@pulumi/vault 5.6.0 → 5.7.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/ad/getAccessCredentials.d.ts +15 -0
- package/ad/getAccessCredentials.js +1 -0
- package/ad/getAccessCredentials.js.map +1 -1
- package/ad/index.d.ts +12 -4
- package/ad/index.js +13 -26
- package/ad/index.js.map +1 -1
- package/ad/secretBackend.d.ts +39 -0
- package/ad/secretBackend.js +9 -3
- package/ad/secretBackend.js.map +1 -1
- package/ad/secretLibrary.d.ts +21 -0
- package/ad/secretLibrary.js +2 -0
- package/ad/secretLibrary.js.map +1 -1
- package/ad/secretRole.d.ts +21 -0
- package/ad/secretRole.js +2 -0
- package/ad/secretRole.js.map +1 -1
- package/alicloud/authBackendRole.d.ts +21 -0
- package/alicloud/authBackendRole.js +2 -0
- package/alicloud/authBackendRole.js.map +1 -1
- package/alicloud/index.d.ts +3 -1
- package/alicloud/index.js +4 -19
- package/alicloud/index.js.map +1 -1
- package/approle/authBackendLogin.d.ts +22 -1
- package/approle/authBackendLogin.js +3 -1
- package/approle/authBackendLogin.js.map +1 -1
- package/approle/authBackendRole.d.ts +21 -0
- package/approle/authBackendRole.js +2 -0
- package/approle/authBackendRole.js.map +1 -1
- package/approle/{authBackendRoleSecretID.d.ts → authBackendRoleSecretId.d.ts} +33 -12
- package/approle/{authBackendRoleSecretID.js → authBackendRoleSecretId.js} +16 -12
- package/approle/authBackendRoleSecretId.js.map +1 -0
- package/approle/getAuthBackendRoleId.d.ts +15 -0
- package/approle/getAuthBackendRoleId.js +1 -0
- package/approle/getAuthBackendRoleId.js.map +1 -1
- package/approle/index.d.ts +12 -4
- package/approle/index.js +15 -28
- package/approle/index.js.map +1 -1
- package/audit.d.ts +21 -0
- package/audit.js +2 -0
- package/audit.js.map +1 -1
- package/authBackend.d.ts +47 -10
- package/authBackend.js +4 -0
- package/authBackend.js.map +1 -1
- package/aws/authBackendCert.d.ts +21 -0
- package/aws/authBackendCert.js +2 -0
- package/aws/authBackendCert.js.map +1 -1
- package/aws/authBackendClient.d.ts +21 -0
- package/aws/authBackendClient.js +6 -2
- package/aws/authBackendClient.js.map +1 -1
- package/aws/authBackendIdentityWhitelist.d.ts +21 -0
- package/aws/authBackendIdentityWhitelist.js +2 -0
- package/aws/authBackendIdentityWhitelist.js.map +1 -1
- package/aws/authBackendLogin.d.ts +21 -0
- package/aws/authBackendLogin.js +4 -0
- package/aws/authBackendLogin.js.map +1 -1
- package/aws/authBackendRole.d.ts +21 -0
- package/aws/authBackendRole.js +2 -0
- package/aws/authBackendRole.js.map +1 -1
- package/aws/authBackendRoleTag.d.ts +21 -0
- package/aws/authBackendRoleTag.js +2 -0
- package/aws/authBackendRoleTag.js.map +1 -1
- package/aws/authBackendRoletagBlacklist.d.ts +21 -0
- package/aws/authBackendRoletagBlacklist.js +2 -0
- package/aws/authBackendRoletagBlacklist.js.map +1 -1
- package/aws/authBackendStsRole.d.ts +21 -0
- package/aws/authBackendStsRole.js +2 -0
- package/aws/authBackendStsRole.js.map +1 -1
- package/aws/getAccessCredentials.d.ts +15 -0
- package/aws/getAccessCredentials.js +1 -0
- package/aws/getAccessCredentials.js.map +1 -1
- package/aws/index.d.ts +33 -11
- package/aws/index.js +34 -47
- package/aws/index.js.map +1 -1
- package/aws/secretBackend.d.ts +36 -12
- package/aws/secretBackend.js +8 -14
- package/aws/secretBackend.js.map +1 -1
- package/aws/secretBackendRole.d.ts +21 -0
- package/aws/secretBackendRole.js +2 -0
- package/aws/secretBackendRole.js.map +1 -1
- package/azure/authBackendConfig.d.ts +21 -0
- package/azure/authBackendConfig.js +7 -3
- package/azure/authBackendConfig.js.map +1 -1
- package/azure/authBackendRole.d.ts +21 -0
- package/azure/authBackendRole.js +2 -0
- package/azure/authBackendRole.js.map +1 -1
- package/azure/backend.d.ts +36 -0
- package/azure/backend.js +10 -4
- package/azure/backend.js.map +1 -1
- package/azure/backendRole.d.ts +23 -1
- package/azure/backendRole.js +2 -0
- package/azure/backendRole.js.map +1 -1
- package/azure/getAccessCredentials.d.ts +15 -0
- package/azure/getAccessCredentials.js +1 -0
- package/azure/getAccessCredentials.js.map +1 -1
- package/azure/index.d.ts +15 -5
- package/azure/index.js +16 -29
- package/azure/index.js.map +1 -1
- package/certAuthBackendRole.d.ts +39 -3
- package/certAuthBackendRole.js +4 -0
- package/certAuthBackendRole.js.map +1 -1
- package/config/vars.d.ts +43 -3
- package/config/vars.js +64 -4
- package/config/vars.js.map +1 -1
- package/consul/index.d.ts +6 -2
- package/consul/index.js +7 -22
- package/consul/index.js.map +1 -1
- package/consul/secretBackend.d.ts +87 -15
- package/consul/secretBackend.js +24 -7
- package/consul/secretBackend.js.map +1 -1
- package/consul/secretBackendRole.d.ts +93 -10
- package/consul/secretBackendRole.js +14 -1
- package/consul/secretBackendRole.js.map +1 -1
- package/database/index.d.ts +12 -4
- package/database/index.js +13 -28
- package/database/index.js.map +1 -1
- package/database/secretBackendConnection.d.ts +35 -1
- package/database/secretBackendConnection.js +4 -0
- package/database/secretBackendConnection.js.map +1 -1
- package/database/secretBackendRole.d.ts +21 -0
- package/database/secretBackendRole.js +2 -0
- package/database/secretBackendRole.js.map +1 -1
- package/database/secretBackendStaticRole.d.ts +21 -0
- package/database/secretBackendStaticRole.js +2 -0
- package/database/secretBackendStaticRole.js.map +1 -1
- package/database/secretsMount.d.ts +41 -1
- package/database/secretsMount.js +6 -0
- package/database/secretsMount.js.map +1 -1
- package/egpPolicy.d.ts +21 -0
- package/egpPolicy.js +2 -0
- package/egpPolicy.js.map +1 -1
- package/gcp/authBackend.d.ts +71 -1
- package/gcp/authBackend.js +18 -2
- package/gcp/authBackend.js.map +1 -1
- package/gcp/authBackendRole.d.ts +21 -0
- package/gcp/authBackendRole.js +2 -0
- package/gcp/authBackendRole.js.map +1 -1
- package/gcp/getAuthBackendRole.d.ts +15 -0
- package/gcp/getAuthBackendRole.js +1 -0
- package/gcp/getAuthBackendRole.js.map +1 -1
- package/gcp/index.d.ts +18 -6
- package/gcp/index.js +19 -32
- package/gcp/index.js.map +1 -1
- package/gcp/secretBackend.d.ts +36 -0
- package/gcp/secretBackend.js +7 -1
- package/gcp/secretBackend.js.map +1 -1
- package/gcp/secretRoleset.d.ts +23 -1
- package/gcp/secretRoleset.js +2 -0
- package/gcp/secretRoleset.js.map +1 -1
- package/gcp/secretStaticAccount.d.ts +23 -1
- package/gcp/secretStaticAccount.js +2 -0
- package/gcp/secretStaticAccount.js.map +1 -1
- package/generic/endpoint.d.ts +21 -0
- package/generic/endpoint.js +5 -1
- package/generic/endpoint.js.map +1 -1
- package/generic/getSecret.d.ts +15 -0
- package/generic/getSecret.js +1 -0
- package/generic/getSecret.js.map +1 -1
- package/generic/index.d.ts +9 -3
- package/generic/index.js +10 -23
- package/generic/index.js.map +1 -1
- package/generic/secret.d.ts +21 -0
- package/generic/secret.js +5 -1
- package/generic/secret.js.map +1 -1
- package/getAuthBackend.d.ts +16 -1
- package/getAuthBackend.js +1 -0
- package/getAuthBackend.js.map +1 -1
- package/getNomadAccessToken.d.ts +15 -0
- package/getNomadAccessToken.js +1 -0
- package/getNomadAccessToken.js.map +1 -1
- package/getPolicyDocument.d.ts +5 -1
- package/getPolicyDocument.js +1 -0
- package/getPolicyDocument.js.map +1 -1
- package/github/authBackend.d.ts +38 -1
- package/github/authBackend.js +4 -0
- package/github/authBackend.js.map +1 -1
- package/github/index.d.ts +9 -3
- package/github/index.js +10 -25
- package/github/index.js.map +1 -1
- package/github/team.d.ts +21 -0
- package/github/team.js +2 -0
- package/github/team.js.map +1 -1
- package/github/user.d.ts +21 -0
- package/github/user.js +2 -0
- package/github/user.js.map +1 -1
- package/identity/entity.d.ts +21 -0
- package/identity/entity.js +2 -0
- package/identity/entity.js.map +1 -1
- package/identity/entityAlias.d.ts +21 -0
- package/identity/entityAlias.js +2 -0
- package/identity/entityAlias.js.map +1 -1
- package/identity/entityPolicies.d.ts +21 -0
- package/identity/entityPolicies.js +2 -0
- package/identity/entityPolicies.js.map +1 -1
- package/identity/getEntity.d.ts +16 -1
- package/identity/getEntity.js +1 -0
- package/identity/getEntity.js.map +1 -1
- package/identity/getGroup.d.ts +15 -0
- package/identity/getGroup.js +1 -0
- package/identity/getGroup.js.map +1 -1
- package/identity/getOidcClientCreds.d.ts +15 -0
- package/identity/getOidcClientCreds.js +1 -0
- package/identity/getOidcClientCreds.js.map +1 -1
- package/identity/getOidcOpenidConfig.d.ts +15 -0
- package/identity/getOidcOpenidConfig.js +1 -0
- package/identity/getOidcOpenidConfig.js.map +1 -1
- package/identity/getOidcPublicKeys.d.ts +15 -0
- package/identity/getOidcPublicKeys.js +1 -0
- package/identity/getOidcPublicKeys.js.map +1 -1
- package/identity/group.d.ts +21 -0
- package/identity/group.js +2 -0
- package/identity/group.js.map +1 -1
- package/identity/groupAlias.d.ts +21 -0
- package/identity/groupAlias.js +2 -0
- package/identity/groupAlias.js.map +1 -1
- package/identity/groupMemberEntityIds.d.ts +21 -0
- package/identity/groupMemberEntityIds.js +2 -0
- package/identity/groupMemberEntityIds.js.map +1 -1
- package/identity/groupPolicies.d.ts +21 -0
- package/identity/groupPolicies.js +2 -0
- package/identity/groupPolicies.js.map +1 -1
- package/identity/index.d.ts +75 -20
- package/identity/index.js +86 -66
- package/identity/index.js.map +1 -1
- package/identity/mfaDuo.d.ts +200 -0
- package/identity/mfaDuo.js +110 -0
- package/identity/mfaDuo.js.map +1 -0
- package/identity/mfaLoginEnforcement.d.ts +170 -0
- package/identity/mfaLoginEnforcement.js +96 -0
- package/identity/mfaLoginEnforcement.js.map +1 -0
- package/identity/mfaOkta.d.ts +188 -0
- package/identity/mfaOkta.js +105 -0
- package/identity/mfaOkta.js.map +1 -0
- package/identity/mfaPingid.d.ts +190 -0
- package/identity/mfaPingid.js +102 -0
- package/identity/mfaPingid.js.map +1 -0
- package/identity/mfaTotp.d.ts +218 -0
- package/identity/mfaTotp.js +104 -0
- package/identity/mfaTotp.js.map +1 -0
- package/identity/oidc.d.ts +21 -0
- package/identity/oidc.js +2 -0
- package/identity/oidc.js.map +1 -1
- package/identity/oidcAssignment.d.ts +23 -2
- package/identity/oidcAssignment.js +4 -2
- package/identity/oidcAssignment.js.map +1 -1
- package/identity/oidcClient.d.ts +21 -0
- package/identity/oidcClient.js +4 -0
- package/identity/oidcClient.js.map +1 -1
- package/identity/oidcKey.d.ts +21 -0
- package/identity/oidcKey.js +2 -0
- package/identity/oidcKey.js.map +1 -1
- package/identity/oidcKeyAllowedClientID.d.ts +21 -0
- package/identity/oidcKeyAllowedClientID.js +2 -0
- package/identity/oidcKeyAllowedClientID.js.map +1 -1
- package/identity/oidcProvider.d.ts +21 -0
- package/identity/oidcProvider.js +2 -0
- package/identity/oidcProvider.js.map +1 -1
- package/identity/oidcRole.d.ts +21 -0
- package/identity/oidcRole.js +2 -0
- package/identity/oidcRole.js.map +1 -1
- package/identity/oidcScope.d.ts +22 -3
- package/identity/oidcScope.js +3 -3
- package/identity/oidcScope.js.map +1 -1
- package/index.d.ts +75 -25
- package/index.js +78 -83
- package/index.js.map +1 -1
- package/jwt/authBackend.d.ts +38 -1
- package/jwt/authBackend.js +7 -1
- package/jwt/authBackend.js.map +1 -1
- package/jwt/authBackendRole.d.ts +57 -0
- package/jwt/authBackendRole.js +6 -0
- package/jwt/authBackendRole.js.map +1 -1
- package/jwt/index.d.ts +6 -2
- package/jwt/index.js +7 -22
- package/jwt/index.js.map +1 -1
- package/kmip/index.d.ts +9 -3
- package/kmip/index.js +10 -25
- package/kmip/index.js.map +1 -1
- package/kmip/secretBackend.d.ts +36 -0
- package/kmip/secretBackend.js +4 -0
- package/kmip/secretBackend.js.map +1 -1
- package/kmip/secretRole.d.ts +21 -0
- package/kmip/secretRole.js +2 -0
- package/kmip/secretRole.js.map +1 -1
- package/kmip/secretScope.d.ts +21 -0
- package/kmip/secretScope.js +2 -0
- package/kmip/secretScope.js.map +1 -1
- package/kubernetes/authBackendConfig.d.ts +21 -0
- package/kubernetes/authBackendConfig.js +5 -1
- package/kubernetes/authBackendConfig.js.map +1 -1
- package/kubernetes/authBackendRole.d.ts +21 -0
- package/kubernetes/authBackendRole.js +2 -0
- package/kubernetes/authBackendRole.js.map +1 -1
- package/kubernetes/getAuthBackendConfig.d.ts +15 -0
- package/kubernetes/getAuthBackendConfig.js +1 -0
- package/kubernetes/getAuthBackendConfig.js.map +1 -1
- package/kubernetes/getAuthBackendRole.d.ts +15 -0
- package/kubernetes/getAuthBackendRole.js +1 -0
- package/kubernetes/getAuthBackendRole.js.map +1 -1
- package/kubernetes/getServiceAccountToken.d.ts +156 -0
- package/kubernetes/getServiceAccountToken.js +67 -0
- package/kubernetes/getServiceAccountToken.js.map +1 -0
- package/kubernetes/index.d.ts +21 -4
- package/kubernetes/index.js +26 -24
- package/kubernetes/index.js.map +1 -1
- package/kubernetes/secretBackend.d.ts +303 -0
- package/kubernetes/secretBackend.js +114 -0
- package/kubernetes/secretBackend.js.map +1 -0
- package/kubernetes/secretBackendRole.d.ts +367 -0
- package/kubernetes/secretBackendRole.js +191 -0
- package/kubernetes/secretBackendRole.js.map +1 -0
- package/kv/getSecret.d.ts +104 -0
- package/kv/getSecret.js +53 -0
- package/kv/getSecret.js.map +1 -0
- package/kv/getSecretSubkeysV2.d.ts +132 -0
- package/kv/getSecretSubkeysV2.js +57 -0
- package/kv/getSecretSubkeysV2.js.map +1 -0
- package/kv/getSecretV2.d.ts +139 -0
- package/kv/getSecretV2.js +58 -0
- package/kv/getSecretV2.js.map +1 -0
- package/kv/getSecretsList.d.ts +85 -0
- package/kv/getSecretsList.js +58 -0
- package/kv/getSecretsList.js.map +1 -0
- package/kv/getSecretsListV2.d.ts +114 -0
- package/kv/getSecretsListV2.js +69 -0
- package/kv/getSecretsListV2.js.map +1 -0
- package/kv/index.d.ts +24 -0
- package/kv/index.js +47 -0
- package/kv/index.js.map +1 -0
- package/kv/secret.d.ts +145 -0
- package/kv/secret.js +106 -0
- package/kv/secret.js.map +1 -0
- package/kv/secretBackendV2.d.ts +154 -0
- package/kv/secretBackendV2.js +103 -0
- package/kv/secretBackendV2.js.map +1 -0
- package/kv/secretV2.d.ts +257 -0
- package/kv/secretV2.js +122 -0
- package/kv/secretV2.js.map +1 -0
- package/ldap/authBackend.d.ts +48 -0
- package/ldap/authBackend.js +10 -2
- package/ldap/authBackend.js.map +1 -1
- package/ldap/authBackendGroup.d.ts +21 -0
- package/ldap/authBackendGroup.js +2 -0
- package/ldap/authBackendGroup.js.map +1 -1
- package/ldap/authBackendUser.d.ts +21 -0
- package/ldap/authBackendUser.js +2 -0
- package/ldap/authBackendUser.js.map +1 -1
- package/ldap/index.d.ts +9 -3
- package/ldap/index.js +10 -25
- package/ldap/index.js.map +1 -1
- package/managed/index.d.ts +3 -0
- package/managed/index.js +22 -0
- package/managed/index.js.map +1 -0
- package/managed/keys.d.ts +104 -0
- package/managed/keys.js +64 -0
- package/managed/keys.js.map +1 -0
- package/mfaDuo.d.ts +21 -0
- package/mfaDuo.js +6 -2
- package/mfaDuo.js.map +1 -1
- package/mfaOkta.d.ts +21 -0
- package/mfaOkta.js +5 -1
- package/mfaOkta.js.map +1 -1
- package/mfaPingid.d.ts +21 -0
- package/mfaPingid.js +2 -0
- package/mfaPingid.js.map +1 -1
- package/mfaTotp.d.ts +21 -0
- package/mfaTotp.js +2 -0
- package/mfaTotp.js.map +1 -1
- package/mount.d.ts +33 -0
- package/mount.js +4 -0
- package/mount.js.map +1 -1
- package/namespace.d.ts +32 -18
- package/namespace.js +5 -16
- package/namespace.js.map +1 -1
- package/nomadSecretBackend.d.ts +36 -0
- package/nomadSecretBackend.js +9 -3
- package/nomadSecretBackend.js.map +1 -1
- package/nomadSecretRole.d.ts +21 -0
- package/nomadSecretRole.js +2 -0
- package/nomadSecretRole.js.map +1 -1
- package/okta/authBackend.d.ts +38 -1
- package/okta/authBackend.js +7 -1
- package/okta/authBackend.js.map +1 -1
- package/okta/authBackendGroup.d.ts +21 -0
- package/okta/authBackendGroup.js +2 -0
- package/okta/authBackendGroup.js.map +1 -1
- package/okta/authBackendUser.d.ts +21 -0
- package/okta/authBackendUser.js +2 -0
- package/okta/authBackendUser.js.map +1 -1
- package/okta/index.d.ts +9 -3
- package/okta/index.js +10 -25
- package/okta/index.js.map +1 -1
- package/package.json +2 -2
- package/package.json.dev +2 -2
- package/passwordPolicy.d.ts +21 -0
- package/passwordPolicy.js +2 -0
- package/passwordPolicy.js.map +1 -1
- package/pkisecret/index.d.ts +30 -10
- package/pkisecret/index.js +31 -46
- package/pkisecret/index.js.map +1 -1
- package/pkisecret/secretBackendCert.d.ts +29 -0
- package/pkisecret/secretBackendCert.js +6 -0
- package/pkisecret/secretBackendCert.js.map +1 -1
- package/pkisecret/secretBackendConfigCa.d.ts +21 -0
- package/pkisecret/secretBackendConfigCa.js +5 -1
- package/pkisecret/secretBackendConfigCa.js.map +1 -1
- package/pkisecret/secretBackendConfigUrls.d.ts +21 -0
- package/pkisecret/secretBackendConfigUrls.js +2 -0
- package/pkisecret/secretBackendConfigUrls.js.map +1 -1
- package/pkisecret/secretBackendCrlConfig.d.ts +21 -0
- package/pkisecret/secretBackendCrlConfig.js +2 -0
- package/pkisecret/secretBackendCrlConfig.js.map +1 -1
- package/pkisecret/secretBackendIntermediateCertRequest.d.ts +54 -0
- package/pkisecret/secretBackendIntermediateCertRequest.js +8 -0
- package/pkisecret/secretBackendIntermediateCertRequest.js.map +1 -1
- package/pkisecret/secretBackendIntermediateSetSigned.d.ts +21 -0
- package/pkisecret/secretBackendIntermediateSetSigned.js +2 -0
- package/pkisecret/secretBackendIntermediateSetSigned.js.map +1 -1
- package/pkisecret/secretBackendRole.d.ts +24 -3
- package/pkisecret/secretBackendRole.js +2 -0
- package/pkisecret/secretBackendRole.js.map +1 -1
- package/pkisecret/secretBackendRootCert.d.ts +57 -3
- package/pkisecret/secretBackendRootCert.js +6 -0
- package/pkisecret/secretBackendRootCert.js.map +1 -1
- package/pkisecret/secretBackendRootSignIntermediate.d.ts +21 -0
- package/pkisecret/secretBackendRootSignIntermediate.js +2 -0
- package/pkisecret/secretBackendRootSignIntermediate.js.map +1 -1
- package/pkisecret/secretBackendSign.d.ts +29 -0
- package/pkisecret/secretBackendSign.js +4 -0
- package/pkisecret/secretBackendSign.js.map +1 -1
- package/policy.d.ts +21 -0
- package/policy.js +2 -0
- package/policy.js.map +1 -1
- package/provider.d.ts +43 -3
- package/provider.js +12 -2
- package/provider.js.map +1 -1
- package/quotaLeaseCount.d.ts +21 -0
- package/quotaLeaseCount.js +2 -0
- package/quotaLeaseCount.js.map +1 -1
- package/quotaRateLimit.d.ts +48 -0
- package/quotaRateLimit.js +6 -0
- package/quotaRateLimit.js.map +1 -1
- package/rabbitmq/index.d.ts +6 -2
- package/rabbitmq/index.js +7 -22
- package/rabbitmq/index.js.map +1 -1
- package/rabbitmq/secretBackend.d.ts +36 -0
- package/rabbitmq/secretBackend.js +8 -2
- package/rabbitmq/secretBackend.js.map +1 -1
- package/rabbitmq/secretBackendRole.d.ts +23 -1
- package/rabbitmq/secretBackendRole.js +2 -0
- package/rabbitmq/secretBackendRole.js.map +1 -1
- package/raftAutopilot.d.ts +21 -0
- package/raftAutopilot.js +2 -0
- package/raftAutopilot.js.map +1 -1
- package/raftSnapshotAgentConfig.d.ts +62 -0
- package/raftSnapshotAgentConfig.js +43 -0
- package/raftSnapshotAgentConfig.js.map +1 -1
- package/rgpPolicy.d.ts +21 -0
- package/rgpPolicy.js +2 -0
- package/rgpPolicy.js.map +1 -1
- package/ssh/index.d.ts +6 -2
- package/ssh/index.js +7 -22
- package/ssh/index.js.map +1 -1
- package/ssh/secretBackendCa.d.ts +29 -0
- package/ssh/secretBackendCa.js +13 -1
- package/ssh/secretBackendCa.js.map +1 -1
- package/ssh/secretBackendRole.d.ts +23 -1
- package/ssh/secretBackendRole.js +2 -0
- package/ssh/secretBackendRole.js.map +1 -1
- package/terraformcloud/index.d.ts +9 -3
- package/terraformcloud/index.js +10 -25
- package/terraformcloud/index.js.map +1 -1
- package/terraformcloud/secretBackend.d.ts +36 -0
- package/terraformcloud/secretBackend.js +7 -1
- package/terraformcloud/secretBackend.js.map +1 -1
- package/terraformcloud/secretCreds.d.ts +21 -0
- package/terraformcloud/secretCreds.js +4 -0
- package/terraformcloud/secretCreds.js.map +1 -1
- package/terraformcloud/secretRole.d.ts +21 -0
- package/terraformcloud/secretRole.js +2 -0
- package/terraformcloud/secretRole.js.map +1 -1
- package/token.d.ts +42 -0
- package/token.js +9 -0
- package/token.js.map +1 -1
- package/tokenauth/authBackendRole.d.ts +21 -0
- package/tokenauth/authBackendRole.js +2 -0
- package/tokenauth/authBackendRole.js.map +1 -1
- package/tokenauth/index.d.ts +3 -1
- package/tokenauth/index.js +4 -19
- package/tokenauth/index.js.map +1 -1
- package/transform/index.d.ts +18 -6
- package/transform/index.js +19 -30
- package/transform/index.js.map +1 -1
- package/transform/transformation.d.ts +0 -25
- package/transform/transformation.js +0 -25
- package/transform/transformation.js.map +1 -1
- package/transit/getDecrypt.d.ts +3 -0
- package/transit/getDecrypt.js +1 -0
- package/transit/getDecrypt.js.map +1 -1
- package/transit/getEncrypt.d.ts +3 -0
- package/transit/getEncrypt.js +1 -0
- package/transit/getEncrypt.js.map +1 -1
- package/transit/index.d.ts +12 -4
- package/transit/index.js +13 -24
- package/transit/index.js.map +1 -1
- package/transit/secretBackendKey.d.ts +21 -0
- package/transit/secretBackendKey.js +2 -0
- package/transit/secretBackendKey.js.map +1 -1
- package/transit/secretCacheConfig.d.ts +21 -0
- package/transit/secretCacheConfig.js +2 -0
- package/transit/secretCacheConfig.js.map +1 -1
- package/types/index.js.map +1 -1
- package/types/input.d.ts +408 -4
- package/types/output.d.ts +409 -5
- package/utilities.js +13 -1
- package/utilities.js.map +1 -1
- package/approle/authBackendRoleSecretID.js.map +0 -1
|
@@ -0,0 +1,200 @@
|
|
|
1
|
+
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
/**
|
|
3
|
+
* Resource for configuring the duo MFA method.
|
|
4
|
+
*
|
|
5
|
+
* ## Example Usage
|
|
6
|
+
*
|
|
7
|
+
* ```typescript
|
|
8
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
9
|
+
* import * as vault from "@pulumi/vault";
|
|
10
|
+
*
|
|
11
|
+
* const example = new vault.identity.MfaDuo("example", {
|
|
12
|
+
* apiHostname: "api-xxxxxxxx.duosecurity.com",
|
|
13
|
+
* integrationKey: "secret-int-key",
|
|
14
|
+
* secretKey: "secret-key",
|
|
15
|
+
* });
|
|
16
|
+
* ```
|
|
17
|
+
*
|
|
18
|
+
* ## Import
|
|
19
|
+
*
|
|
20
|
+
* Resource can be imported using its `uuid` field, e.g.
|
|
21
|
+
*
|
|
22
|
+
* ```sh
|
|
23
|
+
* $ pulumi import vault:identity/mfaDuo:MfaDuo example 0d89c36a-4ff5-4d70-8749-bb6a5598aeec
|
|
24
|
+
* ```
|
|
25
|
+
*/
|
|
26
|
+
export declare class MfaDuo extends pulumi.CustomResource {
|
|
27
|
+
/**
|
|
28
|
+
* Get an existing MfaDuo resource's state with the given name, ID, and optional extra
|
|
29
|
+
* properties used to qualify the lookup.
|
|
30
|
+
*
|
|
31
|
+
* @param name The _unique_ name of the resulting resource.
|
|
32
|
+
* @param id The _unique_ provider ID of the resource to lookup.
|
|
33
|
+
* @param state Any extra arguments used during the lookup.
|
|
34
|
+
* @param opts Optional settings to control the behavior of the CustomResource.
|
|
35
|
+
*/
|
|
36
|
+
static get(name: string, id: pulumi.Input<pulumi.ID>, state?: MfaDuoState, opts?: pulumi.CustomResourceOptions): MfaDuo;
|
|
37
|
+
/**
|
|
38
|
+
* Returns true if the given object is an instance of MfaDuo. This is designed to work even
|
|
39
|
+
* when multiple copies of the Pulumi SDK have been loaded into the same process.
|
|
40
|
+
*/
|
|
41
|
+
static isInstance(obj: any): obj is MfaDuo;
|
|
42
|
+
/**
|
|
43
|
+
* API hostname for Duo
|
|
44
|
+
*/
|
|
45
|
+
readonly apiHostname: pulumi.Output<string>;
|
|
46
|
+
/**
|
|
47
|
+
* Integration key for Duo
|
|
48
|
+
*/
|
|
49
|
+
readonly integrationKey: pulumi.Output<string>;
|
|
50
|
+
/**
|
|
51
|
+
* Method ID.
|
|
52
|
+
*/
|
|
53
|
+
readonly methodId: pulumi.Output<string>;
|
|
54
|
+
/**
|
|
55
|
+
* Mount accessor.
|
|
56
|
+
*/
|
|
57
|
+
readonly mountAccessor: pulumi.Output<string>;
|
|
58
|
+
/**
|
|
59
|
+
* Method name.
|
|
60
|
+
*/
|
|
61
|
+
readonly name: pulumi.Output<string>;
|
|
62
|
+
/**
|
|
63
|
+
* Target namespace. (requires Enterprise)
|
|
64
|
+
*/
|
|
65
|
+
readonly namespace: pulumi.Output<string | undefined>;
|
|
66
|
+
/**
|
|
67
|
+
* Method's namespace ID.
|
|
68
|
+
*/
|
|
69
|
+
readonly namespaceId: pulumi.Output<string>;
|
|
70
|
+
/**
|
|
71
|
+
* Method's namespace path.
|
|
72
|
+
*/
|
|
73
|
+
readonly namespacePath: pulumi.Output<string>;
|
|
74
|
+
/**
|
|
75
|
+
* Push information for Duo.
|
|
76
|
+
*/
|
|
77
|
+
readonly pushInfo: pulumi.Output<string | undefined>;
|
|
78
|
+
/**
|
|
79
|
+
* Secret key for Duo
|
|
80
|
+
*/
|
|
81
|
+
readonly secretKey: pulumi.Output<string>;
|
|
82
|
+
/**
|
|
83
|
+
* MFA type.
|
|
84
|
+
*/
|
|
85
|
+
readonly type: pulumi.Output<string>;
|
|
86
|
+
/**
|
|
87
|
+
* Require passcode upon MFA validation.
|
|
88
|
+
*/
|
|
89
|
+
readonly usePasscode: pulumi.Output<boolean | undefined>;
|
|
90
|
+
/**
|
|
91
|
+
* A template string for mapping Identity names to MFA methods.
|
|
92
|
+
*/
|
|
93
|
+
readonly usernameFormat: pulumi.Output<string | undefined>;
|
|
94
|
+
/**
|
|
95
|
+
* Resource UUID.
|
|
96
|
+
*/
|
|
97
|
+
readonly uuid: pulumi.Output<string>;
|
|
98
|
+
/**
|
|
99
|
+
* Create a MfaDuo resource with the given unique name, arguments, and options.
|
|
100
|
+
*
|
|
101
|
+
* @param name The _unique_ name of the resource.
|
|
102
|
+
* @param args The arguments to use to populate this resource's properties.
|
|
103
|
+
* @param opts A bag of options that control this resource's behavior.
|
|
104
|
+
*/
|
|
105
|
+
constructor(name: string, args: MfaDuoArgs, opts?: pulumi.CustomResourceOptions);
|
|
106
|
+
}
|
|
107
|
+
/**
|
|
108
|
+
* Input properties used for looking up and filtering MfaDuo resources.
|
|
109
|
+
*/
|
|
110
|
+
export interface MfaDuoState {
|
|
111
|
+
/**
|
|
112
|
+
* API hostname for Duo
|
|
113
|
+
*/
|
|
114
|
+
apiHostname?: pulumi.Input<string>;
|
|
115
|
+
/**
|
|
116
|
+
* Integration key for Duo
|
|
117
|
+
*/
|
|
118
|
+
integrationKey?: pulumi.Input<string>;
|
|
119
|
+
/**
|
|
120
|
+
* Method ID.
|
|
121
|
+
*/
|
|
122
|
+
methodId?: pulumi.Input<string>;
|
|
123
|
+
/**
|
|
124
|
+
* Mount accessor.
|
|
125
|
+
*/
|
|
126
|
+
mountAccessor?: pulumi.Input<string>;
|
|
127
|
+
/**
|
|
128
|
+
* Method name.
|
|
129
|
+
*/
|
|
130
|
+
name?: pulumi.Input<string>;
|
|
131
|
+
/**
|
|
132
|
+
* Target namespace. (requires Enterprise)
|
|
133
|
+
*/
|
|
134
|
+
namespace?: pulumi.Input<string>;
|
|
135
|
+
/**
|
|
136
|
+
* Method's namespace ID.
|
|
137
|
+
*/
|
|
138
|
+
namespaceId?: pulumi.Input<string>;
|
|
139
|
+
/**
|
|
140
|
+
* Method's namespace path.
|
|
141
|
+
*/
|
|
142
|
+
namespacePath?: pulumi.Input<string>;
|
|
143
|
+
/**
|
|
144
|
+
* Push information for Duo.
|
|
145
|
+
*/
|
|
146
|
+
pushInfo?: pulumi.Input<string>;
|
|
147
|
+
/**
|
|
148
|
+
* Secret key for Duo
|
|
149
|
+
*/
|
|
150
|
+
secretKey?: pulumi.Input<string>;
|
|
151
|
+
/**
|
|
152
|
+
* MFA type.
|
|
153
|
+
*/
|
|
154
|
+
type?: pulumi.Input<string>;
|
|
155
|
+
/**
|
|
156
|
+
* Require passcode upon MFA validation.
|
|
157
|
+
*/
|
|
158
|
+
usePasscode?: pulumi.Input<boolean>;
|
|
159
|
+
/**
|
|
160
|
+
* A template string for mapping Identity names to MFA methods.
|
|
161
|
+
*/
|
|
162
|
+
usernameFormat?: pulumi.Input<string>;
|
|
163
|
+
/**
|
|
164
|
+
* Resource UUID.
|
|
165
|
+
*/
|
|
166
|
+
uuid?: pulumi.Input<string>;
|
|
167
|
+
}
|
|
168
|
+
/**
|
|
169
|
+
* The set of arguments for constructing a MfaDuo resource.
|
|
170
|
+
*/
|
|
171
|
+
export interface MfaDuoArgs {
|
|
172
|
+
/**
|
|
173
|
+
* API hostname for Duo
|
|
174
|
+
*/
|
|
175
|
+
apiHostname: pulumi.Input<string>;
|
|
176
|
+
/**
|
|
177
|
+
* Integration key for Duo
|
|
178
|
+
*/
|
|
179
|
+
integrationKey: pulumi.Input<string>;
|
|
180
|
+
/**
|
|
181
|
+
* Target namespace. (requires Enterprise)
|
|
182
|
+
*/
|
|
183
|
+
namespace?: pulumi.Input<string>;
|
|
184
|
+
/**
|
|
185
|
+
* Push information for Duo.
|
|
186
|
+
*/
|
|
187
|
+
pushInfo?: pulumi.Input<string>;
|
|
188
|
+
/**
|
|
189
|
+
* Secret key for Duo
|
|
190
|
+
*/
|
|
191
|
+
secretKey: pulumi.Input<string>;
|
|
192
|
+
/**
|
|
193
|
+
* Require passcode upon MFA validation.
|
|
194
|
+
*/
|
|
195
|
+
usePasscode?: pulumi.Input<boolean>;
|
|
196
|
+
/**
|
|
197
|
+
* A template string for mapping Identity names to MFA methods.
|
|
198
|
+
*/
|
|
199
|
+
usernameFormat?: pulumi.Input<string>;
|
|
200
|
+
}
|
|
@@ -0,0 +1,110 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
|
+
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.MfaDuo = void 0;
|
|
6
|
+
const pulumi = require("@pulumi/pulumi");
|
|
7
|
+
const utilities = require("../utilities");
|
|
8
|
+
/**
|
|
9
|
+
* Resource for configuring the duo MFA method.
|
|
10
|
+
*
|
|
11
|
+
* ## Example Usage
|
|
12
|
+
*
|
|
13
|
+
* ```typescript
|
|
14
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
15
|
+
* import * as vault from "@pulumi/vault";
|
|
16
|
+
*
|
|
17
|
+
* const example = new vault.identity.MfaDuo("example", {
|
|
18
|
+
* apiHostname: "api-xxxxxxxx.duosecurity.com",
|
|
19
|
+
* integrationKey: "secret-int-key",
|
|
20
|
+
* secretKey: "secret-key",
|
|
21
|
+
* });
|
|
22
|
+
* ```
|
|
23
|
+
*
|
|
24
|
+
* ## Import
|
|
25
|
+
*
|
|
26
|
+
* Resource can be imported using its `uuid` field, e.g.
|
|
27
|
+
*
|
|
28
|
+
* ```sh
|
|
29
|
+
* $ pulumi import vault:identity/mfaDuo:MfaDuo example 0d89c36a-4ff5-4d70-8749-bb6a5598aeec
|
|
30
|
+
* ```
|
|
31
|
+
*/
|
|
32
|
+
class MfaDuo extends pulumi.CustomResource {
|
|
33
|
+
constructor(name, argsOrState, opts) {
|
|
34
|
+
let resourceInputs = {};
|
|
35
|
+
opts = opts || {};
|
|
36
|
+
if (opts.id) {
|
|
37
|
+
const state = argsOrState;
|
|
38
|
+
resourceInputs["apiHostname"] = state ? state.apiHostname : undefined;
|
|
39
|
+
resourceInputs["integrationKey"] = state ? state.integrationKey : undefined;
|
|
40
|
+
resourceInputs["methodId"] = state ? state.methodId : undefined;
|
|
41
|
+
resourceInputs["mountAccessor"] = state ? state.mountAccessor : undefined;
|
|
42
|
+
resourceInputs["name"] = state ? state.name : undefined;
|
|
43
|
+
resourceInputs["namespace"] = state ? state.namespace : undefined;
|
|
44
|
+
resourceInputs["namespaceId"] = state ? state.namespaceId : undefined;
|
|
45
|
+
resourceInputs["namespacePath"] = state ? state.namespacePath : undefined;
|
|
46
|
+
resourceInputs["pushInfo"] = state ? state.pushInfo : undefined;
|
|
47
|
+
resourceInputs["secretKey"] = state ? state.secretKey : undefined;
|
|
48
|
+
resourceInputs["type"] = state ? state.type : undefined;
|
|
49
|
+
resourceInputs["usePasscode"] = state ? state.usePasscode : undefined;
|
|
50
|
+
resourceInputs["usernameFormat"] = state ? state.usernameFormat : undefined;
|
|
51
|
+
resourceInputs["uuid"] = state ? state.uuid : undefined;
|
|
52
|
+
}
|
|
53
|
+
else {
|
|
54
|
+
const args = argsOrState;
|
|
55
|
+
if ((!args || args.apiHostname === undefined) && !opts.urn) {
|
|
56
|
+
throw new Error("Missing required property 'apiHostname'");
|
|
57
|
+
}
|
|
58
|
+
if ((!args || args.integrationKey === undefined) && !opts.urn) {
|
|
59
|
+
throw new Error("Missing required property 'integrationKey'");
|
|
60
|
+
}
|
|
61
|
+
if ((!args || args.secretKey === undefined) && !opts.urn) {
|
|
62
|
+
throw new Error("Missing required property 'secretKey'");
|
|
63
|
+
}
|
|
64
|
+
resourceInputs["apiHostname"] = args ? args.apiHostname : undefined;
|
|
65
|
+
resourceInputs["integrationKey"] = (args === null || args === void 0 ? void 0 : args.integrationKey) ? pulumi.secret(args.integrationKey) : undefined;
|
|
66
|
+
resourceInputs["namespace"] = args ? args.namespace : undefined;
|
|
67
|
+
resourceInputs["pushInfo"] = args ? args.pushInfo : undefined;
|
|
68
|
+
resourceInputs["secretKey"] = (args === null || args === void 0 ? void 0 : args.secretKey) ? pulumi.secret(args.secretKey) : undefined;
|
|
69
|
+
resourceInputs["usePasscode"] = args ? args.usePasscode : undefined;
|
|
70
|
+
resourceInputs["usernameFormat"] = args ? args.usernameFormat : undefined;
|
|
71
|
+
resourceInputs["methodId"] = undefined /*out*/;
|
|
72
|
+
resourceInputs["mountAccessor"] = undefined /*out*/;
|
|
73
|
+
resourceInputs["name"] = undefined /*out*/;
|
|
74
|
+
resourceInputs["namespaceId"] = undefined /*out*/;
|
|
75
|
+
resourceInputs["namespacePath"] = undefined /*out*/;
|
|
76
|
+
resourceInputs["type"] = undefined /*out*/;
|
|
77
|
+
resourceInputs["uuid"] = undefined /*out*/;
|
|
78
|
+
}
|
|
79
|
+
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
80
|
+
const secretOpts = { additionalSecretOutputs: ["integrationKey", "secretKey"] };
|
|
81
|
+
opts = pulumi.mergeOptions(opts, secretOpts);
|
|
82
|
+
super(MfaDuo.__pulumiType, name, resourceInputs, opts);
|
|
83
|
+
}
|
|
84
|
+
/**
|
|
85
|
+
* Get an existing MfaDuo resource's state with the given name, ID, and optional extra
|
|
86
|
+
* properties used to qualify the lookup.
|
|
87
|
+
*
|
|
88
|
+
* @param name The _unique_ name of the resulting resource.
|
|
89
|
+
* @param id The _unique_ provider ID of the resource to lookup.
|
|
90
|
+
* @param state Any extra arguments used during the lookup.
|
|
91
|
+
* @param opts Optional settings to control the behavior of the CustomResource.
|
|
92
|
+
*/
|
|
93
|
+
static get(name, id, state, opts) {
|
|
94
|
+
return new MfaDuo(name, state, Object.assign(Object.assign({}, opts), { id: id }));
|
|
95
|
+
}
|
|
96
|
+
/**
|
|
97
|
+
* Returns true if the given object is an instance of MfaDuo. This is designed to work even
|
|
98
|
+
* when multiple copies of the Pulumi SDK have been loaded into the same process.
|
|
99
|
+
*/
|
|
100
|
+
static isInstance(obj) {
|
|
101
|
+
if (obj === undefined || obj === null) {
|
|
102
|
+
return false;
|
|
103
|
+
}
|
|
104
|
+
return obj['__pulumiType'] === MfaDuo.__pulumiType;
|
|
105
|
+
}
|
|
106
|
+
}
|
|
107
|
+
exports.MfaDuo = MfaDuo;
|
|
108
|
+
/** @internal */
|
|
109
|
+
MfaDuo.__pulumiType = 'vault:identity/mfaDuo:MfaDuo';
|
|
110
|
+
//# sourceMappingURL=mfaDuo.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"mfaDuo.js","sourceRoot":"","sources":["../../identity/mfaDuo.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;GAuBG;AACH,MAAa,MAAO,SAAQ,MAAM,CAAC,cAAc;IA6F7C,YAAY,IAAY,EAAE,WAAsC,EAAE,IAAmC;QACjG,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAsC,CAAC;YACrD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3D;aAAM;YACH,MAAM,IAAI,GAAG,WAAqC,CAAC;YACnD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,WAAW,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACxD,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,cAAc,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC3D,MAAM,IAAI,KAAK,CAAC,4CAA4C,CAAC,CAAC;aACjE;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,SAAS,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACtD,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,gBAAgB,CAAC,GAAG,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,cAAc,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACzG,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,WAAW,CAAC,GAAG,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,SAAS,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,UAAU,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC/C,cAAc,CAAC,eAAe,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACpD,cAAc,CAAC,MAAM,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC3C,cAAc,CAAC,aAAa,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAClD,cAAc,CAAC,eAAe,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACpD,cAAc,CAAC,MAAM,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC3C,cAAc,CAAC,MAAM,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAC9C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,gBAAgB,EAAE,WAAW,CAAC,EAAE,CAAC;QAChF,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,MAAM,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC3D,CAAC;IA7ID;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAmB,EAAE,IAAmC;QACjH,OAAO,IAAI,MAAM,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC7D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,MAAM,CAAC,YAAY,CAAC;IACvD,CAAC;;AA1BL,wBA+IC;AAjIG,gBAAgB;AACO,mBAAY,GAAG,8BAA8B,CAAC"}
|
|
@@ -0,0 +1,170 @@
|
|
|
1
|
+
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
/**
|
|
3
|
+
* Resource for configuring MFA login-enforcement
|
|
4
|
+
*
|
|
5
|
+
* ## Example Usage
|
|
6
|
+
*
|
|
7
|
+
* ```typescript
|
|
8
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
9
|
+
* import * as vault from "@pulumi/vault";
|
|
10
|
+
*
|
|
11
|
+
* const exampleMfaDuo = new vault.identity.MfaDuo("exampleMfaDuo", {
|
|
12
|
+
* secretKey: "secret-key",
|
|
13
|
+
* integrationKey: "int-key",
|
|
14
|
+
* apiHostname: "foo.baz",
|
|
15
|
+
* pushInfo: "push-info",
|
|
16
|
+
* });
|
|
17
|
+
* const exampleMfaLoginEnforcement = new vault.identity.MfaLoginEnforcement("exampleMfaLoginEnforcement", {mfaMethodIds: [exampleMfaDuo.methodId]});
|
|
18
|
+
* ```
|
|
19
|
+
*
|
|
20
|
+
* ## Import
|
|
21
|
+
*
|
|
22
|
+
* Resource can be imported using its `name` field, e.g.
|
|
23
|
+
*
|
|
24
|
+
* ```sh
|
|
25
|
+
* $ pulumi import vault:identity/mfaLoginEnforcement:MfaLoginEnforcement example default
|
|
26
|
+
* ```
|
|
27
|
+
*/
|
|
28
|
+
export declare class MfaLoginEnforcement extends pulumi.CustomResource {
|
|
29
|
+
/**
|
|
30
|
+
* Get an existing MfaLoginEnforcement resource's state with the given name, ID, and optional extra
|
|
31
|
+
* properties used to qualify the lookup.
|
|
32
|
+
*
|
|
33
|
+
* @param name The _unique_ name of the resulting resource.
|
|
34
|
+
* @param id The _unique_ provider ID of the resource to lookup.
|
|
35
|
+
* @param state Any extra arguments used during the lookup.
|
|
36
|
+
* @param opts Optional settings to control the behavior of the CustomResource.
|
|
37
|
+
*/
|
|
38
|
+
static get(name: string, id: pulumi.Input<pulumi.ID>, state?: MfaLoginEnforcementState, opts?: pulumi.CustomResourceOptions): MfaLoginEnforcement;
|
|
39
|
+
/**
|
|
40
|
+
* Returns true if the given object is an instance of MfaLoginEnforcement. This is designed to work even
|
|
41
|
+
* when multiple copies of the Pulumi SDK have been loaded into the same process.
|
|
42
|
+
*/
|
|
43
|
+
static isInstance(obj: any): obj is MfaLoginEnforcement;
|
|
44
|
+
/**
|
|
45
|
+
* Set of auth method accessor IDs.
|
|
46
|
+
*/
|
|
47
|
+
readonly authMethodAccessors: pulumi.Output<string[] | undefined>;
|
|
48
|
+
/**
|
|
49
|
+
* Set of auth method types.
|
|
50
|
+
*/
|
|
51
|
+
readonly authMethodTypes: pulumi.Output<string[] | undefined>;
|
|
52
|
+
/**
|
|
53
|
+
* Set of identity entity IDs.
|
|
54
|
+
*/
|
|
55
|
+
readonly identityEntityIds: pulumi.Output<string[] | undefined>;
|
|
56
|
+
/**
|
|
57
|
+
* Set of identity group IDs.
|
|
58
|
+
*/
|
|
59
|
+
readonly identityGroupIds: pulumi.Output<string[] | undefined>;
|
|
60
|
+
/**
|
|
61
|
+
* Set of MFA method UUIDs.
|
|
62
|
+
*/
|
|
63
|
+
readonly mfaMethodIds: pulumi.Output<string[]>;
|
|
64
|
+
/**
|
|
65
|
+
* Login enforcement name.
|
|
66
|
+
*/
|
|
67
|
+
readonly name: pulumi.Output<string>;
|
|
68
|
+
/**
|
|
69
|
+
* Target namespace. (requires Enterprise)
|
|
70
|
+
*/
|
|
71
|
+
readonly namespace: pulumi.Output<string | undefined>;
|
|
72
|
+
/**
|
|
73
|
+
* Method's namespace ID.
|
|
74
|
+
*/
|
|
75
|
+
readonly namespaceId: pulumi.Output<string>;
|
|
76
|
+
/**
|
|
77
|
+
* Method's namespace path.
|
|
78
|
+
*/
|
|
79
|
+
readonly namespacePath: pulumi.Output<string>;
|
|
80
|
+
/**
|
|
81
|
+
* Resource UUID.
|
|
82
|
+
*/
|
|
83
|
+
readonly uuid: pulumi.Output<string>;
|
|
84
|
+
/**
|
|
85
|
+
* Create a MfaLoginEnforcement resource with the given unique name, arguments, and options.
|
|
86
|
+
*
|
|
87
|
+
* @param name The _unique_ name of the resource.
|
|
88
|
+
* @param args The arguments to use to populate this resource's properties.
|
|
89
|
+
* @param opts A bag of options that control this resource's behavior.
|
|
90
|
+
*/
|
|
91
|
+
constructor(name: string, args: MfaLoginEnforcementArgs, opts?: pulumi.CustomResourceOptions);
|
|
92
|
+
}
|
|
93
|
+
/**
|
|
94
|
+
* Input properties used for looking up and filtering MfaLoginEnforcement resources.
|
|
95
|
+
*/
|
|
96
|
+
export interface MfaLoginEnforcementState {
|
|
97
|
+
/**
|
|
98
|
+
* Set of auth method accessor IDs.
|
|
99
|
+
*/
|
|
100
|
+
authMethodAccessors?: pulumi.Input<pulumi.Input<string>[]>;
|
|
101
|
+
/**
|
|
102
|
+
* Set of auth method types.
|
|
103
|
+
*/
|
|
104
|
+
authMethodTypes?: pulumi.Input<pulumi.Input<string>[]>;
|
|
105
|
+
/**
|
|
106
|
+
* Set of identity entity IDs.
|
|
107
|
+
*/
|
|
108
|
+
identityEntityIds?: pulumi.Input<pulumi.Input<string>[]>;
|
|
109
|
+
/**
|
|
110
|
+
* Set of identity group IDs.
|
|
111
|
+
*/
|
|
112
|
+
identityGroupIds?: pulumi.Input<pulumi.Input<string>[]>;
|
|
113
|
+
/**
|
|
114
|
+
* Set of MFA method UUIDs.
|
|
115
|
+
*/
|
|
116
|
+
mfaMethodIds?: pulumi.Input<pulumi.Input<string>[]>;
|
|
117
|
+
/**
|
|
118
|
+
* Login enforcement name.
|
|
119
|
+
*/
|
|
120
|
+
name?: pulumi.Input<string>;
|
|
121
|
+
/**
|
|
122
|
+
* Target namespace. (requires Enterprise)
|
|
123
|
+
*/
|
|
124
|
+
namespace?: pulumi.Input<string>;
|
|
125
|
+
/**
|
|
126
|
+
* Method's namespace ID.
|
|
127
|
+
*/
|
|
128
|
+
namespaceId?: pulumi.Input<string>;
|
|
129
|
+
/**
|
|
130
|
+
* Method's namespace path.
|
|
131
|
+
*/
|
|
132
|
+
namespacePath?: pulumi.Input<string>;
|
|
133
|
+
/**
|
|
134
|
+
* Resource UUID.
|
|
135
|
+
*/
|
|
136
|
+
uuid?: pulumi.Input<string>;
|
|
137
|
+
}
|
|
138
|
+
/**
|
|
139
|
+
* The set of arguments for constructing a MfaLoginEnforcement resource.
|
|
140
|
+
*/
|
|
141
|
+
export interface MfaLoginEnforcementArgs {
|
|
142
|
+
/**
|
|
143
|
+
* Set of auth method accessor IDs.
|
|
144
|
+
*/
|
|
145
|
+
authMethodAccessors?: pulumi.Input<pulumi.Input<string>[]>;
|
|
146
|
+
/**
|
|
147
|
+
* Set of auth method types.
|
|
148
|
+
*/
|
|
149
|
+
authMethodTypes?: pulumi.Input<pulumi.Input<string>[]>;
|
|
150
|
+
/**
|
|
151
|
+
* Set of identity entity IDs.
|
|
152
|
+
*/
|
|
153
|
+
identityEntityIds?: pulumi.Input<pulumi.Input<string>[]>;
|
|
154
|
+
/**
|
|
155
|
+
* Set of identity group IDs.
|
|
156
|
+
*/
|
|
157
|
+
identityGroupIds?: pulumi.Input<pulumi.Input<string>[]>;
|
|
158
|
+
/**
|
|
159
|
+
* Set of MFA method UUIDs.
|
|
160
|
+
*/
|
|
161
|
+
mfaMethodIds: pulumi.Input<pulumi.Input<string>[]>;
|
|
162
|
+
/**
|
|
163
|
+
* Login enforcement name.
|
|
164
|
+
*/
|
|
165
|
+
name?: pulumi.Input<string>;
|
|
166
|
+
/**
|
|
167
|
+
* Target namespace. (requires Enterprise)
|
|
168
|
+
*/
|
|
169
|
+
namespace?: pulumi.Input<string>;
|
|
170
|
+
}
|
|
@@ -0,0 +1,96 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
|
+
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.MfaLoginEnforcement = void 0;
|
|
6
|
+
const pulumi = require("@pulumi/pulumi");
|
|
7
|
+
const utilities = require("../utilities");
|
|
8
|
+
/**
|
|
9
|
+
* Resource for configuring MFA login-enforcement
|
|
10
|
+
*
|
|
11
|
+
* ## Example Usage
|
|
12
|
+
*
|
|
13
|
+
* ```typescript
|
|
14
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
15
|
+
* import * as vault from "@pulumi/vault";
|
|
16
|
+
*
|
|
17
|
+
* const exampleMfaDuo = new vault.identity.MfaDuo("exampleMfaDuo", {
|
|
18
|
+
* secretKey: "secret-key",
|
|
19
|
+
* integrationKey: "int-key",
|
|
20
|
+
* apiHostname: "foo.baz",
|
|
21
|
+
* pushInfo: "push-info",
|
|
22
|
+
* });
|
|
23
|
+
* const exampleMfaLoginEnforcement = new vault.identity.MfaLoginEnforcement("exampleMfaLoginEnforcement", {mfaMethodIds: [exampleMfaDuo.methodId]});
|
|
24
|
+
* ```
|
|
25
|
+
*
|
|
26
|
+
* ## Import
|
|
27
|
+
*
|
|
28
|
+
* Resource can be imported using its `name` field, e.g.
|
|
29
|
+
*
|
|
30
|
+
* ```sh
|
|
31
|
+
* $ pulumi import vault:identity/mfaLoginEnforcement:MfaLoginEnforcement example default
|
|
32
|
+
* ```
|
|
33
|
+
*/
|
|
34
|
+
class MfaLoginEnforcement extends pulumi.CustomResource {
|
|
35
|
+
constructor(name, argsOrState, opts) {
|
|
36
|
+
let resourceInputs = {};
|
|
37
|
+
opts = opts || {};
|
|
38
|
+
if (opts.id) {
|
|
39
|
+
const state = argsOrState;
|
|
40
|
+
resourceInputs["authMethodAccessors"] = state ? state.authMethodAccessors : undefined;
|
|
41
|
+
resourceInputs["authMethodTypes"] = state ? state.authMethodTypes : undefined;
|
|
42
|
+
resourceInputs["identityEntityIds"] = state ? state.identityEntityIds : undefined;
|
|
43
|
+
resourceInputs["identityGroupIds"] = state ? state.identityGroupIds : undefined;
|
|
44
|
+
resourceInputs["mfaMethodIds"] = state ? state.mfaMethodIds : undefined;
|
|
45
|
+
resourceInputs["name"] = state ? state.name : undefined;
|
|
46
|
+
resourceInputs["namespace"] = state ? state.namespace : undefined;
|
|
47
|
+
resourceInputs["namespaceId"] = state ? state.namespaceId : undefined;
|
|
48
|
+
resourceInputs["namespacePath"] = state ? state.namespacePath : undefined;
|
|
49
|
+
resourceInputs["uuid"] = state ? state.uuid : undefined;
|
|
50
|
+
}
|
|
51
|
+
else {
|
|
52
|
+
const args = argsOrState;
|
|
53
|
+
if ((!args || args.mfaMethodIds === undefined) && !opts.urn) {
|
|
54
|
+
throw new Error("Missing required property 'mfaMethodIds'");
|
|
55
|
+
}
|
|
56
|
+
resourceInputs["authMethodAccessors"] = args ? args.authMethodAccessors : undefined;
|
|
57
|
+
resourceInputs["authMethodTypes"] = args ? args.authMethodTypes : undefined;
|
|
58
|
+
resourceInputs["identityEntityIds"] = args ? args.identityEntityIds : undefined;
|
|
59
|
+
resourceInputs["identityGroupIds"] = args ? args.identityGroupIds : undefined;
|
|
60
|
+
resourceInputs["mfaMethodIds"] = args ? args.mfaMethodIds : undefined;
|
|
61
|
+
resourceInputs["name"] = args ? args.name : undefined;
|
|
62
|
+
resourceInputs["namespace"] = args ? args.namespace : undefined;
|
|
63
|
+
resourceInputs["namespaceId"] = undefined /*out*/;
|
|
64
|
+
resourceInputs["namespacePath"] = undefined /*out*/;
|
|
65
|
+
resourceInputs["uuid"] = undefined /*out*/;
|
|
66
|
+
}
|
|
67
|
+
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
68
|
+
super(MfaLoginEnforcement.__pulumiType, name, resourceInputs, opts);
|
|
69
|
+
}
|
|
70
|
+
/**
|
|
71
|
+
* Get an existing MfaLoginEnforcement resource's state with the given name, ID, and optional extra
|
|
72
|
+
* properties used to qualify the lookup.
|
|
73
|
+
*
|
|
74
|
+
* @param name The _unique_ name of the resulting resource.
|
|
75
|
+
* @param id The _unique_ provider ID of the resource to lookup.
|
|
76
|
+
* @param state Any extra arguments used during the lookup.
|
|
77
|
+
* @param opts Optional settings to control the behavior of the CustomResource.
|
|
78
|
+
*/
|
|
79
|
+
static get(name, id, state, opts) {
|
|
80
|
+
return new MfaLoginEnforcement(name, state, Object.assign(Object.assign({}, opts), { id: id }));
|
|
81
|
+
}
|
|
82
|
+
/**
|
|
83
|
+
* Returns true if the given object is an instance of MfaLoginEnforcement. This is designed to work even
|
|
84
|
+
* when multiple copies of the Pulumi SDK have been loaded into the same process.
|
|
85
|
+
*/
|
|
86
|
+
static isInstance(obj) {
|
|
87
|
+
if (obj === undefined || obj === null) {
|
|
88
|
+
return false;
|
|
89
|
+
}
|
|
90
|
+
return obj['__pulumiType'] === MfaLoginEnforcement.__pulumiType;
|
|
91
|
+
}
|
|
92
|
+
}
|
|
93
|
+
exports.MfaLoginEnforcement = MfaLoginEnforcement;
|
|
94
|
+
/** @internal */
|
|
95
|
+
MfaLoginEnforcement.__pulumiType = 'vault:identity/mfaLoginEnforcement:MfaLoginEnforcement';
|
|
96
|
+
//# sourceMappingURL=mfaLoginEnforcement.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"mfaLoginEnforcement.js","sourceRoot":"","sources":["../../identity/mfaLoginEnforcement.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;GAyBG;AACH,MAAa,mBAAoB,SAAQ,MAAM,CAAC,cAAc;IA6E1D,YAAY,IAAY,EAAE,WAAgE,EAAE,IAAmC;QAC3H,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAmD,CAAC;YAClE,cAAc,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3D;aAAM;YACH,MAAM,IAAI,GAAG,WAAkD,CAAC;YAChE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,YAAY,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACzD,MAAM,IAAI,KAAK,CAAC,0CAA0C,CAAC,CAAC;aAC/D;YACD,cAAc,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,aAAa,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAClD,cAAc,CAAC,eAAe,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACpD,cAAc,CAAC,MAAM,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAC9C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,mBAAmB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACxE,CAAC;IA7GD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAgC,EAAE,IAAmC;QAC9H,OAAO,IAAI,mBAAmB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC1E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,mBAAmB,CAAC,YAAY,CAAC;IACpE,CAAC;;AA1BL,kDA+GC;AAjGG,gBAAgB;AACO,gCAAY,GAAG,wDAAwD,CAAC"}
|