@pulumi/vault 5.6.0 → 5.7.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (515) hide show
  1. package/ad/getAccessCredentials.d.ts +15 -0
  2. package/ad/getAccessCredentials.js +1 -0
  3. package/ad/getAccessCredentials.js.map +1 -1
  4. package/ad/index.d.ts +12 -4
  5. package/ad/index.js +13 -26
  6. package/ad/index.js.map +1 -1
  7. package/ad/secretBackend.d.ts +39 -0
  8. package/ad/secretBackend.js +9 -3
  9. package/ad/secretBackend.js.map +1 -1
  10. package/ad/secretLibrary.d.ts +21 -0
  11. package/ad/secretLibrary.js +2 -0
  12. package/ad/secretLibrary.js.map +1 -1
  13. package/ad/secretRole.d.ts +21 -0
  14. package/ad/secretRole.js +2 -0
  15. package/ad/secretRole.js.map +1 -1
  16. package/alicloud/authBackendRole.d.ts +21 -0
  17. package/alicloud/authBackendRole.js +2 -0
  18. package/alicloud/authBackendRole.js.map +1 -1
  19. package/alicloud/index.d.ts +3 -1
  20. package/alicloud/index.js +4 -19
  21. package/alicloud/index.js.map +1 -1
  22. package/approle/authBackendLogin.d.ts +22 -1
  23. package/approle/authBackendLogin.js +3 -1
  24. package/approle/authBackendLogin.js.map +1 -1
  25. package/approle/authBackendRole.d.ts +21 -0
  26. package/approle/authBackendRole.js +2 -0
  27. package/approle/authBackendRole.js.map +1 -1
  28. package/approle/{authBackendRoleSecretID.d.ts → authBackendRoleSecretId.d.ts} +33 -12
  29. package/approle/{authBackendRoleSecretID.js → authBackendRoleSecretId.js} +16 -12
  30. package/approle/authBackendRoleSecretId.js.map +1 -0
  31. package/approle/getAuthBackendRoleId.d.ts +15 -0
  32. package/approle/getAuthBackendRoleId.js +1 -0
  33. package/approle/getAuthBackendRoleId.js.map +1 -1
  34. package/approle/index.d.ts +12 -4
  35. package/approle/index.js +15 -28
  36. package/approle/index.js.map +1 -1
  37. package/audit.d.ts +21 -0
  38. package/audit.js +2 -0
  39. package/audit.js.map +1 -1
  40. package/authBackend.d.ts +47 -10
  41. package/authBackend.js +4 -0
  42. package/authBackend.js.map +1 -1
  43. package/aws/authBackendCert.d.ts +21 -0
  44. package/aws/authBackendCert.js +2 -0
  45. package/aws/authBackendCert.js.map +1 -1
  46. package/aws/authBackendClient.d.ts +21 -0
  47. package/aws/authBackendClient.js +6 -2
  48. package/aws/authBackendClient.js.map +1 -1
  49. package/aws/authBackendIdentityWhitelist.d.ts +21 -0
  50. package/aws/authBackendIdentityWhitelist.js +2 -0
  51. package/aws/authBackendIdentityWhitelist.js.map +1 -1
  52. package/aws/authBackendLogin.d.ts +21 -0
  53. package/aws/authBackendLogin.js +4 -0
  54. package/aws/authBackendLogin.js.map +1 -1
  55. package/aws/authBackendRole.d.ts +21 -0
  56. package/aws/authBackendRole.js +2 -0
  57. package/aws/authBackendRole.js.map +1 -1
  58. package/aws/authBackendRoleTag.d.ts +21 -0
  59. package/aws/authBackendRoleTag.js +2 -0
  60. package/aws/authBackendRoleTag.js.map +1 -1
  61. package/aws/authBackendRoletagBlacklist.d.ts +21 -0
  62. package/aws/authBackendRoletagBlacklist.js +2 -0
  63. package/aws/authBackendRoletagBlacklist.js.map +1 -1
  64. package/aws/authBackendStsRole.d.ts +21 -0
  65. package/aws/authBackendStsRole.js +2 -0
  66. package/aws/authBackendStsRole.js.map +1 -1
  67. package/aws/getAccessCredentials.d.ts +15 -0
  68. package/aws/getAccessCredentials.js +1 -0
  69. package/aws/getAccessCredentials.js.map +1 -1
  70. package/aws/index.d.ts +33 -11
  71. package/aws/index.js +34 -47
  72. package/aws/index.js.map +1 -1
  73. package/aws/secretBackend.d.ts +36 -12
  74. package/aws/secretBackend.js +8 -14
  75. package/aws/secretBackend.js.map +1 -1
  76. package/aws/secretBackendRole.d.ts +21 -0
  77. package/aws/secretBackendRole.js +2 -0
  78. package/aws/secretBackendRole.js.map +1 -1
  79. package/azure/authBackendConfig.d.ts +21 -0
  80. package/azure/authBackendConfig.js +7 -3
  81. package/azure/authBackendConfig.js.map +1 -1
  82. package/azure/authBackendRole.d.ts +21 -0
  83. package/azure/authBackendRole.js +2 -0
  84. package/azure/authBackendRole.js.map +1 -1
  85. package/azure/backend.d.ts +36 -0
  86. package/azure/backend.js +10 -4
  87. package/azure/backend.js.map +1 -1
  88. package/azure/backendRole.d.ts +23 -1
  89. package/azure/backendRole.js +2 -0
  90. package/azure/backendRole.js.map +1 -1
  91. package/azure/getAccessCredentials.d.ts +15 -0
  92. package/azure/getAccessCredentials.js +1 -0
  93. package/azure/getAccessCredentials.js.map +1 -1
  94. package/azure/index.d.ts +15 -5
  95. package/azure/index.js +16 -29
  96. package/azure/index.js.map +1 -1
  97. package/certAuthBackendRole.d.ts +39 -3
  98. package/certAuthBackendRole.js +4 -0
  99. package/certAuthBackendRole.js.map +1 -1
  100. package/config/vars.d.ts +43 -3
  101. package/config/vars.js +64 -4
  102. package/config/vars.js.map +1 -1
  103. package/consul/index.d.ts +6 -2
  104. package/consul/index.js +7 -22
  105. package/consul/index.js.map +1 -1
  106. package/consul/secretBackend.d.ts +87 -15
  107. package/consul/secretBackend.js +24 -7
  108. package/consul/secretBackend.js.map +1 -1
  109. package/consul/secretBackendRole.d.ts +93 -10
  110. package/consul/secretBackendRole.js +14 -1
  111. package/consul/secretBackendRole.js.map +1 -1
  112. package/database/index.d.ts +12 -4
  113. package/database/index.js +13 -28
  114. package/database/index.js.map +1 -1
  115. package/database/secretBackendConnection.d.ts +35 -1
  116. package/database/secretBackendConnection.js +4 -0
  117. package/database/secretBackendConnection.js.map +1 -1
  118. package/database/secretBackendRole.d.ts +21 -0
  119. package/database/secretBackendRole.js +2 -0
  120. package/database/secretBackendRole.js.map +1 -1
  121. package/database/secretBackendStaticRole.d.ts +21 -0
  122. package/database/secretBackendStaticRole.js +2 -0
  123. package/database/secretBackendStaticRole.js.map +1 -1
  124. package/database/secretsMount.d.ts +41 -1
  125. package/database/secretsMount.js +6 -0
  126. package/database/secretsMount.js.map +1 -1
  127. package/egpPolicy.d.ts +21 -0
  128. package/egpPolicy.js +2 -0
  129. package/egpPolicy.js.map +1 -1
  130. package/gcp/authBackend.d.ts +71 -1
  131. package/gcp/authBackend.js +18 -2
  132. package/gcp/authBackend.js.map +1 -1
  133. package/gcp/authBackendRole.d.ts +21 -0
  134. package/gcp/authBackendRole.js +2 -0
  135. package/gcp/authBackendRole.js.map +1 -1
  136. package/gcp/getAuthBackendRole.d.ts +15 -0
  137. package/gcp/getAuthBackendRole.js +1 -0
  138. package/gcp/getAuthBackendRole.js.map +1 -1
  139. package/gcp/index.d.ts +18 -6
  140. package/gcp/index.js +19 -32
  141. package/gcp/index.js.map +1 -1
  142. package/gcp/secretBackend.d.ts +36 -0
  143. package/gcp/secretBackend.js +7 -1
  144. package/gcp/secretBackend.js.map +1 -1
  145. package/gcp/secretRoleset.d.ts +23 -1
  146. package/gcp/secretRoleset.js +2 -0
  147. package/gcp/secretRoleset.js.map +1 -1
  148. package/gcp/secretStaticAccount.d.ts +23 -1
  149. package/gcp/secretStaticAccount.js +2 -0
  150. package/gcp/secretStaticAccount.js.map +1 -1
  151. package/generic/endpoint.d.ts +21 -0
  152. package/generic/endpoint.js +5 -1
  153. package/generic/endpoint.js.map +1 -1
  154. package/generic/getSecret.d.ts +15 -0
  155. package/generic/getSecret.js +1 -0
  156. package/generic/getSecret.js.map +1 -1
  157. package/generic/index.d.ts +9 -3
  158. package/generic/index.js +10 -23
  159. package/generic/index.js.map +1 -1
  160. package/generic/secret.d.ts +21 -0
  161. package/generic/secret.js +5 -1
  162. package/generic/secret.js.map +1 -1
  163. package/getAuthBackend.d.ts +16 -1
  164. package/getAuthBackend.js +1 -0
  165. package/getAuthBackend.js.map +1 -1
  166. package/getNomadAccessToken.d.ts +15 -0
  167. package/getNomadAccessToken.js +1 -0
  168. package/getNomadAccessToken.js.map +1 -1
  169. package/getPolicyDocument.d.ts +5 -1
  170. package/getPolicyDocument.js +1 -0
  171. package/getPolicyDocument.js.map +1 -1
  172. package/github/authBackend.d.ts +38 -1
  173. package/github/authBackend.js +4 -0
  174. package/github/authBackend.js.map +1 -1
  175. package/github/index.d.ts +9 -3
  176. package/github/index.js +10 -25
  177. package/github/index.js.map +1 -1
  178. package/github/team.d.ts +21 -0
  179. package/github/team.js +2 -0
  180. package/github/team.js.map +1 -1
  181. package/github/user.d.ts +21 -0
  182. package/github/user.js +2 -0
  183. package/github/user.js.map +1 -1
  184. package/identity/entity.d.ts +21 -0
  185. package/identity/entity.js +2 -0
  186. package/identity/entity.js.map +1 -1
  187. package/identity/entityAlias.d.ts +21 -0
  188. package/identity/entityAlias.js +2 -0
  189. package/identity/entityAlias.js.map +1 -1
  190. package/identity/entityPolicies.d.ts +21 -0
  191. package/identity/entityPolicies.js +2 -0
  192. package/identity/entityPolicies.js.map +1 -1
  193. package/identity/getEntity.d.ts +16 -1
  194. package/identity/getEntity.js +1 -0
  195. package/identity/getEntity.js.map +1 -1
  196. package/identity/getGroup.d.ts +15 -0
  197. package/identity/getGroup.js +1 -0
  198. package/identity/getGroup.js.map +1 -1
  199. package/identity/getOidcClientCreds.d.ts +15 -0
  200. package/identity/getOidcClientCreds.js +1 -0
  201. package/identity/getOidcClientCreds.js.map +1 -1
  202. package/identity/getOidcOpenidConfig.d.ts +15 -0
  203. package/identity/getOidcOpenidConfig.js +1 -0
  204. package/identity/getOidcOpenidConfig.js.map +1 -1
  205. package/identity/getOidcPublicKeys.d.ts +15 -0
  206. package/identity/getOidcPublicKeys.js +1 -0
  207. package/identity/getOidcPublicKeys.js.map +1 -1
  208. package/identity/group.d.ts +21 -0
  209. package/identity/group.js +2 -0
  210. package/identity/group.js.map +1 -1
  211. package/identity/groupAlias.d.ts +21 -0
  212. package/identity/groupAlias.js +2 -0
  213. package/identity/groupAlias.js.map +1 -1
  214. package/identity/groupMemberEntityIds.d.ts +21 -0
  215. package/identity/groupMemberEntityIds.js +2 -0
  216. package/identity/groupMemberEntityIds.js.map +1 -1
  217. package/identity/groupPolicies.d.ts +21 -0
  218. package/identity/groupPolicies.js +2 -0
  219. package/identity/groupPolicies.js.map +1 -1
  220. package/identity/index.d.ts +75 -20
  221. package/identity/index.js +86 -66
  222. package/identity/index.js.map +1 -1
  223. package/identity/mfaDuo.d.ts +200 -0
  224. package/identity/mfaDuo.js +110 -0
  225. package/identity/mfaDuo.js.map +1 -0
  226. package/identity/mfaLoginEnforcement.d.ts +170 -0
  227. package/identity/mfaLoginEnforcement.js +96 -0
  228. package/identity/mfaLoginEnforcement.js.map +1 -0
  229. package/identity/mfaOkta.d.ts +188 -0
  230. package/identity/mfaOkta.js +105 -0
  231. package/identity/mfaOkta.js.map +1 -0
  232. package/identity/mfaPingid.d.ts +190 -0
  233. package/identity/mfaPingid.js +102 -0
  234. package/identity/mfaPingid.js.map +1 -0
  235. package/identity/mfaTotp.d.ts +218 -0
  236. package/identity/mfaTotp.js +104 -0
  237. package/identity/mfaTotp.js.map +1 -0
  238. package/identity/oidc.d.ts +21 -0
  239. package/identity/oidc.js +2 -0
  240. package/identity/oidc.js.map +1 -1
  241. package/identity/oidcAssignment.d.ts +23 -2
  242. package/identity/oidcAssignment.js +4 -2
  243. package/identity/oidcAssignment.js.map +1 -1
  244. package/identity/oidcClient.d.ts +21 -0
  245. package/identity/oidcClient.js +4 -0
  246. package/identity/oidcClient.js.map +1 -1
  247. package/identity/oidcKey.d.ts +21 -0
  248. package/identity/oidcKey.js +2 -0
  249. package/identity/oidcKey.js.map +1 -1
  250. package/identity/oidcKeyAllowedClientID.d.ts +21 -0
  251. package/identity/oidcKeyAllowedClientID.js +2 -0
  252. package/identity/oidcKeyAllowedClientID.js.map +1 -1
  253. package/identity/oidcProvider.d.ts +21 -0
  254. package/identity/oidcProvider.js +2 -0
  255. package/identity/oidcProvider.js.map +1 -1
  256. package/identity/oidcRole.d.ts +21 -0
  257. package/identity/oidcRole.js +2 -0
  258. package/identity/oidcRole.js.map +1 -1
  259. package/identity/oidcScope.d.ts +22 -3
  260. package/identity/oidcScope.js +3 -3
  261. package/identity/oidcScope.js.map +1 -1
  262. package/index.d.ts +75 -25
  263. package/index.js +78 -83
  264. package/index.js.map +1 -1
  265. package/jwt/authBackend.d.ts +38 -1
  266. package/jwt/authBackend.js +7 -1
  267. package/jwt/authBackend.js.map +1 -1
  268. package/jwt/authBackendRole.d.ts +57 -0
  269. package/jwt/authBackendRole.js +6 -0
  270. package/jwt/authBackendRole.js.map +1 -1
  271. package/jwt/index.d.ts +6 -2
  272. package/jwt/index.js +7 -22
  273. package/jwt/index.js.map +1 -1
  274. package/kmip/index.d.ts +9 -3
  275. package/kmip/index.js +10 -25
  276. package/kmip/index.js.map +1 -1
  277. package/kmip/secretBackend.d.ts +36 -0
  278. package/kmip/secretBackend.js +4 -0
  279. package/kmip/secretBackend.js.map +1 -1
  280. package/kmip/secretRole.d.ts +21 -0
  281. package/kmip/secretRole.js +2 -0
  282. package/kmip/secretRole.js.map +1 -1
  283. package/kmip/secretScope.d.ts +21 -0
  284. package/kmip/secretScope.js +2 -0
  285. package/kmip/secretScope.js.map +1 -1
  286. package/kubernetes/authBackendConfig.d.ts +21 -0
  287. package/kubernetes/authBackendConfig.js +5 -1
  288. package/kubernetes/authBackendConfig.js.map +1 -1
  289. package/kubernetes/authBackendRole.d.ts +21 -0
  290. package/kubernetes/authBackendRole.js +2 -0
  291. package/kubernetes/authBackendRole.js.map +1 -1
  292. package/kubernetes/getAuthBackendConfig.d.ts +15 -0
  293. package/kubernetes/getAuthBackendConfig.js +1 -0
  294. package/kubernetes/getAuthBackendConfig.js.map +1 -1
  295. package/kubernetes/getAuthBackendRole.d.ts +15 -0
  296. package/kubernetes/getAuthBackendRole.js +1 -0
  297. package/kubernetes/getAuthBackendRole.js.map +1 -1
  298. package/kubernetes/getServiceAccountToken.d.ts +156 -0
  299. package/kubernetes/getServiceAccountToken.js +67 -0
  300. package/kubernetes/getServiceAccountToken.js.map +1 -0
  301. package/kubernetes/index.d.ts +21 -4
  302. package/kubernetes/index.js +26 -24
  303. package/kubernetes/index.js.map +1 -1
  304. package/kubernetes/secretBackend.d.ts +303 -0
  305. package/kubernetes/secretBackend.js +114 -0
  306. package/kubernetes/secretBackend.js.map +1 -0
  307. package/kubernetes/secretBackendRole.d.ts +367 -0
  308. package/kubernetes/secretBackendRole.js +191 -0
  309. package/kubernetes/secretBackendRole.js.map +1 -0
  310. package/kv/getSecret.d.ts +104 -0
  311. package/kv/getSecret.js +53 -0
  312. package/kv/getSecret.js.map +1 -0
  313. package/kv/getSecretSubkeysV2.d.ts +132 -0
  314. package/kv/getSecretSubkeysV2.js +57 -0
  315. package/kv/getSecretSubkeysV2.js.map +1 -0
  316. package/kv/getSecretV2.d.ts +139 -0
  317. package/kv/getSecretV2.js +58 -0
  318. package/kv/getSecretV2.js.map +1 -0
  319. package/kv/getSecretsList.d.ts +85 -0
  320. package/kv/getSecretsList.js +58 -0
  321. package/kv/getSecretsList.js.map +1 -0
  322. package/kv/getSecretsListV2.d.ts +114 -0
  323. package/kv/getSecretsListV2.js +69 -0
  324. package/kv/getSecretsListV2.js.map +1 -0
  325. package/kv/index.d.ts +24 -0
  326. package/kv/index.js +47 -0
  327. package/kv/index.js.map +1 -0
  328. package/kv/secret.d.ts +145 -0
  329. package/kv/secret.js +106 -0
  330. package/kv/secret.js.map +1 -0
  331. package/kv/secretBackendV2.d.ts +154 -0
  332. package/kv/secretBackendV2.js +103 -0
  333. package/kv/secretBackendV2.js.map +1 -0
  334. package/kv/secretV2.d.ts +257 -0
  335. package/kv/secretV2.js +122 -0
  336. package/kv/secretV2.js.map +1 -0
  337. package/ldap/authBackend.d.ts +48 -0
  338. package/ldap/authBackend.js +10 -2
  339. package/ldap/authBackend.js.map +1 -1
  340. package/ldap/authBackendGroup.d.ts +21 -0
  341. package/ldap/authBackendGroup.js +2 -0
  342. package/ldap/authBackendGroup.js.map +1 -1
  343. package/ldap/authBackendUser.d.ts +21 -0
  344. package/ldap/authBackendUser.js +2 -0
  345. package/ldap/authBackendUser.js.map +1 -1
  346. package/ldap/index.d.ts +9 -3
  347. package/ldap/index.js +10 -25
  348. package/ldap/index.js.map +1 -1
  349. package/managed/index.d.ts +3 -0
  350. package/managed/index.js +22 -0
  351. package/managed/index.js.map +1 -0
  352. package/managed/keys.d.ts +104 -0
  353. package/managed/keys.js +64 -0
  354. package/managed/keys.js.map +1 -0
  355. package/mfaDuo.d.ts +21 -0
  356. package/mfaDuo.js +6 -2
  357. package/mfaDuo.js.map +1 -1
  358. package/mfaOkta.d.ts +21 -0
  359. package/mfaOkta.js +5 -1
  360. package/mfaOkta.js.map +1 -1
  361. package/mfaPingid.d.ts +21 -0
  362. package/mfaPingid.js +2 -0
  363. package/mfaPingid.js.map +1 -1
  364. package/mfaTotp.d.ts +21 -0
  365. package/mfaTotp.js +2 -0
  366. package/mfaTotp.js.map +1 -1
  367. package/mount.d.ts +33 -0
  368. package/mount.js +4 -0
  369. package/mount.js.map +1 -1
  370. package/namespace.d.ts +32 -18
  371. package/namespace.js +5 -16
  372. package/namespace.js.map +1 -1
  373. package/nomadSecretBackend.d.ts +36 -0
  374. package/nomadSecretBackend.js +9 -3
  375. package/nomadSecretBackend.js.map +1 -1
  376. package/nomadSecretRole.d.ts +21 -0
  377. package/nomadSecretRole.js +2 -0
  378. package/nomadSecretRole.js.map +1 -1
  379. package/okta/authBackend.d.ts +38 -1
  380. package/okta/authBackend.js +7 -1
  381. package/okta/authBackend.js.map +1 -1
  382. package/okta/authBackendGroup.d.ts +21 -0
  383. package/okta/authBackendGroup.js +2 -0
  384. package/okta/authBackendGroup.js.map +1 -1
  385. package/okta/authBackendUser.d.ts +21 -0
  386. package/okta/authBackendUser.js +2 -0
  387. package/okta/authBackendUser.js.map +1 -1
  388. package/okta/index.d.ts +9 -3
  389. package/okta/index.js +10 -25
  390. package/okta/index.js.map +1 -1
  391. package/package.json +2 -2
  392. package/package.json.dev +2 -2
  393. package/passwordPolicy.d.ts +21 -0
  394. package/passwordPolicy.js +2 -0
  395. package/passwordPolicy.js.map +1 -1
  396. package/pkisecret/index.d.ts +30 -10
  397. package/pkisecret/index.js +31 -46
  398. package/pkisecret/index.js.map +1 -1
  399. package/pkisecret/secretBackendCert.d.ts +29 -0
  400. package/pkisecret/secretBackendCert.js +6 -0
  401. package/pkisecret/secretBackendCert.js.map +1 -1
  402. package/pkisecret/secretBackendConfigCa.d.ts +21 -0
  403. package/pkisecret/secretBackendConfigCa.js +5 -1
  404. package/pkisecret/secretBackendConfigCa.js.map +1 -1
  405. package/pkisecret/secretBackendConfigUrls.d.ts +21 -0
  406. package/pkisecret/secretBackendConfigUrls.js +2 -0
  407. package/pkisecret/secretBackendConfigUrls.js.map +1 -1
  408. package/pkisecret/secretBackendCrlConfig.d.ts +21 -0
  409. package/pkisecret/secretBackendCrlConfig.js +2 -0
  410. package/pkisecret/secretBackendCrlConfig.js.map +1 -1
  411. package/pkisecret/secretBackendIntermediateCertRequest.d.ts +54 -0
  412. package/pkisecret/secretBackendIntermediateCertRequest.js +8 -0
  413. package/pkisecret/secretBackendIntermediateCertRequest.js.map +1 -1
  414. package/pkisecret/secretBackendIntermediateSetSigned.d.ts +21 -0
  415. package/pkisecret/secretBackendIntermediateSetSigned.js +2 -0
  416. package/pkisecret/secretBackendIntermediateSetSigned.js.map +1 -1
  417. package/pkisecret/secretBackendRole.d.ts +24 -3
  418. package/pkisecret/secretBackendRole.js +2 -0
  419. package/pkisecret/secretBackendRole.js.map +1 -1
  420. package/pkisecret/secretBackendRootCert.d.ts +57 -3
  421. package/pkisecret/secretBackendRootCert.js +6 -0
  422. package/pkisecret/secretBackendRootCert.js.map +1 -1
  423. package/pkisecret/secretBackendRootSignIntermediate.d.ts +21 -0
  424. package/pkisecret/secretBackendRootSignIntermediate.js +2 -0
  425. package/pkisecret/secretBackendRootSignIntermediate.js.map +1 -1
  426. package/pkisecret/secretBackendSign.d.ts +29 -0
  427. package/pkisecret/secretBackendSign.js +4 -0
  428. package/pkisecret/secretBackendSign.js.map +1 -1
  429. package/policy.d.ts +21 -0
  430. package/policy.js +2 -0
  431. package/policy.js.map +1 -1
  432. package/provider.d.ts +43 -3
  433. package/provider.js +12 -2
  434. package/provider.js.map +1 -1
  435. package/quotaLeaseCount.d.ts +21 -0
  436. package/quotaLeaseCount.js +2 -0
  437. package/quotaLeaseCount.js.map +1 -1
  438. package/quotaRateLimit.d.ts +48 -0
  439. package/quotaRateLimit.js +6 -0
  440. package/quotaRateLimit.js.map +1 -1
  441. package/rabbitmq/index.d.ts +6 -2
  442. package/rabbitmq/index.js +7 -22
  443. package/rabbitmq/index.js.map +1 -1
  444. package/rabbitmq/secretBackend.d.ts +36 -0
  445. package/rabbitmq/secretBackend.js +8 -2
  446. package/rabbitmq/secretBackend.js.map +1 -1
  447. package/rabbitmq/secretBackendRole.d.ts +23 -1
  448. package/rabbitmq/secretBackendRole.js +2 -0
  449. package/rabbitmq/secretBackendRole.js.map +1 -1
  450. package/raftAutopilot.d.ts +21 -0
  451. package/raftAutopilot.js +2 -0
  452. package/raftAutopilot.js.map +1 -1
  453. package/raftSnapshotAgentConfig.d.ts +62 -0
  454. package/raftSnapshotAgentConfig.js +43 -0
  455. package/raftSnapshotAgentConfig.js.map +1 -1
  456. package/rgpPolicy.d.ts +21 -0
  457. package/rgpPolicy.js +2 -0
  458. package/rgpPolicy.js.map +1 -1
  459. package/ssh/index.d.ts +6 -2
  460. package/ssh/index.js +7 -22
  461. package/ssh/index.js.map +1 -1
  462. package/ssh/secretBackendCa.d.ts +29 -0
  463. package/ssh/secretBackendCa.js +13 -1
  464. package/ssh/secretBackendCa.js.map +1 -1
  465. package/ssh/secretBackendRole.d.ts +23 -1
  466. package/ssh/secretBackendRole.js +2 -0
  467. package/ssh/secretBackendRole.js.map +1 -1
  468. package/terraformcloud/index.d.ts +9 -3
  469. package/terraformcloud/index.js +10 -25
  470. package/terraformcloud/index.js.map +1 -1
  471. package/terraformcloud/secretBackend.d.ts +36 -0
  472. package/terraformcloud/secretBackend.js +7 -1
  473. package/terraformcloud/secretBackend.js.map +1 -1
  474. package/terraformcloud/secretCreds.d.ts +21 -0
  475. package/terraformcloud/secretCreds.js +4 -0
  476. package/terraformcloud/secretCreds.js.map +1 -1
  477. package/terraformcloud/secretRole.d.ts +21 -0
  478. package/terraformcloud/secretRole.js +2 -0
  479. package/terraformcloud/secretRole.js.map +1 -1
  480. package/token.d.ts +42 -0
  481. package/token.js +9 -0
  482. package/token.js.map +1 -1
  483. package/tokenauth/authBackendRole.d.ts +21 -0
  484. package/tokenauth/authBackendRole.js +2 -0
  485. package/tokenauth/authBackendRole.js.map +1 -1
  486. package/tokenauth/index.d.ts +3 -1
  487. package/tokenauth/index.js +4 -19
  488. package/tokenauth/index.js.map +1 -1
  489. package/transform/index.d.ts +18 -6
  490. package/transform/index.js +19 -30
  491. package/transform/index.js.map +1 -1
  492. package/transform/transformation.d.ts +0 -25
  493. package/transform/transformation.js +0 -25
  494. package/transform/transformation.js.map +1 -1
  495. package/transit/getDecrypt.d.ts +3 -0
  496. package/transit/getDecrypt.js +1 -0
  497. package/transit/getDecrypt.js.map +1 -1
  498. package/transit/getEncrypt.d.ts +3 -0
  499. package/transit/getEncrypt.js +1 -0
  500. package/transit/getEncrypt.js.map +1 -1
  501. package/transit/index.d.ts +12 -4
  502. package/transit/index.js +13 -24
  503. package/transit/index.js.map +1 -1
  504. package/transit/secretBackendKey.d.ts +21 -0
  505. package/transit/secretBackendKey.js +2 -0
  506. package/transit/secretBackendKey.js.map +1 -1
  507. package/transit/secretCacheConfig.d.ts +21 -0
  508. package/transit/secretCacheConfig.js +2 -0
  509. package/transit/secretCacheConfig.js.map +1 -1
  510. package/types/index.js.map +1 -1
  511. package/types/input.d.ts +408 -4
  512. package/types/output.d.ts +409 -5
  513. package/utilities.js +13 -1
  514. package/utilities.js.map +1 -1
  515. package/approle/authBackendRoleSecretID.js.map +0 -1
@@ -7,7 +7,7 @@ const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("../utilities");
8
8
  /**
9
9
  * ## Example Usage
10
- *
10
+ * ### Creating a standard backend resource:
11
11
  * ```typescript
12
12
  * import * as pulumi from "@pulumi/pulumi";
13
13
  * import * as vault from "@pulumi/vault";
@@ -19,6 +19,18 @@ const utilities = require("../utilities");
19
19
  * token: "4240861b-ce3d-8530-115a-521ff070dd29",
20
20
  * });
21
21
  * ```
22
+ * ### Creating a backend resource to bootstrap a new Consul instance:
23
+ * ```typescript
24
+ * import * as pulumi from "@pulumi/pulumi";
25
+ * import * as vault from "@pulumi/vault";
26
+ *
27
+ * const test = new vault.consul.SecretBackend("test", {
28
+ * address: "127.0.0.1:8500",
29
+ * bootstrap: true,
30
+ * description: "Bootstrap the Consul backend",
31
+ * path: "consul",
32
+ * });
33
+ * ```
22
34
  *
23
35
  * ## Import
24
36
  *
@@ -35,13 +47,16 @@ class SecretBackend extends pulumi.CustomResource {
35
47
  if (opts.id) {
36
48
  const state = argsOrState;
37
49
  resourceInputs["address"] = state ? state.address : undefined;
50
+ resourceInputs["bootstrap"] = state ? state.bootstrap : undefined;
38
51
  resourceInputs["caCert"] = state ? state.caCert : undefined;
39
52
  resourceInputs["clientCert"] = state ? state.clientCert : undefined;
40
53
  resourceInputs["clientKey"] = state ? state.clientKey : undefined;
41
54
  resourceInputs["defaultLeaseTtlSeconds"] = state ? state.defaultLeaseTtlSeconds : undefined;
42
55
  resourceInputs["description"] = state ? state.description : undefined;
56
+ resourceInputs["disableRemount"] = state ? state.disableRemount : undefined;
43
57
  resourceInputs["local"] = state ? state.local : undefined;
44
58
  resourceInputs["maxLeaseTtlSeconds"] = state ? state.maxLeaseTtlSeconds : undefined;
59
+ resourceInputs["namespace"] = state ? state.namespace : undefined;
45
60
  resourceInputs["path"] = state ? state.path : undefined;
46
61
  resourceInputs["scheme"] = state ? state.scheme : undefined;
47
62
  resourceInputs["token"] = state ? state.token : undefined;
@@ -51,22 +66,24 @@ class SecretBackend extends pulumi.CustomResource {
51
66
  if ((!args || args.address === undefined) && !opts.urn) {
52
67
  throw new Error("Missing required property 'address'");
53
68
  }
54
- if ((!args || args.token === undefined) && !opts.urn) {
55
- throw new Error("Missing required property 'token'");
56
- }
57
69
  resourceInputs["address"] = args ? args.address : undefined;
70
+ resourceInputs["bootstrap"] = args ? args.bootstrap : undefined;
58
71
  resourceInputs["caCert"] = args ? args.caCert : undefined;
59
- resourceInputs["clientCert"] = args ? args.clientCert : undefined;
60
- resourceInputs["clientKey"] = args ? args.clientKey : undefined;
72
+ resourceInputs["clientCert"] = (args === null || args === void 0 ? void 0 : args.clientCert) ? pulumi.secret(args.clientCert) : undefined;
73
+ resourceInputs["clientKey"] = (args === null || args === void 0 ? void 0 : args.clientKey) ? pulumi.secret(args.clientKey) : undefined;
61
74
  resourceInputs["defaultLeaseTtlSeconds"] = args ? args.defaultLeaseTtlSeconds : undefined;
62
75
  resourceInputs["description"] = args ? args.description : undefined;
76
+ resourceInputs["disableRemount"] = args ? args.disableRemount : undefined;
63
77
  resourceInputs["local"] = args ? args.local : undefined;
64
78
  resourceInputs["maxLeaseTtlSeconds"] = args ? args.maxLeaseTtlSeconds : undefined;
79
+ resourceInputs["namespace"] = args ? args.namespace : undefined;
65
80
  resourceInputs["path"] = args ? args.path : undefined;
66
81
  resourceInputs["scheme"] = args ? args.scheme : undefined;
67
- resourceInputs["token"] = args ? args.token : undefined;
82
+ resourceInputs["token"] = (args === null || args === void 0 ? void 0 : args.token) ? pulumi.secret(args.token) : undefined;
68
83
  }
69
84
  opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
85
+ const secretOpts = { additionalSecretOutputs: ["clientCert", "clientKey", "token"] };
86
+ opts = pulumi.mergeOptions(opts, secretOpts);
70
87
  super(SecretBackend.__pulumiType, name, resourceInputs, opts);
71
88
  }
72
89
  /**
@@ -1 +1 @@
1
- {"version":3,"file":"secretBackend.js","sourceRoot":"","sources":["../../consul/secretBackend.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;GAsBG;AACH,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;IAkFpD,YAAY,IAAY,EAAE,WAAoD,EAAE,IAAmC;QAC/G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA6C,CAAC;YAC5D,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7D;aAAM;YACH,MAAM,IAAI,GAAG,WAA4C,CAAC;YAC1D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,KAAK,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAClE,CAAC;IAvHD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA0B,EAAE,IAAmC;QACxH,OAAO,IAAI,aAAa,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACpE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,aAAa,CAAC,YAAY,CAAC;IAC9D,CAAC;;AA1BL,sCAyHC;AA3GG,gBAAgB;AACO,0BAAY,GAAG,0CAA0C,CAAC"}
1
+ {"version":3,"file":"secretBackend.js","sourceRoot":"","sources":["../../consul/secretBackend.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAkCG;AACH,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;IAsGpD,YAAY,IAAY,EAAE,WAAoD,EAAE,IAAmC;QAC/G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA6C,CAAC;YAC5D,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7D;aAAM;YACH,MAAM,IAAI,GAAG,WAA4C,CAAC;YAC1D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,YAAY,CAAC,GAAG,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,UAAU,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAC7F,cAAc,CAAC,WAAW,CAAC,GAAG,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,SAAS,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,OAAO,CAAC,GAAG,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,KAAK,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;SACjF;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,YAAY,EAAE,WAAW,EAAE,OAAO,CAAC,EAAE,CAAC;QACrF,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAClE,CAAC;IAhJD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA0B,EAAE,IAAmC;QACxH,OAAO,IAAI,aAAa,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACpE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,aAAa,CAAC,YAAY,CAAC;IAC9D,CAAC;;AA1BL,sCAkJC;AApIG,gBAAgB;AACO,0BAAY,GAAG,0CAA0C,CAAC"}
@@ -16,9 +16,14 @@ import * as pulumi from "@pulumi/pulumi";
16
16
  * });
17
17
  * const example = new vault.consul.SecretBackendRole("example", {
18
18
  * backend: test.path,
19
- * policies: ["example-policy"],
19
+ * consulPolicies: ["example-policy"],
20
20
  * });
21
21
  * ```
22
+ * ## Note About Required Arguments
23
+ *
24
+ * *At least one* of the four arguments `consulPolicies`, `consulRoles`, `serviceIdentities`, or
25
+ * `nodeIdentities` is required for a token. If desired, any combination of the four arguments up-to and
26
+ * including all four, is valid.
22
27
  *
23
28
  * ## Import
24
29
  *
@@ -50,11 +55,15 @@ export declare class SecretBackendRole extends pulumi.CustomResource {
50
55
  readonly backend: pulumi.Output<string | undefined>;
51
56
  /**
52
57
  * The Consul namespace that the token will be created in.
53
- * Applicable for Vault 1.10+ and Consul 1.7+",
58
+ * Applicable for Vault 1.10+ and Consul 1.7+".
54
59
  */
55
60
  readonly consulNamespace: pulumi.Output<string>;
56
61
  /**
57
- * Set of Consul roles to attach to the token.
62
+ * <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
63
+ */
64
+ readonly consulPolicies: pulumi.Output<string[] | undefined>;
65
+ /**
66
+ * <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
58
67
  * Applicable for Vault 1.10+ with Consul 1.5+.
59
68
  */
60
69
  readonly consulRoles: pulumi.Output<string[] | undefined>;
@@ -70,17 +79,39 @@ export declare class SecretBackendRole extends pulumi.CustomResource {
70
79
  * The name of the Consul secrets engine role to create.
71
80
  */
72
81
  readonly name: pulumi.Output<string>;
82
+ /**
83
+ * The namespace to provision the resource in.
84
+ * The value should not contain leading or trailing forward slashes.
85
+ * The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
86
+ * *Available only for Vault Enterprise*.
87
+ */
88
+ readonly namespace: pulumi.Output<string | undefined>;
89
+ /**
90
+ * <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
91
+ * identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
92
+ */
93
+ readonly nodeIdentities: pulumi.Output<string[] | undefined>;
73
94
  /**
74
95
  * The admin partition that the token will be created in.
75
- * Applicable for Vault 1.10+ and Consul 1.11+",
96
+ * Applicable for Vault 1.10+ and Consul 1.11+".
76
97
  */
77
98
  readonly partition: pulumi.Output<string>;
78
99
  /**
79
100
  * The list of Consul ACL policies to associate with these roles.
101
+ * **NOTE:** The new parameter `consulPolicies` should be used in favor of this. This parameter,
102
+ * `policies`, remains supported for legacy users, but Vault has deprecated this field.
80
103
  */
81
104
  readonly policies: pulumi.Output<string[] | undefined>;
105
+ /**
106
+ * <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
107
+ * service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
108
+ */
109
+ readonly serviceIdentities: pulumi.Output<string[] | undefined>;
82
110
  /**
83
111
  * Specifies the type of token to create when using this role. Valid values are "client" or "management".
112
+ * *Deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.*
113
+ *
114
+ * @deprecated Consul 1.11 and later removed the legacy ACL system which supported this field.
84
115
  */
85
116
  readonly tokenType: pulumi.Output<string | undefined>;
86
117
  /**
@@ -106,11 +137,15 @@ export interface SecretBackendRoleState {
106
137
  backend?: pulumi.Input<string>;
107
138
  /**
108
139
  * The Consul namespace that the token will be created in.
109
- * Applicable for Vault 1.10+ and Consul 1.7+",
140
+ * Applicable for Vault 1.10+ and Consul 1.7+".
110
141
  */
111
142
  consulNamespace?: pulumi.Input<string>;
112
143
  /**
113
- * Set of Consul roles to attach to the token.
144
+ * <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
145
+ */
146
+ consulPolicies?: pulumi.Input<pulumi.Input<string>[]>;
147
+ /**
148
+ * <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
114
149
  * Applicable for Vault 1.10+ with Consul 1.5+.
115
150
  */
116
151
  consulRoles?: pulumi.Input<pulumi.Input<string>[]>;
@@ -126,17 +161,39 @@ export interface SecretBackendRoleState {
126
161
  * The name of the Consul secrets engine role to create.
127
162
  */
128
163
  name?: pulumi.Input<string>;
164
+ /**
165
+ * The namespace to provision the resource in.
166
+ * The value should not contain leading or trailing forward slashes.
167
+ * The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
168
+ * *Available only for Vault Enterprise*.
169
+ */
170
+ namespace?: pulumi.Input<string>;
171
+ /**
172
+ * <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
173
+ * identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
174
+ */
175
+ nodeIdentities?: pulumi.Input<pulumi.Input<string>[]>;
129
176
  /**
130
177
  * The admin partition that the token will be created in.
131
- * Applicable for Vault 1.10+ and Consul 1.11+",
178
+ * Applicable for Vault 1.10+ and Consul 1.11+".
132
179
  */
133
180
  partition?: pulumi.Input<string>;
134
181
  /**
135
182
  * The list of Consul ACL policies to associate with these roles.
183
+ * **NOTE:** The new parameter `consulPolicies` should be used in favor of this. This parameter,
184
+ * `policies`, remains supported for legacy users, but Vault has deprecated this field.
136
185
  */
137
186
  policies?: pulumi.Input<pulumi.Input<string>[]>;
187
+ /**
188
+ * <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
189
+ * service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
190
+ */
191
+ serviceIdentities?: pulumi.Input<pulumi.Input<string>[]>;
138
192
  /**
139
193
  * Specifies the type of token to create when using this role. Valid values are "client" or "management".
194
+ * *Deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.*
195
+ *
196
+ * @deprecated Consul 1.11 and later removed the legacy ACL system which supported this field.
140
197
  */
141
198
  tokenType?: pulumi.Input<string>;
142
199
  /**
@@ -154,11 +211,15 @@ export interface SecretBackendRoleArgs {
154
211
  backend?: pulumi.Input<string>;
155
212
  /**
156
213
  * The Consul namespace that the token will be created in.
157
- * Applicable for Vault 1.10+ and Consul 1.7+",
214
+ * Applicable for Vault 1.10+ and Consul 1.7+".
158
215
  */
159
216
  consulNamespace?: pulumi.Input<string>;
160
217
  /**
161
- * Set of Consul roles to attach to the token.
218
+ * <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
219
+ */
220
+ consulPolicies?: pulumi.Input<pulumi.Input<string>[]>;
221
+ /**
222
+ * <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
162
223
  * Applicable for Vault 1.10+ with Consul 1.5+.
163
224
  */
164
225
  consulRoles?: pulumi.Input<pulumi.Input<string>[]>;
@@ -174,17 +235,39 @@ export interface SecretBackendRoleArgs {
174
235
  * The name of the Consul secrets engine role to create.
175
236
  */
176
237
  name?: pulumi.Input<string>;
238
+ /**
239
+ * The namespace to provision the resource in.
240
+ * The value should not contain leading or trailing forward slashes.
241
+ * The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
242
+ * *Available only for Vault Enterprise*.
243
+ */
244
+ namespace?: pulumi.Input<string>;
245
+ /**
246
+ * <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
247
+ * identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
248
+ */
249
+ nodeIdentities?: pulumi.Input<pulumi.Input<string>[]>;
177
250
  /**
178
251
  * The admin partition that the token will be created in.
179
- * Applicable for Vault 1.10+ and Consul 1.11+",
252
+ * Applicable for Vault 1.10+ and Consul 1.11+".
180
253
  */
181
254
  partition?: pulumi.Input<string>;
182
255
  /**
183
256
  * The list of Consul ACL policies to associate with these roles.
257
+ * **NOTE:** The new parameter `consulPolicies` should be used in favor of this. This parameter,
258
+ * `policies`, remains supported for legacy users, but Vault has deprecated this field.
184
259
  */
185
260
  policies?: pulumi.Input<pulumi.Input<string>[]>;
261
+ /**
262
+ * <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
263
+ * service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
264
+ */
265
+ serviceIdentities?: pulumi.Input<pulumi.Input<string>[]>;
186
266
  /**
187
267
  * Specifies the type of token to create when using this role. Valid values are "client" or "management".
268
+ * *Deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.*
269
+ *
270
+ * @deprecated Consul 1.11 and later removed the legacy ACL system which supported this field.
188
271
  */
189
272
  tokenType?: pulumi.Input<string>;
190
273
  /**
@@ -22,9 +22,14 @@ const utilities = require("../utilities");
22
22
  * });
23
23
  * const example = new vault.consul.SecretBackendRole("example", {
24
24
  * backend: test.path,
25
- * policies: ["example-policy"],
25
+ * consulPolicies: ["example-policy"],
26
26
  * });
27
27
  * ```
28
+ * ## Note About Required Arguments
29
+ *
30
+ * *At least one* of the four arguments `consulPolicies`, `consulRoles`, `serviceIdentities`, or
31
+ * `nodeIdentities` is required for a token. If desired, any combination of the four arguments up-to and
32
+ * including all four, is valid.
28
33
  *
29
34
  * ## Import
30
35
  *
@@ -42,12 +47,16 @@ class SecretBackendRole extends pulumi.CustomResource {
42
47
  const state = argsOrState;
43
48
  resourceInputs["backend"] = state ? state.backend : undefined;
44
49
  resourceInputs["consulNamespace"] = state ? state.consulNamespace : undefined;
50
+ resourceInputs["consulPolicies"] = state ? state.consulPolicies : undefined;
45
51
  resourceInputs["consulRoles"] = state ? state.consulRoles : undefined;
46
52
  resourceInputs["local"] = state ? state.local : undefined;
47
53
  resourceInputs["maxTtl"] = state ? state.maxTtl : undefined;
48
54
  resourceInputs["name"] = state ? state.name : undefined;
55
+ resourceInputs["namespace"] = state ? state.namespace : undefined;
56
+ resourceInputs["nodeIdentities"] = state ? state.nodeIdentities : undefined;
49
57
  resourceInputs["partition"] = state ? state.partition : undefined;
50
58
  resourceInputs["policies"] = state ? state.policies : undefined;
59
+ resourceInputs["serviceIdentities"] = state ? state.serviceIdentities : undefined;
51
60
  resourceInputs["tokenType"] = state ? state.tokenType : undefined;
52
61
  resourceInputs["ttl"] = state ? state.ttl : undefined;
53
62
  }
@@ -55,12 +64,16 @@ class SecretBackendRole extends pulumi.CustomResource {
55
64
  const args = argsOrState;
56
65
  resourceInputs["backend"] = args ? args.backend : undefined;
57
66
  resourceInputs["consulNamespace"] = args ? args.consulNamespace : undefined;
67
+ resourceInputs["consulPolicies"] = args ? args.consulPolicies : undefined;
58
68
  resourceInputs["consulRoles"] = args ? args.consulRoles : undefined;
59
69
  resourceInputs["local"] = args ? args.local : undefined;
60
70
  resourceInputs["maxTtl"] = args ? args.maxTtl : undefined;
61
71
  resourceInputs["name"] = args ? args.name : undefined;
72
+ resourceInputs["namespace"] = args ? args.namespace : undefined;
73
+ resourceInputs["nodeIdentities"] = args ? args.nodeIdentities : undefined;
62
74
  resourceInputs["partition"] = args ? args.partition : undefined;
63
75
  resourceInputs["policies"] = args ? args.policies : undefined;
76
+ resourceInputs["serviceIdentities"] = args ? args.serviceIdentities : undefined;
64
77
  resourceInputs["tokenType"] = args ? args.tokenType : undefined;
65
78
  resourceInputs["ttl"] = args ? args.ttl : undefined;
66
79
  }
@@ -1 +1 @@
1
- {"version":3,"file":"secretBackendRole.js","sourceRoot":"","sources":["../../consul/secretBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA4BG;AACH,MAAa,iBAAkB,SAAQ,MAAM,CAAC,cAAc;IAgFxD,YAAY,IAAY,EAAE,WAA4D,EAAE,IAAmC;QACvH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAiD,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACzD;aAAM;YACH,MAAM,IAAI,GAAG,WAAgD,CAAC;YAC9D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACvD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,iBAAiB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACtE,CAAC;IA7GD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA8B,EAAE,IAAmC;QAC5H,OAAO,IAAI,iBAAiB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACxE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,iBAAiB,CAAC,YAAY,CAAC;IAClE,CAAC;;AA1BL,8CA+GC;AAjGG,gBAAgB;AACO,8BAAY,GAAG,kDAAkD,CAAC"}
1
+ {"version":3,"file":"secretBackendRole.js","sourceRoot":"","sources":["../../consul/secretBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAiCG;AACH,MAAa,iBAAkB,SAAQ,MAAM,CAAC,cAAc;IA0GxD,YAAY,IAAY,EAAE,WAA4D,EAAE,IAAmC;QACvH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAiD,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACzD;aAAM;YACH,MAAM,IAAI,GAAG,WAAgD,CAAC;YAC9D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACvD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,iBAAiB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACtE,CAAC;IA/ID;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA8B,EAAE,IAAmC;QAC5H,OAAO,IAAI,iBAAiB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACxE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,iBAAiB,CAAC,YAAY,CAAC;IAClE,CAAC;;AA1BL,8CAiJC;AAnIG,gBAAgB;AACO,8BAAY,GAAG,kDAAkD,CAAC"}
@@ -1,4 +1,12 @@
1
- export * from "./secretBackendConnection";
2
- export * from "./secretBackendRole";
3
- export * from "./secretBackendStaticRole";
4
- export * from "./secretsMount";
1
+ export { SecretBackendConnectionArgs, SecretBackendConnectionState } from "./secretBackendConnection";
2
+ export declare type SecretBackendConnection = import("./secretBackendConnection").SecretBackendConnection;
3
+ export declare const SecretBackendConnection: typeof import("./secretBackendConnection").SecretBackendConnection;
4
+ export { SecretBackendRoleArgs, SecretBackendRoleState } from "./secretBackendRole";
5
+ export declare type SecretBackendRole = import("./secretBackendRole").SecretBackendRole;
6
+ export declare const SecretBackendRole: typeof import("./secretBackendRole").SecretBackendRole;
7
+ export { SecretBackendStaticRoleArgs, SecretBackendStaticRoleState } from "./secretBackendStaticRole";
8
+ export declare type SecretBackendStaticRole = import("./secretBackendStaticRole").SecretBackendStaticRole;
9
+ export declare const SecretBackendStaticRole: typeof import("./secretBackendStaticRole").SecretBackendStaticRole;
10
+ export { SecretsMountArgs, SecretsMountState } from "./secretsMount";
11
+ export declare type SecretsMount = import("./secretsMount").SecretsMount;
12
+ export declare const SecretsMount: typeof import("./secretsMount").SecretsMount;
package/database/index.js CHANGED
@@ -1,45 +1,30 @@
1
1
  "use strict";
2
2
  // *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  // *** Do not edit by hand unless you're certain you know what you are doing! ***
4
- var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
5
- if (k2 === undefined) k2 = k;
6
- var desc = Object.getOwnPropertyDescriptor(m, k);
7
- if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
8
- desc = { enumerable: true, get: function() { return m[k]; } };
9
- }
10
- Object.defineProperty(o, k2, desc);
11
- }) : (function(o, m, k, k2) {
12
- if (k2 === undefined) k2 = k;
13
- o[k2] = m[k];
14
- }));
15
- var __exportStar = (this && this.__exportStar) || function(m, exports) {
16
- for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
17
- };
18
4
  Object.defineProperty(exports, "__esModule", { value: true });
5
+ exports.SecretsMount = exports.SecretBackendStaticRole = exports.SecretBackendRole = exports.SecretBackendConnection = void 0;
19
6
  const pulumi = require("@pulumi/pulumi");
20
7
  const utilities = require("../utilities");
21
- // Export members:
22
- __exportStar(require("./secretBackendConnection"), exports);
23
- __exportStar(require("./secretBackendRole"), exports);
24
- __exportStar(require("./secretBackendStaticRole"), exports);
25
- __exportStar(require("./secretsMount"), exports);
26
- // Import resources to register:
27
- const secretBackendConnection_1 = require("./secretBackendConnection");
28
- const secretBackendRole_1 = require("./secretBackendRole");
29
- const secretBackendStaticRole_1 = require("./secretBackendStaticRole");
30
- const secretsMount_1 = require("./secretsMount");
8
+ exports.SecretBackendConnection = null;
9
+ exports.SecretBackendRole = null;
10
+ exports.SecretBackendStaticRole = null;
11
+ exports.SecretsMount = null;
12
+ utilities.lazyLoad(exports, ["SecretBackendConnection"], () => require("./secretBackendConnection"));
13
+ utilities.lazyLoad(exports, ["SecretBackendRole"], () => require("./secretBackendRole"));
14
+ utilities.lazyLoad(exports, ["SecretBackendStaticRole"], () => require("./secretBackendStaticRole"));
15
+ utilities.lazyLoad(exports, ["SecretsMount"], () => require("./secretsMount"));
31
16
  const _module = {
32
17
  version: utilities.getVersion(),
33
18
  construct: (name, type, urn) => {
34
19
  switch (type) {
35
20
  case "vault:database/secretBackendConnection:SecretBackendConnection":
36
- return new secretBackendConnection_1.SecretBackendConnection(name, undefined, { urn });
21
+ return new exports.SecretBackendConnection(name, undefined, { urn });
37
22
  case "vault:database/secretBackendRole:SecretBackendRole":
38
- return new secretBackendRole_1.SecretBackendRole(name, undefined, { urn });
23
+ return new exports.SecretBackendRole(name, undefined, { urn });
39
24
  case "vault:database/secretBackendStaticRole:SecretBackendStaticRole":
40
- return new secretBackendStaticRole_1.SecretBackendStaticRole(name, undefined, { urn });
25
+ return new exports.SecretBackendStaticRole(name, undefined, { urn });
41
26
  case "vault:database/secretsMount:SecretsMount":
42
- return new secretsMount_1.SecretsMount(name, undefined, { urn });
27
+ return new exports.SecretsMount(name, undefined, { urn });
43
28
  default:
44
29
  throw new Error(`unknown resource type ${type}`);
45
30
  }
@@ -1 +1 @@
1
- {"version":3,"file":"index.js","sourceRoot":"","sources":["../../database/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;;;;;;;;;;;;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,kBAAkB;AAClB,4DAA0C;AAC1C,sDAAoC;AACpC,4DAA0C;AAC1C,iDAA+B;AAE/B,gCAAgC;AAChC,uEAAoE;AACpE,2DAAwD;AACxD,uEAAoE;AACpE,iDAA8C;AAE9C,MAAM,OAAO,GAAG;IACZ,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE;IAC/B,SAAS,EAAE,CAAC,IAAY,EAAE,IAAY,EAAE,GAAW,EAAmB,EAAE;QACpE,QAAQ,IAAI,EAAE;YACV,KAAK,gEAAgE;gBACjE,OAAO,IAAI,iDAAuB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACrE,KAAK,oDAAoD;gBACrD,OAAO,IAAI,qCAAiB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC/D,KAAK,gEAAgE;gBACjE,OAAO,IAAI,iDAAuB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACrE,KAAK,0CAA0C;gBAC3C,OAAO,IAAI,2BAAY,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC1D;gBACI,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,EAAE,CAAC,CAAC;SACxD;IACL,CAAC;CACJ,CAAC;AACF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,kCAAkC,EAAE,OAAO,CAAC,CAAA;AAC3F,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,4BAA4B,EAAE,OAAO,CAAC,CAAA;AACrF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,kCAAkC,EAAE,OAAO,CAAC,CAAA;AAC3F,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,uBAAuB,EAAE,OAAO,CAAC,CAAA"}
1
+ {"version":3,"file":"index.js","sourceRoot":"","sources":["../../database/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAK7B,QAAA,uBAAuB,GAAuE,IAAW,CAAC;AAI1G,QAAA,iBAAiB,GAA2D,IAAW,CAAC;AAIxF,QAAA,uBAAuB,GAAuE,IAAW,CAAC;AAI1G,QAAA,YAAY,GAAiD,IAAW,CAAC;AAEtF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,yBAAyB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,2BAA2B,CAAC,CAAC,CAAC;AACrG,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,mBAAmB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,qBAAqB,CAAC,CAAC,CAAC;AACzF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,yBAAyB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,2BAA2B,CAAC,CAAC,CAAC;AACrG,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,cAAc,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,gBAAgB,CAAC,CAAC,CAAC;AAE/E,MAAM,OAAO,GAAG;IACZ,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE;IAC/B,SAAS,EAAE,CAAC,IAAY,EAAE,IAAY,EAAE,GAAW,EAAmB,EAAE;QACpE,QAAQ,IAAI,EAAE;YACV,KAAK,gEAAgE;gBACjE,OAAO,IAAI,+BAAuB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACrE,KAAK,oDAAoD;gBACrD,OAAO,IAAI,yBAAiB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC/D,KAAK,gEAAgE;gBACjE,OAAO,IAAI,+BAAuB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACrE,KAAK,0CAA0C;gBAC3C,OAAO,IAAI,oBAAY,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC1D;gBACI,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,EAAE,CAAC,CAAC;SACxD;IACL,CAAC;CACJ,CAAC;AACF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,kCAAkC,EAAE,OAAO,CAAC,CAAA;AAC3F,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,4BAA4B,EAAE,OAAO,CAAC,CAAA;AACrF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,kCAAkC,EAAE,OAAO,CAAC,CAAA;AAC3F,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,uBAAuB,EAAE,OAAO,CAAC,CAAA"}
@@ -1,5 +1,6 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
- import { input as inputs, output as outputs } from "../types";
2
+ import * as inputs from "../types/input";
3
+ import * as outputs from "../types/output";
3
4
  /**
4
5
  * ## Example Usage
5
6
  *
@@ -114,6 +115,13 @@ export declare class SecretBackendConnection extends pulumi.CustomResource {
114
115
  * A unique name to give the database connection.
115
116
  */
116
117
  readonly name: pulumi.Output<string>;
118
+ /**
119
+ * The namespace to provision the resource in.
120
+ * The value should not contain leading or trailing forward slashes.
121
+ * The `namespace` is always relative to the provider's configured namespace.
122
+ * *Available only for Vault Enterprise*.
123
+ */
124
+ readonly namespace: pulumi.Output<string | undefined>;
117
125
  /**
118
126
  * A nested block containing configuration options for Oracle connections.
119
127
  */
@@ -126,6 +134,10 @@ export declare class SecretBackendConnection extends pulumi.CustomResource {
126
134
  * A nested block containing configuration options for PostgreSQL connections.
127
135
  */
128
136
  readonly postgresql: pulumi.Output<outputs.database.SecretBackendConnectionPostgresql | undefined>;
137
+ /**
138
+ * A nested block containing configuration options for Redis ElastiCache connections.
139
+ */
140
+ readonly redisElasticache: pulumi.Output<outputs.database.SecretBackendConnectionRedisElasticache | undefined>;
129
141
  /**
130
142
  * Connection parameters for the redshift-database-plugin plugin.
131
143
  */
@@ -223,6 +235,13 @@ export interface SecretBackendConnectionState {
223
235
  * A unique name to give the database connection.
224
236
  */
225
237
  name?: pulumi.Input<string>;
238
+ /**
239
+ * The namespace to provision the resource in.
240
+ * The value should not contain leading or trailing forward slashes.
241
+ * The `namespace` is always relative to the provider's configured namespace.
242
+ * *Available only for Vault Enterprise*.
243
+ */
244
+ namespace?: pulumi.Input<string>;
226
245
  /**
227
246
  * A nested block containing configuration options for Oracle connections.
228
247
  */
@@ -235,6 +254,10 @@ export interface SecretBackendConnectionState {
235
254
  * A nested block containing configuration options for PostgreSQL connections.
236
255
  */
237
256
  postgresql?: pulumi.Input<inputs.database.SecretBackendConnectionPostgresql>;
257
+ /**
258
+ * A nested block containing configuration options for Redis ElastiCache connections.
259
+ */
260
+ redisElasticache?: pulumi.Input<inputs.database.SecretBackendConnectionRedisElasticache>;
238
261
  /**
239
262
  * Connection parameters for the redshift-database-plugin plugin.
240
263
  */
@@ -324,6 +347,13 @@ export interface SecretBackendConnectionArgs {
324
347
  * A unique name to give the database connection.
325
348
  */
326
349
  name?: pulumi.Input<string>;
350
+ /**
351
+ * The namespace to provision the resource in.
352
+ * The value should not contain leading or trailing forward slashes.
353
+ * The `namespace` is always relative to the provider's configured namespace.
354
+ * *Available only for Vault Enterprise*.
355
+ */
356
+ namespace?: pulumi.Input<string>;
327
357
  /**
328
358
  * A nested block containing configuration options for Oracle connections.
329
359
  */
@@ -336,6 +366,10 @@ export interface SecretBackendConnectionArgs {
336
366
  * A nested block containing configuration options for PostgreSQL connections.
337
367
  */
338
368
  postgresql?: pulumi.Input<inputs.database.SecretBackendConnectionPostgresql>;
369
+ /**
370
+ * A nested block containing configuration options for Redis ElastiCache connections.
371
+ */
372
+ redisElasticache?: pulumi.Input<inputs.database.SecretBackendConnectionRedisElasticache>;
339
373
  /**
340
374
  * Connection parameters for the redshift-database-plugin plugin.
341
375
  */
@@ -58,9 +58,11 @@ class SecretBackendConnection extends pulumi.CustomResource {
58
58
  resourceInputs["mysqlLegacy"] = state ? state.mysqlLegacy : undefined;
59
59
  resourceInputs["mysqlRds"] = state ? state.mysqlRds : undefined;
60
60
  resourceInputs["name"] = state ? state.name : undefined;
61
+ resourceInputs["namespace"] = state ? state.namespace : undefined;
61
62
  resourceInputs["oracle"] = state ? state.oracle : undefined;
62
63
  resourceInputs["pluginName"] = state ? state.pluginName : undefined;
63
64
  resourceInputs["postgresql"] = state ? state.postgresql : undefined;
65
+ resourceInputs["redisElasticache"] = state ? state.redisElasticache : undefined;
64
66
  resourceInputs["redshift"] = state ? state.redshift : undefined;
65
67
  resourceInputs["rootRotationStatements"] = state ? state.rootRotationStatements : undefined;
66
68
  resourceInputs["snowflake"] = state ? state.snowflake : undefined;
@@ -87,9 +89,11 @@ class SecretBackendConnection extends pulumi.CustomResource {
87
89
  resourceInputs["mysqlLegacy"] = args ? args.mysqlLegacy : undefined;
88
90
  resourceInputs["mysqlRds"] = args ? args.mysqlRds : undefined;
89
91
  resourceInputs["name"] = args ? args.name : undefined;
92
+ resourceInputs["namespace"] = args ? args.namespace : undefined;
90
93
  resourceInputs["oracle"] = args ? args.oracle : undefined;
91
94
  resourceInputs["pluginName"] = args ? args.pluginName : undefined;
92
95
  resourceInputs["postgresql"] = args ? args.postgresql : undefined;
96
+ resourceInputs["redisElasticache"] = args ? args.redisElasticache : undefined;
93
97
  resourceInputs["redshift"] = args ? args.redshift : undefined;
94
98
  resourceInputs["rootRotationStatements"] = args ? args.rootRotationStatements : undefined;
95
99
  resourceInputs["snowflake"] = args ? args.snowflake : undefined;
@@ -1 +1 @@
1
- {"version":3,"file":"secretBackendConnection.js","sourceRoot":"","sources":["../../database/secretBackendConnection.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAEzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA8BG;AACH,MAAa,uBAAwB,SAAQ,MAAM,CAAC,cAAc;IAmI9D,YAAY,IAAY,EAAE,WAAwE,EAAE,IAAmC;QACnI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAuD,CAAC;YACtE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;SACnF;aAAM;YACH,MAAM,IAAI,GAAG,WAAsD,CAAC;YACpE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;SACjF;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,uBAAuB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC5E,CAAC;IA7LD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAoC,EAAE,IAAmC;QAClI,OAAO,IAAI,uBAAuB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC9E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,uBAAuB,CAAC,YAAY,CAAC;IACxE,CAAC;;AA1BL,0DA+LC;AAjLG,gBAAgB;AACO,oCAAY,GAAG,gEAAgE,CAAC"}
1
+ {"version":3,"file":"secretBackendConnection.js","sourceRoot":"","sources":["../../database/secretBackendConnection.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA8BG;AACH,MAAa,uBAAwB,SAAQ,MAAM,CAAC,cAAc;IA8I9D,YAAY,IAAY,EAAE,WAAwE,EAAE,IAAmC;QACnI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAuD,CAAC;YACtE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;SACnF;aAAM;YACH,MAAM,IAAI,GAAG,WAAsD,CAAC;YACpE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;SACjF;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,uBAAuB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC5E,CAAC;IA5MD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAoC,EAAE,IAAmC;QAClI,OAAO,IAAI,uBAAuB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC9E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,uBAAuB,CAAC,YAAY,CAAC;IACxE,CAAC;;AA1BL,0DA8MC;AAhMG,gBAAgB;AACO,oCAAY,GAAG,gEAAgE,CAAC"}
@@ -79,6 +79,13 @@ export declare class SecretBackendRole extends pulumi.CustomResource {
79
79
  * A unique name to give the role.
80
80
  */
81
81
  readonly name: pulumi.Output<string>;
82
+ /**
83
+ * The namespace to provision the resource in.
84
+ * The value should not contain leading or trailing forward slashes.
85
+ * The `namespace` is always relative to the provider's configured namespace.
86
+ * *Available only for Vault Enterprise*.
87
+ */
88
+ readonly namespace: pulumi.Output<string | undefined>;
82
89
  /**
83
90
  * The database statements to execute when
84
91
  * renewing a user.
@@ -135,6 +142,13 @@ export interface SecretBackendRoleState {
135
142
  * A unique name to give the role.
136
143
  */
137
144
  name?: pulumi.Input<string>;
145
+ /**
146
+ * The namespace to provision the resource in.
147
+ * The value should not contain leading or trailing forward slashes.
148
+ * The `namespace` is always relative to the provider's configured namespace.
149
+ * *Available only for Vault Enterprise*.
150
+ */
151
+ namespace?: pulumi.Input<string>;
138
152
  /**
139
153
  * The database statements to execute when
140
154
  * renewing a user.
@@ -183,6 +197,13 @@ export interface SecretBackendRoleArgs {
183
197
  * A unique name to give the role.
184
198
  */
185
199
  name?: pulumi.Input<string>;
200
+ /**
201
+ * The namespace to provision the resource in.
202
+ * The value should not contain leading or trailing forward slashes.
203
+ * The `namespace` is always relative to the provider's configured namespace.
204
+ * *Available only for Vault Enterprise*.
205
+ */
206
+ namespace?: pulumi.Input<string>;
186
207
  /**
187
208
  * The database statements to execute when
188
209
  * renewing a user.