@pulumi/vault 5.6.0 → 5.7.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (515) hide show
  1. package/ad/getAccessCredentials.d.ts +15 -0
  2. package/ad/getAccessCredentials.js +1 -0
  3. package/ad/getAccessCredentials.js.map +1 -1
  4. package/ad/index.d.ts +12 -4
  5. package/ad/index.js +13 -26
  6. package/ad/index.js.map +1 -1
  7. package/ad/secretBackend.d.ts +39 -0
  8. package/ad/secretBackend.js +9 -3
  9. package/ad/secretBackend.js.map +1 -1
  10. package/ad/secretLibrary.d.ts +21 -0
  11. package/ad/secretLibrary.js +2 -0
  12. package/ad/secretLibrary.js.map +1 -1
  13. package/ad/secretRole.d.ts +21 -0
  14. package/ad/secretRole.js +2 -0
  15. package/ad/secretRole.js.map +1 -1
  16. package/alicloud/authBackendRole.d.ts +21 -0
  17. package/alicloud/authBackendRole.js +2 -0
  18. package/alicloud/authBackendRole.js.map +1 -1
  19. package/alicloud/index.d.ts +3 -1
  20. package/alicloud/index.js +4 -19
  21. package/alicloud/index.js.map +1 -1
  22. package/approle/authBackendLogin.d.ts +22 -1
  23. package/approle/authBackendLogin.js +3 -1
  24. package/approle/authBackendLogin.js.map +1 -1
  25. package/approle/authBackendRole.d.ts +21 -0
  26. package/approle/authBackendRole.js +2 -0
  27. package/approle/authBackendRole.js.map +1 -1
  28. package/approle/{authBackendRoleSecretID.d.ts → authBackendRoleSecretId.d.ts} +33 -12
  29. package/approle/{authBackendRoleSecretID.js → authBackendRoleSecretId.js} +16 -12
  30. package/approle/authBackendRoleSecretId.js.map +1 -0
  31. package/approle/getAuthBackendRoleId.d.ts +15 -0
  32. package/approle/getAuthBackendRoleId.js +1 -0
  33. package/approle/getAuthBackendRoleId.js.map +1 -1
  34. package/approle/index.d.ts +12 -4
  35. package/approle/index.js +15 -28
  36. package/approle/index.js.map +1 -1
  37. package/audit.d.ts +21 -0
  38. package/audit.js +2 -0
  39. package/audit.js.map +1 -1
  40. package/authBackend.d.ts +47 -10
  41. package/authBackend.js +4 -0
  42. package/authBackend.js.map +1 -1
  43. package/aws/authBackendCert.d.ts +21 -0
  44. package/aws/authBackendCert.js +2 -0
  45. package/aws/authBackendCert.js.map +1 -1
  46. package/aws/authBackendClient.d.ts +21 -0
  47. package/aws/authBackendClient.js +6 -2
  48. package/aws/authBackendClient.js.map +1 -1
  49. package/aws/authBackendIdentityWhitelist.d.ts +21 -0
  50. package/aws/authBackendIdentityWhitelist.js +2 -0
  51. package/aws/authBackendIdentityWhitelist.js.map +1 -1
  52. package/aws/authBackendLogin.d.ts +21 -0
  53. package/aws/authBackendLogin.js +4 -0
  54. package/aws/authBackendLogin.js.map +1 -1
  55. package/aws/authBackendRole.d.ts +21 -0
  56. package/aws/authBackendRole.js +2 -0
  57. package/aws/authBackendRole.js.map +1 -1
  58. package/aws/authBackendRoleTag.d.ts +21 -0
  59. package/aws/authBackendRoleTag.js +2 -0
  60. package/aws/authBackendRoleTag.js.map +1 -1
  61. package/aws/authBackendRoletagBlacklist.d.ts +21 -0
  62. package/aws/authBackendRoletagBlacklist.js +2 -0
  63. package/aws/authBackendRoletagBlacklist.js.map +1 -1
  64. package/aws/authBackendStsRole.d.ts +21 -0
  65. package/aws/authBackendStsRole.js +2 -0
  66. package/aws/authBackendStsRole.js.map +1 -1
  67. package/aws/getAccessCredentials.d.ts +15 -0
  68. package/aws/getAccessCredentials.js +1 -0
  69. package/aws/getAccessCredentials.js.map +1 -1
  70. package/aws/index.d.ts +33 -11
  71. package/aws/index.js +34 -47
  72. package/aws/index.js.map +1 -1
  73. package/aws/secretBackend.d.ts +36 -12
  74. package/aws/secretBackend.js +8 -14
  75. package/aws/secretBackend.js.map +1 -1
  76. package/aws/secretBackendRole.d.ts +21 -0
  77. package/aws/secretBackendRole.js +2 -0
  78. package/aws/secretBackendRole.js.map +1 -1
  79. package/azure/authBackendConfig.d.ts +21 -0
  80. package/azure/authBackendConfig.js +7 -3
  81. package/azure/authBackendConfig.js.map +1 -1
  82. package/azure/authBackendRole.d.ts +21 -0
  83. package/azure/authBackendRole.js +2 -0
  84. package/azure/authBackendRole.js.map +1 -1
  85. package/azure/backend.d.ts +36 -0
  86. package/azure/backend.js +10 -4
  87. package/azure/backend.js.map +1 -1
  88. package/azure/backendRole.d.ts +23 -1
  89. package/azure/backendRole.js +2 -0
  90. package/azure/backendRole.js.map +1 -1
  91. package/azure/getAccessCredentials.d.ts +15 -0
  92. package/azure/getAccessCredentials.js +1 -0
  93. package/azure/getAccessCredentials.js.map +1 -1
  94. package/azure/index.d.ts +15 -5
  95. package/azure/index.js +16 -29
  96. package/azure/index.js.map +1 -1
  97. package/certAuthBackendRole.d.ts +39 -3
  98. package/certAuthBackendRole.js +4 -0
  99. package/certAuthBackendRole.js.map +1 -1
  100. package/config/vars.d.ts +43 -3
  101. package/config/vars.js +64 -4
  102. package/config/vars.js.map +1 -1
  103. package/consul/index.d.ts +6 -2
  104. package/consul/index.js +7 -22
  105. package/consul/index.js.map +1 -1
  106. package/consul/secretBackend.d.ts +87 -15
  107. package/consul/secretBackend.js +24 -7
  108. package/consul/secretBackend.js.map +1 -1
  109. package/consul/secretBackendRole.d.ts +93 -10
  110. package/consul/secretBackendRole.js +14 -1
  111. package/consul/secretBackendRole.js.map +1 -1
  112. package/database/index.d.ts +12 -4
  113. package/database/index.js +13 -28
  114. package/database/index.js.map +1 -1
  115. package/database/secretBackendConnection.d.ts +35 -1
  116. package/database/secretBackendConnection.js +4 -0
  117. package/database/secretBackendConnection.js.map +1 -1
  118. package/database/secretBackendRole.d.ts +21 -0
  119. package/database/secretBackendRole.js +2 -0
  120. package/database/secretBackendRole.js.map +1 -1
  121. package/database/secretBackendStaticRole.d.ts +21 -0
  122. package/database/secretBackendStaticRole.js +2 -0
  123. package/database/secretBackendStaticRole.js.map +1 -1
  124. package/database/secretsMount.d.ts +41 -1
  125. package/database/secretsMount.js +6 -0
  126. package/database/secretsMount.js.map +1 -1
  127. package/egpPolicy.d.ts +21 -0
  128. package/egpPolicy.js +2 -0
  129. package/egpPolicy.js.map +1 -1
  130. package/gcp/authBackend.d.ts +71 -1
  131. package/gcp/authBackend.js +18 -2
  132. package/gcp/authBackend.js.map +1 -1
  133. package/gcp/authBackendRole.d.ts +21 -0
  134. package/gcp/authBackendRole.js +2 -0
  135. package/gcp/authBackendRole.js.map +1 -1
  136. package/gcp/getAuthBackendRole.d.ts +15 -0
  137. package/gcp/getAuthBackendRole.js +1 -0
  138. package/gcp/getAuthBackendRole.js.map +1 -1
  139. package/gcp/index.d.ts +18 -6
  140. package/gcp/index.js +19 -32
  141. package/gcp/index.js.map +1 -1
  142. package/gcp/secretBackend.d.ts +36 -0
  143. package/gcp/secretBackend.js +7 -1
  144. package/gcp/secretBackend.js.map +1 -1
  145. package/gcp/secretRoleset.d.ts +23 -1
  146. package/gcp/secretRoleset.js +2 -0
  147. package/gcp/secretRoleset.js.map +1 -1
  148. package/gcp/secretStaticAccount.d.ts +23 -1
  149. package/gcp/secretStaticAccount.js +2 -0
  150. package/gcp/secretStaticAccount.js.map +1 -1
  151. package/generic/endpoint.d.ts +21 -0
  152. package/generic/endpoint.js +5 -1
  153. package/generic/endpoint.js.map +1 -1
  154. package/generic/getSecret.d.ts +15 -0
  155. package/generic/getSecret.js +1 -0
  156. package/generic/getSecret.js.map +1 -1
  157. package/generic/index.d.ts +9 -3
  158. package/generic/index.js +10 -23
  159. package/generic/index.js.map +1 -1
  160. package/generic/secret.d.ts +21 -0
  161. package/generic/secret.js +5 -1
  162. package/generic/secret.js.map +1 -1
  163. package/getAuthBackend.d.ts +16 -1
  164. package/getAuthBackend.js +1 -0
  165. package/getAuthBackend.js.map +1 -1
  166. package/getNomadAccessToken.d.ts +15 -0
  167. package/getNomadAccessToken.js +1 -0
  168. package/getNomadAccessToken.js.map +1 -1
  169. package/getPolicyDocument.d.ts +5 -1
  170. package/getPolicyDocument.js +1 -0
  171. package/getPolicyDocument.js.map +1 -1
  172. package/github/authBackend.d.ts +38 -1
  173. package/github/authBackend.js +4 -0
  174. package/github/authBackend.js.map +1 -1
  175. package/github/index.d.ts +9 -3
  176. package/github/index.js +10 -25
  177. package/github/index.js.map +1 -1
  178. package/github/team.d.ts +21 -0
  179. package/github/team.js +2 -0
  180. package/github/team.js.map +1 -1
  181. package/github/user.d.ts +21 -0
  182. package/github/user.js +2 -0
  183. package/github/user.js.map +1 -1
  184. package/identity/entity.d.ts +21 -0
  185. package/identity/entity.js +2 -0
  186. package/identity/entity.js.map +1 -1
  187. package/identity/entityAlias.d.ts +21 -0
  188. package/identity/entityAlias.js +2 -0
  189. package/identity/entityAlias.js.map +1 -1
  190. package/identity/entityPolicies.d.ts +21 -0
  191. package/identity/entityPolicies.js +2 -0
  192. package/identity/entityPolicies.js.map +1 -1
  193. package/identity/getEntity.d.ts +16 -1
  194. package/identity/getEntity.js +1 -0
  195. package/identity/getEntity.js.map +1 -1
  196. package/identity/getGroup.d.ts +15 -0
  197. package/identity/getGroup.js +1 -0
  198. package/identity/getGroup.js.map +1 -1
  199. package/identity/getOidcClientCreds.d.ts +15 -0
  200. package/identity/getOidcClientCreds.js +1 -0
  201. package/identity/getOidcClientCreds.js.map +1 -1
  202. package/identity/getOidcOpenidConfig.d.ts +15 -0
  203. package/identity/getOidcOpenidConfig.js +1 -0
  204. package/identity/getOidcOpenidConfig.js.map +1 -1
  205. package/identity/getOidcPublicKeys.d.ts +15 -0
  206. package/identity/getOidcPublicKeys.js +1 -0
  207. package/identity/getOidcPublicKeys.js.map +1 -1
  208. package/identity/group.d.ts +21 -0
  209. package/identity/group.js +2 -0
  210. package/identity/group.js.map +1 -1
  211. package/identity/groupAlias.d.ts +21 -0
  212. package/identity/groupAlias.js +2 -0
  213. package/identity/groupAlias.js.map +1 -1
  214. package/identity/groupMemberEntityIds.d.ts +21 -0
  215. package/identity/groupMemberEntityIds.js +2 -0
  216. package/identity/groupMemberEntityIds.js.map +1 -1
  217. package/identity/groupPolicies.d.ts +21 -0
  218. package/identity/groupPolicies.js +2 -0
  219. package/identity/groupPolicies.js.map +1 -1
  220. package/identity/index.d.ts +75 -20
  221. package/identity/index.js +86 -66
  222. package/identity/index.js.map +1 -1
  223. package/identity/mfaDuo.d.ts +200 -0
  224. package/identity/mfaDuo.js +110 -0
  225. package/identity/mfaDuo.js.map +1 -0
  226. package/identity/mfaLoginEnforcement.d.ts +170 -0
  227. package/identity/mfaLoginEnforcement.js +96 -0
  228. package/identity/mfaLoginEnforcement.js.map +1 -0
  229. package/identity/mfaOkta.d.ts +188 -0
  230. package/identity/mfaOkta.js +105 -0
  231. package/identity/mfaOkta.js.map +1 -0
  232. package/identity/mfaPingid.d.ts +190 -0
  233. package/identity/mfaPingid.js +102 -0
  234. package/identity/mfaPingid.js.map +1 -0
  235. package/identity/mfaTotp.d.ts +218 -0
  236. package/identity/mfaTotp.js +104 -0
  237. package/identity/mfaTotp.js.map +1 -0
  238. package/identity/oidc.d.ts +21 -0
  239. package/identity/oidc.js +2 -0
  240. package/identity/oidc.js.map +1 -1
  241. package/identity/oidcAssignment.d.ts +23 -2
  242. package/identity/oidcAssignment.js +4 -2
  243. package/identity/oidcAssignment.js.map +1 -1
  244. package/identity/oidcClient.d.ts +21 -0
  245. package/identity/oidcClient.js +4 -0
  246. package/identity/oidcClient.js.map +1 -1
  247. package/identity/oidcKey.d.ts +21 -0
  248. package/identity/oidcKey.js +2 -0
  249. package/identity/oidcKey.js.map +1 -1
  250. package/identity/oidcKeyAllowedClientID.d.ts +21 -0
  251. package/identity/oidcKeyAllowedClientID.js +2 -0
  252. package/identity/oidcKeyAllowedClientID.js.map +1 -1
  253. package/identity/oidcProvider.d.ts +21 -0
  254. package/identity/oidcProvider.js +2 -0
  255. package/identity/oidcProvider.js.map +1 -1
  256. package/identity/oidcRole.d.ts +21 -0
  257. package/identity/oidcRole.js +2 -0
  258. package/identity/oidcRole.js.map +1 -1
  259. package/identity/oidcScope.d.ts +22 -3
  260. package/identity/oidcScope.js +3 -3
  261. package/identity/oidcScope.js.map +1 -1
  262. package/index.d.ts +75 -25
  263. package/index.js +78 -83
  264. package/index.js.map +1 -1
  265. package/jwt/authBackend.d.ts +38 -1
  266. package/jwt/authBackend.js +7 -1
  267. package/jwt/authBackend.js.map +1 -1
  268. package/jwt/authBackendRole.d.ts +57 -0
  269. package/jwt/authBackendRole.js +6 -0
  270. package/jwt/authBackendRole.js.map +1 -1
  271. package/jwt/index.d.ts +6 -2
  272. package/jwt/index.js +7 -22
  273. package/jwt/index.js.map +1 -1
  274. package/kmip/index.d.ts +9 -3
  275. package/kmip/index.js +10 -25
  276. package/kmip/index.js.map +1 -1
  277. package/kmip/secretBackend.d.ts +36 -0
  278. package/kmip/secretBackend.js +4 -0
  279. package/kmip/secretBackend.js.map +1 -1
  280. package/kmip/secretRole.d.ts +21 -0
  281. package/kmip/secretRole.js +2 -0
  282. package/kmip/secretRole.js.map +1 -1
  283. package/kmip/secretScope.d.ts +21 -0
  284. package/kmip/secretScope.js +2 -0
  285. package/kmip/secretScope.js.map +1 -1
  286. package/kubernetes/authBackendConfig.d.ts +21 -0
  287. package/kubernetes/authBackendConfig.js +5 -1
  288. package/kubernetes/authBackendConfig.js.map +1 -1
  289. package/kubernetes/authBackendRole.d.ts +21 -0
  290. package/kubernetes/authBackendRole.js +2 -0
  291. package/kubernetes/authBackendRole.js.map +1 -1
  292. package/kubernetes/getAuthBackendConfig.d.ts +15 -0
  293. package/kubernetes/getAuthBackendConfig.js +1 -0
  294. package/kubernetes/getAuthBackendConfig.js.map +1 -1
  295. package/kubernetes/getAuthBackendRole.d.ts +15 -0
  296. package/kubernetes/getAuthBackendRole.js +1 -0
  297. package/kubernetes/getAuthBackendRole.js.map +1 -1
  298. package/kubernetes/getServiceAccountToken.d.ts +46 -0
  299. package/kubernetes/getServiceAccountToken.js +27 -0
  300. package/kubernetes/getServiceAccountToken.js.map +1 -0
  301. package/kubernetes/index.d.ts +21 -4
  302. package/kubernetes/index.js +26 -24
  303. package/kubernetes/index.js.map +1 -1
  304. package/kubernetes/secretBackend.d.ts +303 -0
  305. package/kubernetes/secretBackend.js +114 -0
  306. package/kubernetes/secretBackend.js.map +1 -0
  307. package/kubernetes/secretBackendRole.d.ts +367 -0
  308. package/kubernetes/secretBackendRole.js +191 -0
  309. package/kubernetes/secretBackendRole.js.map +1 -0
  310. package/kv/getSecret.d.ts +104 -0
  311. package/kv/getSecret.js +53 -0
  312. package/kv/getSecret.js.map +1 -0
  313. package/kv/getSecretSubkeysV2.d.ts +42 -0
  314. package/kv/getSecretSubkeysV2.js +26 -0
  315. package/kv/getSecretSubkeysV2.js.map +1 -0
  316. package/kv/getSecretV2.d.ts +139 -0
  317. package/kv/getSecretV2.js +58 -0
  318. package/kv/getSecretV2.js.map +1 -0
  319. package/kv/getSecretsList.d.ts +85 -0
  320. package/kv/getSecretsList.js +58 -0
  321. package/kv/getSecretsList.js.map +1 -0
  322. package/kv/getSecretsListV2.d.ts +114 -0
  323. package/kv/getSecretsListV2.js +69 -0
  324. package/kv/getSecretsListV2.js.map +1 -0
  325. package/kv/index.d.ts +24 -0
  326. package/kv/index.js +47 -0
  327. package/kv/index.js.map +1 -0
  328. package/kv/secret.d.ts +145 -0
  329. package/kv/secret.js +106 -0
  330. package/kv/secret.js.map +1 -0
  331. package/kv/secretBackendV2.d.ts +154 -0
  332. package/kv/secretBackendV2.js +103 -0
  333. package/kv/secretBackendV2.js.map +1 -0
  334. package/kv/secretV2.d.ts +257 -0
  335. package/kv/secretV2.js +122 -0
  336. package/kv/secretV2.js.map +1 -0
  337. package/ldap/authBackend.d.ts +48 -0
  338. package/ldap/authBackend.js +10 -2
  339. package/ldap/authBackend.js.map +1 -1
  340. package/ldap/authBackendGroup.d.ts +21 -0
  341. package/ldap/authBackendGroup.js +2 -0
  342. package/ldap/authBackendGroup.js.map +1 -1
  343. package/ldap/authBackendUser.d.ts +21 -0
  344. package/ldap/authBackendUser.js +2 -0
  345. package/ldap/authBackendUser.js.map +1 -1
  346. package/ldap/index.d.ts +9 -3
  347. package/ldap/index.js +10 -25
  348. package/ldap/index.js.map +1 -1
  349. package/managed/index.d.ts +3 -0
  350. package/managed/index.js +22 -0
  351. package/managed/index.js.map +1 -0
  352. package/managed/keys.d.ts +104 -0
  353. package/managed/keys.js +64 -0
  354. package/managed/keys.js.map +1 -0
  355. package/mfaDuo.d.ts +21 -0
  356. package/mfaDuo.js +6 -2
  357. package/mfaDuo.js.map +1 -1
  358. package/mfaOkta.d.ts +21 -0
  359. package/mfaOkta.js +5 -1
  360. package/mfaOkta.js.map +1 -1
  361. package/mfaPingid.d.ts +21 -0
  362. package/mfaPingid.js +2 -0
  363. package/mfaPingid.js.map +1 -1
  364. package/mfaTotp.d.ts +21 -0
  365. package/mfaTotp.js +2 -0
  366. package/mfaTotp.js.map +1 -1
  367. package/mount.d.ts +33 -0
  368. package/mount.js +4 -0
  369. package/mount.js.map +1 -1
  370. package/namespace.d.ts +32 -18
  371. package/namespace.js +5 -16
  372. package/namespace.js.map +1 -1
  373. package/nomadSecretBackend.d.ts +36 -0
  374. package/nomadSecretBackend.js +9 -3
  375. package/nomadSecretBackend.js.map +1 -1
  376. package/nomadSecretRole.d.ts +21 -0
  377. package/nomadSecretRole.js +2 -0
  378. package/nomadSecretRole.js.map +1 -1
  379. package/okta/authBackend.d.ts +38 -1
  380. package/okta/authBackend.js +7 -1
  381. package/okta/authBackend.js.map +1 -1
  382. package/okta/authBackendGroup.d.ts +21 -0
  383. package/okta/authBackendGroup.js +2 -0
  384. package/okta/authBackendGroup.js.map +1 -1
  385. package/okta/authBackendUser.d.ts +21 -0
  386. package/okta/authBackendUser.js +2 -0
  387. package/okta/authBackendUser.js.map +1 -1
  388. package/okta/index.d.ts +9 -3
  389. package/okta/index.js +10 -25
  390. package/okta/index.js.map +1 -1
  391. package/package.json +2 -2
  392. package/package.json.dev +2 -2
  393. package/passwordPolicy.d.ts +21 -0
  394. package/passwordPolicy.js +2 -0
  395. package/passwordPolicy.js.map +1 -1
  396. package/pkisecret/index.d.ts +30 -10
  397. package/pkisecret/index.js +31 -46
  398. package/pkisecret/index.js.map +1 -1
  399. package/pkisecret/secretBackendCert.d.ts +29 -0
  400. package/pkisecret/secretBackendCert.js +6 -0
  401. package/pkisecret/secretBackendCert.js.map +1 -1
  402. package/pkisecret/secretBackendConfigCa.d.ts +21 -0
  403. package/pkisecret/secretBackendConfigCa.js +5 -1
  404. package/pkisecret/secretBackendConfigCa.js.map +1 -1
  405. package/pkisecret/secretBackendConfigUrls.d.ts +21 -0
  406. package/pkisecret/secretBackendConfigUrls.js +2 -0
  407. package/pkisecret/secretBackendConfigUrls.js.map +1 -1
  408. package/pkisecret/secretBackendCrlConfig.d.ts +21 -0
  409. package/pkisecret/secretBackendCrlConfig.js +2 -0
  410. package/pkisecret/secretBackendCrlConfig.js.map +1 -1
  411. package/pkisecret/secretBackendIntermediateCertRequest.d.ts +54 -0
  412. package/pkisecret/secretBackendIntermediateCertRequest.js +8 -0
  413. package/pkisecret/secretBackendIntermediateCertRequest.js.map +1 -1
  414. package/pkisecret/secretBackendIntermediateSetSigned.d.ts +21 -0
  415. package/pkisecret/secretBackendIntermediateSetSigned.js +2 -0
  416. package/pkisecret/secretBackendIntermediateSetSigned.js.map +1 -1
  417. package/pkisecret/secretBackendRole.d.ts +24 -3
  418. package/pkisecret/secretBackendRole.js +2 -0
  419. package/pkisecret/secretBackendRole.js.map +1 -1
  420. package/pkisecret/secretBackendRootCert.d.ts +57 -3
  421. package/pkisecret/secretBackendRootCert.js +6 -0
  422. package/pkisecret/secretBackendRootCert.js.map +1 -1
  423. package/pkisecret/secretBackendRootSignIntermediate.d.ts +21 -0
  424. package/pkisecret/secretBackendRootSignIntermediate.js +2 -0
  425. package/pkisecret/secretBackendRootSignIntermediate.js.map +1 -1
  426. package/pkisecret/secretBackendSign.d.ts +29 -0
  427. package/pkisecret/secretBackendSign.js +4 -0
  428. package/pkisecret/secretBackendSign.js.map +1 -1
  429. package/policy.d.ts +21 -0
  430. package/policy.js +2 -0
  431. package/policy.js.map +1 -1
  432. package/provider.d.ts +43 -3
  433. package/provider.js +13 -3
  434. package/provider.js.map +1 -1
  435. package/quotaLeaseCount.d.ts +21 -0
  436. package/quotaLeaseCount.js +2 -0
  437. package/quotaLeaseCount.js.map +1 -1
  438. package/quotaRateLimit.d.ts +48 -0
  439. package/quotaRateLimit.js +6 -0
  440. package/quotaRateLimit.js.map +1 -1
  441. package/rabbitmq/index.d.ts +6 -2
  442. package/rabbitmq/index.js +7 -22
  443. package/rabbitmq/index.js.map +1 -1
  444. package/rabbitmq/secretBackend.d.ts +36 -0
  445. package/rabbitmq/secretBackend.js +8 -2
  446. package/rabbitmq/secretBackend.js.map +1 -1
  447. package/rabbitmq/secretBackendRole.d.ts +23 -1
  448. package/rabbitmq/secretBackendRole.js +2 -0
  449. package/rabbitmq/secretBackendRole.js.map +1 -1
  450. package/raftAutopilot.d.ts +21 -0
  451. package/raftAutopilot.js +2 -0
  452. package/raftAutopilot.js.map +1 -1
  453. package/raftSnapshotAgentConfig.d.ts +62 -0
  454. package/raftSnapshotAgentConfig.js +43 -0
  455. package/raftSnapshotAgentConfig.js.map +1 -1
  456. package/rgpPolicy.d.ts +21 -0
  457. package/rgpPolicy.js +2 -0
  458. package/rgpPolicy.js.map +1 -1
  459. package/ssh/index.d.ts +6 -2
  460. package/ssh/index.js +7 -22
  461. package/ssh/index.js.map +1 -1
  462. package/ssh/secretBackendCa.d.ts +29 -0
  463. package/ssh/secretBackendCa.js +13 -1
  464. package/ssh/secretBackendCa.js.map +1 -1
  465. package/ssh/secretBackendRole.d.ts +23 -1
  466. package/ssh/secretBackendRole.js +2 -0
  467. package/ssh/secretBackendRole.js.map +1 -1
  468. package/terraformcloud/index.d.ts +9 -3
  469. package/terraformcloud/index.js +10 -25
  470. package/terraformcloud/index.js.map +1 -1
  471. package/terraformcloud/secretBackend.d.ts +36 -0
  472. package/terraformcloud/secretBackend.js +7 -1
  473. package/terraformcloud/secretBackend.js.map +1 -1
  474. package/terraformcloud/secretCreds.d.ts +21 -0
  475. package/terraformcloud/secretCreds.js +4 -0
  476. package/terraformcloud/secretCreds.js.map +1 -1
  477. package/terraformcloud/secretRole.d.ts +21 -0
  478. package/terraformcloud/secretRole.js +2 -0
  479. package/terraformcloud/secretRole.js.map +1 -1
  480. package/token.d.ts +42 -0
  481. package/token.js +9 -0
  482. package/token.js.map +1 -1
  483. package/tokenauth/authBackendRole.d.ts +21 -0
  484. package/tokenauth/authBackendRole.js +2 -0
  485. package/tokenauth/authBackendRole.js.map +1 -1
  486. package/tokenauth/index.d.ts +3 -1
  487. package/tokenauth/index.js +4 -19
  488. package/tokenauth/index.js.map +1 -1
  489. package/transform/index.d.ts +18 -6
  490. package/transform/index.js +19 -30
  491. package/transform/index.js.map +1 -1
  492. package/transform/transformation.d.ts +0 -25
  493. package/transform/transformation.js +0 -25
  494. package/transform/transformation.js.map +1 -1
  495. package/transit/getDecrypt.d.ts +3 -0
  496. package/transit/getDecrypt.js +1 -0
  497. package/transit/getDecrypt.js.map +1 -1
  498. package/transit/getEncrypt.d.ts +3 -0
  499. package/transit/getEncrypt.js +1 -0
  500. package/transit/getEncrypt.js.map +1 -1
  501. package/transit/index.d.ts +12 -4
  502. package/transit/index.js +13 -24
  503. package/transit/index.js.map +1 -1
  504. package/transit/secretBackendKey.d.ts +21 -0
  505. package/transit/secretBackendKey.js +2 -0
  506. package/transit/secretBackendKey.js.map +1 -1
  507. package/transit/secretCacheConfig.d.ts +21 -0
  508. package/transit/secretCacheConfig.js +2 -0
  509. package/transit/secretCacheConfig.js.map +1 -1
  510. package/types/index.js.map +1 -1
  511. package/types/input.d.ts +408 -4
  512. package/types/output.d.ts +409 -5
  513. package/utilities.js +13 -1
  514. package/utilities.js.map +1 -1
  515. package/approle/authBackendRoleSecretID.js.map +0 -1
@@ -1 +1 @@
1
- {"version":3,"file":"authBackendRoleTag.js","sourceRoot":"","sources":["../../aws/authBackendRoleTag.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;GAEG;AACH,MAAa,kBAAmB,SAAQ,MAAM,CAAC,cAAc;IA2EzD,YAAY,IAAY,EAAE,WAA8D,EAAE,IAAmC;QACzH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAkD,CAAC;YACjE,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,0BAA0B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;SACnE;aAAM;YACH,MAAM,IAAI,GAAG,WAAiD,CAAC;YAC/D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,0BAA0B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC7C,cAAc,CAAC,UAAU,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAClD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,kBAAkB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACvE,CAAC;IAzGD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA+B,EAAE,IAAmC;QAC7H,OAAO,IAAI,kBAAkB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACzE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,kBAAkB,CAAC,YAAY,CAAC;IACnE,CAAC;;AA1BL,gDA2GC;AA7FG,gBAAgB;AACO,+BAAY,GAAG,iDAAiD,CAAC"}
1
+ {"version":3,"file":"authBackendRoleTag.js","sourceRoot":"","sources":["../../aws/authBackendRoleTag.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;GAEG;AACH,MAAa,kBAAmB,SAAQ,MAAM,CAAC,cAAc;IAkFzD,YAAY,IAAY,EAAE,WAA8D,EAAE,IAAmC;QACzH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAkD,CAAC;YACjE,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,0BAA0B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;SACnE;aAAM;YACH,MAAM,IAAI,GAAG,WAAiD,CAAC;YAC/D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,0BAA0B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC7C,cAAc,CAAC,UAAU,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAClD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,kBAAkB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACvE,CAAC;IAlHD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA+B,EAAE,IAAmC;QAC7H,OAAO,IAAI,kBAAkB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACzE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,kBAAkB,CAAC,YAAY,CAAC;IACnE,CAAC;;AA1BL,gDAoHC;AAtGG,gBAAgB;AACO,+BAAY,GAAG,iDAAiD,CAAC"}
@@ -41,6 +41,13 @@ export declare class AuthBackendRoletagBlacklist extends pulumi.CustomResource {
41
41
  * tidying of the roletag blacklist entries. Defaults to false.
42
42
  */
43
43
  readonly disablePeriodicTidy: pulumi.Output<boolean | undefined>;
44
+ /**
45
+ * The namespace to provision the resource in.
46
+ * The value should not contain leading or trailing forward slashes.
47
+ * The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
48
+ * *Available only for Vault Enterprise*.
49
+ */
50
+ readonly namespace: pulumi.Output<string | undefined>;
44
51
  /**
45
52
  * The amount of extra time that must have passed
46
53
  * beyond the roletag expiration, before it is removed from the backend storage.
@@ -70,6 +77,13 @@ export interface AuthBackendRoletagBlacklistState {
70
77
  * tidying of the roletag blacklist entries. Defaults to false.
71
78
  */
72
79
  disablePeriodicTidy?: pulumi.Input<boolean>;
80
+ /**
81
+ * The namespace to provision the resource in.
82
+ * The value should not contain leading or trailing forward slashes.
83
+ * The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
84
+ * *Available only for Vault Enterprise*.
85
+ */
86
+ namespace?: pulumi.Input<string>;
73
87
  /**
74
88
  * The amount of extra time that must have passed
75
89
  * beyond the roletag expiration, before it is removed from the backend storage.
@@ -91,6 +105,13 @@ export interface AuthBackendRoletagBlacklistArgs {
91
105
  * tidying of the roletag blacklist entries. Defaults to false.
92
106
  */
93
107
  disablePeriodicTidy?: pulumi.Input<boolean>;
108
+ /**
109
+ * The namespace to provision the resource in.
110
+ * The value should not contain leading or trailing forward slashes.
111
+ * The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
112
+ * *Available only for Vault Enterprise*.
113
+ */
114
+ namespace?: pulumi.Input<string>;
94
115
  /**
95
116
  * The amount of extra time that must have passed
96
117
  * beyond the roletag expiration, before it is removed from the backend storage.
@@ -29,6 +29,7 @@ class AuthBackendRoletagBlacklist extends pulumi.CustomResource {
29
29
  const state = argsOrState;
30
30
  resourceInputs["backend"] = state ? state.backend : undefined;
31
31
  resourceInputs["disablePeriodicTidy"] = state ? state.disablePeriodicTidy : undefined;
32
+ resourceInputs["namespace"] = state ? state.namespace : undefined;
32
33
  resourceInputs["safetyBuffer"] = state ? state.safetyBuffer : undefined;
33
34
  }
34
35
  else {
@@ -38,6 +39,7 @@ class AuthBackendRoletagBlacklist extends pulumi.CustomResource {
38
39
  }
39
40
  resourceInputs["backend"] = args ? args.backend : undefined;
40
41
  resourceInputs["disablePeriodicTidy"] = args ? args.disablePeriodicTidy : undefined;
42
+ resourceInputs["namespace"] = args ? args.namespace : undefined;
41
43
  resourceInputs["safetyBuffer"] = args ? args.safetyBuffer : undefined;
42
44
  }
43
45
  opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
@@ -1 +1 @@
1
- {"version":3,"file":"authBackendRoletagBlacklist.js","sourceRoot":"","sources":["../../aws/authBackendRoletagBlacklist.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;GAeG;AACH,MAAa,2BAA4B,SAAQ,MAAM,CAAC,cAAc;IAqDlE,YAAY,IAAY,EAAE,WAAgF,EAAE,IAAmC;QAC3I,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA2D,CAAC;YAC1E,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3E;aAAM;YACH,MAAM,IAAI,GAAG,WAA0D,CAAC;YACxE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;SACzE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,2BAA2B,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAChF,CAAC;IAvED;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAwC,EAAE,IAAmC;QACtI,OAAO,IAAI,2BAA2B,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAClF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,2BAA2B,CAAC,YAAY,CAAC;IAC5E,CAAC;;AA1BL,kEAyEC;AA3DG,gBAAgB;AACO,wCAAY,GAAG,mEAAmE,CAAC"}
1
+ {"version":3,"file":"authBackendRoletagBlacklist.js","sourceRoot":"","sources":["../../aws/authBackendRoletagBlacklist.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;GAeG;AACH,MAAa,2BAA4B,SAAQ,MAAM,CAAC,cAAc;IA4DlE,YAAY,IAAY,EAAE,WAAgF,EAAE,IAAmC;QAC3I,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA2D,CAAC;YAC1E,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3E;aAAM;YACH,MAAM,IAAI,GAAG,WAA0D,CAAC;YACxE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;SACzE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,2BAA2B,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAChF,CAAC;IAhFD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAwC,EAAE,IAAmC;QACtI,OAAO,IAAI,2BAA2B,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAClF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,2BAA2B,CAAC,YAAY,CAAC;IAC5E,CAAC;;AA1BL,kEAkFC;AApEG,gBAAgB;AACO,wCAAY,GAAG,mEAAmE,CAAC"}
@@ -47,6 +47,13 @@ export declare class AuthBackendStsRole extends pulumi.CustomResource {
47
47
  * mounted at. Defaults to `aws`.
48
48
  */
49
49
  readonly backend: pulumi.Output<string | undefined>;
50
+ /**
51
+ * The namespace to provision the resource in.
52
+ * The value should not contain leading or trailing forward slashes.
53
+ * The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
54
+ * *Available only for Vault Enterprise*.
55
+ */
56
+ readonly namespace: pulumi.Output<string | undefined>;
50
57
  /**
51
58
  * The STS role to assume when verifying requests made
52
59
  * by EC2 instances in the account specified by `accountId`.
@@ -74,6 +81,13 @@ export interface AuthBackendStsRoleState {
74
81
  * mounted at. Defaults to `aws`.
75
82
  */
76
83
  backend?: pulumi.Input<string>;
84
+ /**
85
+ * The namespace to provision the resource in.
86
+ * The value should not contain leading or trailing forward slashes.
87
+ * The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
88
+ * *Available only for Vault Enterprise*.
89
+ */
90
+ namespace?: pulumi.Input<string>;
77
91
  /**
78
92
  * The STS role to assume when verifying requests made
79
93
  * by EC2 instances in the account specified by `accountId`.
@@ -93,6 +107,13 @@ export interface AuthBackendStsRoleArgs {
93
107
  * mounted at. Defaults to `aws`.
94
108
  */
95
109
  backend?: pulumi.Input<string>;
110
+ /**
111
+ * The namespace to provision the resource in.
112
+ * The value should not contain leading or trailing forward slashes.
113
+ * The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
114
+ * *Available only for Vault Enterprise*.
115
+ */
116
+ namespace?: pulumi.Input<string>;
96
117
  /**
97
118
  * The STS role to assume when verifying requests made
98
119
  * by EC2 instances in the account specified by `accountId`.
@@ -36,6 +36,7 @@ class AuthBackendStsRole extends pulumi.CustomResource {
36
36
  const state = argsOrState;
37
37
  resourceInputs["accountId"] = state ? state.accountId : undefined;
38
38
  resourceInputs["backend"] = state ? state.backend : undefined;
39
+ resourceInputs["namespace"] = state ? state.namespace : undefined;
39
40
  resourceInputs["stsRole"] = state ? state.stsRole : undefined;
40
41
  }
41
42
  else {
@@ -48,6 +49,7 @@ class AuthBackendStsRole extends pulumi.CustomResource {
48
49
  }
49
50
  resourceInputs["accountId"] = args ? args.accountId : undefined;
50
51
  resourceInputs["backend"] = args ? args.backend : undefined;
52
+ resourceInputs["namespace"] = args ? args.namespace : undefined;
51
53
  resourceInputs["stsRole"] = args ? args.stsRole : undefined;
52
54
  }
53
55
  opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
@@ -1 +1 @@
1
- {"version":3,"file":"authBackendStsRole.js","sourceRoot":"","sources":["../../aws/authBackendStsRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;GAsBG;AACH,MAAa,kBAAmB,SAAQ,MAAM,CAAC,cAAc;IAmDzD,YAAY,IAAY,EAAE,WAA8D,EAAE,IAAmC;QACzH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAkD,CAAC;YACjE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;SACjE;aAAM;YACH,MAAM,IAAI,GAAG,WAAiD,CAAC;YAC/D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,SAAS,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACtD,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,kBAAkB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACvE,CAAC;IAxED;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA+B,EAAE,IAAmC;QAC7H,OAAO,IAAI,kBAAkB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACzE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,kBAAkB,CAAC,YAAY,CAAC;IACnE,CAAC;;AA1BL,gDA0EC;AA5DG,gBAAgB;AACO,+BAAY,GAAG,iDAAiD,CAAC"}
1
+ {"version":3,"file":"authBackendStsRole.js","sourceRoot":"","sources":["../../aws/authBackendStsRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;GAsBG;AACH,MAAa,kBAAmB,SAAQ,MAAM,CAAC,cAAc;IA0DzD,YAAY,IAAY,EAAE,WAA8D,EAAE,IAAmC;QACzH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAkD,CAAC;YACjE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;SACjE;aAAM;YACH,MAAM,IAAI,GAAG,WAAiD,CAAC;YAC/D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,SAAS,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACtD,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,kBAAkB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACvE,CAAC;IAjFD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA+B,EAAE,IAAmC;QAC7H,OAAO,IAAI,kBAAkB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACzE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,kBAAkB,CAAC,YAAY,CAAC;IACnE,CAAC;;AA1BL,gDAmFC;AArEG,gBAAgB;AACO,+BAAY,GAAG,iDAAiD,CAAC"}
@@ -9,6 +9,13 @@ export interface GetAccessCredentialsArgs {
9
9
  * read credentials from, with no leading or trailing `/`s.
10
10
  */
11
11
  backend: string;
12
+ /**
13
+ * The namespace of the target resource.
14
+ * The value should not contain leading or trailing forward slashes.
15
+ * The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
16
+ * *Available only for Vault Enterprise*.
17
+ */
18
+ namespace?: string;
12
19
  region?: string;
13
20
  /**
14
21
  * The name of the AWS secret backend role to read
@@ -60,6 +67,7 @@ export interface GetAccessCredentialsResult {
60
67
  readonly leaseId: string;
61
68
  readonly leaseRenewable: boolean;
62
69
  readonly leaseStartTime: string;
70
+ readonly namespace?: string;
63
71
  readonly region?: string;
64
72
  readonly role: string;
65
73
  readonly roleArn?: string;
@@ -84,6 +92,13 @@ export interface GetAccessCredentialsOutputArgs {
84
92
  * read credentials from, with no leading or trailing `/`s.
85
93
  */
86
94
  backend: pulumi.Input<string>;
95
+ /**
96
+ * The namespace of the target resource.
97
+ * The value should not contain leading or trailing forward slashes.
98
+ * The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
99
+ * *Available only for Vault Enterprise*.
100
+ */
101
+ namespace?: pulumi.Input<string>;
87
102
  region?: pulumi.Input<string>;
88
103
  /**
89
104
  * The name of the AWS secret backend role to read
@@ -12,6 +12,7 @@ function getAccessCredentials(args, opts) {
12
12
  opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
13
13
  return pulumi.runtime.invoke("vault:aws/getAccessCredentials:getAccessCredentials", {
14
14
  "backend": args.backend,
15
+ "namespace": args.namespace,
15
16
  "region": args.region,
16
17
  "role": args.role,
17
18
  "roleArn": args.roleArn,
@@ -1 +1 @@
1
- {"version":3,"file":"getAccessCredentials.js","sourceRoot":"","sources":["../../aws/getAccessCredentials.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,SAAgB,oBAAoB,CAAC,IAA8B,EAAE,IAA2B;IAC5F,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,qDAAqD,EAAE;QAChF,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,QAAQ,EAAE,IAAI,CAAC,MAAM;QACrB,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,KAAK,EAAE,IAAI,CAAC,GAAG;QACf,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAdD,oDAcC;AA8ED,SAAgB,0BAA0B,CAAC,IAAoC,EAAE,IAA2B;IACxG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,oBAAoB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACxE,CAAC;AAFD,gEAEC"}
1
+ {"version":3,"file":"getAccessCredentials.js","sourceRoot":"","sources":["../../aws/getAccessCredentials.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,SAAgB,oBAAoB,CAAC,IAA8B,EAAE,IAA2B;IAC5F,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,qDAAqD,EAAE;QAChF,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,WAAW,EAAE,IAAI,CAAC,SAAS;QAC3B,QAAQ,EAAE,IAAI,CAAC,MAAM;QACrB,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,KAAK,EAAE,IAAI,CAAC,GAAG;QACf,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAfD,oDAeC;AAsFD,SAAgB,0BAA0B,CAAC,IAAoC,EAAE,IAA2B;IACxG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,oBAAoB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACxE,CAAC;AAFD,gEAEC"}
package/aws/index.d.ts CHANGED
@@ -1,11 +1,33 @@
1
- export * from "./authBackendCert";
2
- export * from "./authBackendClient";
3
- export * from "./authBackendIdentityWhitelist";
4
- export * from "./authBackendLogin";
5
- export * from "./authBackendRole";
6
- export * from "./authBackendRoleTag";
7
- export * from "./authBackendRoletagBlacklist";
8
- export * from "./authBackendStsRole";
9
- export * from "./getAccessCredentials";
10
- export * from "./secretBackend";
11
- export * from "./secretBackendRole";
1
+ export { AuthBackendCertArgs, AuthBackendCertState } from "./authBackendCert";
2
+ export declare type AuthBackendCert = import("./authBackendCert").AuthBackendCert;
3
+ export declare const AuthBackendCert: typeof import("./authBackendCert").AuthBackendCert;
4
+ export { AuthBackendClientArgs, AuthBackendClientState } from "./authBackendClient";
5
+ export declare type AuthBackendClient = import("./authBackendClient").AuthBackendClient;
6
+ export declare const AuthBackendClient: typeof import("./authBackendClient").AuthBackendClient;
7
+ export { AuthBackendIdentityWhitelistArgs, AuthBackendIdentityWhitelistState } from "./authBackendIdentityWhitelist";
8
+ export declare type AuthBackendIdentityWhitelist = import("./authBackendIdentityWhitelist").AuthBackendIdentityWhitelist;
9
+ export declare const AuthBackendIdentityWhitelist: typeof import("./authBackendIdentityWhitelist").AuthBackendIdentityWhitelist;
10
+ export { AuthBackendLoginArgs, AuthBackendLoginState } from "./authBackendLogin";
11
+ export declare type AuthBackendLogin = import("./authBackendLogin").AuthBackendLogin;
12
+ export declare const AuthBackendLogin: typeof import("./authBackendLogin").AuthBackendLogin;
13
+ export { AuthBackendRoleArgs, AuthBackendRoleState } from "./authBackendRole";
14
+ export declare type AuthBackendRole = import("./authBackendRole").AuthBackendRole;
15
+ export declare const AuthBackendRole: typeof import("./authBackendRole").AuthBackendRole;
16
+ export { AuthBackendRoleTagArgs, AuthBackendRoleTagState } from "./authBackendRoleTag";
17
+ export declare type AuthBackendRoleTag = import("./authBackendRoleTag").AuthBackendRoleTag;
18
+ export declare const AuthBackendRoleTag: typeof import("./authBackendRoleTag").AuthBackendRoleTag;
19
+ export { AuthBackendRoletagBlacklistArgs, AuthBackendRoletagBlacklistState } from "./authBackendRoletagBlacklist";
20
+ export declare type AuthBackendRoletagBlacklist = import("./authBackendRoletagBlacklist").AuthBackendRoletagBlacklist;
21
+ export declare const AuthBackendRoletagBlacklist: typeof import("./authBackendRoletagBlacklist").AuthBackendRoletagBlacklist;
22
+ export { AuthBackendStsRoleArgs, AuthBackendStsRoleState } from "./authBackendStsRole";
23
+ export declare type AuthBackendStsRole = import("./authBackendStsRole").AuthBackendStsRole;
24
+ export declare const AuthBackendStsRole: typeof import("./authBackendStsRole").AuthBackendStsRole;
25
+ export { GetAccessCredentialsArgs, GetAccessCredentialsResult, GetAccessCredentialsOutputArgs } from "./getAccessCredentials";
26
+ export declare const getAccessCredentials: typeof import("./getAccessCredentials").getAccessCredentials;
27
+ export declare const getAccessCredentialsOutput: typeof import("./getAccessCredentials").getAccessCredentialsOutput;
28
+ export { SecretBackendArgs, SecretBackendState } from "./secretBackend";
29
+ export declare type SecretBackend = import("./secretBackend").SecretBackend;
30
+ export declare const SecretBackend: typeof import("./secretBackend").SecretBackend;
31
+ export { SecretBackendRoleArgs, SecretBackendRoleState } from "./secretBackendRole";
32
+ export declare type SecretBackendRole = import("./secretBackendRole").SecretBackendRole;
33
+ export declare const SecretBackendRole: typeof import("./secretBackendRole").SecretBackendRole;
package/aws/index.js CHANGED
@@ -1,70 +1,57 @@
1
1
  "use strict";
2
2
  // *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  // *** Do not edit by hand unless you're certain you know what you are doing! ***
4
- var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
5
- if (k2 === undefined) k2 = k;
6
- var desc = Object.getOwnPropertyDescriptor(m, k);
7
- if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
8
- desc = { enumerable: true, get: function() { return m[k]; } };
9
- }
10
- Object.defineProperty(o, k2, desc);
11
- }) : (function(o, m, k, k2) {
12
- if (k2 === undefined) k2 = k;
13
- o[k2] = m[k];
14
- }));
15
- var __exportStar = (this && this.__exportStar) || function(m, exports) {
16
- for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
17
- };
18
4
  Object.defineProperty(exports, "__esModule", { value: true });
5
+ exports.SecretBackendRole = exports.SecretBackend = exports.getAccessCredentialsOutput = exports.getAccessCredentials = exports.AuthBackendStsRole = exports.AuthBackendRoletagBlacklist = exports.AuthBackendRoleTag = exports.AuthBackendRole = exports.AuthBackendLogin = exports.AuthBackendIdentityWhitelist = exports.AuthBackendClient = exports.AuthBackendCert = void 0;
19
6
  const pulumi = require("@pulumi/pulumi");
20
7
  const utilities = require("../utilities");
21
- // Export members:
22
- __exportStar(require("./authBackendCert"), exports);
23
- __exportStar(require("./authBackendClient"), exports);
24
- __exportStar(require("./authBackendIdentityWhitelist"), exports);
25
- __exportStar(require("./authBackendLogin"), exports);
26
- __exportStar(require("./authBackendRole"), exports);
27
- __exportStar(require("./authBackendRoleTag"), exports);
28
- __exportStar(require("./authBackendRoletagBlacklist"), exports);
29
- __exportStar(require("./authBackendStsRole"), exports);
30
- __exportStar(require("./getAccessCredentials"), exports);
31
- __exportStar(require("./secretBackend"), exports);
32
- __exportStar(require("./secretBackendRole"), exports);
33
- // Import resources to register:
34
- const authBackendCert_1 = require("./authBackendCert");
35
- const authBackendClient_1 = require("./authBackendClient");
36
- const authBackendIdentityWhitelist_1 = require("./authBackendIdentityWhitelist");
37
- const authBackendLogin_1 = require("./authBackendLogin");
38
- const authBackendRole_1 = require("./authBackendRole");
39
- const authBackendRoleTag_1 = require("./authBackendRoleTag");
40
- const authBackendRoletagBlacklist_1 = require("./authBackendRoletagBlacklist");
41
- const authBackendStsRole_1 = require("./authBackendStsRole");
42
- const secretBackend_1 = require("./secretBackend");
43
- const secretBackendRole_1 = require("./secretBackendRole");
8
+ exports.AuthBackendCert = null;
9
+ exports.AuthBackendClient = null;
10
+ exports.AuthBackendIdentityWhitelist = null;
11
+ exports.AuthBackendLogin = null;
12
+ exports.AuthBackendRole = null;
13
+ exports.AuthBackendRoleTag = null;
14
+ exports.AuthBackendRoletagBlacklist = null;
15
+ exports.AuthBackendStsRole = null;
16
+ exports.getAccessCredentials = null;
17
+ exports.getAccessCredentialsOutput = null;
18
+ exports.SecretBackend = null;
19
+ exports.SecretBackendRole = null;
20
+ utilities.lazyLoad(exports, ["AuthBackendCert"], () => require("./authBackendCert"));
21
+ utilities.lazyLoad(exports, ["AuthBackendClient"], () => require("./authBackendClient"));
22
+ utilities.lazyLoad(exports, ["AuthBackendIdentityWhitelist"], () => require("./authBackendIdentityWhitelist"));
23
+ utilities.lazyLoad(exports, ["AuthBackendLogin"], () => require("./authBackendLogin"));
24
+ utilities.lazyLoad(exports, ["AuthBackendRole"], () => require("./authBackendRole"));
25
+ utilities.lazyLoad(exports, ["AuthBackendRoleTag"], () => require("./authBackendRoleTag"));
26
+ utilities.lazyLoad(exports, ["AuthBackendRoletagBlacklist"], () => require("./authBackendRoletagBlacklist"));
27
+ utilities.lazyLoad(exports, ["AuthBackendStsRole"], () => require("./authBackendStsRole"));
28
+ utilities.lazyLoad(exports, ["getAccessCredentials", "getAccessCredentialsOutput"], () => require("./getAccessCredentials"));
29
+ utilities.lazyLoad(exports, ["SecretBackend"], () => require("./secretBackend"));
30
+ utilities.lazyLoad(exports, ["SecretBackendRole"], () => require("./secretBackendRole"));
44
31
  const _module = {
45
32
  version: utilities.getVersion(),
46
33
  construct: (name, type, urn) => {
47
34
  switch (type) {
48
35
  case "vault:aws/authBackendCert:AuthBackendCert":
49
- return new authBackendCert_1.AuthBackendCert(name, undefined, { urn });
36
+ return new exports.AuthBackendCert(name, undefined, { urn });
50
37
  case "vault:aws/authBackendClient:AuthBackendClient":
51
- return new authBackendClient_1.AuthBackendClient(name, undefined, { urn });
38
+ return new exports.AuthBackendClient(name, undefined, { urn });
52
39
  case "vault:aws/authBackendIdentityWhitelist:AuthBackendIdentityWhitelist":
53
- return new authBackendIdentityWhitelist_1.AuthBackendIdentityWhitelist(name, undefined, { urn });
40
+ return new exports.AuthBackendIdentityWhitelist(name, undefined, { urn });
54
41
  case "vault:aws/authBackendLogin:AuthBackendLogin":
55
- return new authBackendLogin_1.AuthBackendLogin(name, undefined, { urn });
42
+ return new exports.AuthBackendLogin(name, undefined, { urn });
56
43
  case "vault:aws/authBackendRole:AuthBackendRole":
57
- return new authBackendRole_1.AuthBackendRole(name, undefined, { urn });
44
+ return new exports.AuthBackendRole(name, undefined, { urn });
58
45
  case "vault:aws/authBackendRoleTag:AuthBackendRoleTag":
59
- return new authBackendRoleTag_1.AuthBackendRoleTag(name, undefined, { urn });
46
+ return new exports.AuthBackendRoleTag(name, undefined, { urn });
60
47
  case "vault:aws/authBackendRoletagBlacklist:AuthBackendRoletagBlacklist":
61
- return new authBackendRoletagBlacklist_1.AuthBackendRoletagBlacklist(name, undefined, { urn });
48
+ return new exports.AuthBackendRoletagBlacklist(name, undefined, { urn });
62
49
  case "vault:aws/authBackendStsRole:AuthBackendStsRole":
63
- return new authBackendStsRole_1.AuthBackendStsRole(name, undefined, { urn });
50
+ return new exports.AuthBackendStsRole(name, undefined, { urn });
64
51
  case "vault:aws/secretBackend:SecretBackend":
65
- return new secretBackend_1.SecretBackend(name, undefined, { urn });
52
+ return new exports.SecretBackend(name, undefined, { urn });
66
53
  case "vault:aws/secretBackendRole:SecretBackendRole":
67
- return new secretBackendRole_1.SecretBackendRole(name, undefined, { urn });
54
+ return new exports.SecretBackendRole(name, undefined, { urn });
68
55
  default:
69
56
  throw new Error(`unknown resource type ${type}`);
70
57
  }
package/aws/index.js.map CHANGED
@@ -1 +1 @@
1
- {"version":3,"file":"index.js","sourceRoot":"","sources":["../../aws/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;;;;;;;;;;;;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,kBAAkB;AAClB,oDAAkC;AAClC,sDAAoC;AACpC,iEAA+C;AAC/C,qDAAmC;AACnC,oDAAkC;AAClC,uDAAqC;AACrC,gEAA8C;AAC9C,uDAAqC;AACrC,yDAAuC;AACvC,kDAAgC;AAChC,sDAAoC;AAEpC,gCAAgC;AAChC,uDAAoD;AACpD,2DAAwD;AACxD,iFAA8E;AAC9E,yDAAsD;AACtD,uDAAoD;AACpD,6DAA0D;AAC1D,+EAA4E;AAC5E,6DAA0D;AAC1D,mDAAgD;AAChD,2DAAwD;AAExD,MAAM,OAAO,GAAG;IACZ,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE;IAC/B,SAAS,EAAE,CAAC,IAAY,EAAE,IAAY,EAAE,GAAW,EAAmB,EAAE;QACpE,QAAQ,IAAI,EAAE;YACV,KAAK,2CAA2C;gBAC5C,OAAO,IAAI,iCAAe,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC7D,KAAK,+CAA+C;gBAChD,OAAO,IAAI,qCAAiB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC/D,KAAK,qEAAqE;gBACtE,OAAO,IAAI,2DAA4B,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC1E,KAAK,6CAA6C;gBAC9C,OAAO,IAAI,mCAAgB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC9D,KAAK,2CAA2C;gBAC5C,OAAO,IAAI,iCAAe,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC7D,KAAK,iDAAiD;gBAClD,OAAO,IAAI,uCAAkB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAChE,KAAK,mEAAmE;gBACpE,OAAO,IAAI,yDAA2B,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACzE,KAAK,iDAAiD;gBAClD,OAAO,IAAI,uCAAkB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAChE,KAAK,uCAAuC;gBACxC,OAAO,IAAI,6BAAa,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC3D,KAAK,+CAA+C;gBAChD,OAAO,IAAI,qCAAiB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC/D;gBACI,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,EAAE,CAAC,CAAC;SACxD;IACL,CAAC;CACJ,CAAC;AACF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,qBAAqB,EAAE,OAAO,CAAC,CAAA;AAC9E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,uBAAuB,EAAE,OAAO,CAAC,CAAA;AAChF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,kCAAkC,EAAE,OAAO,CAAC,CAAA;AAC3F,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,sBAAsB,EAAE,OAAO,CAAC,CAAA;AAC/E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,qBAAqB,EAAE,OAAO,CAAC,CAAA;AAC9E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,wBAAwB,EAAE,OAAO,CAAC,CAAA;AACjF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,iCAAiC,EAAE,OAAO,CAAC,CAAA;AAC1F,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,wBAAwB,EAAE,OAAO,CAAC,CAAA;AACjF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,mBAAmB,EAAE,OAAO,CAAC,CAAA;AAC5E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,uBAAuB,EAAE,OAAO,CAAC,CAAA"}
1
+ {"version":3,"file":"index.js","sourceRoot":"","sources":["../../aws/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAK7B,QAAA,eAAe,GAAuD,IAAW,CAAC;AAIlF,QAAA,iBAAiB,GAA2D,IAAW,CAAC;AAIxF,QAAA,4BAA4B,GAAiF,IAAW,CAAC;AAIzH,QAAA,gBAAgB,GAAyD,IAAW,CAAC;AAIrF,QAAA,eAAe,GAAuD,IAAW,CAAC;AAIlF,QAAA,kBAAkB,GAA6D,IAAW,CAAC;AAI3F,QAAA,2BAA2B,GAA+E,IAAW,CAAC;AAItH,QAAA,kBAAkB,GAA6D,IAAW,CAAC;AAG3F,QAAA,oBAAoB,GAAiE,IAAW,CAAC;AACjG,QAAA,0BAA0B,GAAuE,IAAW,CAAC;AAI7G,QAAA,aAAa,GAAmD,IAAW,CAAC;AAI5E,QAAA,iBAAiB,GAA2D,IAAW,CAAC;AAErG,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,iBAAiB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,mBAAmB,CAAC,CAAC,CAAC;AACrF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,mBAAmB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,qBAAqB,CAAC,CAAC,CAAC;AACzF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,8BAA8B,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,gCAAgC,CAAC,CAAC,CAAC;AAC/G,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,kBAAkB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,oBAAoB,CAAC,CAAC,CAAC;AACvF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,iBAAiB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,mBAAmB,CAAC,CAAC,CAAC;AACrF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,oBAAoB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,sBAAsB,CAAC,CAAC,CAAC;AAC3F,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,6BAA6B,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,+BAA+B,CAAC,CAAC,CAAC;AAC7G,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,oBAAoB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,sBAAsB,CAAC,CAAC,CAAC;AAC3F,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,sBAAsB,EAAC,4BAA4B,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,wBAAwB,CAAC,CAAC,CAAC;AAC5H,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,eAAe,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,iBAAiB,CAAC,CAAC,CAAC;AACjF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,mBAAmB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,qBAAqB,CAAC,CAAC,CAAC;AAEzF,MAAM,OAAO,GAAG;IACZ,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE;IAC/B,SAAS,EAAE,CAAC,IAAY,EAAE,IAAY,EAAE,GAAW,EAAmB,EAAE;QACpE,QAAQ,IAAI,EAAE;YACV,KAAK,2CAA2C;gBAC5C,OAAO,IAAI,uBAAe,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC7D,KAAK,+CAA+C;gBAChD,OAAO,IAAI,yBAAiB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC/D,KAAK,qEAAqE;gBACtE,OAAO,IAAI,oCAA4B,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC1E,KAAK,6CAA6C;gBAC9C,OAAO,IAAI,wBAAgB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC9D,KAAK,2CAA2C;gBAC5C,OAAO,IAAI,uBAAe,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC7D,KAAK,iDAAiD;gBAClD,OAAO,IAAI,0BAAkB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAChE,KAAK,mEAAmE;gBACpE,OAAO,IAAI,mCAA2B,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACzE,KAAK,iDAAiD;gBAClD,OAAO,IAAI,0BAAkB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAChE,KAAK,uCAAuC;gBACxC,OAAO,IAAI,qBAAa,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC3D,KAAK,+CAA+C;gBAChD,OAAO,IAAI,yBAAiB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC/D;gBACI,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,EAAE,CAAC,CAAC;SACxD;IACL,CAAC;CACJ,CAAC;AACF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,qBAAqB,EAAE,OAAO,CAAC,CAAA;AAC9E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,uBAAuB,EAAE,OAAO,CAAC,CAAA;AAChF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,kCAAkC,EAAE,OAAO,CAAC,CAAA;AAC3F,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,sBAAsB,EAAE,OAAO,CAAC,CAAA;AAC/E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,qBAAqB,EAAE,OAAO,CAAC,CAAA;AAC9E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,wBAAwB,EAAE,OAAO,CAAC,CAAA;AACjF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,iCAAiC,EAAE,OAAO,CAAC,CAAA;AAC1F,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,wBAAwB,EAAE,OAAO,CAAC,CAAA;AACjF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,mBAAmB,EAAE,OAAO,CAAC,CAAA;AAC5E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,uBAAuB,EAAE,OAAO,CAAC,CAAA"}
@@ -1,17 +1,5 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
2
  /**
3
- * ## Example Usage
4
- *
5
- * ```typescript
6
- * import * as pulumi from "@pulumi/pulumi";
7
- * import * as vault from "@pulumi/vault";
8
- *
9
- * const aws = new vault.aws.SecretBackend("aws", {
10
- * accessKey: "AKIA.....",
11
- * secretKey: "AWS secret key",
12
- * });
13
- * ```
14
- *
15
3
  * ## Import
16
4
  *
17
5
  * AWS secret backends can be imported using the `path`, e.g.
@@ -50,6 +38,11 @@ export declare class SecretBackend extends pulumi.CustomResource {
50
38
  * A human-friendly description for this backend.
51
39
  */
52
40
  readonly description: pulumi.Output<string | undefined>;
41
+ /**
42
+ * If set, opts out of mount migration on path updates.
43
+ * See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
44
+ */
45
+ readonly disableRemount: pulumi.Output<boolean | undefined>;
53
46
  /**
54
47
  * Specifies a custom HTTP IAM endpoint to use.
55
48
  */
@@ -59,6 +52,13 @@ export declare class SecretBackend extends pulumi.CustomResource {
59
52
  * for credentials issued by this backend.
60
53
  */
61
54
  readonly maxLeaseTtlSeconds: pulumi.Output<number>;
55
+ /**
56
+ * The namespace to provision the resource in.
57
+ * The value should not contain leading or trailing forward slashes.
58
+ * The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
59
+ * *Available only for Vault Enterprise*.
60
+ */
61
+ readonly namespace: pulumi.Output<string | undefined>;
62
62
  /**
63
63
  * The unique path this backend should be mounted at. Must
64
64
  * not begin or end with a `/`. Defaults to `aws`.
@@ -108,6 +108,11 @@ export interface SecretBackendState {
108
108
  * A human-friendly description for this backend.
109
109
  */
110
110
  description?: pulumi.Input<string>;
111
+ /**
112
+ * If set, opts out of mount migration on path updates.
113
+ * See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
114
+ */
115
+ disableRemount?: pulumi.Input<boolean>;
111
116
  /**
112
117
  * Specifies a custom HTTP IAM endpoint to use.
113
118
  */
@@ -117,6 +122,13 @@ export interface SecretBackendState {
117
122
  * for credentials issued by this backend.
118
123
  */
119
124
  maxLeaseTtlSeconds?: pulumi.Input<number>;
125
+ /**
126
+ * The namespace to provision the resource in.
127
+ * The value should not contain leading or trailing forward slashes.
128
+ * The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
129
+ * *Available only for Vault Enterprise*.
130
+ */
131
+ namespace?: pulumi.Input<string>;
120
132
  /**
121
133
  * The unique path this backend should be mounted at. Must
122
134
  * not begin or end with a `/`. Defaults to `aws`.
@@ -158,6 +170,11 @@ export interface SecretBackendArgs {
158
170
  * A human-friendly description for this backend.
159
171
  */
160
172
  description?: pulumi.Input<string>;
173
+ /**
174
+ * If set, opts out of mount migration on path updates.
175
+ * See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
176
+ */
177
+ disableRemount?: pulumi.Input<boolean>;
161
178
  /**
162
179
  * Specifies a custom HTTP IAM endpoint to use.
163
180
  */
@@ -167,6 +184,13 @@ export interface SecretBackendArgs {
167
184
  * for credentials issued by this backend.
168
185
  */
169
186
  maxLeaseTtlSeconds?: pulumi.Input<number>;
187
+ /**
188
+ * The namespace to provision the resource in.
189
+ * The value should not contain leading or trailing forward slashes.
190
+ * The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
191
+ * *Available only for Vault Enterprise*.
192
+ */
193
+ namespace?: pulumi.Input<string>;
170
194
  /**
171
195
  * The unique path this backend should be mounted at. Must
172
196
  * not begin or end with a `/`. Defaults to `aws`.
@@ -6,18 +6,6 @@ exports.SecretBackend = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("../utilities");
8
8
  /**
9
- * ## Example Usage
10
- *
11
- * ```typescript
12
- * import * as pulumi from "@pulumi/pulumi";
13
- * import * as vault from "@pulumi/vault";
14
- *
15
- * const aws = new vault.aws.SecretBackend("aws", {
16
- * accessKey: "AKIA.....",
17
- * secretKey: "AWS secret key",
18
- * });
19
- * ```
20
- *
21
9
  * ## Import
22
10
  *
23
11
  * AWS secret backends can be imported using the `path`, e.g.
@@ -35,8 +23,10 @@ class SecretBackend extends pulumi.CustomResource {
35
23
  resourceInputs["accessKey"] = state ? state.accessKey : undefined;
36
24
  resourceInputs["defaultLeaseTtlSeconds"] = state ? state.defaultLeaseTtlSeconds : undefined;
37
25
  resourceInputs["description"] = state ? state.description : undefined;
26
+ resourceInputs["disableRemount"] = state ? state.disableRemount : undefined;
38
27
  resourceInputs["iamEndpoint"] = state ? state.iamEndpoint : undefined;
39
28
  resourceInputs["maxLeaseTtlSeconds"] = state ? state.maxLeaseTtlSeconds : undefined;
29
+ resourceInputs["namespace"] = state ? state.namespace : undefined;
40
30
  resourceInputs["path"] = state ? state.path : undefined;
41
31
  resourceInputs["region"] = state ? state.region : undefined;
42
32
  resourceInputs["secretKey"] = state ? state.secretKey : undefined;
@@ -45,18 +35,22 @@ class SecretBackend extends pulumi.CustomResource {
45
35
  }
46
36
  else {
47
37
  const args = argsOrState;
48
- resourceInputs["accessKey"] = args ? args.accessKey : undefined;
38
+ resourceInputs["accessKey"] = (args === null || args === void 0 ? void 0 : args.accessKey) ? pulumi.secret(args.accessKey) : undefined;
49
39
  resourceInputs["defaultLeaseTtlSeconds"] = args ? args.defaultLeaseTtlSeconds : undefined;
50
40
  resourceInputs["description"] = args ? args.description : undefined;
41
+ resourceInputs["disableRemount"] = args ? args.disableRemount : undefined;
51
42
  resourceInputs["iamEndpoint"] = args ? args.iamEndpoint : undefined;
52
43
  resourceInputs["maxLeaseTtlSeconds"] = args ? args.maxLeaseTtlSeconds : undefined;
44
+ resourceInputs["namespace"] = args ? args.namespace : undefined;
53
45
  resourceInputs["path"] = args ? args.path : undefined;
54
46
  resourceInputs["region"] = args ? args.region : undefined;
55
- resourceInputs["secretKey"] = args ? args.secretKey : undefined;
47
+ resourceInputs["secretKey"] = (args === null || args === void 0 ? void 0 : args.secretKey) ? pulumi.secret(args.secretKey) : undefined;
56
48
  resourceInputs["stsEndpoint"] = args ? args.stsEndpoint : undefined;
57
49
  resourceInputs["usernameTemplate"] = args ? args.usernameTemplate : undefined;
58
50
  }
59
51
  opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
52
+ const secretOpts = { additionalSecretOutputs: ["accessKey", "secretKey"] };
53
+ opts = pulumi.mergeOptions(opts, secretOpts);
60
54
  super(SecretBackend.__pulumiType, name, resourceInputs, opts);
61
55
  }
62
56
  /**
@@ -1 +1 @@
1
- {"version":3,"file":"secretBackend.js","sourceRoot":"","sources":["../../aws/secretBackend.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;GAoBG;AACH,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;IAkFpD,YAAY,IAAY,EAAE,WAAoD,EAAE,IAAmC;QAC/G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA6C,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;SACnF;aAAM;YACH,MAAM,IAAI,GAAG,WAA4C,CAAC;YAC1D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;SACjF;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAClE,CAAC;IA/GD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA0B,EAAE,IAAmC;QACxH,OAAO,IAAI,aAAa,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACpE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,aAAa,CAAC,YAAY,CAAC;IAC9D,CAAC;;AA1BL,sCAiHC;AAnGG,gBAAgB;AACO,0BAAY,GAAG,uCAAuC,CAAC"}
1
+ {"version":3,"file":"secretBackend.js","sourceRoot":"","sources":["../../aws/secretBackend.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;GAQG;AACH,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;IA8FpD,YAAY,IAAY,EAAE,WAAoD,EAAE,IAAmC;QAC/G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA6C,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;SACnF;aAAM;YACH,MAAM,IAAI,GAAG,WAA4C,CAAC;YAC1D,cAAc,CAAC,WAAW,CAAC,GAAG,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,SAAS,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,WAAW,CAAC,GAAG,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,SAAS,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;SACjF;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,WAAW,EAAE,WAAW,CAAC,EAAE,CAAC;QAC3E,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAClE,CAAC;IAjID;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA0B,EAAE,IAAmC;QACxH,OAAO,IAAI,aAAa,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACpE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,aAAa,CAAC,YAAY,CAAC;IAC9D,CAAC;;AA1BL,sCAmIC;AArHG,gBAAgB;AACO,0BAAY,GAAG,uCAAuC,CAAC"}
@@ -90,6 +90,13 @@ export declare class SecretBackendRole extends pulumi.CustomResource {
90
90
  * Must be unique within the backend.
91
91
  */
92
92
  readonly name: pulumi.Output<string>;
93
+ /**
94
+ * The namespace to provision the resource in.
95
+ * The value should not contain leading or trailing forward slashes.
96
+ * The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
97
+ * *Available only for Vault Enterprise*.
98
+ */
99
+ readonly namespace: pulumi.Output<string | undefined>;
93
100
  /**
94
101
  * The ARN of the AWS Permissions
95
102
  * Boundary to attach to IAM users created in the role. Valid only when
@@ -178,6 +185,13 @@ export interface SecretBackendRoleState {
178
185
  * Must be unique within the backend.
179
186
  */
180
187
  name?: pulumi.Input<string>;
188
+ /**
189
+ * The namespace to provision the resource in.
190
+ * The value should not contain leading or trailing forward slashes.
191
+ * The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
192
+ * *Available only for Vault Enterprise*.
193
+ */
194
+ namespace?: pulumi.Input<string>;
181
195
  /**
182
196
  * The ARN of the AWS Permissions
183
197
  * Boundary to attach to IAM users created in the role. Valid only when
@@ -258,6 +272,13 @@ export interface SecretBackendRoleArgs {
258
272
  * Must be unique within the backend.
259
273
  */
260
274
  name?: pulumi.Input<string>;
275
+ /**
276
+ * The namespace to provision the resource in.
277
+ * The value should not contain leading or trailing forward slashes.
278
+ * The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
279
+ * *Available only for Vault Enterprise*.
280
+ */
281
+ namespace?: pulumi.Input<string>;
261
282
  /**
262
283
  * The ARN of the AWS Permissions
263
284
  * Boundary to attach to IAM users created in the role. Valid only when
@@ -53,6 +53,7 @@ class SecretBackendRole extends pulumi.CustomResource {
53
53
  resourceInputs["iamGroups"] = state ? state.iamGroups : undefined;
54
54
  resourceInputs["maxStsTtl"] = state ? state.maxStsTtl : undefined;
55
55
  resourceInputs["name"] = state ? state.name : undefined;
56
+ resourceInputs["namespace"] = state ? state.namespace : undefined;
56
57
  resourceInputs["permissionsBoundaryArn"] = state ? state.permissionsBoundaryArn : undefined;
57
58
  resourceInputs["policyArns"] = state ? state.policyArns : undefined;
58
59
  resourceInputs["policyDocument"] = state ? state.policyDocument : undefined;
@@ -73,6 +74,7 @@ class SecretBackendRole extends pulumi.CustomResource {
73
74
  resourceInputs["iamGroups"] = args ? args.iamGroups : undefined;
74
75
  resourceInputs["maxStsTtl"] = args ? args.maxStsTtl : undefined;
75
76
  resourceInputs["name"] = args ? args.name : undefined;
77
+ resourceInputs["namespace"] = args ? args.namespace : undefined;
76
78
  resourceInputs["permissionsBoundaryArn"] = args ? args.permissionsBoundaryArn : undefined;
77
79
  resourceInputs["policyArns"] = args ? args.policyArns : undefined;
78
80
  resourceInputs["policyDocument"] = args ? args.policyDocument : undefined;