@pulumi/vault 5.7.0 → 5.7.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/kubernetes/getServiceAccountToken.d.ts +110 -0
- package/kubernetes/getServiceAccountToken.js +40 -0
- package/kubernetes/getServiceAccountToken.js.map +1 -1
- package/kv/getSecretSubkeysV2.d.ts +90 -0
- package/kv/getSecretSubkeysV2.js +31 -0
- package/kv/getSecretSubkeysV2.js.map +1 -1
- package/package.json +2 -2
- package/package.json.dev +2 -2
- package/provider.js +1 -1
- package/provider.js.map +1 -1
|
@@ -1,14 +1,80 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
/**
|
|
3
|
+
* ## Example Usage
|
|
4
|
+
*
|
|
5
|
+
* ```typescript
|
|
6
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
7
|
+
* import * as fs from "fs";
|
|
8
|
+
* import * as vault from "@pulumi/vault";
|
|
9
|
+
*
|
|
10
|
+
* const config = new vault.kubernetes.SecretBackend("config", {
|
|
11
|
+
* path: "kubernetes",
|
|
12
|
+
* description: "kubernetes secrets engine description",
|
|
13
|
+
* kubernetesHost: "https://127.0.0.1:61233",
|
|
14
|
+
* kubernetesCaCert: fs.readFileSync("/path/to/cert"),
|
|
15
|
+
* serviceAccountJwt: fs.readFileSync("/path/to/token"),
|
|
16
|
+
* disableLocalCaJwt: false,
|
|
17
|
+
* });
|
|
18
|
+
* const role = new vault.kubernetes.SecretBackendRole("role", {
|
|
19
|
+
* backend: config.path,
|
|
20
|
+
* allowedKubernetesNamespaces: ["*"],
|
|
21
|
+
* tokenMaxTtl: 43200,
|
|
22
|
+
* tokenDefaultTtl: 21600,
|
|
23
|
+
* serviceAccountName: "test-service-account-with-generated-token",
|
|
24
|
+
* extraLabels: {
|
|
25
|
+
* id: "abc123",
|
|
26
|
+
* name: "some_name",
|
|
27
|
+
* },
|
|
28
|
+
* extraAnnotations: {
|
|
29
|
+
* env: "development",
|
|
30
|
+
* location: "earth",
|
|
31
|
+
* },
|
|
32
|
+
* });
|
|
33
|
+
* const token = vault.kubernetes.getServiceAccountTokenOutput({
|
|
34
|
+
* backend: config.path,
|
|
35
|
+
* role: role.name,
|
|
36
|
+
* kubernetesNamespace: "test",
|
|
37
|
+
* clusterRoleBinding: false,
|
|
38
|
+
* ttl: "1h",
|
|
39
|
+
* });
|
|
40
|
+
* ```
|
|
41
|
+
*/
|
|
2
42
|
export declare function getServiceAccountToken(args: GetServiceAccountTokenArgs, opts?: pulumi.InvokeOptions): Promise<GetServiceAccountTokenResult>;
|
|
3
43
|
/**
|
|
4
44
|
* A collection of arguments for invoking getServiceAccountToken.
|
|
5
45
|
*/
|
|
6
46
|
export interface GetServiceAccountTokenArgs {
|
|
47
|
+
/**
|
|
48
|
+
* The Kubernetes secret backend to generate service account
|
|
49
|
+
* tokens from.
|
|
50
|
+
*/
|
|
7
51
|
backend: string;
|
|
52
|
+
/**
|
|
53
|
+
* If true, generate a ClusterRoleBinding to grant
|
|
54
|
+
* permissions across the whole cluster instead of within a namespace.
|
|
55
|
+
*/
|
|
8
56
|
clusterRoleBinding?: boolean;
|
|
57
|
+
/**
|
|
58
|
+
* The name of the Kubernetes namespace in which to
|
|
59
|
+
* generate the credentials.
|
|
60
|
+
*/
|
|
9
61
|
kubernetesNamespace: string;
|
|
62
|
+
/**
|
|
63
|
+
* The namespace of the target resource.
|
|
64
|
+
* The value should not contain leading or trailing forward slashes.
|
|
65
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
66
|
+
* *Available only for Vault Enterprise*.
|
|
67
|
+
*/
|
|
10
68
|
namespace?: string;
|
|
69
|
+
/**
|
|
70
|
+
* The name of the Kubernetes secret backend role to generate service
|
|
71
|
+
* account tokens from.
|
|
72
|
+
*/
|
|
11
73
|
role: string;
|
|
74
|
+
/**
|
|
75
|
+
* The TTL of the generated Kubernetes service account token, specified in
|
|
76
|
+
* seconds or as a Go duration format string.
|
|
77
|
+
*/
|
|
12
78
|
ttl?: string;
|
|
13
79
|
}
|
|
14
80
|
/**
|
|
@@ -22,13 +88,31 @@ export interface GetServiceAccountTokenResult {
|
|
|
22
88
|
*/
|
|
23
89
|
readonly id: string;
|
|
24
90
|
readonly kubernetesNamespace: string;
|
|
91
|
+
/**
|
|
92
|
+
* The duration of the lease in seconds.
|
|
93
|
+
*/
|
|
25
94
|
readonly leaseDuration: number;
|
|
95
|
+
/**
|
|
96
|
+
* The lease identifier assigned by Vault.
|
|
97
|
+
*/
|
|
26
98
|
readonly leaseId: string;
|
|
99
|
+
/**
|
|
100
|
+
* True if the duration of this lease can be extended through renewal.
|
|
101
|
+
*/
|
|
27
102
|
readonly leaseRenewable: boolean;
|
|
28
103
|
readonly namespace?: string;
|
|
29
104
|
readonly role: string;
|
|
105
|
+
/**
|
|
106
|
+
* The name of the service account associated with the token.
|
|
107
|
+
*/
|
|
30
108
|
readonly serviceAccountName: string;
|
|
109
|
+
/**
|
|
110
|
+
* The Kubernetes namespace that the service account resides in.
|
|
111
|
+
*/
|
|
31
112
|
readonly serviceAccountNamespace: string;
|
|
113
|
+
/**
|
|
114
|
+
* The Kubernetes service account token.
|
|
115
|
+
*/
|
|
32
116
|
readonly serviceAccountToken: string;
|
|
33
117
|
readonly ttl?: string;
|
|
34
118
|
}
|
|
@@ -37,10 +121,36 @@ export declare function getServiceAccountTokenOutput(args: GetServiceAccountToke
|
|
|
37
121
|
* A collection of arguments for invoking getServiceAccountToken.
|
|
38
122
|
*/
|
|
39
123
|
export interface GetServiceAccountTokenOutputArgs {
|
|
124
|
+
/**
|
|
125
|
+
* The Kubernetes secret backend to generate service account
|
|
126
|
+
* tokens from.
|
|
127
|
+
*/
|
|
40
128
|
backend: pulumi.Input<string>;
|
|
129
|
+
/**
|
|
130
|
+
* If true, generate a ClusterRoleBinding to grant
|
|
131
|
+
* permissions across the whole cluster instead of within a namespace.
|
|
132
|
+
*/
|
|
41
133
|
clusterRoleBinding?: pulumi.Input<boolean>;
|
|
134
|
+
/**
|
|
135
|
+
* The name of the Kubernetes namespace in which to
|
|
136
|
+
* generate the credentials.
|
|
137
|
+
*/
|
|
42
138
|
kubernetesNamespace: pulumi.Input<string>;
|
|
139
|
+
/**
|
|
140
|
+
* The namespace of the target resource.
|
|
141
|
+
* The value should not contain leading or trailing forward slashes.
|
|
142
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
143
|
+
* *Available only for Vault Enterprise*.
|
|
144
|
+
*/
|
|
43
145
|
namespace?: pulumi.Input<string>;
|
|
146
|
+
/**
|
|
147
|
+
* The name of the Kubernetes secret backend role to generate service
|
|
148
|
+
* account tokens from.
|
|
149
|
+
*/
|
|
44
150
|
role: pulumi.Input<string>;
|
|
151
|
+
/**
|
|
152
|
+
* The TTL of the generated Kubernetes service account token, specified in
|
|
153
|
+
* seconds or as a Go duration format string.
|
|
154
|
+
*/
|
|
45
155
|
ttl?: pulumi.Input<string>;
|
|
46
156
|
}
|
|
@@ -5,6 +5,46 @@ Object.defineProperty(exports, "__esModule", { value: true });
|
|
|
5
5
|
exports.getServiceAccountTokenOutput = exports.getServiceAccountToken = void 0;
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("../utilities");
|
|
8
|
+
/**
|
|
9
|
+
* ## Example Usage
|
|
10
|
+
*
|
|
11
|
+
* ```typescript
|
|
12
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
13
|
+
* import * as fs from "fs";
|
|
14
|
+
* import * as vault from "@pulumi/vault";
|
|
15
|
+
*
|
|
16
|
+
* const config = new vault.kubernetes.SecretBackend("config", {
|
|
17
|
+
* path: "kubernetes",
|
|
18
|
+
* description: "kubernetes secrets engine description",
|
|
19
|
+
* kubernetesHost: "https://127.0.0.1:61233",
|
|
20
|
+
* kubernetesCaCert: fs.readFileSync("/path/to/cert"),
|
|
21
|
+
* serviceAccountJwt: fs.readFileSync("/path/to/token"),
|
|
22
|
+
* disableLocalCaJwt: false,
|
|
23
|
+
* });
|
|
24
|
+
* const role = new vault.kubernetes.SecretBackendRole("role", {
|
|
25
|
+
* backend: config.path,
|
|
26
|
+
* allowedKubernetesNamespaces: ["*"],
|
|
27
|
+
* tokenMaxTtl: 43200,
|
|
28
|
+
* tokenDefaultTtl: 21600,
|
|
29
|
+
* serviceAccountName: "test-service-account-with-generated-token",
|
|
30
|
+
* extraLabels: {
|
|
31
|
+
* id: "abc123",
|
|
32
|
+
* name: "some_name",
|
|
33
|
+
* },
|
|
34
|
+
* extraAnnotations: {
|
|
35
|
+
* env: "development",
|
|
36
|
+
* location: "earth",
|
|
37
|
+
* },
|
|
38
|
+
* });
|
|
39
|
+
* const token = vault.kubernetes.getServiceAccountTokenOutput({
|
|
40
|
+
* backend: config.path,
|
|
41
|
+
* role: role.name,
|
|
42
|
+
* kubernetesNamespace: "test",
|
|
43
|
+
* clusterRoleBinding: false,
|
|
44
|
+
* ttl: "1h",
|
|
45
|
+
* });
|
|
46
|
+
* ```
|
|
47
|
+
*/
|
|
8
48
|
function getServiceAccountToken(args, opts) {
|
|
9
49
|
if (!opts) {
|
|
10
50
|
opts = {};
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getServiceAccountToken.js","sourceRoot":"","sources":["../../kubernetes/getServiceAccountToken.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,SAAgB,sBAAsB,CAAC,IAAgC,EAAE,IAA2B;IAChG,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,gEAAgE,EAAE;QAC3F,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,oBAAoB,EAAE,IAAI,CAAC,kBAAkB;QAC7C,qBAAqB,EAAE,IAAI,CAAC,mBAAmB;QAC/C,WAAW,EAAE,IAAI,CAAC,SAAS;QAC3B,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,KAAK,EAAE,IAAI,CAAC,GAAG;KAClB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAdD,wDAcC;
|
|
1
|
+
{"version":3,"file":"getServiceAccountToken.js","sourceRoot":"","sources":["../../kubernetes/getServiceAccountToken.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAuCG;AACH,SAAgB,sBAAsB,CAAC,IAAgC,EAAE,IAA2B;IAChG,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,gEAAgE,EAAE;QAC3F,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,oBAAoB,EAAE,IAAI,CAAC,kBAAkB;QAC7C,qBAAqB,EAAE,IAAI,CAAC,mBAAmB;QAC/C,WAAW,EAAE,IAAI,CAAC,SAAS;QAC3B,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,KAAK,EAAE,IAAI,CAAC,GAAG;KAClB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAdD,wDAcC;AAgFD,SAAgB,4BAA4B,CAAC,IAAsC,EAAE,IAA2B;IAC5G,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,sBAAsB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AAC1E,CAAC;AAFD,oEAEC"}
|
|
@@ -1,22 +1,84 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
/**
|
|
3
|
+
* ## Example Usage
|
|
4
|
+
*
|
|
5
|
+
* ```typescript
|
|
6
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
7
|
+
* import * as vault from "@pulumi/vault";
|
|
8
|
+
*
|
|
9
|
+
* const kvv2 = new vault.Mount("kvv2", {
|
|
10
|
+
* path: "kvv2",
|
|
11
|
+
* type: "kv",
|
|
12
|
+
* options: {
|
|
13
|
+
* version: "2",
|
|
14
|
+
* },
|
|
15
|
+
* description: "KV Version 2 secret engine mount",
|
|
16
|
+
* });
|
|
17
|
+
* const awsSecret = new vault.kv.SecretV2("awsSecret", {
|
|
18
|
+
* mount: kvv2.path,
|
|
19
|
+
* dataJson: JSON.stringify({
|
|
20
|
+
* zip: "zap",
|
|
21
|
+
* foo: "bar",
|
|
22
|
+
* }),
|
|
23
|
+
* });
|
|
24
|
+
* const test = vault.kv.getSecretSubkeysV2Output({
|
|
25
|
+
* mount: kvv2.path,
|
|
26
|
+
* name: awsSecret.name,
|
|
27
|
+
* });
|
|
28
|
+
* ```
|
|
29
|
+
* ## Required Vault Capabilities
|
|
30
|
+
*
|
|
31
|
+
* Use of this resource requires the `read` capability on the given path.
|
|
32
|
+
*/
|
|
2
33
|
export declare function getSecretSubkeysV2(args: GetSecretSubkeysV2Args, opts?: pulumi.InvokeOptions): Promise<GetSecretSubkeysV2Result>;
|
|
3
34
|
/**
|
|
4
35
|
* A collection of arguments for invoking getSecretSubkeysV2.
|
|
5
36
|
*/
|
|
6
37
|
export interface GetSecretSubkeysV2Args {
|
|
38
|
+
/**
|
|
39
|
+
* Specifies the deepest nesting level to provide in the output.
|
|
40
|
+
* If non-zero, keys that reside at the specified depth value will be
|
|
41
|
+
* artificially treated as leaves and will thus be `null` even if further
|
|
42
|
+
* underlying sub-keys exist.
|
|
43
|
+
*/
|
|
7
44
|
depth?: number;
|
|
45
|
+
/**
|
|
46
|
+
* Path where KV-V2 engine is mounted.
|
|
47
|
+
*/
|
|
8
48
|
mount: string;
|
|
49
|
+
/**
|
|
50
|
+
* Full name of the secret. For a nested secret
|
|
51
|
+
* the name is the nested path excluding the mount and data
|
|
52
|
+
* prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
|
|
53
|
+
* the name is `foo/bar/baz`.
|
|
54
|
+
*/
|
|
9
55
|
name: string;
|
|
56
|
+
/**
|
|
57
|
+
* The namespace of the target resource.
|
|
58
|
+
* The value should not contain leading or trailing forward slashes.
|
|
59
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
60
|
+
* *Available only for Vault Enterprise*.
|
|
61
|
+
*/
|
|
10
62
|
namespace?: string;
|
|
63
|
+
/**
|
|
64
|
+
* Specifies the version to return. If not
|
|
65
|
+
* set the latest version is returned.
|
|
66
|
+
*/
|
|
11
67
|
version?: number;
|
|
12
68
|
}
|
|
13
69
|
/**
|
|
14
70
|
* A collection of values returned by getSecretSubkeysV2.
|
|
15
71
|
*/
|
|
16
72
|
export interface GetSecretSubkeysV2Result {
|
|
73
|
+
/**
|
|
74
|
+
* Subkeys for the KV-V2 secret stored as a serialized map of strings.
|
|
75
|
+
*/
|
|
17
76
|
readonly data: {
|
|
18
77
|
[key: string]: any;
|
|
19
78
|
};
|
|
79
|
+
/**
|
|
80
|
+
* Subkeys for the KV-V2 secret read from Vault.
|
|
81
|
+
*/
|
|
20
82
|
readonly dataJson: string;
|
|
21
83
|
readonly depth?: number;
|
|
22
84
|
/**
|
|
@@ -26,6 +88,9 @@ export interface GetSecretSubkeysV2Result {
|
|
|
26
88
|
readonly mount: string;
|
|
27
89
|
readonly name: string;
|
|
28
90
|
readonly namespace?: string;
|
|
91
|
+
/**
|
|
92
|
+
* Full path where the KV-V2 secrets are listed.
|
|
93
|
+
*/
|
|
29
94
|
readonly path: string;
|
|
30
95
|
readonly version?: number;
|
|
31
96
|
}
|
|
@@ -34,9 +99,34 @@ export declare function getSecretSubkeysV2Output(args: GetSecretSubkeysV2OutputA
|
|
|
34
99
|
* A collection of arguments for invoking getSecretSubkeysV2.
|
|
35
100
|
*/
|
|
36
101
|
export interface GetSecretSubkeysV2OutputArgs {
|
|
102
|
+
/**
|
|
103
|
+
* Specifies the deepest nesting level to provide in the output.
|
|
104
|
+
* If non-zero, keys that reside at the specified depth value will be
|
|
105
|
+
* artificially treated as leaves and will thus be `null` even if further
|
|
106
|
+
* underlying sub-keys exist.
|
|
107
|
+
*/
|
|
37
108
|
depth?: pulumi.Input<number>;
|
|
109
|
+
/**
|
|
110
|
+
* Path where KV-V2 engine is mounted.
|
|
111
|
+
*/
|
|
38
112
|
mount: pulumi.Input<string>;
|
|
113
|
+
/**
|
|
114
|
+
* Full name of the secret. For a nested secret
|
|
115
|
+
* the name is the nested path excluding the mount and data
|
|
116
|
+
* prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
|
|
117
|
+
* the name is `foo/bar/baz`.
|
|
118
|
+
*/
|
|
39
119
|
name: pulumi.Input<string>;
|
|
120
|
+
/**
|
|
121
|
+
* The namespace of the target resource.
|
|
122
|
+
* The value should not contain leading or trailing forward slashes.
|
|
123
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
|
|
124
|
+
* *Available only for Vault Enterprise*.
|
|
125
|
+
*/
|
|
40
126
|
namespace?: pulumi.Input<string>;
|
|
127
|
+
/**
|
|
128
|
+
* Specifies the version to return. If not
|
|
129
|
+
* set the latest version is returned.
|
|
130
|
+
*/
|
|
41
131
|
version?: pulumi.Input<number>;
|
|
42
132
|
}
|
package/kv/getSecretSubkeysV2.js
CHANGED
|
@@ -5,6 +5,37 @@ Object.defineProperty(exports, "__esModule", { value: true });
|
|
|
5
5
|
exports.getSecretSubkeysV2Output = exports.getSecretSubkeysV2 = void 0;
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("../utilities");
|
|
8
|
+
/**
|
|
9
|
+
* ## Example Usage
|
|
10
|
+
*
|
|
11
|
+
* ```typescript
|
|
12
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
13
|
+
* import * as vault from "@pulumi/vault";
|
|
14
|
+
*
|
|
15
|
+
* const kvv2 = new vault.Mount("kvv2", {
|
|
16
|
+
* path: "kvv2",
|
|
17
|
+
* type: "kv",
|
|
18
|
+
* options: {
|
|
19
|
+
* version: "2",
|
|
20
|
+
* },
|
|
21
|
+
* description: "KV Version 2 secret engine mount",
|
|
22
|
+
* });
|
|
23
|
+
* const awsSecret = new vault.kv.SecretV2("awsSecret", {
|
|
24
|
+
* mount: kvv2.path,
|
|
25
|
+
* dataJson: JSON.stringify({
|
|
26
|
+
* zip: "zap",
|
|
27
|
+
* foo: "bar",
|
|
28
|
+
* }),
|
|
29
|
+
* });
|
|
30
|
+
* const test = vault.kv.getSecretSubkeysV2Output({
|
|
31
|
+
* mount: kvv2.path,
|
|
32
|
+
* name: awsSecret.name,
|
|
33
|
+
* });
|
|
34
|
+
* ```
|
|
35
|
+
* ## Required Vault Capabilities
|
|
36
|
+
*
|
|
37
|
+
* Use of this resource requires the `read` capability on the given path.
|
|
38
|
+
*/
|
|
8
39
|
function getSecretSubkeysV2(args, opts) {
|
|
9
40
|
if (!opts) {
|
|
10
41
|
opts = {};
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getSecretSubkeysV2.js","sourceRoot":"","sources":["../../kv/getSecretSubkeysV2.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,SAAgB,kBAAkB,CAAC,IAA4B,EAAE,IAA2B;IACxF,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,gDAAgD,EAAE;QAC3E,OAAO,EAAE,IAAI,CAAC,KAAK;QACnB,OAAO,EAAE,IAAI,CAAC,KAAK;QACnB,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,WAAW,EAAE,IAAI,CAAC,SAAS;QAC3B,SAAS,EAAE,IAAI,CAAC,OAAO;KAC1B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAbD,gDAaC;
|
|
1
|
+
{"version":3,"file":"getSecretSubkeysV2.js","sourceRoot":"","sources":["../../kv/getSecretSubkeysV2.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA8BG;AACH,SAAgB,kBAAkB,CAAC,IAA4B,EAAE,IAA2B;IACxF,IAAI,CAAC,IAAI,EAAE;QACP,IAAI,GAAG,EAAE,CAAA;KACZ;IAED,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;IACnE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,gDAAgD,EAAE;QAC3E,OAAO,EAAE,IAAI,CAAC,KAAK;QACnB,OAAO,EAAE,IAAI,CAAC,KAAK;QACnB,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,WAAW,EAAE,IAAI,CAAC,SAAS;QAC3B,SAAS,EAAE,IAAI,CAAC,OAAO;KAC1B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAbD,gDAaC;AAiED,SAAgB,wBAAwB,CAAC,IAAkC,EAAE,IAA2B;IACpG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE,CAAC,kBAAkB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACtE,CAAC;AAFD,4DAEC"}
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@pulumi/vault",
|
|
3
|
-
"version": "v5.7.
|
|
3
|
+
"version": "v5.7.1",
|
|
4
4
|
"description": "A Pulumi package for creating and managing vault cloud resources.",
|
|
5
5
|
"keywords": [
|
|
6
6
|
"pulumi",
|
|
@@ -11,7 +11,7 @@
|
|
|
11
11
|
"license": "Apache-2.0",
|
|
12
12
|
"scripts": {
|
|
13
13
|
"build": "tsc",
|
|
14
|
-
"install": "node scripts/install-pulumi-plugin.js resource vault v5.7.
|
|
14
|
+
"install": "node scripts/install-pulumi-plugin.js resource vault v5.7.1"
|
|
15
15
|
},
|
|
16
16
|
"dependencies": {
|
|
17
17
|
"@pulumi/pulumi": "^3.0.0"
|
package/package.json.dev
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@pulumi/vault",
|
|
3
|
-
"version": "v5.7.
|
|
3
|
+
"version": "v5.7.1",
|
|
4
4
|
"description": "A Pulumi package for creating and managing vault cloud resources.",
|
|
5
5
|
"keywords": [
|
|
6
6
|
"pulumi",
|
|
@@ -11,7 +11,7 @@
|
|
|
11
11
|
"license": "Apache-2.0",
|
|
12
12
|
"scripts": {
|
|
13
13
|
"build": "tsc",
|
|
14
|
-
"install": "node scripts/install-pulumi-plugin.js resource vault v5.7.
|
|
14
|
+
"install": "node scripts/install-pulumi-plugin.js resource vault v5.7.1"
|
|
15
15
|
},
|
|
16
16
|
"dependencies": {
|
|
17
17
|
"@pulumi/pulumi": "^3.0.0"
|
package/provider.js
CHANGED
|
@@ -46,7 +46,7 @@ class Provider extends pulumi.ProviderResource {
|
|
|
46
46
|
resourceInputs["caCertDir"] = args ? args.caCertDir : undefined;
|
|
47
47
|
resourceInputs["caCertFile"] = args ? args.caCertFile : undefined;
|
|
48
48
|
resourceInputs["clientAuth"] = pulumi.output(args ? args.clientAuth : undefined).apply(JSON.stringify);
|
|
49
|
-
resourceInputs["headers"] = pulumi.output(
|
|
49
|
+
resourceInputs["headers"] = pulumi.output(args ? args.headers : undefined).apply(JSON.stringify);
|
|
50
50
|
resourceInputs["maxLeaseTtlSeconds"] = pulumi.output((_a = (args ? args.maxLeaseTtlSeconds : undefined)) !== null && _a !== void 0 ? _a : (utilities.getEnvNumber("TERRAFORM_VAULT_MAX_TTL") || 1200)).apply(JSON.stringify);
|
|
51
51
|
resourceInputs["maxRetries"] = pulumi.output((_b = (args ? args.maxRetries : undefined)) !== null && _b !== void 0 ? _b : (utilities.getEnvNumber("VAULT_MAX_RETRIES") || 2)).apply(JSON.stringify);
|
|
52
52
|
resourceInputs["maxRetriesCcc"] = pulumi.output(args ? args.maxRetriesCcc : undefined).apply(JSON.stringify);
|
package/provider.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"provider.js","sourceRoot":"","sources":["../provider.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;GAKG;AACH,MAAa,QAAS,SAAQ,MAAM,CAAC,gBAAgB;IAgDjD;;;;;;OAMG;IACH,YAAY,IAAY,EAAE,IAAkB,EAAE,IAA6B;;QACvE,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB;YACI,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,KAAK,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACrG,cAAc,CAAC,cAAc,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC3G,cAAc,CAAC,gBAAgB,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC/G,cAAc,CAAC,eAAe,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC7G,cAAc,CAAC,cAAc,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC3G,cAAc,CAAC,cAAc,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC3G,cAAc,CAAC,mBAAmB,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACrH,cAAc,CAAC,cAAc,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC3G,cAAc,CAAC,eAAe,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC7G,cAAc,CAAC,iBAAiB,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACjH,cAAc,CAAC,mBAAmB,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACrH,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,YAAY,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACvG,cAAc,CAAC,SAAS,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,
|
|
1
|
+
{"version":3,"file":"provider.js","sourceRoot":"","sources":["../provider.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;GAKG;AACH,MAAa,QAAS,SAAQ,MAAM,CAAC,gBAAgB;IAgDjD;;;;;;OAMG;IACH,YAAY,IAAY,EAAE,IAAkB,EAAE,IAA6B;;QACvE,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB;YACI,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,KAAK,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACrG,cAAc,CAAC,cAAc,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC3G,cAAc,CAAC,gBAAgB,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC/G,cAAc,CAAC,eAAe,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC7G,cAAc,CAAC,cAAc,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC3G,cAAc,CAAC,cAAc,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC3G,cAAc,CAAC,mBAAmB,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACrH,cAAc,CAAC,cAAc,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC3G,cAAc,CAAC,eAAe,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC7G,cAAc,CAAC,iBAAiB,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACjH,cAAc,CAAC,mBAAmB,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACrH,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,YAAY,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACvG,cAAc,CAAC,SAAS,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACjG,cAAc,CAAC,oBAAoB,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,MAAA,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC,mCAAI,CAAC,SAAS,CAAC,YAAY,CAAC,yBAAyB,CAAC,IAAI,IAAI,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YACxL,cAAc,CAAC,YAAY,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,MAAA,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC,mCAAI,CAAC,SAAS,CAAC,YAAY,CAAC,mBAAmB,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC/J,cAAc,CAAC,eAAe,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC7G,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,gBAAgB,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC/G,cAAc,CAAC,eAAe,CAAC,GAAG,MAAM,CAAC,MAAM,CAAC,MAAA,CAAC,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC,mCAAI,SAAS,CAAC,aAAa,CAAC,mBAAmB,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC;YAC/J,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;SACnE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,QAAQ,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC7D,CAAC;IA1FD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,QAAQ,CAAC,YAAY,CAAC;IACzD,CAAC;;AAbL,4BA+FC;AA9FG,gBAAgB;AACO,qBAAY,GAAG,OAAO,CAAC"}
|