@pulumi/vault 5.6.0 → 5.7.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/ad/getAccessCredentials.d.ts +15 -0
- package/ad/getAccessCredentials.js +1 -0
- package/ad/getAccessCredentials.js.map +1 -1
- package/ad/index.d.ts +12 -4
- package/ad/index.js +13 -26
- package/ad/index.js.map +1 -1
- package/ad/secretBackend.d.ts +39 -0
- package/ad/secretBackend.js +9 -3
- package/ad/secretBackend.js.map +1 -1
- package/ad/secretLibrary.d.ts +21 -0
- package/ad/secretLibrary.js +2 -0
- package/ad/secretLibrary.js.map +1 -1
- package/ad/secretRole.d.ts +21 -0
- package/ad/secretRole.js +2 -0
- package/ad/secretRole.js.map +1 -1
- package/alicloud/authBackendRole.d.ts +21 -0
- package/alicloud/authBackendRole.js +2 -0
- package/alicloud/authBackendRole.js.map +1 -1
- package/alicloud/index.d.ts +3 -1
- package/alicloud/index.js +4 -19
- package/alicloud/index.js.map +1 -1
- package/approle/authBackendLogin.d.ts +22 -1
- package/approle/authBackendLogin.js +3 -1
- package/approle/authBackendLogin.js.map +1 -1
- package/approle/authBackendRole.d.ts +21 -0
- package/approle/authBackendRole.js +2 -0
- package/approle/authBackendRole.js.map +1 -1
- package/approle/{authBackendRoleSecretID.d.ts → authBackendRoleSecretId.d.ts} +33 -12
- package/approle/{authBackendRoleSecretID.js → authBackendRoleSecretId.js} +16 -12
- package/approle/authBackendRoleSecretId.js.map +1 -0
- package/approle/getAuthBackendRoleId.d.ts +15 -0
- package/approle/getAuthBackendRoleId.js +1 -0
- package/approle/getAuthBackendRoleId.js.map +1 -1
- package/approle/index.d.ts +12 -4
- package/approle/index.js +15 -28
- package/approle/index.js.map +1 -1
- package/audit.d.ts +21 -0
- package/audit.js +2 -0
- package/audit.js.map +1 -1
- package/authBackend.d.ts +47 -10
- package/authBackend.js +4 -0
- package/authBackend.js.map +1 -1
- package/aws/authBackendCert.d.ts +21 -0
- package/aws/authBackendCert.js +2 -0
- package/aws/authBackendCert.js.map +1 -1
- package/aws/authBackendClient.d.ts +21 -0
- package/aws/authBackendClient.js +6 -2
- package/aws/authBackendClient.js.map +1 -1
- package/aws/authBackendIdentityWhitelist.d.ts +21 -0
- package/aws/authBackendIdentityWhitelist.js +2 -0
- package/aws/authBackendIdentityWhitelist.js.map +1 -1
- package/aws/authBackendLogin.d.ts +21 -0
- package/aws/authBackendLogin.js +4 -0
- package/aws/authBackendLogin.js.map +1 -1
- package/aws/authBackendRole.d.ts +21 -0
- package/aws/authBackendRole.js +2 -0
- package/aws/authBackendRole.js.map +1 -1
- package/aws/authBackendRoleTag.d.ts +21 -0
- package/aws/authBackendRoleTag.js +2 -0
- package/aws/authBackendRoleTag.js.map +1 -1
- package/aws/authBackendRoletagBlacklist.d.ts +21 -0
- package/aws/authBackendRoletagBlacklist.js +2 -0
- package/aws/authBackendRoletagBlacklist.js.map +1 -1
- package/aws/authBackendStsRole.d.ts +21 -0
- package/aws/authBackendStsRole.js +2 -0
- package/aws/authBackendStsRole.js.map +1 -1
- package/aws/getAccessCredentials.d.ts +15 -0
- package/aws/getAccessCredentials.js +1 -0
- package/aws/getAccessCredentials.js.map +1 -1
- package/aws/index.d.ts +33 -11
- package/aws/index.js +34 -47
- package/aws/index.js.map +1 -1
- package/aws/secretBackend.d.ts +36 -12
- package/aws/secretBackend.js +8 -14
- package/aws/secretBackend.js.map +1 -1
- package/aws/secretBackendRole.d.ts +21 -0
- package/aws/secretBackendRole.js +2 -0
- package/aws/secretBackendRole.js.map +1 -1
- package/azure/authBackendConfig.d.ts +21 -0
- package/azure/authBackendConfig.js +7 -3
- package/azure/authBackendConfig.js.map +1 -1
- package/azure/authBackendRole.d.ts +21 -0
- package/azure/authBackendRole.js +2 -0
- package/azure/authBackendRole.js.map +1 -1
- package/azure/backend.d.ts +36 -0
- package/azure/backend.js +10 -4
- package/azure/backend.js.map +1 -1
- package/azure/backendRole.d.ts +23 -1
- package/azure/backendRole.js +2 -0
- package/azure/backendRole.js.map +1 -1
- package/azure/getAccessCredentials.d.ts +15 -0
- package/azure/getAccessCredentials.js +1 -0
- package/azure/getAccessCredentials.js.map +1 -1
- package/azure/index.d.ts +15 -5
- package/azure/index.js +16 -29
- package/azure/index.js.map +1 -1
- package/certAuthBackendRole.d.ts +39 -3
- package/certAuthBackendRole.js +4 -0
- package/certAuthBackendRole.js.map +1 -1
- package/config/vars.d.ts +43 -3
- package/config/vars.js +64 -4
- package/config/vars.js.map +1 -1
- package/consul/index.d.ts +6 -2
- package/consul/index.js +7 -22
- package/consul/index.js.map +1 -1
- package/consul/secretBackend.d.ts +87 -15
- package/consul/secretBackend.js +24 -7
- package/consul/secretBackend.js.map +1 -1
- package/consul/secretBackendRole.d.ts +93 -10
- package/consul/secretBackendRole.js +14 -1
- package/consul/secretBackendRole.js.map +1 -1
- package/database/index.d.ts +12 -4
- package/database/index.js +13 -28
- package/database/index.js.map +1 -1
- package/database/secretBackendConnection.d.ts +35 -1
- package/database/secretBackendConnection.js +4 -0
- package/database/secretBackendConnection.js.map +1 -1
- package/database/secretBackendRole.d.ts +21 -0
- package/database/secretBackendRole.js +2 -0
- package/database/secretBackendRole.js.map +1 -1
- package/database/secretBackendStaticRole.d.ts +21 -0
- package/database/secretBackendStaticRole.js +2 -0
- package/database/secretBackendStaticRole.js.map +1 -1
- package/database/secretsMount.d.ts +41 -1
- package/database/secretsMount.js +6 -0
- package/database/secretsMount.js.map +1 -1
- package/egpPolicy.d.ts +21 -0
- package/egpPolicy.js +2 -0
- package/egpPolicy.js.map +1 -1
- package/gcp/authBackend.d.ts +71 -1
- package/gcp/authBackend.js +18 -2
- package/gcp/authBackend.js.map +1 -1
- package/gcp/authBackendRole.d.ts +21 -0
- package/gcp/authBackendRole.js +2 -0
- package/gcp/authBackendRole.js.map +1 -1
- package/gcp/getAuthBackendRole.d.ts +15 -0
- package/gcp/getAuthBackendRole.js +1 -0
- package/gcp/getAuthBackendRole.js.map +1 -1
- package/gcp/index.d.ts +18 -6
- package/gcp/index.js +19 -32
- package/gcp/index.js.map +1 -1
- package/gcp/secretBackend.d.ts +36 -0
- package/gcp/secretBackend.js +7 -1
- package/gcp/secretBackend.js.map +1 -1
- package/gcp/secretRoleset.d.ts +23 -1
- package/gcp/secretRoleset.js +2 -0
- package/gcp/secretRoleset.js.map +1 -1
- package/gcp/secretStaticAccount.d.ts +23 -1
- package/gcp/secretStaticAccount.js +2 -0
- package/gcp/secretStaticAccount.js.map +1 -1
- package/generic/endpoint.d.ts +21 -0
- package/generic/endpoint.js +5 -1
- package/generic/endpoint.js.map +1 -1
- package/generic/getSecret.d.ts +15 -0
- package/generic/getSecret.js +1 -0
- package/generic/getSecret.js.map +1 -1
- package/generic/index.d.ts +9 -3
- package/generic/index.js +10 -23
- package/generic/index.js.map +1 -1
- package/generic/secret.d.ts +21 -0
- package/generic/secret.js +5 -1
- package/generic/secret.js.map +1 -1
- package/getAuthBackend.d.ts +16 -1
- package/getAuthBackend.js +1 -0
- package/getAuthBackend.js.map +1 -1
- package/getNomadAccessToken.d.ts +15 -0
- package/getNomadAccessToken.js +1 -0
- package/getNomadAccessToken.js.map +1 -1
- package/getPolicyDocument.d.ts +5 -1
- package/getPolicyDocument.js +1 -0
- package/getPolicyDocument.js.map +1 -1
- package/github/authBackend.d.ts +38 -1
- package/github/authBackend.js +4 -0
- package/github/authBackend.js.map +1 -1
- package/github/index.d.ts +9 -3
- package/github/index.js +10 -25
- package/github/index.js.map +1 -1
- package/github/team.d.ts +21 -0
- package/github/team.js +2 -0
- package/github/team.js.map +1 -1
- package/github/user.d.ts +21 -0
- package/github/user.js +2 -0
- package/github/user.js.map +1 -1
- package/identity/entity.d.ts +21 -0
- package/identity/entity.js +2 -0
- package/identity/entity.js.map +1 -1
- package/identity/entityAlias.d.ts +21 -0
- package/identity/entityAlias.js +2 -0
- package/identity/entityAlias.js.map +1 -1
- package/identity/entityPolicies.d.ts +21 -0
- package/identity/entityPolicies.js +2 -0
- package/identity/entityPolicies.js.map +1 -1
- package/identity/getEntity.d.ts +16 -1
- package/identity/getEntity.js +1 -0
- package/identity/getEntity.js.map +1 -1
- package/identity/getGroup.d.ts +15 -0
- package/identity/getGroup.js +1 -0
- package/identity/getGroup.js.map +1 -1
- package/identity/getOidcClientCreds.d.ts +15 -0
- package/identity/getOidcClientCreds.js +1 -0
- package/identity/getOidcClientCreds.js.map +1 -1
- package/identity/getOidcOpenidConfig.d.ts +15 -0
- package/identity/getOidcOpenidConfig.js +1 -0
- package/identity/getOidcOpenidConfig.js.map +1 -1
- package/identity/getOidcPublicKeys.d.ts +15 -0
- package/identity/getOidcPublicKeys.js +1 -0
- package/identity/getOidcPublicKeys.js.map +1 -1
- package/identity/group.d.ts +21 -0
- package/identity/group.js +2 -0
- package/identity/group.js.map +1 -1
- package/identity/groupAlias.d.ts +21 -0
- package/identity/groupAlias.js +2 -0
- package/identity/groupAlias.js.map +1 -1
- package/identity/groupMemberEntityIds.d.ts +21 -0
- package/identity/groupMemberEntityIds.js +2 -0
- package/identity/groupMemberEntityIds.js.map +1 -1
- package/identity/groupPolicies.d.ts +21 -0
- package/identity/groupPolicies.js +2 -0
- package/identity/groupPolicies.js.map +1 -1
- package/identity/index.d.ts +75 -20
- package/identity/index.js +86 -66
- package/identity/index.js.map +1 -1
- package/identity/mfaDuo.d.ts +200 -0
- package/identity/mfaDuo.js +110 -0
- package/identity/mfaDuo.js.map +1 -0
- package/identity/mfaLoginEnforcement.d.ts +170 -0
- package/identity/mfaLoginEnforcement.js +96 -0
- package/identity/mfaLoginEnforcement.js.map +1 -0
- package/identity/mfaOkta.d.ts +188 -0
- package/identity/mfaOkta.js +105 -0
- package/identity/mfaOkta.js.map +1 -0
- package/identity/mfaPingid.d.ts +190 -0
- package/identity/mfaPingid.js +102 -0
- package/identity/mfaPingid.js.map +1 -0
- package/identity/mfaTotp.d.ts +218 -0
- package/identity/mfaTotp.js +104 -0
- package/identity/mfaTotp.js.map +1 -0
- package/identity/oidc.d.ts +21 -0
- package/identity/oidc.js +2 -0
- package/identity/oidc.js.map +1 -1
- package/identity/oidcAssignment.d.ts +23 -2
- package/identity/oidcAssignment.js +4 -2
- package/identity/oidcAssignment.js.map +1 -1
- package/identity/oidcClient.d.ts +21 -0
- package/identity/oidcClient.js +4 -0
- package/identity/oidcClient.js.map +1 -1
- package/identity/oidcKey.d.ts +21 -0
- package/identity/oidcKey.js +2 -0
- package/identity/oidcKey.js.map +1 -1
- package/identity/oidcKeyAllowedClientID.d.ts +21 -0
- package/identity/oidcKeyAllowedClientID.js +2 -0
- package/identity/oidcKeyAllowedClientID.js.map +1 -1
- package/identity/oidcProvider.d.ts +21 -0
- package/identity/oidcProvider.js +2 -0
- package/identity/oidcProvider.js.map +1 -1
- package/identity/oidcRole.d.ts +21 -0
- package/identity/oidcRole.js +2 -0
- package/identity/oidcRole.js.map +1 -1
- package/identity/oidcScope.d.ts +22 -3
- package/identity/oidcScope.js +3 -3
- package/identity/oidcScope.js.map +1 -1
- package/index.d.ts +75 -25
- package/index.js +78 -83
- package/index.js.map +1 -1
- package/jwt/authBackend.d.ts +38 -1
- package/jwt/authBackend.js +7 -1
- package/jwt/authBackend.js.map +1 -1
- package/jwt/authBackendRole.d.ts +57 -0
- package/jwt/authBackendRole.js +6 -0
- package/jwt/authBackendRole.js.map +1 -1
- package/jwt/index.d.ts +6 -2
- package/jwt/index.js +7 -22
- package/jwt/index.js.map +1 -1
- package/kmip/index.d.ts +9 -3
- package/kmip/index.js +10 -25
- package/kmip/index.js.map +1 -1
- package/kmip/secretBackend.d.ts +36 -0
- package/kmip/secretBackend.js +4 -0
- package/kmip/secretBackend.js.map +1 -1
- package/kmip/secretRole.d.ts +21 -0
- package/kmip/secretRole.js +2 -0
- package/kmip/secretRole.js.map +1 -1
- package/kmip/secretScope.d.ts +21 -0
- package/kmip/secretScope.js +2 -0
- package/kmip/secretScope.js.map +1 -1
- package/kubernetes/authBackendConfig.d.ts +21 -0
- package/kubernetes/authBackendConfig.js +5 -1
- package/kubernetes/authBackendConfig.js.map +1 -1
- package/kubernetes/authBackendRole.d.ts +21 -0
- package/kubernetes/authBackendRole.js +2 -0
- package/kubernetes/authBackendRole.js.map +1 -1
- package/kubernetes/getAuthBackendConfig.d.ts +15 -0
- package/kubernetes/getAuthBackendConfig.js +1 -0
- package/kubernetes/getAuthBackendConfig.js.map +1 -1
- package/kubernetes/getAuthBackendRole.d.ts +15 -0
- package/kubernetes/getAuthBackendRole.js +1 -0
- package/kubernetes/getAuthBackendRole.js.map +1 -1
- package/kubernetes/getServiceAccountToken.d.ts +46 -0
- package/kubernetes/getServiceAccountToken.js +27 -0
- package/kubernetes/getServiceAccountToken.js.map +1 -0
- package/kubernetes/index.d.ts +21 -4
- package/kubernetes/index.js +26 -24
- package/kubernetes/index.js.map +1 -1
- package/kubernetes/secretBackend.d.ts +303 -0
- package/kubernetes/secretBackend.js +114 -0
- package/kubernetes/secretBackend.js.map +1 -0
- package/kubernetes/secretBackendRole.d.ts +367 -0
- package/kubernetes/secretBackendRole.js +191 -0
- package/kubernetes/secretBackendRole.js.map +1 -0
- package/kv/getSecret.d.ts +104 -0
- package/kv/getSecret.js +53 -0
- package/kv/getSecret.js.map +1 -0
- package/kv/getSecretSubkeysV2.d.ts +42 -0
- package/kv/getSecretSubkeysV2.js +26 -0
- package/kv/getSecretSubkeysV2.js.map +1 -0
- package/kv/getSecretV2.d.ts +139 -0
- package/kv/getSecretV2.js +58 -0
- package/kv/getSecretV2.js.map +1 -0
- package/kv/getSecretsList.d.ts +85 -0
- package/kv/getSecretsList.js +58 -0
- package/kv/getSecretsList.js.map +1 -0
- package/kv/getSecretsListV2.d.ts +114 -0
- package/kv/getSecretsListV2.js +69 -0
- package/kv/getSecretsListV2.js.map +1 -0
- package/kv/index.d.ts +24 -0
- package/kv/index.js +47 -0
- package/kv/index.js.map +1 -0
- package/kv/secret.d.ts +145 -0
- package/kv/secret.js +106 -0
- package/kv/secret.js.map +1 -0
- package/kv/secretBackendV2.d.ts +154 -0
- package/kv/secretBackendV2.js +103 -0
- package/kv/secretBackendV2.js.map +1 -0
- package/kv/secretV2.d.ts +257 -0
- package/kv/secretV2.js +122 -0
- package/kv/secretV2.js.map +1 -0
- package/ldap/authBackend.d.ts +48 -0
- package/ldap/authBackend.js +10 -2
- package/ldap/authBackend.js.map +1 -1
- package/ldap/authBackendGroup.d.ts +21 -0
- package/ldap/authBackendGroup.js +2 -0
- package/ldap/authBackendGroup.js.map +1 -1
- package/ldap/authBackendUser.d.ts +21 -0
- package/ldap/authBackendUser.js +2 -0
- package/ldap/authBackendUser.js.map +1 -1
- package/ldap/index.d.ts +9 -3
- package/ldap/index.js +10 -25
- package/ldap/index.js.map +1 -1
- package/managed/index.d.ts +3 -0
- package/managed/index.js +22 -0
- package/managed/index.js.map +1 -0
- package/managed/keys.d.ts +104 -0
- package/managed/keys.js +64 -0
- package/managed/keys.js.map +1 -0
- package/mfaDuo.d.ts +21 -0
- package/mfaDuo.js +6 -2
- package/mfaDuo.js.map +1 -1
- package/mfaOkta.d.ts +21 -0
- package/mfaOkta.js +5 -1
- package/mfaOkta.js.map +1 -1
- package/mfaPingid.d.ts +21 -0
- package/mfaPingid.js +2 -0
- package/mfaPingid.js.map +1 -1
- package/mfaTotp.d.ts +21 -0
- package/mfaTotp.js +2 -0
- package/mfaTotp.js.map +1 -1
- package/mount.d.ts +33 -0
- package/mount.js +4 -0
- package/mount.js.map +1 -1
- package/namespace.d.ts +32 -18
- package/namespace.js +5 -16
- package/namespace.js.map +1 -1
- package/nomadSecretBackend.d.ts +36 -0
- package/nomadSecretBackend.js +9 -3
- package/nomadSecretBackend.js.map +1 -1
- package/nomadSecretRole.d.ts +21 -0
- package/nomadSecretRole.js +2 -0
- package/nomadSecretRole.js.map +1 -1
- package/okta/authBackend.d.ts +38 -1
- package/okta/authBackend.js +7 -1
- package/okta/authBackend.js.map +1 -1
- package/okta/authBackendGroup.d.ts +21 -0
- package/okta/authBackendGroup.js +2 -0
- package/okta/authBackendGroup.js.map +1 -1
- package/okta/authBackendUser.d.ts +21 -0
- package/okta/authBackendUser.js +2 -0
- package/okta/authBackendUser.js.map +1 -1
- package/okta/index.d.ts +9 -3
- package/okta/index.js +10 -25
- package/okta/index.js.map +1 -1
- package/package.json +2 -2
- package/package.json.dev +2 -2
- package/passwordPolicy.d.ts +21 -0
- package/passwordPolicy.js +2 -0
- package/passwordPolicy.js.map +1 -1
- package/pkisecret/index.d.ts +30 -10
- package/pkisecret/index.js +31 -46
- package/pkisecret/index.js.map +1 -1
- package/pkisecret/secretBackendCert.d.ts +29 -0
- package/pkisecret/secretBackendCert.js +6 -0
- package/pkisecret/secretBackendCert.js.map +1 -1
- package/pkisecret/secretBackendConfigCa.d.ts +21 -0
- package/pkisecret/secretBackendConfigCa.js +5 -1
- package/pkisecret/secretBackendConfigCa.js.map +1 -1
- package/pkisecret/secretBackendConfigUrls.d.ts +21 -0
- package/pkisecret/secretBackendConfigUrls.js +2 -0
- package/pkisecret/secretBackendConfigUrls.js.map +1 -1
- package/pkisecret/secretBackendCrlConfig.d.ts +21 -0
- package/pkisecret/secretBackendCrlConfig.js +2 -0
- package/pkisecret/secretBackendCrlConfig.js.map +1 -1
- package/pkisecret/secretBackendIntermediateCertRequest.d.ts +54 -0
- package/pkisecret/secretBackendIntermediateCertRequest.js +8 -0
- package/pkisecret/secretBackendIntermediateCertRequest.js.map +1 -1
- package/pkisecret/secretBackendIntermediateSetSigned.d.ts +21 -0
- package/pkisecret/secretBackendIntermediateSetSigned.js +2 -0
- package/pkisecret/secretBackendIntermediateSetSigned.js.map +1 -1
- package/pkisecret/secretBackendRole.d.ts +24 -3
- package/pkisecret/secretBackendRole.js +2 -0
- package/pkisecret/secretBackendRole.js.map +1 -1
- package/pkisecret/secretBackendRootCert.d.ts +57 -3
- package/pkisecret/secretBackendRootCert.js +6 -0
- package/pkisecret/secretBackendRootCert.js.map +1 -1
- package/pkisecret/secretBackendRootSignIntermediate.d.ts +21 -0
- package/pkisecret/secretBackendRootSignIntermediate.js +2 -0
- package/pkisecret/secretBackendRootSignIntermediate.js.map +1 -1
- package/pkisecret/secretBackendSign.d.ts +29 -0
- package/pkisecret/secretBackendSign.js +4 -0
- package/pkisecret/secretBackendSign.js.map +1 -1
- package/policy.d.ts +21 -0
- package/policy.js +2 -0
- package/policy.js.map +1 -1
- package/provider.d.ts +43 -3
- package/provider.js +13 -3
- package/provider.js.map +1 -1
- package/quotaLeaseCount.d.ts +21 -0
- package/quotaLeaseCount.js +2 -0
- package/quotaLeaseCount.js.map +1 -1
- package/quotaRateLimit.d.ts +48 -0
- package/quotaRateLimit.js +6 -0
- package/quotaRateLimit.js.map +1 -1
- package/rabbitmq/index.d.ts +6 -2
- package/rabbitmq/index.js +7 -22
- package/rabbitmq/index.js.map +1 -1
- package/rabbitmq/secretBackend.d.ts +36 -0
- package/rabbitmq/secretBackend.js +8 -2
- package/rabbitmq/secretBackend.js.map +1 -1
- package/rabbitmq/secretBackendRole.d.ts +23 -1
- package/rabbitmq/secretBackendRole.js +2 -0
- package/rabbitmq/secretBackendRole.js.map +1 -1
- package/raftAutopilot.d.ts +21 -0
- package/raftAutopilot.js +2 -0
- package/raftAutopilot.js.map +1 -1
- package/raftSnapshotAgentConfig.d.ts +62 -0
- package/raftSnapshotAgentConfig.js +43 -0
- package/raftSnapshotAgentConfig.js.map +1 -1
- package/rgpPolicy.d.ts +21 -0
- package/rgpPolicy.js +2 -0
- package/rgpPolicy.js.map +1 -1
- package/ssh/index.d.ts +6 -2
- package/ssh/index.js +7 -22
- package/ssh/index.js.map +1 -1
- package/ssh/secretBackendCa.d.ts +29 -0
- package/ssh/secretBackendCa.js +13 -1
- package/ssh/secretBackendCa.js.map +1 -1
- package/ssh/secretBackendRole.d.ts +23 -1
- package/ssh/secretBackendRole.js +2 -0
- package/ssh/secretBackendRole.js.map +1 -1
- package/terraformcloud/index.d.ts +9 -3
- package/terraformcloud/index.js +10 -25
- package/terraformcloud/index.js.map +1 -1
- package/terraformcloud/secretBackend.d.ts +36 -0
- package/terraformcloud/secretBackend.js +7 -1
- package/terraformcloud/secretBackend.js.map +1 -1
- package/terraformcloud/secretCreds.d.ts +21 -0
- package/terraformcloud/secretCreds.js +4 -0
- package/terraformcloud/secretCreds.js.map +1 -1
- package/terraformcloud/secretRole.d.ts +21 -0
- package/terraformcloud/secretRole.js +2 -0
- package/terraformcloud/secretRole.js.map +1 -1
- package/token.d.ts +42 -0
- package/token.js +9 -0
- package/token.js.map +1 -1
- package/tokenauth/authBackendRole.d.ts +21 -0
- package/tokenauth/authBackendRole.js +2 -0
- package/tokenauth/authBackendRole.js.map +1 -1
- package/tokenauth/index.d.ts +3 -1
- package/tokenauth/index.js +4 -19
- package/tokenauth/index.js.map +1 -1
- package/transform/index.d.ts +18 -6
- package/transform/index.js +19 -30
- package/transform/index.js.map +1 -1
- package/transform/transformation.d.ts +0 -25
- package/transform/transformation.js +0 -25
- package/transform/transformation.js.map +1 -1
- package/transit/getDecrypt.d.ts +3 -0
- package/transit/getDecrypt.js +1 -0
- package/transit/getDecrypt.js.map +1 -1
- package/transit/getEncrypt.d.ts +3 -0
- package/transit/getEncrypt.js +1 -0
- package/transit/getEncrypt.js.map +1 -1
- package/transit/index.d.ts +12 -4
- package/transit/index.js +13 -24
- package/transit/index.js.map +1 -1
- package/transit/secretBackendKey.d.ts +21 -0
- package/transit/secretBackendKey.js +2 -0
- package/transit/secretBackendKey.js.map +1 -1
- package/transit/secretCacheConfig.d.ts +21 -0
- package/transit/secretCacheConfig.js +2 -0
- package/transit/secretCacheConfig.js.map +1 -1
- package/types/index.js.map +1 -1
- package/types/input.d.ts +408 -4
- package/types/output.d.ts +409 -5
- package/utilities.js +13 -1
- package/utilities.js.map +1 -1
- package/approle/authBackendRoleSecretID.js.map +0 -1
|
@@ -53,6 +53,7 @@ class SecretBackendRole extends pulumi.CustomResource {
|
|
|
53
53
|
resourceInputs["defaultTtl"] = state ? state.defaultTtl : undefined;
|
|
54
54
|
resourceInputs["maxTtl"] = state ? state.maxTtl : undefined;
|
|
55
55
|
resourceInputs["name"] = state ? state.name : undefined;
|
|
56
|
+
resourceInputs["namespace"] = state ? state.namespace : undefined;
|
|
56
57
|
resourceInputs["renewStatements"] = state ? state.renewStatements : undefined;
|
|
57
58
|
resourceInputs["revocationStatements"] = state ? state.revocationStatements : undefined;
|
|
58
59
|
resourceInputs["rollbackStatements"] = state ? state.rollbackStatements : undefined;
|
|
@@ -74,6 +75,7 @@ class SecretBackendRole extends pulumi.CustomResource {
|
|
|
74
75
|
resourceInputs["defaultTtl"] = args ? args.defaultTtl : undefined;
|
|
75
76
|
resourceInputs["maxTtl"] = args ? args.maxTtl : undefined;
|
|
76
77
|
resourceInputs["name"] = args ? args.name : undefined;
|
|
78
|
+
resourceInputs["namespace"] = args ? args.namespace : undefined;
|
|
77
79
|
resourceInputs["renewStatements"] = args ? args.renewStatements : undefined;
|
|
78
80
|
resourceInputs["revocationStatements"] = args ? args.revocationStatements : undefined;
|
|
79
81
|
resourceInputs["rollbackStatements"] = args ? args.rollbackStatements : undefined;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretBackendRole.js","sourceRoot":"","sources":["../../database/secretBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAmCG;AACH,MAAa,iBAAkB,SAAQ,MAAM,CAAC,cAAc;
|
|
1
|
+
{"version":3,"file":"secretBackendRole.js","sourceRoot":"","sources":["../../database/secretBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAmCG;AACH,MAAa,iBAAkB,SAAQ,MAAM,CAAC,cAAc;IAuFxD,YAAY,IAAY,EAAE,WAA4D,EAAE,IAAmC;QACvH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAiD,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;SACvF;aAAM;YACH,MAAM,IAAI,GAAG,WAAgD,CAAC;YAC9D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,kBAAkB,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC/D,MAAM,IAAI,KAAK,CAAC,gDAAgD,CAAC,CAAC;aACrE;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;SACrF;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,iBAAiB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACtE,CAAC;IA7HD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA8B,EAAE,IAAmC;QAC5H,OAAO,IAAI,iBAAiB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACxE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,iBAAiB,CAAC,YAAY,CAAC;IAClE,CAAC;;AA1BL,8CA+HC;AAjHG,gBAAgB;AACO,8BAAY,GAAG,oDAAoD,CAAC"}
|
|
@@ -66,6 +66,13 @@ export declare class SecretBackendStaticRole extends pulumi.CustomResource {
|
|
|
66
66
|
* A unique name to give the static role.
|
|
67
67
|
*/
|
|
68
68
|
readonly name: pulumi.Output<string>;
|
|
69
|
+
/**
|
|
70
|
+
* The namespace to provision the resource in.
|
|
71
|
+
* The value should not contain leading or trailing forward slashes.
|
|
72
|
+
* The `namespace` is always relative to the provider's configured namespace.
|
|
73
|
+
* *Available only for Vault Enterprise*.
|
|
74
|
+
*/
|
|
75
|
+
readonly namespace: pulumi.Output<string | undefined>;
|
|
69
76
|
/**
|
|
70
77
|
* The amount of time Vault should wait before rotating the password, in seconds.
|
|
71
78
|
*/
|
|
@@ -103,6 +110,13 @@ export interface SecretBackendStaticRoleState {
|
|
|
103
110
|
* A unique name to give the static role.
|
|
104
111
|
*/
|
|
105
112
|
name?: pulumi.Input<string>;
|
|
113
|
+
/**
|
|
114
|
+
* The namespace to provision the resource in.
|
|
115
|
+
* The value should not contain leading or trailing forward slashes.
|
|
116
|
+
* The `namespace` is always relative to the provider's configured namespace.
|
|
117
|
+
* *Available only for Vault Enterprise*.
|
|
118
|
+
*/
|
|
119
|
+
namespace?: pulumi.Input<string>;
|
|
106
120
|
/**
|
|
107
121
|
* The amount of time Vault should wait before rotating the password, in seconds.
|
|
108
122
|
*/
|
|
@@ -132,6 +146,13 @@ export interface SecretBackendStaticRoleArgs {
|
|
|
132
146
|
* A unique name to give the static role.
|
|
133
147
|
*/
|
|
134
148
|
name?: pulumi.Input<string>;
|
|
149
|
+
/**
|
|
150
|
+
* The namespace to provision the resource in.
|
|
151
|
+
* The value should not contain leading or trailing forward slashes.
|
|
152
|
+
* The `namespace` is always relative to the provider's configured namespace.
|
|
153
|
+
* *Available only for Vault Enterprise*.
|
|
154
|
+
*/
|
|
155
|
+
namespace?: pulumi.Input<string>;
|
|
135
156
|
/**
|
|
136
157
|
* The amount of time Vault should wait before rotating the password, in seconds.
|
|
137
158
|
*/
|
|
@@ -53,6 +53,7 @@ class SecretBackendStaticRole extends pulumi.CustomResource {
|
|
|
53
53
|
resourceInputs["backend"] = state ? state.backend : undefined;
|
|
54
54
|
resourceInputs["dbName"] = state ? state.dbName : undefined;
|
|
55
55
|
resourceInputs["name"] = state ? state.name : undefined;
|
|
56
|
+
resourceInputs["namespace"] = state ? state.namespace : undefined;
|
|
56
57
|
resourceInputs["rotationPeriod"] = state ? state.rotationPeriod : undefined;
|
|
57
58
|
resourceInputs["rotationStatements"] = state ? state.rotationStatements : undefined;
|
|
58
59
|
resourceInputs["username"] = state ? state.username : undefined;
|
|
@@ -74,6 +75,7 @@ class SecretBackendStaticRole extends pulumi.CustomResource {
|
|
|
74
75
|
resourceInputs["backend"] = args ? args.backend : undefined;
|
|
75
76
|
resourceInputs["dbName"] = args ? args.dbName : undefined;
|
|
76
77
|
resourceInputs["name"] = args ? args.name : undefined;
|
|
78
|
+
resourceInputs["namespace"] = args ? args.namespace : undefined;
|
|
77
79
|
resourceInputs["rotationPeriod"] = args ? args.rotationPeriod : undefined;
|
|
78
80
|
resourceInputs["rotationStatements"] = args ? args.rotationStatements : undefined;
|
|
79
81
|
resourceInputs["username"] = args ? args.username : undefined;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretBackendStaticRole.js","sourceRoot":"","sources":["../../database/secretBackendStaticRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAsCG;AACH,MAAa,uBAAwB,SAAQ,MAAM,CAAC,cAAc;
|
|
1
|
+
{"version":3,"file":"secretBackendStaticRole.js","sourceRoot":"","sources":["../../database/secretBackendStaticRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAsCG;AACH,MAAa,uBAAwB,SAAQ,MAAM,CAAC,cAAc;IAoE9D,YAAY,IAAY,EAAE,WAAwE,EAAE,IAAmC;QACnI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAuD,CAAC;YACtE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;SACnE;aAAM;YACH,MAAM,IAAI,GAAG,WAAsD,CAAC;YACpE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,cAAc,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC3D,MAAM,IAAI,KAAK,CAAC,4CAA4C,CAAC,CAAC;aACjE;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;SACjE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,uBAAuB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC5E,CAAC;IAvGD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAoC,EAAE,IAAmC;QAClI,OAAO,IAAI,uBAAuB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC9E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,uBAAuB,CAAC,YAAY,CAAC;IACxE,CAAC;;AA1BL,0DAyGC;AA3FG,gBAAgB;AACO,oCAAY,GAAG,gEAAgE,CAAC"}
|
|
@@ -1,5 +1,6 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
-
import
|
|
2
|
+
import * as inputs from "../types/input";
|
|
3
|
+
import * as outputs from "../types/output";
|
|
3
4
|
/**
|
|
4
5
|
* ## Example Usage
|
|
5
6
|
*
|
|
@@ -72,6 +73,10 @@ export declare class SecretsMount extends pulumi.CustomResource {
|
|
|
72
73
|
* Accessor of the mount
|
|
73
74
|
*/
|
|
74
75
|
readonly accessor: pulumi.Output<string>;
|
|
76
|
+
/**
|
|
77
|
+
* Set of managed key registry entry names that the mount in question is allowed to access
|
|
78
|
+
*/
|
|
79
|
+
readonly allowedManagedKeys: pulumi.Output<string[] | undefined>;
|
|
75
80
|
/**
|
|
76
81
|
* Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
|
77
82
|
*/
|
|
@@ -164,6 +169,10 @@ export declare class SecretsMount extends pulumi.CustomResource {
|
|
|
164
169
|
* *See Configuration Options for more info*
|
|
165
170
|
*/
|
|
166
171
|
readonly mysqls: pulumi.Output<outputs.database.SecretsMountMysql[] | undefined>;
|
|
172
|
+
/**
|
|
173
|
+
* Target namespace. (requires Enterprise)
|
|
174
|
+
*/
|
|
175
|
+
readonly namespace: pulumi.Output<string | undefined>;
|
|
167
176
|
/**
|
|
168
177
|
* Specifies mount type specific options that are passed to the backend
|
|
169
178
|
*/
|
|
@@ -184,6 +193,11 @@ export declare class SecretsMount extends pulumi.CustomResource {
|
|
|
184
193
|
* *See Configuration Options for more info*
|
|
185
194
|
*/
|
|
186
195
|
readonly postgresqls: pulumi.Output<outputs.database.SecretsMountPostgresql[] | undefined>;
|
|
196
|
+
/**
|
|
197
|
+
* A nested block containing configuration options for InfluxDB connections.
|
|
198
|
+
* *See Configuration Options for more info*
|
|
199
|
+
*/
|
|
200
|
+
readonly redisElasticaches: pulumi.Output<outputs.database.SecretsMountRedisElasticach[] | undefined>;
|
|
187
201
|
/**
|
|
188
202
|
* A nested block containing configuration options for AWS Redshift connections.
|
|
189
203
|
* *See Configuration Options for more info*
|
|
@@ -215,6 +229,10 @@ export interface SecretsMountState {
|
|
|
215
229
|
* Accessor of the mount
|
|
216
230
|
*/
|
|
217
231
|
accessor?: pulumi.Input<string>;
|
|
232
|
+
/**
|
|
233
|
+
* Set of managed key registry entry names that the mount in question is allowed to access
|
|
234
|
+
*/
|
|
235
|
+
allowedManagedKeys?: pulumi.Input<pulumi.Input<string>[]>;
|
|
218
236
|
/**
|
|
219
237
|
* Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
|
220
238
|
*/
|
|
@@ -307,6 +325,10 @@ export interface SecretsMountState {
|
|
|
307
325
|
* *See Configuration Options for more info*
|
|
308
326
|
*/
|
|
309
327
|
mysqls?: pulumi.Input<pulumi.Input<inputs.database.SecretsMountMysql>[]>;
|
|
328
|
+
/**
|
|
329
|
+
* Target namespace. (requires Enterprise)
|
|
330
|
+
*/
|
|
331
|
+
namespace?: pulumi.Input<string>;
|
|
310
332
|
/**
|
|
311
333
|
* Specifies mount type specific options that are passed to the backend
|
|
312
334
|
*/
|
|
@@ -327,6 +349,11 @@ export interface SecretsMountState {
|
|
|
327
349
|
* *See Configuration Options for more info*
|
|
328
350
|
*/
|
|
329
351
|
postgresqls?: pulumi.Input<pulumi.Input<inputs.database.SecretsMountPostgresql>[]>;
|
|
352
|
+
/**
|
|
353
|
+
* A nested block containing configuration options for InfluxDB connections.
|
|
354
|
+
* *See Configuration Options for more info*
|
|
355
|
+
*/
|
|
356
|
+
redisElasticaches?: pulumi.Input<pulumi.Input<inputs.database.SecretsMountRedisElasticach>[]>;
|
|
330
357
|
/**
|
|
331
358
|
* A nested block containing configuration options for AWS Redshift connections.
|
|
332
359
|
* *See Configuration Options for more info*
|
|
@@ -346,6 +373,10 @@ export interface SecretsMountState {
|
|
|
346
373
|
* The set of arguments for constructing a SecretsMount resource.
|
|
347
374
|
*/
|
|
348
375
|
export interface SecretsMountArgs {
|
|
376
|
+
/**
|
|
377
|
+
* Set of managed key registry entry names that the mount in question is allowed to access
|
|
378
|
+
*/
|
|
379
|
+
allowedManagedKeys?: pulumi.Input<pulumi.Input<string>[]>;
|
|
349
380
|
/**
|
|
350
381
|
* Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
|
|
351
382
|
*/
|
|
@@ -434,6 +465,10 @@ export interface SecretsMountArgs {
|
|
|
434
465
|
* *See Configuration Options for more info*
|
|
435
466
|
*/
|
|
436
467
|
mysqls?: pulumi.Input<pulumi.Input<inputs.database.SecretsMountMysql>[]>;
|
|
468
|
+
/**
|
|
469
|
+
* Target namespace. (requires Enterprise)
|
|
470
|
+
*/
|
|
471
|
+
namespace?: pulumi.Input<string>;
|
|
437
472
|
/**
|
|
438
473
|
* Specifies mount type specific options that are passed to the backend
|
|
439
474
|
*/
|
|
@@ -454,6 +489,11 @@ export interface SecretsMountArgs {
|
|
|
454
489
|
* *See Configuration Options for more info*
|
|
455
490
|
*/
|
|
456
491
|
postgresqls?: pulumi.Input<pulumi.Input<inputs.database.SecretsMountPostgresql>[]>;
|
|
492
|
+
/**
|
|
493
|
+
* A nested block containing configuration options for InfluxDB connections.
|
|
494
|
+
* *See Configuration Options for more info*
|
|
495
|
+
*/
|
|
496
|
+
redisElasticaches?: pulumi.Input<pulumi.Input<inputs.database.SecretsMountRedisElasticach>[]>;
|
|
457
497
|
/**
|
|
458
498
|
* A nested block containing configuration options for AWS Redshift connections.
|
|
459
499
|
* *See Configuration Options for more info*
|
package/database/secretsMount.js
CHANGED
|
@@ -64,6 +64,7 @@ class SecretsMount extends pulumi.CustomResource {
|
|
|
64
64
|
if (opts.id) {
|
|
65
65
|
const state = argsOrState;
|
|
66
66
|
resourceInputs["accessor"] = state ? state.accessor : undefined;
|
|
67
|
+
resourceInputs["allowedManagedKeys"] = state ? state.allowedManagedKeys : undefined;
|
|
67
68
|
resourceInputs["auditNonHmacRequestKeys"] = state ? state.auditNonHmacRequestKeys : undefined;
|
|
68
69
|
resourceInputs["auditNonHmacResponseKeys"] = state ? state.auditNonHmacResponseKeys : undefined;
|
|
69
70
|
resourceInputs["cassandras"] = state ? state.cassandras : undefined;
|
|
@@ -84,10 +85,12 @@ class SecretsMount extends pulumi.CustomResource {
|
|
|
84
85
|
resourceInputs["mysqlLegacies"] = state ? state.mysqlLegacies : undefined;
|
|
85
86
|
resourceInputs["mysqlRds"] = state ? state.mysqlRds : undefined;
|
|
86
87
|
resourceInputs["mysqls"] = state ? state.mysqls : undefined;
|
|
88
|
+
resourceInputs["namespace"] = state ? state.namespace : undefined;
|
|
87
89
|
resourceInputs["options"] = state ? state.options : undefined;
|
|
88
90
|
resourceInputs["oracles"] = state ? state.oracles : undefined;
|
|
89
91
|
resourceInputs["path"] = state ? state.path : undefined;
|
|
90
92
|
resourceInputs["postgresqls"] = state ? state.postgresqls : undefined;
|
|
93
|
+
resourceInputs["redisElasticaches"] = state ? state.redisElasticaches : undefined;
|
|
91
94
|
resourceInputs["redshifts"] = state ? state.redshifts : undefined;
|
|
92
95
|
resourceInputs["sealWrap"] = state ? state.sealWrap : undefined;
|
|
93
96
|
resourceInputs["snowflakes"] = state ? state.snowflakes : undefined;
|
|
@@ -97,6 +100,7 @@ class SecretsMount extends pulumi.CustomResource {
|
|
|
97
100
|
if ((!args || args.path === undefined) && !opts.urn) {
|
|
98
101
|
throw new Error("Missing required property 'path'");
|
|
99
102
|
}
|
|
103
|
+
resourceInputs["allowedManagedKeys"] = args ? args.allowedManagedKeys : undefined;
|
|
100
104
|
resourceInputs["auditNonHmacRequestKeys"] = args ? args.auditNonHmacRequestKeys : undefined;
|
|
101
105
|
resourceInputs["auditNonHmacResponseKeys"] = args ? args.auditNonHmacResponseKeys : undefined;
|
|
102
106
|
resourceInputs["cassandras"] = args ? args.cassandras : undefined;
|
|
@@ -116,10 +120,12 @@ class SecretsMount extends pulumi.CustomResource {
|
|
|
116
120
|
resourceInputs["mysqlLegacies"] = args ? args.mysqlLegacies : undefined;
|
|
117
121
|
resourceInputs["mysqlRds"] = args ? args.mysqlRds : undefined;
|
|
118
122
|
resourceInputs["mysqls"] = args ? args.mysqls : undefined;
|
|
123
|
+
resourceInputs["namespace"] = args ? args.namespace : undefined;
|
|
119
124
|
resourceInputs["options"] = args ? args.options : undefined;
|
|
120
125
|
resourceInputs["oracles"] = args ? args.oracles : undefined;
|
|
121
126
|
resourceInputs["path"] = args ? args.path : undefined;
|
|
122
127
|
resourceInputs["postgresqls"] = args ? args.postgresqls : undefined;
|
|
128
|
+
resourceInputs["redisElasticaches"] = args ? args.redisElasticaches : undefined;
|
|
123
129
|
resourceInputs["redshifts"] = args ? args.redshifts : undefined;
|
|
124
130
|
resourceInputs["sealWrap"] = args ? args.sealWrap : undefined;
|
|
125
131
|
resourceInputs["snowflakes"] = args ? args.snowflakes : undefined;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretsMount.js","sourceRoot":"","sources":["../../database/secretsMount.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;
|
|
1
|
+
{"version":3,"file":"secretsMount.js","sourceRoot":"","sources":["../../database/secretsMount.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAmDG;AACH,MAAa,YAAa,SAAQ,MAAM,CAAC,cAAc;IAkLnD,YAAY,IAAY,EAAE,WAAkD,EAAE,IAAmC;QAC7G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA4C,CAAC;YAC3D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,yBAAyB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,0BAA0B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,qBAAqB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;SACvE;aAAM;YACH,MAAM,IAAI,GAAG,WAA2C,CAAC;YACzD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,yBAAyB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,0BAA0B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,qBAAqB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,UAAU,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC/C,cAAc,CAAC,aAAa,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACrD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,YAAY,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACjE,CAAC;IA5PD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAyB,EAAE,IAAmC;QACvH,OAAO,IAAI,YAAY,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACnE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,YAAY,CAAC,YAAY,CAAC;IAC7D,CAAC;;AA1BL,oCA8PC;AAhPG,gBAAgB;AACO,yBAAY,GAAG,0CAA0C,CAAC"}
|
package/egpPolicy.d.ts
CHANGED
|
@@ -44,6 +44,13 @@ export declare class EgpPolicy extends pulumi.CustomResource {
|
|
|
44
44
|
* The name of the policy
|
|
45
45
|
*/
|
|
46
46
|
readonly name: pulumi.Output<string>;
|
|
47
|
+
/**
|
|
48
|
+
* The namespace to provision the resource in.
|
|
49
|
+
* The value should not contain leading or trailing forward slashes.
|
|
50
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
51
|
+
* *Available only for Vault Enterprise*.
|
|
52
|
+
*/
|
|
53
|
+
readonly namespace: pulumi.Output<string | undefined>;
|
|
47
54
|
/**
|
|
48
55
|
* List of paths to which the policy will be applied to
|
|
49
56
|
*/
|
|
@@ -73,6 +80,13 @@ export interface EgpPolicyState {
|
|
|
73
80
|
* The name of the policy
|
|
74
81
|
*/
|
|
75
82
|
name?: pulumi.Input<string>;
|
|
83
|
+
/**
|
|
84
|
+
* The namespace to provision the resource in.
|
|
85
|
+
* The value should not contain leading or trailing forward slashes.
|
|
86
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
87
|
+
* *Available only for Vault Enterprise*.
|
|
88
|
+
*/
|
|
89
|
+
namespace?: pulumi.Input<string>;
|
|
76
90
|
/**
|
|
77
91
|
* List of paths to which the policy will be applied to
|
|
78
92
|
*/
|
|
@@ -94,6 +108,13 @@ export interface EgpPolicyArgs {
|
|
|
94
108
|
* The name of the policy
|
|
95
109
|
*/
|
|
96
110
|
name?: pulumi.Input<string>;
|
|
111
|
+
/**
|
|
112
|
+
* The namespace to provision the resource in.
|
|
113
|
+
* The value should not contain leading or trailing forward slashes.
|
|
114
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
115
|
+
* *Available only for Vault Enterprise*.
|
|
116
|
+
*/
|
|
117
|
+
namespace?: pulumi.Input<string>;
|
|
97
118
|
/**
|
|
98
119
|
* List of paths to which the policy will be applied to
|
|
99
120
|
*/
|
package/egpPolicy.js
CHANGED
|
@@ -34,6 +34,7 @@ class EgpPolicy extends pulumi.CustomResource {
|
|
|
34
34
|
const state = argsOrState;
|
|
35
35
|
resourceInputs["enforcementLevel"] = state ? state.enforcementLevel : undefined;
|
|
36
36
|
resourceInputs["name"] = state ? state.name : undefined;
|
|
37
|
+
resourceInputs["namespace"] = state ? state.namespace : undefined;
|
|
37
38
|
resourceInputs["paths"] = state ? state.paths : undefined;
|
|
38
39
|
resourceInputs["policy"] = state ? state.policy : undefined;
|
|
39
40
|
}
|
|
@@ -50,6 +51,7 @@ class EgpPolicy extends pulumi.CustomResource {
|
|
|
50
51
|
}
|
|
51
52
|
resourceInputs["enforcementLevel"] = args ? args.enforcementLevel : undefined;
|
|
52
53
|
resourceInputs["name"] = args ? args.name : undefined;
|
|
54
|
+
resourceInputs["namespace"] = args ? args.namespace : undefined;
|
|
53
55
|
resourceInputs["paths"] = args ? args.paths : undefined;
|
|
54
56
|
resourceInputs["policy"] = args ? args.policy : undefined;
|
|
55
57
|
}
|
package/egpPolicy.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"egpPolicy.js","sourceRoot":"","sources":["../egpPolicy.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;GAoBG;AACH,MAAa,SAAU,SAAQ,MAAM,CAAC,cAAc;
|
|
1
|
+
{"version":3,"file":"egpPolicy.js","sourceRoot":"","sources":["../egpPolicy.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;GAoBG;AACH,MAAa,SAAU,SAAQ,MAAM,CAAC,cAAc;IA4DhD,YAAY,IAAY,EAAE,WAA4C,EAAE,IAAmC;QACvG,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAyC,CAAC;YACxD,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAAwC,CAAC;YACtD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,gBAAgB,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7D,MAAM,IAAI,KAAK,CAAC,8CAA8C,CAAC,CAAC;aACnE;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,KAAK,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,SAAS,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC9D,CAAC;IAxFD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAsB,EAAE,IAAmC;QACpH,OAAO,IAAI,SAAS,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAChE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,SAAS,CAAC,YAAY,CAAC;IAC1D,CAAC;;AA1BL,8BA0FC;AA5EG,gBAAgB;AACO,sBAAY,GAAG,iCAAiC,CAAC"}
|
package/gcp/authBackend.d.ts
CHANGED
|
@@ -1,4 +1,6 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
import * as inputs from "../types/input";
|
|
3
|
+
import * as outputs from "../types/output";
|
|
2
4
|
/**
|
|
3
5
|
* Provides a resource to configure the [GCP auth backend within Vault](https://www.vaultproject.io/docs/auth/gcp.html).
|
|
4
6
|
*
|
|
@@ -9,7 +11,15 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
9
11
|
* import * as fs from "fs";
|
|
10
12
|
* import * as vault from "@pulumi/vault";
|
|
11
13
|
*
|
|
12
|
-
* const gcp = new vault.gcp.AuthBackend("gcp", {
|
|
14
|
+
* const gcp = new vault.gcp.AuthBackend("gcp", {
|
|
15
|
+
* credentials: fs.readFileSync("vault-gcp-credentials.json"),
|
|
16
|
+
* customEndpoint: {
|
|
17
|
+
* api: "www.googleapis.com",
|
|
18
|
+
* iam: "iam.googleapis.com",
|
|
19
|
+
* crm: "cloudresourcemanager.googleapis.com",
|
|
20
|
+
* compute: "compute.googleapis.com",
|
|
21
|
+
* },
|
|
22
|
+
* });
|
|
13
23
|
* ```
|
|
14
24
|
*
|
|
15
25
|
* ## Import
|
|
@@ -48,14 +58,34 @@ export declare class AuthBackend extends pulumi.CustomResource {
|
|
|
48
58
|
* A JSON string containing the contents of a GCP credentials file. If this value is empty, Vault will try to use Application Default Credentials from the machine on which the Vault server is running.
|
|
49
59
|
*/
|
|
50
60
|
readonly credentials: pulumi.Output<string | undefined>;
|
|
61
|
+
/**
|
|
62
|
+
* Specifies overrides to
|
|
63
|
+
* [service endpoints](https://cloud.google.com/apis/design/glossary#api_service_endpoint)
|
|
64
|
+
* used when making API requests. This allows specific requests made during authentication
|
|
65
|
+
* to target alternative service endpoints for use in [Private Google Access](https://cloud.google.com/vpc/docs/configure-private-google-access)
|
|
66
|
+
* environments. Requires Vault 1.11+.
|
|
67
|
+
*/
|
|
68
|
+
readonly customEndpoint: pulumi.Output<outputs.gcp.AuthBackendCustomEndpoint | undefined>;
|
|
51
69
|
/**
|
|
52
70
|
* A description of the auth method.
|
|
53
71
|
*/
|
|
54
72
|
readonly description: pulumi.Output<string | undefined>;
|
|
73
|
+
/**
|
|
74
|
+
* If set, opts out of mount migration on path updates.
|
|
75
|
+
* See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
|
76
|
+
*/
|
|
77
|
+
readonly disableRemount: pulumi.Output<boolean | undefined>;
|
|
55
78
|
/**
|
|
56
79
|
* Specifies if the auth method is local only.
|
|
57
80
|
*/
|
|
58
81
|
readonly local: pulumi.Output<boolean | undefined>;
|
|
82
|
+
/**
|
|
83
|
+
* The namespace to provision the resource in.
|
|
84
|
+
* The value should not contain leading or trailing forward slashes.
|
|
85
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
86
|
+
* *Available only for Vault Enterprise*.
|
|
87
|
+
*/
|
|
88
|
+
readonly namespace: pulumi.Output<string | undefined>;
|
|
59
89
|
/**
|
|
60
90
|
* The path to mount the auth method — this defaults to 'gcp'.
|
|
61
91
|
*/
|
|
@@ -93,14 +123,34 @@ export interface AuthBackendState {
|
|
|
93
123
|
* A JSON string containing the contents of a GCP credentials file. If this value is empty, Vault will try to use Application Default Credentials from the machine on which the Vault server is running.
|
|
94
124
|
*/
|
|
95
125
|
credentials?: pulumi.Input<string>;
|
|
126
|
+
/**
|
|
127
|
+
* Specifies overrides to
|
|
128
|
+
* [service endpoints](https://cloud.google.com/apis/design/glossary#api_service_endpoint)
|
|
129
|
+
* used when making API requests. This allows specific requests made during authentication
|
|
130
|
+
* to target alternative service endpoints for use in [Private Google Access](https://cloud.google.com/vpc/docs/configure-private-google-access)
|
|
131
|
+
* environments. Requires Vault 1.11+.
|
|
132
|
+
*/
|
|
133
|
+
customEndpoint?: pulumi.Input<inputs.gcp.AuthBackendCustomEndpoint>;
|
|
96
134
|
/**
|
|
97
135
|
* A description of the auth method.
|
|
98
136
|
*/
|
|
99
137
|
description?: pulumi.Input<string>;
|
|
138
|
+
/**
|
|
139
|
+
* If set, opts out of mount migration on path updates.
|
|
140
|
+
* See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
|
141
|
+
*/
|
|
142
|
+
disableRemount?: pulumi.Input<boolean>;
|
|
100
143
|
/**
|
|
101
144
|
* Specifies if the auth method is local only.
|
|
102
145
|
*/
|
|
103
146
|
local?: pulumi.Input<boolean>;
|
|
147
|
+
/**
|
|
148
|
+
* The namespace to provision the resource in.
|
|
149
|
+
* The value should not contain leading or trailing forward slashes.
|
|
150
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
151
|
+
* *Available only for Vault Enterprise*.
|
|
152
|
+
*/
|
|
153
|
+
namespace?: pulumi.Input<string>;
|
|
104
154
|
/**
|
|
105
155
|
* The path to mount the auth method — this defaults to 'gcp'.
|
|
106
156
|
*/
|
|
@@ -130,14 +180,34 @@ export interface AuthBackendArgs {
|
|
|
130
180
|
* A JSON string containing the contents of a GCP credentials file. If this value is empty, Vault will try to use Application Default Credentials from the machine on which the Vault server is running.
|
|
131
181
|
*/
|
|
132
182
|
credentials?: pulumi.Input<string>;
|
|
183
|
+
/**
|
|
184
|
+
* Specifies overrides to
|
|
185
|
+
* [service endpoints](https://cloud.google.com/apis/design/glossary#api_service_endpoint)
|
|
186
|
+
* used when making API requests. This allows specific requests made during authentication
|
|
187
|
+
* to target alternative service endpoints for use in [Private Google Access](https://cloud.google.com/vpc/docs/configure-private-google-access)
|
|
188
|
+
* environments. Requires Vault 1.11+.
|
|
189
|
+
*/
|
|
190
|
+
customEndpoint?: pulumi.Input<inputs.gcp.AuthBackendCustomEndpoint>;
|
|
133
191
|
/**
|
|
134
192
|
* A description of the auth method.
|
|
135
193
|
*/
|
|
136
194
|
description?: pulumi.Input<string>;
|
|
195
|
+
/**
|
|
196
|
+
* If set, opts out of mount migration on path updates.
|
|
197
|
+
* See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
|
198
|
+
*/
|
|
199
|
+
disableRemount?: pulumi.Input<boolean>;
|
|
137
200
|
/**
|
|
138
201
|
* Specifies if the auth method is local only.
|
|
139
202
|
*/
|
|
140
203
|
local?: pulumi.Input<boolean>;
|
|
204
|
+
/**
|
|
205
|
+
* The namespace to provision the resource in.
|
|
206
|
+
* The value should not contain leading or trailing forward slashes.
|
|
207
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
208
|
+
* *Available only for Vault Enterprise*.
|
|
209
|
+
*/
|
|
210
|
+
namespace?: pulumi.Input<string>;
|
|
141
211
|
/**
|
|
142
212
|
* The path to mount the auth method — this defaults to 'gcp'.
|
|
143
213
|
*/
|
package/gcp/authBackend.js
CHANGED
|
@@ -15,7 +15,15 @@ const utilities = require("../utilities");
|
|
|
15
15
|
* import * as fs from "fs";
|
|
16
16
|
* import * as vault from "@pulumi/vault";
|
|
17
17
|
*
|
|
18
|
-
* const gcp = new vault.gcp.AuthBackend("gcp", {
|
|
18
|
+
* const gcp = new vault.gcp.AuthBackend("gcp", {
|
|
19
|
+
* credentials: fs.readFileSync("vault-gcp-credentials.json"),
|
|
20
|
+
* customEndpoint: {
|
|
21
|
+
* api: "www.googleapis.com",
|
|
22
|
+
* iam: "iam.googleapis.com",
|
|
23
|
+
* crm: "cloudresourcemanager.googleapis.com",
|
|
24
|
+
* compute: "compute.googleapis.com",
|
|
25
|
+
* },
|
|
26
|
+
* });
|
|
19
27
|
* ```
|
|
20
28
|
*
|
|
21
29
|
* ## Import
|
|
@@ -35,8 +43,11 @@ class AuthBackend extends pulumi.CustomResource {
|
|
|
35
43
|
resourceInputs["clientEmail"] = state ? state.clientEmail : undefined;
|
|
36
44
|
resourceInputs["clientId"] = state ? state.clientId : undefined;
|
|
37
45
|
resourceInputs["credentials"] = state ? state.credentials : undefined;
|
|
46
|
+
resourceInputs["customEndpoint"] = state ? state.customEndpoint : undefined;
|
|
38
47
|
resourceInputs["description"] = state ? state.description : undefined;
|
|
48
|
+
resourceInputs["disableRemount"] = state ? state.disableRemount : undefined;
|
|
39
49
|
resourceInputs["local"] = state ? state.local : undefined;
|
|
50
|
+
resourceInputs["namespace"] = state ? state.namespace : undefined;
|
|
40
51
|
resourceInputs["path"] = state ? state.path : undefined;
|
|
41
52
|
resourceInputs["privateKeyId"] = state ? state.privateKeyId : undefined;
|
|
42
53
|
resourceInputs["projectId"] = state ? state.projectId : undefined;
|
|
@@ -45,14 +56,19 @@ class AuthBackend extends pulumi.CustomResource {
|
|
|
45
56
|
const args = argsOrState;
|
|
46
57
|
resourceInputs["clientEmail"] = args ? args.clientEmail : undefined;
|
|
47
58
|
resourceInputs["clientId"] = args ? args.clientId : undefined;
|
|
48
|
-
resourceInputs["credentials"] = args ? args.credentials : undefined;
|
|
59
|
+
resourceInputs["credentials"] = (args === null || args === void 0 ? void 0 : args.credentials) ? pulumi.secret(args.credentials) : undefined;
|
|
60
|
+
resourceInputs["customEndpoint"] = args ? args.customEndpoint : undefined;
|
|
49
61
|
resourceInputs["description"] = args ? args.description : undefined;
|
|
62
|
+
resourceInputs["disableRemount"] = args ? args.disableRemount : undefined;
|
|
50
63
|
resourceInputs["local"] = args ? args.local : undefined;
|
|
64
|
+
resourceInputs["namespace"] = args ? args.namespace : undefined;
|
|
51
65
|
resourceInputs["path"] = args ? args.path : undefined;
|
|
52
66
|
resourceInputs["privateKeyId"] = args ? args.privateKeyId : undefined;
|
|
53
67
|
resourceInputs["projectId"] = args ? args.projectId : undefined;
|
|
54
68
|
}
|
|
55
69
|
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
70
|
+
const secretOpts = { additionalSecretOutputs: ["credentials"] };
|
|
71
|
+
opts = pulumi.mergeOptions(opts, secretOpts);
|
|
56
72
|
super(AuthBackend.__pulumiType, name, resourceInputs, opts);
|
|
57
73
|
}
|
|
58
74
|
/**
|
package/gcp/authBackend.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"authBackend.js","sourceRoot":"","sources":["../../gcp/authBackend.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;
|
|
1
|
+
{"version":3,"file":"authBackend.js","sourceRoot":"","sources":["../../gcp/authBackend.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA4BG;AACH,MAAa,WAAY,SAAQ,MAAM,CAAC,cAAc;IAyFlD,YAAY,IAAY,EAAE,WAAgD,EAAE,IAAmC;QAC3G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA2C,CAAC;YAC1D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;SACrE;aAAM;YACH,MAAM,IAAI,GAAG,WAA0C,CAAC;YACxD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,aAAa,CAAC,GAAG,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,WAAW,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;SACnE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,aAAa,CAAC,EAAE,CAAC;QAChE,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,WAAW,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAChE,CAAC;IA1HD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAwB,EAAE,IAAmC;QACtH,OAAO,IAAI,WAAW,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAClE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,WAAW,CAAC,YAAY,CAAC;IAC5D,CAAC;;AA1BL,kCA4HC;AA9GG,gBAAgB;AACO,wBAAY,GAAG,mCAAmC,CAAC"}
|
package/gcp/authBackendRole.d.ts
CHANGED
|
@@ -63,6 +63,13 @@ export declare class AuthBackendRole extends pulumi.CustomResource {
|
|
|
63
63
|
* The number of seconds past the time of authentication that the login param JWT must expire within. For example, if a user attempts to login with a token that expires within an hour and this is set to 15 minutes, Vault will return an error prompting the user to create a new signed JWT with a shorter `exp`. The GCE metadata tokens currently do not allow the `exp` claim to be customized.
|
|
64
64
|
*/
|
|
65
65
|
readonly maxJwtExp: pulumi.Output<string>;
|
|
66
|
+
/**
|
|
67
|
+
* The namespace to provision the resource in.
|
|
68
|
+
* The value should not contain leading or trailing forward slashes.
|
|
69
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
70
|
+
* *Available only for Vault Enterprise*.
|
|
71
|
+
*/
|
|
72
|
+
readonly namespace: pulumi.Output<string | undefined>;
|
|
66
73
|
/**
|
|
67
74
|
* Name of the GCP role
|
|
68
75
|
*/
|
|
@@ -174,6 +181,13 @@ export interface AuthBackendRoleState {
|
|
|
174
181
|
* The number of seconds past the time of authentication that the login param JWT must expire within. For example, if a user attempts to login with a token that expires within an hour and this is set to 15 minutes, Vault will return an error prompting the user to create a new signed JWT with a shorter `exp`. The GCE metadata tokens currently do not allow the `exp` claim to be customized.
|
|
175
182
|
*/
|
|
176
183
|
maxJwtExp?: pulumi.Input<string>;
|
|
184
|
+
/**
|
|
185
|
+
* The namespace to provision the resource in.
|
|
186
|
+
* The value should not contain leading or trailing forward slashes.
|
|
187
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
188
|
+
* *Available only for Vault Enterprise*.
|
|
189
|
+
*/
|
|
190
|
+
namespace?: pulumi.Input<string>;
|
|
177
191
|
/**
|
|
178
192
|
* Name of the GCP role
|
|
179
193
|
*/
|
|
@@ -277,6 +291,13 @@ export interface AuthBackendRoleArgs {
|
|
|
277
291
|
* The number of seconds past the time of authentication that the login param JWT must expire within. For example, if a user attempts to login with a token that expires within an hour and this is set to 15 minutes, Vault will return an error prompting the user to create a new signed JWT with a shorter `exp`. The GCE metadata tokens currently do not allow the `exp` claim to be customized.
|
|
278
292
|
*/
|
|
279
293
|
maxJwtExp?: pulumi.Input<string>;
|
|
294
|
+
/**
|
|
295
|
+
* The namespace to provision the resource in.
|
|
296
|
+
* The value should not contain leading or trailing forward slashes.
|
|
297
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
298
|
+
* *Available only for Vault Enterprise*.
|
|
299
|
+
*/
|
|
300
|
+
namespace?: pulumi.Input<string>;
|
|
280
301
|
/**
|
|
281
302
|
* Name of the GCP role
|
|
282
303
|
*/
|
package/gcp/authBackendRole.js
CHANGED
|
@@ -32,6 +32,7 @@ class AuthBackendRole extends pulumi.CustomResource {
|
|
|
32
32
|
resourceInputs["boundServiceAccounts"] = state ? state.boundServiceAccounts : undefined;
|
|
33
33
|
resourceInputs["boundZones"] = state ? state.boundZones : undefined;
|
|
34
34
|
resourceInputs["maxJwtExp"] = state ? state.maxJwtExp : undefined;
|
|
35
|
+
resourceInputs["namespace"] = state ? state.namespace : undefined;
|
|
35
36
|
resourceInputs["role"] = state ? state.role : undefined;
|
|
36
37
|
resourceInputs["tokenBoundCidrs"] = state ? state.tokenBoundCidrs : undefined;
|
|
37
38
|
resourceInputs["tokenExplicitMaxTtl"] = state ? state.tokenExplicitMaxTtl : undefined;
|
|
@@ -62,6 +63,7 @@ class AuthBackendRole extends pulumi.CustomResource {
|
|
|
62
63
|
resourceInputs["boundServiceAccounts"] = args ? args.boundServiceAccounts : undefined;
|
|
63
64
|
resourceInputs["boundZones"] = args ? args.boundZones : undefined;
|
|
64
65
|
resourceInputs["maxJwtExp"] = args ? args.maxJwtExp : undefined;
|
|
66
|
+
resourceInputs["namespace"] = args ? args.namespace : undefined;
|
|
65
67
|
resourceInputs["role"] = args ? args.role : undefined;
|
|
66
68
|
resourceInputs["tokenBoundCidrs"] = args ? args.tokenBoundCidrs : undefined;
|
|
67
69
|
resourceInputs["tokenExplicitMaxTtl"] = args ? args.tokenExplicitMaxTtl : undefined;
|