@pulumi/vault 5.6.0 → 5.7.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/ad/getAccessCredentials.d.ts +15 -0
- package/ad/getAccessCredentials.js +1 -0
- package/ad/getAccessCredentials.js.map +1 -1
- package/ad/index.d.ts +12 -4
- package/ad/index.js +13 -26
- package/ad/index.js.map +1 -1
- package/ad/secretBackend.d.ts +39 -0
- package/ad/secretBackend.js +9 -3
- package/ad/secretBackend.js.map +1 -1
- package/ad/secretLibrary.d.ts +21 -0
- package/ad/secretLibrary.js +2 -0
- package/ad/secretLibrary.js.map +1 -1
- package/ad/secretRole.d.ts +21 -0
- package/ad/secretRole.js +2 -0
- package/ad/secretRole.js.map +1 -1
- package/alicloud/authBackendRole.d.ts +21 -0
- package/alicloud/authBackendRole.js +2 -0
- package/alicloud/authBackendRole.js.map +1 -1
- package/alicloud/index.d.ts +3 -1
- package/alicloud/index.js +4 -19
- package/alicloud/index.js.map +1 -1
- package/approle/authBackendLogin.d.ts +22 -1
- package/approle/authBackendLogin.js +3 -1
- package/approle/authBackendLogin.js.map +1 -1
- package/approle/authBackendRole.d.ts +21 -0
- package/approle/authBackendRole.js +2 -0
- package/approle/authBackendRole.js.map +1 -1
- package/approle/{authBackendRoleSecretID.d.ts → authBackendRoleSecretId.d.ts} +33 -12
- package/approle/{authBackendRoleSecretID.js → authBackendRoleSecretId.js} +16 -12
- package/approle/authBackendRoleSecretId.js.map +1 -0
- package/approle/getAuthBackendRoleId.d.ts +15 -0
- package/approle/getAuthBackendRoleId.js +1 -0
- package/approle/getAuthBackendRoleId.js.map +1 -1
- package/approle/index.d.ts +12 -4
- package/approle/index.js +15 -28
- package/approle/index.js.map +1 -1
- package/audit.d.ts +21 -0
- package/audit.js +2 -0
- package/audit.js.map +1 -1
- package/authBackend.d.ts +47 -10
- package/authBackend.js +4 -0
- package/authBackend.js.map +1 -1
- package/aws/authBackendCert.d.ts +21 -0
- package/aws/authBackendCert.js +2 -0
- package/aws/authBackendCert.js.map +1 -1
- package/aws/authBackendClient.d.ts +21 -0
- package/aws/authBackendClient.js +6 -2
- package/aws/authBackendClient.js.map +1 -1
- package/aws/authBackendIdentityWhitelist.d.ts +21 -0
- package/aws/authBackendIdentityWhitelist.js +2 -0
- package/aws/authBackendIdentityWhitelist.js.map +1 -1
- package/aws/authBackendLogin.d.ts +21 -0
- package/aws/authBackendLogin.js +4 -0
- package/aws/authBackendLogin.js.map +1 -1
- package/aws/authBackendRole.d.ts +21 -0
- package/aws/authBackendRole.js +2 -0
- package/aws/authBackendRole.js.map +1 -1
- package/aws/authBackendRoleTag.d.ts +21 -0
- package/aws/authBackendRoleTag.js +2 -0
- package/aws/authBackendRoleTag.js.map +1 -1
- package/aws/authBackendRoletagBlacklist.d.ts +21 -0
- package/aws/authBackendRoletagBlacklist.js +2 -0
- package/aws/authBackendRoletagBlacklist.js.map +1 -1
- package/aws/authBackendStsRole.d.ts +21 -0
- package/aws/authBackendStsRole.js +2 -0
- package/aws/authBackendStsRole.js.map +1 -1
- package/aws/getAccessCredentials.d.ts +15 -0
- package/aws/getAccessCredentials.js +1 -0
- package/aws/getAccessCredentials.js.map +1 -1
- package/aws/index.d.ts +33 -11
- package/aws/index.js +34 -47
- package/aws/index.js.map +1 -1
- package/aws/secretBackend.d.ts +36 -12
- package/aws/secretBackend.js +8 -14
- package/aws/secretBackend.js.map +1 -1
- package/aws/secretBackendRole.d.ts +21 -0
- package/aws/secretBackendRole.js +2 -0
- package/aws/secretBackendRole.js.map +1 -1
- package/azure/authBackendConfig.d.ts +21 -0
- package/azure/authBackendConfig.js +7 -3
- package/azure/authBackendConfig.js.map +1 -1
- package/azure/authBackendRole.d.ts +21 -0
- package/azure/authBackendRole.js +2 -0
- package/azure/authBackendRole.js.map +1 -1
- package/azure/backend.d.ts +36 -0
- package/azure/backend.js +10 -4
- package/azure/backend.js.map +1 -1
- package/azure/backendRole.d.ts +23 -1
- package/azure/backendRole.js +2 -0
- package/azure/backendRole.js.map +1 -1
- package/azure/getAccessCredentials.d.ts +15 -0
- package/azure/getAccessCredentials.js +1 -0
- package/azure/getAccessCredentials.js.map +1 -1
- package/azure/index.d.ts +15 -5
- package/azure/index.js +16 -29
- package/azure/index.js.map +1 -1
- package/certAuthBackendRole.d.ts +39 -3
- package/certAuthBackendRole.js +4 -0
- package/certAuthBackendRole.js.map +1 -1
- package/config/vars.d.ts +43 -3
- package/config/vars.js +64 -4
- package/config/vars.js.map +1 -1
- package/consul/index.d.ts +6 -2
- package/consul/index.js +7 -22
- package/consul/index.js.map +1 -1
- package/consul/secretBackend.d.ts +87 -15
- package/consul/secretBackend.js +24 -7
- package/consul/secretBackend.js.map +1 -1
- package/consul/secretBackendRole.d.ts +93 -10
- package/consul/secretBackendRole.js +14 -1
- package/consul/secretBackendRole.js.map +1 -1
- package/database/index.d.ts +12 -4
- package/database/index.js +13 -28
- package/database/index.js.map +1 -1
- package/database/secretBackendConnection.d.ts +35 -1
- package/database/secretBackendConnection.js +4 -0
- package/database/secretBackendConnection.js.map +1 -1
- package/database/secretBackendRole.d.ts +21 -0
- package/database/secretBackendRole.js +2 -0
- package/database/secretBackendRole.js.map +1 -1
- package/database/secretBackendStaticRole.d.ts +21 -0
- package/database/secretBackendStaticRole.js +2 -0
- package/database/secretBackendStaticRole.js.map +1 -1
- package/database/secretsMount.d.ts +41 -1
- package/database/secretsMount.js +6 -0
- package/database/secretsMount.js.map +1 -1
- package/egpPolicy.d.ts +21 -0
- package/egpPolicy.js +2 -0
- package/egpPolicy.js.map +1 -1
- package/gcp/authBackend.d.ts +71 -1
- package/gcp/authBackend.js +18 -2
- package/gcp/authBackend.js.map +1 -1
- package/gcp/authBackendRole.d.ts +21 -0
- package/gcp/authBackendRole.js +2 -0
- package/gcp/authBackendRole.js.map +1 -1
- package/gcp/getAuthBackendRole.d.ts +15 -0
- package/gcp/getAuthBackendRole.js +1 -0
- package/gcp/getAuthBackendRole.js.map +1 -1
- package/gcp/index.d.ts +18 -6
- package/gcp/index.js +19 -32
- package/gcp/index.js.map +1 -1
- package/gcp/secretBackend.d.ts +36 -0
- package/gcp/secretBackend.js +7 -1
- package/gcp/secretBackend.js.map +1 -1
- package/gcp/secretRoleset.d.ts +23 -1
- package/gcp/secretRoleset.js +2 -0
- package/gcp/secretRoleset.js.map +1 -1
- package/gcp/secretStaticAccount.d.ts +23 -1
- package/gcp/secretStaticAccount.js +2 -0
- package/gcp/secretStaticAccount.js.map +1 -1
- package/generic/endpoint.d.ts +21 -0
- package/generic/endpoint.js +5 -1
- package/generic/endpoint.js.map +1 -1
- package/generic/getSecret.d.ts +15 -0
- package/generic/getSecret.js +1 -0
- package/generic/getSecret.js.map +1 -1
- package/generic/index.d.ts +9 -3
- package/generic/index.js +10 -23
- package/generic/index.js.map +1 -1
- package/generic/secret.d.ts +21 -0
- package/generic/secret.js +5 -1
- package/generic/secret.js.map +1 -1
- package/getAuthBackend.d.ts +16 -1
- package/getAuthBackend.js +1 -0
- package/getAuthBackend.js.map +1 -1
- package/getNomadAccessToken.d.ts +15 -0
- package/getNomadAccessToken.js +1 -0
- package/getNomadAccessToken.js.map +1 -1
- package/getPolicyDocument.d.ts +5 -1
- package/getPolicyDocument.js +1 -0
- package/getPolicyDocument.js.map +1 -1
- package/github/authBackend.d.ts +38 -1
- package/github/authBackend.js +4 -0
- package/github/authBackend.js.map +1 -1
- package/github/index.d.ts +9 -3
- package/github/index.js +10 -25
- package/github/index.js.map +1 -1
- package/github/team.d.ts +21 -0
- package/github/team.js +2 -0
- package/github/team.js.map +1 -1
- package/github/user.d.ts +21 -0
- package/github/user.js +2 -0
- package/github/user.js.map +1 -1
- package/identity/entity.d.ts +21 -0
- package/identity/entity.js +2 -0
- package/identity/entity.js.map +1 -1
- package/identity/entityAlias.d.ts +21 -0
- package/identity/entityAlias.js +2 -0
- package/identity/entityAlias.js.map +1 -1
- package/identity/entityPolicies.d.ts +21 -0
- package/identity/entityPolicies.js +2 -0
- package/identity/entityPolicies.js.map +1 -1
- package/identity/getEntity.d.ts +16 -1
- package/identity/getEntity.js +1 -0
- package/identity/getEntity.js.map +1 -1
- package/identity/getGroup.d.ts +15 -0
- package/identity/getGroup.js +1 -0
- package/identity/getGroup.js.map +1 -1
- package/identity/getOidcClientCreds.d.ts +15 -0
- package/identity/getOidcClientCreds.js +1 -0
- package/identity/getOidcClientCreds.js.map +1 -1
- package/identity/getOidcOpenidConfig.d.ts +15 -0
- package/identity/getOidcOpenidConfig.js +1 -0
- package/identity/getOidcOpenidConfig.js.map +1 -1
- package/identity/getOidcPublicKeys.d.ts +15 -0
- package/identity/getOidcPublicKeys.js +1 -0
- package/identity/getOidcPublicKeys.js.map +1 -1
- package/identity/group.d.ts +21 -0
- package/identity/group.js +2 -0
- package/identity/group.js.map +1 -1
- package/identity/groupAlias.d.ts +21 -0
- package/identity/groupAlias.js +2 -0
- package/identity/groupAlias.js.map +1 -1
- package/identity/groupMemberEntityIds.d.ts +21 -0
- package/identity/groupMemberEntityIds.js +2 -0
- package/identity/groupMemberEntityIds.js.map +1 -1
- package/identity/groupPolicies.d.ts +21 -0
- package/identity/groupPolicies.js +2 -0
- package/identity/groupPolicies.js.map +1 -1
- package/identity/index.d.ts +75 -20
- package/identity/index.js +86 -66
- package/identity/index.js.map +1 -1
- package/identity/mfaDuo.d.ts +200 -0
- package/identity/mfaDuo.js +110 -0
- package/identity/mfaDuo.js.map +1 -0
- package/identity/mfaLoginEnforcement.d.ts +170 -0
- package/identity/mfaLoginEnforcement.js +96 -0
- package/identity/mfaLoginEnforcement.js.map +1 -0
- package/identity/mfaOkta.d.ts +188 -0
- package/identity/mfaOkta.js +105 -0
- package/identity/mfaOkta.js.map +1 -0
- package/identity/mfaPingid.d.ts +190 -0
- package/identity/mfaPingid.js +102 -0
- package/identity/mfaPingid.js.map +1 -0
- package/identity/mfaTotp.d.ts +218 -0
- package/identity/mfaTotp.js +104 -0
- package/identity/mfaTotp.js.map +1 -0
- package/identity/oidc.d.ts +21 -0
- package/identity/oidc.js +2 -0
- package/identity/oidc.js.map +1 -1
- package/identity/oidcAssignment.d.ts +23 -2
- package/identity/oidcAssignment.js +4 -2
- package/identity/oidcAssignment.js.map +1 -1
- package/identity/oidcClient.d.ts +21 -0
- package/identity/oidcClient.js +4 -0
- package/identity/oidcClient.js.map +1 -1
- package/identity/oidcKey.d.ts +21 -0
- package/identity/oidcKey.js +2 -0
- package/identity/oidcKey.js.map +1 -1
- package/identity/oidcKeyAllowedClientID.d.ts +21 -0
- package/identity/oidcKeyAllowedClientID.js +2 -0
- package/identity/oidcKeyAllowedClientID.js.map +1 -1
- package/identity/oidcProvider.d.ts +21 -0
- package/identity/oidcProvider.js +2 -0
- package/identity/oidcProvider.js.map +1 -1
- package/identity/oidcRole.d.ts +21 -0
- package/identity/oidcRole.js +2 -0
- package/identity/oidcRole.js.map +1 -1
- package/identity/oidcScope.d.ts +22 -3
- package/identity/oidcScope.js +3 -3
- package/identity/oidcScope.js.map +1 -1
- package/index.d.ts +75 -25
- package/index.js +78 -83
- package/index.js.map +1 -1
- package/jwt/authBackend.d.ts +38 -1
- package/jwt/authBackend.js +7 -1
- package/jwt/authBackend.js.map +1 -1
- package/jwt/authBackendRole.d.ts +57 -0
- package/jwt/authBackendRole.js +6 -0
- package/jwt/authBackendRole.js.map +1 -1
- package/jwt/index.d.ts +6 -2
- package/jwt/index.js +7 -22
- package/jwt/index.js.map +1 -1
- package/kmip/index.d.ts +9 -3
- package/kmip/index.js +10 -25
- package/kmip/index.js.map +1 -1
- package/kmip/secretBackend.d.ts +36 -0
- package/kmip/secretBackend.js +4 -0
- package/kmip/secretBackend.js.map +1 -1
- package/kmip/secretRole.d.ts +21 -0
- package/kmip/secretRole.js +2 -0
- package/kmip/secretRole.js.map +1 -1
- package/kmip/secretScope.d.ts +21 -0
- package/kmip/secretScope.js +2 -0
- package/kmip/secretScope.js.map +1 -1
- package/kubernetes/authBackendConfig.d.ts +21 -0
- package/kubernetes/authBackendConfig.js +5 -1
- package/kubernetes/authBackendConfig.js.map +1 -1
- package/kubernetes/authBackendRole.d.ts +21 -0
- package/kubernetes/authBackendRole.js +2 -0
- package/kubernetes/authBackendRole.js.map +1 -1
- package/kubernetes/getAuthBackendConfig.d.ts +15 -0
- package/kubernetes/getAuthBackendConfig.js +1 -0
- package/kubernetes/getAuthBackendConfig.js.map +1 -1
- package/kubernetes/getAuthBackendRole.d.ts +15 -0
- package/kubernetes/getAuthBackendRole.js +1 -0
- package/kubernetes/getAuthBackendRole.js.map +1 -1
- package/kubernetes/getServiceAccountToken.d.ts +156 -0
- package/kubernetes/getServiceAccountToken.js +67 -0
- package/kubernetes/getServiceAccountToken.js.map +1 -0
- package/kubernetes/index.d.ts +21 -4
- package/kubernetes/index.js +26 -24
- package/kubernetes/index.js.map +1 -1
- package/kubernetes/secretBackend.d.ts +303 -0
- package/kubernetes/secretBackend.js +114 -0
- package/kubernetes/secretBackend.js.map +1 -0
- package/kubernetes/secretBackendRole.d.ts +367 -0
- package/kubernetes/secretBackendRole.js +191 -0
- package/kubernetes/secretBackendRole.js.map +1 -0
- package/kv/getSecret.d.ts +104 -0
- package/kv/getSecret.js +53 -0
- package/kv/getSecret.js.map +1 -0
- package/kv/getSecretSubkeysV2.d.ts +132 -0
- package/kv/getSecretSubkeysV2.js +57 -0
- package/kv/getSecretSubkeysV2.js.map +1 -0
- package/kv/getSecretV2.d.ts +139 -0
- package/kv/getSecretV2.js +58 -0
- package/kv/getSecretV2.js.map +1 -0
- package/kv/getSecretsList.d.ts +85 -0
- package/kv/getSecretsList.js +58 -0
- package/kv/getSecretsList.js.map +1 -0
- package/kv/getSecretsListV2.d.ts +114 -0
- package/kv/getSecretsListV2.js +69 -0
- package/kv/getSecretsListV2.js.map +1 -0
- package/kv/index.d.ts +24 -0
- package/kv/index.js +47 -0
- package/kv/index.js.map +1 -0
- package/kv/secret.d.ts +145 -0
- package/kv/secret.js +106 -0
- package/kv/secret.js.map +1 -0
- package/kv/secretBackendV2.d.ts +154 -0
- package/kv/secretBackendV2.js +103 -0
- package/kv/secretBackendV2.js.map +1 -0
- package/kv/secretV2.d.ts +257 -0
- package/kv/secretV2.js +122 -0
- package/kv/secretV2.js.map +1 -0
- package/ldap/authBackend.d.ts +48 -0
- package/ldap/authBackend.js +10 -2
- package/ldap/authBackend.js.map +1 -1
- package/ldap/authBackendGroup.d.ts +21 -0
- package/ldap/authBackendGroup.js +2 -0
- package/ldap/authBackendGroup.js.map +1 -1
- package/ldap/authBackendUser.d.ts +21 -0
- package/ldap/authBackendUser.js +2 -0
- package/ldap/authBackendUser.js.map +1 -1
- package/ldap/index.d.ts +9 -3
- package/ldap/index.js +10 -25
- package/ldap/index.js.map +1 -1
- package/managed/index.d.ts +3 -0
- package/managed/index.js +22 -0
- package/managed/index.js.map +1 -0
- package/managed/keys.d.ts +104 -0
- package/managed/keys.js +64 -0
- package/managed/keys.js.map +1 -0
- package/mfaDuo.d.ts +21 -0
- package/mfaDuo.js +6 -2
- package/mfaDuo.js.map +1 -1
- package/mfaOkta.d.ts +21 -0
- package/mfaOkta.js +5 -1
- package/mfaOkta.js.map +1 -1
- package/mfaPingid.d.ts +21 -0
- package/mfaPingid.js +2 -0
- package/mfaPingid.js.map +1 -1
- package/mfaTotp.d.ts +21 -0
- package/mfaTotp.js +2 -0
- package/mfaTotp.js.map +1 -1
- package/mount.d.ts +33 -0
- package/mount.js +4 -0
- package/mount.js.map +1 -1
- package/namespace.d.ts +32 -18
- package/namespace.js +5 -16
- package/namespace.js.map +1 -1
- package/nomadSecretBackend.d.ts +36 -0
- package/nomadSecretBackend.js +9 -3
- package/nomadSecretBackend.js.map +1 -1
- package/nomadSecretRole.d.ts +21 -0
- package/nomadSecretRole.js +2 -0
- package/nomadSecretRole.js.map +1 -1
- package/okta/authBackend.d.ts +38 -1
- package/okta/authBackend.js +7 -1
- package/okta/authBackend.js.map +1 -1
- package/okta/authBackendGroup.d.ts +21 -0
- package/okta/authBackendGroup.js +2 -0
- package/okta/authBackendGroup.js.map +1 -1
- package/okta/authBackendUser.d.ts +21 -0
- package/okta/authBackendUser.js +2 -0
- package/okta/authBackendUser.js.map +1 -1
- package/okta/index.d.ts +9 -3
- package/okta/index.js +10 -25
- package/okta/index.js.map +1 -1
- package/package.json +2 -2
- package/package.json.dev +2 -2
- package/passwordPolicy.d.ts +21 -0
- package/passwordPolicy.js +2 -0
- package/passwordPolicy.js.map +1 -1
- package/pkisecret/index.d.ts +30 -10
- package/pkisecret/index.js +31 -46
- package/pkisecret/index.js.map +1 -1
- package/pkisecret/secretBackendCert.d.ts +29 -0
- package/pkisecret/secretBackendCert.js +6 -0
- package/pkisecret/secretBackendCert.js.map +1 -1
- package/pkisecret/secretBackendConfigCa.d.ts +21 -0
- package/pkisecret/secretBackendConfigCa.js +5 -1
- package/pkisecret/secretBackendConfigCa.js.map +1 -1
- package/pkisecret/secretBackendConfigUrls.d.ts +21 -0
- package/pkisecret/secretBackendConfigUrls.js +2 -0
- package/pkisecret/secretBackendConfigUrls.js.map +1 -1
- package/pkisecret/secretBackendCrlConfig.d.ts +21 -0
- package/pkisecret/secretBackendCrlConfig.js +2 -0
- package/pkisecret/secretBackendCrlConfig.js.map +1 -1
- package/pkisecret/secretBackendIntermediateCertRequest.d.ts +54 -0
- package/pkisecret/secretBackendIntermediateCertRequest.js +8 -0
- package/pkisecret/secretBackendIntermediateCertRequest.js.map +1 -1
- package/pkisecret/secretBackendIntermediateSetSigned.d.ts +21 -0
- package/pkisecret/secretBackendIntermediateSetSigned.js +2 -0
- package/pkisecret/secretBackendIntermediateSetSigned.js.map +1 -1
- package/pkisecret/secretBackendRole.d.ts +24 -3
- package/pkisecret/secretBackendRole.js +2 -0
- package/pkisecret/secretBackendRole.js.map +1 -1
- package/pkisecret/secretBackendRootCert.d.ts +57 -3
- package/pkisecret/secretBackendRootCert.js +6 -0
- package/pkisecret/secretBackendRootCert.js.map +1 -1
- package/pkisecret/secretBackendRootSignIntermediate.d.ts +21 -0
- package/pkisecret/secretBackendRootSignIntermediate.js +2 -0
- package/pkisecret/secretBackendRootSignIntermediate.js.map +1 -1
- package/pkisecret/secretBackendSign.d.ts +29 -0
- package/pkisecret/secretBackendSign.js +4 -0
- package/pkisecret/secretBackendSign.js.map +1 -1
- package/policy.d.ts +21 -0
- package/policy.js +2 -0
- package/policy.js.map +1 -1
- package/provider.d.ts +43 -3
- package/provider.js +12 -2
- package/provider.js.map +1 -1
- package/quotaLeaseCount.d.ts +21 -0
- package/quotaLeaseCount.js +2 -0
- package/quotaLeaseCount.js.map +1 -1
- package/quotaRateLimit.d.ts +48 -0
- package/quotaRateLimit.js +6 -0
- package/quotaRateLimit.js.map +1 -1
- package/rabbitmq/index.d.ts +6 -2
- package/rabbitmq/index.js +7 -22
- package/rabbitmq/index.js.map +1 -1
- package/rabbitmq/secretBackend.d.ts +36 -0
- package/rabbitmq/secretBackend.js +8 -2
- package/rabbitmq/secretBackend.js.map +1 -1
- package/rabbitmq/secretBackendRole.d.ts +23 -1
- package/rabbitmq/secretBackendRole.js +2 -0
- package/rabbitmq/secretBackendRole.js.map +1 -1
- package/raftAutopilot.d.ts +21 -0
- package/raftAutopilot.js +2 -0
- package/raftAutopilot.js.map +1 -1
- package/raftSnapshotAgentConfig.d.ts +62 -0
- package/raftSnapshotAgentConfig.js +43 -0
- package/raftSnapshotAgentConfig.js.map +1 -1
- package/rgpPolicy.d.ts +21 -0
- package/rgpPolicy.js +2 -0
- package/rgpPolicy.js.map +1 -1
- package/ssh/index.d.ts +6 -2
- package/ssh/index.js +7 -22
- package/ssh/index.js.map +1 -1
- package/ssh/secretBackendCa.d.ts +29 -0
- package/ssh/secretBackendCa.js +13 -1
- package/ssh/secretBackendCa.js.map +1 -1
- package/ssh/secretBackendRole.d.ts +23 -1
- package/ssh/secretBackendRole.js +2 -0
- package/ssh/secretBackendRole.js.map +1 -1
- package/terraformcloud/index.d.ts +9 -3
- package/terraformcloud/index.js +10 -25
- package/terraformcloud/index.js.map +1 -1
- package/terraformcloud/secretBackend.d.ts +36 -0
- package/terraformcloud/secretBackend.js +7 -1
- package/terraformcloud/secretBackend.js.map +1 -1
- package/terraformcloud/secretCreds.d.ts +21 -0
- package/terraformcloud/secretCreds.js +4 -0
- package/terraformcloud/secretCreds.js.map +1 -1
- package/terraformcloud/secretRole.d.ts +21 -0
- package/terraformcloud/secretRole.js +2 -0
- package/terraformcloud/secretRole.js.map +1 -1
- package/token.d.ts +42 -0
- package/token.js +9 -0
- package/token.js.map +1 -1
- package/tokenauth/authBackendRole.d.ts +21 -0
- package/tokenauth/authBackendRole.js +2 -0
- package/tokenauth/authBackendRole.js.map +1 -1
- package/tokenauth/index.d.ts +3 -1
- package/tokenauth/index.js +4 -19
- package/tokenauth/index.js.map +1 -1
- package/transform/index.d.ts +18 -6
- package/transform/index.js +19 -30
- package/transform/index.js.map +1 -1
- package/transform/transformation.d.ts +0 -25
- package/transform/transformation.js +0 -25
- package/transform/transformation.js.map +1 -1
- package/transit/getDecrypt.d.ts +3 -0
- package/transit/getDecrypt.js +1 -0
- package/transit/getDecrypt.js.map +1 -1
- package/transit/getEncrypt.d.ts +3 -0
- package/transit/getEncrypt.js +1 -0
- package/transit/getEncrypt.js.map +1 -1
- package/transit/index.d.ts +12 -4
- package/transit/index.js +13 -24
- package/transit/index.js.map +1 -1
- package/transit/secretBackendKey.d.ts +21 -0
- package/transit/secretBackendKey.js +2 -0
- package/transit/secretBackendKey.js.map +1 -1
- package/transit/secretCacheConfig.d.ts +21 -0
- package/transit/secretCacheConfig.js +2 -0
- package/transit/secretCacheConfig.js.map +1 -1
- package/types/index.js.map +1 -1
- package/types/input.d.ts +408 -4
- package/types/output.d.ts +409 -5
- package/utilities.js +13 -1
- package/utilities.js.map +1 -1
- package/approle/authBackendRoleSecretID.js.map +0 -1
|
@@ -9,6 +9,13 @@ export interface GetAccessCredentialsArgs {
|
|
|
9
9
|
* read credentials from, with no leading or trailing `/`s.
|
|
10
10
|
*/
|
|
11
11
|
backend: string;
|
|
12
|
+
/**
|
|
13
|
+
* The namespace of the target resource.
|
|
14
|
+
* The value should not contain leading or trailing forward slashes.
|
|
15
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
16
|
+
* *Available only for Vault Enterprise*.
|
|
17
|
+
*/
|
|
18
|
+
namespace?: string;
|
|
12
19
|
/**
|
|
13
20
|
* The name of the AD secret backend role to read
|
|
14
21
|
* credentials from, with no leading or trailing `/`s.
|
|
@@ -32,6 +39,7 @@ export interface GetAccessCredentialsResult {
|
|
|
32
39
|
* The current set password on the Active Directory service account, provided because AD is eventually consistent.
|
|
33
40
|
*/
|
|
34
41
|
readonly lastPassword: string;
|
|
42
|
+
readonly namespace?: string;
|
|
35
43
|
readonly role: string;
|
|
36
44
|
/**
|
|
37
45
|
* The Active Directory service account username.
|
|
@@ -48,6 +56,13 @@ export interface GetAccessCredentialsOutputArgs {
|
|
|
48
56
|
* read credentials from, with no leading or trailing `/`s.
|
|
49
57
|
*/
|
|
50
58
|
backend: pulumi.Input<string>;
|
|
59
|
+
/**
|
|
60
|
+
* The namespace of the target resource.
|
|
61
|
+
* The value should not contain leading or trailing forward slashes.
|
|
62
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
63
|
+
* *Available only for Vault Enterprise*.
|
|
64
|
+
*/
|
|
65
|
+
namespace?: pulumi.Input<string>;
|
|
51
66
|
/**
|
|
52
67
|
* The name of the AD secret backend role to read
|
|
53
68
|
* credentials from, with no leading or trailing `/`s.
|
|
@@ -12,6 +12,7 @@ function getAccessCredentials(args, opts) {
|
|
|
12
12
|
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
13
13
|
return pulumi.runtime.invoke("vault:ad/getAccessCredentials:getAccessCredentials", {
|
|
14
14
|
"backend": args.backend,
|
|
15
|
+
"namespace": args.namespace,
|
|
15
16
|
"role": args.role,
|
|
16
17
|
}, opts);
|
|
17
18
|
}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getAccessCredentials.js","sourceRoot":"","sources":["../../ad/getAccessCredentials.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,SAAgB,oBAAoB,CAAC,IAA8B,EAAE,IAA2B;IAC5F,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,oDAAoD,EAAE;QAC/E,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;
|
|
1
|
+
{"version":3,"file":"getAccessCredentials.js","sourceRoot":"","sources":["../../ad/getAccessCredentials.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,SAAgB,oBAAoB,CAAC,IAA8B,EAAE,IAA2B;IAC5F,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,oDAAoD,EAAE;QAC/E,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,WAAW,EAAE,IAAI,CAAC,SAAS;QAC3B,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAXD,oDAWC;AAkDD,SAAgB,0BAA0B,CAAC,IAAoC,EAAE,IAA2B;IACxG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,oBAAoB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACxE,CAAC;AAFD,gEAEC"}
|
package/ad/index.d.ts
CHANGED
|
@@ -1,4 +1,12 @@
|
|
|
1
|
-
export
|
|
2
|
-
export
|
|
3
|
-
export
|
|
4
|
-
export
|
|
1
|
+
export { GetAccessCredentialsArgs, GetAccessCredentialsResult, GetAccessCredentialsOutputArgs } from "./getAccessCredentials";
|
|
2
|
+
export declare const getAccessCredentials: typeof import("./getAccessCredentials").getAccessCredentials;
|
|
3
|
+
export declare const getAccessCredentialsOutput: typeof import("./getAccessCredentials").getAccessCredentialsOutput;
|
|
4
|
+
export { SecretBackendArgs, SecretBackendState } from "./secretBackend";
|
|
5
|
+
export declare type SecretBackend = import("./secretBackend").SecretBackend;
|
|
6
|
+
export declare const SecretBackend: typeof import("./secretBackend").SecretBackend;
|
|
7
|
+
export { SecretLibraryArgs, SecretLibraryState } from "./secretLibrary";
|
|
8
|
+
export declare type SecretLibrary = import("./secretLibrary").SecretLibrary;
|
|
9
|
+
export declare const SecretLibrary: typeof import("./secretLibrary").SecretLibrary;
|
|
10
|
+
export { SecretRoleArgs, SecretRoleState } from "./secretRole";
|
|
11
|
+
export declare type SecretRole = import("./secretRole").SecretRole;
|
|
12
|
+
export declare const SecretRole: typeof import("./secretRole").SecretRole;
|
package/ad/index.js
CHANGED
|
@@ -1,42 +1,29 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
3
|
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
-
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
5
|
-
if (k2 === undefined) k2 = k;
|
|
6
|
-
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
7
|
-
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
8
|
-
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
9
|
-
}
|
|
10
|
-
Object.defineProperty(o, k2, desc);
|
|
11
|
-
}) : (function(o, m, k, k2) {
|
|
12
|
-
if (k2 === undefined) k2 = k;
|
|
13
|
-
o[k2] = m[k];
|
|
14
|
-
}));
|
|
15
|
-
var __exportStar = (this && this.__exportStar) || function(m, exports) {
|
|
16
|
-
for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
|
|
17
|
-
};
|
|
18
4
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.SecretRole = exports.SecretLibrary = exports.SecretBackend = exports.getAccessCredentialsOutput = exports.getAccessCredentials = void 0;
|
|
19
6
|
const pulumi = require("@pulumi/pulumi");
|
|
20
7
|
const utilities = require("../utilities");
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
|
|
8
|
+
exports.getAccessCredentials = null;
|
|
9
|
+
exports.getAccessCredentialsOutput = null;
|
|
10
|
+
exports.SecretBackend = null;
|
|
11
|
+
exports.SecretLibrary = null;
|
|
12
|
+
exports.SecretRole = null;
|
|
13
|
+
utilities.lazyLoad(exports, ["getAccessCredentials", "getAccessCredentialsOutput"], () => require("./getAccessCredentials"));
|
|
14
|
+
utilities.lazyLoad(exports, ["SecretBackend"], () => require("./secretBackend"));
|
|
15
|
+
utilities.lazyLoad(exports, ["SecretLibrary"], () => require("./secretLibrary"));
|
|
16
|
+
utilities.lazyLoad(exports, ["SecretRole"], () => require("./secretRole"));
|
|
30
17
|
const _module = {
|
|
31
18
|
version: utilities.getVersion(),
|
|
32
19
|
construct: (name, type, urn) => {
|
|
33
20
|
switch (type) {
|
|
34
21
|
case "vault:ad/secretBackend:SecretBackend":
|
|
35
|
-
return new
|
|
22
|
+
return new exports.SecretBackend(name, undefined, { urn });
|
|
36
23
|
case "vault:ad/secretLibrary:SecretLibrary":
|
|
37
|
-
return new
|
|
24
|
+
return new exports.SecretLibrary(name, undefined, { urn });
|
|
38
25
|
case "vault:ad/secretRole:SecretRole":
|
|
39
|
-
return new
|
|
26
|
+
return new exports.SecretRole(name, undefined, { urn });
|
|
40
27
|
default:
|
|
41
28
|
throw new Error(`unknown resource type ${type}`);
|
|
42
29
|
}
|
package/ad/index.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../ad/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../ad/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAI7B,QAAA,oBAAoB,GAAiE,IAAW,CAAC;AACjG,QAAA,0BAA0B,GAAuE,IAAW,CAAC;AAI7G,QAAA,aAAa,GAAmD,IAAW,CAAC;AAI5E,QAAA,aAAa,GAAmD,IAAW,CAAC;AAI5E,QAAA,UAAU,GAA6C,IAAW,CAAC;AAEhF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,sBAAsB,EAAC,4BAA4B,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,wBAAwB,CAAC,CAAC,CAAC;AAC5H,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,eAAe,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,iBAAiB,CAAC,CAAC,CAAC;AACjF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,eAAe,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,iBAAiB,CAAC,CAAC,CAAC;AACjF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,YAAY,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,cAAc,CAAC,CAAC,CAAC;AAE3E,MAAM,OAAO,GAAG;IACZ,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE;IAC/B,SAAS,EAAE,CAAC,IAAY,EAAE,IAAY,EAAE,GAAW,EAAmB,EAAE;QACpE,QAAQ,IAAI,EAAE;YACV,KAAK,sCAAsC;gBACvC,OAAO,IAAI,qBAAa,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC3D,KAAK,sCAAsC;gBACvC,OAAO,IAAI,qBAAa,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC3D,KAAK,gCAAgC;gBACjC,OAAO,IAAI,kBAAU,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACxD;gBACI,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,EAAE,CAAC,CAAC;SACxD;IACL,CAAC;CACJ,CAAC;AACF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,kBAAkB,EAAE,OAAO,CAAC,CAAA;AAC3E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,kBAAkB,EAAE,OAAO,CAAC,CAAA;AAC3E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,eAAe,EAAE,OAAO,CAAC,CAAA"}
|
package/ad/secretBackend.d.ts
CHANGED
|
@@ -89,6 +89,11 @@ export declare class SecretBackend extends pulumi.CustomResource {
|
|
|
89
89
|
* Human-friendly description of the mount for the Active Directory backend.
|
|
90
90
|
*/
|
|
91
91
|
readonly description: pulumi.Output<string | undefined>;
|
|
92
|
+
/**
|
|
93
|
+
* If set, opts out of mount migration on path updates.
|
|
94
|
+
* See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
|
95
|
+
*/
|
|
96
|
+
readonly disableRemount: pulumi.Output<boolean | undefined>;
|
|
92
97
|
/**
|
|
93
98
|
* Use anonymous bind to discover the bind Distinguished Name of a user.
|
|
94
99
|
*/
|
|
@@ -125,6 +130,7 @@ export declare class SecretBackend extends pulumi.CustomResource {
|
|
|
125
130
|
readonly lastRotationTolerance: pulumi.Output<number>;
|
|
126
131
|
/**
|
|
127
132
|
* **Deprecated** use `passwordPolicy`. The desired length of passwords that Vault generates.
|
|
133
|
+
* *Mutually exclusive with `passwordPolicy` on vault-1.11+*
|
|
128
134
|
*
|
|
129
135
|
* @deprecated Length is deprecated and password_policy should be used with Vault >= 1.5.
|
|
130
136
|
*/
|
|
@@ -142,6 +148,13 @@ export declare class SecretBackend extends pulumi.CustomResource {
|
|
|
142
148
|
* In seconds, the maximum password time-to-live.
|
|
143
149
|
*/
|
|
144
150
|
readonly maxTtl: pulumi.Output<number>;
|
|
151
|
+
/**
|
|
152
|
+
* The namespace to provision the resource in.
|
|
153
|
+
* The value should not contain leading or trailing forward slashes.
|
|
154
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
155
|
+
* *Available only for Vault Enterprise*.
|
|
156
|
+
*/
|
|
157
|
+
readonly namespace: pulumi.Output<string | undefined>;
|
|
145
158
|
/**
|
|
146
159
|
* Name of the password policy to use to generate passwords.
|
|
147
160
|
*/
|
|
@@ -262,6 +275,11 @@ export interface SecretBackendState {
|
|
|
262
275
|
* Human-friendly description of the mount for the Active Directory backend.
|
|
263
276
|
*/
|
|
264
277
|
description?: pulumi.Input<string>;
|
|
278
|
+
/**
|
|
279
|
+
* If set, opts out of mount migration on path updates.
|
|
280
|
+
* See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
|
281
|
+
*/
|
|
282
|
+
disableRemount?: pulumi.Input<boolean>;
|
|
265
283
|
/**
|
|
266
284
|
* Use anonymous bind to discover the bind Distinguished Name of a user.
|
|
267
285
|
*/
|
|
@@ -298,6 +316,7 @@ export interface SecretBackendState {
|
|
|
298
316
|
lastRotationTolerance?: pulumi.Input<number>;
|
|
299
317
|
/**
|
|
300
318
|
* **Deprecated** use `passwordPolicy`. The desired length of passwords that Vault generates.
|
|
319
|
+
* *Mutually exclusive with `passwordPolicy` on vault-1.11+*
|
|
301
320
|
*
|
|
302
321
|
* @deprecated Length is deprecated and password_policy should be used with Vault >= 1.5.
|
|
303
322
|
*/
|
|
@@ -315,6 +334,13 @@ export interface SecretBackendState {
|
|
|
315
334
|
* In seconds, the maximum password time-to-live.
|
|
316
335
|
*/
|
|
317
336
|
maxTtl?: pulumi.Input<number>;
|
|
337
|
+
/**
|
|
338
|
+
* The namespace to provision the resource in.
|
|
339
|
+
* The value should not contain leading or trailing forward slashes.
|
|
340
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
341
|
+
* *Available only for Vault Enterprise*.
|
|
342
|
+
*/
|
|
343
|
+
namespace?: pulumi.Input<string>;
|
|
318
344
|
/**
|
|
319
345
|
* Name of the password policy to use to generate passwords.
|
|
320
346
|
*/
|
|
@@ -427,6 +453,11 @@ export interface SecretBackendArgs {
|
|
|
427
453
|
* Human-friendly description of the mount for the Active Directory backend.
|
|
428
454
|
*/
|
|
429
455
|
description?: pulumi.Input<string>;
|
|
456
|
+
/**
|
|
457
|
+
* If set, opts out of mount migration on path updates.
|
|
458
|
+
* See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
|
459
|
+
*/
|
|
460
|
+
disableRemount?: pulumi.Input<boolean>;
|
|
430
461
|
/**
|
|
431
462
|
* Use anonymous bind to discover the bind Distinguished Name of a user.
|
|
432
463
|
*/
|
|
@@ -463,6 +494,7 @@ export interface SecretBackendArgs {
|
|
|
463
494
|
lastRotationTolerance?: pulumi.Input<number>;
|
|
464
495
|
/**
|
|
465
496
|
* **Deprecated** use `passwordPolicy`. The desired length of passwords that Vault generates.
|
|
497
|
+
* *Mutually exclusive with `passwordPolicy` on vault-1.11+*
|
|
466
498
|
*
|
|
467
499
|
* @deprecated Length is deprecated and password_policy should be used with Vault >= 1.5.
|
|
468
500
|
*/
|
|
@@ -480,6 +512,13 @@ export interface SecretBackendArgs {
|
|
|
480
512
|
* In seconds, the maximum password time-to-live.
|
|
481
513
|
*/
|
|
482
514
|
maxTtl?: pulumi.Input<number>;
|
|
515
|
+
/**
|
|
516
|
+
* The namespace to provision the resource in.
|
|
517
|
+
* The value should not contain leading or trailing forward slashes.
|
|
518
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
519
|
+
* *Available only for Vault Enterprise*.
|
|
520
|
+
*/
|
|
521
|
+
namespace?: pulumi.Input<string>;
|
|
483
522
|
/**
|
|
484
523
|
* Name of the password policy to use to generate passwords.
|
|
485
524
|
*/
|
package/ad/secretBackend.js
CHANGED
|
@@ -47,6 +47,7 @@ class SecretBackend extends pulumi.CustomResource {
|
|
|
47
47
|
resourceInputs["defaultLeaseTtlSeconds"] = state ? state.defaultLeaseTtlSeconds : undefined;
|
|
48
48
|
resourceInputs["denyNullBind"] = state ? state.denyNullBind : undefined;
|
|
49
49
|
resourceInputs["description"] = state ? state.description : undefined;
|
|
50
|
+
resourceInputs["disableRemount"] = state ? state.disableRemount : undefined;
|
|
50
51
|
resourceInputs["discoverdn"] = state ? state.discoverdn : undefined;
|
|
51
52
|
resourceInputs["formatter"] = state ? state.formatter : undefined;
|
|
52
53
|
resourceInputs["groupattr"] = state ? state.groupattr : undefined;
|
|
@@ -58,6 +59,7 @@ class SecretBackend extends pulumi.CustomResource {
|
|
|
58
59
|
resourceInputs["local"] = state ? state.local : undefined;
|
|
59
60
|
resourceInputs["maxLeaseTtlSeconds"] = state ? state.maxLeaseTtlSeconds : undefined;
|
|
60
61
|
resourceInputs["maxTtl"] = state ? state.maxTtl : undefined;
|
|
62
|
+
resourceInputs["namespace"] = state ? state.namespace : undefined;
|
|
61
63
|
resourceInputs["passwordPolicy"] = state ? state.passwordPolicy : undefined;
|
|
62
64
|
resourceInputs["requestTimeout"] = state ? state.requestTimeout : undefined;
|
|
63
65
|
resourceInputs["starttls"] = state ? state.starttls : undefined;
|
|
@@ -82,14 +84,15 @@ class SecretBackend extends pulumi.CustomResource {
|
|
|
82
84
|
resourceInputs["anonymousGroupSearch"] = args ? args.anonymousGroupSearch : undefined;
|
|
83
85
|
resourceInputs["backend"] = args ? args.backend : undefined;
|
|
84
86
|
resourceInputs["binddn"] = args ? args.binddn : undefined;
|
|
85
|
-
resourceInputs["bindpass"] = args ? args.bindpass : undefined;
|
|
87
|
+
resourceInputs["bindpass"] = (args === null || args === void 0 ? void 0 : args.bindpass) ? pulumi.secret(args.bindpass) : undefined;
|
|
86
88
|
resourceInputs["caseSensitiveNames"] = args ? args.caseSensitiveNames : undefined;
|
|
87
89
|
resourceInputs["certificate"] = args ? args.certificate : undefined;
|
|
88
|
-
resourceInputs["clientTlsCert"] = args ? args.clientTlsCert : undefined;
|
|
89
|
-
resourceInputs["clientTlsKey"] = args ? args.clientTlsKey : undefined;
|
|
90
|
+
resourceInputs["clientTlsCert"] = (args === null || args === void 0 ? void 0 : args.clientTlsCert) ? pulumi.secret(args.clientTlsCert) : undefined;
|
|
91
|
+
resourceInputs["clientTlsKey"] = (args === null || args === void 0 ? void 0 : args.clientTlsKey) ? pulumi.secret(args.clientTlsKey) : undefined;
|
|
90
92
|
resourceInputs["defaultLeaseTtlSeconds"] = args ? args.defaultLeaseTtlSeconds : undefined;
|
|
91
93
|
resourceInputs["denyNullBind"] = args ? args.denyNullBind : undefined;
|
|
92
94
|
resourceInputs["description"] = args ? args.description : undefined;
|
|
95
|
+
resourceInputs["disableRemount"] = args ? args.disableRemount : undefined;
|
|
93
96
|
resourceInputs["discoverdn"] = args ? args.discoverdn : undefined;
|
|
94
97
|
resourceInputs["formatter"] = args ? args.formatter : undefined;
|
|
95
98
|
resourceInputs["groupattr"] = args ? args.groupattr : undefined;
|
|
@@ -101,6 +104,7 @@ class SecretBackend extends pulumi.CustomResource {
|
|
|
101
104
|
resourceInputs["local"] = args ? args.local : undefined;
|
|
102
105
|
resourceInputs["maxLeaseTtlSeconds"] = args ? args.maxLeaseTtlSeconds : undefined;
|
|
103
106
|
resourceInputs["maxTtl"] = args ? args.maxTtl : undefined;
|
|
107
|
+
resourceInputs["namespace"] = args ? args.namespace : undefined;
|
|
104
108
|
resourceInputs["passwordPolicy"] = args ? args.passwordPolicy : undefined;
|
|
105
109
|
resourceInputs["requestTimeout"] = args ? args.requestTimeout : undefined;
|
|
106
110
|
resourceInputs["starttls"] = args ? args.starttls : undefined;
|
|
@@ -115,6 +119,8 @@ class SecretBackend extends pulumi.CustomResource {
|
|
|
115
119
|
resourceInputs["userdn"] = args ? args.userdn : undefined;
|
|
116
120
|
}
|
|
117
121
|
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
122
|
+
const secretOpts = { additionalSecretOutputs: ["bindpass", "clientTlsCert", "clientTlsKey"] };
|
|
123
|
+
opts = pulumi.mergeOptions(opts, secretOpts);
|
|
118
124
|
super(SecretBackend.__pulumiType, name, resourceInputs, opts);
|
|
119
125
|
}
|
|
120
126
|
/**
|
package/ad/secretBackend.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretBackend.js","sourceRoot":"","sources":["../../ad/secretBackend.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;GAwBG;AACH,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;
|
|
1
|
+
{"version":3,"file":"secretBackend.js","sourceRoot":"","sources":["../../ad/secretBackend.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;GAwBG;AACH,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;IAkNpD,YAAY,IAAY,EAAE,WAAoD,EAAE,IAAmC;QAC/G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA6C,CAAC;YAC5D,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,qBAAqB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,0BAA0B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAA4C,CAAC;YAC1D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,UAAU,CAAC,GAAG,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,QAAQ,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACvF,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,eAAe,CAAC,GAAG,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,aAAa,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACtG,cAAc,CAAC,cAAc,CAAC,GAAG,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,YAAY,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACnG,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,qBAAqB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,cAAc,CAAC,0BAA0B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,UAAU,EAAE,eAAe,EAAE,cAAc,CAAC,EAAE,CAAC;QAC9F,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAClE,CAAC;IA3SD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA0B,EAAE,IAAmC;QACxH,OAAO,IAAI,aAAa,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACpE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,aAAa,CAAC,YAAY,CAAC;IAC9D,CAAC;;AA1BL,sCA6SC;AA/RG,gBAAgB;AACO,0BAAY,GAAG,sCAAsC,CAAC"}
|
package/ad/secretLibrary.d.ts
CHANGED
|
@@ -69,6 +69,13 @@ export declare class SecretLibrary extends pulumi.CustomResource {
|
|
|
69
69
|
* Must be unique within the backend.
|
|
70
70
|
*/
|
|
71
71
|
readonly name: pulumi.Output<string>;
|
|
72
|
+
/**
|
|
73
|
+
* The namespace to provision the resource in.
|
|
74
|
+
* The value should not contain leading or trailing forward slashes.
|
|
75
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
76
|
+
* *Available only for Vault Enterprise*.
|
|
77
|
+
*/
|
|
78
|
+
readonly namespace: pulumi.Output<string | undefined>;
|
|
72
79
|
/**
|
|
73
80
|
* Specifies the slice of service accounts mapped to this set.
|
|
74
81
|
*/
|
|
@@ -110,6 +117,13 @@ export interface SecretLibraryState {
|
|
|
110
117
|
* Must be unique within the backend.
|
|
111
118
|
*/
|
|
112
119
|
name?: pulumi.Input<string>;
|
|
120
|
+
/**
|
|
121
|
+
* The namespace to provision the resource in.
|
|
122
|
+
* The value should not contain leading or trailing forward slashes.
|
|
123
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
124
|
+
* *Available only for Vault Enterprise*.
|
|
125
|
+
*/
|
|
126
|
+
namespace?: pulumi.Input<string>;
|
|
113
127
|
/**
|
|
114
128
|
* Specifies the slice of service accounts mapped to this set.
|
|
115
129
|
*/
|
|
@@ -143,6 +157,13 @@ export interface SecretLibraryArgs {
|
|
|
143
157
|
* Must be unique within the backend.
|
|
144
158
|
*/
|
|
145
159
|
name?: pulumi.Input<string>;
|
|
160
|
+
/**
|
|
161
|
+
* The namespace to provision the resource in.
|
|
162
|
+
* The value should not contain leading or trailing forward slashes.
|
|
163
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
164
|
+
* *Available only for Vault Enterprise*.
|
|
165
|
+
*/
|
|
166
|
+
namespace?: pulumi.Input<string>;
|
|
146
167
|
/**
|
|
147
168
|
* Specifies the slice of service accounts mapped to this set.
|
|
148
169
|
*/
|
package/ad/secretLibrary.js
CHANGED
|
@@ -50,6 +50,7 @@ class SecretLibrary extends pulumi.CustomResource {
|
|
|
50
50
|
resourceInputs["disableCheckInEnforcement"] = state ? state.disableCheckInEnforcement : undefined;
|
|
51
51
|
resourceInputs["maxTtl"] = state ? state.maxTtl : undefined;
|
|
52
52
|
resourceInputs["name"] = state ? state.name : undefined;
|
|
53
|
+
resourceInputs["namespace"] = state ? state.namespace : undefined;
|
|
53
54
|
resourceInputs["serviceAccountNames"] = state ? state.serviceAccountNames : undefined;
|
|
54
55
|
resourceInputs["ttl"] = state ? state.ttl : undefined;
|
|
55
56
|
}
|
|
@@ -65,6 +66,7 @@ class SecretLibrary extends pulumi.CustomResource {
|
|
|
65
66
|
resourceInputs["disableCheckInEnforcement"] = args ? args.disableCheckInEnforcement : undefined;
|
|
66
67
|
resourceInputs["maxTtl"] = args ? args.maxTtl : undefined;
|
|
67
68
|
resourceInputs["name"] = args ? args.name : undefined;
|
|
69
|
+
resourceInputs["namespace"] = args ? args.namespace : undefined;
|
|
68
70
|
resourceInputs["serviceAccountNames"] = args ? args.serviceAccountNames : undefined;
|
|
69
71
|
resourceInputs["ttl"] = args ? args.ttl : undefined;
|
|
70
72
|
}
|
package/ad/secretLibrary.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretLibrary.js","sourceRoot":"","sources":["../../ad/secretLibrary.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAkCG;AACH,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;
|
|
1
|
+
{"version":3,"file":"secretLibrary.js","sourceRoot":"","sources":["../../ad/secretLibrary.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAkCG;AACH,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;IAwEpD,YAAY,IAAY,EAAE,WAAoD,EAAE,IAAmC;QAC/G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA6C,CAAC;YAC5D,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,2BAA2B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,yBAAyB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClG,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACzD;aAAM;YACH,MAAM,IAAI,GAAG,WAA4C,CAAC;YAC1D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,mBAAmB,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAChE,MAAM,IAAI,KAAK,CAAC,iDAAiD,CAAC,CAAC;aACtE;YACD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,2BAA2B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,yBAAyB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACvD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAClE,CAAC;IArGD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA0B,EAAE,IAAmC;QACxH,OAAO,IAAI,aAAa,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACpE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,aAAa,CAAC,YAAY,CAAC;IAC9D,CAAC;;AA1BL,sCAuGC;AAzFG,gBAAgB;AACO,0BAAY,GAAG,sCAAsC,CAAC"}
|
package/ad/secretRole.d.ts
CHANGED
|
@@ -55,6 +55,13 @@ export declare class SecretRole extends pulumi.CustomResource {
|
|
|
55
55
|
* Timestamp of the last password rotation by Vault.
|
|
56
56
|
*/
|
|
57
57
|
readonly lastVaultRotation: pulumi.Output<string>;
|
|
58
|
+
/**
|
|
59
|
+
* The namespace to provision the resource in.
|
|
60
|
+
* The value should not contain leading or trailing forward slashes.
|
|
61
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
62
|
+
* *Available only for Vault Enterprise*.
|
|
63
|
+
*/
|
|
64
|
+
readonly namespace: pulumi.Output<string | undefined>;
|
|
58
65
|
/**
|
|
59
66
|
* Timestamp of the last password set by Vault.
|
|
60
67
|
*/
|
|
@@ -96,6 +103,13 @@ export interface SecretRoleState {
|
|
|
96
103
|
* Timestamp of the last password rotation by Vault.
|
|
97
104
|
*/
|
|
98
105
|
lastVaultRotation?: pulumi.Input<string>;
|
|
106
|
+
/**
|
|
107
|
+
* The namespace to provision the resource in.
|
|
108
|
+
* The value should not contain leading or trailing forward slashes.
|
|
109
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
110
|
+
* *Available only for Vault Enterprise*.
|
|
111
|
+
*/
|
|
112
|
+
namespace?: pulumi.Input<string>;
|
|
99
113
|
/**
|
|
100
114
|
* Timestamp of the last password set by Vault.
|
|
101
115
|
*/
|
|
@@ -125,6 +139,13 @@ export interface SecretRoleArgs {
|
|
|
125
139
|
* with no leading or trailing `/`s.
|
|
126
140
|
*/
|
|
127
141
|
backend: pulumi.Input<string>;
|
|
142
|
+
/**
|
|
143
|
+
* The namespace to provision the resource in.
|
|
144
|
+
* The value should not contain leading or trailing forward slashes.
|
|
145
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
146
|
+
* *Available only for Vault Enterprise*.
|
|
147
|
+
*/
|
|
148
|
+
namespace?: pulumi.Input<string>;
|
|
128
149
|
/**
|
|
129
150
|
* The name to identify this role within the backend.
|
|
130
151
|
* Must be unique within the backend.
|
package/ad/secretRole.js
CHANGED
|
@@ -44,6 +44,7 @@ class SecretRole extends pulumi.CustomResource {
|
|
|
44
44
|
const state = argsOrState;
|
|
45
45
|
resourceInputs["backend"] = state ? state.backend : undefined;
|
|
46
46
|
resourceInputs["lastVaultRotation"] = state ? state.lastVaultRotation : undefined;
|
|
47
|
+
resourceInputs["namespace"] = state ? state.namespace : undefined;
|
|
47
48
|
resourceInputs["passwordLastSet"] = state ? state.passwordLastSet : undefined;
|
|
48
49
|
resourceInputs["role"] = state ? state.role : undefined;
|
|
49
50
|
resourceInputs["serviceAccountName"] = state ? state.serviceAccountName : undefined;
|
|
@@ -61,6 +62,7 @@ class SecretRole extends pulumi.CustomResource {
|
|
|
61
62
|
throw new Error("Missing required property 'serviceAccountName'");
|
|
62
63
|
}
|
|
63
64
|
resourceInputs["backend"] = args ? args.backend : undefined;
|
|
65
|
+
resourceInputs["namespace"] = args ? args.namespace : undefined;
|
|
64
66
|
resourceInputs["role"] = args ? args.role : undefined;
|
|
65
67
|
resourceInputs["serviceAccountName"] = args ? args.serviceAccountName : undefined;
|
|
66
68
|
resourceInputs["ttl"] = args ? args.ttl : undefined;
|
package/ad/secretRole.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretRole.js","sourceRoot":"","sources":["../../ad/secretRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA8BG;AACH,MAAa,UAAW,SAAQ,MAAM,CAAC,cAAc;
|
|
1
|
+
{"version":3,"file":"secretRole.js","sourceRoot":"","sources":["../../ad/secretRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA8BG;AACH,MAAa,UAAW,SAAQ,MAAM,CAAC,cAAc;IAwEjD,YAAY,IAAY,EAAE,WAA8C,EAAE,IAAmC;QACzG,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA0C,CAAC;YACzD,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACzD;aAAM;YACH,MAAM,IAAI,GAAG,WAAyC,CAAC;YACvD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,kBAAkB,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC/D,MAAM,IAAI,KAAK,CAAC,gDAAgD,CAAC,CAAC;aACrE;YACD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,cAAc,CAAC,mBAAmB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACxD,cAAc,CAAC,iBAAiB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACzD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,UAAU,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC/D,CAAC;IAxGD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAuB,EAAE,IAAmC;QACrH,OAAO,IAAI,UAAU,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACjE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,UAAU,CAAC,YAAY,CAAC;IAC3D,CAAC;;AA1BL,gCA0GC;AA5FG,gBAAgB;AACO,uBAAY,GAAG,gCAAgC,CAAC"}
|
|
@@ -52,6 +52,13 @@ export declare class AuthBackendRole extends pulumi.CustomResource {
|
|
|
52
52
|
* Defaults to `alicloud`
|
|
53
53
|
*/
|
|
54
54
|
readonly backend: pulumi.Output<string | undefined>;
|
|
55
|
+
/**
|
|
56
|
+
* The namespace to provision the resource in.
|
|
57
|
+
* The value should not contain leading or trailing forward slashes.
|
|
58
|
+
* The `namespace` is always relative to the provider's configured namespace.
|
|
59
|
+
* *Available only for Vault Enterprise*.
|
|
60
|
+
*/
|
|
61
|
+
readonly namespace: pulumi.Output<string | undefined>;
|
|
55
62
|
/**
|
|
56
63
|
* Name of the role. Must correspond with the name of
|
|
57
64
|
* the role reflected in the arn.
|
|
@@ -132,6 +139,13 @@ export interface AuthBackendRoleState {
|
|
|
132
139
|
* Defaults to `alicloud`
|
|
133
140
|
*/
|
|
134
141
|
backend?: pulumi.Input<string>;
|
|
142
|
+
/**
|
|
143
|
+
* The namespace to provision the resource in.
|
|
144
|
+
* The value should not contain leading or trailing forward slashes.
|
|
145
|
+
* The `namespace` is always relative to the provider's configured namespace.
|
|
146
|
+
* *Available only for Vault Enterprise*.
|
|
147
|
+
*/
|
|
148
|
+
namespace?: pulumi.Input<string>;
|
|
135
149
|
/**
|
|
136
150
|
* Name of the role. Must correspond with the name of
|
|
137
151
|
* the role reflected in the arn.
|
|
@@ -204,6 +218,13 @@ export interface AuthBackendRoleArgs {
|
|
|
204
218
|
* Defaults to `alicloud`
|
|
205
219
|
*/
|
|
206
220
|
backend?: pulumi.Input<string>;
|
|
221
|
+
/**
|
|
222
|
+
* The namespace to provision the resource in.
|
|
223
|
+
* The value should not contain leading or trailing forward slashes.
|
|
224
|
+
* The `namespace` is always relative to the provider's configured namespace.
|
|
225
|
+
* *Available only for Vault Enterprise*.
|
|
226
|
+
*/
|
|
227
|
+
namespace?: pulumi.Input<string>;
|
|
207
228
|
/**
|
|
208
229
|
* Name of the role. Must correspond with the name of
|
|
209
230
|
* the role reflected in the arn.
|
|
@@ -41,6 +41,7 @@ class AuthBackendRole extends pulumi.CustomResource {
|
|
|
41
41
|
const state = argsOrState;
|
|
42
42
|
resourceInputs["arn"] = state ? state.arn : undefined;
|
|
43
43
|
resourceInputs["backend"] = state ? state.backend : undefined;
|
|
44
|
+
resourceInputs["namespace"] = state ? state.namespace : undefined;
|
|
44
45
|
resourceInputs["role"] = state ? state.role : undefined;
|
|
45
46
|
resourceInputs["tokenBoundCidrs"] = state ? state.tokenBoundCidrs : undefined;
|
|
46
47
|
resourceInputs["tokenExplicitMaxTtl"] = state ? state.tokenExplicitMaxTtl : undefined;
|
|
@@ -62,6 +63,7 @@ class AuthBackendRole extends pulumi.CustomResource {
|
|
|
62
63
|
}
|
|
63
64
|
resourceInputs["arn"] = args ? args.arn : undefined;
|
|
64
65
|
resourceInputs["backend"] = args ? args.backend : undefined;
|
|
66
|
+
resourceInputs["namespace"] = args ? args.namespace : undefined;
|
|
65
67
|
resourceInputs["role"] = args ? args.role : undefined;
|
|
66
68
|
resourceInputs["tokenBoundCidrs"] = args ? args.tokenBoundCidrs : undefined;
|
|
67
69
|
resourceInputs["tokenExplicitMaxTtl"] = args ? args.tokenExplicitMaxTtl : undefined;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"authBackendRole.js","sourceRoot":"","sources":["../../alicloud/authBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2BG;AACH,MAAa,eAAgB,SAAQ,MAAM,CAAC,cAAc;
|
|
1
|
+
{"version":3,"file":"authBackendRole.js","sourceRoot":"","sources":["../../alicloud/authBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2BG;AACH,MAAa,eAAgB,SAAQ,MAAM,CAAC,cAAc;IA+GtD,YAAY,IAAY,EAAE,WAAwD,EAAE,IAAmC;QACnH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA+C,CAAC;YAC9D,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;SACrE;aAAM;YACH,MAAM,IAAI,GAAG,WAA8C,CAAC;YAC5D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,GAAG,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAChD,MAAM,IAAI,KAAK,CAAC,iCAAiC,CAAC,CAAC;aACtD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;SACnE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,eAAe,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACpE,CAAC;IAxJD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA4B,EAAE,IAAmC;QAC1H,OAAO,IAAI,eAAe,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACtE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,eAAe,CAAC,YAAY,CAAC;IAChE,CAAC;;AA1BL,0CA0JC;AA5IG,gBAAgB;AACO,4BAAY,GAAG,gDAAgD,CAAC"}
|
package/alicloud/index.d.ts
CHANGED
|
@@ -1 +1,3 @@
|
|
|
1
|
-
export
|
|
1
|
+
export { AuthBackendRoleArgs, AuthBackendRoleState } from "./authBackendRole";
|
|
2
|
+
export declare type AuthBackendRole = import("./authBackendRole").AuthBackendRole;
|
|
3
|
+
export declare const AuthBackendRole: typeof import("./authBackendRole").AuthBackendRole;
|
package/alicloud/index.js
CHANGED
|
@@ -1,33 +1,18 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
3
|
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
-
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
5
|
-
if (k2 === undefined) k2 = k;
|
|
6
|
-
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
7
|
-
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
8
|
-
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
9
|
-
}
|
|
10
|
-
Object.defineProperty(o, k2, desc);
|
|
11
|
-
}) : (function(o, m, k, k2) {
|
|
12
|
-
if (k2 === undefined) k2 = k;
|
|
13
|
-
o[k2] = m[k];
|
|
14
|
-
}));
|
|
15
|
-
var __exportStar = (this && this.__exportStar) || function(m, exports) {
|
|
16
|
-
for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
|
|
17
|
-
};
|
|
18
4
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.AuthBackendRole = void 0;
|
|
19
6
|
const pulumi = require("@pulumi/pulumi");
|
|
20
7
|
const utilities = require("../utilities");
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
// Import resources to register:
|
|
24
|
-
const authBackendRole_1 = require("./authBackendRole");
|
|
8
|
+
exports.AuthBackendRole = null;
|
|
9
|
+
utilities.lazyLoad(exports, ["AuthBackendRole"], () => require("./authBackendRole"));
|
|
25
10
|
const _module = {
|
|
26
11
|
version: utilities.getVersion(),
|
|
27
12
|
construct: (name, type, urn) => {
|
|
28
13
|
switch (type) {
|
|
29
14
|
case "vault:alicloud/authBackendRole:AuthBackendRole":
|
|
30
|
-
return new
|
|
15
|
+
return new exports.AuthBackendRole(name, undefined, { urn });
|
|
31
16
|
default:
|
|
32
17
|
throw new Error(`unknown resource type ${type}`);
|
|
33
18
|
}
|
package/alicloud/index.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../alicloud/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../alicloud/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAK7B,QAAA,eAAe,GAAuD,IAAW,CAAC;AAE/F,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,iBAAiB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,mBAAmB,CAAC,CAAC,CAAC;AAErF,MAAM,OAAO,GAAG;IACZ,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE;IAC/B,SAAS,EAAE,CAAC,IAAY,EAAE,IAAY,EAAE,GAAW,EAAmB,EAAE;QACpE,QAAQ,IAAI,EAAE;YACV,KAAK,gDAAgD;gBACjD,OAAO,IAAI,uBAAe,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC7D;gBACI,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,EAAE,CAAC,CAAC;SACxD;IACL,CAAC;CACJ,CAAC;AACF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,0BAA0B,EAAE,OAAO,CAAC,CAAA"}
|