@pulumi/vault 5.6.0 → 5.7.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/ad/getAccessCredentials.d.ts +15 -0
- package/ad/getAccessCredentials.js +1 -0
- package/ad/getAccessCredentials.js.map +1 -1
- package/ad/index.d.ts +12 -4
- package/ad/index.js +13 -26
- package/ad/index.js.map +1 -1
- package/ad/secretBackend.d.ts +39 -0
- package/ad/secretBackend.js +9 -3
- package/ad/secretBackend.js.map +1 -1
- package/ad/secretLibrary.d.ts +21 -0
- package/ad/secretLibrary.js +2 -0
- package/ad/secretLibrary.js.map +1 -1
- package/ad/secretRole.d.ts +21 -0
- package/ad/secretRole.js +2 -0
- package/ad/secretRole.js.map +1 -1
- package/alicloud/authBackendRole.d.ts +21 -0
- package/alicloud/authBackendRole.js +2 -0
- package/alicloud/authBackendRole.js.map +1 -1
- package/alicloud/index.d.ts +3 -1
- package/alicloud/index.js +4 -19
- package/alicloud/index.js.map +1 -1
- package/approle/authBackendLogin.d.ts +22 -1
- package/approle/authBackendLogin.js +3 -1
- package/approle/authBackendLogin.js.map +1 -1
- package/approle/authBackendRole.d.ts +21 -0
- package/approle/authBackendRole.js +2 -0
- package/approle/authBackendRole.js.map +1 -1
- package/approle/{authBackendRoleSecretID.d.ts → authBackendRoleSecretId.d.ts} +33 -12
- package/approle/{authBackendRoleSecretID.js → authBackendRoleSecretId.js} +16 -12
- package/approle/authBackendRoleSecretId.js.map +1 -0
- package/approle/getAuthBackendRoleId.d.ts +15 -0
- package/approle/getAuthBackendRoleId.js +1 -0
- package/approle/getAuthBackendRoleId.js.map +1 -1
- package/approle/index.d.ts +12 -4
- package/approle/index.js +15 -28
- package/approle/index.js.map +1 -1
- package/audit.d.ts +21 -0
- package/audit.js +2 -0
- package/audit.js.map +1 -1
- package/authBackend.d.ts +47 -10
- package/authBackend.js +4 -0
- package/authBackend.js.map +1 -1
- package/aws/authBackendCert.d.ts +21 -0
- package/aws/authBackendCert.js +2 -0
- package/aws/authBackendCert.js.map +1 -1
- package/aws/authBackendClient.d.ts +21 -0
- package/aws/authBackendClient.js +6 -2
- package/aws/authBackendClient.js.map +1 -1
- package/aws/authBackendIdentityWhitelist.d.ts +21 -0
- package/aws/authBackendIdentityWhitelist.js +2 -0
- package/aws/authBackendIdentityWhitelist.js.map +1 -1
- package/aws/authBackendLogin.d.ts +21 -0
- package/aws/authBackendLogin.js +4 -0
- package/aws/authBackendLogin.js.map +1 -1
- package/aws/authBackendRole.d.ts +21 -0
- package/aws/authBackendRole.js +2 -0
- package/aws/authBackendRole.js.map +1 -1
- package/aws/authBackendRoleTag.d.ts +21 -0
- package/aws/authBackendRoleTag.js +2 -0
- package/aws/authBackendRoleTag.js.map +1 -1
- package/aws/authBackendRoletagBlacklist.d.ts +21 -0
- package/aws/authBackendRoletagBlacklist.js +2 -0
- package/aws/authBackendRoletagBlacklist.js.map +1 -1
- package/aws/authBackendStsRole.d.ts +21 -0
- package/aws/authBackendStsRole.js +2 -0
- package/aws/authBackendStsRole.js.map +1 -1
- package/aws/getAccessCredentials.d.ts +15 -0
- package/aws/getAccessCredentials.js +1 -0
- package/aws/getAccessCredentials.js.map +1 -1
- package/aws/index.d.ts +33 -11
- package/aws/index.js +34 -47
- package/aws/index.js.map +1 -1
- package/aws/secretBackend.d.ts +36 -12
- package/aws/secretBackend.js +8 -14
- package/aws/secretBackend.js.map +1 -1
- package/aws/secretBackendRole.d.ts +21 -0
- package/aws/secretBackendRole.js +2 -0
- package/aws/secretBackendRole.js.map +1 -1
- package/azure/authBackendConfig.d.ts +21 -0
- package/azure/authBackendConfig.js +7 -3
- package/azure/authBackendConfig.js.map +1 -1
- package/azure/authBackendRole.d.ts +21 -0
- package/azure/authBackendRole.js +2 -0
- package/azure/authBackendRole.js.map +1 -1
- package/azure/backend.d.ts +36 -0
- package/azure/backend.js +10 -4
- package/azure/backend.js.map +1 -1
- package/azure/backendRole.d.ts +23 -1
- package/azure/backendRole.js +2 -0
- package/azure/backendRole.js.map +1 -1
- package/azure/getAccessCredentials.d.ts +15 -0
- package/azure/getAccessCredentials.js +1 -0
- package/azure/getAccessCredentials.js.map +1 -1
- package/azure/index.d.ts +15 -5
- package/azure/index.js +16 -29
- package/azure/index.js.map +1 -1
- package/certAuthBackendRole.d.ts +39 -3
- package/certAuthBackendRole.js +4 -0
- package/certAuthBackendRole.js.map +1 -1
- package/config/vars.d.ts +43 -3
- package/config/vars.js +64 -4
- package/config/vars.js.map +1 -1
- package/consul/index.d.ts +6 -2
- package/consul/index.js +7 -22
- package/consul/index.js.map +1 -1
- package/consul/secretBackend.d.ts +87 -15
- package/consul/secretBackend.js +24 -7
- package/consul/secretBackend.js.map +1 -1
- package/consul/secretBackendRole.d.ts +93 -10
- package/consul/secretBackendRole.js +14 -1
- package/consul/secretBackendRole.js.map +1 -1
- package/database/index.d.ts +12 -4
- package/database/index.js +13 -28
- package/database/index.js.map +1 -1
- package/database/secretBackendConnection.d.ts +35 -1
- package/database/secretBackendConnection.js +4 -0
- package/database/secretBackendConnection.js.map +1 -1
- package/database/secretBackendRole.d.ts +21 -0
- package/database/secretBackendRole.js +2 -0
- package/database/secretBackendRole.js.map +1 -1
- package/database/secretBackendStaticRole.d.ts +21 -0
- package/database/secretBackendStaticRole.js +2 -0
- package/database/secretBackendStaticRole.js.map +1 -1
- package/database/secretsMount.d.ts +41 -1
- package/database/secretsMount.js +6 -0
- package/database/secretsMount.js.map +1 -1
- package/egpPolicy.d.ts +21 -0
- package/egpPolicy.js +2 -0
- package/egpPolicy.js.map +1 -1
- package/gcp/authBackend.d.ts +71 -1
- package/gcp/authBackend.js +18 -2
- package/gcp/authBackend.js.map +1 -1
- package/gcp/authBackendRole.d.ts +21 -0
- package/gcp/authBackendRole.js +2 -0
- package/gcp/authBackendRole.js.map +1 -1
- package/gcp/getAuthBackendRole.d.ts +15 -0
- package/gcp/getAuthBackendRole.js +1 -0
- package/gcp/getAuthBackendRole.js.map +1 -1
- package/gcp/index.d.ts +18 -6
- package/gcp/index.js +19 -32
- package/gcp/index.js.map +1 -1
- package/gcp/secretBackend.d.ts +36 -0
- package/gcp/secretBackend.js +7 -1
- package/gcp/secretBackend.js.map +1 -1
- package/gcp/secretRoleset.d.ts +23 -1
- package/gcp/secretRoleset.js +2 -0
- package/gcp/secretRoleset.js.map +1 -1
- package/gcp/secretStaticAccount.d.ts +23 -1
- package/gcp/secretStaticAccount.js +2 -0
- package/gcp/secretStaticAccount.js.map +1 -1
- package/generic/endpoint.d.ts +21 -0
- package/generic/endpoint.js +5 -1
- package/generic/endpoint.js.map +1 -1
- package/generic/getSecret.d.ts +15 -0
- package/generic/getSecret.js +1 -0
- package/generic/getSecret.js.map +1 -1
- package/generic/index.d.ts +9 -3
- package/generic/index.js +10 -23
- package/generic/index.js.map +1 -1
- package/generic/secret.d.ts +21 -0
- package/generic/secret.js +5 -1
- package/generic/secret.js.map +1 -1
- package/getAuthBackend.d.ts +16 -1
- package/getAuthBackend.js +1 -0
- package/getAuthBackend.js.map +1 -1
- package/getNomadAccessToken.d.ts +15 -0
- package/getNomadAccessToken.js +1 -0
- package/getNomadAccessToken.js.map +1 -1
- package/getPolicyDocument.d.ts +5 -1
- package/getPolicyDocument.js +1 -0
- package/getPolicyDocument.js.map +1 -1
- package/github/authBackend.d.ts +38 -1
- package/github/authBackend.js +4 -0
- package/github/authBackend.js.map +1 -1
- package/github/index.d.ts +9 -3
- package/github/index.js +10 -25
- package/github/index.js.map +1 -1
- package/github/team.d.ts +21 -0
- package/github/team.js +2 -0
- package/github/team.js.map +1 -1
- package/github/user.d.ts +21 -0
- package/github/user.js +2 -0
- package/github/user.js.map +1 -1
- package/identity/entity.d.ts +21 -0
- package/identity/entity.js +2 -0
- package/identity/entity.js.map +1 -1
- package/identity/entityAlias.d.ts +21 -0
- package/identity/entityAlias.js +2 -0
- package/identity/entityAlias.js.map +1 -1
- package/identity/entityPolicies.d.ts +21 -0
- package/identity/entityPolicies.js +2 -0
- package/identity/entityPolicies.js.map +1 -1
- package/identity/getEntity.d.ts +16 -1
- package/identity/getEntity.js +1 -0
- package/identity/getEntity.js.map +1 -1
- package/identity/getGroup.d.ts +15 -0
- package/identity/getGroup.js +1 -0
- package/identity/getGroup.js.map +1 -1
- package/identity/getOidcClientCreds.d.ts +15 -0
- package/identity/getOidcClientCreds.js +1 -0
- package/identity/getOidcClientCreds.js.map +1 -1
- package/identity/getOidcOpenidConfig.d.ts +15 -0
- package/identity/getOidcOpenidConfig.js +1 -0
- package/identity/getOidcOpenidConfig.js.map +1 -1
- package/identity/getOidcPublicKeys.d.ts +15 -0
- package/identity/getOidcPublicKeys.js +1 -0
- package/identity/getOidcPublicKeys.js.map +1 -1
- package/identity/group.d.ts +21 -0
- package/identity/group.js +2 -0
- package/identity/group.js.map +1 -1
- package/identity/groupAlias.d.ts +21 -0
- package/identity/groupAlias.js +2 -0
- package/identity/groupAlias.js.map +1 -1
- package/identity/groupMemberEntityIds.d.ts +21 -0
- package/identity/groupMemberEntityIds.js +2 -0
- package/identity/groupMemberEntityIds.js.map +1 -1
- package/identity/groupPolicies.d.ts +21 -0
- package/identity/groupPolicies.js +2 -0
- package/identity/groupPolicies.js.map +1 -1
- package/identity/index.d.ts +75 -20
- package/identity/index.js +86 -66
- package/identity/index.js.map +1 -1
- package/identity/mfaDuo.d.ts +200 -0
- package/identity/mfaDuo.js +110 -0
- package/identity/mfaDuo.js.map +1 -0
- package/identity/mfaLoginEnforcement.d.ts +170 -0
- package/identity/mfaLoginEnforcement.js +96 -0
- package/identity/mfaLoginEnforcement.js.map +1 -0
- package/identity/mfaOkta.d.ts +188 -0
- package/identity/mfaOkta.js +105 -0
- package/identity/mfaOkta.js.map +1 -0
- package/identity/mfaPingid.d.ts +190 -0
- package/identity/mfaPingid.js +102 -0
- package/identity/mfaPingid.js.map +1 -0
- package/identity/mfaTotp.d.ts +218 -0
- package/identity/mfaTotp.js +104 -0
- package/identity/mfaTotp.js.map +1 -0
- package/identity/oidc.d.ts +21 -0
- package/identity/oidc.js +2 -0
- package/identity/oidc.js.map +1 -1
- package/identity/oidcAssignment.d.ts +23 -2
- package/identity/oidcAssignment.js +4 -2
- package/identity/oidcAssignment.js.map +1 -1
- package/identity/oidcClient.d.ts +21 -0
- package/identity/oidcClient.js +4 -0
- package/identity/oidcClient.js.map +1 -1
- package/identity/oidcKey.d.ts +21 -0
- package/identity/oidcKey.js +2 -0
- package/identity/oidcKey.js.map +1 -1
- package/identity/oidcKeyAllowedClientID.d.ts +21 -0
- package/identity/oidcKeyAllowedClientID.js +2 -0
- package/identity/oidcKeyAllowedClientID.js.map +1 -1
- package/identity/oidcProvider.d.ts +21 -0
- package/identity/oidcProvider.js +2 -0
- package/identity/oidcProvider.js.map +1 -1
- package/identity/oidcRole.d.ts +21 -0
- package/identity/oidcRole.js +2 -0
- package/identity/oidcRole.js.map +1 -1
- package/identity/oidcScope.d.ts +22 -3
- package/identity/oidcScope.js +3 -3
- package/identity/oidcScope.js.map +1 -1
- package/index.d.ts +75 -25
- package/index.js +78 -83
- package/index.js.map +1 -1
- package/jwt/authBackend.d.ts +38 -1
- package/jwt/authBackend.js +7 -1
- package/jwt/authBackend.js.map +1 -1
- package/jwt/authBackendRole.d.ts +57 -0
- package/jwt/authBackendRole.js +6 -0
- package/jwt/authBackendRole.js.map +1 -1
- package/jwt/index.d.ts +6 -2
- package/jwt/index.js +7 -22
- package/jwt/index.js.map +1 -1
- package/kmip/index.d.ts +9 -3
- package/kmip/index.js +10 -25
- package/kmip/index.js.map +1 -1
- package/kmip/secretBackend.d.ts +36 -0
- package/kmip/secretBackend.js +4 -0
- package/kmip/secretBackend.js.map +1 -1
- package/kmip/secretRole.d.ts +21 -0
- package/kmip/secretRole.js +2 -0
- package/kmip/secretRole.js.map +1 -1
- package/kmip/secretScope.d.ts +21 -0
- package/kmip/secretScope.js +2 -0
- package/kmip/secretScope.js.map +1 -1
- package/kubernetes/authBackendConfig.d.ts +21 -0
- package/kubernetes/authBackendConfig.js +5 -1
- package/kubernetes/authBackendConfig.js.map +1 -1
- package/kubernetes/authBackendRole.d.ts +21 -0
- package/kubernetes/authBackendRole.js +2 -0
- package/kubernetes/authBackendRole.js.map +1 -1
- package/kubernetes/getAuthBackendConfig.d.ts +15 -0
- package/kubernetes/getAuthBackendConfig.js +1 -0
- package/kubernetes/getAuthBackendConfig.js.map +1 -1
- package/kubernetes/getAuthBackendRole.d.ts +15 -0
- package/kubernetes/getAuthBackendRole.js +1 -0
- package/kubernetes/getAuthBackendRole.js.map +1 -1
- package/kubernetes/getServiceAccountToken.d.ts +156 -0
- package/kubernetes/getServiceAccountToken.js +67 -0
- package/kubernetes/getServiceAccountToken.js.map +1 -0
- package/kubernetes/index.d.ts +21 -4
- package/kubernetes/index.js +26 -24
- package/kubernetes/index.js.map +1 -1
- package/kubernetes/secretBackend.d.ts +303 -0
- package/kubernetes/secretBackend.js +114 -0
- package/kubernetes/secretBackend.js.map +1 -0
- package/kubernetes/secretBackendRole.d.ts +367 -0
- package/kubernetes/secretBackendRole.js +191 -0
- package/kubernetes/secretBackendRole.js.map +1 -0
- package/kv/getSecret.d.ts +104 -0
- package/kv/getSecret.js +53 -0
- package/kv/getSecret.js.map +1 -0
- package/kv/getSecretSubkeysV2.d.ts +132 -0
- package/kv/getSecretSubkeysV2.js +57 -0
- package/kv/getSecretSubkeysV2.js.map +1 -0
- package/kv/getSecretV2.d.ts +139 -0
- package/kv/getSecretV2.js +58 -0
- package/kv/getSecretV2.js.map +1 -0
- package/kv/getSecretsList.d.ts +85 -0
- package/kv/getSecretsList.js +58 -0
- package/kv/getSecretsList.js.map +1 -0
- package/kv/getSecretsListV2.d.ts +114 -0
- package/kv/getSecretsListV2.js +69 -0
- package/kv/getSecretsListV2.js.map +1 -0
- package/kv/index.d.ts +24 -0
- package/kv/index.js +47 -0
- package/kv/index.js.map +1 -0
- package/kv/secret.d.ts +145 -0
- package/kv/secret.js +106 -0
- package/kv/secret.js.map +1 -0
- package/kv/secretBackendV2.d.ts +154 -0
- package/kv/secretBackendV2.js +103 -0
- package/kv/secretBackendV2.js.map +1 -0
- package/kv/secretV2.d.ts +257 -0
- package/kv/secretV2.js +122 -0
- package/kv/secretV2.js.map +1 -0
- package/ldap/authBackend.d.ts +48 -0
- package/ldap/authBackend.js +10 -2
- package/ldap/authBackend.js.map +1 -1
- package/ldap/authBackendGroup.d.ts +21 -0
- package/ldap/authBackendGroup.js +2 -0
- package/ldap/authBackendGroup.js.map +1 -1
- package/ldap/authBackendUser.d.ts +21 -0
- package/ldap/authBackendUser.js +2 -0
- package/ldap/authBackendUser.js.map +1 -1
- package/ldap/index.d.ts +9 -3
- package/ldap/index.js +10 -25
- package/ldap/index.js.map +1 -1
- package/managed/index.d.ts +3 -0
- package/managed/index.js +22 -0
- package/managed/index.js.map +1 -0
- package/managed/keys.d.ts +104 -0
- package/managed/keys.js +64 -0
- package/managed/keys.js.map +1 -0
- package/mfaDuo.d.ts +21 -0
- package/mfaDuo.js +6 -2
- package/mfaDuo.js.map +1 -1
- package/mfaOkta.d.ts +21 -0
- package/mfaOkta.js +5 -1
- package/mfaOkta.js.map +1 -1
- package/mfaPingid.d.ts +21 -0
- package/mfaPingid.js +2 -0
- package/mfaPingid.js.map +1 -1
- package/mfaTotp.d.ts +21 -0
- package/mfaTotp.js +2 -0
- package/mfaTotp.js.map +1 -1
- package/mount.d.ts +33 -0
- package/mount.js +4 -0
- package/mount.js.map +1 -1
- package/namespace.d.ts +32 -18
- package/namespace.js +5 -16
- package/namespace.js.map +1 -1
- package/nomadSecretBackend.d.ts +36 -0
- package/nomadSecretBackend.js +9 -3
- package/nomadSecretBackend.js.map +1 -1
- package/nomadSecretRole.d.ts +21 -0
- package/nomadSecretRole.js +2 -0
- package/nomadSecretRole.js.map +1 -1
- package/okta/authBackend.d.ts +38 -1
- package/okta/authBackend.js +7 -1
- package/okta/authBackend.js.map +1 -1
- package/okta/authBackendGroup.d.ts +21 -0
- package/okta/authBackendGroup.js +2 -0
- package/okta/authBackendGroup.js.map +1 -1
- package/okta/authBackendUser.d.ts +21 -0
- package/okta/authBackendUser.js +2 -0
- package/okta/authBackendUser.js.map +1 -1
- package/okta/index.d.ts +9 -3
- package/okta/index.js +10 -25
- package/okta/index.js.map +1 -1
- package/package.json +2 -2
- package/package.json.dev +2 -2
- package/passwordPolicy.d.ts +21 -0
- package/passwordPolicy.js +2 -0
- package/passwordPolicy.js.map +1 -1
- package/pkisecret/index.d.ts +30 -10
- package/pkisecret/index.js +31 -46
- package/pkisecret/index.js.map +1 -1
- package/pkisecret/secretBackendCert.d.ts +29 -0
- package/pkisecret/secretBackendCert.js +6 -0
- package/pkisecret/secretBackendCert.js.map +1 -1
- package/pkisecret/secretBackendConfigCa.d.ts +21 -0
- package/pkisecret/secretBackendConfigCa.js +5 -1
- package/pkisecret/secretBackendConfigCa.js.map +1 -1
- package/pkisecret/secretBackendConfigUrls.d.ts +21 -0
- package/pkisecret/secretBackendConfigUrls.js +2 -0
- package/pkisecret/secretBackendConfigUrls.js.map +1 -1
- package/pkisecret/secretBackendCrlConfig.d.ts +21 -0
- package/pkisecret/secretBackendCrlConfig.js +2 -0
- package/pkisecret/secretBackendCrlConfig.js.map +1 -1
- package/pkisecret/secretBackendIntermediateCertRequest.d.ts +54 -0
- package/pkisecret/secretBackendIntermediateCertRequest.js +8 -0
- package/pkisecret/secretBackendIntermediateCertRequest.js.map +1 -1
- package/pkisecret/secretBackendIntermediateSetSigned.d.ts +21 -0
- package/pkisecret/secretBackendIntermediateSetSigned.js +2 -0
- package/pkisecret/secretBackendIntermediateSetSigned.js.map +1 -1
- package/pkisecret/secretBackendRole.d.ts +24 -3
- package/pkisecret/secretBackendRole.js +2 -0
- package/pkisecret/secretBackendRole.js.map +1 -1
- package/pkisecret/secretBackendRootCert.d.ts +57 -3
- package/pkisecret/secretBackendRootCert.js +6 -0
- package/pkisecret/secretBackendRootCert.js.map +1 -1
- package/pkisecret/secretBackendRootSignIntermediate.d.ts +21 -0
- package/pkisecret/secretBackendRootSignIntermediate.js +2 -0
- package/pkisecret/secretBackendRootSignIntermediate.js.map +1 -1
- package/pkisecret/secretBackendSign.d.ts +29 -0
- package/pkisecret/secretBackendSign.js +4 -0
- package/pkisecret/secretBackendSign.js.map +1 -1
- package/policy.d.ts +21 -0
- package/policy.js +2 -0
- package/policy.js.map +1 -1
- package/provider.d.ts +43 -3
- package/provider.js +12 -2
- package/provider.js.map +1 -1
- package/quotaLeaseCount.d.ts +21 -0
- package/quotaLeaseCount.js +2 -0
- package/quotaLeaseCount.js.map +1 -1
- package/quotaRateLimit.d.ts +48 -0
- package/quotaRateLimit.js +6 -0
- package/quotaRateLimit.js.map +1 -1
- package/rabbitmq/index.d.ts +6 -2
- package/rabbitmq/index.js +7 -22
- package/rabbitmq/index.js.map +1 -1
- package/rabbitmq/secretBackend.d.ts +36 -0
- package/rabbitmq/secretBackend.js +8 -2
- package/rabbitmq/secretBackend.js.map +1 -1
- package/rabbitmq/secretBackendRole.d.ts +23 -1
- package/rabbitmq/secretBackendRole.js +2 -0
- package/rabbitmq/secretBackendRole.js.map +1 -1
- package/raftAutopilot.d.ts +21 -0
- package/raftAutopilot.js +2 -0
- package/raftAutopilot.js.map +1 -1
- package/raftSnapshotAgentConfig.d.ts +62 -0
- package/raftSnapshotAgentConfig.js +43 -0
- package/raftSnapshotAgentConfig.js.map +1 -1
- package/rgpPolicy.d.ts +21 -0
- package/rgpPolicy.js +2 -0
- package/rgpPolicy.js.map +1 -1
- package/ssh/index.d.ts +6 -2
- package/ssh/index.js +7 -22
- package/ssh/index.js.map +1 -1
- package/ssh/secretBackendCa.d.ts +29 -0
- package/ssh/secretBackendCa.js +13 -1
- package/ssh/secretBackendCa.js.map +1 -1
- package/ssh/secretBackendRole.d.ts +23 -1
- package/ssh/secretBackendRole.js +2 -0
- package/ssh/secretBackendRole.js.map +1 -1
- package/terraformcloud/index.d.ts +9 -3
- package/terraformcloud/index.js +10 -25
- package/terraformcloud/index.js.map +1 -1
- package/terraformcloud/secretBackend.d.ts +36 -0
- package/terraformcloud/secretBackend.js +7 -1
- package/terraformcloud/secretBackend.js.map +1 -1
- package/terraformcloud/secretCreds.d.ts +21 -0
- package/terraformcloud/secretCreds.js +4 -0
- package/terraformcloud/secretCreds.js.map +1 -1
- package/terraformcloud/secretRole.d.ts +21 -0
- package/terraformcloud/secretRole.js +2 -0
- package/terraformcloud/secretRole.js.map +1 -1
- package/token.d.ts +42 -0
- package/token.js +9 -0
- package/token.js.map +1 -1
- package/tokenauth/authBackendRole.d.ts +21 -0
- package/tokenauth/authBackendRole.js +2 -0
- package/tokenauth/authBackendRole.js.map +1 -1
- package/tokenauth/index.d.ts +3 -1
- package/tokenauth/index.js +4 -19
- package/tokenauth/index.js.map +1 -1
- package/transform/index.d.ts +18 -6
- package/transform/index.js +19 -30
- package/transform/index.js.map +1 -1
- package/transform/transformation.d.ts +0 -25
- package/transform/transformation.js +0 -25
- package/transform/transformation.js.map +1 -1
- package/transit/getDecrypt.d.ts +3 -0
- package/transit/getDecrypt.js +1 -0
- package/transit/getDecrypt.js.map +1 -1
- package/transit/getEncrypt.d.ts +3 -0
- package/transit/getEncrypt.js +1 -0
- package/transit/getEncrypt.js.map +1 -1
- package/transit/index.d.ts +12 -4
- package/transit/index.js +13 -24
- package/transit/index.js.map +1 -1
- package/transit/secretBackendKey.d.ts +21 -0
- package/transit/secretBackendKey.js +2 -0
- package/transit/secretBackendKey.js.map +1 -1
- package/transit/secretCacheConfig.d.ts +21 -0
- package/transit/secretCacheConfig.js +2 -0
- package/transit/secretCacheConfig.js.map +1 -1
- package/types/index.js.map +1 -1
- package/types/input.d.ts +408 -4
- package/types/output.d.ts +409 -5
- package/utilities.js +13 -1
- package/utilities.js.map +1 -1
- package/approle/authBackendRoleSecretID.js.map +0 -1
package/consul/secretBackend.js
CHANGED
|
@@ -7,7 +7,7 @@ const pulumi = require("@pulumi/pulumi");
|
|
|
7
7
|
const utilities = require("../utilities");
|
|
8
8
|
/**
|
|
9
9
|
* ## Example Usage
|
|
10
|
-
*
|
|
10
|
+
* ### Creating a standard backend resource:
|
|
11
11
|
* ```typescript
|
|
12
12
|
* import * as pulumi from "@pulumi/pulumi";
|
|
13
13
|
* import * as vault from "@pulumi/vault";
|
|
@@ -19,6 +19,18 @@ const utilities = require("../utilities");
|
|
|
19
19
|
* token: "4240861b-ce3d-8530-115a-521ff070dd29",
|
|
20
20
|
* });
|
|
21
21
|
* ```
|
|
22
|
+
* ### Creating a backend resource to bootstrap a new Consul instance:
|
|
23
|
+
* ```typescript
|
|
24
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
25
|
+
* import * as vault from "@pulumi/vault";
|
|
26
|
+
*
|
|
27
|
+
* const test = new vault.consul.SecretBackend("test", {
|
|
28
|
+
* address: "127.0.0.1:8500",
|
|
29
|
+
* bootstrap: true,
|
|
30
|
+
* description: "Bootstrap the Consul backend",
|
|
31
|
+
* path: "consul",
|
|
32
|
+
* });
|
|
33
|
+
* ```
|
|
22
34
|
*
|
|
23
35
|
* ## Import
|
|
24
36
|
*
|
|
@@ -35,13 +47,16 @@ class SecretBackend extends pulumi.CustomResource {
|
|
|
35
47
|
if (opts.id) {
|
|
36
48
|
const state = argsOrState;
|
|
37
49
|
resourceInputs["address"] = state ? state.address : undefined;
|
|
50
|
+
resourceInputs["bootstrap"] = state ? state.bootstrap : undefined;
|
|
38
51
|
resourceInputs["caCert"] = state ? state.caCert : undefined;
|
|
39
52
|
resourceInputs["clientCert"] = state ? state.clientCert : undefined;
|
|
40
53
|
resourceInputs["clientKey"] = state ? state.clientKey : undefined;
|
|
41
54
|
resourceInputs["defaultLeaseTtlSeconds"] = state ? state.defaultLeaseTtlSeconds : undefined;
|
|
42
55
|
resourceInputs["description"] = state ? state.description : undefined;
|
|
56
|
+
resourceInputs["disableRemount"] = state ? state.disableRemount : undefined;
|
|
43
57
|
resourceInputs["local"] = state ? state.local : undefined;
|
|
44
58
|
resourceInputs["maxLeaseTtlSeconds"] = state ? state.maxLeaseTtlSeconds : undefined;
|
|
59
|
+
resourceInputs["namespace"] = state ? state.namespace : undefined;
|
|
45
60
|
resourceInputs["path"] = state ? state.path : undefined;
|
|
46
61
|
resourceInputs["scheme"] = state ? state.scheme : undefined;
|
|
47
62
|
resourceInputs["token"] = state ? state.token : undefined;
|
|
@@ -51,22 +66,24 @@ class SecretBackend extends pulumi.CustomResource {
|
|
|
51
66
|
if ((!args || args.address === undefined) && !opts.urn) {
|
|
52
67
|
throw new Error("Missing required property 'address'");
|
|
53
68
|
}
|
|
54
|
-
if ((!args || args.token === undefined) && !opts.urn) {
|
|
55
|
-
throw new Error("Missing required property 'token'");
|
|
56
|
-
}
|
|
57
69
|
resourceInputs["address"] = args ? args.address : undefined;
|
|
70
|
+
resourceInputs["bootstrap"] = args ? args.bootstrap : undefined;
|
|
58
71
|
resourceInputs["caCert"] = args ? args.caCert : undefined;
|
|
59
|
-
resourceInputs["clientCert"] = args ? args.clientCert : undefined;
|
|
60
|
-
resourceInputs["clientKey"] = args ? args.clientKey : undefined;
|
|
72
|
+
resourceInputs["clientCert"] = (args === null || args === void 0 ? void 0 : args.clientCert) ? pulumi.secret(args.clientCert) : undefined;
|
|
73
|
+
resourceInputs["clientKey"] = (args === null || args === void 0 ? void 0 : args.clientKey) ? pulumi.secret(args.clientKey) : undefined;
|
|
61
74
|
resourceInputs["defaultLeaseTtlSeconds"] = args ? args.defaultLeaseTtlSeconds : undefined;
|
|
62
75
|
resourceInputs["description"] = args ? args.description : undefined;
|
|
76
|
+
resourceInputs["disableRemount"] = args ? args.disableRemount : undefined;
|
|
63
77
|
resourceInputs["local"] = args ? args.local : undefined;
|
|
64
78
|
resourceInputs["maxLeaseTtlSeconds"] = args ? args.maxLeaseTtlSeconds : undefined;
|
|
79
|
+
resourceInputs["namespace"] = args ? args.namespace : undefined;
|
|
65
80
|
resourceInputs["path"] = args ? args.path : undefined;
|
|
66
81
|
resourceInputs["scheme"] = args ? args.scheme : undefined;
|
|
67
|
-
resourceInputs["token"] = args ? args.token : undefined;
|
|
82
|
+
resourceInputs["token"] = (args === null || args === void 0 ? void 0 : args.token) ? pulumi.secret(args.token) : undefined;
|
|
68
83
|
}
|
|
69
84
|
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
85
|
+
const secretOpts = { additionalSecretOutputs: ["clientCert", "clientKey", "token"] };
|
|
86
|
+
opts = pulumi.mergeOptions(opts, secretOpts);
|
|
70
87
|
super(SecretBackend.__pulumiType, name, resourceInputs, opts);
|
|
71
88
|
}
|
|
72
89
|
/**
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretBackend.js","sourceRoot":"","sources":["../../consul/secretBackend.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"secretBackend.js","sourceRoot":"","sources":["../../consul/secretBackend.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAkCG;AACH,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;IAsGpD,YAAY,IAAY,EAAE,WAAoD,EAAE,IAAmC;QAC/G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA6C,CAAC;YAC5D,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7D;aAAM;YACH,MAAM,IAAI,GAAG,WAA4C,CAAC;YAC1D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,YAAY,CAAC,GAAG,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,UAAU,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAC7F,cAAc,CAAC,WAAW,CAAC,GAAG,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,SAAS,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,OAAO,CAAC,GAAG,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,KAAK,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;SACjF;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,YAAY,EAAE,WAAW,EAAE,OAAO,CAAC,EAAE,CAAC;QACrF,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAClE,CAAC;IAhJD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA0B,EAAE,IAAmC;QACxH,OAAO,IAAI,aAAa,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACpE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,aAAa,CAAC,YAAY,CAAC;IAC9D,CAAC;;AA1BL,sCAkJC;AApIG,gBAAgB;AACO,0BAAY,GAAG,0CAA0C,CAAC"}
|
|
@@ -16,9 +16,14 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
16
16
|
* });
|
|
17
17
|
* const example = new vault.consul.SecretBackendRole("example", {
|
|
18
18
|
* backend: test.path,
|
|
19
|
-
*
|
|
19
|
+
* consulPolicies: ["example-policy"],
|
|
20
20
|
* });
|
|
21
21
|
* ```
|
|
22
|
+
* ## Note About Required Arguments
|
|
23
|
+
*
|
|
24
|
+
* *At least one* of the four arguments `consulPolicies`, `consulRoles`, `serviceIdentities`, or
|
|
25
|
+
* `nodeIdentities` is required for a token. If desired, any combination of the four arguments up-to and
|
|
26
|
+
* including all four, is valid.
|
|
22
27
|
*
|
|
23
28
|
* ## Import
|
|
24
29
|
*
|
|
@@ -50,11 +55,15 @@ export declare class SecretBackendRole extends pulumi.CustomResource {
|
|
|
50
55
|
readonly backend: pulumi.Output<string | undefined>;
|
|
51
56
|
/**
|
|
52
57
|
* The Consul namespace that the token will be created in.
|
|
53
|
-
* Applicable for Vault 1.10+ and Consul 1.7+"
|
|
58
|
+
* Applicable for Vault 1.10+ and Consul 1.7+".
|
|
54
59
|
*/
|
|
55
60
|
readonly consulNamespace: pulumi.Output<string>;
|
|
56
61
|
/**
|
|
57
|
-
*
|
|
62
|
+
* <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
|
|
63
|
+
*/
|
|
64
|
+
readonly consulPolicies: pulumi.Output<string[] | undefined>;
|
|
65
|
+
/**
|
|
66
|
+
* <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
|
|
58
67
|
* Applicable for Vault 1.10+ with Consul 1.5+.
|
|
59
68
|
*/
|
|
60
69
|
readonly consulRoles: pulumi.Output<string[] | undefined>;
|
|
@@ -70,17 +79,39 @@ export declare class SecretBackendRole extends pulumi.CustomResource {
|
|
|
70
79
|
* The name of the Consul secrets engine role to create.
|
|
71
80
|
*/
|
|
72
81
|
readonly name: pulumi.Output<string>;
|
|
82
|
+
/**
|
|
83
|
+
* The namespace to provision the resource in.
|
|
84
|
+
* The value should not contain leading or trailing forward slashes.
|
|
85
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
86
|
+
* *Available only for Vault Enterprise*.
|
|
87
|
+
*/
|
|
88
|
+
readonly namespace: pulumi.Output<string | undefined>;
|
|
89
|
+
/**
|
|
90
|
+
* <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
|
|
91
|
+
* identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
|
|
92
|
+
*/
|
|
93
|
+
readonly nodeIdentities: pulumi.Output<string[] | undefined>;
|
|
73
94
|
/**
|
|
74
95
|
* The admin partition that the token will be created in.
|
|
75
|
-
* Applicable for Vault 1.10+ and Consul 1.11+"
|
|
96
|
+
* Applicable for Vault 1.10+ and Consul 1.11+".
|
|
76
97
|
*/
|
|
77
98
|
readonly partition: pulumi.Output<string>;
|
|
78
99
|
/**
|
|
79
100
|
* The list of Consul ACL policies to associate with these roles.
|
|
101
|
+
* **NOTE:** The new parameter `consulPolicies` should be used in favor of this. This parameter,
|
|
102
|
+
* `policies`, remains supported for legacy users, but Vault has deprecated this field.
|
|
80
103
|
*/
|
|
81
104
|
readonly policies: pulumi.Output<string[] | undefined>;
|
|
105
|
+
/**
|
|
106
|
+
* <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
|
|
107
|
+
* service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
|
|
108
|
+
*/
|
|
109
|
+
readonly serviceIdentities: pulumi.Output<string[] | undefined>;
|
|
82
110
|
/**
|
|
83
111
|
* Specifies the type of token to create when using this role. Valid values are "client" or "management".
|
|
112
|
+
* *Deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.*
|
|
113
|
+
*
|
|
114
|
+
* @deprecated Consul 1.11 and later removed the legacy ACL system which supported this field.
|
|
84
115
|
*/
|
|
85
116
|
readonly tokenType: pulumi.Output<string | undefined>;
|
|
86
117
|
/**
|
|
@@ -106,11 +137,15 @@ export interface SecretBackendRoleState {
|
|
|
106
137
|
backend?: pulumi.Input<string>;
|
|
107
138
|
/**
|
|
108
139
|
* The Consul namespace that the token will be created in.
|
|
109
|
-
* Applicable for Vault 1.10+ and Consul 1.7+"
|
|
140
|
+
* Applicable for Vault 1.10+ and Consul 1.7+".
|
|
110
141
|
*/
|
|
111
142
|
consulNamespace?: pulumi.Input<string>;
|
|
112
143
|
/**
|
|
113
|
-
*
|
|
144
|
+
* <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
|
|
145
|
+
*/
|
|
146
|
+
consulPolicies?: pulumi.Input<pulumi.Input<string>[]>;
|
|
147
|
+
/**
|
|
148
|
+
* <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
|
|
114
149
|
* Applicable for Vault 1.10+ with Consul 1.5+.
|
|
115
150
|
*/
|
|
116
151
|
consulRoles?: pulumi.Input<pulumi.Input<string>[]>;
|
|
@@ -126,17 +161,39 @@ export interface SecretBackendRoleState {
|
|
|
126
161
|
* The name of the Consul secrets engine role to create.
|
|
127
162
|
*/
|
|
128
163
|
name?: pulumi.Input<string>;
|
|
164
|
+
/**
|
|
165
|
+
* The namespace to provision the resource in.
|
|
166
|
+
* The value should not contain leading or trailing forward slashes.
|
|
167
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
168
|
+
* *Available only for Vault Enterprise*.
|
|
169
|
+
*/
|
|
170
|
+
namespace?: pulumi.Input<string>;
|
|
171
|
+
/**
|
|
172
|
+
* <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
|
|
173
|
+
* identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
|
|
174
|
+
*/
|
|
175
|
+
nodeIdentities?: pulumi.Input<pulumi.Input<string>[]>;
|
|
129
176
|
/**
|
|
130
177
|
* The admin partition that the token will be created in.
|
|
131
|
-
* Applicable for Vault 1.10+ and Consul 1.11+"
|
|
178
|
+
* Applicable for Vault 1.10+ and Consul 1.11+".
|
|
132
179
|
*/
|
|
133
180
|
partition?: pulumi.Input<string>;
|
|
134
181
|
/**
|
|
135
182
|
* The list of Consul ACL policies to associate with these roles.
|
|
183
|
+
* **NOTE:** The new parameter `consulPolicies` should be used in favor of this. This parameter,
|
|
184
|
+
* `policies`, remains supported for legacy users, but Vault has deprecated this field.
|
|
136
185
|
*/
|
|
137
186
|
policies?: pulumi.Input<pulumi.Input<string>[]>;
|
|
187
|
+
/**
|
|
188
|
+
* <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
|
|
189
|
+
* service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
|
|
190
|
+
*/
|
|
191
|
+
serviceIdentities?: pulumi.Input<pulumi.Input<string>[]>;
|
|
138
192
|
/**
|
|
139
193
|
* Specifies the type of token to create when using this role. Valid values are "client" or "management".
|
|
194
|
+
* *Deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.*
|
|
195
|
+
*
|
|
196
|
+
* @deprecated Consul 1.11 and later removed the legacy ACL system which supported this field.
|
|
140
197
|
*/
|
|
141
198
|
tokenType?: pulumi.Input<string>;
|
|
142
199
|
/**
|
|
@@ -154,11 +211,15 @@ export interface SecretBackendRoleArgs {
|
|
|
154
211
|
backend?: pulumi.Input<string>;
|
|
155
212
|
/**
|
|
156
213
|
* The Consul namespace that the token will be created in.
|
|
157
|
-
* Applicable for Vault 1.10+ and Consul 1.7+"
|
|
214
|
+
* Applicable for Vault 1.10+ and Consul 1.7+".
|
|
158
215
|
*/
|
|
159
216
|
consulNamespace?: pulumi.Input<string>;
|
|
160
217
|
/**
|
|
161
|
-
*
|
|
218
|
+
* <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
|
|
219
|
+
*/
|
|
220
|
+
consulPolicies?: pulumi.Input<pulumi.Input<string>[]>;
|
|
221
|
+
/**
|
|
222
|
+
* <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
|
|
162
223
|
* Applicable for Vault 1.10+ with Consul 1.5+.
|
|
163
224
|
*/
|
|
164
225
|
consulRoles?: pulumi.Input<pulumi.Input<string>[]>;
|
|
@@ -174,17 +235,39 @@ export interface SecretBackendRoleArgs {
|
|
|
174
235
|
* The name of the Consul secrets engine role to create.
|
|
175
236
|
*/
|
|
176
237
|
name?: pulumi.Input<string>;
|
|
238
|
+
/**
|
|
239
|
+
* The namespace to provision the resource in.
|
|
240
|
+
* The value should not contain leading or trailing forward slashes.
|
|
241
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
242
|
+
* *Available only for Vault Enterprise*.
|
|
243
|
+
*/
|
|
244
|
+
namespace?: pulumi.Input<string>;
|
|
245
|
+
/**
|
|
246
|
+
* <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
|
|
247
|
+
* identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
|
|
248
|
+
*/
|
|
249
|
+
nodeIdentities?: pulumi.Input<pulumi.Input<string>[]>;
|
|
177
250
|
/**
|
|
178
251
|
* The admin partition that the token will be created in.
|
|
179
|
-
* Applicable for Vault 1.10+ and Consul 1.11+"
|
|
252
|
+
* Applicable for Vault 1.10+ and Consul 1.11+".
|
|
180
253
|
*/
|
|
181
254
|
partition?: pulumi.Input<string>;
|
|
182
255
|
/**
|
|
183
256
|
* The list of Consul ACL policies to associate with these roles.
|
|
257
|
+
* **NOTE:** The new parameter `consulPolicies` should be used in favor of this. This parameter,
|
|
258
|
+
* `policies`, remains supported for legacy users, but Vault has deprecated this field.
|
|
184
259
|
*/
|
|
185
260
|
policies?: pulumi.Input<pulumi.Input<string>[]>;
|
|
261
|
+
/**
|
|
262
|
+
* <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
|
|
263
|
+
* service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
|
|
264
|
+
*/
|
|
265
|
+
serviceIdentities?: pulumi.Input<pulumi.Input<string>[]>;
|
|
186
266
|
/**
|
|
187
267
|
* Specifies the type of token to create when using this role. Valid values are "client" or "management".
|
|
268
|
+
* *Deprecated: Consul 1.11 and later removed the legacy ACL system which supported this field.*
|
|
269
|
+
*
|
|
270
|
+
* @deprecated Consul 1.11 and later removed the legacy ACL system which supported this field.
|
|
188
271
|
*/
|
|
189
272
|
tokenType?: pulumi.Input<string>;
|
|
190
273
|
/**
|
|
@@ -22,9 +22,14 @@ const utilities = require("../utilities");
|
|
|
22
22
|
* });
|
|
23
23
|
* const example = new vault.consul.SecretBackendRole("example", {
|
|
24
24
|
* backend: test.path,
|
|
25
|
-
*
|
|
25
|
+
* consulPolicies: ["example-policy"],
|
|
26
26
|
* });
|
|
27
27
|
* ```
|
|
28
|
+
* ## Note About Required Arguments
|
|
29
|
+
*
|
|
30
|
+
* *At least one* of the four arguments `consulPolicies`, `consulRoles`, `serviceIdentities`, or
|
|
31
|
+
* `nodeIdentities` is required for a token. If desired, any combination of the four arguments up-to and
|
|
32
|
+
* including all four, is valid.
|
|
28
33
|
*
|
|
29
34
|
* ## Import
|
|
30
35
|
*
|
|
@@ -42,12 +47,16 @@ class SecretBackendRole extends pulumi.CustomResource {
|
|
|
42
47
|
const state = argsOrState;
|
|
43
48
|
resourceInputs["backend"] = state ? state.backend : undefined;
|
|
44
49
|
resourceInputs["consulNamespace"] = state ? state.consulNamespace : undefined;
|
|
50
|
+
resourceInputs["consulPolicies"] = state ? state.consulPolicies : undefined;
|
|
45
51
|
resourceInputs["consulRoles"] = state ? state.consulRoles : undefined;
|
|
46
52
|
resourceInputs["local"] = state ? state.local : undefined;
|
|
47
53
|
resourceInputs["maxTtl"] = state ? state.maxTtl : undefined;
|
|
48
54
|
resourceInputs["name"] = state ? state.name : undefined;
|
|
55
|
+
resourceInputs["namespace"] = state ? state.namespace : undefined;
|
|
56
|
+
resourceInputs["nodeIdentities"] = state ? state.nodeIdentities : undefined;
|
|
49
57
|
resourceInputs["partition"] = state ? state.partition : undefined;
|
|
50
58
|
resourceInputs["policies"] = state ? state.policies : undefined;
|
|
59
|
+
resourceInputs["serviceIdentities"] = state ? state.serviceIdentities : undefined;
|
|
51
60
|
resourceInputs["tokenType"] = state ? state.tokenType : undefined;
|
|
52
61
|
resourceInputs["ttl"] = state ? state.ttl : undefined;
|
|
53
62
|
}
|
|
@@ -55,12 +64,16 @@ class SecretBackendRole extends pulumi.CustomResource {
|
|
|
55
64
|
const args = argsOrState;
|
|
56
65
|
resourceInputs["backend"] = args ? args.backend : undefined;
|
|
57
66
|
resourceInputs["consulNamespace"] = args ? args.consulNamespace : undefined;
|
|
67
|
+
resourceInputs["consulPolicies"] = args ? args.consulPolicies : undefined;
|
|
58
68
|
resourceInputs["consulRoles"] = args ? args.consulRoles : undefined;
|
|
59
69
|
resourceInputs["local"] = args ? args.local : undefined;
|
|
60
70
|
resourceInputs["maxTtl"] = args ? args.maxTtl : undefined;
|
|
61
71
|
resourceInputs["name"] = args ? args.name : undefined;
|
|
72
|
+
resourceInputs["namespace"] = args ? args.namespace : undefined;
|
|
73
|
+
resourceInputs["nodeIdentities"] = args ? args.nodeIdentities : undefined;
|
|
62
74
|
resourceInputs["partition"] = args ? args.partition : undefined;
|
|
63
75
|
resourceInputs["policies"] = args ? args.policies : undefined;
|
|
76
|
+
resourceInputs["serviceIdentities"] = args ? args.serviceIdentities : undefined;
|
|
64
77
|
resourceInputs["tokenType"] = args ? args.tokenType : undefined;
|
|
65
78
|
resourceInputs["ttl"] = args ? args.ttl : undefined;
|
|
66
79
|
}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretBackendRole.js","sourceRoot":"","sources":["../../consul/secretBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"secretBackendRole.js","sourceRoot":"","sources":["../../consul/secretBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAiCG;AACH,MAAa,iBAAkB,SAAQ,MAAM,CAAC,cAAc;IA0GxD,YAAY,IAAY,EAAE,WAA4D,EAAE,IAAmC;QACvH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAiD,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACzD;aAAM;YACH,MAAM,IAAI,GAAG,WAAgD,CAAC;YAC9D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACvD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,iBAAiB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACtE,CAAC;IA/ID;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA8B,EAAE,IAAmC;QAC5H,OAAO,IAAI,iBAAiB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACxE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,iBAAiB,CAAC,YAAY,CAAC;IAClE,CAAC;;AA1BL,8CAiJC;AAnIG,gBAAgB;AACO,8BAAY,GAAG,kDAAkD,CAAC"}
|
package/database/index.d.ts
CHANGED
|
@@ -1,4 +1,12 @@
|
|
|
1
|
-
export
|
|
2
|
-
export
|
|
3
|
-
export
|
|
4
|
-
export
|
|
1
|
+
export { SecretBackendConnectionArgs, SecretBackendConnectionState } from "./secretBackendConnection";
|
|
2
|
+
export declare type SecretBackendConnection = import("./secretBackendConnection").SecretBackendConnection;
|
|
3
|
+
export declare const SecretBackendConnection: typeof import("./secretBackendConnection").SecretBackendConnection;
|
|
4
|
+
export { SecretBackendRoleArgs, SecretBackendRoleState } from "./secretBackendRole";
|
|
5
|
+
export declare type SecretBackendRole = import("./secretBackendRole").SecretBackendRole;
|
|
6
|
+
export declare const SecretBackendRole: typeof import("./secretBackendRole").SecretBackendRole;
|
|
7
|
+
export { SecretBackendStaticRoleArgs, SecretBackendStaticRoleState } from "./secretBackendStaticRole";
|
|
8
|
+
export declare type SecretBackendStaticRole = import("./secretBackendStaticRole").SecretBackendStaticRole;
|
|
9
|
+
export declare const SecretBackendStaticRole: typeof import("./secretBackendStaticRole").SecretBackendStaticRole;
|
|
10
|
+
export { SecretsMountArgs, SecretsMountState } from "./secretsMount";
|
|
11
|
+
export declare type SecretsMount = import("./secretsMount").SecretsMount;
|
|
12
|
+
export declare const SecretsMount: typeof import("./secretsMount").SecretsMount;
|
package/database/index.js
CHANGED
|
@@ -1,45 +1,30 @@
|
|
|
1
1
|
"use strict";
|
|
2
2
|
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
3
|
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
-
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
5
|
-
if (k2 === undefined) k2 = k;
|
|
6
|
-
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
7
|
-
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
8
|
-
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
9
|
-
}
|
|
10
|
-
Object.defineProperty(o, k2, desc);
|
|
11
|
-
}) : (function(o, m, k, k2) {
|
|
12
|
-
if (k2 === undefined) k2 = k;
|
|
13
|
-
o[k2] = m[k];
|
|
14
|
-
}));
|
|
15
|
-
var __exportStar = (this && this.__exportStar) || function(m, exports) {
|
|
16
|
-
for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
|
|
17
|
-
};
|
|
18
4
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.SecretsMount = exports.SecretBackendStaticRole = exports.SecretBackendRole = exports.SecretBackendConnection = void 0;
|
|
19
6
|
const pulumi = require("@pulumi/pulumi");
|
|
20
7
|
const utilities = require("../utilities");
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
const secretBackendStaticRole_1 = require("./secretBackendStaticRole");
|
|
30
|
-
const secretsMount_1 = require("./secretsMount");
|
|
8
|
+
exports.SecretBackendConnection = null;
|
|
9
|
+
exports.SecretBackendRole = null;
|
|
10
|
+
exports.SecretBackendStaticRole = null;
|
|
11
|
+
exports.SecretsMount = null;
|
|
12
|
+
utilities.lazyLoad(exports, ["SecretBackendConnection"], () => require("./secretBackendConnection"));
|
|
13
|
+
utilities.lazyLoad(exports, ["SecretBackendRole"], () => require("./secretBackendRole"));
|
|
14
|
+
utilities.lazyLoad(exports, ["SecretBackendStaticRole"], () => require("./secretBackendStaticRole"));
|
|
15
|
+
utilities.lazyLoad(exports, ["SecretsMount"], () => require("./secretsMount"));
|
|
31
16
|
const _module = {
|
|
32
17
|
version: utilities.getVersion(),
|
|
33
18
|
construct: (name, type, urn) => {
|
|
34
19
|
switch (type) {
|
|
35
20
|
case "vault:database/secretBackendConnection:SecretBackendConnection":
|
|
36
|
-
return new
|
|
21
|
+
return new exports.SecretBackendConnection(name, undefined, { urn });
|
|
37
22
|
case "vault:database/secretBackendRole:SecretBackendRole":
|
|
38
|
-
return new
|
|
23
|
+
return new exports.SecretBackendRole(name, undefined, { urn });
|
|
39
24
|
case "vault:database/secretBackendStaticRole:SecretBackendStaticRole":
|
|
40
|
-
return new
|
|
25
|
+
return new exports.SecretBackendStaticRole(name, undefined, { urn });
|
|
41
26
|
case "vault:database/secretsMount:SecretsMount":
|
|
42
|
-
return new
|
|
27
|
+
return new exports.SecretsMount(name, undefined, { urn });
|
|
43
28
|
default:
|
|
44
29
|
throw new Error(`unknown resource type ${type}`);
|
|
45
30
|
}
|
package/database/index.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../database/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../database/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAK7B,QAAA,uBAAuB,GAAuE,IAAW,CAAC;AAI1G,QAAA,iBAAiB,GAA2D,IAAW,CAAC;AAIxF,QAAA,uBAAuB,GAAuE,IAAW,CAAC;AAI1G,QAAA,YAAY,GAAiD,IAAW,CAAC;AAEtF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,yBAAyB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,2BAA2B,CAAC,CAAC,CAAC;AACrG,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,mBAAmB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,qBAAqB,CAAC,CAAC,CAAC;AACzF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,yBAAyB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,2BAA2B,CAAC,CAAC,CAAC;AACrG,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,cAAc,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,gBAAgB,CAAC,CAAC,CAAC;AAE/E,MAAM,OAAO,GAAG;IACZ,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE;IAC/B,SAAS,EAAE,CAAC,IAAY,EAAE,IAAY,EAAE,GAAW,EAAmB,EAAE;QACpE,QAAQ,IAAI,EAAE;YACV,KAAK,gEAAgE;gBACjE,OAAO,IAAI,+BAAuB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACrE,KAAK,oDAAoD;gBACrD,OAAO,IAAI,yBAAiB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC/D,KAAK,gEAAgE;gBACjE,OAAO,IAAI,+BAAuB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACrE,KAAK,0CAA0C;gBAC3C,OAAO,IAAI,oBAAY,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC1D;gBACI,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,EAAE,CAAC,CAAC;SACxD;IACL,CAAC;CACJ,CAAC;AACF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,kCAAkC,EAAE,OAAO,CAAC,CAAA;AAC3F,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,4BAA4B,EAAE,OAAO,CAAC,CAAA;AACrF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,kCAAkC,EAAE,OAAO,CAAC,CAAA;AAC3F,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,uBAAuB,EAAE,OAAO,CAAC,CAAA"}
|
|
@@ -1,5 +1,6 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
-
import
|
|
2
|
+
import * as inputs from "../types/input";
|
|
3
|
+
import * as outputs from "../types/output";
|
|
3
4
|
/**
|
|
4
5
|
* ## Example Usage
|
|
5
6
|
*
|
|
@@ -114,6 +115,13 @@ export declare class SecretBackendConnection extends pulumi.CustomResource {
|
|
|
114
115
|
* A unique name to give the database connection.
|
|
115
116
|
*/
|
|
116
117
|
readonly name: pulumi.Output<string>;
|
|
118
|
+
/**
|
|
119
|
+
* The namespace to provision the resource in.
|
|
120
|
+
* The value should not contain leading or trailing forward slashes.
|
|
121
|
+
* The `namespace` is always relative to the provider's configured namespace.
|
|
122
|
+
* *Available only for Vault Enterprise*.
|
|
123
|
+
*/
|
|
124
|
+
readonly namespace: pulumi.Output<string | undefined>;
|
|
117
125
|
/**
|
|
118
126
|
* A nested block containing configuration options for Oracle connections.
|
|
119
127
|
*/
|
|
@@ -126,6 +134,10 @@ export declare class SecretBackendConnection extends pulumi.CustomResource {
|
|
|
126
134
|
* A nested block containing configuration options for PostgreSQL connections.
|
|
127
135
|
*/
|
|
128
136
|
readonly postgresql: pulumi.Output<outputs.database.SecretBackendConnectionPostgresql | undefined>;
|
|
137
|
+
/**
|
|
138
|
+
* A nested block containing configuration options for Redis ElastiCache connections.
|
|
139
|
+
*/
|
|
140
|
+
readonly redisElasticache: pulumi.Output<outputs.database.SecretBackendConnectionRedisElasticache | undefined>;
|
|
129
141
|
/**
|
|
130
142
|
* Connection parameters for the redshift-database-plugin plugin.
|
|
131
143
|
*/
|
|
@@ -223,6 +235,13 @@ export interface SecretBackendConnectionState {
|
|
|
223
235
|
* A unique name to give the database connection.
|
|
224
236
|
*/
|
|
225
237
|
name?: pulumi.Input<string>;
|
|
238
|
+
/**
|
|
239
|
+
* The namespace to provision the resource in.
|
|
240
|
+
* The value should not contain leading or trailing forward slashes.
|
|
241
|
+
* The `namespace` is always relative to the provider's configured namespace.
|
|
242
|
+
* *Available only for Vault Enterprise*.
|
|
243
|
+
*/
|
|
244
|
+
namespace?: pulumi.Input<string>;
|
|
226
245
|
/**
|
|
227
246
|
* A nested block containing configuration options for Oracle connections.
|
|
228
247
|
*/
|
|
@@ -235,6 +254,10 @@ export interface SecretBackendConnectionState {
|
|
|
235
254
|
* A nested block containing configuration options for PostgreSQL connections.
|
|
236
255
|
*/
|
|
237
256
|
postgresql?: pulumi.Input<inputs.database.SecretBackendConnectionPostgresql>;
|
|
257
|
+
/**
|
|
258
|
+
* A nested block containing configuration options for Redis ElastiCache connections.
|
|
259
|
+
*/
|
|
260
|
+
redisElasticache?: pulumi.Input<inputs.database.SecretBackendConnectionRedisElasticache>;
|
|
238
261
|
/**
|
|
239
262
|
* Connection parameters for the redshift-database-plugin plugin.
|
|
240
263
|
*/
|
|
@@ -324,6 +347,13 @@ export interface SecretBackendConnectionArgs {
|
|
|
324
347
|
* A unique name to give the database connection.
|
|
325
348
|
*/
|
|
326
349
|
name?: pulumi.Input<string>;
|
|
350
|
+
/**
|
|
351
|
+
* The namespace to provision the resource in.
|
|
352
|
+
* The value should not contain leading or trailing forward slashes.
|
|
353
|
+
* The `namespace` is always relative to the provider's configured namespace.
|
|
354
|
+
* *Available only for Vault Enterprise*.
|
|
355
|
+
*/
|
|
356
|
+
namespace?: pulumi.Input<string>;
|
|
327
357
|
/**
|
|
328
358
|
* A nested block containing configuration options for Oracle connections.
|
|
329
359
|
*/
|
|
@@ -336,6 +366,10 @@ export interface SecretBackendConnectionArgs {
|
|
|
336
366
|
* A nested block containing configuration options for PostgreSQL connections.
|
|
337
367
|
*/
|
|
338
368
|
postgresql?: pulumi.Input<inputs.database.SecretBackendConnectionPostgresql>;
|
|
369
|
+
/**
|
|
370
|
+
* A nested block containing configuration options for Redis ElastiCache connections.
|
|
371
|
+
*/
|
|
372
|
+
redisElasticache?: pulumi.Input<inputs.database.SecretBackendConnectionRedisElasticache>;
|
|
339
373
|
/**
|
|
340
374
|
* Connection parameters for the redshift-database-plugin plugin.
|
|
341
375
|
*/
|
|
@@ -58,9 +58,11 @@ class SecretBackendConnection extends pulumi.CustomResource {
|
|
|
58
58
|
resourceInputs["mysqlLegacy"] = state ? state.mysqlLegacy : undefined;
|
|
59
59
|
resourceInputs["mysqlRds"] = state ? state.mysqlRds : undefined;
|
|
60
60
|
resourceInputs["name"] = state ? state.name : undefined;
|
|
61
|
+
resourceInputs["namespace"] = state ? state.namespace : undefined;
|
|
61
62
|
resourceInputs["oracle"] = state ? state.oracle : undefined;
|
|
62
63
|
resourceInputs["pluginName"] = state ? state.pluginName : undefined;
|
|
63
64
|
resourceInputs["postgresql"] = state ? state.postgresql : undefined;
|
|
65
|
+
resourceInputs["redisElasticache"] = state ? state.redisElasticache : undefined;
|
|
64
66
|
resourceInputs["redshift"] = state ? state.redshift : undefined;
|
|
65
67
|
resourceInputs["rootRotationStatements"] = state ? state.rootRotationStatements : undefined;
|
|
66
68
|
resourceInputs["snowflake"] = state ? state.snowflake : undefined;
|
|
@@ -87,9 +89,11 @@ class SecretBackendConnection extends pulumi.CustomResource {
|
|
|
87
89
|
resourceInputs["mysqlLegacy"] = args ? args.mysqlLegacy : undefined;
|
|
88
90
|
resourceInputs["mysqlRds"] = args ? args.mysqlRds : undefined;
|
|
89
91
|
resourceInputs["name"] = args ? args.name : undefined;
|
|
92
|
+
resourceInputs["namespace"] = args ? args.namespace : undefined;
|
|
90
93
|
resourceInputs["oracle"] = args ? args.oracle : undefined;
|
|
91
94
|
resourceInputs["pluginName"] = args ? args.pluginName : undefined;
|
|
92
95
|
resourceInputs["postgresql"] = args ? args.postgresql : undefined;
|
|
96
|
+
resourceInputs["redisElasticache"] = args ? args.redisElasticache : undefined;
|
|
93
97
|
resourceInputs["redshift"] = args ? args.redshift : undefined;
|
|
94
98
|
resourceInputs["rootRotationStatements"] = args ? args.rootRotationStatements : undefined;
|
|
95
99
|
resourceInputs["snowflake"] = args ? args.snowflake : undefined;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretBackendConnection.js","sourceRoot":"","sources":["../../database/secretBackendConnection.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;
|
|
1
|
+
{"version":3,"file":"secretBackendConnection.js","sourceRoot":"","sources":["../../database/secretBackendConnection.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA8BG;AACH,MAAa,uBAAwB,SAAQ,MAAM,CAAC,cAAc;IA8I9D,YAAY,IAAY,EAAE,WAAwE,EAAE,IAAmC;QACnI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAuD,CAAC;YACtE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;SACnF;aAAM;YACH,MAAM,IAAI,GAAG,WAAsD,CAAC;YACpE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;SACjF;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,uBAAuB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC5E,CAAC;IA5MD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAoC,EAAE,IAAmC;QAClI,OAAO,IAAI,uBAAuB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC9E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,uBAAuB,CAAC,YAAY,CAAC;IACxE,CAAC;;AA1BL,0DA8MC;AAhMG,gBAAgB;AACO,oCAAY,GAAG,gEAAgE,CAAC"}
|
|
@@ -79,6 +79,13 @@ export declare class SecretBackendRole extends pulumi.CustomResource {
|
|
|
79
79
|
* A unique name to give the role.
|
|
80
80
|
*/
|
|
81
81
|
readonly name: pulumi.Output<string>;
|
|
82
|
+
/**
|
|
83
|
+
* The namespace to provision the resource in.
|
|
84
|
+
* The value should not contain leading or trailing forward slashes.
|
|
85
|
+
* The `namespace` is always relative to the provider's configured namespace.
|
|
86
|
+
* *Available only for Vault Enterprise*.
|
|
87
|
+
*/
|
|
88
|
+
readonly namespace: pulumi.Output<string | undefined>;
|
|
82
89
|
/**
|
|
83
90
|
* The database statements to execute when
|
|
84
91
|
* renewing a user.
|
|
@@ -135,6 +142,13 @@ export interface SecretBackendRoleState {
|
|
|
135
142
|
* A unique name to give the role.
|
|
136
143
|
*/
|
|
137
144
|
name?: pulumi.Input<string>;
|
|
145
|
+
/**
|
|
146
|
+
* The namespace to provision the resource in.
|
|
147
|
+
* The value should not contain leading or trailing forward slashes.
|
|
148
|
+
* The `namespace` is always relative to the provider's configured namespace.
|
|
149
|
+
* *Available only for Vault Enterprise*.
|
|
150
|
+
*/
|
|
151
|
+
namespace?: pulumi.Input<string>;
|
|
138
152
|
/**
|
|
139
153
|
* The database statements to execute when
|
|
140
154
|
* renewing a user.
|
|
@@ -183,6 +197,13 @@ export interface SecretBackendRoleArgs {
|
|
|
183
197
|
* A unique name to give the role.
|
|
184
198
|
*/
|
|
185
199
|
name?: pulumi.Input<string>;
|
|
200
|
+
/**
|
|
201
|
+
* The namespace to provision the resource in.
|
|
202
|
+
* The value should not contain leading or trailing forward slashes.
|
|
203
|
+
* The `namespace` is always relative to the provider's configured namespace.
|
|
204
|
+
* *Available only for Vault Enterprise*.
|
|
205
|
+
*/
|
|
206
|
+
namespace?: pulumi.Input<string>;
|
|
186
207
|
/**
|
|
187
208
|
* The database statements to execute when
|
|
188
209
|
* renewing a user.
|