@pulumi/vault 5.6.0 → 5.7.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (515) hide show
  1. package/ad/getAccessCredentials.d.ts +15 -0
  2. package/ad/getAccessCredentials.js +1 -0
  3. package/ad/getAccessCredentials.js.map +1 -1
  4. package/ad/index.d.ts +12 -4
  5. package/ad/index.js +13 -26
  6. package/ad/index.js.map +1 -1
  7. package/ad/secretBackend.d.ts +39 -0
  8. package/ad/secretBackend.js +9 -3
  9. package/ad/secretBackend.js.map +1 -1
  10. package/ad/secretLibrary.d.ts +21 -0
  11. package/ad/secretLibrary.js +2 -0
  12. package/ad/secretLibrary.js.map +1 -1
  13. package/ad/secretRole.d.ts +21 -0
  14. package/ad/secretRole.js +2 -0
  15. package/ad/secretRole.js.map +1 -1
  16. package/alicloud/authBackendRole.d.ts +21 -0
  17. package/alicloud/authBackendRole.js +2 -0
  18. package/alicloud/authBackendRole.js.map +1 -1
  19. package/alicloud/index.d.ts +3 -1
  20. package/alicloud/index.js +4 -19
  21. package/alicloud/index.js.map +1 -1
  22. package/approle/authBackendLogin.d.ts +22 -1
  23. package/approle/authBackendLogin.js +3 -1
  24. package/approle/authBackendLogin.js.map +1 -1
  25. package/approle/authBackendRole.d.ts +21 -0
  26. package/approle/authBackendRole.js +2 -0
  27. package/approle/authBackendRole.js.map +1 -1
  28. package/approle/{authBackendRoleSecretID.d.ts → authBackendRoleSecretId.d.ts} +33 -12
  29. package/approle/{authBackendRoleSecretID.js → authBackendRoleSecretId.js} +16 -12
  30. package/approle/authBackendRoleSecretId.js.map +1 -0
  31. package/approle/getAuthBackendRoleId.d.ts +15 -0
  32. package/approle/getAuthBackendRoleId.js +1 -0
  33. package/approle/getAuthBackendRoleId.js.map +1 -1
  34. package/approle/index.d.ts +12 -4
  35. package/approle/index.js +15 -28
  36. package/approle/index.js.map +1 -1
  37. package/audit.d.ts +21 -0
  38. package/audit.js +2 -0
  39. package/audit.js.map +1 -1
  40. package/authBackend.d.ts +47 -10
  41. package/authBackend.js +4 -0
  42. package/authBackend.js.map +1 -1
  43. package/aws/authBackendCert.d.ts +21 -0
  44. package/aws/authBackendCert.js +2 -0
  45. package/aws/authBackendCert.js.map +1 -1
  46. package/aws/authBackendClient.d.ts +21 -0
  47. package/aws/authBackendClient.js +6 -2
  48. package/aws/authBackendClient.js.map +1 -1
  49. package/aws/authBackendIdentityWhitelist.d.ts +21 -0
  50. package/aws/authBackendIdentityWhitelist.js +2 -0
  51. package/aws/authBackendIdentityWhitelist.js.map +1 -1
  52. package/aws/authBackendLogin.d.ts +21 -0
  53. package/aws/authBackendLogin.js +4 -0
  54. package/aws/authBackendLogin.js.map +1 -1
  55. package/aws/authBackendRole.d.ts +21 -0
  56. package/aws/authBackendRole.js +2 -0
  57. package/aws/authBackendRole.js.map +1 -1
  58. package/aws/authBackendRoleTag.d.ts +21 -0
  59. package/aws/authBackendRoleTag.js +2 -0
  60. package/aws/authBackendRoleTag.js.map +1 -1
  61. package/aws/authBackendRoletagBlacklist.d.ts +21 -0
  62. package/aws/authBackendRoletagBlacklist.js +2 -0
  63. package/aws/authBackendRoletagBlacklist.js.map +1 -1
  64. package/aws/authBackendStsRole.d.ts +21 -0
  65. package/aws/authBackendStsRole.js +2 -0
  66. package/aws/authBackendStsRole.js.map +1 -1
  67. package/aws/getAccessCredentials.d.ts +15 -0
  68. package/aws/getAccessCredentials.js +1 -0
  69. package/aws/getAccessCredentials.js.map +1 -1
  70. package/aws/index.d.ts +33 -11
  71. package/aws/index.js +34 -47
  72. package/aws/index.js.map +1 -1
  73. package/aws/secretBackend.d.ts +36 -12
  74. package/aws/secretBackend.js +8 -14
  75. package/aws/secretBackend.js.map +1 -1
  76. package/aws/secretBackendRole.d.ts +21 -0
  77. package/aws/secretBackendRole.js +2 -0
  78. package/aws/secretBackendRole.js.map +1 -1
  79. package/azure/authBackendConfig.d.ts +21 -0
  80. package/azure/authBackendConfig.js +7 -3
  81. package/azure/authBackendConfig.js.map +1 -1
  82. package/azure/authBackendRole.d.ts +21 -0
  83. package/azure/authBackendRole.js +2 -0
  84. package/azure/authBackendRole.js.map +1 -1
  85. package/azure/backend.d.ts +36 -0
  86. package/azure/backend.js +10 -4
  87. package/azure/backend.js.map +1 -1
  88. package/azure/backendRole.d.ts +23 -1
  89. package/azure/backendRole.js +2 -0
  90. package/azure/backendRole.js.map +1 -1
  91. package/azure/getAccessCredentials.d.ts +15 -0
  92. package/azure/getAccessCredentials.js +1 -0
  93. package/azure/getAccessCredentials.js.map +1 -1
  94. package/azure/index.d.ts +15 -5
  95. package/azure/index.js +16 -29
  96. package/azure/index.js.map +1 -1
  97. package/certAuthBackendRole.d.ts +39 -3
  98. package/certAuthBackendRole.js +4 -0
  99. package/certAuthBackendRole.js.map +1 -1
  100. package/config/vars.d.ts +43 -3
  101. package/config/vars.js +64 -4
  102. package/config/vars.js.map +1 -1
  103. package/consul/index.d.ts +6 -2
  104. package/consul/index.js +7 -22
  105. package/consul/index.js.map +1 -1
  106. package/consul/secretBackend.d.ts +87 -15
  107. package/consul/secretBackend.js +24 -7
  108. package/consul/secretBackend.js.map +1 -1
  109. package/consul/secretBackendRole.d.ts +93 -10
  110. package/consul/secretBackendRole.js +14 -1
  111. package/consul/secretBackendRole.js.map +1 -1
  112. package/database/index.d.ts +12 -4
  113. package/database/index.js +13 -28
  114. package/database/index.js.map +1 -1
  115. package/database/secretBackendConnection.d.ts +35 -1
  116. package/database/secretBackendConnection.js +4 -0
  117. package/database/secretBackendConnection.js.map +1 -1
  118. package/database/secretBackendRole.d.ts +21 -0
  119. package/database/secretBackendRole.js +2 -0
  120. package/database/secretBackendRole.js.map +1 -1
  121. package/database/secretBackendStaticRole.d.ts +21 -0
  122. package/database/secretBackendStaticRole.js +2 -0
  123. package/database/secretBackendStaticRole.js.map +1 -1
  124. package/database/secretsMount.d.ts +41 -1
  125. package/database/secretsMount.js +6 -0
  126. package/database/secretsMount.js.map +1 -1
  127. package/egpPolicy.d.ts +21 -0
  128. package/egpPolicy.js +2 -0
  129. package/egpPolicy.js.map +1 -1
  130. package/gcp/authBackend.d.ts +71 -1
  131. package/gcp/authBackend.js +18 -2
  132. package/gcp/authBackend.js.map +1 -1
  133. package/gcp/authBackendRole.d.ts +21 -0
  134. package/gcp/authBackendRole.js +2 -0
  135. package/gcp/authBackendRole.js.map +1 -1
  136. package/gcp/getAuthBackendRole.d.ts +15 -0
  137. package/gcp/getAuthBackendRole.js +1 -0
  138. package/gcp/getAuthBackendRole.js.map +1 -1
  139. package/gcp/index.d.ts +18 -6
  140. package/gcp/index.js +19 -32
  141. package/gcp/index.js.map +1 -1
  142. package/gcp/secretBackend.d.ts +36 -0
  143. package/gcp/secretBackend.js +7 -1
  144. package/gcp/secretBackend.js.map +1 -1
  145. package/gcp/secretRoleset.d.ts +23 -1
  146. package/gcp/secretRoleset.js +2 -0
  147. package/gcp/secretRoleset.js.map +1 -1
  148. package/gcp/secretStaticAccount.d.ts +23 -1
  149. package/gcp/secretStaticAccount.js +2 -0
  150. package/gcp/secretStaticAccount.js.map +1 -1
  151. package/generic/endpoint.d.ts +21 -0
  152. package/generic/endpoint.js +5 -1
  153. package/generic/endpoint.js.map +1 -1
  154. package/generic/getSecret.d.ts +15 -0
  155. package/generic/getSecret.js +1 -0
  156. package/generic/getSecret.js.map +1 -1
  157. package/generic/index.d.ts +9 -3
  158. package/generic/index.js +10 -23
  159. package/generic/index.js.map +1 -1
  160. package/generic/secret.d.ts +21 -0
  161. package/generic/secret.js +5 -1
  162. package/generic/secret.js.map +1 -1
  163. package/getAuthBackend.d.ts +16 -1
  164. package/getAuthBackend.js +1 -0
  165. package/getAuthBackend.js.map +1 -1
  166. package/getNomadAccessToken.d.ts +15 -0
  167. package/getNomadAccessToken.js +1 -0
  168. package/getNomadAccessToken.js.map +1 -1
  169. package/getPolicyDocument.d.ts +5 -1
  170. package/getPolicyDocument.js +1 -0
  171. package/getPolicyDocument.js.map +1 -1
  172. package/github/authBackend.d.ts +38 -1
  173. package/github/authBackend.js +4 -0
  174. package/github/authBackend.js.map +1 -1
  175. package/github/index.d.ts +9 -3
  176. package/github/index.js +10 -25
  177. package/github/index.js.map +1 -1
  178. package/github/team.d.ts +21 -0
  179. package/github/team.js +2 -0
  180. package/github/team.js.map +1 -1
  181. package/github/user.d.ts +21 -0
  182. package/github/user.js +2 -0
  183. package/github/user.js.map +1 -1
  184. package/identity/entity.d.ts +21 -0
  185. package/identity/entity.js +2 -0
  186. package/identity/entity.js.map +1 -1
  187. package/identity/entityAlias.d.ts +21 -0
  188. package/identity/entityAlias.js +2 -0
  189. package/identity/entityAlias.js.map +1 -1
  190. package/identity/entityPolicies.d.ts +21 -0
  191. package/identity/entityPolicies.js +2 -0
  192. package/identity/entityPolicies.js.map +1 -1
  193. package/identity/getEntity.d.ts +16 -1
  194. package/identity/getEntity.js +1 -0
  195. package/identity/getEntity.js.map +1 -1
  196. package/identity/getGroup.d.ts +15 -0
  197. package/identity/getGroup.js +1 -0
  198. package/identity/getGroup.js.map +1 -1
  199. package/identity/getOidcClientCreds.d.ts +15 -0
  200. package/identity/getOidcClientCreds.js +1 -0
  201. package/identity/getOidcClientCreds.js.map +1 -1
  202. package/identity/getOidcOpenidConfig.d.ts +15 -0
  203. package/identity/getOidcOpenidConfig.js +1 -0
  204. package/identity/getOidcOpenidConfig.js.map +1 -1
  205. package/identity/getOidcPublicKeys.d.ts +15 -0
  206. package/identity/getOidcPublicKeys.js +1 -0
  207. package/identity/getOidcPublicKeys.js.map +1 -1
  208. package/identity/group.d.ts +21 -0
  209. package/identity/group.js +2 -0
  210. package/identity/group.js.map +1 -1
  211. package/identity/groupAlias.d.ts +21 -0
  212. package/identity/groupAlias.js +2 -0
  213. package/identity/groupAlias.js.map +1 -1
  214. package/identity/groupMemberEntityIds.d.ts +21 -0
  215. package/identity/groupMemberEntityIds.js +2 -0
  216. package/identity/groupMemberEntityIds.js.map +1 -1
  217. package/identity/groupPolicies.d.ts +21 -0
  218. package/identity/groupPolicies.js +2 -0
  219. package/identity/groupPolicies.js.map +1 -1
  220. package/identity/index.d.ts +75 -20
  221. package/identity/index.js +86 -66
  222. package/identity/index.js.map +1 -1
  223. package/identity/mfaDuo.d.ts +200 -0
  224. package/identity/mfaDuo.js +110 -0
  225. package/identity/mfaDuo.js.map +1 -0
  226. package/identity/mfaLoginEnforcement.d.ts +170 -0
  227. package/identity/mfaLoginEnforcement.js +96 -0
  228. package/identity/mfaLoginEnforcement.js.map +1 -0
  229. package/identity/mfaOkta.d.ts +188 -0
  230. package/identity/mfaOkta.js +105 -0
  231. package/identity/mfaOkta.js.map +1 -0
  232. package/identity/mfaPingid.d.ts +190 -0
  233. package/identity/mfaPingid.js +102 -0
  234. package/identity/mfaPingid.js.map +1 -0
  235. package/identity/mfaTotp.d.ts +218 -0
  236. package/identity/mfaTotp.js +104 -0
  237. package/identity/mfaTotp.js.map +1 -0
  238. package/identity/oidc.d.ts +21 -0
  239. package/identity/oidc.js +2 -0
  240. package/identity/oidc.js.map +1 -1
  241. package/identity/oidcAssignment.d.ts +23 -2
  242. package/identity/oidcAssignment.js +4 -2
  243. package/identity/oidcAssignment.js.map +1 -1
  244. package/identity/oidcClient.d.ts +21 -0
  245. package/identity/oidcClient.js +4 -0
  246. package/identity/oidcClient.js.map +1 -1
  247. package/identity/oidcKey.d.ts +21 -0
  248. package/identity/oidcKey.js +2 -0
  249. package/identity/oidcKey.js.map +1 -1
  250. package/identity/oidcKeyAllowedClientID.d.ts +21 -0
  251. package/identity/oidcKeyAllowedClientID.js +2 -0
  252. package/identity/oidcKeyAllowedClientID.js.map +1 -1
  253. package/identity/oidcProvider.d.ts +21 -0
  254. package/identity/oidcProvider.js +2 -0
  255. package/identity/oidcProvider.js.map +1 -1
  256. package/identity/oidcRole.d.ts +21 -0
  257. package/identity/oidcRole.js +2 -0
  258. package/identity/oidcRole.js.map +1 -1
  259. package/identity/oidcScope.d.ts +22 -3
  260. package/identity/oidcScope.js +3 -3
  261. package/identity/oidcScope.js.map +1 -1
  262. package/index.d.ts +75 -25
  263. package/index.js +78 -83
  264. package/index.js.map +1 -1
  265. package/jwt/authBackend.d.ts +38 -1
  266. package/jwt/authBackend.js +7 -1
  267. package/jwt/authBackend.js.map +1 -1
  268. package/jwt/authBackendRole.d.ts +57 -0
  269. package/jwt/authBackendRole.js +6 -0
  270. package/jwt/authBackendRole.js.map +1 -1
  271. package/jwt/index.d.ts +6 -2
  272. package/jwt/index.js +7 -22
  273. package/jwt/index.js.map +1 -1
  274. package/kmip/index.d.ts +9 -3
  275. package/kmip/index.js +10 -25
  276. package/kmip/index.js.map +1 -1
  277. package/kmip/secretBackend.d.ts +36 -0
  278. package/kmip/secretBackend.js +4 -0
  279. package/kmip/secretBackend.js.map +1 -1
  280. package/kmip/secretRole.d.ts +21 -0
  281. package/kmip/secretRole.js +2 -0
  282. package/kmip/secretRole.js.map +1 -1
  283. package/kmip/secretScope.d.ts +21 -0
  284. package/kmip/secretScope.js +2 -0
  285. package/kmip/secretScope.js.map +1 -1
  286. package/kubernetes/authBackendConfig.d.ts +21 -0
  287. package/kubernetes/authBackendConfig.js +5 -1
  288. package/kubernetes/authBackendConfig.js.map +1 -1
  289. package/kubernetes/authBackendRole.d.ts +21 -0
  290. package/kubernetes/authBackendRole.js +2 -0
  291. package/kubernetes/authBackendRole.js.map +1 -1
  292. package/kubernetes/getAuthBackendConfig.d.ts +15 -0
  293. package/kubernetes/getAuthBackendConfig.js +1 -0
  294. package/kubernetes/getAuthBackendConfig.js.map +1 -1
  295. package/kubernetes/getAuthBackendRole.d.ts +15 -0
  296. package/kubernetes/getAuthBackendRole.js +1 -0
  297. package/kubernetes/getAuthBackendRole.js.map +1 -1
  298. package/kubernetes/getServiceAccountToken.d.ts +156 -0
  299. package/kubernetes/getServiceAccountToken.js +67 -0
  300. package/kubernetes/getServiceAccountToken.js.map +1 -0
  301. package/kubernetes/index.d.ts +21 -4
  302. package/kubernetes/index.js +26 -24
  303. package/kubernetes/index.js.map +1 -1
  304. package/kubernetes/secretBackend.d.ts +303 -0
  305. package/kubernetes/secretBackend.js +114 -0
  306. package/kubernetes/secretBackend.js.map +1 -0
  307. package/kubernetes/secretBackendRole.d.ts +367 -0
  308. package/kubernetes/secretBackendRole.js +191 -0
  309. package/kubernetes/secretBackendRole.js.map +1 -0
  310. package/kv/getSecret.d.ts +104 -0
  311. package/kv/getSecret.js +53 -0
  312. package/kv/getSecret.js.map +1 -0
  313. package/kv/getSecretSubkeysV2.d.ts +132 -0
  314. package/kv/getSecretSubkeysV2.js +57 -0
  315. package/kv/getSecretSubkeysV2.js.map +1 -0
  316. package/kv/getSecretV2.d.ts +139 -0
  317. package/kv/getSecretV2.js +58 -0
  318. package/kv/getSecretV2.js.map +1 -0
  319. package/kv/getSecretsList.d.ts +85 -0
  320. package/kv/getSecretsList.js +58 -0
  321. package/kv/getSecretsList.js.map +1 -0
  322. package/kv/getSecretsListV2.d.ts +114 -0
  323. package/kv/getSecretsListV2.js +69 -0
  324. package/kv/getSecretsListV2.js.map +1 -0
  325. package/kv/index.d.ts +24 -0
  326. package/kv/index.js +47 -0
  327. package/kv/index.js.map +1 -0
  328. package/kv/secret.d.ts +145 -0
  329. package/kv/secret.js +106 -0
  330. package/kv/secret.js.map +1 -0
  331. package/kv/secretBackendV2.d.ts +154 -0
  332. package/kv/secretBackendV2.js +103 -0
  333. package/kv/secretBackendV2.js.map +1 -0
  334. package/kv/secretV2.d.ts +257 -0
  335. package/kv/secretV2.js +122 -0
  336. package/kv/secretV2.js.map +1 -0
  337. package/ldap/authBackend.d.ts +48 -0
  338. package/ldap/authBackend.js +10 -2
  339. package/ldap/authBackend.js.map +1 -1
  340. package/ldap/authBackendGroup.d.ts +21 -0
  341. package/ldap/authBackendGroup.js +2 -0
  342. package/ldap/authBackendGroup.js.map +1 -1
  343. package/ldap/authBackendUser.d.ts +21 -0
  344. package/ldap/authBackendUser.js +2 -0
  345. package/ldap/authBackendUser.js.map +1 -1
  346. package/ldap/index.d.ts +9 -3
  347. package/ldap/index.js +10 -25
  348. package/ldap/index.js.map +1 -1
  349. package/managed/index.d.ts +3 -0
  350. package/managed/index.js +22 -0
  351. package/managed/index.js.map +1 -0
  352. package/managed/keys.d.ts +104 -0
  353. package/managed/keys.js +64 -0
  354. package/managed/keys.js.map +1 -0
  355. package/mfaDuo.d.ts +21 -0
  356. package/mfaDuo.js +6 -2
  357. package/mfaDuo.js.map +1 -1
  358. package/mfaOkta.d.ts +21 -0
  359. package/mfaOkta.js +5 -1
  360. package/mfaOkta.js.map +1 -1
  361. package/mfaPingid.d.ts +21 -0
  362. package/mfaPingid.js +2 -0
  363. package/mfaPingid.js.map +1 -1
  364. package/mfaTotp.d.ts +21 -0
  365. package/mfaTotp.js +2 -0
  366. package/mfaTotp.js.map +1 -1
  367. package/mount.d.ts +33 -0
  368. package/mount.js +4 -0
  369. package/mount.js.map +1 -1
  370. package/namespace.d.ts +32 -18
  371. package/namespace.js +5 -16
  372. package/namespace.js.map +1 -1
  373. package/nomadSecretBackend.d.ts +36 -0
  374. package/nomadSecretBackend.js +9 -3
  375. package/nomadSecretBackend.js.map +1 -1
  376. package/nomadSecretRole.d.ts +21 -0
  377. package/nomadSecretRole.js +2 -0
  378. package/nomadSecretRole.js.map +1 -1
  379. package/okta/authBackend.d.ts +38 -1
  380. package/okta/authBackend.js +7 -1
  381. package/okta/authBackend.js.map +1 -1
  382. package/okta/authBackendGroup.d.ts +21 -0
  383. package/okta/authBackendGroup.js +2 -0
  384. package/okta/authBackendGroup.js.map +1 -1
  385. package/okta/authBackendUser.d.ts +21 -0
  386. package/okta/authBackendUser.js +2 -0
  387. package/okta/authBackendUser.js.map +1 -1
  388. package/okta/index.d.ts +9 -3
  389. package/okta/index.js +10 -25
  390. package/okta/index.js.map +1 -1
  391. package/package.json +2 -2
  392. package/package.json.dev +2 -2
  393. package/passwordPolicy.d.ts +21 -0
  394. package/passwordPolicy.js +2 -0
  395. package/passwordPolicy.js.map +1 -1
  396. package/pkisecret/index.d.ts +30 -10
  397. package/pkisecret/index.js +31 -46
  398. package/pkisecret/index.js.map +1 -1
  399. package/pkisecret/secretBackendCert.d.ts +29 -0
  400. package/pkisecret/secretBackendCert.js +6 -0
  401. package/pkisecret/secretBackendCert.js.map +1 -1
  402. package/pkisecret/secretBackendConfigCa.d.ts +21 -0
  403. package/pkisecret/secretBackendConfigCa.js +5 -1
  404. package/pkisecret/secretBackendConfigCa.js.map +1 -1
  405. package/pkisecret/secretBackendConfigUrls.d.ts +21 -0
  406. package/pkisecret/secretBackendConfigUrls.js +2 -0
  407. package/pkisecret/secretBackendConfigUrls.js.map +1 -1
  408. package/pkisecret/secretBackendCrlConfig.d.ts +21 -0
  409. package/pkisecret/secretBackendCrlConfig.js +2 -0
  410. package/pkisecret/secretBackendCrlConfig.js.map +1 -1
  411. package/pkisecret/secretBackendIntermediateCertRequest.d.ts +54 -0
  412. package/pkisecret/secretBackendIntermediateCertRequest.js +8 -0
  413. package/pkisecret/secretBackendIntermediateCertRequest.js.map +1 -1
  414. package/pkisecret/secretBackendIntermediateSetSigned.d.ts +21 -0
  415. package/pkisecret/secretBackendIntermediateSetSigned.js +2 -0
  416. package/pkisecret/secretBackendIntermediateSetSigned.js.map +1 -1
  417. package/pkisecret/secretBackendRole.d.ts +24 -3
  418. package/pkisecret/secretBackendRole.js +2 -0
  419. package/pkisecret/secretBackendRole.js.map +1 -1
  420. package/pkisecret/secretBackendRootCert.d.ts +57 -3
  421. package/pkisecret/secretBackendRootCert.js +6 -0
  422. package/pkisecret/secretBackendRootCert.js.map +1 -1
  423. package/pkisecret/secretBackendRootSignIntermediate.d.ts +21 -0
  424. package/pkisecret/secretBackendRootSignIntermediate.js +2 -0
  425. package/pkisecret/secretBackendRootSignIntermediate.js.map +1 -1
  426. package/pkisecret/secretBackendSign.d.ts +29 -0
  427. package/pkisecret/secretBackendSign.js +4 -0
  428. package/pkisecret/secretBackendSign.js.map +1 -1
  429. package/policy.d.ts +21 -0
  430. package/policy.js +2 -0
  431. package/policy.js.map +1 -1
  432. package/provider.d.ts +43 -3
  433. package/provider.js +12 -2
  434. package/provider.js.map +1 -1
  435. package/quotaLeaseCount.d.ts +21 -0
  436. package/quotaLeaseCount.js +2 -0
  437. package/quotaLeaseCount.js.map +1 -1
  438. package/quotaRateLimit.d.ts +48 -0
  439. package/quotaRateLimit.js +6 -0
  440. package/quotaRateLimit.js.map +1 -1
  441. package/rabbitmq/index.d.ts +6 -2
  442. package/rabbitmq/index.js +7 -22
  443. package/rabbitmq/index.js.map +1 -1
  444. package/rabbitmq/secretBackend.d.ts +36 -0
  445. package/rabbitmq/secretBackend.js +8 -2
  446. package/rabbitmq/secretBackend.js.map +1 -1
  447. package/rabbitmq/secretBackendRole.d.ts +23 -1
  448. package/rabbitmq/secretBackendRole.js +2 -0
  449. package/rabbitmq/secretBackendRole.js.map +1 -1
  450. package/raftAutopilot.d.ts +21 -0
  451. package/raftAutopilot.js +2 -0
  452. package/raftAutopilot.js.map +1 -1
  453. package/raftSnapshotAgentConfig.d.ts +62 -0
  454. package/raftSnapshotAgentConfig.js +43 -0
  455. package/raftSnapshotAgentConfig.js.map +1 -1
  456. package/rgpPolicy.d.ts +21 -0
  457. package/rgpPolicy.js +2 -0
  458. package/rgpPolicy.js.map +1 -1
  459. package/ssh/index.d.ts +6 -2
  460. package/ssh/index.js +7 -22
  461. package/ssh/index.js.map +1 -1
  462. package/ssh/secretBackendCa.d.ts +29 -0
  463. package/ssh/secretBackendCa.js +13 -1
  464. package/ssh/secretBackendCa.js.map +1 -1
  465. package/ssh/secretBackendRole.d.ts +23 -1
  466. package/ssh/secretBackendRole.js +2 -0
  467. package/ssh/secretBackendRole.js.map +1 -1
  468. package/terraformcloud/index.d.ts +9 -3
  469. package/terraformcloud/index.js +10 -25
  470. package/terraformcloud/index.js.map +1 -1
  471. package/terraformcloud/secretBackend.d.ts +36 -0
  472. package/terraformcloud/secretBackend.js +7 -1
  473. package/terraformcloud/secretBackend.js.map +1 -1
  474. package/terraformcloud/secretCreds.d.ts +21 -0
  475. package/terraformcloud/secretCreds.js +4 -0
  476. package/terraformcloud/secretCreds.js.map +1 -1
  477. package/terraformcloud/secretRole.d.ts +21 -0
  478. package/terraformcloud/secretRole.js +2 -0
  479. package/terraformcloud/secretRole.js.map +1 -1
  480. package/token.d.ts +42 -0
  481. package/token.js +9 -0
  482. package/token.js.map +1 -1
  483. package/tokenauth/authBackendRole.d.ts +21 -0
  484. package/tokenauth/authBackendRole.js +2 -0
  485. package/tokenauth/authBackendRole.js.map +1 -1
  486. package/tokenauth/index.d.ts +3 -1
  487. package/tokenauth/index.js +4 -19
  488. package/tokenauth/index.js.map +1 -1
  489. package/transform/index.d.ts +18 -6
  490. package/transform/index.js +19 -30
  491. package/transform/index.js.map +1 -1
  492. package/transform/transformation.d.ts +0 -25
  493. package/transform/transformation.js +0 -25
  494. package/transform/transformation.js.map +1 -1
  495. package/transit/getDecrypt.d.ts +3 -0
  496. package/transit/getDecrypt.js +1 -0
  497. package/transit/getDecrypt.js.map +1 -1
  498. package/transit/getEncrypt.d.ts +3 -0
  499. package/transit/getEncrypt.js +1 -0
  500. package/transit/getEncrypt.js.map +1 -1
  501. package/transit/index.d.ts +12 -4
  502. package/transit/index.js +13 -24
  503. package/transit/index.js.map +1 -1
  504. package/transit/secretBackendKey.d.ts +21 -0
  505. package/transit/secretBackendKey.js +2 -0
  506. package/transit/secretBackendKey.js.map +1 -1
  507. package/transit/secretCacheConfig.d.ts +21 -0
  508. package/transit/secretCacheConfig.js +2 -0
  509. package/transit/secretCacheConfig.js.map +1 -1
  510. package/types/index.js.map +1 -1
  511. package/types/input.d.ts +408 -4
  512. package/types/output.d.ts +409 -5
  513. package/utilities.js +13 -1
  514. package/utilities.js.map +1 -1
  515. package/approle/authBackendRoleSecretID.js.map +0 -1
@@ -18,6 +18,13 @@ export interface GetAuthBackendRoleArgs {
18
18
  * retrieve Role attributes for resides in. Defaults to "kubernetes".
19
19
  */
20
20
  backend?: string;
21
+ /**
22
+ * The namespace of the target resource.
23
+ * The value should not contain leading or trailing forward slashes.
24
+ * The `namespace` is always relative to the provider's configured namespace.
25
+ * *Available only for Vault Enterprise*.
26
+ */
27
+ namespace?: string;
21
28
  /**
22
29
  * The name of the role to retrieve the Role attributes for.
23
30
  */
@@ -102,6 +109,7 @@ export interface GetAuthBackendRoleResult {
102
109
  * The provider-assigned unique ID for this managed resource.
103
110
  */
104
111
  readonly id: string;
112
+ readonly namespace?: string;
105
113
  readonly roleName: string;
106
114
  /**
107
115
  * List of CIDR blocks; if set, specifies blocks of IP
@@ -172,6 +180,13 @@ export interface GetAuthBackendRoleOutputArgs {
172
180
  * retrieve Role attributes for resides in. Defaults to "kubernetes".
173
181
  */
174
182
  backend?: pulumi.Input<string>;
183
+ /**
184
+ * The namespace of the target resource.
185
+ * The value should not contain leading or trailing forward slashes.
186
+ * The `namespace` is always relative to the provider's configured namespace.
187
+ * *Available only for Vault Enterprise*.
188
+ */
189
+ namespace?: pulumi.Input<string>;
175
190
  /**
176
191
  * The name of the role to retrieve the Role attributes for.
177
192
  */
@@ -18,6 +18,7 @@ function getAuthBackendRole(args, opts) {
18
18
  return pulumi.runtime.invoke("vault:kubernetes/getAuthBackendRole:getAuthBackendRole", {
19
19
  "audience": args.audience,
20
20
  "backend": args.backend,
21
+ "namespace": args.namespace,
21
22
  "roleName": args.roleName,
22
23
  "tokenBoundCidrs": args.tokenBoundCidrs,
23
24
  "tokenExplicitMaxTtl": args.tokenExplicitMaxTtl,
@@ -1 +1 @@
1
- {"version":3,"file":"getAuthBackendRole.js","sourceRoot":"","sources":["../../kubernetes/getAuthBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;GAIG;AACH,SAAgB,kBAAkB,CAAC,IAA4B,EAAE,IAA2B;IACxF,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,wDAAwD,EAAE;QACnF,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,iBAAiB,EAAE,IAAI,CAAC,eAAe;QACvC,qBAAqB,EAAE,IAAI,CAAC,mBAAmB;QAC/C,aAAa,EAAE,IAAI,CAAC,WAAW;QAC/B,sBAAsB,EAAE,IAAI,CAAC,oBAAoB;QACjD,cAAc,EAAE,IAAI,CAAC,YAAY;QACjC,aAAa,EAAE,IAAI,CAAC,WAAW;QAC/B,eAAe,EAAE,IAAI,CAAC,aAAa;QACnC,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,WAAW,EAAE,IAAI,CAAC,SAAS;KAC9B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AApBD,gDAoBC;AA6JD,SAAgB,wBAAwB,CAAC,IAAkC,EAAE,IAA2B;IACpG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,kBAAkB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACtE,CAAC;AAFD,4DAEC"}
1
+ {"version":3,"file":"getAuthBackendRole.js","sourceRoot":"","sources":["../../kubernetes/getAuthBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;GAIG;AACH,SAAgB,kBAAkB,CAAC,IAA4B,EAAE,IAA2B;IACxF,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,wDAAwD,EAAE;QACnF,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,WAAW,EAAE,IAAI,CAAC,SAAS;QAC3B,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,iBAAiB,EAAE,IAAI,CAAC,eAAe;QACvC,qBAAqB,EAAE,IAAI,CAAC,mBAAmB;QAC/C,aAAa,EAAE,IAAI,CAAC,WAAW;QAC/B,sBAAsB,EAAE,IAAI,CAAC,oBAAoB;QACjD,cAAc,EAAE,IAAI,CAAC,YAAY;QACjC,aAAa,EAAE,IAAI,CAAC,WAAW;QAC/B,eAAe,EAAE,IAAI,CAAC,aAAa;QACnC,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,WAAW,EAAE,IAAI,CAAC,SAAS;KAC9B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AArBD,gDAqBC;AAqKD,SAAgB,wBAAwB,CAAC,IAAkC,EAAE,IAA2B;IACpG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,kBAAkB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACtE,CAAC;AAFD,4DAEC"}
@@ -0,0 +1,156 @@
1
+ import * as pulumi from "@pulumi/pulumi";
2
+ /**
3
+ * ## Example Usage
4
+ *
5
+ * ```typescript
6
+ * import * as pulumi from "@pulumi/pulumi";
7
+ * import * as fs from "fs";
8
+ * import * as vault from "@pulumi/vault";
9
+ *
10
+ * const config = new vault.kubernetes.SecretBackend("config", {
11
+ * path: "kubernetes",
12
+ * description: "kubernetes secrets engine description",
13
+ * kubernetesHost: "https://127.0.0.1:61233",
14
+ * kubernetesCaCert: fs.readFileSync("/path/to/cert"),
15
+ * serviceAccountJwt: fs.readFileSync("/path/to/token"),
16
+ * disableLocalCaJwt: false,
17
+ * });
18
+ * const role = new vault.kubernetes.SecretBackendRole("role", {
19
+ * backend: config.path,
20
+ * allowedKubernetesNamespaces: ["*"],
21
+ * tokenMaxTtl: 43200,
22
+ * tokenDefaultTtl: 21600,
23
+ * serviceAccountName: "test-service-account-with-generated-token",
24
+ * extraLabels: {
25
+ * id: "abc123",
26
+ * name: "some_name",
27
+ * },
28
+ * extraAnnotations: {
29
+ * env: "development",
30
+ * location: "earth",
31
+ * },
32
+ * });
33
+ * const token = vault.kubernetes.getServiceAccountTokenOutput({
34
+ * backend: config.path,
35
+ * role: role.name,
36
+ * kubernetesNamespace: "test",
37
+ * clusterRoleBinding: false,
38
+ * ttl: "1h",
39
+ * });
40
+ * ```
41
+ */
42
+ export declare function getServiceAccountToken(args: GetServiceAccountTokenArgs, opts?: pulumi.InvokeOptions): Promise<GetServiceAccountTokenResult>;
43
+ /**
44
+ * A collection of arguments for invoking getServiceAccountToken.
45
+ */
46
+ export interface GetServiceAccountTokenArgs {
47
+ /**
48
+ * The Kubernetes secret backend to generate service account
49
+ * tokens from.
50
+ */
51
+ backend: string;
52
+ /**
53
+ * If true, generate a ClusterRoleBinding to grant
54
+ * permissions across the whole cluster instead of within a namespace.
55
+ */
56
+ clusterRoleBinding?: boolean;
57
+ /**
58
+ * The name of the Kubernetes namespace in which to
59
+ * generate the credentials.
60
+ */
61
+ kubernetesNamespace: string;
62
+ /**
63
+ * The namespace of the target resource.
64
+ * The value should not contain leading or trailing forward slashes.
65
+ * The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
66
+ * *Available only for Vault Enterprise*.
67
+ */
68
+ namespace?: string;
69
+ /**
70
+ * The name of the Kubernetes secret backend role to generate service
71
+ * account tokens from.
72
+ */
73
+ role: string;
74
+ /**
75
+ * The TTL of the generated Kubernetes service account token, specified in
76
+ * seconds or as a Go duration format string.
77
+ */
78
+ ttl?: string;
79
+ }
80
+ /**
81
+ * A collection of values returned by getServiceAccountToken.
82
+ */
83
+ export interface GetServiceAccountTokenResult {
84
+ readonly backend: string;
85
+ readonly clusterRoleBinding?: boolean;
86
+ /**
87
+ * The provider-assigned unique ID for this managed resource.
88
+ */
89
+ readonly id: string;
90
+ readonly kubernetesNamespace: string;
91
+ /**
92
+ * The duration of the lease in seconds.
93
+ */
94
+ readonly leaseDuration: number;
95
+ /**
96
+ * The lease identifier assigned by Vault.
97
+ */
98
+ readonly leaseId: string;
99
+ /**
100
+ * True if the duration of this lease can be extended through renewal.
101
+ */
102
+ readonly leaseRenewable: boolean;
103
+ readonly namespace?: string;
104
+ readonly role: string;
105
+ /**
106
+ * The name of the service account associated with the token.
107
+ */
108
+ readonly serviceAccountName: string;
109
+ /**
110
+ * The Kubernetes namespace that the service account resides in.
111
+ */
112
+ readonly serviceAccountNamespace: string;
113
+ /**
114
+ * The Kubernetes service account token.
115
+ */
116
+ readonly serviceAccountToken: string;
117
+ readonly ttl?: string;
118
+ }
119
+ export declare function getServiceAccountTokenOutput(args: GetServiceAccountTokenOutputArgs, opts?: pulumi.InvokeOptions): pulumi.Output<GetServiceAccountTokenResult>;
120
+ /**
121
+ * A collection of arguments for invoking getServiceAccountToken.
122
+ */
123
+ export interface GetServiceAccountTokenOutputArgs {
124
+ /**
125
+ * The Kubernetes secret backend to generate service account
126
+ * tokens from.
127
+ */
128
+ backend: pulumi.Input<string>;
129
+ /**
130
+ * If true, generate a ClusterRoleBinding to grant
131
+ * permissions across the whole cluster instead of within a namespace.
132
+ */
133
+ clusterRoleBinding?: pulumi.Input<boolean>;
134
+ /**
135
+ * The name of the Kubernetes namespace in which to
136
+ * generate the credentials.
137
+ */
138
+ kubernetesNamespace: pulumi.Input<string>;
139
+ /**
140
+ * The namespace of the target resource.
141
+ * The value should not contain leading or trailing forward slashes.
142
+ * The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
143
+ * *Available only for Vault Enterprise*.
144
+ */
145
+ namespace?: pulumi.Input<string>;
146
+ /**
147
+ * The name of the Kubernetes secret backend role to generate service
148
+ * account tokens from.
149
+ */
150
+ role: pulumi.Input<string>;
151
+ /**
152
+ * The TTL of the generated Kubernetes service account token, specified in
153
+ * seconds or as a Go duration format string.
154
+ */
155
+ ttl?: pulumi.Input<string>;
156
+ }
@@ -0,0 +1,67 @@
1
+ "use strict";
2
+ // *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ // *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+ Object.defineProperty(exports, "__esModule", { value: true });
5
+ exports.getServiceAccountTokenOutput = exports.getServiceAccountToken = void 0;
6
+ const pulumi = require("@pulumi/pulumi");
7
+ const utilities = require("../utilities");
8
+ /**
9
+ * ## Example Usage
10
+ *
11
+ * ```typescript
12
+ * import * as pulumi from "@pulumi/pulumi";
13
+ * import * as fs from "fs";
14
+ * import * as vault from "@pulumi/vault";
15
+ *
16
+ * const config = new vault.kubernetes.SecretBackend("config", {
17
+ * path: "kubernetes",
18
+ * description: "kubernetes secrets engine description",
19
+ * kubernetesHost: "https://127.0.0.1:61233",
20
+ * kubernetesCaCert: fs.readFileSync("/path/to/cert"),
21
+ * serviceAccountJwt: fs.readFileSync("/path/to/token"),
22
+ * disableLocalCaJwt: false,
23
+ * });
24
+ * const role = new vault.kubernetes.SecretBackendRole("role", {
25
+ * backend: config.path,
26
+ * allowedKubernetesNamespaces: ["*"],
27
+ * tokenMaxTtl: 43200,
28
+ * tokenDefaultTtl: 21600,
29
+ * serviceAccountName: "test-service-account-with-generated-token",
30
+ * extraLabels: {
31
+ * id: "abc123",
32
+ * name: "some_name",
33
+ * },
34
+ * extraAnnotations: {
35
+ * env: "development",
36
+ * location: "earth",
37
+ * },
38
+ * });
39
+ * const token = vault.kubernetes.getServiceAccountTokenOutput({
40
+ * backend: config.path,
41
+ * role: role.name,
42
+ * kubernetesNamespace: "test",
43
+ * clusterRoleBinding: false,
44
+ * ttl: "1h",
45
+ * });
46
+ * ```
47
+ */
48
+ function getServiceAccountToken(args, opts) {
49
+ if (!opts) {
50
+ opts = {};
51
+ }
52
+ opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
53
+ return pulumi.runtime.invoke("vault:kubernetes/getServiceAccountToken:getServiceAccountToken", {
54
+ "backend": args.backend,
55
+ "clusterRoleBinding": args.clusterRoleBinding,
56
+ "kubernetesNamespace": args.kubernetesNamespace,
57
+ "namespace": args.namespace,
58
+ "role": args.role,
59
+ "ttl": args.ttl,
60
+ }, opts);
61
+ }
62
+ exports.getServiceAccountToken = getServiceAccountToken;
63
+ function getServiceAccountTokenOutput(args, opts) {
64
+ return pulumi.output(args).apply(a => getServiceAccountToken(a, opts));
65
+ }
66
+ exports.getServiceAccountTokenOutput = getServiceAccountTokenOutput;
67
+ //# sourceMappingURL=getServiceAccountToken.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"getServiceAccountToken.js","sourceRoot":"","sources":["../../kubernetes/getServiceAccountToken.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAuCG;AACH,SAAgB,sBAAsB,CAAC,IAAgC,EAAE,IAA2B;IAChG,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,gEAAgE,EAAE;QAC3F,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,oBAAoB,EAAE,IAAI,CAAC,kBAAkB;QAC7C,qBAAqB,EAAE,IAAI,CAAC,mBAAmB;QAC/C,WAAW,EAAE,IAAI,CAAC,SAAS;QAC3B,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,KAAK,EAAE,IAAI,CAAC,GAAG;KAClB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAdD,wDAcC;AAgFD,SAAgB,4BAA4B,CAAC,IAAsC,EAAE,IAA2B;IAC5G,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,sBAAsB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AAC1E,CAAC;AAFD,oEAEC"}
@@ -1,4 +1,21 @@
1
- export * from "./authBackendConfig";
2
- export * from "./authBackendRole";
3
- export * from "./getAuthBackendConfig";
4
- export * from "./getAuthBackendRole";
1
+ export { AuthBackendConfigArgs, AuthBackendConfigState } from "./authBackendConfig";
2
+ export declare type AuthBackendConfig = import("./authBackendConfig").AuthBackendConfig;
3
+ export declare const AuthBackendConfig: typeof import("./authBackendConfig").AuthBackendConfig;
4
+ export { AuthBackendRoleArgs, AuthBackendRoleState } from "./authBackendRole";
5
+ export declare type AuthBackendRole = import("./authBackendRole").AuthBackendRole;
6
+ export declare const AuthBackendRole: typeof import("./authBackendRole").AuthBackendRole;
7
+ export { GetAuthBackendConfigArgs, GetAuthBackendConfigResult, GetAuthBackendConfigOutputArgs } from "./getAuthBackendConfig";
8
+ export declare const getAuthBackendConfig: typeof import("./getAuthBackendConfig").getAuthBackendConfig;
9
+ export declare const getAuthBackendConfigOutput: typeof import("./getAuthBackendConfig").getAuthBackendConfigOutput;
10
+ export { GetAuthBackendRoleArgs, GetAuthBackendRoleResult, GetAuthBackendRoleOutputArgs } from "./getAuthBackendRole";
11
+ export declare const getAuthBackendRole: typeof import("./getAuthBackendRole").getAuthBackendRole;
12
+ export declare const getAuthBackendRoleOutput: typeof import("./getAuthBackendRole").getAuthBackendRoleOutput;
13
+ export { GetServiceAccountTokenArgs, GetServiceAccountTokenResult, GetServiceAccountTokenOutputArgs } from "./getServiceAccountToken";
14
+ export declare const getServiceAccountToken: typeof import("./getServiceAccountToken").getServiceAccountToken;
15
+ export declare const getServiceAccountTokenOutput: typeof import("./getServiceAccountToken").getServiceAccountTokenOutput;
16
+ export { SecretBackendArgs, SecretBackendState } from "./secretBackend";
17
+ export declare type SecretBackend = import("./secretBackend").SecretBackend;
18
+ export declare const SecretBackend: typeof import("./secretBackend").SecretBackend;
19
+ export { SecretBackendRoleArgs, SecretBackendRoleState } from "./secretBackendRole";
20
+ export declare type SecretBackendRole = import("./secretBackendRole").SecretBackendRole;
21
+ export declare const SecretBackendRole: typeof import("./secretBackendRole").SecretBackendRole;
@@ -1,39 +1,39 @@
1
1
  "use strict";
2
2
  // *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  // *** Do not edit by hand unless you're certain you know what you are doing! ***
4
- var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
5
- if (k2 === undefined) k2 = k;
6
- var desc = Object.getOwnPropertyDescriptor(m, k);
7
- if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
8
- desc = { enumerable: true, get: function() { return m[k]; } };
9
- }
10
- Object.defineProperty(o, k2, desc);
11
- }) : (function(o, m, k, k2) {
12
- if (k2 === undefined) k2 = k;
13
- o[k2] = m[k];
14
- }));
15
- var __exportStar = (this && this.__exportStar) || function(m, exports) {
16
- for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
17
- };
18
4
  Object.defineProperty(exports, "__esModule", { value: true });
5
+ exports.SecretBackendRole = exports.SecretBackend = exports.getServiceAccountTokenOutput = exports.getServiceAccountToken = exports.getAuthBackendRoleOutput = exports.getAuthBackendRole = exports.getAuthBackendConfigOutput = exports.getAuthBackendConfig = exports.AuthBackendRole = exports.AuthBackendConfig = void 0;
19
6
  const pulumi = require("@pulumi/pulumi");
20
7
  const utilities = require("../utilities");
21
- // Export members:
22
- __exportStar(require("./authBackendConfig"), exports);
23
- __exportStar(require("./authBackendRole"), exports);
24
- __exportStar(require("./getAuthBackendConfig"), exports);
25
- __exportStar(require("./getAuthBackendRole"), exports);
26
- // Import resources to register:
27
- const authBackendConfig_1 = require("./authBackendConfig");
28
- const authBackendRole_1 = require("./authBackendRole");
8
+ exports.AuthBackendConfig = null;
9
+ exports.AuthBackendRole = null;
10
+ exports.getAuthBackendConfig = null;
11
+ exports.getAuthBackendConfigOutput = null;
12
+ exports.getAuthBackendRole = null;
13
+ exports.getAuthBackendRoleOutput = null;
14
+ exports.getServiceAccountToken = null;
15
+ exports.getServiceAccountTokenOutput = null;
16
+ exports.SecretBackend = null;
17
+ exports.SecretBackendRole = null;
18
+ utilities.lazyLoad(exports, ["AuthBackendConfig"], () => require("./authBackendConfig"));
19
+ utilities.lazyLoad(exports, ["AuthBackendRole"], () => require("./authBackendRole"));
20
+ utilities.lazyLoad(exports, ["getAuthBackendConfig", "getAuthBackendConfigOutput"], () => require("./getAuthBackendConfig"));
21
+ utilities.lazyLoad(exports, ["getAuthBackendRole", "getAuthBackendRoleOutput"], () => require("./getAuthBackendRole"));
22
+ utilities.lazyLoad(exports, ["getServiceAccountToken", "getServiceAccountTokenOutput"], () => require("./getServiceAccountToken"));
23
+ utilities.lazyLoad(exports, ["SecretBackend"], () => require("./secretBackend"));
24
+ utilities.lazyLoad(exports, ["SecretBackendRole"], () => require("./secretBackendRole"));
29
25
  const _module = {
30
26
  version: utilities.getVersion(),
31
27
  construct: (name, type, urn) => {
32
28
  switch (type) {
33
29
  case "vault:kubernetes/authBackendConfig:AuthBackendConfig":
34
- return new authBackendConfig_1.AuthBackendConfig(name, undefined, { urn });
30
+ return new exports.AuthBackendConfig(name, undefined, { urn });
35
31
  case "vault:kubernetes/authBackendRole:AuthBackendRole":
36
- return new authBackendRole_1.AuthBackendRole(name, undefined, { urn });
32
+ return new exports.AuthBackendRole(name, undefined, { urn });
33
+ case "vault:kubernetes/secretBackend:SecretBackend":
34
+ return new exports.SecretBackend(name, undefined, { urn });
35
+ case "vault:kubernetes/secretBackendRole:SecretBackendRole":
36
+ return new exports.SecretBackendRole(name, undefined, { urn });
37
37
  default:
38
38
  throw new Error(`unknown resource type ${type}`);
39
39
  }
@@ -41,4 +41,6 @@ const _module = {
41
41
  };
42
42
  pulumi.runtime.registerResourceModule("vault", "kubernetes/authBackendConfig", _module);
43
43
  pulumi.runtime.registerResourceModule("vault", "kubernetes/authBackendRole", _module);
44
+ pulumi.runtime.registerResourceModule("vault", "kubernetes/secretBackend", _module);
45
+ pulumi.runtime.registerResourceModule("vault", "kubernetes/secretBackendRole", _module);
44
46
  //# sourceMappingURL=index.js.map
@@ -1 +1 @@
1
- {"version":3,"file":"index.js","sourceRoot":"","sources":["../../kubernetes/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;;;;;;;;;;;;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,kBAAkB;AAClB,sDAAoC;AACpC,oDAAkC;AAClC,yDAAuC;AACvC,uDAAqC;AAErC,gCAAgC;AAChC,2DAAwD;AACxD,uDAAoD;AAEpD,MAAM,OAAO,GAAG;IACZ,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE;IAC/B,SAAS,EAAE,CAAC,IAAY,EAAE,IAAY,EAAE,GAAW,EAAmB,EAAE;QACpE,QAAQ,IAAI,EAAE;YACV,KAAK,sDAAsD;gBACvD,OAAO,IAAI,qCAAiB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC/D,KAAK,kDAAkD;gBACnD,OAAO,IAAI,iCAAe,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC7D;gBACI,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,EAAE,CAAC,CAAC;SACxD;IACL,CAAC;CACJ,CAAC;AACF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,8BAA8B,EAAE,OAAO,CAAC,CAAA;AACvF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,4BAA4B,EAAE,OAAO,CAAC,CAAA"}
1
+ {"version":3,"file":"index.js","sourceRoot":"","sources":["../../kubernetes/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAK7B,QAAA,iBAAiB,GAA2D,IAAW,CAAC;AAIxF,QAAA,eAAe,GAAuD,IAAW,CAAC;AAGlF,QAAA,oBAAoB,GAAiE,IAAW,CAAC;AACjG,QAAA,0BAA0B,GAAuE,IAAW,CAAC;AAG7G,QAAA,kBAAkB,GAA6D,IAAW,CAAC;AAC3F,QAAA,wBAAwB,GAAmE,IAAW,CAAC;AAGvG,QAAA,sBAAsB,GAAqE,IAAW,CAAC;AACvG,QAAA,4BAA4B,GAA2E,IAAW,CAAC;AAInH,QAAA,aAAa,GAAmD,IAAW,CAAC;AAI5E,QAAA,iBAAiB,GAA2D,IAAW,CAAC;AAErG,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,mBAAmB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,qBAAqB,CAAC,CAAC,CAAC;AACzF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,iBAAiB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,mBAAmB,CAAC,CAAC,CAAC;AACrF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,sBAAsB,EAAC,4BAA4B,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,wBAAwB,CAAC,CAAC,CAAC;AAC5H,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,oBAAoB,EAAC,0BAA0B,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,sBAAsB,CAAC,CAAC,CAAC;AACtH,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,wBAAwB,EAAC,8BAA8B,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,0BAA0B,CAAC,CAAC,CAAC;AAClI,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,eAAe,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,iBAAiB,CAAC,CAAC,CAAC;AACjF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,mBAAmB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,qBAAqB,CAAC,CAAC,CAAC;AAEzF,MAAM,OAAO,GAAG;IACZ,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE;IAC/B,SAAS,EAAE,CAAC,IAAY,EAAE,IAAY,EAAE,GAAW,EAAmB,EAAE;QACpE,QAAQ,IAAI,EAAE;YACV,KAAK,sDAAsD;gBACvD,OAAO,IAAI,yBAAiB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC/D,KAAK,kDAAkD;gBACnD,OAAO,IAAI,uBAAe,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC7D,KAAK,8CAA8C;gBAC/C,OAAO,IAAI,qBAAa,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC3D,KAAK,sDAAsD;gBACvD,OAAO,IAAI,yBAAiB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC/D;gBACI,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,EAAE,CAAC,CAAC;SACxD;IACL,CAAC;CACJ,CAAC;AACF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,8BAA8B,EAAE,OAAO,CAAC,CAAA;AACvF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,4BAA4B,EAAE,OAAO,CAAC,CAAA;AACrF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,0BAA0B,EAAE,OAAO,CAAC,CAAA;AACnF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,8BAA8B,EAAE,OAAO,CAAC,CAAA"}