@pulumi/vault 5.7.0 → 5.7.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,14 +1,80 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
+ /**
3
+ * ## Example Usage
4
+ *
5
+ * ```typescript
6
+ * import * as pulumi from "@pulumi/pulumi";
7
+ * import * as fs from "fs";
8
+ * import * as vault from "@pulumi/vault";
9
+ *
10
+ * const config = new vault.kubernetes.SecretBackend("config", {
11
+ * path: "kubernetes",
12
+ * description: "kubernetes secrets engine description",
13
+ * kubernetesHost: "https://127.0.0.1:61233",
14
+ * kubernetesCaCert: fs.readFileSync("/path/to/cert"),
15
+ * serviceAccountJwt: fs.readFileSync("/path/to/token"),
16
+ * disableLocalCaJwt: false,
17
+ * });
18
+ * const role = new vault.kubernetes.SecretBackendRole("role", {
19
+ * backend: config.path,
20
+ * allowedKubernetesNamespaces: ["*"],
21
+ * tokenMaxTtl: 43200,
22
+ * tokenDefaultTtl: 21600,
23
+ * serviceAccountName: "test-service-account-with-generated-token",
24
+ * extraLabels: {
25
+ * id: "abc123",
26
+ * name: "some_name",
27
+ * },
28
+ * extraAnnotations: {
29
+ * env: "development",
30
+ * location: "earth",
31
+ * },
32
+ * });
33
+ * const token = vault.kubernetes.getServiceAccountTokenOutput({
34
+ * backend: config.path,
35
+ * role: role.name,
36
+ * kubernetesNamespace: "test",
37
+ * clusterRoleBinding: false,
38
+ * ttl: "1h",
39
+ * });
40
+ * ```
41
+ */
2
42
  export declare function getServiceAccountToken(args: GetServiceAccountTokenArgs, opts?: pulumi.InvokeOptions): Promise<GetServiceAccountTokenResult>;
3
43
  /**
4
44
  * A collection of arguments for invoking getServiceAccountToken.
5
45
  */
6
46
  export interface GetServiceAccountTokenArgs {
47
+ /**
48
+ * The Kubernetes secret backend to generate service account
49
+ * tokens from.
50
+ */
7
51
  backend: string;
52
+ /**
53
+ * If true, generate a ClusterRoleBinding to grant
54
+ * permissions across the whole cluster instead of within a namespace.
55
+ */
8
56
  clusterRoleBinding?: boolean;
57
+ /**
58
+ * The name of the Kubernetes namespace in which to
59
+ * generate the credentials.
60
+ */
9
61
  kubernetesNamespace: string;
62
+ /**
63
+ * The namespace of the target resource.
64
+ * The value should not contain leading or trailing forward slashes.
65
+ * The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
66
+ * *Available only for Vault Enterprise*.
67
+ */
10
68
  namespace?: string;
69
+ /**
70
+ * The name of the Kubernetes secret backend role to generate service
71
+ * account tokens from.
72
+ */
11
73
  role: string;
74
+ /**
75
+ * The TTL of the generated Kubernetes service account token, specified in
76
+ * seconds or as a Go duration format string.
77
+ */
12
78
  ttl?: string;
13
79
  }
14
80
  /**
@@ -22,13 +88,31 @@ export interface GetServiceAccountTokenResult {
22
88
  */
23
89
  readonly id: string;
24
90
  readonly kubernetesNamespace: string;
91
+ /**
92
+ * The duration of the lease in seconds.
93
+ */
25
94
  readonly leaseDuration: number;
95
+ /**
96
+ * The lease identifier assigned by Vault.
97
+ */
26
98
  readonly leaseId: string;
99
+ /**
100
+ * True if the duration of this lease can be extended through renewal.
101
+ */
27
102
  readonly leaseRenewable: boolean;
28
103
  readonly namespace?: string;
29
104
  readonly role: string;
105
+ /**
106
+ * The name of the service account associated with the token.
107
+ */
30
108
  readonly serviceAccountName: string;
109
+ /**
110
+ * The Kubernetes namespace that the service account resides in.
111
+ */
31
112
  readonly serviceAccountNamespace: string;
113
+ /**
114
+ * The Kubernetes service account token.
115
+ */
32
116
  readonly serviceAccountToken: string;
33
117
  readonly ttl?: string;
34
118
  }
@@ -37,10 +121,36 @@ export declare function getServiceAccountTokenOutput(args: GetServiceAccountToke
37
121
  * A collection of arguments for invoking getServiceAccountToken.
38
122
  */
39
123
  export interface GetServiceAccountTokenOutputArgs {
124
+ /**
125
+ * The Kubernetes secret backend to generate service account
126
+ * tokens from.
127
+ */
40
128
  backend: pulumi.Input<string>;
129
+ /**
130
+ * If true, generate a ClusterRoleBinding to grant
131
+ * permissions across the whole cluster instead of within a namespace.
132
+ */
41
133
  clusterRoleBinding?: pulumi.Input<boolean>;
134
+ /**
135
+ * The name of the Kubernetes namespace in which to
136
+ * generate the credentials.
137
+ */
42
138
  kubernetesNamespace: pulumi.Input<string>;
139
+ /**
140
+ * The namespace of the target resource.
141
+ * The value should not contain leading or trailing forward slashes.
142
+ * The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
143
+ * *Available only for Vault Enterprise*.
144
+ */
43
145
  namespace?: pulumi.Input<string>;
146
+ /**
147
+ * The name of the Kubernetes secret backend role to generate service
148
+ * account tokens from.
149
+ */
44
150
  role: pulumi.Input<string>;
151
+ /**
152
+ * The TTL of the generated Kubernetes service account token, specified in
153
+ * seconds or as a Go duration format string.
154
+ */
45
155
  ttl?: pulumi.Input<string>;
46
156
  }
@@ -5,6 +5,46 @@ Object.defineProperty(exports, "__esModule", { value: true });
5
5
  exports.getServiceAccountTokenOutput = exports.getServiceAccountToken = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("../utilities");
8
+ /**
9
+ * ## Example Usage
10
+ *
11
+ * ```typescript
12
+ * import * as pulumi from "@pulumi/pulumi";
13
+ * import * as fs from "fs";
14
+ * import * as vault from "@pulumi/vault";
15
+ *
16
+ * const config = new vault.kubernetes.SecretBackend("config", {
17
+ * path: "kubernetes",
18
+ * description: "kubernetes secrets engine description",
19
+ * kubernetesHost: "https://127.0.0.1:61233",
20
+ * kubernetesCaCert: fs.readFileSync("/path/to/cert"),
21
+ * serviceAccountJwt: fs.readFileSync("/path/to/token"),
22
+ * disableLocalCaJwt: false,
23
+ * });
24
+ * const role = new vault.kubernetes.SecretBackendRole("role", {
25
+ * backend: config.path,
26
+ * allowedKubernetesNamespaces: ["*"],
27
+ * tokenMaxTtl: 43200,
28
+ * tokenDefaultTtl: 21600,
29
+ * serviceAccountName: "test-service-account-with-generated-token",
30
+ * extraLabels: {
31
+ * id: "abc123",
32
+ * name: "some_name",
33
+ * },
34
+ * extraAnnotations: {
35
+ * env: "development",
36
+ * location: "earth",
37
+ * },
38
+ * });
39
+ * const token = vault.kubernetes.getServiceAccountTokenOutput({
40
+ * backend: config.path,
41
+ * role: role.name,
42
+ * kubernetesNamespace: "test",
43
+ * clusterRoleBinding: false,
44
+ * ttl: "1h",
45
+ * });
46
+ * ```
47
+ */
8
48
  function getServiceAccountToken(args, opts) {
9
49
  if (!opts) {
10
50
  opts = {};
@@ -1 +1 @@
1
- {"version":3,"file":"getServiceAccountToken.js","sourceRoot":"","sources":["../../kubernetes/getServiceAccountToken.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,SAAgB,sBAAsB,CAAC,IAAgC,EAAE,IAA2B;IAChG,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,gEAAgE,EAAE;QAC3F,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,oBAAoB,EAAE,IAAI,CAAC,kBAAkB;QAC7C,qBAAqB,EAAE,IAAI,CAAC,mBAAmB;QAC/C,WAAW,EAAE,IAAI,CAAC,SAAS;QAC3B,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,KAAK,EAAE,IAAI,CAAC,GAAG;KAClB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAdD,wDAcC;AAoCD,SAAgB,4BAA4B,CAAC,IAAsC,EAAE,IAA2B;IAC5G,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,sBAAsB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AAC1E,CAAC;AAFD,oEAEC"}
1
+ {"version":3,"file":"getServiceAccountToken.js","sourceRoot":"","sources":["../../kubernetes/getServiceAccountToken.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAuCG;AACH,SAAgB,sBAAsB,CAAC,IAAgC,EAAE,IAA2B;IAChG,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,gEAAgE,EAAE;QAC3F,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,oBAAoB,EAAE,IAAI,CAAC,kBAAkB;QAC7C,qBAAqB,EAAE,IAAI,CAAC,mBAAmB;QAC/C,WAAW,EAAE,IAAI,CAAC,SAAS;QAC3B,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,KAAK,EAAE,IAAI,CAAC,GAAG;KAClB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAdD,wDAcC;AAgFD,SAAgB,4BAA4B,CAAC,IAAsC,EAAE,IAA2B;IAC5G,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,sBAAsB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AAC1E,CAAC;AAFD,oEAEC"}
@@ -1,22 +1,84 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
+ /**
3
+ * ## Example Usage
4
+ *
5
+ * ```typescript
6
+ * import * as pulumi from "@pulumi/pulumi";
7
+ * import * as vault from "@pulumi/vault";
8
+ *
9
+ * const kvv2 = new vault.Mount("kvv2", {
10
+ * path: "kvv2",
11
+ * type: "kv",
12
+ * options: {
13
+ * version: "2",
14
+ * },
15
+ * description: "KV Version 2 secret engine mount",
16
+ * });
17
+ * const awsSecret = new vault.kv.SecretV2("awsSecret", {
18
+ * mount: kvv2.path,
19
+ * dataJson: JSON.stringify({
20
+ * zip: "zap",
21
+ * foo: "bar",
22
+ * }),
23
+ * });
24
+ * const test = vault.kv.getSecretSubkeysV2Output({
25
+ * mount: kvv2.path,
26
+ * name: awsSecret.name,
27
+ * });
28
+ * ```
29
+ * ## Required Vault Capabilities
30
+ *
31
+ * Use of this resource requires the `read` capability on the given path.
32
+ */
2
33
  export declare function getSecretSubkeysV2(args: GetSecretSubkeysV2Args, opts?: pulumi.InvokeOptions): Promise<GetSecretSubkeysV2Result>;
3
34
  /**
4
35
  * A collection of arguments for invoking getSecretSubkeysV2.
5
36
  */
6
37
  export interface GetSecretSubkeysV2Args {
38
+ /**
39
+ * Specifies the deepest nesting level to provide in the output.
40
+ * If non-zero, keys that reside at the specified depth value will be
41
+ * artificially treated as leaves and will thus be `null` even if further
42
+ * underlying sub-keys exist.
43
+ */
7
44
  depth?: number;
45
+ /**
46
+ * Path where KV-V2 engine is mounted.
47
+ */
8
48
  mount: string;
49
+ /**
50
+ * Full name of the secret. For a nested secret
51
+ * the name is the nested path excluding the mount and data
52
+ * prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
53
+ * the name is `foo/bar/baz`.
54
+ */
9
55
  name: string;
56
+ /**
57
+ * The namespace of the target resource.
58
+ * The value should not contain leading or trailing forward slashes.
59
+ * The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
60
+ * *Available only for Vault Enterprise*.
61
+ */
10
62
  namespace?: string;
63
+ /**
64
+ * Specifies the version to return. If not
65
+ * set the latest version is returned.
66
+ */
11
67
  version?: number;
12
68
  }
13
69
  /**
14
70
  * A collection of values returned by getSecretSubkeysV2.
15
71
  */
16
72
  export interface GetSecretSubkeysV2Result {
73
+ /**
74
+ * Subkeys for the KV-V2 secret stored as a serialized map of strings.
75
+ */
17
76
  readonly data: {
18
77
  [key: string]: any;
19
78
  };
79
+ /**
80
+ * Subkeys for the KV-V2 secret read from Vault.
81
+ */
20
82
  readonly dataJson: string;
21
83
  readonly depth?: number;
22
84
  /**
@@ -26,6 +88,9 @@ export interface GetSecretSubkeysV2Result {
26
88
  readonly mount: string;
27
89
  readonly name: string;
28
90
  readonly namespace?: string;
91
+ /**
92
+ * Full path where the KV-V2 secrets are listed.
93
+ */
29
94
  readonly path: string;
30
95
  readonly version?: number;
31
96
  }
@@ -34,9 +99,34 @@ export declare function getSecretSubkeysV2Output(args: GetSecretSubkeysV2OutputA
34
99
  * A collection of arguments for invoking getSecretSubkeysV2.
35
100
  */
36
101
  export interface GetSecretSubkeysV2OutputArgs {
102
+ /**
103
+ * Specifies the deepest nesting level to provide in the output.
104
+ * If non-zero, keys that reside at the specified depth value will be
105
+ * artificially treated as leaves and will thus be `null` even if further
106
+ * underlying sub-keys exist.
107
+ */
37
108
  depth?: pulumi.Input<number>;
109
+ /**
110
+ * Path where KV-V2 engine is mounted.
111
+ */
38
112
  mount: pulumi.Input<string>;
113
+ /**
114
+ * Full name of the secret. For a nested secret
115
+ * the name is the nested path excluding the mount and data
116
+ * prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
117
+ * the name is `foo/bar/baz`.
118
+ */
39
119
  name: pulumi.Input<string>;
120
+ /**
121
+ * The namespace of the target resource.
122
+ * The value should not contain leading or trailing forward slashes.
123
+ * The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
124
+ * *Available only for Vault Enterprise*.
125
+ */
40
126
  namespace?: pulumi.Input<string>;
127
+ /**
128
+ * Specifies the version to return. If not
129
+ * set the latest version is returned.
130
+ */
41
131
  version?: pulumi.Input<number>;
42
132
  }
@@ -5,6 +5,37 @@ Object.defineProperty(exports, "__esModule", { value: true });
5
5
  exports.getSecretSubkeysV2Output = exports.getSecretSubkeysV2 = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("../utilities");
8
+ /**
9
+ * ## Example Usage
10
+ *
11
+ * ```typescript
12
+ * import * as pulumi from "@pulumi/pulumi";
13
+ * import * as vault from "@pulumi/vault";
14
+ *
15
+ * const kvv2 = new vault.Mount("kvv2", {
16
+ * path: "kvv2",
17
+ * type: "kv",
18
+ * options: {
19
+ * version: "2",
20
+ * },
21
+ * description: "KV Version 2 secret engine mount",
22
+ * });
23
+ * const awsSecret = new vault.kv.SecretV2("awsSecret", {
24
+ * mount: kvv2.path,
25
+ * dataJson: JSON.stringify({
26
+ * zip: "zap",
27
+ * foo: "bar",
28
+ * }),
29
+ * });
30
+ * const test = vault.kv.getSecretSubkeysV2Output({
31
+ * mount: kvv2.path,
32
+ * name: awsSecret.name,
33
+ * });
34
+ * ```
35
+ * ## Required Vault Capabilities
36
+ *
37
+ * Use of this resource requires the `read` capability on the given path.
38
+ */
8
39
  function getSecretSubkeysV2(args, opts) {
9
40
  if (!opts) {
10
41
  opts = {};
@@ -1 +1 @@
1
- {"version":3,"file":"getSecretSubkeysV2.js","sourceRoot":"","sources":["../../kv/getSecretSubkeysV2.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,SAAgB,kBAAkB,CAAC,IAA4B,EAAE,IAA2B;IACxF,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,gDAAgD,EAAE;QAC3E,OAAO,EAAE,IAAI,CAAC,KAAK;QACnB,OAAO,EAAE,IAAI,CAAC,KAAK;QACnB,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,WAAW,EAAE,IAAI,CAAC,SAAS;QAC3B,SAAS,EAAE,IAAI,CAAC,OAAO;KAC1B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAbD,gDAaC;AA+BD,SAAgB,wBAAwB,CAAC,IAAkC,EAAE,IAA2B;IACpG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,kBAAkB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACtE,CAAC;AAFD,4DAEC"}
1
+ {"version":3,"file":"getSecretSubkeysV2.js","sourceRoot":"","sources":["../../kv/getSecretSubkeysV2.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA8BG;AACH,SAAgB,kBAAkB,CAAC,IAA4B,EAAE,IAA2B;IACxF,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,gDAAgD,EAAE;QAC3E,OAAO,EAAE,IAAI,CAAC,KAAK;QACnB,OAAO,EAAE,IAAI,CAAC,KAAK;QACnB,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,WAAW,EAAE,IAAI,CAAC,SAAS;QAC3B,SAAS,EAAE,IAAI,CAAC,OAAO;KAC1B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAbD,gDAaC;AAiED,SAAgB,wBAAwB,CAAC,IAAkC,EAAE,IAA2B;IACpG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,kBAAkB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACtE,CAAC;AAFD,4DAEC"}
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@pulumi/vault",
3
- "version": "v5.7.0",
3
+ "version": "v5.7.1",
4
4
  "description": "A Pulumi package for creating and managing vault cloud resources.",
5
5
  "keywords": [
6
6
  "pulumi",
@@ -11,7 +11,7 @@
11
11
  "license": "Apache-2.0",
12
12
  "scripts": {
13
13
  "build": "tsc",
14
- "install": "node scripts/install-pulumi-plugin.js resource vault v5.7.0"
14
+ "install": "node scripts/install-pulumi-plugin.js resource vault v5.7.1"
15
15
  },
16
16
  "dependencies": {
17
17
  "@pulumi/pulumi": "^3.0.0"
package/package.json.dev CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@pulumi/vault",
3
- "version": "v5.7.0",
3
+ "version": "v5.7.1",
4
4
  "description": "A Pulumi package for creating and managing vault cloud resources.",
5
5
  "keywords": [
6
6
  "pulumi",
@@ -11,7 +11,7 @@
11
11
  "license": "Apache-2.0",
12
12
  "scripts": {
13
13
  "build": "tsc",
14
- "install": "node scripts/install-pulumi-plugin.js resource vault v5.7.0"
14
+ "install": "node scripts/install-pulumi-plugin.js resource vault v5.7.1"
15
15
  },
16
16
  "dependencies": {
17
17
  "@pulumi/pulumi": "^3.0.0"
package/provider.js CHANGED
@@ -46,7 +46,7 @@ class Provider extends pulumi.ProviderResource {
46
46
  resourceInputs["caCertDir"] = args ? args.caCertDir : undefined;
47
47
  resourceInputs["caCertFile"] = args ? args.caCertFile : undefined;
48
48
  resourceInputs["clientAuth"] = pulumi.output(args ? args.clientAuth : undefined).apply(JSON.stringify);
49
- resourceInputs["headers"] = pulumi.output((args === null || args === void 0 ? void 0 : args.headers) ? pulumi.secret(args.headers) : undefined).apply(JSON.stringify);
49
+ resourceInputs["headers"] = pulumi.output(args ? args.headers : undefined).apply(JSON.stringify);
50
50
  resourceInputs["maxLeaseTtlSeconds"] = pulumi.output((_a = (args ? args.maxLeaseTtlSeconds : undefined)) !== null && _a !== void 0 ? _a : (utilities.getEnvNumber("TERRAFORM_VAULT_MAX_TTL") || 1200)).apply(JSON.stringify);
51
51
  resourceInputs["maxRetries"] = pulumi.output((_b = (args ? args.maxRetries : undefined)) !== null && _b !== void 0 ? _b : (utilities.getEnvNumber("VAULT_MAX_RETRIES") || 2)).apply(JSON.stringify);
52
52
  resourceInputs["maxRetriesCcc"] = pulumi.output(args ? args.maxRetriesCcc : undefined).apply(JSON.stringify);
package/provider.js.map CHANGED
@@ -1 +1 @@
1
- {"version":3,"file":"provider.js","sourceRoot":"","sources":["../provider.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;GAKG;AACH,MAAa,QAAS,SAAQ,MAAM,CAAC,gBAAgB;IAgDjD;;;;;;OAMG;IACH,YAAY,IAAY,EAAE,IAAkB,EAAE,IAA6B;;QACvE,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB;YACI,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,KAAK,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACrG,cAAc,CAAC,cAAc,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC3G,cAAc,CAAC,gBAAgB,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC/G,cAAc,CAAC,eAAe,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC7G,cAAc,CAAC,cAAc,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC3G,cAAc,CAAC,cAAc,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC3G,cAAc,CAAC,mBAAmB,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACrH,cAAc,CAAC,cAAc,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC3G,cAAc,CAAC,eAAe,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC7G,cAAc,CAAC,iBAAiB,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACjH,cAAc,CAAC,mBAAmB,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACrH,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,YAAY,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACvG,cAAc,CAAC,SAAS,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,OAAO,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACzH,cAAc,CAAC,oBAAoB,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,MAAA,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC,mCAAI,CAAC,SAAS,CAAC,YAAY,CAAC,yBAAyB,CAAC,IAAI,IAAI,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACxL,cAAc,CAAC,YAAY,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,MAAA,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC,mCAAI,CAAC,SAAS,CAAC,YAAY,CAAC,mBAAmB,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC/J,cAAc,CAAC,eAAe,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC7G,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,gBAAgB,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC/G,cAAc,CAAC,eAAe,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,MAAA,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC,mCAAI,SAAS,CAAC,aAAa,CAAC,mBAAmB,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC/J,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;SACnE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,QAAQ,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC7D,CAAC;IA1FD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,QAAQ,CAAC,YAAY,CAAC;IACzD,CAAC;;AAbL,4BA+FC;AA9FG,gBAAgB;AACO,qBAAY,GAAG,OAAO,CAAC"}
1
+ {"version":3,"file":"provider.js","sourceRoot":"","sources":["../provider.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;GAKG;AACH,MAAa,QAAS,SAAQ,MAAM,CAAC,gBAAgB;IAgDjD;;;;;;OAMG;IACH,YAAY,IAAY,EAAE,IAAkB,EAAE,IAA6B;;QACvE,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB;YACI,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,KAAK,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACrG,cAAc,CAAC,cAAc,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC3G,cAAc,CAAC,gBAAgB,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC/G,cAAc,CAAC,eAAe,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC7G,cAAc,CAAC,cAAc,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC3G,cAAc,CAAC,cAAc,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC3G,cAAc,CAAC,mBAAmB,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACrH,cAAc,CAAC,cAAc,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC3G,cAAc,CAAC,eAAe,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC7G,cAAc,CAAC,iBAAiB,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACjH,cAAc,CAAC,mBAAmB,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACrH,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,YAAY,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACvG,cAAc,CAAC,SAAS,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACjG,cAAc,CAAC,oBAAoB,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,MAAA,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC,mCAAI,CAAC,SAAS,CAAC,YAAY,CAAC,yBAAyB,CAAC,IAAI,IAAI,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACxL,cAAc,CAAC,YAAY,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,MAAA,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC,mCAAI,CAAC,SAAS,CAAC,YAAY,CAAC,mBAAmB,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC/J,cAAc,CAAC,eAAe,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC7G,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,gBAAgB,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC/G,cAAc,CAAC,eAAe,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,MAAA,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC,mCAAI,SAAS,CAAC,aAAa,CAAC,mBAAmB,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC/J,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;SACnE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,QAAQ,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC7D,CAAC;IA1FD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,QAAQ,CAAC,YAAY,CAAC;IACzD,CAAC;;AAbL,4BA+FC;AA9FG,gBAAgB;AACO,qBAAY,GAAG,OAAO,CAAC"}