@pulumi/vault 5.6.0 → 5.7.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/ad/getAccessCredentials.d.ts +15 -0
- package/ad/getAccessCredentials.js +1 -0
- package/ad/getAccessCredentials.js.map +1 -1
- package/ad/index.d.ts +12 -4
- package/ad/index.js +13 -26
- package/ad/index.js.map +1 -1
- package/ad/secretBackend.d.ts +39 -0
- package/ad/secretBackend.js +9 -3
- package/ad/secretBackend.js.map +1 -1
- package/ad/secretLibrary.d.ts +21 -0
- package/ad/secretLibrary.js +2 -0
- package/ad/secretLibrary.js.map +1 -1
- package/ad/secretRole.d.ts +21 -0
- package/ad/secretRole.js +2 -0
- package/ad/secretRole.js.map +1 -1
- package/alicloud/authBackendRole.d.ts +21 -0
- package/alicloud/authBackendRole.js +2 -0
- package/alicloud/authBackendRole.js.map +1 -1
- package/alicloud/index.d.ts +3 -1
- package/alicloud/index.js +4 -19
- package/alicloud/index.js.map +1 -1
- package/approle/authBackendLogin.d.ts +22 -1
- package/approle/authBackendLogin.js +3 -1
- package/approle/authBackendLogin.js.map +1 -1
- package/approle/authBackendRole.d.ts +21 -0
- package/approle/authBackendRole.js +2 -0
- package/approle/authBackendRole.js.map +1 -1
- package/approle/{authBackendRoleSecretID.d.ts → authBackendRoleSecretId.d.ts} +33 -12
- package/approle/{authBackendRoleSecretID.js → authBackendRoleSecretId.js} +16 -12
- package/approle/authBackendRoleSecretId.js.map +1 -0
- package/approle/getAuthBackendRoleId.d.ts +15 -0
- package/approle/getAuthBackendRoleId.js +1 -0
- package/approle/getAuthBackendRoleId.js.map +1 -1
- package/approle/index.d.ts +12 -4
- package/approle/index.js +15 -28
- package/approle/index.js.map +1 -1
- package/audit.d.ts +21 -0
- package/audit.js +2 -0
- package/audit.js.map +1 -1
- package/authBackend.d.ts +47 -10
- package/authBackend.js +4 -0
- package/authBackend.js.map +1 -1
- package/aws/authBackendCert.d.ts +21 -0
- package/aws/authBackendCert.js +2 -0
- package/aws/authBackendCert.js.map +1 -1
- package/aws/authBackendClient.d.ts +21 -0
- package/aws/authBackendClient.js +6 -2
- package/aws/authBackendClient.js.map +1 -1
- package/aws/authBackendIdentityWhitelist.d.ts +21 -0
- package/aws/authBackendIdentityWhitelist.js +2 -0
- package/aws/authBackendIdentityWhitelist.js.map +1 -1
- package/aws/authBackendLogin.d.ts +21 -0
- package/aws/authBackendLogin.js +4 -0
- package/aws/authBackendLogin.js.map +1 -1
- package/aws/authBackendRole.d.ts +21 -0
- package/aws/authBackendRole.js +2 -0
- package/aws/authBackendRole.js.map +1 -1
- package/aws/authBackendRoleTag.d.ts +21 -0
- package/aws/authBackendRoleTag.js +2 -0
- package/aws/authBackendRoleTag.js.map +1 -1
- package/aws/authBackendRoletagBlacklist.d.ts +21 -0
- package/aws/authBackendRoletagBlacklist.js +2 -0
- package/aws/authBackendRoletagBlacklist.js.map +1 -1
- package/aws/authBackendStsRole.d.ts +21 -0
- package/aws/authBackendStsRole.js +2 -0
- package/aws/authBackendStsRole.js.map +1 -1
- package/aws/getAccessCredentials.d.ts +15 -0
- package/aws/getAccessCredentials.js +1 -0
- package/aws/getAccessCredentials.js.map +1 -1
- package/aws/index.d.ts +33 -11
- package/aws/index.js +34 -47
- package/aws/index.js.map +1 -1
- package/aws/secretBackend.d.ts +36 -12
- package/aws/secretBackend.js +8 -14
- package/aws/secretBackend.js.map +1 -1
- package/aws/secretBackendRole.d.ts +21 -0
- package/aws/secretBackendRole.js +2 -0
- package/aws/secretBackendRole.js.map +1 -1
- package/azure/authBackendConfig.d.ts +21 -0
- package/azure/authBackendConfig.js +7 -3
- package/azure/authBackendConfig.js.map +1 -1
- package/azure/authBackendRole.d.ts +21 -0
- package/azure/authBackendRole.js +2 -0
- package/azure/authBackendRole.js.map +1 -1
- package/azure/backend.d.ts +36 -0
- package/azure/backend.js +10 -4
- package/azure/backend.js.map +1 -1
- package/azure/backendRole.d.ts +23 -1
- package/azure/backendRole.js +2 -0
- package/azure/backendRole.js.map +1 -1
- package/azure/getAccessCredentials.d.ts +15 -0
- package/azure/getAccessCredentials.js +1 -0
- package/azure/getAccessCredentials.js.map +1 -1
- package/azure/index.d.ts +15 -5
- package/azure/index.js +16 -29
- package/azure/index.js.map +1 -1
- package/certAuthBackendRole.d.ts +39 -3
- package/certAuthBackendRole.js +4 -0
- package/certAuthBackendRole.js.map +1 -1
- package/config/vars.d.ts +43 -3
- package/config/vars.js +64 -4
- package/config/vars.js.map +1 -1
- package/consul/index.d.ts +6 -2
- package/consul/index.js +7 -22
- package/consul/index.js.map +1 -1
- package/consul/secretBackend.d.ts +87 -15
- package/consul/secretBackend.js +24 -7
- package/consul/secretBackend.js.map +1 -1
- package/consul/secretBackendRole.d.ts +93 -10
- package/consul/secretBackendRole.js +14 -1
- package/consul/secretBackendRole.js.map +1 -1
- package/database/index.d.ts +12 -4
- package/database/index.js +13 -28
- package/database/index.js.map +1 -1
- package/database/secretBackendConnection.d.ts +35 -1
- package/database/secretBackendConnection.js +4 -0
- package/database/secretBackendConnection.js.map +1 -1
- package/database/secretBackendRole.d.ts +21 -0
- package/database/secretBackendRole.js +2 -0
- package/database/secretBackendRole.js.map +1 -1
- package/database/secretBackendStaticRole.d.ts +21 -0
- package/database/secretBackendStaticRole.js +2 -0
- package/database/secretBackendStaticRole.js.map +1 -1
- package/database/secretsMount.d.ts +41 -1
- package/database/secretsMount.js +6 -0
- package/database/secretsMount.js.map +1 -1
- package/egpPolicy.d.ts +21 -0
- package/egpPolicy.js +2 -0
- package/egpPolicy.js.map +1 -1
- package/gcp/authBackend.d.ts +71 -1
- package/gcp/authBackend.js +18 -2
- package/gcp/authBackend.js.map +1 -1
- package/gcp/authBackendRole.d.ts +21 -0
- package/gcp/authBackendRole.js +2 -0
- package/gcp/authBackendRole.js.map +1 -1
- package/gcp/getAuthBackendRole.d.ts +15 -0
- package/gcp/getAuthBackendRole.js +1 -0
- package/gcp/getAuthBackendRole.js.map +1 -1
- package/gcp/index.d.ts +18 -6
- package/gcp/index.js +19 -32
- package/gcp/index.js.map +1 -1
- package/gcp/secretBackend.d.ts +36 -0
- package/gcp/secretBackend.js +7 -1
- package/gcp/secretBackend.js.map +1 -1
- package/gcp/secretRoleset.d.ts +23 -1
- package/gcp/secretRoleset.js +2 -0
- package/gcp/secretRoleset.js.map +1 -1
- package/gcp/secretStaticAccount.d.ts +23 -1
- package/gcp/secretStaticAccount.js +2 -0
- package/gcp/secretStaticAccount.js.map +1 -1
- package/generic/endpoint.d.ts +21 -0
- package/generic/endpoint.js +5 -1
- package/generic/endpoint.js.map +1 -1
- package/generic/getSecret.d.ts +15 -0
- package/generic/getSecret.js +1 -0
- package/generic/getSecret.js.map +1 -1
- package/generic/index.d.ts +9 -3
- package/generic/index.js +10 -23
- package/generic/index.js.map +1 -1
- package/generic/secret.d.ts +21 -0
- package/generic/secret.js +5 -1
- package/generic/secret.js.map +1 -1
- package/getAuthBackend.d.ts +16 -1
- package/getAuthBackend.js +1 -0
- package/getAuthBackend.js.map +1 -1
- package/getNomadAccessToken.d.ts +15 -0
- package/getNomadAccessToken.js +1 -0
- package/getNomadAccessToken.js.map +1 -1
- package/getPolicyDocument.d.ts +5 -1
- package/getPolicyDocument.js +1 -0
- package/getPolicyDocument.js.map +1 -1
- package/github/authBackend.d.ts +38 -1
- package/github/authBackend.js +4 -0
- package/github/authBackend.js.map +1 -1
- package/github/index.d.ts +9 -3
- package/github/index.js +10 -25
- package/github/index.js.map +1 -1
- package/github/team.d.ts +21 -0
- package/github/team.js +2 -0
- package/github/team.js.map +1 -1
- package/github/user.d.ts +21 -0
- package/github/user.js +2 -0
- package/github/user.js.map +1 -1
- package/identity/entity.d.ts +21 -0
- package/identity/entity.js +2 -0
- package/identity/entity.js.map +1 -1
- package/identity/entityAlias.d.ts +21 -0
- package/identity/entityAlias.js +2 -0
- package/identity/entityAlias.js.map +1 -1
- package/identity/entityPolicies.d.ts +21 -0
- package/identity/entityPolicies.js +2 -0
- package/identity/entityPolicies.js.map +1 -1
- package/identity/getEntity.d.ts +16 -1
- package/identity/getEntity.js +1 -0
- package/identity/getEntity.js.map +1 -1
- package/identity/getGroup.d.ts +15 -0
- package/identity/getGroup.js +1 -0
- package/identity/getGroup.js.map +1 -1
- package/identity/getOidcClientCreds.d.ts +15 -0
- package/identity/getOidcClientCreds.js +1 -0
- package/identity/getOidcClientCreds.js.map +1 -1
- package/identity/getOidcOpenidConfig.d.ts +15 -0
- package/identity/getOidcOpenidConfig.js +1 -0
- package/identity/getOidcOpenidConfig.js.map +1 -1
- package/identity/getOidcPublicKeys.d.ts +15 -0
- package/identity/getOidcPublicKeys.js +1 -0
- package/identity/getOidcPublicKeys.js.map +1 -1
- package/identity/group.d.ts +21 -0
- package/identity/group.js +2 -0
- package/identity/group.js.map +1 -1
- package/identity/groupAlias.d.ts +21 -0
- package/identity/groupAlias.js +2 -0
- package/identity/groupAlias.js.map +1 -1
- package/identity/groupMemberEntityIds.d.ts +21 -0
- package/identity/groupMemberEntityIds.js +2 -0
- package/identity/groupMemberEntityIds.js.map +1 -1
- package/identity/groupPolicies.d.ts +21 -0
- package/identity/groupPolicies.js +2 -0
- package/identity/groupPolicies.js.map +1 -1
- package/identity/index.d.ts +75 -20
- package/identity/index.js +86 -66
- package/identity/index.js.map +1 -1
- package/identity/mfaDuo.d.ts +200 -0
- package/identity/mfaDuo.js +110 -0
- package/identity/mfaDuo.js.map +1 -0
- package/identity/mfaLoginEnforcement.d.ts +170 -0
- package/identity/mfaLoginEnforcement.js +96 -0
- package/identity/mfaLoginEnforcement.js.map +1 -0
- package/identity/mfaOkta.d.ts +188 -0
- package/identity/mfaOkta.js +105 -0
- package/identity/mfaOkta.js.map +1 -0
- package/identity/mfaPingid.d.ts +190 -0
- package/identity/mfaPingid.js +102 -0
- package/identity/mfaPingid.js.map +1 -0
- package/identity/mfaTotp.d.ts +218 -0
- package/identity/mfaTotp.js +104 -0
- package/identity/mfaTotp.js.map +1 -0
- package/identity/oidc.d.ts +21 -0
- package/identity/oidc.js +2 -0
- package/identity/oidc.js.map +1 -1
- package/identity/oidcAssignment.d.ts +23 -2
- package/identity/oidcAssignment.js +4 -2
- package/identity/oidcAssignment.js.map +1 -1
- package/identity/oidcClient.d.ts +21 -0
- package/identity/oidcClient.js +4 -0
- package/identity/oidcClient.js.map +1 -1
- package/identity/oidcKey.d.ts +21 -0
- package/identity/oidcKey.js +2 -0
- package/identity/oidcKey.js.map +1 -1
- package/identity/oidcKeyAllowedClientID.d.ts +21 -0
- package/identity/oidcKeyAllowedClientID.js +2 -0
- package/identity/oidcKeyAllowedClientID.js.map +1 -1
- package/identity/oidcProvider.d.ts +21 -0
- package/identity/oidcProvider.js +2 -0
- package/identity/oidcProvider.js.map +1 -1
- package/identity/oidcRole.d.ts +21 -0
- package/identity/oidcRole.js +2 -0
- package/identity/oidcRole.js.map +1 -1
- package/identity/oidcScope.d.ts +22 -3
- package/identity/oidcScope.js +3 -3
- package/identity/oidcScope.js.map +1 -1
- package/index.d.ts +75 -25
- package/index.js +78 -83
- package/index.js.map +1 -1
- package/jwt/authBackend.d.ts +38 -1
- package/jwt/authBackend.js +7 -1
- package/jwt/authBackend.js.map +1 -1
- package/jwt/authBackendRole.d.ts +57 -0
- package/jwt/authBackendRole.js +6 -0
- package/jwt/authBackendRole.js.map +1 -1
- package/jwt/index.d.ts +6 -2
- package/jwt/index.js +7 -22
- package/jwt/index.js.map +1 -1
- package/kmip/index.d.ts +9 -3
- package/kmip/index.js +10 -25
- package/kmip/index.js.map +1 -1
- package/kmip/secretBackend.d.ts +36 -0
- package/kmip/secretBackend.js +4 -0
- package/kmip/secretBackend.js.map +1 -1
- package/kmip/secretRole.d.ts +21 -0
- package/kmip/secretRole.js +2 -0
- package/kmip/secretRole.js.map +1 -1
- package/kmip/secretScope.d.ts +21 -0
- package/kmip/secretScope.js +2 -0
- package/kmip/secretScope.js.map +1 -1
- package/kubernetes/authBackendConfig.d.ts +21 -0
- package/kubernetes/authBackendConfig.js +5 -1
- package/kubernetes/authBackendConfig.js.map +1 -1
- package/kubernetes/authBackendRole.d.ts +21 -0
- package/kubernetes/authBackendRole.js +2 -0
- package/kubernetes/authBackendRole.js.map +1 -1
- package/kubernetes/getAuthBackendConfig.d.ts +15 -0
- package/kubernetes/getAuthBackendConfig.js +1 -0
- package/kubernetes/getAuthBackendConfig.js.map +1 -1
- package/kubernetes/getAuthBackendRole.d.ts +15 -0
- package/kubernetes/getAuthBackendRole.js +1 -0
- package/kubernetes/getAuthBackendRole.js.map +1 -1
- package/kubernetes/getServiceAccountToken.d.ts +156 -0
- package/kubernetes/getServiceAccountToken.js +67 -0
- package/kubernetes/getServiceAccountToken.js.map +1 -0
- package/kubernetes/index.d.ts +21 -4
- package/kubernetes/index.js +26 -24
- package/kubernetes/index.js.map +1 -1
- package/kubernetes/secretBackend.d.ts +303 -0
- package/kubernetes/secretBackend.js +114 -0
- package/kubernetes/secretBackend.js.map +1 -0
- package/kubernetes/secretBackendRole.d.ts +367 -0
- package/kubernetes/secretBackendRole.js +191 -0
- package/kubernetes/secretBackendRole.js.map +1 -0
- package/kv/getSecret.d.ts +104 -0
- package/kv/getSecret.js +53 -0
- package/kv/getSecret.js.map +1 -0
- package/kv/getSecretSubkeysV2.d.ts +132 -0
- package/kv/getSecretSubkeysV2.js +57 -0
- package/kv/getSecretSubkeysV2.js.map +1 -0
- package/kv/getSecretV2.d.ts +139 -0
- package/kv/getSecretV2.js +58 -0
- package/kv/getSecretV2.js.map +1 -0
- package/kv/getSecretsList.d.ts +85 -0
- package/kv/getSecretsList.js +58 -0
- package/kv/getSecretsList.js.map +1 -0
- package/kv/getSecretsListV2.d.ts +114 -0
- package/kv/getSecretsListV2.js +69 -0
- package/kv/getSecretsListV2.js.map +1 -0
- package/kv/index.d.ts +24 -0
- package/kv/index.js +47 -0
- package/kv/index.js.map +1 -0
- package/kv/secret.d.ts +145 -0
- package/kv/secret.js +106 -0
- package/kv/secret.js.map +1 -0
- package/kv/secretBackendV2.d.ts +154 -0
- package/kv/secretBackendV2.js +103 -0
- package/kv/secretBackendV2.js.map +1 -0
- package/kv/secretV2.d.ts +257 -0
- package/kv/secretV2.js +122 -0
- package/kv/secretV2.js.map +1 -0
- package/ldap/authBackend.d.ts +48 -0
- package/ldap/authBackend.js +10 -2
- package/ldap/authBackend.js.map +1 -1
- package/ldap/authBackendGroup.d.ts +21 -0
- package/ldap/authBackendGroup.js +2 -0
- package/ldap/authBackendGroup.js.map +1 -1
- package/ldap/authBackendUser.d.ts +21 -0
- package/ldap/authBackendUser.js +2 -0
- package/ldap/authBackendUser.js.map +1 -1
- package/ldap/index.d.ts +9 -3
- package/ldap/index.js +10 -25
- package/ldap/index.js.map +1 -1
- package/managed/index.d.ts +3 -0
- package/managed/index.js +22 -0
- package/managed/index.js.map +1 -0
- package/managed/keys.d.ts +104 -0
- package/managed/keys.js +64 -0
- package/managed/keys.js.map +1 -0
- package/mfaDuo.d.ts +21 -0
- package/mfaDuo.js +6 -2
- package/mfaDuo.js.map +1 -1
- package/mfaOkta.d.ts +21 -0
- package/mfaOkta.js +5 -1
- package/mfaOkta.js.map +1 -1
- package/mfaPingid.d.ts +21 -0
- package/mfaPingid.js +2 -0
- package/mfaPingid.js.map +1 -1
- package/mfaTotp.d.ts +21 -0
- package/mfaTotp.js +2 -0
- package/mfaTotp.js.map +1 -1
- package/mount.d.ts +33 -0
- package/mount.js +4 -0
- package/mount.js.map +1 -1
- package/namespace.d.ts +32 -18
- package/namespace.js +5 -16
- package/namespace.js.map +1 -1
- package/nomadSecretBackend.d.ts +36 -0
- package/nomadSecretBackend.js +9 -3
- package/nomadSecretBackend.js.map +1 -1
- package/nomadSecretRole.d.ts +21 -0
- package/nomadSecretRole.js +2 -0
- package/nomadSecretRole.js.map +1 -1
- package/okta/authBackend.d.ts +38 -1
- package/okta/authBackend.js +7 -1
- package/okta/authBackend.js.map +1 -1
- package/okta/authBackendGroup.d.ts +21 -0
- package/okta/authBackendGroup.js +2 -0
- package/okta/authBackendGroup.js.map +1 -1
- package/okta/authBackendUser.d.ts +21 -0
- package/okta/authBackendUser.js +2 -0
- package/okta/authBackendUser.js.map +1 -1
- package/okta/index.d.ts +9 -3
- package/okta/index.js +10 -25
- package/okta/index.js.map +1 -1
- package/package.json +2 -2
- package/package.json.dev +2 -2
- package/passwordPolicy.d.ts +21 -0
- package/passwordPolicy.js +2 -0
- package/passwordPolicy.js.map +1 -1
- package/pkisecret/index.d.ts +30 -10
- package/pkisecret/index.js +31 -46
- package/pkisecret/index.js.map +1 -1
- package/pkisecret/secretBackendCert.d.ts +29 -0
- package/pkisecret/secretBackendCert.js +6 -0
- package/pkisecret/secretBackendCert.js.map +1 -1
- package/pkisecret/secretBackendConfigCa.d.ts +21 -0
- package/pkisecret/secretBackendConfigCa.js +5 -1
- package/pkisecret/secretBackendConfigCa.js.map +1 -1
- package/pkisecret/secretBackendConfigUrls.d.ts +21 -0
- package/pkisecret/secretBackendConfigUrls.js +2 -0
- package/pkisecret/secretBackendConfigUrls.js.map +1 -1
- package/pkisecret/secretBackendCrlConfig.d.ts +21 -0
- package/pkisecret/secretBackendCrlConfig.js +2 -0
- package/pkisecret/secretBackendCrlConfig.js.map +1 -1
- package/pkisecret/secretBackendIntermediateCertRequest.d.ts +54 -0
- package/pkisecret/secretBackendIntermediateCertRequest.js +8 -0
- package/pkisecret/secretBackendIntermediateCertRequest.js.map +1 -1
- package/pkisecret/secretBackendIntermediateSetSigned.d.ts +21 -0
- package/pkisecret/secretBackendIntermediateSetSigned.js +2 -0
- package/pkisecret/secretBackendIntermediateSetSigned.js.map +1 -1
- package/pkisecret/secretBackendRole.d.ts +24 -3
- package/pkisecret/secretBackendRole.js +2 -0
- package/pkisecret/secretBackendRole.js.map +1 -1
- package/pkisecret/secretBackendRootCert.d.ts +57 -3
- package/pkisecret/secretBackendRootCert.js +6 -0
- package/pkisecret/secretBackendRootCert.js.map +1 -1
- package/pkisecret/secretBackendRootSignIntermediate.d.ts +21 -0
- package/pkisecret/secretBackendRootSignIntermediate.js +2 -0
- package/pkisecret/secretBackendRootSignIntermediate.js.map +1 -1
- package/pkisecret/secretBackendSign.d.ts +29 -0
- package/pkisecret/secretBackendSign.js +4 -0
- package/pkisecret/secretBackendSign.js.map +1 -1
- package/policy.d.ts +21 -0
- package/policy.js +2 -0
- package/policy.js.map +1 -1
- package/provider.d.ts +43 -3
- package/provider.js +12 -2
- package/provider.js.map +1 -1
- package/quotaLeaseCount.d.ts +21 -0
- package/quotaLeaseCount.js +2 -0
- package/quotaLeaseCount.js.map +1 -1
- package/quotaRateLimit.d.ts +48 -0
- package/quotaRateLimit.js +6 -0
- package/quotaRateLimit.js.map +1 -1
- package/rabbitmq/index.d.ts +6 -2
- package/rabbitmq/index.js +7 -22
- package/rabbitmq/index.js.map +1 -1
- package/rabbitmq/secretBackend.d.ts +36 -0
- package/rabbitmq/secretBackend.js +8 -2
- package/rabbitmq/secretBackend.js.map +1 -1
- package/rabbitmq/secretBackendRole.d.ts +23 -1
- package/rabbitmq/secretBackendRole.js +2 -0
- package/rabbitmq/secretBackendRole.js.map +1 -1
- package/raftAutopilot.d.ts +21 -0
- package/raftAutopilot.js +2 -0
- package/raftAutopilot.js.map +1 -1
- package/raftSnapshotAgentConfig.d.ts +62 -0
- package/raftSnapshotAgentConfig.js +43 -0
- package/raftSnapshotAgentConfig.js.map +1 -1
- package/rgpPolicy.d.ts +21 -0
- package/rgpPolicy.js +2 -0
- package/rgpPolicy.js.map +1 -1
- package/ssh/index.d.ts +6 -2
- package/ssh/index.js +7 -22
- package/ssh/index.js.map +1 -1
- package/ssh/secretBackendCa.d.ts +29 -0
- package/ssh/secretBackendCa.js +13 -1
- package/ssh/secretBackendCa.js.map +1 -1
- package/ssh/secretBackendRole.d.ts +23 -1
- package/ssh/secretBackendRole.js +2 -0
- package/ssh/secretBackendRole.js.map +1 -1
- package/terraformcloud/index.d.ts +9 -3
- package/terraformcloud/index.js +10 -25
- package/terraformcloud/index.js.map +1 -1
- package/terraformcloud/secretBackend.d.ts +36 -0
- package/terraformcloud/secretBackend.js +7 -1
- package/terraformcloud/secretBackend.js.map +1 -1
- package/terraformcloud/secretCreds.d.ts +21 -0
- package/terraformcloud/secretCreds.js +4 -0
- package/terraformcloud/secretCreds.js.map +1 -1
- package/terraformcloud/secretRole.d.ts +21 -0
- package/terraformcloud/secretRole.js +2 -0
- package/terraformcloud/secretRole.js.map +1 -1
- package/token.d.ts +42 -0
- package/token.js +9 -0
- package/token.js.map +1 -1
- package/tokenauth/authBackendRole.d.ts +21 -0
- package/tokenauth/authBackendRole.js +2 -0
- package/tokenauth/authBackendRole.js.map +1 -1
- package/tokenauth/index.d.ts +3 -1
- package/tokenauth/index.js +4 -19
- package/tokenauth/index.js.map +1 -1
- package/transform/index.d.ts +18 -6
- package/transform/index.js +19 -30
- package/transform/index.js.map +1 -1
- package/transform/transformation.d.ts +0 -25
- package/transform/transformation.js +0 -25
- package/transform/transformation.js.map +1 -1
- package/transit/getDecrypt.d.ts +3 -0
- package/transit/getDecrypt.js +1 -0
- package/transit/getDecrypt.js.map +1 -1
- package/transit/getEncrypt.d.ts +3 -0
- package/transit/getEncrypt.js +1 -0
- package/transit/getEncrypt.js.map +1 -1
- package/transit/index.d.ts +12 -4
- package/transit/index.js +13 -24
- package/transit/index.js.map +1 -1
- package/transit/secretBackendKey.d.ts +21 -0
- package/transit/secretBackendKey.js +2 -0
- package/transit/secretBackendKey.js.map +1 -1
- package/transit/secretCacheConfig.d.ts +21 -0
- package/transit/secretCacheConfig.js +2 -0
- package/transit/secretCacheConfig.js.map +1 -1
- package/types/index.js.map +1 -1
- package/types/input.d.ts +408 -4
- package/types/output.d.ts +409 -5
- package/utilities.js +13 -1
- package/utilities.js.map +1 -1
- package/approle/authBackendRoleSecretID.js.map +0 -1
|
@@ -57,11 +57,23 @@ export declare class SecretBackend extends pulumi.CustomResource {
|
|
|
57
57
|
* A human-friendly description for this backend.
|
|
58
58
|
*/
|
|
59
59
|
readonly description: pulumi.Output<string | undefined>;
|
|
60
|
+
/**
|
|
61
|
+
* If set, opts out of mount migration on path updates.
|
|
62
|
+
* See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
|
63
|
+
*/
|
|
64
|
+
readonly disableRemount: pulumi.Output<boolean | undefined>;
|
|
60
65
|
/**
|
|
61
66
|
* The maximum TTL that can be requested
|
|
62
67
|
* for credentials issued by this backend.
|
|
63
68
|
*/
|
|
64
69
|
readonly maxLeaseTtlSeconds: pulumi.Output<number | undefined>;
|
|
70
|
+
/**
|
|
71
|
+
* The namespace to provision the resource in.
|
|
72
|
+
* The value should not contain leading or trailing forward slashes.
|
|
73
|
+
* The `namespace` is always relative to the provider's configured namespace.
|
|
74
|
+
* *Available only for Vault Enterprise*.
|
|
75
|
+
*/
|
|
76
|
+
readonly namespace: pulumi.Output<string | undefined>;
|
|
65
77
|
/**
|
|
66
78
|
* Specifies the Terraform Cloud access token to use.
|
|
67
79
|
*/
|
|
@@ -99,11 +111,23 @@ export interface SecretBackendState {
|
|
|
99
111
|
* A human-friendly description for this backend.
|
|
100
112
|
*/
|
|
101
113
|
description?: pulumi.Input<string>;
|
|
114
|
+
/**
|
|
115
|
+
* If set, opts out of mount migration on path updates.
|
|
116
|
+
* See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
|
117
|
+
*/
|
|
118
|
+
disableRemount?: pulumi.Input<boolean>;
|
|
102
119
|
/**
|
|
103
120
|
* The maximum TTL that can be requested
|
|
104
121
|
* for credentials issued by this backend.
|
|
105
122
|
*/
|
|
106
123
|
maxLeaseTtlSeconds?: pulumi.Input<number>;
|
|
124
|
+
/**
|
|
125
|
+
* The namespace to provision the resource in.
|
|
126
|
+
* The value should not contain leading or trailing forward slashes.
|
|
127
|
+
* The `namespace` is always relative to the provider's configured namespace.
|
|
128
|
+
* *Available only for Vault Enterprise*.
|
|
129
|
+
*/
|
|
130
|
+
namespace?: pulumi.Input<string>;
|
|
107
131
|
/**
|
|
108
132
|
* Specifies the Terraform Cloud access token to use.
|
|
109
133
|
*/
|
|
@@ -133,11 +157,23 @@ export interface SecretBackendArgs {
|
|
|
133
157
|
* A human-friendly description for this backend.
|
|
134
158
|
*/
|
|
135
159
|
description?: pulumi.Input<string>;
|
|
160
|
+
/**
|
|
161
|
+
* If set, opts out of mount migration on path updates.
|
|
162
|
+
* See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
|
|
163
|
+
*/
|
|
164
|
+
disableRemount?: pulumi.Input<boolean>;
|
|
136
165
|
/**
|
|
137
166
|
* The maximum TTL that can be requested
|
|
138
167
|
* for credentials issued by this backend.
|
|
139
168
|
*/
|
|
140
169
|
maxLeaseTtlSeconds?: pulumi.Input<number>;
|
|
170
|
+
/**
|
|
171
|
+
* The namespace to provision the resource in.
|
|
172
|
+
* The value should not contain leading or trailing forward slashes.
|
|
173
|
+
* The `namespace` is always relative to the provider's configured namespace.
|
|
174
|
+
* *Available only for Vault Enterprise*.
|
|
175
|
+
*/
|
|
176
|
+
namespace?: pulumi.Input<string>;
|
|
141
177
|
/**
|
|
142
178
|
* Specifies the Terraform Cloud access token to use.
|
|
143
179
|
*/
|
|
@@ -38,7 +38,9 @@ class SecretBackend extends pulumi.CustomResource {
|
|
|
38
38
|
resourceInputs["basePath"] = state ? state.basePath : undefined;
|
|
39
39
|
resourceInputs["defaultLeaseTtlSeconds"] = state ? state.defaultLeaseTtlSeconds : undefined;
|
|
40
40
|
resourceInputs["description"] = state ? state.description : undefined;
|
|
41
|
+
resourceInputs["disableRemount"] = state ? state.disableRemount : undefined;
|
|
41
42
|
resourceInputs["maxLeaseTtlSeconds"] = state ? state.maxLeaseTtlSeconds : undefined;
|
|
43
|
+
resourceInputs["namespace"] = state ? state.namespace : undefined;
|
|
42
44
|
resourceInputs["token"] = state ? state.token : undefined;
|
|
43
45
|
}
|
|
44
46
|
else {
|
|
@@ -48,10 +50,14 @@ class SecretBackend extends pulumi.CustomResource {
|
|
|
48
50
|
resourceInputs["basePath"] = args ? args.basePath : undefined;
|
|
49
51
|
resourceInputs["defaultLeaseTtlSeconds"] = args ? args.defaultLeaseTtlSeconds : undefined;
|
|
50
52
|
resourceInputs["description"] = args ? args.description : undefined;
|
|
53
|
+
resourceInputs["disableRemount"] = args ? args.disableRemount : undefined;
|
|
51
54
|
resourceInputs["maxLeaseTtlSeconds"] = args ? args.maxLeaseTtlSeconds : undefined;
|
|
52
|
-
resourceInputs["
|
|
55
|
+
resourceInputs["namespace"] = args ? args.namespace : undefined;
|
|
56
|
+
resourceInputs["token"] = (args === null || args === void 0 ? void 0 : args.token) ? pulumi.secret(args.token) : undefined;
|
|
53
57
|
}
|
|
54
58
|
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
59
|
+
const secretOpts = { additionalSecretOutputs: ["token"] };
|
|
60
|
+
opts = pulumi.mergeOptions(opts, secretOpts);
|
|
55
61
|
super(SecretBackend.__pulumiType, name, resourceInputs, opts);
|
|
56
62
|
}
|
|
57
63
|
/**
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretBackend.js","sourceRoot":"","sources":["../../terraformcloud/secretBackend.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;GAqBG;AACH,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;
|
|
1
|
+
{"version":3,"file":"secretBackend.js","sourceRoot":"","sources":["../../terraformcloud/secretBackend.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;GAqBG;AACH,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;IA8EpD,YAAY,IAAY,EAAE,WAAoD,EAAE,IAAmC;QAC/G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA6C,CAAC;YAC5D,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7D;aAAM;YACH,MAAM,IAAI,GAAG,WAA4C,CAAC;YAC1D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,OAAO,CAAC,GAAG,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,KAAK,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;SACjF;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,OAAO,CAAC,EAAE,CAAC;QAC1D,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAClE,CAAC;IA3GD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA0B,EAAE,IAAmC;QACxH,OAAO,IAAI,aAAa,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACpE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,aAAa,CAAC,YAAY,CAAC;IAC9D,CAAC;;AA1BL,sCA6GC;AA/FG,gBAAgB;AACO,0BAAY,GAAG,kDAAkD,CAAC"}
|
|
@@ -47,6 +47,13 @@ export declare class SecretCreds extends pulumi.CustomResource {
|
|
|
47
47
|
* Vault lease associated with them.
|
|
48
48
|
*/
|
|
49
49
|
readonly leaseId: pulumi.Output<string>;
|
|
50
|
+
/**
|
|
51
|
+
* The namespace to provision the resource in.
|
|
52
|
+
* The value should not contain leading or trailing forward slashes.
|
|
53
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
54
|
+
* *Available only for Vault Enterprise*.
|
|
55
|
+
*/
|
|
56
|
+
readonly namespace: pulumi.Output<string | undefined>;
|
|
50
57
|
/**
|
|
51
58
|
* The organization associated with the token provided.
|
|
52
59
|
*/
|
|
@@ -91,6 +98,13 @@ export interface SecretCredsState {
|
|
|
91
98
|
* Vault lease associated with them.
|
|
92
99
|
*/
|
|
93
100
|
leaseId?: pulumi.Input<string>;
|
|
101
|
+
/**
|
|
102
|
+
* The namespace to provision the resource in.
|
|
103
|
+
* The value should not contain leading or trailing forward slashes.
|
|
104
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
105
|
+
* *Available only for Vault Enterprise*.
|
|
106
|
+
*/
|
|
107
|
+
namespace?: pulumi.Input<string>;
|
|
94
108
|
/**
|
|
95
109
|
* The organization associated with the token provided.
|
|
96
110
|
*/
|
|
@@ -122,6 +136,13 @@ export interface SecretCredsArgs {
|
|
|
122
136
|
* Terraform Cloud secret backend to generate tokens from
|
|
123
137
|
*/
|
|
124
138
|
backend: pulumi.Input<string>;
|
|
139
|
+
/**
|
|
140
|
+
* The namespace to provision the resource in.
|
|
141
|
+
* The value should not contain leading or trailing forward slashes.
|
|
142
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
143
|
+
* *Available only for Vault Enterprise*.
|
|
144
|
+
*/
|
|
145
|
+
namespace?: pulumi.Input<string>;
|
|
125
146
|
/**
|
|
126
147
|
* Name of the role.
|
|
127
148
|
*/
|
|
@@ -36,6 +36,7 @@ class SecretCreds extends pulumi.CustomResource {
|
|
|
36
36
|
const state = argsOrState;
|
|
37
37
|
resourceInputs["backend"] = state ? state.backend : undefined;
|
|
38
38
|
resourceInputs["leaseId"] = state ? state.leaseId : undefined;
|
|
39
|
+
resourceInputs["namespace"] = state ? state.namespace : undefined;
|
|
39
40
|
resourceInputs["organization"] = state ? state.organization : undefined;
|
|
40
41
|
resourceInputs["role"] = state ? state.role : undefined;
|
|
41
42
|
resourceInputs["teamId"] = state ? state.teamId : undefined;
|
|
@@ -51,6 +52,7 @@ class SecretCreds extends pulumi.CustomResource {
|
|
|
51
52
|
throw new Error("Missing required property 'role'");
|
|
52
53
|
}
|
|
53
54
|
resourceInputs["backend"] = args ? args.backend : undefined;
|
|
55
|
+
resourceInputs["namespace"] = args ? args.namespace : undefined;
|
|
54
56
|
resourceInputs["role"] = args ? args.role : undefined;
|
|
55
57
|
resourceInputs["leaseId"] = undefined /*out*/;
|
|
56
58
|
resourceInputs["organization"] = undefined /*out*/;
|
|
@@ -59,6 +61,8 @@ class SecretCreds extends pulumi.CustomResource {
|
|
|
59
61
|
resourceInputs["tokenId"] = undefined /*out*/;
|
|
60
62
|
}
|
|
61
63
|
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
64
|
+
const secretOpts = { additionalSecretOutputs: ["leaseId", "token"] };
|
|
65
|
+
opts = pulumi.mergeOptions(opts, secretOpts);
|
|
62
66
|
super(SecretCreds.__pulumiType, name, resourceInputs, opts);
|
|
63
67
|
}
|
|
64
68
|
/**
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretCreds.js","sourceRoot":"","sources":["../../terraformcloud/secretCreds.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;GAsBG;AACH,MAAa,WAAY,SAAQ,MAAM,CAAC,cAAc;
|
|
1
|
+
{"version":3,"file":"secretCreds.js","sourceRoot":"","sources":["../../terraformcloud/secretCreds.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;GAsBG;AACH,MAAa,WAAY,SAAQ,MAAM,CAAC,cAAc;IA2ElD,YAAY,IAAY,EAAE,WAAgD,EAAE,IAAmC;QAC3G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA2C,CAAC;YAC1D,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;SACjE;aAAM;YACH,MAAM,IAAI,GAAG,WAA0C,CAAC;YACxD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,IAAI,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,SAAS,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC9C,cAAc,CAAC,cAAc,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACnD,cAAc,CAAC,QAAQ,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC7C,cAAc,CAAC,OAAO,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC5C,cAAc,CAAC,SAAS,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACjD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,SAAS,EAAE,OAAO,CAAC,EAAE,CAAC;QACrE,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,WAAW,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAChE,CAAC;IA5GD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAwB,EAAE,IAAmC;QACtH,OAAO,IAAI,WAAW,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAClE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,WAAW,CAAC,YAAY,CAAC;IAC5D,CAAC;;AA1BL,kCA8GC;AAhGG,gBAAgB;AACO,wBAAY,GAAG,8CAA8C,CAAC"}
|
|
@@ -54,6 +54,13 @@ export declare class SecretRole extends pulumi.CustomResource {
|
|
|
54
54
|
* The name of an existing role against which to create this Terraform Cloud credential
|
|
55
55
|
*/
|
|
56
56
|
readonly name: pulumi.Output<string>;
|
|
57
|
+
/**
|
|
58
|
+
* The namespace to provision the resource in.
|
|
59
|
+
* The value should not contain leading or trailing forward slashes.
|
|
60
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
61
|
+
* *Available only for Vault Enterprise*.
|
|
62
|
+
*/
|
|
63
|
+
readonly namespace: pulumi.Output<string | undefined>;
|
|
57
64
|
/**
|
|
58
65
|
* Name of the Terraform Cloud or Enterprise organization
|
|
59
66
|
*/
|
|
@@ -95,6 +102,13 @@ export interface SecretRoleState {
|
|
|
95
102
|
* The name of an existing role against which to create this Terraform Cloud credential
|
|
96
103
|
*/
|
|
97
104
|
name?: pulumi.Input<string>;
|
|
105
|
+
/**
|
|
106
|
+
* The namespace to provision the resource in.
|
|
107
|
+
* The value should not contain leading or trailing forward slashes.
|
|
108
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
109
|
+
* *Available only for Vault Enterprise*.
|
|
110
|
+
*/
|
|
111
|
+
namespace?: pulumi.Input<string>;
|
|
98
112
|
/**
|
|
99
113
|
* Name of the Terraform Cloud or Enterprise organization
|
|
100
114
|
*/
|
|
@@ -128,6 +142,13 @@ export interface SecretRoleArgs {
|
|
|
128
142
|
* The name of an existing role against which to create this Terraform Cloud credential
|
|
129
143
|
*/
|
|
130
144
|
name?: pulumi.Input<string>;
|
|
145
|
+
/**
|
|
146
|
+
* The namespace to provision the resource in.
|
|
147
|
+
* The value should not contain leading or trailing forward slashes.
|
|
148
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
149
|
+
* *Available only for Vault Enterprise*.
|
|
150
|
+
*/
|
|
151
|
+
namespace?: pulumi.Input<string>;
|
|
131
152
|
/**
|
|
132
153
|
* Name of the Terraform Cloud or Enterprise organization
|
|
133
154
|
*/
|
|
@@ -41,6 +41,7 @@ class SecretRole extends pulumi.CustomResource {
|
|
|
41
41
|
resourceInputs["backend"] = state ? state.backend : undefined;
|
|
42
42
|
resourceInputs["maxTtl"] = state ? state.maxTtl : undefined;
|
|
43
43
|
resourceInputs["name"] = state ? state.name : undefined;
|
|
44
|
+
resourceInputs["namespace"] = state ? state.namespace : undefined;
|
|
44
45
|
resourceInputs["organization"] = state ? state.organization : undefined;
|
|
45
46
|
resourceInputs["teamId"] = state ? state.teamId : undefined;
|
|
46
47
|
resourceInputs["ttl"] = state ? state.ttl : undefined;
|
|
@@ -51,6 +52,7 @@ class SecretRole extends pulumi.CustomResource {
|
|
|
51
52
|
resourceInputs["backend"] = args ? args.backend : undefined;
|
|
52
53
|
resourceInputs["maxTtl"] = args ? args.maxTtl : undefined;
|
|
53
54
|
resourceInputs["name"] = args ? args.name : undefined;
|
|
55
|
+
resourceInputs["namespace"] = args ? args.namespace : undefined;
|
|
54
56
|
resourceInputs["organization"] = args ? args.organization : undefined;
|
|
55
57
|
resourceInputs["teamId"] = args ? args.teamId : undefined;
|
|
56
58
|
resourceInputs["ttl"] = args ? args.ttl : undefined;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretRole.js","sourceRoot":"","sources":["../../terraformcloud/secretRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;GA0BG;AACH,MAAa,UAAW,SAAQ,MAAM,CAAC,cAAc;
|
|
1
|
+
{"version":3,"file":"secretRole.js","sourceRoot":"","sources":["../../terraformcloud/secretRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;GA0BG;AACH,MAAa,UAAW,SAAQ,MAAM,CAAC,cAAc;IAwEjD,YAAY,IAAY,EAAE,WAA8C,EAAE,IAAmC;QACzG,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA0C,CAAC;YACzD,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAAyC,CAAC;YACvD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,UAAU,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC/D,CAAC;IAjGD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAuB,EAAE,IAAmC;QACrH,OAAO,IAAI,UAAU,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACjE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,UAAU,CAAC,YAAY,CAAC;IAC3D,CAAC;;AA1BL,gCAmGC;AArFG,gBAAgB;AACO,uBAAY,GAAG,4CAA4C,CAAC"}
|
package/token.d.ts
CHANGED
|
@@ -7,6 +7,9 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
7
7
|
* import * as vault from "@pulumi/vault";
|
|
8
8
|
*
|
|
9
9
|
* const example = new vault.Token("example", {
|
|
10
|
+
* metadata: {
|
|
11
|
+
* purpose: "service-account",
|
|
12
|
+
* },
|
|
10
13
|
* policies: [
|
|
11
14
|
* "policy1",
|
|
12
15
|
* "policy2",
|
|
@@ -63,6 +66,19 @@ export declare class Token extends pulumi.CustomResource {
|
|
|
63
66
|
* String containing the token lease started time if present in state file
|
|
64
67
|
*/
|
|
65
68
|
readonly leaseStarted: pulumi.Output<string>;
|
|
69
|
+
/**
|
|
70
|
+
* Metadata to be set on this token
|
|
71
|
+
*/
|
|
72
|
+
readonly metadata: pulumi.Output<{
|
|
73
|
+
[key: string]: string;
|
|
74
|
+
} | undefined>;
|
|
75
|
+
/**
|
|
76
|
+
* The namespace to provision the resource in.
|
|
77
|
+
* The value should not contain leading or trailing forward slashes.
|
|
78
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
79
|
+
* *Available only for Vault Enterprise*.
|
|
80
|
+
*/
|
|
81
|
+
readonly namespace: pulumi.Output<string | undefined>;
|
|
66
82
|
/**
|
|
67
83
|
* Flag to not attach the default policy to this token
|
|
68
84
|
*/
|
|
@@ -148,6 +164,19 @@ export interface TokenState {
|
|
|
148
164
|
* String containing the token lease started time if present in state file
|
|
149
165
|
*/
|
|
150
166
|
leaseStarted?: pulumi.Input<string>;
|
|
167
|
+
/**
|
|
168
|
+
* Metadata to be set on this token
|
|
169
|
+
*/
|
|
170
|
+
metadata?: pulumi.Input<{
|
|
171
|
+
[key: string]: pulumi.Input<string>;
|
|
172
|
+
}>;
|
|
173
|
+
/**
|
|
174
|
+
* The namespace to provision the resource in.
|
|
175
|
+
* The value should not contain leading or trailing forward slashes.
|
|
176
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
177
|
+
* *Available only for Vault Enterprise*.
|
|
178
|
+
*/
|
|
179
|
+
namespace?: pulumi.Input<string>;
|
|
151
180
|
/**
|
|
152
181
|
* Flag to not attach the default policy to this token
|
|
153
182
|
*/
|
|
@@ -213,6 +242,19 @@ export interface TokenArgs {
|
|
|
213
242
|
* The explicit max TTL of this token
|
|
214
243
|
*/
|
|
215
244
|
explicitMaxTtl?: pulumi.Input<string>;
|
|
245
|
+
/**
|
|
246
|
+
* Metadata to be set on this token
|
|
247
|
+
*/
|
|
248
|
+
metadata?: pulumi.Input<{
|
|
249
|
+
[key: string]: pulumi.Input<string>;
|
|
250
|
+
}>;
|
|
251
|
+
/**
|
|
252
|
+
* The namespace to provision the resource in.
|
|
253
|
+
* The value should not contain leading or trailing forward slashes.
|
|
254
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
255
|
+
* *Available only for Vault Enterprise*.
|
|
256
|
+
*/
|
|
257
|
+
namespace?: pulumi.Input<string>;
|
|
216
258
|
/**
|
|
217
259
|
* Flag to not attach the default policy to this token
|
|
218
260
|
*/
|
package/token.js
CHANGED
|
@@ -13,6 +13,9 @@ const utilities = require("./utilities");
|
|
|
13
13
|
* import * as vault from "@pulumi/vault";
|
|
14
14
|
*
|
|
15
15
|
* const example = new vault.Token("example", {
|
|
16
|
+
* metadata: {
|
|
17
|
+
* purpose: "service-account",
|
|
18
|
+
* },
|
|
16
19
|
* policies: [
|
|
17
20
|
* "policy1",
|
|
18
21
|
* "policy2",
|
|
@@ -44,6 +47,8 @@ class Token extends pulumi.CustomResource {
|
|
|
44
47
|
resourceInputs["explicitMaxTtl"] = state ? state.explicitMaxTtl : undefined;
|
|
45
48
|
resourceInputs["leaseDuration"] = state ? state.leaseDuration : undefined;
|
|
46
49
|
resourceInputs["leaseStarted"] = state ? state.leaseStarted : undefined;
|
|
50
|
+
resourceInputs["metadata"] = state ? state.metadata : undefined;
|
|
51
|
+
resourceInputs["namespace"] = state ? state.namespace : undefined;
|
|
47
52
|
resourceInputs["noDefaultPolicy"] = state ? state.noDefaultPolicy : undefined;
|
|
48
53
|
resourceInputs["noParent"] = state ? state.noParent : undefined;
|
|
49
54
|
resourceInputs["numUses"] = state ? state.numUses : undefined;
|
|
@@ -62,6 +67,8 @@ class Token extends pulumi.CustomResource {
|
|
|
62
67
|
const args = argsOrState;
|
|
63
68
|
resourceInputs["displayName"] = args ? args.displayName : undefined;
|
|
64
69
|
resourceInputs["explicitMaxTtl"] = args ? args.explicitMaxTtl : undefined;
|
|
70
|
+
resourceInputs["metadata"] = args ? args.metadata : undefined;
|
|
71
|
+
resourceInputs["namespace"] = args ? args.namespace : undefined;
|
|
65
72
|
resourceInputs["noDefaultPolicy"] = args ? args.noDefaultPolicy : undefined;
|
|
66
73
|
resourceInputs["noParent"] = args ? args.noParent : undefined;
|
|
67
74
|
resourceInputs["numUses"] = args ? args.numUses : undefined;
|
|
@@ -80,6 +87,8 @@ class Token extends pulumi.CustomResource {
|
|
|
80
87
|
resourceInputs["wrappingAccessor"] = undefined /*out*/;
|
|
81
88
|
}
|
|
82
89
|
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
90
|
+
const secretOpts = { additionalSecretOutputs: ["clientToken", "wrappedToken", "wrappingAccessor"] };
|
|
91
|
+
opts = pulumi.mergeOptions(opts, secretOpts);
|
|
83
92
|
super(Token.__pulumiType, name, resourceInputs, opts);
|
|
84
93
|
}
|
|
85
94
|
/**
|
package/token.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"token.js","sourceRoot":"","sources":["../token.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"token.js","sourceRoot":"","sources":["../token.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA8BG;AACH,MAAa,KAAM,SAAQ,MAAM,CAAC,cAAc;IAwH5C,YAAY,IAAY,EAAE,WAAoC,EAAE,IAAmC;QAC/F,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAqC,CAAC;YACpD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;SACzE;aAAM;YACH,MAAM,IAAI,GAAG,WAAoC,CAAC;YAClD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,aAAa,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAClD,cAAc,CAAC,eAAe,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACpD,cAAc,CAAC,cAAc,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACnD,cAAc,CAAC,cAAc,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACnD,cAAc,CAAC,kBAAkB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAC1D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,aAAa,EAAE,cAAc,EAAE,kBAAkB,CAAC,EAAE,CAAC;QACpG,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,KAAK,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC1D,CAAC;IA3KD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAkB,EAAE,IAAmC;QAChH,OAAO,IAAI,KAAK,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC5D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,KAAK,CAAC,YAAY,CAAC;IACtD,CAAC;;AA1BL,sBA6KC;AA/JG,gBAAgB;AACO,kBAAY,GAAG,yBAAyB,CAAC"}
|
|
@@ -70,6 +70,13 @@ export declare class AuthBackendRole extends pulumi.CustomResource {
|
|
|
70
70
|
* Set of disallowed policies with glob match for given role.
|
|
71
71
|
*/
|
|
72
72
|
readonly disallowedPoliciesGlobs: pulumi.Output<string[] | undefined>;
|
|
73
|
+
/**
|
|
74
|
+
* The namespace to provision the resource in.
|
|
75
|
+
* The value should not contain leading or trailing forward slashes.
|
|
76
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
77
|
+
* *Available only for Vault Enterprise*.
|
|
78
|
+
*/
|
|
79
|
+
readonly namespace: pulumi.Output<string | undefined>;
|
|
73
80
|
/**
|
|
74
81
|
* If true, tokens created against this policy will be orphan tokens.
|
|
75
82
|
*/
|
|
@@ -171,6 +178,13 @@ export interface AuthBackendRoleState {
|
|
|
171
178
|
* Set of disallowed policies with glob match for given role.
|
|
172
179
|
*/
|
|
173
180
|
disallowedPoliciesGlobs?: pulumi.Input<pulumi.Input<string>[]>;
|
|
181
|
+
/**
|
|
182
|
+
* The namespace to provision the resource in.
|
|
183
|
+
* The value should not contain leading or trailing forward slashes.
|
|
184
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
185
|
+
* *Available only for Vault Enterprise*.
|
|
186
|
+
*/
|
|
187
|
+
namespace?: pulumi.Input<string>;
|
|
174
188
|
/**
|
|
175
189
|
* If true, tokens created against this policy will be orphan tokens.
|
|
176
190
|
*/
|
|
@@ -264,6 +278,13 @@ export interface AuthBackendRoleArgs {
|
|
|
264
278
|
* Set of disallowed policies with glob match for given role.
|
|
265
279
|
*/
|
|
266
280
|
disallowedPoliciesGlobs?: pulumi.Input<pulumi.Input<string>[]>;
|
|
281
|
+
/**
|
|
282
|
+
* The namespace to provision the resource in.
|
|
283
|
+
* The value should not contain leading or trailing forward slashes.
|
|
284
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
285
|
+
* *Available only for Vault Enterprise*.
|
|
286
|
+
*/
|
|
287
|
+
namespace?: pulumi.Input<string>;
|
|
267
288
|
/**
|
|
268
289
|
* If true, tokens created against this policy will be orphan tokens.
|
|
269
290
|
*/
|
|
@@ -51,6 +51,7 @@ class AuthBackendRole extends pulumi.CustomResource {
|
|
|
51
51
|
resourceInputs["allowedPoliciesGlobs"] = state ? state.allowedPoliciesGlobs : undefined;
|
|
52
52
|
resourceInputs["disallowedPolicies"] = state ? state.disallowedPolicies : undefined;
|
|
53
53
|
resourceInputs["disallowedPoliciesGlobs"] = state ? state.disallowedPoliciesGlobs : undefined;
|
|
54
|
+
resourceInputs["namespace"] = state ? state.namespace : undefined;
|
|
54
55
|
resourceInputs["orphan"] = state ? state.orphan : undefined;
|
|
55
56
|
resourceInputs["pathSuffix"] = state ? state.pathSuffix : undefined;
|
|
56
57
|
resourceInputs["renewable"] = state ? state.renewable : undefined;
|
|
@@ -75,6 +76,7 @@ class AuthBackendRole extends pulumi.CustomResource {
|
|
|
75
76
|
resourceInputs["allowedPoliciesGlobs"] = args ? args.allowedPoliciesGlobs : undefined;
|
|
76
77
|
resourceInputs["disallowedPolicies"] = args ? args.disallowedPolicies : undefined;
|
|
77
78
|
resourceInputs["disallowedPoliciesGlobs"] = args ? args.disallowedPoliciesGlobs : undefined;
|
|
79
|
+
resourceInputs["namespace"] = args ? args.namespace : undefined;
|
|
78
80
|
resourceInputs["orphan"] = args ? args.orphan : undefined;
|
|
79
81
|
resourceInputs["pathSuffix"] = args ? args.pathSuffix : undefined;
|
|
80
82
|
resourceInputs["renewable"] = args ? args.renewable : undefined;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"authBackendRole.js","sourceRoot":"","sources":["../../tokenauth/authBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAkCG;AACH,MAAa,eAAgB,SAAQ,MAAM,CAAC,cAAc;
|
|
1
|
+
{"version":3,"file":"authBackendRole.js","sourceRoot":"","sources":["../../tokenauth/authBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAkCG;AACH,MAAa,eAAgB,SAAQ,MAAM,CAAC,cAAc;IAoItD,YAAY,IAAY,EAAE,WAAwD,EAAE,IAAmC;QACnH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA+C,CAAC;YAC9D,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,yBAAyB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;SACrE;aAAM;YACH,MAAM,IAAI,GAAG,WAA8C,CAAC;YAC5D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,yBAAyB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;SACnE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,eAAe,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACpE,CAAC;IAtLD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA4B,EAAE,IAAmC;QAC1H,OAAO,IAAI,eAAe,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACtE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,eAAe,CAAC,YAAY,CAAC;IAChE,CAAC;;AA1BL,0CAwLC;AA1KG,gBAAgB;AACO,4BAAY,GAAG,iDAAiD,CAAC"}
|
package/tokenauth/index.d.ts
CHANGED
|
@@ -1 +1,3 @@
|
|
|
1
|
-
export
|
|
1
|
+
export { AuthBackendRoleArgs, AuthBackendRoleState } from "./authBackendRole";
|
|
2
|
+
export declare type AuthBackendRole = import("./authBackendRole").AuthBackendRole;
|
|
3
|
+
export declare const AuthBackendRole: typeof import("./authBackendRole").AuthBackendRole;
|
package/tokenauth/index.js
CHANGED
|
@@ -1,33 +1,18 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
3
|
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
-
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
5
|
-
if (k2 === undefined) k2 = k;
|
|
6
|
-
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
7
|
-
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
8
|
-
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
9
|
-
}
|
|
10
|
-
Object.defineProperty(o, k2, desc);
|
|
11
|
-
}) : (function(o, m, k, k2) {
|
|
12
|
-
if (k2 === undefined) k2 = k;
|
|
13
|
-
o[k2] = m[k];
|
|
14
|
-
}));
|
|
15
|
-
var __exportStar = (this && this.__exportStar) || function(m, exports) {
|
|
16
|
-
for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
|
|
17
|
-
};
|
|
18
4
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.AuthBackendRole = void 0;
|
|
19
6
|
const pulumi = require("@pulumi/pulumi");
|
|
20
7
|
const utilities = require("../utilities");
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
// Import resources to register:
|
|
24
|
-
const authBackendRole_1 = require("./authBackendRole");
|
|
8
|
+
exports.AuthBackendRole = null;
|
|
9
|
+
utilities.lazyLoad(exports, ["AuthBackendRole"], () => require("./authBackendRole"));
|
|
25
10
|
const _module = {
|
|
26
11
|
version: utilities.getVersion(),
|
|
27
12
|
construct: (name, type, urn) => {
|
|
28
13
|
switch (type) {
|
|
29
14
|
case "vault:tokenauth/authBackendRole:AuthBackendRole":
|
|
30
|
-
return new
|
|
15
|
+
return new exports.AuthBackendRole(name, undefined, { urn });
|
|
31
16
|
default:
|
|
32
17
|
throw new Error(`unknown resource type ${type}`);
|
|
33
18
|
}
|
package/tokenauth/index.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../tokenauth/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../tokenauth/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAK7B,QAAA,eAAe,GAAuD,IAAW,CAAC;AAE/F,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,iBAAiB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,mBAAmB,CAAC,CAAC,CAAC;AAErF,MAAM,OAAO,GAAG;IACZ,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE;IAC/B,SAAS,EAAE,CAAC,IAAY,EAAE,IAAY,EAAE,GAAW,EAAmB,EAAE;QACpE,QAAQ,IAAI,EAAE;YACV,KAAK,iDAAiD;gBAClD,OAAO,IAAI,uBAAe,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC7D;gBACI,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,EAAE,CAAC,CAAC;SACxD;IACL,CAAC;CACJ,CAAC;AACF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,2BAA2B,EAAE,OAAO,CAAC,CAAA"}
|
package/transform/index.d.ts
CHANGED
|
@@ -1,6 +1,18 @@
|
|
|
1
|
-
export
|
|
2
|
-
export
|
|
3
|
-
export
|
|
4
|
-
export
|
|
5
|
-
export
|
|
6
|
-
export
|
|
1
|
+
export { AlphabetArgs, AlphabetState } from "./alphabet";
|
|
2
|
+
export declare type Alphabet = import("./alphabet").Alphabet;
|
|
3
|
+
export declare const Alphabet: typeof import("./alphabet").Alphabet;
|
|
4
|
+
export { GetDecodeArgs, GetDecodeResult, GetDecodeOutputArgs } from "./getDecode";
|
|
5
|
+
export declare const getDecode: typeof import("./getDecode").getDecode;
|
|
6
|
+
export declare const getDecodeOutput: typeof import("./getDecode").getDecodeOutput;
|
|
7
|
+
export { GetEncodeArgs, GetEncodeResult, GetEncodeOutputArgs } from "./getEncode";
|
|
8
|
+
export declare const getEncode: typeof import("./getEncode").getEncode;
|
|
9
|
+
export declare const getEncodeOutput: typeof import("./getEncode").getEncodeOutput;
|
|
10
|
+
export { RoleArgs, RoleState } from "./role";
|
|
11
|
+
export declare type Role = import("./role").Role;
|
|
12
|
+
export declare const Role: typeof import("./role").Role;
|
|
13
|
+
export { TemplateArgs, TemplateState } from "./template";
|
|
14
|
+
export declare type Template = import("./template").Template;
|
|
15
|
+
export declare const Template: typeof import("./template").Template;
|
|
16
|
+
export { TransformationArgs, TransformationState } from "./transformation";
|
|
17
|
+
export declare type Transformation = import("./transformation").Transformation;
|
|
18
|
+
export declare const Transformation: typeof import("./transformation").Transformation;
|
package/transform/index.js
CHANGED
|
@@ -1,47 +1,36 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
3
|
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
-
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
5
|
-
if (k2 === undefined) k2 = k;
|
|
6
|
-
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
7
|
-
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
8
|
-
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
9
|
-
}
|
|
10
|
-
Object.defineProperty(o, k2, desc);
|
|
11
|
-
}) : (function(o, m, k, k2) {
|
|
12
|
-
if (k2 === undefined) k2 = k;
|
|
13
|
-
o[k2] = m[k];
|
|
14
|
-
}));
|
|
15
|
-
var __exportStar = (this && this.__exportStar) || function(m, exports) {
|
|
16
|
-
for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
|
|
17
|
-
};
|
|
18
4
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.Transformation = exports.Template = exports.Role = exports.getEncodeOutput = exports.getEncode = exports.getDecodeOutput = exports.getDecode = exports.Alphabet = void 0;
|
|
19
6
|
const pulumi = require("@pulumi/pulumi");
|
|
20
7
|
const utilities = require("../utilities");
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
|
|
8
|
+
exports.Alphabet = null;
|
|
9
|
+
exports.getDecode = null;
|
|
10
|
+
exports.getDecodeOutput = null;
|
|
11
|
+
exports.getEncode = null;
|
|
12
|
+
exports.getEncodeOutput = null;
|
|
13
|
+
exports.Role = null;
|
|
14
|
+
exports.Template = null;
|
|
15
|
+
exports.Transformation = null;
|
|
16
|
+
utilities.lazyLoad(exports, ["Alphabet"], () => require("./alphabet"));
|
|
17
|
+
utilities.lazyLoad(exports, ["getDecode", "getDecodeOutput"], () => require("./getDecode"));
|
|
18
|
+
utilities.lazyLoad(exports, ["getEncode", "getEncodeOutput"], () => require("./getEncode"));
|
|
19
|
+
utilities.lazyLoad(exports, ["Role"], () => require("./role"));
|
|
20
|
+
utilities.lazyLoad(exports, ["Template"], () => require("./template"));
|
|
21
|
+
utilities.lazyLoad(exports, ["Transformation"], () => require("./transformation"));
|
|
33
22
|
const _module = {
|
|
34
23
|
version: utilities.getVersion(),
|
|
35
24
|
construct: (name, type, urn) => {
|
|
36
25
|
switch (type) {
|
|
37
26
|
case "vault:transform/alphabet:Alphabet":
|
|
38
|
-
return new
|
|
27
|
+
return new exports.Alphabet(name, undefined, { urn });
|
|
39
28
|
case "vault:transform/role:Role":
|
|
40
|
-
return new
|
|
29
|
+
return new exports.Role(name, undefined, { urn });
|
|
41
30
|
case "vault:transform/template:Template":
|
|
42
|
-
return new
|
|
31
|
+
return new exports.Template(name, undefined, { urn });
|
|
43
32
|
case "vault:transform/transformation:Transformation":
|
|
44
|
-
return new
|
|
33
|
+
return new exports.Transformation(name, undefined, { urn });
|
|
45
34
|
default:
|
|
46
35
|
throw new Error(`unknown resource type ${type}`);
|
|
47
36
|
}
|