@pulumi/vault 6.1.0 → 6.1.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/ad/secretBackend.d.ts +1 -3
- package/ad/secretBackend.js +1 -3
- package/ad/secretBackend.js.map +1 -1
- package/ad/secretLibrary.d.ts +1 -2
- package/ad/secretLibrary.js +1 -2
- package/ad/secretLibrary.js.map +1 -1
- package/ad/secretRole.d.ts +0 -2
- package/ad/secretRole.js +0 -2
- package/ad/secretRole.js.map +1 -1
- package/alicloud/authBackendRole.d.ts +30 -83
- package/alicloud/authBackendRole.js +3 -5
- package/alicloud/authBackendRole.js.map +1 -1
- package/approle/authBackendLogin.d.ts +0 -2
- package/approle/authBackendLogin.js +0 -2
- package/approle/authBackendLogin.js.map +1 -1
- package/approle/authBackendRole.d.ts +27 -80
- package/approle/authBackendRole.js +0 -2
- package/approle/authBackendRole.js.map +1 -1
- package/approle/authBackendRoleSecretId.d.ts +0 -2
- package/approle/authBackendRoleSecretId.js +0 -2
- package/approle/authBackendRoleSecretId.js.map +1 -1
- package/approle/getAuthBackendRoleId.d.ts +0 -4
- package/approle/getAuthBackendRoleId.js +0 -4
- package/approle/getAuthBackendRoleId.js.map +1 -1
- package/audit.d.ts +4 -8
- package/audit.js +4 -8
- package/audit.js.map +1 -1
- package/auditRequestHeader.d.ts +4 -3
- package/auditRequestHeader.js +4 -3
- package/auditRequestHeader.js.map +1 -1
- package/aws/authBackendClient.d.ts +3 -5
- package/aws/authBackendClient.js +3 -5
- package/aws/authBackendClient.js.map +1 -1
- package/aws/authBackendConfigIdentity.d.ts +0 -2
- package/aws/authBackendConfigIdentity.js +0 -2
- package/aws/authBackendConfigIdentity.js.map +1 -1
- package/aws/authBackendIdentityWhitelist.d.ts +3 -5
- package/aws/authBackendIdentityWhitelist.js +3 -5
- package/aws/authBackendIdentityWhitelist.js.map +1 -1
- package/aws/authBackendLogin.d.ts +0 -6
- package/aws/authBackendLogin.js.map +1 -1
- package/aws/authBackendRole.d.ts +27 -80
- package/aws/authBackendRole.js +0 -2
- package/aws/authBackendRole.js.map +1 -1
- package/aws/authBackendRoletagBlacklist.d.ts +3 -5
- package/aws/authBackendRoletagBlacklist.js +3 -5
- package/aws/authBackendRoletagBlacklist.js.map +1 -1
- package/aws/authBackendStsRole.d.ts +0 -2
- package/aws/authBackendStsRole.js +0 -2
- package/aws/authBackendStsRole.js.map +1 -1
- package/aws/secretBackend.d.ts +27 -0
- package/aws/secretBackend.js.map +1 -1
- package/aws/secretBackendRole.d.ts +1 -2
- package/aws/secretBackendRole.js +1 -2
- package/aws/secretBackendRole.js.map +1 -1
- package/aws/secretBackendStaticRole.d.ts +1 -2
- package/aws/secretBackendStaticRole.js +1 -2
- package/aws/secretBackendStaticRole.js.map +1 -1
- package/azure/authBackendConfig.d.ts +3 -5
- package/azure/authBackendConfig.js +3 -5
- package/azure/authBackendConfig.js.map +1 -1
- package/azure/authBackendRole.d.ts +27 -80
- package/azure/authBackendRole.js +0 -2
- package/azure/authBackendRole.js.map +1 -1
- package/azure/backend.d.ts +6 -10
- package/azure/backend.js +6 -10
- package/azure/backend.js.map +1 -1
- package/azure/backendRole.d.ts +7 -9
- package/azure/backendRole.js +7 -9
- package/azure/backendRole.js.map +1 -1
- package/azure/getAccessCredentials.d.ts +0 -4
- package/azure/getAccessCredentials.js +0 -4
- package/azure/getAccessCredentials.js.map +1 -1
- package/certAuthBackendRole.d.ts +35 -91
- package/certAuthBackendRole.js +8 -7
- package/certAuthBackendRole.js.map +1 -1
- package/consul/secretBackend.d.ts +4 -8
- package/consul/secretBackend.js +4 -8
- package/consul/secretBackend.js.map +1 -1
- package/consul/secretBackendRole.d.ts +1 -2
- package/consul/secretBackendRole.js +1 -2
- package/consul/secretBackendRole.js.map +1 -1
- package/database/secretBackendConnection.d.ts +1 -2
- package/database/secretBackendConnection.js +1 -2
- package/database/secretBackendConnection.js.map +1 -1
- package/database/secretBackendRole.d.ts +2 -2
- package/database/secretBackendRole.js +2 -2
- package/database/secretBackendStaticRole.d.ts +5 -4
- package/database/secretBackendStaticRole.js +5 -4
- package/database/secretBackendStaticRole.js.map +1 -1
- package/database/secretsMount.d.ts +2 -2
- package/database/secretsMount.js +2 -2
- package/egpPolicy.d.ts +2 -4
- package/egpPolicy.js +2 -4
- package/egpPolicy.js.map +1 -1
- package/gcp/authBackend.d.ts +0 -20
- package/gcp/authBackend.js +0 -20
- package/gcp/authBackend.js.map +1 -1
- package/gcp/authBackendRole.d.ts +27 -134
- package/gcp/authBackendRole.js +0 -2
- package/gcp/authBackendRole.js.map +1 -1
- package/gcp/getAuthBackendRole.d.ts +0 -4
- package/gcp/getAuthBackendRole.js +0 -4
- package/gcp/getAuthBackendRole.js.map +1 -1
- package/gcp/secretBackend.d.ts +4 -4
- package/gcp/secretBackend.js +4 -4
- package/gcp/secretImpersonatedAccount.d.ts +7 -7
- package/gcp/secretImpersonatedAccount.js +7 -7
- package/gcp/secretRoleset.d.ts +4 -4
- package/gcp/secretRoleset.js +4 -4
- package/gcp/secretStaticAccount.d.ts +8 -8
- package/gcp/secretStaticAccount.js +8 -8
- package/generic/endpoint.d.ts +2 -4
- package/generic/endpoint.js +2 -4
- package/generic/endpoint.js.map +1 -1
- package/generic/getSecret.d.ts +44 -4
- package/generic/getSecret.js +44 -4
- package/generic/getSecret.js.map +1 -1
- package/getAuthBackend.d.ts +0 -4
- package/getAuthBackend.js +0 -4
- package/getAuthBackend.js.map +1 -1
- package/getAuthBackends.d.ts +0 -8
- package/getAuthBackends.js +0 -8
- package/getAuthBackends.js.map +1 -1
- package/getNamespace.d.ts +0 -12
- package/getNamespace.js +0 -12
- package/getNamespace.js.map +1 -1
- package/getNamespaces.d.ts +4 -12
- package/getNamespaces.js +4 -12
- package/getNamespaces.js.map +1 -1
- package/getNomadAccessToken.d.ts +0 -4
- package/getNomadAccessToken.js +0 -4
- package/getNomadAccessToken.js.map +1 -1
- package/getPolicyDocument.d.ts +10 -8
- package/getPolicyDocument.js +10 -8
- package/getPolicyDocument.js.map +1 -1
- package/getRaftAutopilotState.d.ts +0 -4
- package/getRaftAutopilotState.js +0 -4
- package/getRaftAutopilotState.js.map +1 -1
- package/github/authBackend.d.ts +0 -2
- package/github/authBackend.js +0 -2
- package/github/authBackend.js.map +1 -1
- package/github/team.d.ts +1 -3
- package/github/team.js +1 -3
- package/github/team.js.map +1 -1
- package/github/user.d.ts +1 -3
- package/github/user.js +1 -3
- package/github/user.js.map +1 -1
- package/identity/entity.d.ts +2 -3
- package/identity/entity.js +2 -3
- package/identity/entity.js.map +1 -1
- package/identity/entityAlias.d.ts +2 -3
- package/identity/entityAlias.js +2 -3
- package/identity/entityAlias.js.map +1 -1
- package/identity/entityPolicies.d.ts +8 -6
- package/identity/entityPolicies.js +8 -6
- package/identity/entityPolicies.js.map +1 -1
- package/identity/getEntity.d.ts +0 -4
- package/identity/getEntity.js +0 -4
- package/identity/getEntity.js.map +1 -1
- package/identity/getGroup.d.ts +0 -4
- package/identity/getGroup.js +0 -4
- package/identity/getGroup.js.map +1 -1
- package/identity/getOidcClientCreds.d.ts +2 -4
- package/identity/getOidcClientCreds.js +2 -4
- package/identity/getOidcClientCreds.js.map +1 -1
- package/identity/getOidcOpenidConfig.d.ts +12 -6
- package/identity/getOidcOpenidConfig.js +12 -6
- package/identity/getOidcOpenidConfig.js.map +1 -1
- package/identity/getOidcPublicKeys.d.ts +12 -6
- package/identity/getOidcPublicKeys.js +12 -6
- package/identity/getOidcPublicKeys.js.map +1 -1
- package/identity/group.d.ts +18 -20
- package/identity/group.js +18 -20
- package/identity/group.js.map +1 -1
- package/identity/groupAlias.d.ts +1 -2
- package/identity/groupAlias.js +1 -2
- package/identity/groupAlias.js.map +1 -1
- package/identity/groupMemberEntityIds.d.ts +6 -8
- package/identity/groupMemberEntityIds.js +6 -8
- package/identity/groupMemberEntityIds.js.map +1 -1
- package/identity/groupMemberGroupIds.d.ts +14 -10
- package/identity/groupMemberGroupIds.js +14 -10
- package/identity/groupMemberGroupIds.js.map +1 -1
- package/identity/groupPolicies.d.ts +2 -4
- package/identity/groupPolicies.js +2 -4
- package/identity/groupPolicies.js.map +1 -1
- package/identity/mfaDuo.d.ts +1 -3
- package/identity/mfaDuo.js +1 -3
- package/identity/mfaDuo.js.map +1 -1
- package/identity/mfaLoginEnforcement.d.ts +5 -4
- package/identity/mfaLoginEnforcement.js +5 -4
- package/identity/mfaLoginEnforcement.js.map +1 -1
- package/identity/mfaOkta.d.ts +1 -3
- package/identity/mfaOkta.js +1 -3
- package/identity/mfaOkta.js.map +1 -1
- package/identity/mfaPingid.d.ts +0 -2
- package/identity/mfaPingid.js +0 -2
- package/identity/mfaPingid.js.map +1 -1
- package/identity/mfaTotp.d.ts +0 -2
- package/identity/mfaTotp.js +0 -2
- package/identity/mfaTotp.js.map +1 -1
- package/identity/oidc.d.ts +0 -2
- package/identity/oidc.js +0 -2
- package/identity/oidc.js.map +1 -1
- package/identity/oidcAssignment.d.ts +6 -3
- package/identity/oidcAssignment.js +6 -3
- package/identity/oidcAssignment.js.map +1 -1
- package/identity/oidcClient.d.ts +5 -5
- package/identity/oidcClient.js +5 -5
- package/identity/oidcKey.d.ts +10 -6
- package/identity/oidcKey.js +10 -6
- package/identity/oidcKey.js.map +1 -1
- package/identity/oidcKeyAllowedClientID.d.ts +10 -6
- package/identity/oidcKeyAllowedClientID.js +10 -6
- package/identity/oidcKeyAllowedClientID.js.map +1 -1
- package/identity/oidcProvider.d.ts +11 -8
- package/identity/oidcProvider.js +11 -8
- package/identity/oidcProvider.js.map +1 -1
- package/identity/oidcRole.d.ts +17 -10
- package/identity/oidcRole.js +17 -10
- package/identity/oidcRole.js.map +1 -1
- package/identity/oidcScope.d.ts +2 -3
- package/identity/oidcScope.js +2 -3
- package/identity/oidcScope.js.map +1 -1
- package/jwt/authBackend.d.ts +8 -14
- package/jwt/authBackend.js +8 -14
- package/jwt/authBackend.js.map +1 -1
- package/jwt/authBackendRole.d.ts +27 -82
- package/jwt/authBackendRole.js +0 -4
- package/jwt/authBackendRole.js.map +1 -1
- package/kmip/secretBackend.d.ts +5 -7
- package/kmip/secretBackend.js +5 -7
- package/kmip/secretBackend.js.map +1 -1
- package/kmip/secretRole.d.ts +0 -2
- package/kmip/secretRole.js +0 -2
- package/kmip/secretRole.js.map +1 -1
- package/kmip/secretScope.d.ts +0 -2
- package/kmip/secretScope.js +0 -2
- package/kmip/secretScope.js.map +1 -1
- package/kubernetes/authBackendConfig.d.ts +0 -2
- package/kubernetes/authBackendConfig.js +0 -2
- package/kubernetes/authBackendConfig.js.map +1 -1
- package/kubernetes/authBackendRole.d.ts +24 -74
- package/kubernetes/authBackendRole.js +0 -2
- package/kubernetes/authBackendRole.js.map +1 -1
- package/kubernetes/getServiceAccountToken.d.ts +16 -10
- package/kubernetes/getServiceAccountToken.js +16 -10
- package/kubernetes/getServiceAccountToken.js.map +1 -1
- package/kubernetes/secretBackend.d.ts +7 -5
- package/kubernetes/secretBackend.js +7 -5
- package/kubernetes/secretBackend.js.map +1 -1
- package/kubernetes/secretBackendRole.d.ts +24 -15
- package/kubernetes/secretBackendRole.js +24 -15
- package/kubernetes/secretBackendRole.js.map +1 -1
- package/kv/getSecret.d.ts +0 -4
- package/kv/getSecret.js +0 -4
- package/kv/getSecret.js.map +1 -1
- package/kv/getSecretSubkeysV2.d.ts +4 -6
- package/kv/getSecretSubkeysV2.js +4 -6
- package/kv/getSecretSubkeysV2.js.map +1 -1
- package/kv/getSecretV2.d.ts +64 -0
- package/kv/getSecretV2.js +64 -0
- package/kv/getSecretV2.js.map +1 -1
- package/kv/getSecretsList.d.ts +4 -8
- package/kv/getSecretsList.js +4 -8
- package/kv/getSecretsList.js.map +1 -1
- package/kv/getSecretsListV2.d.ts +14 -12
- package/kv/getSecretsListV2.js +14 -12
- package/kv/getSecretsListV2.js.map +1 -1
- package/kv/secret.d.ts +0 -2
- package/kv/secret.js +0 -2
- package/kv/secret.js.map +1 -1
- package/kv/secretBackendV2.d.ts +0 -2
- package/kv/secretBackendV2.js +0 -2
- package/kv/secretBackendV2.js.map +1 -1
- package/kv/secretV2.d.ts +1 -2
- package/kv/secretV2.js +1 -2
- package/kv/secretV2.js.map +1 -1
- package/ldap/authBackend.d.ts +29 -70
- package/ldap/authBackend.js +5 -7
- package/ldap/authBackend.js.map +1 -1
- package/ldap/authBackendGroup.d.ts +0 -2
- package/ldap/authBackendGroup.js +0 -2
- package/ldap/authBackendGroup.js.map +1 -1
- package/ldap/authBackendUser.d.ts +0 -2
- package/ldap/authBackendUser.js +0 -2
- package/ldap/authBackendUser.js.map +1 -1
- package/ldap/secretBackend.d.ts +2 -4
- package/ldap/secretBackend.js +2 -4
- package/ldap/secretBackend.js.map +1 -1
- package/ldap/secretBackendDynamicRole.d.ts +0 -2
- package/ldap/secretBackendDynamicRole.js +0 -2
- package/ldap/secretBackendDynamicRole.js.map +1 -1
- package/ldap/secretBackendLibrarySet.d.ts +1 -2
- package/ldap/secretBackendLibrarySet.js +1 -2
- package/ldap/secretBackendLibrarySet.js.map +1 -1
- package/ldap/secretBackendStaticRole.d.ts +0 -2
- package/ldap/secretBackendStaticRole.js +0 -2
- package/ldap/secretBackendStaticRole.js.map +1 -1
- package/managed/keys.d.ts +3 -12
- package/managed/keys.js.map +1 -1
- package/mfaDuo.d.ts +2 -3
- package/mfaDuo.js +2 -3
- package/mfaDuo.js.map +1 -1
- package/mfaOkta.d.ts +2 -3
- package/mfaOkta.js +2 -3
- package/mfaOkta.js.map +1 -1
- package/mfaPingid.d.ts +2 -3
- package/mfaPingid.js +2 -3
- package/mfaPingid.js.map +1 -1
- package/mfaTotp.d.ts +4 -5
- package/mfaTotp.js +4 -5
- package/mfaTotp.js.map +1 -1
- package/mongodbatlas/secretBackend.d.ts +0 -2
- package/mongodbatlas/secretBackend.js +0 -2
- package/mongodbatlas/secretBackend.js.map +1 -1
- package/mongodbatlas/secretRole.d.ts +1 -2
- package/mongodbatlas/secretRole.js +1 -2
- package/mongodbatlas/secretRole.js.map +1 -1
- package/mount.d.ts +10 -18
- package/mount.js +10 -18
- package/mount.js.map +1 -1
- package/nomadSecretBackend.d.ts +2 -4
- package/nomadSecretBackend.js +2 -4
- package/nomadSecretBackend.js.map +1 -1
- package/nomadSecretRole.d.ts +0 -2
- package/nomadSecretRole.js +0 -2
- package/nomadSecretRole.js.map +1 -1
- package/okta/authBackend.d.ts +3 -5
- package/okta/authBackend.js +3 -5
- package/okta/authBackend.js.map +1 -1
- package/okta/authBackendGroup.d.ts +0 -2
- package/okta/authBackendGroup.js +0 -2
- package/okta/authBackendGroup.js.map +1 -1
- package/okta/authBackendUser.d.ts +0 -2
- package/okta/authBackendUser.js +0 -2
- package/okta/authBackendUser.js.map +1 -1
- package/package.json +3 -2
- package/passwordPolicy.d.ts +5 -5
- package/passwordPolicy.js +5 -5
- package/pkisecret/backendConfigCluster.d.ts +0 -2
- package/pkisecret/backendConfigCluster.js +0 -2
- package/pkisecret/backendConfigCluster.js.map +1 -1
- package/pkisecret/getBackendIssuer.d.ts +44 -0
- package/pkisecret/getBackendIssuer.js +44 -0
- package/pkisecret/getBackendIssuer.js.map +1 -1
- package/pkisecret/getBackendIssuers.d.ts +0 -4
- package/pkisecret/getBackendIssuers.js +0 -4
- package/pkisecret/getBackendIssuers.js.map +1 -1
- package/pkisecret/getBackendKey.d.ts +2 -6
- package/pkisecret/getBackendKey.js +2 -6
- package/pkisecret/getBackendKey.js.map +1 -1
- package/pkisecret/getBackendKeys.d.ts +0 -4
- package/pkisecret/getBackendKeys.js +0 -4
- package/pkisecret/getBackendKeys.js.map +1 -1
- package/pkisecret/secretBackendCert.d.ts +3 -4
- package/pkisecret/secretBackendCert.js +3 -4
- package/pkisecret/secretBackendCert.js.map +1 -1
- package/pkisecret/secretBackendConfigCa.d.ts +2 -4
- package/pkisecret/secretBackendConfigCa.js +2 -4
- package/pkisecret/secretBackendConfigCa.js.map +1 -1
- package/pkisecret/secretBackendConfigIssuers.d.ts +0 -2
- package/pkisecret/secretBackendConfigIssuers.js +0 -2
- package/pkisecret/secretBackendConfigIssuers.js.map +1 -1
- package/pkisecret/secretBackendConfigUrls.d.ts +0 -2
- package/pkisecret/secretBackendConfigUrls.js +0 -2
- package/pkisecret/secretBackendConfigUrls.js.map +1 -1
- package/pkisecret/secretBackendCrlConfig.d.ts +1 -3
- package/pkisecret/secretBackendCrlConfig.js +1 -3
- package/pkisecret/secretBackendCrlConfig.js.map +1 -1
- package/pkisecret/secretBackendIntermediateCertRequest.d.ts +2 -4
- package/pkisecret/secretBackendIntermediateCertRequest.js +2 -4
- package/pkisecret/secretBackendIntermediateCertRequest.js.map +1 -1
- package/pkisecret/secretBackendIntermediateSetSigned.d.ts +5 -7
- package/pkisecret/secretBackendIntermediateSetSigned.js +5 -7
- package/pkisecret/secretBackendIntermediateSetSigned.js.map +1 -1
- package/pkisecret/secretBackendIssuer.d.ts +0 -2
- package/pkisecret/secretBackendIssuer.js +0 -2
- package/pkisecret/secretBackendIssuer.js.map +1 -1
- package/pkisecret/secretBackendRole.d.ts +1 -2
- package/pkisecret/secretBackendRole.js +1 -2
- package/pkisecret/secretBackendRole.js.map +1 -1
- package/pkisecret/secretBackendRootCert.d.ts +2 -4
- package/pkisecret/secretBackendRootCert.js +2 -4
- package/pkisecret/secretBackendRootCert.js.map +1 -1
- package/pkisecret/secretBackendRootSignIntermediate.d.ts +3 -5
- package/pkisecret/secretBackendRootSignIntermediate.js +3 -5
- package/pkisecret/secretBackendRootSignIntermediate.js.map +1 -1
- package/pkisecret/secretBackendSign.d.ts +3 -4
- package/pkisecret/secretBackendSign.js +3 -4
- package/pkisecret/secretBackendSign.js.map +1 -1
- package/provider.d.ts +0 -6
- package/provider.js.map +1 -1
- package/quotaLeaseCount.d.ts +2 -3
- package/quotaLeaseCount.js +2 -3
- package/quotaLeaseCount.js.map +1 -1
- package/quotaRateLimit.d.ts +1 -2
- package/quotaRateLimit.js +1 -2
- package/quotaRateLimit.js.map +1 -1
- package/rabbitmq/secretBackend.d.ts +1 -3
- package/rabbitmq/secretBackend.js +1 -3
- package/rabbitmq/secretBackend.js.map +1 -1
- package/rabbitmq/secretBackendRole.d.ts +1 -2
- package/rabbitmq/secretBackendRole.js +1 -2
- package/rabbitmq/secretBackendRole.js.map +1 -1
- package/raftAutopilot.d.ts +0 -2
- package/raftAutopilot.js +0 -2
- package/raftAutopilot.js.map +1 -1
- package/raftSnapshotAgentConfig.d.ts +44 -128
- package/raftSnapshotAgentConfig.js +8 -11
- package/raftSnapshotAgentConfig.js.map +1 -1
- package/rgpPolicy.d.ts +1 -3
- package/rgpPolicy.js +1 -3
- package/rgpPolicy.js.map +1 -1
- package/saml/authBackend.d.ts +3 -5
- package/saml/authBackend.js +3 -5
- package/saml/authBackend.js.map +1 -1
- package/saml/authBackendRole.d.ts +28 -77
- package/saml/authBackendRole.js +4 -5
- package/saml/authBackendRole.js.map +1 -1
- package/secrets/syncAssociation.d.ts +6 -5
- package/secrets/syncAssociation.js +6 -5
- package/secrets/syncAssociation.js.map +1 -1
- package/secrets/syncAwsDestination.d.ts +3 -4
- package/secrets/syncAwsDestination.js +3 -4
- package/secrets/syncAwsDestination.js.map +1 -1
- package/secrets/syncAzureDestination.d.ts +5 -6
- package/secrets/syncAzureDestination.js +5 -6
- package/secrets/syncAzureDestination.js.map +1 -1
- package/secrets/syncConfig.d.ts +1 -3
- package/secrets/syncConfig.js +1 -3
- package/secrets/syncConfig.js.map +1 -1
- package/secrets/syncGcpDestination.d.ts +5 -4
- package/secrets/syncGcpDestination.js +5 -4
- package/secrets/syncGcpDestination.js.map +1 -1
- package/secrets/syncGhDestination.d.ts +3 -4
- package/secrets/syncGhDestination.js +3 -4
- package/secrets/syncGhDestination.js.map +1 -1
- package/secrets/syncGithubApps.d.ts +6 -5
- package/secrets/syncGithubApps.js +6 -5
- package/secrets/syncGithubApps.js.map +1 -1
- package/secrets/syncVercelDestination.d.ts +3 -4
- package/secrets/syncVercelDestination.js +3 -4
- package/secrets/syncVercelDestination.js.map +1 -1
- package/ssh/secretBackendCa.d.ts +3 -5
- package/ssh/secretBackendCa.js +0 -2
- package/ssh/secretBackendCa.js.map +1 -1
- package/ssh/secretBackendRole.d.ts +2 -2
- package/ssh/secretBackendRole.js +2 -2
- package/terraformcloud/secretBackend.d.ts +0 -38
- package/terraformcloud/secretBackend.js +0 -2
- package/terraformcloud/secretBackend.js.map +1 -1
- package/terraformcloud/secretCreds.d.ts +1 -11
- package/terraformcloud/secretCreds.js +1 -2
- package/terraformcloud/secretCreds.js.map +1 -1
- package/terraformcloud/secretRole.d.ts +1 -47
- package/terraformcloud/secretRole.js +1 -2
- package/terraformcloud/secretRole.js.map +1 -1
- package/token.d.ts +6 -8
- package/token.js +6 -8
- package/token.js.map +1 -1
- package/tokenauth/authBackendRole.d.ts +28 -78
- package/tokenauth/authBackendRole.js +4 -6
- package/tokenauth/authBackendRole.js.map +1 -1
- package/transform/alphabet.d.ts +2 -3
- package/transform/alphabet.js +2 -3
- package/transform/alphabet.js.map +1 -1
- package/transform/getDecode.d.ts +4 -4
- package/transform/getDecode.js +4 -4
- package/transform/getEncode.d.ts +4 -4
- package/transform/getEncode.js +4 -4
- package/transform/role.d.ts +2 -3
- package/transform/role.js +2 -3
- package/transform/role.js.map +1 -1
- package/transform/template.d.ts +2 -2
- package/transform/template.js +2 -2
- package/transit/getDecrypt.d.ts +2 -30
- package/transit/getDecrypt.js +2 -6
- package/transit/getDecrypt.js.map +1 -1
- package/transit/getEncrypt.d.ts +0 -30
- package/transit/getEncrypt.js.map +1 -1
- package/transit/secretBackendKey.d.ts +4 -3
- package/transit/secretBackendKey.js +4 -3
- package/transit/secretBackendKey.js.map +1 -1
- package/transit/secretCacheConfig.d.ts +0 -2
- package/transit/secretCacheConfig.js +0 -2
- package/transit/secretCacheConfig.js.map +1 -1
- package/types/input.d.ts +310 -502
- package/types/output.d.ts +310 -490
- package/package.json.bak +0 -27
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getAccessCredentials.js","sourceRoot":"","sources":["../../azure/getAccessCredentials.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"getAccessCredentials.js","sourceRoot":"","sources":["../../azure/getAccessCredentials.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;GAqBG;AACH,SAAgB,oBAAoB,CAAC,IAA8B,EAAE,IAA2B;IAE5F,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,uDAAuD,EAAE;QAClF,SAAS,EAAE,IAAI,CAAC,OAAO;QACvB,aAAa,EAAE,IAAI,CAAC,WAAW;QAC/B,0BAA0B,EAAE,IAAI,CAAC,wBAAwB;QACzD,WAAW,EAAE,IAAI,CAAC,SAAS;QAC3B,wBAAwB,EAAE,IAAI,CAAC,sBAAsB;QACrD,wBAAwB,EAAE,IAAI,CAAC,sBAAsB;QACrD,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,gBAAgB,EAAE,IAAI,CAAC,cAAc;QACrC,UAAU,EAAE,IAAI,CAAC,QAAQ;QACzB,eAAe,EAAE,IAAI,CAAC,aAAa;KACtC,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAfD,oDAeC;AA4GD;;;;;;;;;;;;;;;;;;;;;GAqBG;AACH,SAAgB,0BAA0B,CAAC,IAAoC,EAAE,IAA2B;IACxG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAM,EAAE,EAAE,CAAC,oBAAoB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AAC/E,CAAC;AAFD,gEAEC"}
|
package/certAuthBackendRole.d.ts
CHANGED
|
@@ -4,19 +4,21 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
4
4
|
*
|
|
5
5
|
* ## Example Usage
|
|
6
6
|
*
|
|
7
|
-
* <!--Start PulumiCodeChooser -->
|
|
8
7
|
* ```typescript
|
|
9
8
|
* import * as pulumi from "@pulumi/pulumi";
|
|
10
|
-
* import * as
|
|
9
|
+
* import * as std from "@pulumi/std";
|
|
11
10
|
* import * as vault from "@pulumi/vault";
|
|
12
11
|
*
|
|
13
|
-
* const
|
|
12
|
+
* const cert = new vault.AuthBackend("cert", {
|
|
14
13
|
* path: "cert",
|
|
15
14
|
* type: "cert",
|
|
16
15
|
* });
|
|
17
|
-
* const certCertAuthBackendRole = new vault.CertAuthBackendRole("
|
|
18
|
-
*
|
|
19
|
-
*
|
|
16
|
+
* const certCertAuthBackendRole = new vault.CertAuthBackendRole("cert", {
|
|
17
|
+
* name: "foo",
|
|
18
|
+
* certificate: std.file({
|
|
19
|
+
* input: "/path/to/certs/ca-cert.pem",
|
|
20
|
+
* }).then(invoke => invoke.result),
|
|
21
|
+
* backend: cert.path,
|
|
20
22
|
* allowedNames: [
|
|
21
23
|
* "foo.example.org",
|
|
22
24
|
* "baz.example.org",
|
|
@@ -26,7 +28,6 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
26
28
|
* tokenPolicies: ["foo"],
|
|
27
29
|
* });
|
|
28
30
|
* ```
|
|
29
|
-
* <!--End PulumiCodeChooser -->
|
|
30
31
|
*/
|
|
31
32
|
export declare class CertAuthBackendRole extends pulumi.CustomResource {
|
|
32
33
|
/**
|
|
@@ -129,58 +130,39 @@ export declare class CertAuthBackendRole extends pulumi.CustomResource {
|
|
|
129
130
|
*/
|
|
130
131
|
readonly requiredExtensions: pulumi.Output<string[]>;
|
|
131
132
|
/**
|
|
132
|
-
*
|
|
133
|
-
* addresses which can authenticate successfully, and ties the resulting token to these blocks
|
|
134
|
-
* as well.
|
|
133
|
+
* Specifies the blocks of IP addresses which are allowed to use the generated token
|
|
135
134
|
*/
|
|
136
135
|
readonly tokenBoundCidrs: pulumi.Output<string[] | undefined>;
|
|
137
136
|
/**
|
|
138
|
-
*
|
|
139
|
-
* [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
|
140
|
-
* onto the token in number of seconds. This is a hard cap even if `tokenTtl` and
|
|
141
|
-
* `tokenMaxTtl` would otherwise allow a renewal.
|
|
137
|
+
* Generated Token's Explicit Maximum TTL in seconds
|
|
142
138
|
*/
|
|
143
139
|
readonly tokenExplicitMaxTtl: pulumi.Output<number | undefined>;
|
|
144
140
|
/**
|
|
145
|
-
* The maximum lifetime
|
|
146
|
-
* Its current value will be referenced at renewal time.
|
|
141
|
+
* The maximum lifetime of the generated token
|
|
147
142
|
*/
|
|
148
143
|
readonly tokenMaxTtl: pulumi.Output<number | undefined>;
|
|
149
144
|
/**
|
|
150
|
-
* If
|
|
151
|
-
* generated tokens; otherwise it will be added to the policies set in token_policies.
|
|
145
|
+
* If true, the 'default' policy will not automatically be added to generated tokens
|
|
152
146
|
*/
|
|
153
147
|
readonly tokenNoDefaultPolicy: pulumi.Output<boolean | undefined>;
|
|
154
148
|
/**
|
|
155
|
-
* The
|
|
156
|
-
* of times a generated token may be used (within its lifetime); 0 means unlimited.
|
|
149
|
+
* The maximum number of times a token may be used, a value of zero means unlimited
|
|
157
150
|
*/
|
|
158
151
|
readonly tokenNumUses: pulumi.Output<number | undefined>;
|
|
159
152
|
/**
|
|
160
|
-
*
|
|
161
|
-
* token generated using this role should never expire. The token should be renewed within the
|
|
162
|
-
* duration specified by this value. At each renewal, the token's TTL will be set to the
|
|
163
|
-
* value of this field. Specified in seconds.
|
|
153
|
+
* Generated Token's Period
|
|
164
154
|
*/
|
|
165
155
|
readonly tokenPeriod: pulumi.Output<number | undefined>;
|
|
166
156
|
/**
|
|
167
|
-
*
|
|
168
|
-
* on the auth method, this list may be supplemented by user/group/other values.
|
|
157
|
+
* Generated Token's Policies
|
|
169
158
|
*/
|
|
170
159
|
readonly tokenPolicies: pulumi.Output<string[] | undefined>;
|
|
171
160
|
/**
|
|
172
|
-
* The
|
|
173
|
-
* Its current value will be referenced at renewal time.
|
|
161
|
+
* The initial ttl of the token to generate in seconds
|
|
174
162
|
*/
|
|
175
163
|
readonly tokenTtl: pulumi.Output<number | undefined>;
|
|
176
164
|
/**
|
|
177
|
-
* The type of token
|
|
178
|
-
* `batch`, or `default` to use the mount's tuned default (which unless changed will be
|
|
179
|
-
* `service` tokens). For token store roles, there are two additional possibilities:
|
|
180
|
-
* `default-service` and `default-batch` which specify the type to return unless the client
|
|
181
|
-
* requests a different type at generation time.
|
|
182
|
-
*
|
|
183
|
-
* For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
|
|
165
|
+
* The type of token to generate, service or batch
|
|
184
166
|
*/
|
|
185
167
|
readonly tokenType: pulumi.Output<string | undefined>;
|
|
186
168
|
/**
|
|
@@ -281,58 +263,39 @@ export interface CertAuthBackendRoleState {
|
|
|
281
263
|
*/
|
|
282
264
|
requiredExtensions?: pulumi.Input<pulumi.Input<string>[]>;
|
|
283
265
|
/**
|
|
284
|
-
*
|
|
285
|
-
* addresses which can authenticate successfully, and ties the resulting token to these blocks
|
|
286
|
-
* as well.
|
|
266
|
+
* Specifies the blocks of IP addresses which are allowed to use the generated token
|
|
287
267
|
*/
|
|
288
268
|
tokenBoundCidrs?: pulumi.Input<pulumi.Input<string>[]>;
|
|
289
269
|
/**
|
|
290
|
-
*
|
|
291
|
-
* [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
|
292
|
-
* onto the token in number of seconds. This is a hard cap even if `tokenTtl` and
|
|
293
|
-
* `tokenMaxTtl` would otherwise allow a renewal.
|
|
270
|
+
* Generated Token's Explicit Maximum TTL in seconds
|
|
294
271
|
*/
|
|
295
272
|
tokenExplicitMaxTtl?: pulumi.Input<number>;
|
|
296
273
|
/**
|
|
297
|
-
* The maximum lifetime
|
|
298
|
-
* Its current value will be referenced at renewal time.
|
|
274
|
+
* The maximum lifetime of the generated token
|
|
299
275
|
*/
|
|
300
276
|
tokenMaxTtl?: pulumi.Input<number>;
|
|
301
277
|
/**
|
|
302
|
-
* If
|
|
303
|
-
* generated tokens; otherwise it will be added to the policies set in token_policies.
|
|
278
|
+
* If true, the 'default' policy will not automatically be added to generated tokens
|
|
304
279
|
*/
|
|
305
280
|
tokenNoDefaultPolicy?: pulumi.Input<boolean>;
|
|
306
281
|
/**
|
|
307
|
-
* The
|
|
308
|
-
* of times a generated token may be used (within its lifetime); 0 means unlimited.
|
|
282
|
+
* The maximum number of times a token may be used, a value of zero means unlimited
|
|
309
283
|
*/
|
|
310
284
|
tokenNumUses?: pulumi.Input<number>;
|
|
311
285
|
/**
|
|
312
|
-
*
|
|
313
|
-
* token generated using this role should never expire. The token should be renewed within the
|
|
314
|
-
* duration specified by this value. At each renewal, the token's TTL will be set to the
|
|
315
|
-
* value of this field. Specified in seconds.
|
|
286
|
+
* Generated Token's Period
|
|
316
287
|
*/
|
|
317
288
|
tokenPeriod?: pulumi.Input<number>;
|
|
318
289
|
/**
|
|
319
|
-
*
|
|
320
|
-
* on the auth method, this list may be supplemented by user/group/other values.
|
|
290
|
+
* Generated Token's Policies
|
|
321
291
|
*/
|
|
322
292
|
tokenPolicies?: pulumi.Input<pulumi.Input<string>[]>;
|
|
323
293
|
/**
|
|
324
|
-
* The
|
|
325
|
-
* Its current value will be referenced at renewal time.
|
|
294
|
+
* The initial ttl of the token to generate in seconds
|
|
326
295
|
*/
|
|
327
296
|
tokenTtl?: pulumi.Input<number>;
|
|
328
297
|
/**
|
|
329
|
-
* The type of token
|
|
330
|
-
* `batch`, or `default` to use the mount's tuned default (which unless changed will be
|
|
331
|
-
* `service` tokens). For token store roles, there are two additional possibilities:
|
|
332
|
-
* `default-service` and `default-batch` which specify the type to return unless the client
|
|
333
|
-
* requests a different type at generation time.
|
|
334
|
-
*
|
|
335
|
-
* For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
|
|
298
|
+
* The type of token to generate, service or batch
|
|
336
299
|
*/
|
|
337
300
|
tokenType?: pulumi.Input<string>;
|
|
338
301
|
}
|
|
@@ -425,58 +388,39 @@ export interface CertAuthBackendRoleArgs {
|
|
|
425
388
|
*/
|
|
426
389
|
requiredExtensions?: pulumi.Input<pulumi.Input<string>[]>;
|
|
427
390
|
/**
|
|
428
|
-
*
|
|
429
|
-
* addresses which can authenticate successfully, and ties the resulting token to these blocks
|
|
430
|
-
* as well.
|
|
391
|
+
* Specifies the blocks of IP addresses which are allowed to use the generated token
|
|
431
392
|
*/
|
|
432
393
|
tokenBoundCidrs?: pulumi.Input<pulumi.Input<string>[]>;
|
|
433
394
|
/**
|
|
434
|
-
*
|
|
435
|
-
* [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
|
|
436
|
-
* onto the token in number of seconds. This is a hard cap even if `tokenTtl` and
|
|
437
|
-
* `tokenMaxTtl` would otherwise allow a renewal.
|
|
395
|
+
* Generated Token's Explicit Maximum TTL in seconds
|
|
438
396
|
*/
|
|
439
397
|
tokenExplicitMaxTtl?: pulumi.Input<number>;
|
|
440
398
|
/**
|
|
441
|
-
* The maximum lifetime
|
|
442
|
-
* Its current value will be referenced at renewal time.
|
|
399
|
+
* The maximum lifetime of the generated token
|
|
443
400
|
*/
|
|
444
401
|
tokenMaxTtl?: pulumi.Input<number>;
|
|
445
402
|
/**
|
|
446
|
-
* If
|
|
447
|
-
* generated tokens; otherwise it will be added to the policies set in token_policies.
|
|
403
|
+
* If true, the 'default' policy will not automatically be added to generated tokens
|
|
448
404
|
*/
|
|
449
405
|
tokenNoDefaultPolicy?: pulumi.Input<boolean>;
|
|
450
406
|
/**
|
|
451
|
-
* The
|
|
452
|
-
* of times a generated token may be used (within its lifetime); 0 means unlimited.
|
|
407
|
+
* The maximum number of times a token may be used, a value of zero means unlimited
|
|
453
408
|
*/
|
|
454
409
|
tokenNumUses?: pulumi.Input<number>;
|
|
455
410
|
/**
|
|
456
|
-
*
|
|
457
|
-
* token generated using this role should never expire. The token should be renewed within the
|
|
458
|
-
* duration specified by this value. At each renewal, the token's TTL will be set to the
|
|
459
|
-
* value of this field. Specified in seconds.
|
|
411
|
+
* Generated Token's Period
|
|
460
412
|
*/
|
|
461
413
|
tokenPeriod?: pulumi.Input<number>;
|
|
462
414
|
/**
|
|
463
|
-
*
|
|
464
|
-
* on the auth method, this list may be supplemented by user/group/other values.
|
|
415
|
+
* Generated Token's Policies
|
|
465
416
|
*/
|
|
466
417
|
tokenPolicies?: pulumi.Input<pulumi.Input<string>[]>;
|
|
467
418
|
/**
|
|
468
|
-
* The
|
|
469
|
-
* Its current value will be referenced at renewal time.
|
|
419
|
+
* The initial ttl of the token to generate in seconds
|
|
470
420
|
*/
|
|
471
421
|
tokenTtl?: pulumi.Input<number>;
|
|
472
422
|
/**
|
|
473
|
-
* The type of token
|
|
474
|
-
* `batch`, or `default` to use the mount's tuned default (which unless changed will be
|
|
475
|
-
* `service` tokens). For token store roles, there are two additional possibilities:
|
|
476
|
-
* `default-service` and `default-batch` which specify the type to return unless the client
|
|
477
|
-
* requests a different type at generation time.
|
|
478
|
-
*
|
|
479
|
-
* For more details on the usage of each argument consult the [Vault Cert API documentation](https://www.vaultproject.io/api-docs/auth/cert).
|
|
423
|
+
* The type of token to generate, service or batch
|
|
480
424
|
*/
|
|
481
425
|
tokenType?: pulumi.Input<string>;
|
|
482
426
|
}
|
package/certAuthBackendRole.js
CHANGED
|
@@ -10,19 +10,21 @@ const utilities = require("./utilities");
|
|
|
10
10
|
*
|
|
11
11
|
* ## Example Usage
|
|
12
12
|
*
|
|
13
|
-
* <!--Start PulumiCodeChooser -->
|
|
14
13
|
* ```typescript
|
|
15
14
|
* import * as pulumi from "@pulumi/pulumi";
|
|
16
|
-
* import * as
|
|
15
|
+
* import * as std from "@pulumi/std";
|
|
17
16
|
* import * as vault from "@pulumi/vault";
|
|
18
17
|
*
|
|
19
|
-
* const
|
|
18
|
+
* const cert = new vault.AuthBackend("cert", {
|
|
20
19
|
* path: "cert",
|
|
21
20
|
* type: "cert",
|
|
22
21
|
* });
|
|
23
|
-
* const certCertAuthBackendRole = new vault.CertAuthBackendRole("
|
|
24
|
-
*
|
|
25
|
-
*
|
|
22
|
+
* const certCertAuthBackendRole = new vault.CertAuthBackendRole("cert", {
|
|
23
|
+
* name: "foo",
|
|
24
|
+
* certificate: std.file({
|
|
25
|
+
* input: "/path/to/certs/ca-cert.pem",
|
|
26
|
+
* }).then(invoke => invoke.result),
|
|
27
|
+
* backend: cert.path,
|
|
26
28
|
* allowedNames: [
|
|
27
29
|
* "foo.example.org",
|
|
28
30
|
* "baz.example.org",
|
|
@@ -32,7 +34,6 @@ const utilities = require("./utilities");
|
|
|
32
34
|
* tokenPolicies: ["foo"],
|
|
33
35
|
* });
|
|
34
36
|
* ```
|
|
35
|
-
* <!--End PulumiCodeChooser -->
|
|
36
37
|
*/
|
|
37
38
|
class CertAuthBackendRole extends pulumi.CustomResource {
|
|
38
39
|
/**
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"certAuthBackendRole.js","sourceRoot":"","sources":["../certAuthBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"certAuthBackendRole.js","sourceRoot":"","sources":["../certAuthBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA6BG;AACH,MAAa,mBAAoB,SAAQ,MAAM,CAAC,cAAc;IAC1D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAgC,EAAE,IAAmC;QAC9H,OAAO,IAAI,mBAAmB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC1E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,mBAAmB,CAAC,YAAY,CAAC;IACpE,CAAC;IAmID,YAAY,IAAY,EAAE,WAAgE,EAAE,IAAmC;QAC3H,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAmD,CAAC;YAClE,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,4BAA4B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,0BAA0B,CAAC,CAAC,CAAC,SAAS,CAAC;YACpG,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;SACrE;aAAM;YACH,MAAM,IAAI,GAAG,WAAkD,CAAC;YAChE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,WAAW,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACxD,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,4BAA4B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,0BAA0B,CAAC,CAAC,CAAC,SAAS,CAAC;YAClG,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;SACnE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,mBAAmB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACxE,CAAC;;AA9NL,kDA+NC;AAjNG,gBAAgB;AACO,gCAAY,GAAG,qDAAqD,CAAC"}
|
|
@@ -3,34 +3,30 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
3
3
|
* ## Example Usage
|
|
4
4
|
*
|
|
5
5
|
* ### Creating a standard backend resource:
|
|
6
|
-
* <!--Start PulumiCodeChooser -->
|
|
7
6
|
* ```typescript
|
|
8
7
|
* import * as pulumi from "@pulumi/pulumi";
|
|
9
8
|
* import * as vault from "@pulumi/vault";
|
|
10
9
|
*
|
|
11
10
|
* const test = new vault.consul.SecretBackend("test", {
|
|
12
|
-
* address: "127.0.0.1:8500",
|
|
13
|
-
* description: "Manages the Consul backend",
|
|
14
11
|
* path: "consul",
|
|
12
|
+
* description: "Manages the Consul backend",
|
|
13
|
+
* address: "127.0.0.1:8500",
|
|
15
14
|
* token: "4240861b-ce3d-8530-115a-521ff070dd29",
|
|
16
15
|
* });
|
|
17
16
|
* ```
|
|
18
|
-
* <!--End PulumiCodeChooser -->
|
|
19
17
|
*
|
|
20
18
|
* ### Creating a backend resource to bootstrap a new Consul instance:
|
|
21
|
-
* <!--Start PulumiCodeChooser -->
|
|
22
19
|
* ```typescript
|
|
23
20
|
* import * as pulumi from "@pulumi/pulumi";
|
|
24
21
|
* import * as vault from "@pulumi/vault";
|
|
25
22
|
*
|
|
26
23
|
* const test = new vault.consul.SecretBackend("test", {
|
|
24
|
+
* path: "consul",
|
|
25
|
+
* description: "Bootstrap the Consul backend",
|
|
27
26
|
* address: "127.0.0.1:8500",
|
|
28
27
|
* bootstrap: true,
|
|
29
|
-
* description: "Bootstrap the Consul backend",
|
|
30
|
-
* path: "consul",
|
|
31
28
|
* });
|
|
32
29
|
* ```
|
|
33
|
-
* <!--End PulumiCodeChooser -->
|
|
34
30
|
*
|
|
35
31
|
* ## Import
|
|
36
32
|
*
|
package/consul/secretBackend.js
CHANGED
|
@@ -9,34 +9,30 @@ const utilities = require("../utilities");
|
|
|
9
9
|
* ## Example Usage
|
|
10
10
|
*
|
|
11
11
|
* ### Creating a standard backend resource:
|
|
12
|
-
* <!--Start PulumiCodeChooser -->
|
|
13
12
|
* ```typescript
|
|
14
13
|
* import * as pulumi from "@pulumi/pulumi";
|
|
15
14
|
* import * as vault from "@pulumi/vault";
|
|
16
15
|
*
|
|
17
16
|
* const test = new vault.consul.SecretBackend("test", {
|
|
18
|
-
* address: "127.0.0.1:8500",
|
|
19
|
-
* description: "Manages the Consul backend",
|
|
20
17
|
* path: "consul",
|
|
18
|
+
* description: "Manages the Consul backend",
|
|
19
|
+
* address: "127.0.0.1:8500",
|
|
21
20
|
* token: "4240861b-ce3d-8530-115a-521ff070dd29",
|
|
22
21
|
* });
|
|
23
22
|
* ```
|
|
24
|
-
* <!--End PulumiCodeChooser -->
|
|
25
23
|
*
|
|
26
24
|
* ### Creating a backend resource to bootstrap a new Consul instance:
|
|
27
|
-
* <!--Start PulumiCodeChooser -->
|
|
28
25
|
* ```typescript
|
|
29
26
|
* import * as pulumi from "@pulumi/pulumi";
|
|
30
27
|
* import * as vault from "@pulumi/vault";
|
|
31
28
|
*
|
|
32
29
|
* const test = new vault.consul.SecretBackend("test", {
|
|
30
|
+
* path: "consul",
|
|
31
|
+
* description: "Bootstrap the Consul backend",
|
|
33
32
|
* address: "127.0.0.1:8500",
|
|
34
33
|
* bootstrap: true,
|
|
35
|
-
* description: "Bootstrap the Consul backend",
|
|
36
|
-
* path: "consul",
|
|
37
34
|
* });
|
|
38
35
|
* ```
|
|
39
|
-
* <!--End PulumiCodeChooser -->
|
|
40
36
|
*
|
|
41
37
|
* ## Import
|
|
42
38
|
*
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretBackend.js","sourceRoot":"","sources":["../../consul/secretBackend.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"secretBackend.js","sourceRoot":"","sources":["../../consul/secretBackend.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAoCG;AACH,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;IACpD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA0B,EAAE,IAAmC;QACxH,OAAO,IAAI,aAAa,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACpE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,aAAa,CAAC,YAAY,CAAC;IAC9D,CAAC;IA2ED,YAAY,IAAY,EAAE,WAAoD,EAAE,IAAmC;QAC/G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA6C,CAAC;YAC5D,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7D;aAAM;YACH,MAAM,IAAI,GAAG,WAA4C,CAAC;YAC1D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,YAAY,CAAC,GAAG,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,UAAU,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAC7F,cAAc,CAAC,WAAW,CAAC,GAAG,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,SAAS,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,OAAO,CAAC,GAAG,CAAA,IAAI,aAAJ,IAAI,uBAAJ,IAAI,CAAE,KAAK,EAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;SACjF;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,YAAY,EAAE,WAAW,EAAE,OAAO,CAAC,EAAE,CAAC;QACrF,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAClE,CAAC;;AAhJL,sCAiJC;AAnIG,gBAAgB;AACO,0BAAY,GAAG,0CAA0C,CAAC"}
|
|
@@ -4,7 +4,6 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
4
4
|
*
|
|
5
5
|
* ## Example Usage
|
|
6
6
|
*
|
|
7
|
-
* <!--Start PulumiCodeChooser -->
|
|
8
7
|
* ```typescript
|
|
9
8
|
* import * as pulumi from "@pulumi/pulumi";
|
|
10
9
|
* import * as vault from "@pulumi/vault";
|
|
@@ -16,11 +15,11 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
16
15
|
* token: "4240861b-ce3d-8530-115a-521ff070dd29",
|
|
17
16
|
* });
|
|
18
17
|
* const example = new vault.consul.SecretBackendRole("example", {
|
|
18
|
+
* name: "test-role",
|
|
19
19
|
* backend: test.path,
|
|
20
20
|
* consulPolicies: ["example-policy"],
|
|
21
21
|
* });
|
|
22
22
|
* ```
|
|
23
|
-
* <!--End PulumiCodeChooser -->
|
|
24
23
|
*
|
|
25
24
|
* ## Note About Required Arguments
|
|
26
25
|
*
|
|
@@ -10,7 +10,6 @@ const utilities = require("../utilities");
|
|
|
10
10
|
*
|
|
11
11
|
* ## Example Usage
|
|
12
12
|
*
|
|
13
|
-
* <!--Start PulumiCodeChooser -->
|
|
14
13
|
* ```typescript
|
|
15
14
|
* import * as pulumi from "@pulumi/pulumi";
|
|
16
15
|
* import * as vault from "@pulumi/vault";
|
|
@@ -22,11 +21,11 @@ const utilities = require("../utilities");
|
|
|
22
21
|
* token: "4240861b-ce3d-8530-115a-521ff070dd29",
|
|
23
22
|
* });
|
|
24
23
|
* const example = new vault.consul.SecretBackendRole("example", {
|
|
24
|
+
* name: "test-role",
|
|
25
25
|
* backend: test.path,
|
|
26
26
|
* consulPolicies: ["example-policy"],
|
|
27
27
|
* });
|
|
28
28
|
* ```
|
|
29
|
-
* <!--End PulumiCodeChooser -->
|
|
30
29
|
*
|
|
31
30
|
* ## Note About Required Arguments
|
|
32
31
|
*
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretBackendRole.js","sourceRoot":"","sources":["../../consul/secretBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"secretBackendRole.js","sourceRoot":"","sources":["../../consul/secretBackendRole.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAmCG;AACH,MAAa,iBAAkB,SAAQ,MAAM,CAAC,cAAc;IACxD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA8B,EAAE,IAAmC;QAC5H,OAAO,IAAI,iBAAiB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACxE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,iBAAiB,CAAC,YAAY,CAAC;IAClE,CAAC;IAyED,YAAY,IAAY,EAAE,WAA4D,EAAE,IAAmC;QACvH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAiD,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACzD;aAAM;YACH,MAAM,IAAI,GAAG,WAAgD,CAAC;YAC9D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;SACvD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,iBAAiB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACtE,CAAC;;AAvIL,8CAwIC;AA1HG,gBAAgB;AACO,8BAAY,GAAG,kDAAkD,CAAC"}
|
|
@@ -4,7 +4,6 @@ import * as outputs from "../types/output";
|
|
|
4
4
|
/**
|
|
5
5
|
* ## Example Usage
|
|
6
6
|
*
|
|
7
|
-
* <!--Start PulumiCodeChooser -->
|
|
8
7
|
* ```typescript
|
|
9
8
|
* import * as pulumi from "@pulumi/pulumi";
|
|
10
9
|
* import * as vault from "@pulumi/vault";
|
|
@@ -15,6 +14,7 @@ import * as outputs from "../types/output";
|
|
|
15
14
|
* });
|
|
16
15
|
* const postgres = new vault.database.SecretBackendConnection("postgres", {
|
|
17
16
|
* backend: db.path,
|
|
17
|
+
* name: "postgres",
|
|
18
18
|
* allowedRoles: [
|
|
19
19
|
* "dev",
|
|
20
20
|
* "prod",
|
|
@@ -24,7 +24,6 @@ import * as outputs from "../types/output";
|
|
|
24
24
|
* },
|
|
25
25
|
* });
|
|
26
26
|
* ```
|
|
27
|
-
* <!--End PulumiCodeChooser -->
|
|
28
27
|
*
|
|
29
28
|
* ## Import
|
|
30
29
|
*
|
|
@@ -8,7 +8,6 @@ const utilities = require("../utilities");
|
|
|
8
8
|
/**
|
|
9
9
|
* ## Example Usage
|
|
10
10
|
*
|
|
11
|
-
* <!--Start PulumiCodeChooser -->
|
|
12
11
|
* ```typescript
|
|
13
12
|
* import * as pulumi from "@pulumi/pulumi";
|
|
14
13
|
* import * as vault from "@pulumi/vault";
|
|
@@ -19,6 +18,7 @@ const utilities = require("../utilities");
|
|
|
19
18
|
* });
|
|
20
19
|
* const postgres = new vault.database.SecretBackendConnection("postgres", {
|
|
21
20
|
* backend: db.path,
|
|
21
|
+
* name: "postgres",
|
|
22
22
|
* allowedRoles: [
|
|
23
23
|
* "dev",
|
|
24
24
|
* "prod",
|
|
@@ -28,7 +28,6 @@ const utilities = require("../utilities");
|
|
|
28
28
|
* },
|
|
29
29
|
* });
|
|
30
30
|
* ```
|
|
31
|
-
* <!--End PulumiCodeChooser -->
|
|
32
31
|
*
|
|
33
32
|
* ## Import
|
|
34
33
|
*
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretBackendConnection.js","sourceRoot":"","sources":["../../database/secretBackendConnection.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"secretBackendConnection.js","sourceRoot":"","sources":["../../database/secretBackendConnection.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA+BG;AACH,MAAa,uBAAwB,SAAQ,MAAM,CAAC,cAAc;IAC9D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAoC,EAAE,IAAmC;QAClI,OAAO,IAAI,uBAAuB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC9E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,uBAAuB,CAAC,YAAY,CAAC;IACxE,CAAC;IA0HD,YAAY,IAAY,EAAE,WAAwE,EAAE,IAAmC;QACnI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAuD,CAAC;YACtE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;SACnF;aAAM;YACH,MAAM,IAAI,GAAG,WAAsD,CAAC;YACpE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;SACjF;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,uBAAuB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC5E,CAAC;;AArNL,0DAsNC;AAxMG,gBAAgB;AACO,oCAAY,GAAG,gEAAgE,CAAC"}
|
|
@@ -2,7 +2,6 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
2
2
|
/**
|
|
3
3
|
* ## Example Usage
|
|
4
4
|
*
|
|
5
|
-
* <!--Start PulumiCodeChooser -->
|
|
6
5
|
* ```typescript
|
|
7
6
|
* import * as pulumi from "@pulumi/pulumi";
|
|
8
7
|
* import * as vault from "@pulumi/vault";
|
|
@@ -13,6 +12,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
13
12
|
* });
|
|
14
13
|
* const postgres = new vault.database.SecretBackendConnection("postgres", {
|
|
15
14
|
* backend: db.path,
|
|
15
|
+
* name: "postgres",
|
|
16
16
|
* allowedRoles: [
|
|
17
17
|
* "dev",
|
|
18
18
|
* "prod",
|
|
@@ -23,11 +23,11 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
23
23
|
* });
|
|
24
24
|
* const role = new vault.database.SecretBackendRole("role", {
|
|
25
25
|
* backend: db.path,
|
|
26
|
+
* name: "dev",
|
|
26
27
|
* dbName: postgres.name,
|
|
27
28
|
* creationStatements: ["CREATE ROLE \"{{name}}\" WITH LOGIN PASSWORD '{{password}}' VALID UNTIL '{{expiration}}';"],
|
|
28
29
|
* });
|
|
29
30
|
* ```
|
|
30
|
-
* <!--End PulumiCodeChooser -->
|
|
31
31
|
*
|
|
32
32
|
* ## Import
|
|
33
33
|
*
|
|
@@ -8,7 +8,6 @@ const utilities = require("../utilities");
|
|
|
8
8
|
/**
|
|
9
9
|
* ## Example Usage
|
|
10
10
|
*
|
|
11
|
-
* <!--Start PulumiCodeChooser -->
|
|
12
11
|
* ```typescript
|
|
13
12
|
* import * as pulumi from "@pulumi/pulumi";
|
|
14
13
|
* import * as vault from "@pulumi/vault";
|
|
@@ -19,6 +18,7 @@ const utilities = require("../utilities");
|
|
|
19
18
|
* });
|
|
20
19
|
* const postgres = new vault.database.SecretBackendConnection("postgres", {
|
|
21
20
|
* backend: db.path,
|
|
21
|
+
* name: "postgres",
|
|
22
22
|
* allowedRoles: [
|
|
23
23
|
* "dev",
|
|
24
24
|
* "prod",
|
|
@@ -29,11 +29,11 @@ const utilities = require("../utilities");
|
|
|
29
29
|
* });
|
|
30
30
|
* const role = new vault.database.SecretBackendRole("role", {
|
|
31
31
|
* backend: db.path,
|
|
32
|
+
* name: "dev",
|
|
32
33
|
* dbName: postgres.name,
|
|
33
34
|
* creationStatements: ["CREATE ROLE \"{{name}}\" WITH LOGIN PASSWORD '{{password}}' VALID UNTIL '{{expiration}}';"],
|
|
34
35
|
* });
|
|
35
36
|
* ```
|
|
36
|
-
* <!--End PulumiCodeChooser -->
|
|
37
37
|
*
|
|
38
38
|
* ## Import
|
|
39
39
|
*
|