
- package/okta/authBackendUser.d.ts +21 -0
- package/okta/authBackendUser.js +2 -0
- package/okta/authBackendUser.js.map +1 -1
- package/okta/index.d.ts +9 -3
- package/okta/index.js +10 -25
- package/okta/index.js.map +1 -1
- package/package.json +2 -2
- package/package.json.dev +2 -2
- package/passwordPolicy.d.ts +21 -0
- package/passwordPolicy.js +2 -0
- package/passwordPolicy.js.map +1 -1
- package/pkisecret/index.d.ts +30 -10
- package/pkisecret/index.js +31 -46
- package/pkisecret/index.js.map +1 -1
- package/pkisecret/secretBackendCert.d.ts +29 -0
- package/pkisecret/secretBackendCert.js +6 -0
- package/pkisecret/secretBackendCert.js.map +1 -1
- package/pkisecret/secretBackendConfigCa.d.ts +21 -0
- package/pkisecret/secretBackendConfigCa.js +5 -1
- package/pkisecret/secretBackendConfigCa.js.map +1 -1
- package/pkisecret/secretBackendConfigUrls.d.ts +21 -0
- package/pkisecret/secretBackendConfigUrls.js +2 -0
- package/pkisecret/secretBackendConfigUrls.js.map +1 -1
- package/pkisecret/secretBackendCrlConfig.d.ts +21 -0
- package/pkisecret/secretBackendCrlConfig.js +2 -0
- package/pkisecret/secretBackendCrlConfig.js.map +1 -1
- package/pkisecret/secretBackendIntermediateCertRequest.d.ts +54 -0
- package/pkisecret/secretBackendIntermediateCertRequest.js +8 -0
- package/pkisecret/secretBackendIntermediateCertRequest.js.map +1 -1
- package/pkisecret/secretBackendIntermediateSetSigned.d.ts +21 -0
- package/pkisecret/secretBackendIntermediateSetSigned.js +2 -0
- package/pkisecret/secretBackendIntermediateSetSigned.js.map +1 -1
- package/pkisecret/secretBackendRole.d.ts +24 -3
- package/pkisecret/secretBackendRole.js +2 -0
- package/pkisecret/secretBackendRole.js.map +1 -1
- package/pkisecret/secretBackendRootCert.d.ts +57 -3
- package/pkisecret/secretBackendRootCert.js +6 -0
- package/pkisecret/secretBackendRootCert.js.map +1 -1
- package/pkisecret/secretBackendRootSignIntermediate.d.ts +21 -0
- package/pkisecret/secretBackendRootSignIntermediate.js +2 -0
- package/pkisecret/secretBackendRootSignIntermediate.js.map +1 -1
- package/pkisecret/secretBackendSign.d.ts +29 -0
- package/pkisecret/secretBackendSign.js +4 -0
- package/pkisecret/secretBackendSign.js.map +1 -1
- package/policy.d.ts +21 -0
- package/policy.js +2 -0
- package/policy.js.map +1 -1
- package/provider.d.ts +43 -3
- package/provider.js +13 -3
- package/provider.js.map +1 -1
- package/quotaLeaseCount.d.ts +21 -0
- package/quotaLeaseCount.js +2 -0
- package/quotaLeaseCount.js.map +1 -1
- package/quotaRateLimit.d.ts +48 -0
- package/quotaRateLimit.js +6 -0
- package/quotaRateLimit.js.map +1 -1
- package/rabbitmq/index.d.ts +6 -2
- package/rabbitmq/index.js +7 -22
- package/rabbitmq/index.js.map +1 -1
- package/rabbitmq/secretBackend.d.ts +36 -0
- package/rabbitmq/secretBackend.js +8 -2
- package/rabbitmq/secretBackend.js.map +1 -1
- package/rabbitmq/secretBackendRole.d.ts +23 -1
- package/rabbitmq/secretBackendRole.js +2 -0
- package/rabbitmq/secretBackendRole.js.map +1 -1
- package/raftAutopilot.d.ts +21 -0
- package/raftAutopilot.js +2 -0
- package/raftAutopilot.js.map +1 -1
- package/raftSnapshotAgentConfig.d.ts +62 -0
- package/raftSnapshotAgentConfig.js +43 -0
- package/raftSnapshotAgentConfig.js.map +1 -1
- package/rgpPolicy.d.ts +21 -0
- package/rgpPolicy.js +2 -0
- package/rgpPolicy.js.map +1 -1
- package/ssh/index.d.ts +6 -2
- package/ssh/index.js +7 -22
- package/ssh/index.js.map +1 -1
- package/ssh/secretBackendCa.d.ts +29 -0
- package/ssh/secretBackendCa.js +13 -1
- package/ssh/secretBackendCa.js.map +1 -1
- package/ssh/secretBackendRole.d.ts +23 -1
- package/ssh/secretBackendRole.js +2 -0
- package/ssh/secretBackendRole.js.map +1 -1
- package/terraformcloud/index.d.ts +9 -3
- package/terraformcloud/index.js +10 -25
- package/terraformcloud/index.js.map +1 -1
- package/terraformcloud/secretBackend.d.ts +36 -0
- package/terraformcloud/secretBackend.js +7 -1
- package/terraformcloud/secretBackend.js.map +1 -1
- package/terraformcloud/secretCreds.d.ts +21 -0
- package/terraformcloud/secretCreds.js +4 -0
- package/terraformcloud/secretCreds.js.map +1 -1
- package/terraformcloud/secretRole.d.ts +21 -0
- package/terraformcloud/secretRole.js +2 -0
- package/terraformcloud/secretRole.js.map +1 -1
- package/token.d.ts +42 -0
- package/token.js +9 -0
- package/token.js.map +1 -1
- package/tokenauth/authBackendRole.d.ts +21 -0
- package/tokenauth/authBackendRole.js +2 -0
- package/tokenauth/authBackendRole.js.map +1 -1
- package/tokenauth/index.d.ts +3 -1
- package/tokenauth/index.js +4 -19
- package/tokenauth/index.js.map +1 -1
- package/transform/index.d.ts +18 -6
- package/transform/index.js +19 -30
- package/transform/index.js.map +1 -1
- package/transform/transformation.d.ts +0 -25
- package/transform/transformation.js +0 -25
- package/transform/transformation.js.map +1 -1
- package/transit/getDecrypt.d.ts +3 -0
- package/transit/getDecrypt.js +1 -0
- package/transit/getDecrypt.js.map +1 -1
- package/transit/getEncrypt.d.ts +3 -0
- package/transit/getEncrypt.js +1 -0
- package/transit/getEncrypt.js.map +1 -1
- package/transit/index.d.ts +12 -4
- package/transit/index.js +13 -24
- package/transit/index.js.map +1 -1
- package/transit/secretBackendKey.d.ts +21 -0
- package/transit/secretBackendKey.js +2 -0
- package/transit/secretBackendKey.js.map +1 -1
- package/transit/secretCacheConfig.d.ts +21 -0
- package/transit/secretCacheConfig.js +2 -0
- package/transit/secretCacheConfig.js.map +1 -1
- package/types/index.js.map +1 -1
- package/types/input.d.ts +408 -4
- package/types/output.d.ts +409 -5
- package/utilities.js +13 -1
- package/utilities.js.map +1 -1
- package/approle/authBackendRoleSecretID.js.map +0 -1
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"authBackendRoleTag.js","sourceRoot":"","sources":["../../aws/authBackendRoleTag.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;GAEG;AACH,MAAa,kBAAmB,SAAQ,MAAM,CAAC,cAAc;
|
|
1
|
+
{"version":3,"file":"authBackendRoleTag.js","sourceRoot":"","sources":["../../aws/authBackendRoleTag.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;GAEG;AACH,MAAa,kBAAmB,SAAQ,MAAM,CAAC,cAAc;IAkFzD,YAAY,IAAY,EAAE,WAA8D,EAAE,IAAmC;QACzH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAkD,CAAC;YACjE,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,0BAA0B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;SACnE;aAAM;YACH,MAAM,IAAI,GAAG,WAAiD,CAAC;YAC/D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,0BAA0B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC7C,cAAc,CAAC,UAAU,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAClD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,kBAAkB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACvE,CAAC;IAlHD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA+B,EAAE,IAAmC;QAC7H,OAAO,IAAI,kBAAkB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACzE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,kBAAkB,CAAC,YAAY,CAAC;IACnE,CAAC;;AA1BL,gDAoHC;AAtGG,gBAAgB;AACO,+BAAY,GAAG,iDAAiD,CAAC"}
|
|
@@ -41,6 +41,13 @@ export declare class AuthBackendRoletagBlacklist extends pulumi.CustomResource {
|
|
|
41
41
|
* tidying of the roletag blacklist entries. Defaults to false.
|
|
42
42
|
*/
|
|
43
43
|
readonly disablePeriodicTidy: pulumi.Output<boolean | undefined>;
|
|
44
|
+
/**
|
|
45
|
+
* The namespace to provision the resource in.
|
|
46
|
+
* The value should not contain leading or trailing forward slashes.
|
|
47
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
48
|
+
* *Available only for Vault Enterprise*.
|
|
49
|
+
*/
|
|
50
|
+
readonly namespace: pulumi.Output<string | undefined>;
|
|
44
51
|
/**
|
|
45
52
|
* The amount of extra time that must have passed
|
|
46
53
|
* beyond the roletag expiration, before it is removed from the backend storage.
|
|
@@ -70,6 +77,13 @@ export interface AuthBackendRoletagBlacklistState {
|
|
|
70
77
|
* tidying of the roletag blacklist entries. Defaults to false.
|
|
71
78
|
*/
|
|
72
79
|
disablePeriodicTidy?: pulumi.Input<boolean>;
|
|
80
|
+
/**
|
|
81
|
+
* The namespace to provision the resource in.
|
|
82
|
+
* The value should not contain leading or trailing forward slashes.
|
|
83
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
84
|
+
* *Available only for Vault Enterprise*.
|
|
85
|
+
*/
|
|
86
|
+
namespace?: pulumi.Input<string>;
|
|
73
87
|
/**
|
|
74
88
|
* The amount of extra time that must have passed
|
|
75
89
|
* beyond the roletag expiration, before it is removed from the backend storage.
|
|
@@ -91,6 +105,13 @@ export interface AuthBackendRoletagBlacklistArgs {
|
|
|
91
105
|
* tidying of the roletag blacklist entries. Defaults to false.
|
|
92
106
|
*/
|
|
93
107
|
disablePeriodicTidy?: pulumi.Input<boolean>;
|
|
108
|
+
/**
|
|
109
|
+
* The namespace to provision the resource in.
|
|
110
|
+
* The value should not contain leading or trailing forward slashes.
|
|
111
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
112
|
+
* *Available only for Vault Enterprise*.
|
|
113
|
+
*/
|
|
114
|
+
namespace?: pulumi.Input<string>;
|
|
94
115
|
/**
|
|
95
116
|
* The amount of extra time that must have passed
|
|
96
117
|
* beyond the roletag expiration, before it is removed from the backend storage.
|
|
@@ -29,6 +29,7 @@ class AuthBackendRoletagBlacklist extends pulumi.CustomResource {
|
|
|
29
29
|
const state = argsOrState;
|
|
30
30
|
resourceInputs["backend"] = state ? state.backend : undefined;
|
|
31
31
|
resourceInputs["disablePeriodicTidy"] = state ? state.disablePeriodicTidy : undefined;
|
|
32
|
+
resourceInputs["namespace"] = state ? state.namespace : undefined;
|
|
32
33
|
resourceInputs["safetyBuffer"] = state ? state.safetyBuffer : undefined;
|
|
33
34
|
}
|
|
34
35
|
else {
|
|
@@ -38,6 +39,7 @@ class AuthBackendRoletagBlacklist extends pulumi.CustomResource {
|
|
|
38
39
|
}
|
|
39
40
|
resourceInputs["backend"] = args ? args.backend : undefined;
|
|
40
41
|
resourceInputs["disablePeriodicTidy"] = args ? args.disablePeriodicTidy : undefined;
|
|
42
|
+
resourceInputs["namespace"] = args ? args.namespace : undefined;
|
|
41
43
|
resourceInputs["safetyBuffer"] = args ? args.safetyBuffer : undefined;
|
|
42
44
|
}
|
|
43
45
|
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"authBackendRoletagBlacklist.js","sourceRoot":"","sources":["../../aws/authBackendRoletagBlacklist.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;GAeG;AACH,MAAa,2BAA4B,SAAQ,MAAM,CAAC,cAAc;
|
|
1
|
+
{"version":3,"file":"authBackendRoletagBlacklist.js","sourceRoot":"","sources":["../../aws/authBackendRoletagBlacklist.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;GAeG;AACH,MAAa,2BAA4B,SAAQ,MAAM,CAAC,cAAc;IA4DlE,YAAY,IAAY,EAAE,WAAgF,EAAE,IAAmC;QAC3I,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA2D,CAAC;YAC1E,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3E;aAAM;YACH,MAAM,IAAI,GAAG,WAA0D,CAAC;YACxE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;SACzE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,2BAA2B,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAChF,CAAC;IAhFD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAwC,EAAE,IAAmC;QACtI,OAAO,IAAI,2BAA2B,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAClF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,2BAA2B,CAAC,YAAY,CAAC;IAC5E,CAAC;;AA1BL,kEAkFC;AApEG,gBAAgB;AACO,wCAAY,GAAG,mEAAmE,CAAC"}
|
|
@@ -47,6 +47,13 @@ export declare class AuthBackendStsRole extends pulumi.CustomResource {
|
|
|
47
47
|
* mounted at. Defaults to `aws`.
|
|
48
48
|
*/
|
|
49
49
|
readonly backend: pulumi.Output<string | undefined>;
|
|
50
|
+
/**
|
|
51
|
+
* The namespace to provision the resource in.
|
|
52
|
+
* The value should not contain leading or trailing forward slashes.
|
|
53
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
54
|
+
* *Available only for Vault Enterprise*.
|
|
55
|
+
*/
|
|
56
|
+
readonly namespace: pulumi.Output<string | undefined>;
|
|
50
57
|
/**
|
|
51
58
|
* The STS role to assume when verifying requests made
|
|
52
59
|
* by EC2 instances in the account specified by `accountId`.
|
|
@@ -74,6 +81,13 @@ export interface AuthBackendStsRoleState {
|
|
|
74
81
|
* mounted at. Defaults to `aws`.
|
|
75
82
|
*/
|
|
76
83
|
backend?: pulumi.Input<string>;
|
|
84
|
+
/**
|
|
85
|
+
* The namespace to provision the resource in.
|
|
86
|
+
* The value should not contain leading or trailing forward slashes.
|
|
87
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
88
|
+
* *Available only for Vault Enterprise*.
|
|
89
|
+
*/
|
|
90
|
+
namespace?: pulumi.Input<string>;
|
|
77
91
|
/**
|
|
78
92
|
* The STS role to assume when verifying requests made
|
|
79
93
|
* by EC2 instances in the account specified by `accountId`.
|
|
@@ -93,6 +107,13 @@ export interface AuthBackendStsRoleArgs {
|
|
|
93
107
|
* mounted at. Defaults to `aws`.
|
|
94
108
|
*/
|
|
95
109
|
backend?: pulumi.Input<string>;
|
|
110
|
+
/**
|
|
111
|
+
* The namespace to provision the resource in.
|
|
112
|
+
* The value should not contain leading or trailing forward slashes.
|
|
113
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
114
|
+
* *Available only for Vault Enterprise*.
|
|
115
|
+
*/
|
|
116
|
+
namespace?: pulumi.Input<string>;
|
|
96
117
|
/**
|
|
97
118
|
* The STS role to assume when verifying requests made
|
|
98
119
|
* by EC2 instances in the account specified by `accountId`.
|
|
@@ -36,6 +36,7 @@ class AuthBackendStsRole extends pulumi.CustomResource {
|
|
|
36
36
|
const state = argsOrState;
|
|
37
37
|
resourceInputs["accountId"] = state ? state.accountId : undefined;
|
|
38
38
|
resourceInputs["backend"] = state ? state.backend : undefined;
|
|
39
|
+
resourceInputs["namespace"] = state ? state.namespace : undefined;
|
|
39
40
|
resourceInputs["stsRole"] = state ? state.stsRole : undefined;
|
|
40
41
|
}
|
|
41
42
|
else {
|
|
@@ -48,6 +49,7 @@ class AuthBackendStsRole extends pulumi.CustomResource {
|
|
|
48
49
|
}
|
|
49
50
|
resourceInputs["accountId"] = args ? args.accountId : undefined;
|
|
50
51
|
resourceInputs["backend"] = args ? args.backend : undefined;
|
|
52
|
+
resourceInputs["namespace"] = args ? args.namespace : undefined;
|
|
51
53
|
resourceInputs["stsRole"] = args ? args.stsRole : undefined;
|
|
52
54
|
}
|
|
53
55
|
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"authBackendStsRole.js","sourceRoot":"","sources":["../../aws/authBackendStsRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;GAsBG;AACH,MAAa,kBAAmB,SAAQ,MAAM,CAAC,cAAc;
|
|
1
|
+
{"version":3,"file":"authBackendStsRole.js","sourceRoot":"","sources":["../../aws/authBackendStsRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;GAsBG;AACH,MAAa,kBAAmB,SAAQ,MAAM,CAAC,cAAc;IA0DzD,YAAY,IAAY,EAAE,WAA8D,EAAE,IAAmC;QACzH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAkD,CAAC;YACjE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;SACjE;aAAM;YACH,MAAM,IAAI,GAAG,WAAiD,CAAC;YAC/D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,SAAS,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACtD,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,kBAAkB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACvE,CAAC;IAjFD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA+B,EAAE,IAAmC;QAC7H,OAAO,IAAI,kBAAkB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACzE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,kBAAkB,CAAC,YAAY,CAAC;IACnE,CAAC;;AA1BL,gDAmFC;AArEG,gBAAgB;AACO,+BAAY,GAAG,iDAAiD,CAAC"}
|
|
@@ -9,6 +9,13 @@ export interface GetAccessCredentialsArgs {
|
|
|
9
9
|
* read credentials from, with no leading or trailing `/`s.
|
|
10
10
|
*/
|
|
11
11
|
backend: string;
|
|
12
|
+
/**
|
|
13
|
+
* The namespace of the target resource.
|
|
14
|
+
* The value should not contain leading or trailing forward slashes.
|
|
15
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
16
|
+
* *Available only for Vault Enterprise*.
|
|
17
|
+
*/
|
|
18
|
+
namespace?: string;
|
|
12
19
|
region?: string;
|
|
13
20
|
/**
|
|
14
21
|
* The name of the AWS secret backend role to read
|
|
@@ -60,6 +67,7 @@ export interface GetAccessCredentialsResult {
|
|
|
60
67
|
readonly leaseId: string;
|
|
61
68
|
readonly leaseRenewable: boolean;
|
|
62
69
|
readonly leaseStartTime: string;
|
|
70
|
+
readonly namespace?: string;
|
|
63
71
|
readonly region?: string;
|
|
64
72
|
readonly role: string;
|
|
65
73
|
readonly roleArn?: string;
|
|
@@ -84,6 +92,13 @@ export interface GetAccessCredentialsOutputArgs {
|
|
|
84
92
|
* read credentials from, with no leading or trailing `/`s.
|
|
85
93
|
*/
|
|
86
94
|
backend: pulumi.Input<string>;
|
|
95
|
+
/**
|
|
96
|
+
* The namespace of the target resource.
|
|
97
|
+
* The value should not contain leading or trailing forward slashes.
|
|
98
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
99
|
+
* *Available only for Vault Enterprise*.
|
|
100
|
+
*/
|
|
101
|
+
namespace?: pulumi.Input<string>;
|
|
87
102
|
region?: pulumi.Input<string>;
|
|
88
103
|
/**
|
|
89
104
|
* The name of the AWS secret backend role to read
|
|
@@ -12,6 +12,7 @@ function getAccessCredentials(args, opts) {
|
|
|
12
12
|
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
13
13
|
return pulumi.runtime.invoke("vault:aws/getAccessCredentials:getAccessCredentials", {
|
|
14
14
|
"backend": args.backend,
|
|
15
|
+
"namespace": args.namespace,
|
|
15
16
|
"region": args.region,
|
|
16
17
|
"role": args.role,
|
|
17
18
|
"roleArn": args.roleArn,
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getAccessCredentials.js","sourceRoot":"","sources":["../../aws/getAccessCredentials.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,SAAgB,oBAAoB,CAAC,IAA8B,EAAE,IAA2B;IAC5F,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,qDAAqD,EAAE;QAChF,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,QAAQ,EAAE,IAAI,CAAC,MAAM;QACrB,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,KAAK,EAAE,IAAI,CAAC,GAAG;QACf,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;
|
|
1
|
+
{"version":3,"file":"getAccessCredentials.js","sourceRoot":"","sources":["../../aws/getAccessCredentials.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,SAAgB,oBAAoB,CAAC,IAA8B,EAAE,IAA2B;IAC5F,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,qDAAqD,EAAE;QAChF,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,WAAW,EAAE,IAAI,CAAC,SAAS;QAC3B,QAAQ,EAAE,IAAI,CAAC,MAAM;QACrB,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,KAAK,EAAE,IAAI,CAAC,GAAG;QACf,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAfD,oDAeC;AAsFD,SAAgB,0BAA0B,CAAC,IAAoC,EAAE,IAA2B;IACxG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,oBAAoB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACxE,CAAC;AAFD,gEAEC"}
|
package/aws/index.d.ts
CHANGED
|
@@ -1,11 +1,33 @@
|
|
|
1
|
-
export
|
|
2
|
-
export
|
|
3
|
-
export
|
|
4
|
-
export
|
|
5
|
-
export
|
|
6
|
-
export
|
|
7
|
-
export
|
|
8
|
-
export
|
|
9
|
-
export
|
|
10
|
-
export
|
|
11
|
-
export
|
|
1
|
+
export { AuthBackendCertArgs, AuthBackendCertState } from "./authBackendCert";
|
|
2
|
+
export declare type AuthBackendCert = import("./authBackendCert").AuthBackendCert;
|
|
3
|
+
export declare const AuthBackendCert: typeof import("./authBackendCert").AuthBackendCert;
|
|
4
|
+
export { AuthBackendClientArgs, AuthBackendClientState } from "./authBackendClient";
|
|
5
|
+
export declare type AuthBackendClient = import("./authBackendClient").AuthBackendClient;
|
|
6
|
+
export declare const AuthBackendClient: typeof import("./authBackendClient").AuthBackendClient;
|
|
7
|
+
export { AuthBackendIdentityWhitelistArgs, AuthBackendIdentityWhitelistState } from "./authBackendIdentityWhitelist";
|
|
8
|
+
export declare type AuthBackendIdentityWhitelist = import("./authBackendIdentityWhitelist").AuthBackendIdentityWhitelist;
|
|
9
|
+
export declare const AuthBackendIdentityWhitelist: typeof import("./authBackendIdentityWhitelist").AuthBackendIdentityWhitelist;
|
|
10
|
+
export { AuthBackendLoginArgs, AuthBackendLoginState } from "./authBackendLogin";
|
|
11
|
+
export declare type AuthBackendLogin = import("./authBackendLogin").AuthBackendLogin;
|
|
12
|
+
export declare const AuthBackendLogin: typeof import("./authBackendLogin").AuthBackendLogin;
|
|
13
|
+
export { AuthBackendRoleArgs, AuthBackendRoleState } from "./authBackendRole";
|
|
14
|
+
export declare type AuthBackendRole = import("./authBackendRole").AuthBackendRole;
|
|
15
|
+
export declare const AuthBackendRole: typeof import("./authBackendRole").AuthBackendRole;
|
|
16
|
+
export { AuthBackendRoleTagArgs, AuthBackendRoleTagState } from "./authBackendRoleTag";
|
|
17
|
+
export declare type AuthBackendRoleTag = import("./authBackendRoleTag").AuthBackendRoleTag;
|
|
18
|
+
export declare const AuthBackendRoleTag: typeof import("./authBackendRoleTag").AuthBackendRoleTag;
|
|
19
|
+
export { AuthBackendRoletagBlacklistArgs, AuthBackendRoletagBlacklistState } from "./authBackendRoletagBlacklist";
|
|
20
|
+
export declare type AuthBackendRoletagBlacklist = import("./authBackendRoletagBlacklist").AuthBackendRoletagBlacklist;
|
|
21
|
+
export declare const AuthBackendRoletagBlacklist: typeof import("./authBackendRoletagBlacklist").AuthBackendRoletagBlacklist;
|
|
22
|
+
export { AuthBackendStsRoleArgs, AuthBackendStsRoleState } from "./authBackendStsRole";
|
|
23
|
+
export declare type AuthBackendStsRole = import("./authBackendStsRole").AuthBackendStsRole;
|
|
24
|
+
export declare const AuthBackendStsRole: typeof import("./authBackendStsRole").AuthBackendStsRole;
|
|
25
|
+
export { GetAccessCredentialsArgs, GetAccessCredentialsResult, GetAccessCredentialsOutputArgs } from "./getAccessCredentials";
|
|
26
|
+
export declare const getAccessCredentials: typeof import("./getAccessCredentials").getAccessCredentials;
|
|
27
|
+
export declare const getAccessCredentialsOutput: typeof import("./getAccessCredentials").getAccessCredentialsOutput;
|
|
28
|
+
export { SecretBackendArgs, SecretBackendState } from "./secretBackend";
|
|
29
|
+
export declare type SecretBackend = import("./secretBackend").SecretBackend;
|
|
30
|
+
export declare const SecretBackend: typeof import("./secretBackend").SecretBackend;
|
|
31
|
+
export { SecretBackendRoleArgs, SecretBackendRoleState } from "./secretBackendRole";
|
|
32
|
+
export declare type SecretBackendRole = import("./secretBackendRole").SecretBackendRole;
|
|
33
|
+
export declare const SecretBackendRole: typeof import("./secretBackendRole").SecretBackendRole;
|
package/aws/index.js
CHANGED
|
@@ -1,70 +1,57 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
3
|
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
-
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
5
|
-
if (k2 === undefined) k2 = k;
|
|
6
|
-
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
7
|
-
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
8
|
-
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
9
|
-
}
|
|
10
|
-
Object.defineProperty(o, k2, desc);
|
|
11
|
-
}) : (function(o, m, k, k2) {
|
|
12
|
-
if (k2 === undefined) k2 = k;
|
|
13
|
-
o[k2] = m[k];
|
|
14
|
-
}));
|
|
15
|
-
var __exportStar = (this && this.__exportStar) || function(m, exports) {
|
|
16
|
-
for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
|
|
17
|
-
};
|
|
18
4
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.SecretBackendRole = exports.SecretBackend = exports.getAccessCredentialsOutput = exports.getAccessCredentials = exports.AuthBackendStsRole = exports.AuthBackendRoletagBlacklist = exports.AuthBackendRoleTag = exports.AuthBackendRole = exports.AuthBackendLogin = exports.AuthBackendIdentityWhitelist = exports.AuthBackendClient = exports.AuthBackendCert = void 0;
|
|
19
6
|
const pulumi = require("@pulumi/pulumi");
|
|
20
7
|
const utilities = require("../utilities");
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
|
|
33
|
-
|
|
34
|
-
|
|
35
|
-
|
|
36
|
-
|
|
37
|
-
|
|
38
|
-
|
|
39
|
-
|
|
40
|
-
|
|
41
|
-
|
|
42
|
-
|
|
43
|
-
|
|
8
|
+
exports.AuthBackendCert = null;
|
|
9
|
+
exports.AuthBackendClient = null;
|
|
10
|
+
exports.AuthBackendIdentityWhitelist = null;
|
|
11
|
+
exports.AuthBackendLogin = null;
|
|
12
|
+
exports.AuthBackendRole = null;
|
|
13
|
+
exports.AuthBackendRoleTag = null;
|
|
14
|
+
exports.AuthBackendRoletagBlacklist = null;
|
|
15
|
+
exports.AuthBackendStsRole = null;
|
|
16
|
+
exports.getAccessCredentials = null;
|
|
17
|
+
exports.getAccessCredentialsOutput = null;
|
|
18
|
+
exports.SecretBackend = null;
|
|
19
|
+
exports.SecretBackendRole = null;
|
|
20
|
+
utilities.lazyLoad(exports, ["AuthBackendCert"], () => require("./authBackendCert"));
|
|
21
|
+
utilities.lazyLoad(exports, ["AuthBackendClient"], () => require("./authBackendClient"));
|
|
22
|
+
utilities.lazyLoad(exports, ["AuthBackendIdentityWhitelist"], () => require("./authBackendIdentityWhitelist"));
|
|
23
|
+
utilities.lazyLoad(exports, ["AuthBackendLogin"], () => require("./authBackendLogin"));
|
|
24
|
+
utilities.lazyLoad(exports, ["AuthBackendRole"], () => require("./authBackendRole"));
|
|
25
|
+
utilities.lazyLoad(exports, ["AuthBackendRoleTag"], () => require("./authBackendRoleTag"));
|
|
26
|
+
utilities.lazyLoad(exports, ["AuthBackendRoletagBlacklist"], () => require("./authBackendRoletagBlacklist"));
|
|
27
|
+
utilities.lazyLoad(exports, ["AuthBackendStsRole"], () => require("./authBackendStsRole"));
|
|
28
|
+
utilities.lazyLoad(exports, ["getAccessCredentials", "getAccessCredentialsOutput"], () => require("./getAccessCredentials"));
|
|
29
|
+
utilities.lazyLoad(exports, ["SecretBackend"], () => require("./secretBackend"));
|
|
30
|
+
utilities.lazyLoad(exports, ["SecretBackendRole"], () => require("./secretBackendRole"));
|
|
44
31
|
const _module = {
|
|
45
32
|
version: utilities.getVersion(),
|
|
46
33
|
construct: (name, type, urn) => {
|
|
47
34
|
switch (type) {
|
|
48
35
|
case "vault:aws/authBackendCert:AuthBackendCert":
|
|
49
|
-
return new
|
|
36
|
+
return new exports.AuthBackendCert(name, undefined, { urn });
|
|
50
37
|
case "vault:aws/authBackendClient:AuthBackendClient":
|
|
51
|
-
return new
|
|
38
|
+
return new exports.AuthBackendClient(name, undefined, { urn });
|
|
52
39
|
case "vault:aws/authBackendIdentityWhitelist:AuthBackendIdentityWhitelist":
|
|
53
|
-
return new
|
|
40
|
+
return new exports.AuthBackendIdentityWhitelist(name, undefined, { urn });
|
|
54
41
|
case "vault:aws/authBackendLogin:AuthBackendLogin":
|
|
55
|
-
return new
|
|
42
|
+
return new exports.AuthBackendLogin(name, undefined, { urn });
|
|
56
43
|
case "vault:aws/authBackendRole:AuthBackendRole":
|
|
57
|
-
return new
|
|
44
|
+
return new exports.AuthBackendRole(name, undefined, { urn });
|
|
58
45
|
case "vault:aws/authBackendRoleTag:AuthBackendRoleTag":
|
|
59
|
-
return new
|
|
46
|
+
return new exports.AuthBackendRoleTag(name, undefined, { urn });
|
|
60
47
|
case "vault:aws/authBackendRoletagBlacklist:AuthBackendRoletagBlacklist":
|
|
61
|
-
return new
|
|
48
|
+
return new exports.AuthBackendRoletagBlacklist(name, undefined, { urn });
|
|
62
49
|
case "vault:aws/authBackendStsRole:AuthBackendStsRole":
|
|
63
|
-
return new
|
|
50
|
+
return new exports.AuthBackendStsRole(name, undefined, { urn });
|
|
64
51
|
case "vault:aws/secretBackend:SecretBackend":
|
|
65
|
-
return new
|
|
52
|
+
return new exports.SecretBackend(name, undefined, { urn });
|
|
66
53
|
case "vault:aws/secretBackendRole:SecretBackendRole":
|
|
67
|
-
return new
|
|
54
|
+
return new exports.SecretBackendRole(name, undefined, { urn });
|
|
68
55
|
default:
|
|
69
56
|
throw new Error(`unknown resource type ${type}`);
|
|
70
57
|
}
|
package/aws/index.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../aws/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../aws/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAK7B,QAAA,eAAe,GAAuD,IAAW,CAAC;AAIlF,QAAA,iBAAiB,GAA2D,IAAW,CAAC;AAIxF,QAAA,4BAA4B,GAAiF,IAAW,CAAC;AAIzH,QAAA,gBAAgB,GAAyD,IAAW,CAAC;AAIrF,QAAA,eAAe,GAAuD,IAAW,CAAC;AAIlF,QAAA,kBAAkB,GAA6D,IAAW,CAAC;AAI3F,QAAA,2BAA2B,GAA+E,IAAW,CAAC;AAItH,QAAA,kBAAkB,GAA6D,IAAW,CAAC;AAG3F,QAAA,oBAAoB,GAAiE,IAAW,CAAC;AACjG,QAAA,0BAA0B,GAAuE,IAAW,CAAC;AAI7G,QAAA,aAAa,GAAmD,IAAW,CAAC;AAI5E,QAAA,iBAAiB,GAA2D,IAAW,CAAC;AAErG,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,iBAAiB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,mBAAmB,CAAC,CAAC,CAAC;AACrF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,mBAAmB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,qBAAqB,CAAC,CAAC,CAAC;AACzF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,8BAA8B,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,gCAAgC,CAAC,CAAC,CAAC;AAC/G,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,kBAAkB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,oBAAoB,CAAC,CAAC,CAAC;AACvF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,iBAAiB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,mBAAmB,CAAC,CAAC,CAAC;AACrF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,oBAAoB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,sBAAsB,CAAC,CAAC,CAAC;AAC3F,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,6BAA6B,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,+BAA+B,CAAC,CAAC,CAAC;AAC7G,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,oBAAoB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,sBAAsB,CAAC,CAAC,CAAC;AAC3F,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,sBAAsB,EAAC,4BAA4B,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,wBAAwB,CAAC,CAAC,CAAC;AAC5H,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,eAAe,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,iBAAiB,CAAC,CAAC,CAAC;AACjF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,mBAAmB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,qBAAqB,CAAC,CAAC,CAAC;AAEzF,MAAM,OAAO,GAAG;IACZ,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE;IAC/B,SAAS,EAAE,CAAC,IAAY,EAAE,IAAY,EAAE,GAAW,EAAmB,EAAE;QACpE,QAAQ,IAAI,EAAE;YACV,KAAK,2CAA2C;gBAC5C,OAAO,IAAI,uBAAe,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC7D,KAAK,+CAA+C;gBAChD,OAAO,IAAI,yBAAiB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC/D,KAAK,qEAAqE;gBACtE,OAAO,IAAI,oCAA4B,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC1E,KAAK,6CAA6C;gBAC9C,OAAO,IAAI,wBAAgB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC9D,KAAK,2CAA2C;gBAC5C,OAAO,IAAI,uBAAe,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC7D,KAAK,iDAAiD;gBAClD,OAAO,IAAI,0BAAkB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAChE,KAAK,mEAAmE;gBACpE,OAAO,IAAI,mCAA2B,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACzE,KAAK,iDAAiD;gBAClD,OAAO,IAAI,0BAAkB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAChE,KAAK,uCAAuC;gBACxC,OAAO,IAAI,qBAAa,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC3D,KAAK,+CAA+C;gBAChD,OAAO,IAAI,yBAAiB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC/D;gBACI,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,EAAE,CAAC,CAAC;SACxD;IACL,CAAC;CACJ,CAAC;AACF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,qBAAqB,EAAE,OAAO,CAAC,CAAA;AAC9E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,uBAAuB,EAAE,OAAO,CAAC,CAAA;AAChF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,kCAAkC,EAAE,OAAO,CAAC,CAAA;AAC3F,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,sBAAsB,EAAE,OAAO,CAAC,CAAA;AAC/E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,qBAAqB,EAAE,OAAO,CAAC,CAAA;AAC9E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,wBAAwB,EAAE,OAAO,CAAC,CAAA;AACjF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,iCAAiC,EAAE,OAAO,CAAC,CAAA;AAC1F,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,wBAAwB,EAAE,OAAO,CAAC,CAAA;AACjF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,mBAAmB,EAAE,OAAO,CAAC,CAAA;AAC5E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,uBAAuB,EAAE,OAAO,CAAC,CAAA"}
|
package/aws/secretBackend.d.ts
CHANGED
|
@@ -1,17 +1,5 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
/**
|
|
3
|
-
* ## Example Usage
|
|
4
|
-
*
|
|
5
|
-
* ```typescript
|
|
6
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
7
|
-
* import * as vault from "@pulumi/vault";
|
|
8
|
-
*
|
|
9
|
-
* const aws = new vault.aws.SecretBackend("aws", {
|
|
10
|
-
* accessKey: "AKIA.....",
|
|
11
|
-
* secretKey: "AWS secret key",
|
|
12
|
-
* });
|
|
13
|
-
* ```
|
|
14
|
-
*
|
|
15
3
|
* ## Import
|
|
16
4
|
*
|
|
17
5
|
* AWS secret backends can be imported using the `path`, e.g.
|
|
@@ -50,6 +38,11 @@ export declare class SecretBackend extends pulumi.CustomResource {
|
|
|
50
38
|
* A human-friendly description for this backend.
|
|
51
39
|
*/
|
|
52
40
|
readonly description: pulumi.Output<string | undefined>;
|
|
41
|
+
/**
|
|
42
|
+
* If set, opts out of mount migration on path updates.
|
|
43
|
+
* See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
|
44
|
+
*/
|
|
45
|
+
readonly disableRemount: pulumi.Output<boolean | undefined>;
|
|
53
46
|
/**
|
|
54
47
|
* Specifies a custom HTTP IAM endpoint to use.
|
|
55
48
|
*/
|
|
@@ -59,6 +52,13 @@ export declare class SecretBackend extends pulumi.CustomResource {
|
|
|
59
52
|
* for credentials issued by this backend.
|
|
60
53
|
*/
|
|
61
54
|
readonly maxLeaseTtlSeconds: pulumi.Output<number>;
|
|
55
|
+
/**
|
|
56
|
+
* The namespace to provision the resource in.
|
|
57
|
+
* The value should not contain leading or trailing forward slashes.
|
|
58
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
59
|
+
* *Available only for Vault Enterprise*.
|
|
60
|
+
*/
|
|
61
|
+
readonly namespace: pulumi.Output<string | undefined>;
|
|
62
62
|
/**
|
|
63
63
|
* The unique path this backend should be mounted at. Must
|
|
64
64
|
* not begin or end with a `/`. Defaults to `aws`.
|
|
@@ -108,6 +108,11 @@ export interface SecretBackendState {
|
|
|
108
108
|
* A human-friendly description for this backend.
|
|
109
109
|
*/
|
|
110
110
|
description?: pulumi.Input<string>;
|
|
111
|
+
/**
|
|
112
|
+
* If set, opts out of mount migration on path updates.
|
|
113
|
+
* See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
|
114
|
+
*/
|
|
115
|
+
disableRemount?: pulumi.Input<boolean>;
|
|
111
116
|
/**
|
|
112
117
|
* Specifies a custom HTTP IAM endpoint to use.
|
|
113
118
|
*/
|
|
@@ -117,6 +122,13 @@ export interface SecretBackendState {
|
|
|
117
122
|
* for credentials issued by this backend.
|
|
118
123
|
*/
|
|
119
124
|
maxLeaseTtlSeconds?: pulumi.Input<number>;
|
|
125
|
+
/**
|
|
126
|
+
* The namespace to provision the resource in.
|
|
127
|
+
* The value should not contain leading or trailing forward slashes.
|
|
128
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
129
|
+
* *Available only for Vault Enterprise*.
|
|
130
|
+
*/
|
|
131
|
+
namespace?: pulumi.Input<string>;
|
|
120
132
|
/**
|
|
121
133
|
* The unique path this backend should be mounted at. Must
|
|
122
134
|
* not begin or end with a `/`. Defaults to `aws`.
|
|
@@ -158,6 +170,11 @@ export interface SecretBackendArgs {
|
|
|
158
170
|
* A human-friendly description for this backend.
|
|
159
171
|
*/
|
|
160
172
|
description?: pulumi.Input<string>;
|
|
173
|
+
/**
|
|
174
|
+
* If set, opts out of mount migration on path updates.
|
|
175
|
+
* See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
|
176
|
+
*/
|
|
177
|
+
disableRemount?: pulumi.Input<boolean>;
|
|
161
178
|
/**
|
|
162
179
|
* Specifies a custom HTTP IAM endpoint to use.
|
|
163
180
|
*/
|
|
@@ -167,6 +184,13 @@ export interface SecretBackendArgs {
|
|
|
167
184
|
* for credentials issued by this backend.
|
|
168
185
|
*/
|
|
169
186
|
maxLeaseTtlSeconds?: pulumi.Input<number>;
|
|
187
|
+
/**
|
|
188
|
+
* The namespace to provision the resource in.
|
|
189
|
+
* The value should not contain leading or trailing forward slashes.
|
|
190
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
191
|
+
* *Available only for Vault Enterprise*.
|
|
192
|
+
*/
|
|
193
|
+
namespace?: pulumi.Input<string>;
|
|
170
194
|
/**
|
|
171
195
|
* The unique path this backend should be mounted at. Must
|
|
172
196
|
* not begin or end with a `/`. Defaults to `aws`.
|
package/aws/secretBackend.js
CHANGED
|
@@ -6,18 +6,6 @@ exports.SecretBackend = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("../utilities");
|
|
8
8
|
/**
|
|
9
|
-
* ## Example Usage
|
|
10
|
-
*
|
|
11
|
-
* ```typescript
|
|
12
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
13
|
-
* import * as vault from "@pulumi/vault";
|
|
14
|
-
*
|
|
15
|
-
* const aws = new vault.aws.SecretBackend("aws", {
|
|
16
|
-
* accessKey: "AKIA.....",
|
|
17
|
-
* secretKey: "AWS secret key",
|
|
18
|
-
* });
|
|
19
|
-
* ```
|
|
20
|
-
*
|
|
21
9
|
* ## Import
|
|
22
10
|
*
|
|
23
11
|
* AWS secret backends can be imported using the `path`, e.g.
|
|
@@ -35,8 +23,10 @@ class SecretBackend extends pulumi.CustomResource {
|
|
|
35
23
|
resourceInputs["accessKey"] = state ? state.accessKey : undefined;
|
|
36
24
|
resourceInputs["defaultLeaseTtlSeconds"] = state ? state.defaultLeaseTtlSeconds : undefined;
|
|
37
25
|
resourceInputs["description"] = state ? state.description : undefined;
|
|
26
|
+
resourceInputs["disableRemount"] = state ? state.disableRemount : undefined;
|
|
38
27
|
resourceInputs["iamEndpoint"] = state ? state.iamEndpoint : undefined;
|
|
39
28
|
resourceInputs["maxLeaseTtlSeconds"] = state ? state.maxLeaseTtlSeconds : undefined;
|
|
29
|
+
resourceInputs["namespace"] = state ? state.namespace : undefined;
|
|
40
30
|
resourceInputs["path"] = state ? state.path : undefined;
|
|
41
31
|
resourceInputs["region"] = state ? state.region : undefined;
|
|
42
32
|
resourceInputs["secretKey"] = state ? state.secretKey : undefined;
|
|
@@ -45,18 +35,22 @@ class SecretBackend extends pulumi.CustomResource {
|
|
|
45
35
|
}
|
|
46
36
|
else {
|
|
47
37
|
const args = argsOrState;
|
|
48
|
-
resourceInputs["accessKey"] = args ? args.accessKey : undefined;
|
|
38
|
+
resourceInputs["accessKey"] = (args === null || args === void 0 ? void 0 : args.accessKey) ? pulumi.secret(args.accessKey) : undefined;
|
|
49
39
|
resourceInputs["defaultLeaseTtlSeconds"] = args ? args.defaultLeaseTtlSeconds : undefined;
|
|
50
40
|
resourceInputs["description"] = args ? args.description : undefined;
|
|
41
|
+
resourceInputs["disableRemount"] = args ? args.disableRemount : undefined;
|
|
51
42
|
resourceInputs["iamEndpoint"] = args ? args.iamEndpoint : undefined;
|
|
52
43
|
resourceInputs["maxLeaseTtlSeconds"] = args ? args.maxLeaseTtlSeconds : undefined;
|
|
44
|
+
resourceInputs["namespace"] = args ? args.namespace : undefined;
|
|
53
45
|
resourceInputs["path"] = args ? args.path : undefined;
|
|
54
46
|
resourceInputs["region"] = args ? args.region : undefined;
|
|
55
|
-
resourceInputs["secretKey"] = args ? args.secretKey : undefined;
|
|
47
|
+
resourceInputs["secretKey"] = (args === null || args === void 0 ? void 0 : args.secretKey) ? pulumi.secret(args.secretKey) : undefined;
|
|
56
48
|
resourceInputs["stsEndpoint"] = args ? args.stsEndpoint : undefined;
|
|
57
49
|
resourceInputs["usernameTemplate"] = args ? args.usernameTemplate : undefined;
|
|
58
50
|
}
|
|
59
51
|
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
52
|
+
const secretOpts = { additionalSecretOutputs: ["accessKey", "secretKey"] };
|
|
53
|
+
opts = pulumi.mergeOptions(opts, secretOpts);
|
|
60
54
|
super(SecretBackend.__pulumiType, name, resourceInputs, opts);
|
|
61
55
|
}
|
|
62
56
|
/**
|
package/aws/secretBackend.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretBackend.js","sourceRoot":"","sources":["../../aws/secretBackend.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"secretBackend.js","sourceRoot":"","sources":["../../aws/secretBackend.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;GAQG;AACH,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;IA8FpD,YAAY,IAAY,EAAE,WAAoD,EAAE,IAAmC;QAC/G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA6C,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;SACnF;aAAM;YACH,MAAM,IAAI,GAAG,WAA4C,CAAC;YAC1D,cAAc,CAAC,WAAW,CAAC,GAAG,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,SAAS,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,WAAW,CAAC,GAAG,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,SAAS,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;SACjF;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,WAAW,EAAE,WAAW,CAAC,EAAE,CAAC;QAC3E,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAClE,CAAC;IAjID;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA0B,EAAE,IAAmC;QACxH,OAAO,IAAI,aAAa,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACpE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,aAAa,CAAC,YAAY,CAAC;IAC9D,CAAC;;AA1BL,sCAmIC;AArHG,gBAAgB;AACO,0BAAY,GAAG,uCAAuC,CAAC"}
|
|
@@ -90,6 +90,13 @@ export declare class SecretBackendRole extends pulumi.CustomResource {
|
|
|
90
90
|
* Must be unique within the backend.
|
|
91
91
|
*/
|
|
92
92
|
readonly name: pulumi.Output<string>;
|
|
93
|
+
/**
|
|
94
|
+
* The namespace to provision the resource in.
|
|
95
|
+
* The value should not contain leading or trailing forward slashes.
|
|
96
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
97
|
+
* *Available only for Vault Enterprise*.
|
|
98
|
+
*/
|
|
99
|
+
readonly namespace: pulumi.Output<string | undefined>;
|
|
93
100
|
/**
|
|
94
101
|
* The ARN of the AWS Permissions
|
|
95
102
|
* Boundary to attach to IAM users created in the role. Valid only when
|
|
@@ -178,6 +185,13 @@ export interface SecretBackendRoleState {
|
|
|
178
185
|
* Must be unique within the backend.
|
|
179
186
|
*/
|
|
180
187
|
name?: pulumi.Input<string>;
|
|
188
|
+
/**
|
|
189
|
+
* The namespace to provision the resource in.
|
|
190
|
+
* The value should not contain leading or trailing forward slashes.
|
|
191
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
192
|
+
* *Available only for Vault Enterprise*.
|
|
193
|
+
*/
|
|
194
|
+
namespace?: pulumi.Input<string>;
|
|
181
195
|
/**
|
|
182
196
|
* The ARN of the AWS Permissions
|
|
183
197
|
* Boundary to attach to IAM users created in the role. Valid only when
|
|
@@ -258,6 +272,13 @@ export interface SecretBackendRoleArgs {
|
|
|
258
272
|
* Must be unique within the backend.
|
|
259
273
|
*/
|
|
260
274
|
name?: pulumi.Input<string>;
|
|
275
|
+
/**
|
|
276
|
+
* The namespace to provision the resource in.
|
|
277
|
+
* The value should not contain leading or trailing forward slashes.
|
|
278
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
279
|
+
* *Available only for Vault Enterprise*.
|
|
280
|
+
*/
|
|
281
|
+
namespace?: pulumi.Input<string>;
|
|
261
282
|
/**
|
|
262
283
|
* The ARN of the AWS Permissions
|
|
263
284
|
* Boundary to attach to IAM users created in the role. Valid only when
|
package/aws/secretBackendRole.js
CHANGED
|
@@ -53,6 +53,7 @@ class SecretBackendRole extends pulumi.CustomResource {
|
|
|
53
53
|
resourceInputs["iamGroups"] = state ? state.iamGroups : undefined;
|
|
54
54
|
resourceInputs["maxStsTtl"] = state ? state.maxStsTtl : undefined;
|
|
55
55
|
resourceInputs["name"] = state ? state.name : undefined;
|
|
56
|
+
resourceInputs["namespace"] = state ? state.namespace : undefined;
|
|
56
57
|
resourceInputs["permissionsBoundaryArn"] = state ? state.permissionsBoundaryArn : undefined;
|
|
57
58
|
resourceInputs["policyArns"] = state ? state.policyArns : undefined;
|
|
58
59
|
resourceInputs["policyDocument"] = state ? state.policyDocument : undefined;
|
|
@@ -73,6 +74,7 @@ class SecretBackendRole extends pulumi.CustomResource {
|
|
|
73
74
|
resourceInputs["iamGroups"] = args ? args.iamGroups : undefined;
|
|
74
75
|
resourceInputs["maxStsTtl"] = args ? args.maxStsTtl : undefined;
|
|
75
76
|
resourceInputs["name"] = args ? args.name : undefined;
|
|
77
|
+
resourceInputs["namespace"] = args ? args.namespace : undefined;
|
|
76
78
|
resourceInputs["permissionsBoundaryArn"] = args ? args.permissionsBoundaryArn : undefined;
|
|
77
79
|
resourceInputs["policyArns"] = args ? args.policyArns : undefined;
|
|
78
80
|
resourceInputs["policyDocument"] = args ? args.policyDocument : undefined;
|