@pulumi/vault 5.6.0 → 5.7.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/ad/getAccessCredentials.d.ts +15 -0
- package/ad/getAccessCredentials.js +1 -0
- package/ad/getAccessCredentials.js.map +1 -1
- package/ad/index.d.ts +12 -4
- package/ad/index.js +13 -26
- package/ad/index.js.map +1 -1
- package/ad/secretBackend.d.ts +39 -0
- package/ad/secretBackend.js +9 -3
- package/ad/secretBackend.js.map +1 -1
- package/ad/secretLibrary.d.ts +21 -0
- package/ad/secretLibrary.js +2 -0
- package/ad/secretLibrary.js.map +1 -1
- package/ad/secretRole.d.ts +21 -0
- package/ad/secretRole.js +2 -0
- package/ad/secretRole.js.map +1 -1
- package/alicloud/authBackendRole.d.ts +21 -0
- package/alicloud/authBackendRole.js +2 -0
- package/alicloud/authBackendRole.js.map +1 -1
- package/alicloud/index.d.ts +3 -1
- package/alicloud/index.js +4 -19
- package/alicloud/index.js.map +1 -1
- package/approle/authBackendLogin.d.ts +22 -1
- package/approle/authBackendLogin.js +3 -1
- package/approle/authBackendLogin.js.map +1 -1
- package/approle/authBackendRole.d.ts +21 -0
- package/approle/authBackendRole.js +2 -0
- package/approle/authBackendRole.js.map +1 -1
- package/approle/{authBackendRoleSecretID.d.ts → authBackendRoleSecretId.d.ts} +33 -12
- package/approle/{authBackendRoleSecretID.js → authBackendRoleSecretId.js} +16 -12
- package/approle/authBackendRoleSecretId.js.map +1 -0
- package/approle/getAuthBackendRoleId.d.ts +15 -0
- package/approle/getAuthBackendRoleId.js +1 -0
- package/approle/getAuthBackendRoleId.js.map +1 -1
- package/approle/index.d.ts +12 -4
- package/approle/index.js +15 -28
- package/approle/index.js.map +1 -1
- package/audit.d.ts +21 -0
- package/audit.js +2 -0
- package/audit.js.map +1 -1
- package/authBackend.d.ts +47 -10
- package/authBackend.js +4 -0
- package/authBackend.js.map +1 -1
- package/aws/authBackendCert.d.ts +21 -0
- package/aws/authBackendCert.js +2 -0
- package/aws/authBackendCert.js.map +1 -1
- package/aws/authBackendClient.d.ts +21 -0
- package/aws/authBackendClient.js +6 -2
- package/aws/authBackendClient.js.map +1 -1
- package/aws/authBackendIdentityWhitelist.d.ts +21 -0
- package/aws/authBackendIdentityWhitelist.js +2 -0
- package/aws/authBackendIdentityWhitelist.js.map +1 -1
- package/aws/authBackendLogin.d.ts +21 -0
- package/aws/authBackendLogin.js +4 -0
- package/aws/authBackendLogin.js.map +1 -1
- package/aws/authBackendRole.d.ts +21 -0
- package/aws/authBackendRole.js +2 -0
- package/aws/authBackendRole.js.map +1 -1
- package/aws/authBackendRoleTag.d.ts +21 -0
- package/aws/authBackendRoleTag.js +2 -0
- package/aws/authBackendRoleTag.js.map +1 -1
- package/aws/authBackendRoletagBlacklist.d.ts +21 -0
- package/aws/authBackendRoletagBlacklist.js +2 -0
- package/aws/authBackendRoletagBlacklist.js.map +1 -1
- package/aws/authBackendStsRole.d.ts +21 -0
- package/aws/authBackendStsRole.js +2 -0
- package/aws/authBackendStsRole.js.map +1 -1
- package/aws/getAccessCredentials.d.ts +15 -0
- package/aws/getAccessCredentials.js +1 -0
- package/aws/getAccessCredentials.js.map +1 -1
- package/aws/index.d.ts +33 -11
- package/aws/index.js +34 -47
- package/aws/index.js.map +1 -1
- package/aws/secretBackend.d.ts +36 -12
- package/aws/secretBackend.js +8 -14
- package/aws/secretBackend.js.map +1 -1
- package/aws/secretBackendRole.d.ts +21 -0
- package/aws/secretBackendRole.js +2 -0
- package/aws/secretBackendRole.js.map +1 -1
- package/azure/authBackendConfig.d.ts +21 -0
- package/azure/authBackendConfig.js +7 -3
- package/azure/authBackendConfig.js.map +1 -1
- package/azure/authBackendRole.d.ts +21 -0
- package/azure/authBackendRole.js +2 -0
- package/azure/authBackendRole.js.map +1 -1
- package/azure/backend.d.ts +36 -0
- package/azure/backend.js +10 -4
- package/azure/backend.js.map +1 -1
- package/azure/backendRole.d.ts +23 -1
- package/azure/backendRole.js +2 -0
- package/azure/backendRole.js.map +1 -1
- package/azure/getAccessCredentials.d.ts +15 -0
- package/azure/getAccessCredentials.js +1 -0
- package/azure/getAccessCredentials.js.map +1 -1
- package/azure/index.d.ts +15 -5
- package/azure/index.js +16 -29
- package/azure/index.js.map +1 -1
- package/certAuthBackendRole.d.ts +39 -3
- package/certAuthBackendRole.js +4 -0
- package/certAuthBackendRole.js.map +1 -1
- package/config/vars.d.ts +43 -3
- package/config/vars.js +64 -4
- package/config/vars.js.map +1 -1
- package/consul/index.d.ts +6 -2
- package/consul/index.js +7 -22
- package/consul/index.js.map +1 -1
- package/consul/secretBackend.d.ts +87 -15
- package/consul/secretBackend.js +24 -7
- package/consul/secretBackend.js.map +1 -1
- package/consul/secretBackendRole.d.ts +93 -10
- package/consul/secretBackendRole.js +14 -1
- package/consul/secretBackendRole.js.map +1 -1
- package/database/index.d.ts +12 -4
- package/database/index.js +13 -28
- package/database/index.js.map +1 -1
- package/database/secretBackendConnection.d.ts +35 -1
- package/database/secretBackendConnection.js +4 -0
- package/database/secretBackendConnection.js.map +1 -1
- package/database/secretBackendRole.d.ts +21 -0
- package/database/secretBackendRole.js +2 -0
- package/database/secretBackendRole.js.map +1 -1
- package/database/secretBackendStaticRole.d.ts +21 -0
- package/database/secretBackendStaticRole.js +2 -0
- package/database/secretBackendStaticRole.js.map +1 -1
- package/database/secretsMount.d.ts +41 -1
- package/database/secretsMount.js +6 -0
- package/database/secretsMount.js.map +1 -1
- package/egpPolicy.d.ts +21 -0
- package/egpPolicy.js +2 -0
- package/egpPolicy.js.map +1 -1
- package/gcp/authBackend.d.ts +71 -1
- package/gcp/authBackend.js +18 -2
- package/gcp/authBackend.js.map +1 -1
- package/gcp/authBackendRole.d.ts +21 -0
- package/gcp/authBackendRole.js +2 -0
- package/gcp/authBackendRole.js.map +1 -1
- package/gcp/getAuthBackendRole.d.ts +15 -0
- package/gcp/getAuthBackendRole.js +1 -0
- package/gcp/getAuthBackendRole.js.map +1 -1
- package/gcp/index.d.ts +18 -6
- package/gcp/index.js +19 -32
- package/gcp/index.js.map +1 -1
- package/gcp/secretBackend.d.ts +36 -0
- package/gcp/secretBackend.js +7 -1
- package/gcp/secretBackend.js.map +1 -1
- package/gcp/secretRoleset.d.ts +23 -1
- package/gcp/secretRoleset.js +2 -0
- package/gcp/secretRoleset.js.map +1 -1
- package/gcp/secretStaticAccount.d.ts +23 -1
- package/gcp/secretStaticAccount.js +2 -0
- package/gcp/secretStaticAccount.js.map +1 -1
- package/generic/endpoint.d.ts +21 -0
- package/generic/endpoint.js +5 -1
- package/generic/endpoint.js.map +1 -1
- package/generic/getSecret.d.ts +15 -0
- package/generic/getSecret.js +1 -0
- package/generic/getSecret.js.map +1 -1
- package/generic/index.d.ts +9 -3
- package/generic/index.js +10 -23
- package/generic/index.js.map +1 -1
- package/generic/secret.d.ts +21 -0
- package/generic/secret.js +5 -1
- package/generic/secret.js.map +1 -1
- package/getAuthBackend.d.ts +16 -1
- package/getAuthBackend.js +1 -0
- package/getAuthBackend.js.map +1 -1
- package/getNomadAccessToken.d.ts +15 -0
- package/getNomadAccessToken.js +1 -0
- package/getNomadAccessToken.js.map +1 -1
- package/getPolicyDocument.d.ts +5 -1
- package/getPolicyDocument.js +1 -0
- package/getPolicyDocument.js.map +1 -1
- package/github/authBackend.d.ts +38 -1
- package/github/authBackend.js +4 -0
- package/github/authBackend.js.map +1 -1
- package/github/index.d.ts +9 -3
- package/github/index.js +10 -25
- package/github/index.js.map +1 -1
- package/github/team.d.ts +21 -0
- package/github/team.js +2 -0
- package/github/team.js.map +1 -1
- package/github/user.d.ts +21 -0
- package/github/user.js +2 -0
- package/github/user.js.map +1 -1
- package/identity/entity.d.ts +21 -0
- package/identity/entity.js +2 -0
- package/identity/entity.js.map +1 -1
- package/identity/entityAlias.d.ts +21 -0
- package/identity/entityAlias.js +2 -0
- package/identity/entityAlias.js.map +1 -1
- package/identity/entityPolicies.d.ts +21 -0
- package/identity/entityPolicies.js +2 -0
- package/identity/entityPolicies.js.map +1 -1
- package/identity/getEntity.d.ts +16 -1
- package/identity/getEntity.js +1 -0
- package/identity/getEntity.js.map +1 -1
- package/identity/getGroup.d.ts +15 -0
- package/identity/getGroup.js +1 -0
- package/identity/getGroup.js.map +1 -1
- package/identity/getOidcClientCreds.d.ts +15 -0
- package/identity/getOidcClientCreds.js +1 -0
- package/identity/getOidcClientCreds.js.map +1 -1
- package/identity/getOidcOpenidConfig.d.ts +15 -0
- package/identity/getOidcOpenidConfig.js +1 -0
- package/identity/getOidcOpenidConfig.js.map +1 -1
- package/identity/getOidcPublicKeys.d.ts +15 -0
- package/identity/getOidcPublicKeys.js +1 -0
- package/identity/getOidcPublicKeys.js.map +1 -1
- package/identity/group.d.ts +21 -0
- package/identity/group.js +2 -0
- package/identity/group.js.map +1 -1
- package/identity/groupAlias.d.ts +21 -0
- package/identity/groupAlias.js +2 -0
- package/identity/groupAlias.js.map +1 -1
- package/identity/groupMemberEntityIds.d.ts +21 -0
- package/identity/groupMemberEntityIds.js +2 -0
- package/identity/groupMemberEntityIds.js.map +1 -1
- package/identity/groupPolicies.d.ts +21 -0
- package/identity/groupPolicies.js +2 -0
- package/identity/groupPolicies.js.map +1 -1
- package/identity/index.d.ts +75 -20
- package/identity/index.js +86 -66
- package/identity/index.js.map +1 -1
- package/identity/mfaDuo.d.ts +200 -0
- package/identity/mfaDuo.js +110 -0
- package/identity/mfaDuo.js.map +1 -0
- package/identity/mfaLoginEnforcement.d.ts +170 -0
- package/identity/mfaLoginEnforcement.js +96 -0
- package/identity/mfaLoginEnforcement.js.map +1 -0
- package/identity/mfaOkta.d.ts +188 -0
- package/identity/mfaOkta.js +105 -0
- package/identity/mfaOkta.js.map +1 -0
- package/identity/mfaPingid.d.ts +190 -0
- package/identity/mfaPingid.js +102 -0
- package/identity/mfaPingid.js.map +1 -0
- package/identity/mfaTotp.d.ts +218 -0
- package/identity/mfaTotp.js +104 -0
- package/identity/mfaTotp.js.map +1 -0
- package/identity/oidc.d.ts +21 -0
- package/identity/oidc.js +2 -0
- package/identity/oidc.js.map +1 -1
- package/identity/oidcAssignment.d.ts +23 -2
- package/identity/oidcAssignment.js +4 -2
- package/identity/oidcAssignment.js.map +1 -1
- package/identity/oidcClient.d.ts +21 -0
- package/identity/oidcClient.js +4 -0
- package/identity/oidcClient.js.map +1 -1
- package/identity/oidcKey.d.ts +21 -0
- package/identity/oidcKey.js +2 -0
- package/identity/oidcKey.js.map +1 -1
- package/identity/oidcKeyAllowedClientID.d.ts +21 -0
- package/identity/oidcKeyAllowedClientID.js +2 -0
- package/identity/oidcKeyAllowedClientID.js.map +1 -1
- package/identity/oidcProvider.d.ts +21 -0
- package/identity/oidcProvider.js +2 -0
- package/identity/oidcProvider.js.map +1 -1
- package/identity/oidcRole.d.ts +21 -0
- package/identity/oidcRole.js +2 -0
- package/identity/oidcRole.js.map +1 -1
- package/identity/oidcScope.d.ts +22 -3
- package/identity/oidcScope.js +3 -3
- package/identity/oidcScope.js.map +1 -1
- package/index.d.ts +75 -25
- package/index.js +78 -83
- package/index.js.map +1 -1
- package/jwt/authBackend.d.ts +38 -1
- package/jwt/authBackend.js +7 -1
- package/jwt/authBackend.js.map +1 -1
- package/jwt/authBackendRole.d.ts +57 -0
- package/jwt/authBackendRole.js +6 -0
- package/jwt/authBackendRole.js.map +1 -1
- package/jwt/index.d.ts +6 -2
- package/jwt/index.js +7 -22
- package/jwt/index.js.map +1 -1
- package/kmip/index.d.ts +9 -3
- package/kmip/index.js +10 -25
- package/kmip/index.js.map +1 -1
- package/kmip/secretBackend.d.ts +36 -0
- package/kmip/secretBackend.js +4 -0
- package/kmip/secretBackend.js.map +1 -1
- package/kmip/secretRole.d.ts +21 -0
- package/kmip/secretRole.js +2 -0
- package/kmip/secretRole.js.map +1 -1
- package/kmip/secretScope.d.ts +21 -0
- package/kmip/secretScope.js +2 -0
- package/kmip/secretScope.js.map +1 -1
- package/kubernetes/authBackendConfig.d.ts +21 -0
- package/kubernetes/authBackendConfig.js +5 -1
- package/kubernetes/authBackendConfig.js.map +1 -1
- package/kubernetes/authBackendRole.d.ts +21 -0
- package/kubernetes/authBackendRole.js +2 -0
- package/kubernetes/authBackendRole.js.map +1 -1
- package/kubernetes/getAuthBackendConfig.d.ts +15 -0
- package/kubernetes/getAuthBackendConfig.js +1 -0
- package/kubernetes/getAuthBackendConfig.js.map +1 -1
- package/kubernetes/getAuthBackendRole.d.ts +15 -0
- package/kubernetes/getAuthBackendRole.js +1 -0
- package/kubernetes/getAuthBackendRole.js.map +1 -1
- package/kubernetes/getServiceAccountToken.d.ts +156 -0
- package/kubernetes/getServiceAccountToken.js +67 -0
- package/kubernetes/getServiceAccountToken.js.map +1 -0
- package/kubernetes/index.d.ts +21 -4
- package/kubernetes/index.js +26 -24
- package/kubernetes/index.js.map +1 -1
- package/kubernetes/secretBackend.d.ts +303 -0
- package/kubernetes/secretBackend.js +114 -0
- package/kubernetes/secretBackend.js.map +1 -0
- package/kubernetes/secretBackendRole.d.ts +367 -0
- package/kubernetes/secretBackendRole.js +191 -0
- package/kubernetes/secretBackendRole.js.map +1 -0
- package/kv/getSecret.d.ts +104 -0
- package/kv/getSecret.js +53 -0
- package/kv/getSecret.js.map +1 -0
- package/kv/getSecretSubkeysV2.d.ts +132 -0
- package/kv/getSecretSubkeysV2.js +57 -0
- package/kv/getSecretSubkeysV2.js.map +1 -0
- package/kv/getSecretV2.d.ts +139 -0
- package/kv/getSecretV2.js +58 -0
- package/kv/getSecretV2.js.map +1 -0
- package/kv/getSecretsList.d.ts +85 -0
- package/kv/getSecretsList.js +58 -0
- package/kv/getSecretsList.js.map +1 -0
- package/kv/getSecretsListV2.d.ts +114 -0
- package/kv/getSecretsListV2.js +69 -0
- package/kv/getSecretsListV2.js.map +1 -0
- package/kv/index.d.ts +24 -0
- package/kv/index.js +47 -0
- package/kv/index.js.map +1 -0
- package/kv/secret.d.ts +145 -0
- package/kv/secret.js +106 -0
- package/kv/secret.js.map +1 -0
- package/kv/secretBackendV2.d.ts +154 -0
- package/kv/secretBackendV2.js +103 -0
- package/kv/secretBackendV2.js.map +1 -0
- package/kv/secretV2.d.ts +257 -0
- package/kv/secretV2.js +122 -0
- package/kv/secretV2.js.map +1 -0
- package/ldap/authBackend.d.ts +48 -0
- package/ldap/authBackend.js +10 -2
- package/ldap/authBackend.js.map +1 -1
- package/ldap/authBackendGroup.d.ts +21 -0
- package/ldap/authBackendGroup.js +2 -0
- package/ldap/authBackendGroup.js.map +1 -1
- package/ldap/authBackendUser.d.ts +21 -0
- package/ldap/authBackendUser.js +2 -0
- package/ldap/authBackendUser.js.map +1 -1
- package/ldap/index.d.ts +9 -3
- package/ldap/index.js +10 -25
- package/ldap/index.js.map +1 -1
- package/managed/index.d.ts +3 -0
- package/managed/index.js +22 -0
- package/managed/index.js.map +1 -0
- package/managed/keys.d.ts +104 -0
- package/managed/keys.js +64 -0
- package/managed/keys.js.map +1 -0
- package/mfaDuo.d.ts +21 -0
- package/mfaDuo.js +6 -2
- package/mfaDuo.js.map +1 -1
- package/mfaOkta.d.ts +21 -0
- package/mfaOkta.js +5 -1
- package/mfaOkta.js.map +1 -1
- package/mfaPingid.d.ts +21 -0
- package/mfaPingid.js +2 -0
- package/mfaPingid.js.map +1 -1
- package/mfaTotp.d.ts +21 -0
- package/mfaTotp.js +2 -0
- package/mfaTotp.js.map +1 -1
- package/mount.d.ts +33 -0
- package/mount.js +4 -0
- package/mount.js.map +1 -1
- package/namespace.d.ts +32 -18
- package/namespace.js +5 -16
- package/namespace.js.map +1 -1
- package/nomadSecretBackend.d.ts +36 -0
- package/nomadSecretBackend.js +9 -3
- package/nomadSecretBackend.js.map +1 -1
- package/nomadSecretRole.d.ts +21 -0
- package/nomadSecretRole.js +2 -0
- package/nomadSecretRole.js.map +1 -1
- package/okta/authBackend.d.ts +38 -1
- package/okta/authBackend.js +7 -1
- package/okta/authBackend.js.map +1 -1
- package/okta/authBackendGroup.d.ts +21 -0
- package/okta/authBackendGroup.js +2 -0
- package/okta/authBackendGroup.js.map +1 -1
- package/okta/authBackendUser.d.ts +21 -0
- package/okta/authBackendUser.js +2 -0
- package/okta/authBackendUser.js.map +1 -1
- package/okta/index.d.ts +9 -3
- package/okta/index.js +10 -25
- package/okta/index.js.map +1 -1
- package/package.json +2 -2
- package/package.json.dev +2 -2
- package/passwordPolicy.d.ts +21 -0
- package/passwordPolicy.js +2 -0
- package/passwordPolicy.js.map +1 -1
- package/pkisecret/index.d.ts +30 -10
- package/pkisecret/index.js +31 -46
- package/pkisecret/index.js.map +1 -1
- package/pkisecret/secretBackendCert.d.ts +29 -0
- package/pkisecret/secretBackendCert.js +6 -0
- package/pkisecret/secretBackendCert.js.map +1 -1
- package/pkisecret/secretBackendConfigCa.d.ts +21 -0
- package/pkisecret/secretBackendConfigCa.js +5 -1
- package/pkisecret/secretBackendConfigCa.js.map +1 -1
- package/pkisecret/secretBackendConfigUrls.d.ts +21 -0
- package/pkisecret/secretBackendConfigUrls.js +2 -0
- package/pkisecret/secretBackendConfigUrls.js.map +1 -1
- package/pkisecret/secretBackendCrlConfig.d.ts +21 -0
- package/pkisecret/secretBackendCrlConfig.js +2 -0
- package/pkisecret/secretBackendCrlConfig.js.map +1 -1
- package/pkisecret/secretBackendIntermediateCertRequest.d.ts +54 -0
- package/pkisecret/secretBackendIntermediateCertRequest.js +8 -0
- package/pkisecret/secretBackendIntermediateCertRequest.js.map +1 -1
- package/pkisecret/secretBackendIntermediateSetSigned.d.ts +21 -0
- package/pkisecret/secretBackendIntermediateSetSigned.js +2 -0
- package/pkisecret/secretBackendIntermediateSetSigned.js.map +1 -1
- package/pkisecret/secretBackendRole.d.ts +24 -3
- package/pkisecret/secretBackendRole.js +2 -0
- package/pkisecret/secretBackendRole.js.map +1 -1
- package/pkisecret/secretBackendRootCert.d.ts +57 -3
- package/pkisecret/secretBackendRootCert.js +6 -0
- package/pkisecret/secretBackendRootCert.js.map +1 -1
- package/pkisecret/secretBackendRootSignIntermediate.d.ts +21 -0
- package/pkisecret/secretBackendRootSignIntermediate.js +2 -0
- package/pkisecret/secretBackendRootSignIntermediate.js.map +1 -1
- package/pkisecret/secretBackendSign.d.ts +29 -0
- package/pkisecret/secretBackendSign.js +4 -0
- package/pkisecret/secretBackendSign.js.map +1 -1
- package/policy.d.ts +21 -0
- package/policy.js +2 -0
- package/policy.js.map +1 -1
- package/provider.d.ts +43 -3
- package/provider.js +12 -2
- package/provider.js.map +1 -1
- package/quotaLeaseCount.d.ts +21 -0
- package/quotaLeaseCount.js +2 -0
- package/quotaLeaseCount.js.map +1 -1
- package/quotaRateLimit.d.ts +48 -0
- package/quotaRateLimit.js +6 -0
- package/quotaRateLimit.js.map +1 -1
- package/rabbitmq/index.d.ts +6 -2
- package/rabbitmq/index.js +7 -22
- package/rabbitmq/index.js.map +1 -1
- package/rabbitmq/secretBackend.d.ts +36 -0
- package/rabbitmq/secretBackend.js +8 -2
- package/rabbitmq/secretBackend.js.map +1 -1
- package/rabbitmq/secretBackendRole.d.ts +23 -1
- package/rabbitmq/secretBackendRole.js +2 -0
- package/rabbitmq/secretBackendRole.js.map +1 -1
- package/raftAutopilot.d.ts +21 -0
- package/raftAutopilot.js +2 -0
- package/raftAutopilot.js.map +1 -1
- package/raftSnapshotAgentConfig.d.ts +62 -0
- package/raftSnapshotAgentConfig.js +43 -0
- package/raftSnapshotAgentConfig.js.map +1 -1
- package/rgpPolicy.d.ts +21 -0
- package/rgpPolicy.js +2 -0
- package/rgpPolicy.js.map +1 -1
- package/ssh/index.d.ts +6 -2
- package/ssh/index.js +7 -22
- package/ssh/index.js.map +1 -1
- package/ssh/secretBackendCa.d.ts +29 -0
- package/ssh/secretBackendCa.js +13 -1
- package/ssh/secretBackendCa.js.map +1 -1
- package/ssh/secretBackendRole.d.ts +23 -1
- package/ssh/secretBackendRole.js +2 -0
- package/ssh/secretBackendRole.js.map +1 -1
- package/terraformcloud/index.d.ts +9 -3
- package/terraformcloud/index.js +10 -25
- package/terraformcloud/index.js.map +1 -1
- package/terraformcloud/secretBackend.d.ts +36 -0
- package/terraformcloud/secretBackend.js +7 -1
- package/terraformcloud/secretBackend.js.map +1 -1
- package/terraformcloud/secretCreds.d.ts +21 -0
- package/terraformcloud/secretCreds.js +4 -0
- package/terraformcloud/secretCreds.js.map +1 -1
- package/terraformcloud/secretRole.d.ts +21 -0
- package/terraformcloud/secretRole.js +2 -0
- package/terraformcloud/secretRole.js.map +1 -1
- package/token.d.ts +42 -0
- package/token.js +9 -0
- package/token.js.map +1 -1
- package/tokenauth/authBackendRole.d.ts +21 -0
- package/tokenauth/authBackendRole.js +2 -0
- package/tokenauth/authBackendRole.js.map +1 -1
- package/tokenauth/index.d.ts +3 -1
- package/tokenauth/index.js +4 -19
- package/tokenauth/index.js.map +1 -1
- package/transform/index.d.ts +18 -6
- package/transform/index.js +19 -30
- package/transform/index.js.map +1 -1
- package/transform/transformation.d.ts +0 -25
- package/transform/transformation.js +0 -25
- package/transform/transformation.js.map +1 -1
- package/transit/getDecrypt.d.ts +3 -0
- package/transit/getDecrypt.js +1 -0
- package/transit/getDecrypt.js.map +1 -1
- package/transit/getEncrypt.d.ts +3 -0
- package/transit/getEncrypt.js +1 -0
- package/transit/getEncrypt.js.map +1 -1
- package/transit/index.d.ts +12 -4
- package/transit/index.js +13 -24
- package/transit/index.js.map +1 -1
- package/transit/secretBackendKey.d.ts +21 -0
- package/transit/secretBackendKey.js +2 -0
- package/transit/secretBackendKey.js.map +1 -1
- package/transit/secretCacheConfig.d.ts +21 -0
- package/transit/secretCacheConfig.js +2 -0
- package/transit/secretCacheConfig.js.map +1 -1
- package/types/index.js.map +1 -1
- package/types/input.d.ts +408 -4
- package/types/output.d.ts +409 -5
- package/utilities.js +13 -1
- package/utilities.js.map +1 -1
- package/approle/authBackendRoleSecretID.js.map +0 -1
|
@@ -18,6 +18,13 @@ export interface GetAuthBackendRoleArgs {
|
|
|
18
18
|
* retrieve Role attributes for resides in. Defaults to "kubernetes".
|
|
19
19
|
*/
|
|
20
20
|
backend?: string;
|
|
21
|
+
/**
|
|
22
|
+
* The namespace of the target resource.
|
|
23
|
+
* The value should not contain leading or trailing forward slashes.
|
|
24
|
+
* The `namespace` is always relative to the provider's configured namespace.
|
|
25
|
+
* *Available only for Vault Enterprise*.
|
|
26
|
+
*/
|
|
27
|
+
namespace?: string;
|
|
21
28
|
/**
|
|
22
29
|
* The name of the role to retrieve the Role attributes for.
|
|
23
30
|
*/
|
|
@@ -102,6 +109,7 @@ export interface GetAuthBackendRoleResult {
|
|
|
102
109
|
* The provider-assigned unique ID for this managed resource.
|
|
103
110
|
*/
|
|
104
111
|
readonly id: string;
|
|
112
|
+
readonly namespace?: string;
|
|
105
113
|
readonly roleName: string;
|
|
106
114
|
/**
|
|
107
115
|
* List of CIDR blocks; if set, specifies blocks of IP
|
|
@@ -172,6 +180,13 @@ export interface GetAuthBackendRoleOutputArgs {
|
|
|
172
180
|
* retrieve Role attributes for resides in. Defaults to "kubernetes".
|
|
173
181
|
*/
|
|
174
182
|
backend?: pulumi.Input<string>;
|
|
183
|
+
/**
|
|
184
|
+
* The namespace of the target resource.
|
|
185
|
+
* The value should not contain leading or trailing forward slashes.
|
|
186
|
+
* The `namespace` is always relative to the provider's configured namespace.
|
|
187
|
+
* *Available only for Vault Enterprise*.
|
|
188
|
+
*/
|
|
189
|
+
namespace?: pulumi.Input<string>;
|
|
175
190
|
/**
|
|
176
191
|
* The name of the role to retrieve the Role attributes for.
|
|
177
192
|
*/
|
|
@@ -18,6 +18,7 @@ function getAuthBackendRole(args, opts) {
|
|
|
18
18
|
return pulumi.runtime.invoke("vault:kubernetes/getAuthBackendRole:getAuthBackendRole", {
|
|
19
19
|
"audience": args.audience,
|
|
20
20
|
"backend": args.backend,
|
|
21
|
+
"namespace": args.namespace,
|
|
21
22
|
"roleName": args.roleName,
|
|
22
23
|
"tokenBoundCidrs": args.tokenBoundCidrs,
|
|
23
24
|
"tokenExplicitMaxTtl": args.tokenExplicitMaxTtl,
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getAuthBackendRole.js","sourceRoot":"","sources":["../../kubernetes/getAuthBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;GAIG;AACH,SAAgB,kBAAkB,CAAC,IAA4B,EAAE,IAA2B;IACxF,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,wDAAwD,EAAE;QACnF,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,iBAAiB,EAAE,IAAI,CAAC,eAAe;QACvC,qBAAqB,EAAE,IAAI,CAAC,mBAAmB;QAC/C,aAAa,EAAE,IAAI,CAAC,WAAW;QAC/B,sBAAsB,EAAE,IAAI,CAAC,oBAAoB;QACjD,cAAc,EAAE,IAAI,CAAC,YAAY;QACjC,aAAa,EAAE,IAAI,CAAC,WAAW;QAC/B,eAAe,EAAE,IAAI,CAAC,aAAa;QACnC,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,WAAW,EAAE,IAAI,CAAC,SAAS;KAC9B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;
|
|
1
|
+
{"version":3,"file":"getAuthBackendRole.js","sourceRoot":"","sources":["../../kubernetes/getAuthBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;GAIG;AACH,SAAgB,kBAAkB,CAAC,IAA4B,EAAE,IAA2B;IACxF,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,wDAAwD,EAAE;QACnF,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,WAAW,EAAE,IAAI,CAAC,SAAS;QAC3B,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,iBAAiB,EAAE,IAAI,CAAC,eAAe;QACvC,qBAAqB,EAAE,IAAI,CAAC,mBAAmB;QAC/C,aAAa,EAAE,IAAI,CAAC,WAAW;QAC/B,sBAAsB,EAAE,IAAI,CAAC,oBAAoB;QACjD,cAAc,EAAE,IAAI,CAAC,YAAY;QACjC,aAAa,EAAE,IAAI,CAAC,WAAW;QAC/B,eAAe,EAAE,IAAI,CAAC,aAAa;QACnC,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,WAAW,EAAE,IAAI,CAAC,SAAS;KAC9B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AArBD,gDAqBC;AAqKD,SAAgB,wBAAwB,CAAC,IAAkC,EAAE,IAA2B;IACpG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,kBAAkB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACtE,CAAC;AAFD,4DAEC"}
|
|
@@ -0,0 +1,156 @@
|
|
|
1
|
+
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
/**
|
|
3
|
+
* ## Example Usage
|
|
4
|
+
*
|
|
5
|
+
* ```typescript
|
|
6
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
7
|
+
* import * as fs from "fs";
|
|
8
|
+
* import * as vault from "@pulumi/vault";
|
|
9
|
+
*
|
|
10
|
+
* const config = new vault.kubernetes.SecretBackend("config", {
|
|
11
|
+
* path: "kubernetes",
|
|
12
|
+
* description: "kubernetes secrets engine description",
|
|
13
|
+
* kubernetesHost: "https://127.0.0.1:61233",
|
|
14
|
+
* kubernetesCaCert: fs.readFileSync("/path/to/cert"),
|
|
15
|
+
* serviceAccountJwt: fs.readFileSync("/path/to/token"),
|
|
16
|
+
* disableLocalCaJwt: false,
|
|
17
|
+
* });
|
|
18
|
+
* const role = new vault.kubernetes.SecretBackendRole("role", {
|
|
19
|
+
* backend: config.path,
|
|
20
|
+
* allowedKubernetesNamespaces: ["*"],
|
|
21
|
+
* tokenMaxTtl: 43200,
|
|
22
|
+
* tokenDefaultTtl: 21600,
|
|
23
|
+
* serviceAccountName: "test-service-account-with-generated-token",
|
|
24
|
+
* extraLabels: {
|
|
25
|
+
* id: "abc123",
|
|
26
|
+
* name: "some_name",
|
|
27
|
+
* },
|
|
28
|
+
* extraAnnotations: {
|
|
29
|
+
* env: "development",
|
|
30
|
+
* location: "earth",
|
|
31
|
+
* },
|
|
32
|
+
* });
|
|
33
|
+
* const token = vault.kubernetes.getServiceAccountTokenOutput({
|
|
34
|
+
* backend: config.path,
|
|
35
|
+
* role: role.name,
|
|
36
|
+
* kubernetesNamespace: "test",
|
|
37
|
+
* clusterRoleBinding: false,
|
|
38
|
+
* ttl: "1h",
|
|
39
|
+
* });
|
|
40
|
+
* ```
|
|
41
|
+
*/
|
|
42
|
+
export declare function getServiceAccountToken(args: GetServiceAccountTokenArgs, opts?: pulumi.InvokeOptions): Promise<GetServiceAccountTokenResult>;
|
|
43
|
+
/**
|
|
44
|
+
* A collection of arguments for invoking getServiceAccountToken.
|
|
45
|
+
*/
|
|
46
|
+
export interface GetServiceAccountTokenArgs {
|
|
47
|
+
/**
|
|
48
|
+
* The Kubernetes secret backend to generate service account
|
|
49
|
+
* tokens from.
|
|
50
|
+
*/
|
|
51
|
+
backend: string;
|
|
52
|
+
/**
|
|
53
|
+
* If true, generate a ClusterRoleBinding to grant
|
|
54
|
+
* permissions across the whole cluster instead of within a namespace.
|
|
55
|
+
*/
|
|
56
|
+
clusterRoleBinding?: boolean;
|
|
57
|
+
/**
|
|
58
|
+
* The name of the Kubernetes namespace in which to
|
|
59
|
+
* generate the credentials.
|
|
60
|
+
*/
|
|
61
|
+
kubernetesNamespace: string;
|
|
62
|
+
/**
|
|
63
|
+
* The namespace of the target resource.
|
|
64
|
+
* The value should not contain leading or trailing forward slashes.
|
|
65
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
66
|
+
* *Available only for Vault Enterprise*.
|
|
67
|
+
*/
|
|
68
|
+
namespace?: string;
|
|
69
|
+
/**
|
|
70
|
+
* The name of the Kubernetes secret backend role to generate service
|
|
71
|
+
* account tokens from.
|
|
72
|
+
*/
|
|
73
|
+
role: string;
|
|
74
|
+
/**
|
|
75
|
+
* The TTL of the generated Kubernetes service account token, specified in
|
|
76
|
+
* seconds or as a Go duration format string.
|
|
77
|
+
*/
|
|
78
|
+
ttl?: string;
|
|
79
|
+
}
|
|
80
|
+
/**
|
|
81
|
+
* A collection of values returned by getServiceAccountToken.
|
|
82
|
+
*/
|
|
83
|
+
export interface GetServiceAccountTokenResult {
|
|
84
|
+
readonly backend: string;
|
|
85
|
+
readonly clusterRoleBinding?: boolean;
|
|
86
|
+
/**
|
|
87
|
+
* The provider-assigned unique ID for this managed resource.
|
|
88
|
+
*/
|
|
89
|
+
readonly id: string;
|
|
90
|
+
readonly kubernetesNamespace: string;
|
|
91
|
+
/**
|
|
92
|
+
* The duration of the lease in seconds.
|
|
93
|
+
*/
|
|
94
|
+
readonly leaseDuration: number;
|
|
95
|
+
/**
|
|
96
|
+
* The lease identifier assigned by Vault.
|
|
97
|
+
*/
|
|
98
|
+
readonly leaseId: string;
|
|
99
|
+
/**
|
|
100
|
+
* True if the duration of this lease can be extended through renewal.
|
|
101
|
+
*/
|
|
102
|
+
readonly leaseRenewable: boolean;
|
|
103
|
+
readonly namespace?: string;
|
|
104
|
+
readonly role: string;
|
|
105
|
+
/**
|
|
106
|
+
* The name of the service account associated with the token.
|
|
107
|
+
*/
|
|
108
|
+
readonly serviceAccountName: string;
|
|
109
|
+
/**
|
|
110
|
+
* The Kubernetes namespace that the service account resides in.
|
|
111
|
+
*/
|
|
112
|
+
readonly serviceAccountNamespace: string;
|
|
113
|
+
/**
|
|
114
|
+
* The Kubernetes service account token.
|
|
115
|
+
*/
|
|
116
|
+
readonly serviceAccountToken: string;
|
|
117
|
+
readonly ttl?: string;
|
|
118
|
+
}
|
|
119
|
+
export declare function getServiceAccountTokenOutput(args: GetServiceAccountTokenOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output<GetServiceAccountTokenResult>;
|
|
120
|
+
/**
|
|
121
|
+
* A collection of arguments for invoking getServiceAccountToken.
|
|
122
|
+
*/
|
|
123
|
+
export interface GetServiceAccountTokenOutputArgs {
|
|
124
|
+
/**
|
|
125
|
+
* The Kubernetes secret backend to generate service account
|
|
126
|
+
* tokens from.
|
|
127
|
+
*/
|
|
128
|
+
backend: pulumi.Input<string>;
|
|
129
|
+
/**
|
|
130
|
+
* If true, generate a ClusterRoleBinding to grant
|
|
131
|
+
* permissions across the whole cluster instead of within a namespace.
|
|
132
|
+
*/
|
|
133
|
+
clusterRoleBinding?: pulumi.Input<boolean>;
|
|
134
|
+
/**
|
|
135
|
+
* The name of the Kubernetes namespace in which to
|
|
136
|
+
* generate the credentials.
|
|
137
|
+
*/
|
|
138
|
+
kubernetesNamespace: pulumi.Input<string>;
|
|
139
|
+
/**
|
|
140
|
+
* The namespace of the target resource.
|
|
141
|
+
* The value should not contain leading or trailing forward slashes.
|
|
142
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
143
|
+
* *Available only for Vault Enterprise*.
|
|
144
|
+
*/
|
|
145
|
+
namespace?: pulumi.Input<string>;
|
|
146
|
+
/**
|
|
147
|
+
* The name of the Kubernetes secret backend role to generate service
|
|
148
|
+
* account tokens from.
|
|
149
|
+
*/
|
|
150
|
+
role: pulumi.Input<string>;
|
|
151
|
+
/**
|
|
152
|
+
* The TTL of the generated Kubernetes service account token, specified in
|
|
153
|
+
* seconds or as a Go duration format string.
|
|
154
|
+
*/
|
|
155
|
+
ttl?: pulumi.Input<string>;
|
|
156
|
+
}
|
|
@@ -0,0 +1,67 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
|
+
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.getServiceAccountTokenOutput = exports.getServiceAccountToken = void 0;
|
|
6
|
+
const pulumi = require("@pulumi/pulumi");
|
|
7
|
+
const utilities = require("../utilities");
|
|
8
|
+
/**
|
|
9
|
+
* ## Example Usage
|
|
10
|
+
*
|
|
11
|
+
* ```typescript
|
|
12
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
13
|
+
* import * as fs from "fs";
|
|
14
|
+
* import * as vault from "@pulumi/vault";
|
|
15
|
+
*
|
|
16
|
+
* const config = new vault.kubernetes.SecretBackend("config", {
|
|
17
|
+
* path: "kubernetes",
|
|
18
|
+
* description: "kubernetes secrets engine description",
|
|
19
|
+
* kubernetesHost: "https://127.0.0.1:61233",
|
|
20
|
+
* kubernetesCaCert: fs.readFileSync("/path/to/cert"),
|
|
21
|
+
* serviceAccountJwt: fs.readFileSync("/path/to/token"),
|
|
22
|
+
* disableLocalCaJwt: false,
|
|
23
|
+
* });
|
|
24
|
+
* const role = new vault.kubernetes.SecretBackendRole("role", {
|
|
25
|
+
* backend: config.path,
|
|
26
|
+
* allowedKubernetesNamespaces: ["*"],
|
|
27
|
+
* tokenMaxTtl: 43200,
|
|
28
|
+
* tokenDefaultTtl: 21600,
|
|
29
|
+
* serviceAccountName: "test-service-account-with-generated-token",
|
|
30
|
+
* extraLabels: {
|
|
31
|
+
* id: "abc123",
|
|
32
|
+
* name: "some_name",
|
|
33
|
+
* },
|
|
34
|
+
* extraAnnotations: {
|
|
35
|
+
* env: "development",
|
|
36
|
+
* location: "earth",
|
|
37
|
+
* },
|
|
38
|
+
* });
|
|
39
|
+
* const token = vault.kubernetes.getServiceAccountTokenOutput({
|
|
40
|
+
* backend: config.path,
|
|
41
|
+
* role: role.name,
|
|
42
|
+
* kubernetesNamespace: "test",
|
|
43
|
+
* clusterRoleBinding: false,
|
|
44
|
+
* ttl: "1h",
|
|
45
|
+
* });
|
|
46
|
+
* ```
|
|
47
|
+
*/
|
|
48
|
+
function getServiceAccountToken(args, opts) {
|
|
49
|
+
if (!opts) {
|
|
50
|
+
opts = {};
|
|
51
|
+
}
|
|
52
|
+
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
53
|
+
return pulumi.runtime.invoke("vault:kubernetes/getServiceAccountToken:getServiceAccountToken", {
|
|
54
|
+
"backend": args.backend,
|
|
55
|
+
"clusterRoleBinding": args.clusterRoleBinding,
|
|
56
|
+
"kubernetesNamespace": args.kubernetesNamespace,
|
|
57
|
+
"namespace": args.namespace,
|
|
58
|
+
"role": args.role,
|
|
59
|
+
"ttl": args.ttl,
|
|
60
|
+
}, opts);
|
|
61
|
+
}
|
|
62
|
+
exports.getServiceAccountToken = getServiceAccountToken;
|
|
63
|
+
function getServiceAccountTokenOutput(args, opts) {
|
|
64
|
+
return pulumi.output(args).apply(a => getServiceAccountToken(a, opts));
|
|
65
|
+
}
|
|
66
|
+
exports.getServiceAccountTokenOutput = getServiceAccountTokenOutput;
|
|
67
|
+
//# sourceMappingURL=getServiceAccountToken.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"getServiceAccountToken.js","sourceRoot":"","sources":["../../kubernetes/getServiceAccountToken.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAuCG;AACH,SAAgB,sBAAsB,CAAC,IAAgC,EAAE,IAA2B;IAChG,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,gEAAgE,EAAE;QAC3F,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,oBAAoB,EAAE,IAAI,CAAC,kBAAkB;QAC7C,qBAAqB,EAAE,IAAI,CAAC,mBAAmB;QAC/C,WAAW,EAAE,IAAI,CAAC,SAAS;QAC3B,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,KAAK,EAAE,IAAI,CAAC,GAAG;KAClB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAdD,wDAcC;AAgFD,SAAgB,4BAA4B,CAAC,IAAsC,EAAE,IAA2B;IAC5G,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,sBAAsB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AAC1E,CAAC;AAFD,oEAEC"}
|
package/kubernetes/index.d.ts
CHANGED
|
@@ -1,4 +1,21 @@
|
|
|
1
|
-
export
|
|
2
|
-
export
|
|
3
|
-
export
|
|
4
|
-
export
|
|
1
|
+
export { AuthBackendConfigArgs, AuthBackendConfigState } from "./authBackendConfig";
|
|
2
|
+
export declare type AuthBackendConfig = import("./authBackendConfig").AuthBackendConfig;
|
|
3
|
+
export declare const AuthBackendConfig: typeof import("./authBackendConfig").AuthBackendConfig;
|
|
4
|
+
export { AuthBackendRoleArgs, AuthBackendRoleState } from "./authBackendRole";
|
|
5
|
+
export declare type AuthBackendRole = import("./authBackendRole").AuthBackendRole;
|
|
6
|
+
export declare const AuthBackendRole: typeof import("./authBackendRole").AuthBackendRole;
|
|
7
|
+
export { GetAuthBackendConfigArgs, GetAuthBackendConfigResult, GetAuthBackendConfigOutputArgs } from "./getAuthBackendConfig";
|
|
8
|
+
export declare const getAuthBackendConfig: typeof import("./getAuthBackendConfig").getAuthBackendConfig;
|
|
9
|
+
export declare const getAuthBackendConfigOutput: typeof import("./getAuthBackendConfig").getAuthBackendConfigOutput;
|
|
10
|
+
export { GetAuthBackendRoleArgs, GetAuthBackendRoleResult, GetAuthBackendRoleOutputArgs } from "./getAuthBackendRole";
|
|
11
|
+
export declare const getAuthBackendRole: typeof import("./getAuthBackendRole").getAuthBackendRole;
|
|
12
|
+
export declare const getAuthBackendRoleOutput: typeof import("./getAuthBackendRole").getAuthBackendRoleOutput;
|
|
13
|
+
export { GetServiceAccountTokenArgs, GetServiceAccountTokenResult, GetServiceAccountTokenOutputArgs } from "./getServiceAccountToken";
|
|
14
|
+
export declare const getServiceAccountToken: typeof import("./getServiceAccountToken").getServiceAccountToken;
|
|
15
|
+
export declare const getServiceAccountTokenOutput: typeof import("./getServiceAccountToken").getServiceAccountTokenOutput;
|
|
16
|
+
export { SecretBackendArgs, SecretBackendState } from "./secretBackend";
|
|
17
|
+
export declare type SecretBackend = import("./secretBackend").SecretBackend;
|
|
18
|
+
export declare const SecretBackend: typeof import("./secretBackend").SecretBackend;
|
|
19
|
+
export { SecretBackendRoleArgs, SecretBackendRoleState } from "./secretBackendRole";
|
|
20
|
+
export declare type SecretBackendRole = import("./secretBackendRole").SecretBackendRole;
|
|
21
|
+
export declare const SecretBackendRole: typeof import("./secretBackendRole").SecretBackendRole;
|
package/kubernetes/index.js
CHANGED
|
@@ -1,39 +1,39 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
3
|
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
-
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
5
|
-
if (k2 === undefined) k2 = k;
|
|
6
|
-
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
7
|
-
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
8
|
-
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
9
|
-
}
|
|
10
|
-
Object.defineProperty(o, k2, desc);
|
|
11
|
-
}) : (function(o, m, k, k2) {
|
|
12
|
-
if (k2 === undefined) k2 = k;
|
|
13
|
-
o[k2] = m[k];
|
|
14
|
-
}));
|
|
15
|
-
var __exportStar = (this && this.__exportStar) || function(m, exports) {
|
|
16
|
-
for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
|
|
17
|
-
};
|
|
18
4
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.SecretBackendRole = exports.SecretBackend = exports.getServiceAccountTokenOutput = exports.getServiceAccountToken = exports.getAuthBackendRoleOutput = exports.getAuthBackendRole = exports.getAuthBackendConfigOutput = exports.getAuthBackendConfig = exports.AuthBackendRole = exports.AuthBackendConfig = void 0;
|
|
19
6
|
const pulumi = require("@pulumi/pulumi");
|
|
20
7
|
const utilities = require("../utilities");
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
8
|
+
exports.AuthBackendConfig = null;
|
|
9
|
+
exports.AuthBackendRole = null;
|
|
10
|
+
exports.getAuthBackendConfig = null;
|
|
11
|
+
exports.getAuthBackendConfigOutput = null;
|
|
12
|
+
exports.getAuthBackendRole = null;
|
|
13
|
+
exports.getAuthBackendRoleOutput = null;
|
|
14
|
+
exports.getServiceAccountToken = null;
|
|
15
|
+
exports.getServiceAccountTokenOutput = null;
|
|
16
|
+
exports.SecretBackend = null;
|
|
17
|
+
exports.SecretBackendRole = null;
|
|
18
|
+
utilities.lazyLoad(exports, ["AuthBackendConfig"], () => require("./authBackendConfig"));
|
|
19
|
+
utilities.lazyLoad(exports, ["AuthBackendRole"], () => require("./authBackendRole"));
|
|
20
|
+
utilities.lazyLoad(exports, ["getAuthBackendConfig", "getAuthBackendConfigOutput"], () => require("./getAuthBackendConfig"));
|
|
21
|
+
utilities.lazyLoad(exports, ["getAuthBackendRole", "getAuthBackendRoleOutput"], () => require("./getAuthBackendRole"));
|
|
22
|
+
utilities.lazyLoad(exports, ["getServiceAccountToken", "getServiceAccountTokenOutput"], () => require("./getServiceAccountToken"));
|
|
23
|
+
utilities.lazyLoad(exports, ["SecretBackend"], () => require("./secretBackend"));
|
|
24
|
+
utilities.lazyLoad(exports, ["SecretBackendRole"], () => require("./secretBackendRole"));
|
|
29
25
|
const _module = {
|
|
30
26
|
version: utilities.getVersion(),
|
|
31
27
|
construct: (name, type, urn) => {
|
|
32
28
|
switch (type) {
|
|
33
29
|
case "vault:kubernetes/authBackendConfig:AuthBackendConfig":
|
|
34
|
-
return new
|
|
30
|
+
return new exports.AuthBackendConfig(name, undefined, { urn });
|
|
35
31
|
case "vault:kubernetes/authBackendRole:AuthBackendRole":
|
|
36
|
-
return new
|
|
32
|
+
return new exports.AuthBackendRole(name, undefined, { urn });
|
|
33
|
+
case "vault:kubernetes/secretBackend:SecretBackend":
|
|
34
|
+
return new exports.SecretBackend(name, undefined, { urn });
|
|
35
|
+
case "vault:kubernetes/secretBackendRole:SecretBackendRole":
|
|
36
|
+
return new exports.SecretBackendRole(name, undefined, { urn });
|
|
37
37
|
default:
|
|
38
38
|
throw new Error(`unknown resource type ${type}`);
|
|
39
39
|
}
|
|
@@ -41,4 +41,6 @@ const _module = {
|
|
|
41
41
|
};
|
|
42
42
|
pulumi.runtime.registerResourceModule("vault", "kubernetes/authBackendConfig", _module);
|
|
43
43
|
pulumi.runtime.registerResourceModule("vault", "kubernetes/authBackendRole", _module);
|
|
44
|
+
pulumi.runtime.registerResourceModule("vault", "kubernetes/secretBackend", _module);
|
|
45
|
+
pulumi.runtime.registerResourceModule("vault", "kubernetes/secretBackendRole", _module);
|
|
44
46
|
//# sourceMappingURL=index.js.map
|
package/kubernetes/index.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../kubernetes/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../kubernetes/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAK7B,QAAA,iBAAiB,GAA2D,IAAW,CAAC;AAIxF,QAAA,eAAe,GAAuD,IAAW,CAAC;AAGlF,QAAA,oBAAoB,GAAiE,IAAW,CAAC;AACjG,QAAA,0BAA0B,GAAuE,IAAW,CAAC;AAG7G,QAAA,kBAAkB,GAA6D,IAAW,CAAC;AAC3F,QAAA,wBAAwB,GAAmE,IAAW,CAAC;AAGvG,QAAA,sBAAsB,GAAqE,IAAW,CAAC;AACvG,QAAA,4BAA4B,GAA2E,IAAW,CAAC;AAInH,QAAA,aAAa,GAAmD,IAAW,CAAC;AAI5E,QAAA,iBAAiB,GAA2D,IAAW,CAAC;AAErG,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,mBAAmB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,qBAAqB,CAAC,CAAC,CAAC;AACzF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,iBAAiB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,mBAAmB,CAAC,CAAC,CAAC;AACrF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,sBAAsB,EAAC,4BAA4B,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,wBAAwB,CAAC,CAAC,CAAC;AAC5H,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,oBAAoB,EAAC,0BAA0B,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,sBAAsB,CAAC,CAAC,CAAC;AACtH,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,wBAAwB,EAAC,8BAA8B,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,0BAA0B,CAAC,CAAC,CAAC;AAClI,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,eAAe,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,iBAAiB,CAAC,CAAC,CAAC;AACjF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,mBAAmB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,qBAAqB,CAAC,CAAC,CAAC;AAEzF,MAAM,OAAO,GAAG;IACZ,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE;IAC/B,SAAS,EAAE,CAAC,IAAY,EAAE,IAAY,EAAE,GAAW,EAAmB,EAAE;QACpE,QAAQ,IAAI,EAAE;YACV,KAAK,sDAAsD;gBACvD,OAAO,IAAI,yBAAiB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC/D,KAAK,kDAAkD;gBACnD,OAAO,IAAI,uBAAe,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC7D,KAAK,8CAA8C;gBAC/C,OAAO,IAAI,qBAAa,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC3D,KAAK,sDAAsD;gBACvD,OAAO,IAAI,yBAAiB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC/D;gBACI,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,EAAE,CAAC,CAAC;SACxD;IACL,CAAC;CACJ,CAAC;AACF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,8BAA8B,EAAE,OAAO,CAAC,CAAA;AACvF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,4BAA4B,EAAE,OAAO,CAAC,CAAA;AACrF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,0BAA0B,EAAE,OAAO,CAAC,CAAA;AACnF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,8BAA8B,EAAE,OAAO,CAAC,CAAA"}
|