@pulumi/vault 7.0.0 → 7.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/database/secretBackendConnection.d.ts +5 -0
- package/database/secretBackendConnection.js +5 -0
- package/database/secretBackendConnection.js.map +1 -1
- package/index.d.ts +3 -0
- package/index.js +7 -2
- package/index.js.map +1 -1
- package/package.json +2 -2
- package/pkisecret/backendConfigScep.d.ts +224 -0
- package/pkisecret/backendConfigScep.js +119 -0
- package/pkisecret/backendConfigScep.js.map +1 -0
- package/pkisecret/getBackendConfigScep.d.ts +115 -0
- package/pkisecret/getBackendConfigScep.js +58 -0
- package/pkisecret/getBackendConfigScep.js.map +1 -0
- package/pkisecret/index.d.ts +6 -0
- package/pkisecret/index.js +9 -1
- package/pkisecret/index.js.map +1 -1
- package/pkisecret/secretBackendRootSignIntermediate.d.ts +18 -6
- package/pkisecret/secretBackendRootSignIntermediate.js +2 -0
- package/pkisecret/secretBackendRootSignIntermediate.js.map +1 -1
- package/quotaRateLimit.d.ts +48 -0
- package/quotaRateLimit.js +4 -0
- package/quotaRateLimit.js.map +1 -1
- package/scepAuthBackendRole.d.ts +239 -0
- package/scepAuthBackendRole.js +103 -0
- package/scepAuthBackendRole.js.map +1 -0
- package/transit/getCmac.d.ts +114 -0
- package/transit/getCmac.js +72 -0
- package/transit/getCmac.js.map +1 -0
- package/transit/getVerify.d.ts +3 -0
- package/transit/getVerify.js +2 -0
- package/transit/getVerify.js.map +1 -1
- package/transit/index.d.ts +3 -0
- package/transit/index.js +4 -1
- package/transit/index.js.map +1 -1
- package/types/input.d.ts +36 -2
- package/types/output.d.ts +60 -4
|
@@ -34,6 +34,11 @@ import * as outputs from "../types/output";
|
|
|
34
34
|
* * `passwordWo` - (Optional) The password for the user. Can be updated.
|
|
35
35
|
* **Note**: This property is write-only and will not be read from the API.
|
|
36
36
|
*
|
|
37
|
+
* The following write-only attribute is supported only for Snowflake DB:
|
|
38
|
+
*
|
|
39
|
+
* * `privateKeyWo` - (Optional) The private key associated with the Snowflake user.
|
|
40
|
+
* **Note**: This property is write-only and will not be read from the API.
|
|
41
|
+
*
|
|
37
42
|
* ## Import
|
|
38
43
|
*
|
|
39
44
|
* Database secret backend connections can be imported using the `backend`, `/config/`, and the `name` e.g.
|
|
@@ -38,6 +38,11 @@ const utilities = require("../utilities");
|
|
|
38
38
|
* * `passwordWo` - (Optional) The password for the user. Can be updated.
|
|
39
39
|
* **Note**: This property is write-only and will not be read from the API.
|
|
40
40
|
*
|
|
41
|
+
* The following write-only attribute is supported only for Snowflake DB:
|
|
42
|
+
*
|
|
43
|
+
* * `privateKeyWo` - (Optional) The private key associated with the Snowflake user.
|
|
44
|
+
* **Note**: This property is write-only and will not be read from the API.
|
|
45
|
+
*
|
|
41
46
|
* ## Import
|
|
42
47
|
*
|
|
43
48
|
* Database secret backend connections can be imported using the `backend`, `/config/`, and the `name` e.g.
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretBackendConnection.js","sourceRoot":"","sources":["../../database/secretBackendConnection.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"secretBackendConnection.js","sourceRoot":"","sources":["../../database/secretBackendConnection.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA6CG;AACH,MAAa,uBAAwB,SAAQ,MAAM,CAAC,cAAc;IAC9D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAoC,EAAE,IAAmC;QAClI,OAAO,IAAI,uBAAuB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC9E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,uBAAuB,CAAC,YAAY,CAAC;IACxE,CAAC;IA8ID,YAAY,IAAY,EAAE,WAAwE,EAAE,IAAmC;QACnI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAuD,CAAC;YACtE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,0BAA0B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;SACnF;aAAM;YACH,MAAM,IAAI,GAAG,WAAsD,CAAC;YACpE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,0BAA0B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,sBAAsB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;SACjF;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,uBAAuB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC5E,CAAC;;AAjPL,0DAkPC;AApOG,gBAAgB;AACO,oCAAY,GAAG,gEAAgE,CAAC"}
|
package/index.d.ts
CHANGED
|
@@ -83,6 +83,9 @@ export declare const RaftSnapshotAgentConfig: typeof import("./raftSnapshotAgent
|
|
|
83
83
|
export { RgpPolicyArgs, RgpPolicyState } from "./rgpPolicy";
|
|
84
84
|
export type RgpPolicy = import("./rgpPolicy").RgpPolicy;
|
|
85
85
|
export declare const RgpPolicy: typeof import("./rgpPolicy").RgpPolicy;
|
|
86
|
+
export { ScepAuthBackendRoleArgs, ScepAuthBackendRoleState } from "./scepAuthBackendRole";
|
|
87
|
+
export type ScepAuthBackendRole = import("./scepAuthBackendRole").ScepAuthBackendRole;
|
|
88
|
+
export declare const ScepAuthBackendRole: typeof import("./scepAuthBackendRole").ScepAuthBackendRole;
|
|
86
89
|
export { TokenArgs, TokenState } from "./token";
|
|
87
90
|
export type Token = import("./token").Token;
|
|
88
91
|
export declare const Token: typeof import("./token").Token;
|
package/index.js
CHANGED
|
@@ -16,8 +16,8 @@ var __exportStar = (this && this.__exportStar) || function(m, exports) {
|
|
|
16
16
|
for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
|
|
17
17
|
};
|
|
18
18
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
19
|
-
exports.
|
|
20
|
-
exports.types = exports.transit = exports.transform = exports.tokenauth = exports.terraformcloud = exports.ssh = exports.secrets = exports.saml = exports.rabbitmq = exports.pkisecret = exports.okta = exports.mongodbatlas = exports.managed = exports.ldap = exports.kv = exports.kubernetes = void 0;
|
|
19
|
+
exports.jwt = exports.identity = exports.github = exports.generic = exports.gcp = exports.database = exports.consul = exports.config = exports.azure = exports.aws = exports.approle = exports.alicloud = exports.ad = exports.Token = exports.ScepAuthBackendRole = exports.RgpPolicy = exports.RaftSnapshotAgentConfig = exports.RaftAutopilot = exports.QuotaRateLimit = exports.QuotaLeaseCount = exports.Policy = exports.PluginPinnedVersion = exports.Plugin = exports.NomadSecretRole = exports.NomadSecretBackend = exports.Namespace = exports.Mount = exports.MfaTotp = exports.MfaPingid = exports.MfaOkta = exports.MfaDuo = exports.getRaftAutopilotStateOutput = exports.getRaftAutopilotState = exports.getPolicyDocumentOutput = exports.getPolicyDocument = exports.getNomadAccessTokenOutput = exports.getNomadAccessToken = exports.getNamespacesOutput = exports.getNamespaces = exports.getNamespaceOutput = exports.getNamespace = exports.getAuthBackendsOutput = exports.getAuthBackends = exports.getAuthBackendOutput = exports.getAuthBackend = exports.EgpPolicy = exports.CertAuthBackendRole = exports.AuthBackend = exports.AuditRequestHeader = exports.Audit = void 0;
|
|
20
|
+
exports.types = exports.transit = exports.transform = exports.tokenauth = exports.terraformcloud = exports.ssh = exports.secrets = exports.saml = exports.rabbitmq = exports.pkisecret = exports.okta = exports.mongodbatlas = exports.managed = exports.ldap = exports.kv = exports.kubernetes = exports.kmip = void 0;
|
|
21
21
|
const pulumi = require("@pulumi/pulumi");
|
|
22
22
|
const utilities = require("./utilities");
|
|
23
23
|
exports.Audit = null;
|
|
@@ -85,6 +85,8 @@ exports.RaftSnapshotAgentConfig = null;
|
|
|
85
85
|
utilities.lazyLoad(exports, ["RaftSnapshotAgentConfig"], () => require("./raftSnapshotAgentConfig"));
|
|
86
86
|
exports.RgpPolicy = null;
|
|
87
87
|
utilities.lazyLoad(exports, ["RgpPolicy"], () => require("./rgpPolicy"));
|
|
88
|
+
exports.ScepAuthBackendRole = null;
|
|
89
|
+
utilities.lazyLoad(exports, ["ScepAuthBackendRole"], () => require("./scepAuthBackendRole"));
|
|
88
90
|
exports.Token = null;
|
|
89
91
|
utilities.lazyLoad(exports, ["Token"], () => require("./token"));
|
|
90
92
|
// Export sub-modules:
|
|
@@ -194,6 +196,8 @@ const _module = {
|
|
|
194
196
|
return new exports.RaftSnapshotAgentConfig(name, undefined, { urn });
|
|
195
197
|
case "vault:index/rgpPolicy:RgpPolicy":
|
|
196
198
|
return new exports.RgpPolicy(name, undefined, { urn });
|
|
199
|
+
case "vault:index/scepAuthBackendRole:ScepAuthBackendRole":
|
|
200
|
+
return new exports.ScepAuthBackendRole(name, undefined, { urn });
|
|
197
201
|
case "vault:index/token:Token":
|
|
198
202
|
return new exports.Token(name, undefined, { urn });
|
|
199
203
|
default:
|
|
@@ -222,6 +226,7 @@ pulumi.runtime.registerResourceModule("vault", "index/quotaRateLimit", _module);
|
|
|
222
226
|
pulumi.runtime.registerResourceModule("vault", "index/raftAutopilot", _module);
|
|
223
227
|
pulumi.runtime.registerResourceModule("vault", "index/raftSnapshotAgentConfig", _module);
|
|
224
228
|
pulumi.runtime.registerResourceModule("vault", "index/rgpPolicy", _module);
|
|
229
|
+
pulumi.runtime.registerResourceModule("vault", "index/scepAuthBackendRole", _module);
|
|
225
230
|
pulumi.runtime.registerResourceModule("vault", "index/token", _module);
|
|
226
231
|
pulumi.runtime.registerResourcePackage("vault", {
|
|
227
232
|
version: utilities.getVersion(),
|
package/index.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../index.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;;;;;;;;;;;;;;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAK5B,QAAA,KAAK,GAAmC,IAAW,CAAC;AACjE,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,SAAS,CAAC,CAAC,CAAC;AAIpD,QAAA,kBAAkB,GAA6D,IAAW,CAAC;AACxG,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,oBAAoB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,sBAAsB,CAAC,CAAC,CAAC;AAI9E,QAAA,WAAW,GAA+C,IAAW,CAAC;AACnF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,aAAa,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,eAAe,CAAC,CAAC,CAAC;AAIhE,QAAA,mBAAmB,GAA+D,IAAW,CAAC;AAC3G,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,qBAAqB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,uBAAuB,CAAC,CAAC,CAAC;AAIhF,QAAA,SAAS,GAA2C,IAAW,CAAC;AAC7E,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,WAAW,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,aAAa,CAAC,CAAC,CAAC;AAG5D,QAAA,cAAc,GAAqD,IAAW,CAAC;AAC/E,QAAA,oBAAoB,GAA2D,IAAW,CAAC;AACxG,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,gBAAgB,EAAC,sBAAsB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,kBAAkB,CAAC,CAAC,CAAC;AAG7F,QAAA,eAAe,GAAuD,IAAW,CAAC;AAClF,QAAA,qBAAqB,GAA6D,IAAW,CAAC;AAC3G,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,iBAAiB,EAAC,uBAAuB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,mBAAmB,CAAC,CAAC,CAAC;AAGhG,QAAA,YAAY,GAAiD,IAAW,CAAC;AACzE,QAAA,kBAAkB,GAAuD,IAAW,CAAC;AAClG,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,cAAc,EAAC,oBAAoB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,gBAAgB,CAAC,CAAC,CAAC;AAGvF,QAAA,aAAa,GAAmD,IAAW,CAAC;AAC5E,QAAA,mBAAmB,GAAyD,IAAW,CAAC;AACrG,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,eAAe,EAAC,qBAAqB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,iBAAiB,CAAC,CAAC,CAAC;AAG1F,QAAA,mBAAmB,GAA+D,IAAW,CAAC;AAC9F,QAAA,yBAAyB,GAAqE,IAAW,CAAC;AACvH,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,qBAAqB,EAAC,2BAA2B,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,uBAAuB,CAAC,CAAC,CAAC;AAG5G,QAAA,iBAAiB,GAA2D,IAAW,CAAC;AACxF,QAAA,uBAAuB,GAAiE,IAAW,CAAC;AACjH,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,mBAAmB,EAAC,yBAAyB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,qBAAqB,CAAC,CAAC,CAAC;AAGtG,QAAA,qBAAqB,GAAmE,IAAW,CAAC;AACpG,QAAA,2BAA2B,GAAyE,IAAW,CAAC;AAC7H,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,uBAAuB,EAAC,6BAA6B,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,yBAAyB,CAAC,CAAC,CAAC;AAIlH,QAAA,MAAM,GAAqC,IAAW,CAAC;AACpE,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,QAAQ,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC,CAAC;AAItD,QAAA,OAAO,GAAuC,IAAW,CAAC;AACvE,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,SAAS,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,WAAW,CAAC,CAAC,CAAC;AAIxD,QAAA,SAAS,GAA2C,IAAW,CAAC;AAC7E,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,WAAW,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,aAAa,CAAC,CAAC,CAAC;AAI5D,QAAA,OAAO,GAAuC,IAAW,CAAC;AACvE,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,SAAS,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,WAAW,CAAC,CAAC,CAAC;AAIxD,QAAA,KAAK,GAAmC,IAAW,CAAC;AACjE,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,SAAS,CAAC,CAAC,CAAC;AAIpD,QAAA,SAAS,GAA2C,IAAW,CAAC;AAC7E,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,WAAW,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,aAAa,CAAC,CAAC,CAAC;AAI5D,QAAA,kBAAkB,GAA6D,IAAW,CAAC;AACxG,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,oBAAoB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,sBAAsB,CAAC,CAAC,CAAC;AAI9E,QAAA,eAAe,GAAuD,IAAW,CAAC;AAC/F,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,iBAAiB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,mBAAmB,CAAC,CAAC,CAAC;AAIxE,QAAA,MAAM,GAAqC,IAAW,CAAC;AACpE,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,QAAQ,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC,CAAC;AAItD,QAAA,mBAAmB,GAA+D,IAAW,CAAC;AAC3G,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,qBAAqB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,uBAAuB,CAAC,CAAC,CAAC;AAIhF,QAAA,MAAM,GAAqC,IAAW,CAAC;AACpE,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,QAAQ,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC,CAAC;AAEnE,6CAA2B;AAC3B,yCAAsC;AAIzB,QAAA,eAAe,GAAuD,IAAW,CAAC;AAC/F,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,iBAAiB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,mBAAmB,CAAC,CAAC,CAAC;AAIxE,QAAA,cAAc,GAAqD,IAAW,CAAC;AAC5F,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,gBAAgB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,kBAAkB,CAAC,CAAC,CAAC;AAItE,QAAA,aAAa,GAAmD,IAAW,CAAC;AACzF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,eAAe,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,iBAAiB,CAAC,CAAC,CAAC;AAIpE,QAAA,uBAAuB,GAAuE,IAAW,CAAC;AACvH,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,yBAAyB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,2BAA2B,CAAC,CAAC,CAAC;AAIxF,QAAA,SAAS,GAA2C,IAAW,CAAC;AAC7E,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,WAAW,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,aAAa,CAAC,CAAC,CAAC;AAI5D,QAAA,KAAK,GAAmC,IAAW,CAAC;AACjE,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,SAAS,CAAC,CAAC,CAAC;AAGjE,sBAAsB;AACtB,2BAA2B;AAgCvB,gBAAE;AA/BN,uCAAuC;AAgCnC,4BAAQ;AA/BZ,qCAAqC;AAgCjC,0BAAO;AA/BX,6BAA6B;AAgCzB,kBAAG;AA/BP,iCAAiC;AAgC7B,sBAAK;AA/BT,mCAAmC;AAgC/B,wBAAM;AA/BV,mCAAmC;AAgC/B,wBAAM;AA/BV,uCAAuC;AAgCnC,4BAAQ;AA/BZ,6BAA6B;AAgCzB,kBAAG;AA/BP,qCAAqC;AAgCjC,0BAAO;AA/BX,mCAAmC;AAgC/B,wBAAM;AA/BV,uCAAuC;AAgCnC,4BAAQ;AA/BZ,6BAA6B;AAgCzB,kBAAG;AA/BP,+BAA+B;AAgC3B,oBAAI;AA/BR,2CAA2C;AAgCvC,gCAAU;AA/Bd,2BAA2B;AAgCvB,gBAAE;AA/BN,+BAA+B;AAgC3B,oBAAI;AA/BR,qCAAqC;AAgCjC,0BAAO;AA/BX,+CAA+C;AAgC3C,oCAAY;AA/BhB,+BAA+B;AAgC3B,oBAAI;AA/BR,yCAAyC;AAgCrC,8BAAS;AA/Bb,uCAAuC;AAgCnC,4BAAQ;AA/BZ,+BAA+B;AAgC3B,oBAAI;AA/BR,qCAAqC;AAgCjC,0BAAO;AA/BX,6BAA6B;AAgCzB,kBAAG;AA/BP,mDAAmD;AAgC/C,wCAAc;AA/BlB,yCAAyC;AAgCrC,8BAAS;AA/Bb,yCAAyC;AAgCrC,8BAAS;AA/Bb,qCAAqC;AAgCjC,0BAAO;AA/BX,iCAAiC;AAgC7B,sBAAK;AAGT,MAAM,OAAO,GAAG;IACZ,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE;IAC/B,SAAS,EAAE,CAAC,IAAY,EAAE,IAAY,EAAE,GAAW,EAAmB,EAAE;QACpE,QAAQ,IAAI,EAAE;YACV,KAAK,yBAAyB;gBAC1B,OAAO,IAAI,aAAK,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACnD,KAAK,mDAAmD;gBACpD,OAAO,IAAI,0BAAkB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAChE,KAAK,qCAAqC;gBACtC,OAAO,IAAI,mBAAW,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACzD,KAAK,qDAAqD;gBACtD,OAAO,IAAI,2BAAmB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACjE,KAAK,iCAAiC;gBAClC,OAAO,IAAI,iBAAS,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACvD,KAAK,2BAA2B;gBAC5B,OAAO,IAAI,cAAM,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACpD,KAAK,6BAA6B;gBAC9B,OAAO,IAAI,eAAO,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACrD,KAAK,iCAAiC;gBAClC,OAAO,IAAI,iBAAS,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACvD,KAAK,6BAA6B;gBAC9B,OAAO,IAAI,eAAO,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACrD,KAAK,yBAAyB;gBAC1B,OAAO,IAAI,aAAK,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACnD,KAAK,iCAAiC;gBAClC,OAAO,IAAI,iBAAS,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACvD,KAAK,mDAAmD;gBACpD,OAAO,IAAI,0BAAkB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAChE,KAAK,6CAA6C;gBAC9C,OAAO,IAAI,uBAAe,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC7D,KAAK,2BAA2B;gBAC5B,OAAO,IAAI,cAAM,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACpD,KAAK,qDAAqD;gBACtD,OAAO,IAAI,2BAAmB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACjE,KAAK,2BAA2B;gBAC5B,OAAO,IAAI,cAAM,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACpD,KAAK,6CAA6C;gBAC9C,OAAO,IAAI,uBAAe,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC7D,KAAK,2CAA2C;gBAC5C,OAAO,IAAI,sBAAc,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC5D,KAAK,yCAAyC;gBAC1C,OAAO,IAAI,qBAAa,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC3D,KAAK,6DAA6D;gBAC9D,OAAO,IAAI,+BAAuB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACrE,KAAK,iCAAiC;gBAClC,OAAO,IAAI,iBAAS,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACvD,KAAK,yBAAyB;gBAC1B,OAAO,IAAI,aAAK,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACnD;gBACI,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,EAAE,CAAC,CAAC;SACxD;IACL,CAAC;CACJ,CAAC;AACF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,aAAa,EAAE,OAAO,CAAC,CAAA;AACtE,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,0BAA0B,EAAE,OAAO,CAAC,CAAA;AACnF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,mBAAmB,EAAE,OAAO,CAAC,CAAA;AAC5E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,2BAA2B,EAAE,OAAO,CAAC,CAAA;AACpF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,iBAAiB,EAAE,OAAO,CAAC,CAAA;AAC1E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,cAAc,EAAE,OAAO,CAAC,CAAA;AACvE,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,eAAe,EAAE,OAAO,CAAC,CAAA;AACxE,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,iBAAiB,EAAE,OAAO,CAAC,CAAA;AAC1E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,eAAe,EAAE,OAAO,CAAC,CAAA;AACxE,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,aAAa,EAAE,OAAO,CAAC,CAAA;AACtE,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,iBAAiB,EAAE,OAAO,CAAC,CAAA;AAC1E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,0BAA0B,EAAE,OAAO,CAAC,CAAA;AACnF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,uBAAuB,EAAE,OAAO,CAAC,CAAA;AAChF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,cAAc,EAAE,OAAO,CAAC,CAAA;AACvE,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,2BAA2B,EAAE,OAAO,CAAC,CAAA;AACpF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,cAAc,EAAE,OAAO,CAAC,CAAA;AACvE,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,uBAAuB,EAAE,OAAO,CAAC,CAAA;AAChF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,sBAAsB,EAAE,OAAO,CAAC,CAAA;AAC/E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,qBAAqB,EAAE,OAAO,CAAC,CAAA;AAC9E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,+BAA+B,EAAE,OAAO,CAAC,CAAA;AACxF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,iBAAiB,EAAE,OAAO,CAAC,CAAA;AAC1E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,aAAa,EAAE,OAAO,CAAC,CAAA;AACtE,MAAM,CAAC,OAAO,CAAC,uBAAuB,CAAC,OAAO,EAAE;IAC5C,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE;IAC/B,iBAAiB,EAAE,CAAC,IAAY,EAAE,IAAY,EAAE,GAAW,EAA2B,EAAE;QACpF,IAAI,IAAI,KAAK,wBAAwB,EAAE;YACnC,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,EAAE,CAAC,CAAC;SACpD;QACD,OAAO,IAAI,mBAAQ,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAC;IACvD,CAAC;CACJ,CAAC,CAAC"}
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../index.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;;;;;;;;;;;;;;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAK5B,QAAA,KAAK,GAAmC,IAAW,CAAC;AACjE,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,SAAS,CAAC,CAAC,CAAC;AAIpD,QAAA,kBAAkB,GAA6D,IAAW,CAAC;AACxG,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,oBAAoB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,sBAAsB,CAAC,CAAC,CAAC;AAI9E,QAAA,WAAW,GAA+C,IAAW,CAAC;AACnF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,aAAa,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,eAAe,CAAC,CAAC,CAAC;AAIhE,QAAA,mBAAmB,GAA+D,IAAW,CAAC;AAC3G,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,qBAAqB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,uBAAuB,CAAC,CAAC,CAAC;AAIhF,QAAA,SAAS,GAA2C,IAAW,CAAC;AAC7E,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,WAAW,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,aAAa,CAAC,CAAC,CAAC;AAG5D,QAAA,cAAc,GAAqD,IAAW,CAAC;AAC/E,QAAA,oBAAoB,GAA2D,IAAW,CAAC;AACxG,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,gBAAgB,EAAC,sBAAsB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,kBAAkB,CAAC,CAAC,CAAC;AAG7F,QAAA,eAAe,GAAuD,IAAW,CAAC;AAClF,QAAA,qBAAqB,GAA6D,IAAW,CAAC;AAC3G,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,iBAAiB,EAAC,uBAAuB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,mBAAmB,CAAC,CAAC,CAAC;AAGhG,QAAA,YAAY,GAAiD,IAAW,CAAC;AACzE,QAAA,kBAAkB,GAAuD,IAAW,CAAC;AAClG,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,cAAc,EAAC,oBAAoB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,gBAAgB,CAAC,CAAC,CAAC;AAGvF,QAAA,aAAa,GAAmD,IAAW,CAAC;AAC5E,QAAA,mBAAmB,GAAyD,IAAW,CAAC;AACrG,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,eAAe,EAAC,qBAAqB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,iBAAiB,CAAC,CAAC,CAAC;AAG1F,QAAA,mBAAmB,GAA+D,IAAW,CAAC;AAC9F,QAAA,yBAAyB,GAAqE,IAAW,CAAC;AACvH,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,qBAAqB,EAAC,2BAA2B,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,uBAAuB,CAAC,CAAC,CAAC;AAG5G,QAAA,iBAAiB,GAA2D,IAAW,CAAC;AACxF,QAAA,uBAAuB,GAAiE,IAAW,CAAC;AACjH,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,mBAAmB,EAAC,yBAAyB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,qBAAqB,CAAC,CAAC,CAAC;AAGtG,QAAA,qBAAqB,GAAmE,IAAW,CAAC;AACpG,QAAA,2BAA2B,GAAyE,IAAW,CAAC;AAC7H,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,uBAAuB,EAAC,6BAA6B,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,yBAAyB,CAAC,CAAC,CAAC;AAIlH,QAAA,MAAM,GAAqC,IAAW,CAAC;AACpE,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,QAAQ,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC,CAAC;AAItD,QAAA,OAAO,GAAuC,IAAW,CAAC;AACvE,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,SAAS,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,WAAW,CAAC,CAAC,CAAC;AAIxD,QAAA,SAAS,GAA2C,IAAW,CAAC;AAC7E,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,WAAW,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,aAAa,CAAC,CAAC,CAAC;AAI5D,QAAA,OAAO,GAAuC,IAAW,CAAC;AACvE,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,SAAS,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,WAAW,CAAC,CAAC,CAAC;AAIxD,QAAA,KAAK,GAAmC,IAAW,CAAC;AACjE,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,SAAS,CAAC,CAAC,CAAC;AAIpD,QAAA,SAAS,GAA2C,IAAW,CAAC;AAC7E,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,WAAW,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,aAAa,CAAC,CAAC,CAAC;AAI5D,QAAA,kBAAkB,GAA6D,IAAW,CAAC;AACxG,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,oBAAoB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,sBAAsB,CAAC,CAAC,CAAC;AAI9E,QAAA,eAAe,GAAuD,IAAW,CAAC;AAC/F,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,iBAAiB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,mBAAmB,CAAC,CAAC,CAAC;AAIxE,QAAA,MAAM,GAAqC,IAAW,CAAC;AACpE,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,QAAQ,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC,CAAC;AAItD,QAAA,mBAAmB,GAA+D,IAAW,CAAC;AAC3G,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,qBAAqB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,uBAAuB,CAAC,CAAC,CAAC;AAIhF,QAAA,MAAM,GAAqC,IAAW,CAAC;AACpE,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,QAAQ,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,UAAU,CAAC,CAAC,CAAC;AAEnE,6CAA2B;AAC3B,yCAAsC;AAIzB,QAAA,eAAe,GAAuD,IAAW,CAAC;AAC/F,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,iBAAiB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,mBAAmB,CAAC,CAAC,CAAC;AAIxE,QAAA,cAAc,GAAqD,IAAW,CAAC;AAC5F,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,gBAAgB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,kBAAkB,CAAC,CAAC,CAAC;AAItE,QAAA,aAAa,GAAmD,IAAW,CAAC;AACzF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,eAAe,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,iBAAiB,CAAC,CAAC,CAAC;AAIpE,QAAA,uBAAuB,GAAuE,IAAW,CAAC;AACvH,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,yBAAyB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,2BAA2B,CAAC,CAAC,CAAC;AAIxF,QAAA,SAAS,GAA2C,IAAW,CAAC;AAC7E,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,WAAW,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,aAAa,CAAC,CAAC,CAAC;AAI5D,QAAA,mBAAmB,GAA+D,IAAW,CAAC;AAC3G,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,qBAAqB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,uBAAuB,CAAC,CAAC,CAAC;AAIhF,QAAA,KAAK,GAAmC,IAAW,CAAC;AACjE,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,SAAS,CAAC,CAAC,CAAC;AAGjE,sBAAsB;AACtB,2BAA2B;AAgCvB,gBAAE;AA/BN,uCAAuC;AAgCnC,4BAAQ;AA/BZ,qCAAqC;AAgCjC,0BAAO;AA/BX,6BAA6B;AAgCzB,kBAAG;AA/BP,iCAAiC;AAgC7B,sBAAK;AA/BT,mCAAmC;AAgC/B,wBAAM;AA/BV,mCAAmC;AAgC/B,wBAAM;AA/BV,uCAAuC;AAgCnC,4BAAQ;AA/BZ,6BAA6B;AAgCzB,kBAAG;AA/BP,qCAAqC;AAgCjC,0BAAO;AA/BX,mCAAmC;AAgC/B,wBAAM;AA/BV,uCAAuC;AAgCnC,4BAAQ;AA/BZ,6BAA6B;AAgCzB,kBAAG;AA/BP,+BAA+B;AAgC3B,oBAAI;AA/BR,2CAA2C;AAgCvC,gCAAU;AA/Bd,2BAA2B;AAgCvB,gBAAE;AA/BN,+BAA+B;AAgC3B,oBAAI;AA/BR,qCAAqC;AAgCjC,0BAAO;AA/BX,+CAA+C;AAgC3C,oCAAY;AA/BhB,+BAA+B;AAgC3B,oBAAI;AA/BR,yCAAyC;AAgCrC,8BAAS;AA/Bb,uCAAuC;AAgCnC,4BAAQ;AA/BZ,+BAA+B;AAgC3B,oBAAI;AA/BR,qCAAqC;AAgCjC,0BAAO;AA/BX,6BAA6B;AAgCzB,kBAAG;AA/BP,mDAAmD;AAgC/C,wCAAc;AA/BlB,yCAAyC;AAgCrC,8BAAS;AA/Bb,yCAAyC;AAgCrC,8BAAS;AA/Bb,qCAAqC;AAgCjC,0BAAO;AA/BX,iCAAiC;AAgC7B,sBAAK;AAGT,MAAM,OAAO,GAAG;IACZ,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE;IAC/B,SAAS,EAAE,CAAC,IAAY,EAAE,IAAY,EAAE,GAAW,EAAmB,EAAE;QACpE,QAAQ,IAAI,EAAE;YACV,KAAK,yBAAyB;gBAC1B,OAAO,IAAI,aAAK,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACnD,KAAK,mDAAmD;gBACpD,OAAO,IAAI,0BAAkB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAChE,KAAK,qCAAqC;gBACtC,OAAO,IAAI,mBAAW,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACzD,KAAK,qDAAqD;gBACtD,OAAO,IAAI,2BAAmB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACjE,KAAK,iCAAiC;gBAClC,OAAO,IAAI,iBAAS,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACvD,KAAK,2BAA2B;gBAC5B,OAAO,IAAI,cAAM,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACpD,KAAK,6BAA6B;gBAC9B,OAAO,IAAI,eAAO,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACrD,KAAK,iCAAiC;gBAClC,OAAO,IAAI,iBAAS,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACvD,KAAK,6BAA6B;gBAC9B,OAAO,IAAI,eAAO,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACrD,KAAK,yBAAyB;gBAC1B,OAAO,IAAI,aAAK,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACnD,KAAK,iCAAiC;gBAClC,OAAO,IAAI,iBAAS,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACvD,KAAK,mDAAmD;gBACpD,OAAO,IAAI,0BAAkB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAChE,KAAK,6CAA6C;gBAC9C,OAAO,IAAI,uBAAe,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC7D,KAAK,2BAA2B;gBAC5B,OAAO,IAAI,cAAM,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACpD,KAAK,qDAAqD;gBACtD,OAAO,IAAI,2BAAmB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACjE,KAAK,2BAA2B;gBAC5B,OAAO,IAAI,cAAM,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACpD,KAAK,6CAA6C;gBAC9C,OAAO,IAAI,uBAAe,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC7D,KAAK,2CAA2C;gBAC5C,OAAO,IAAI,sBAAc,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC5D,KAAK,yCAAyC;gBAC1C,OAAO,IAAI,qBAAa,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC3D,KAAK,6DAA6D;gBAC9D,OAAO,IAAI,+BAAuB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACrE,KAAK,iCAAiC;gBAClC,OAAO,IAAI,iBAAS,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACvD,KAAK,qDAAqD;gBACtD,OAAO,IAAI,2BAAmB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACjE,KAAK,yBAAyB;gBAC1B,OAAO,IAAI,aAAK,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACnD;gBACI,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,EAAE,CAAC,CAAC;SACxD;IACL,CAAC;CACJ,CAAC;AACF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,aAAa,EAAE,OAAO,CAAC,CAAA;AACtE,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,0BAA0B,EAAE,OAAO,CAAC,CAAA;AACnF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,mBAAmB,EAAE,OAAO,CAAC,CAAA;AAC5E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,2BAA2B,EAAE,OAAO,CAAC,CAAA;AACpF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,iBAAiB,EAAE,OAAO,CAAC,CAAA;AAC1E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,cAAc,EAAE,OAAO,CAAC,CAAA;AACvE,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,eAAe,EAAE,OAAO,CAAC,CAAA;AACxE,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,iBAAiB,EAAE,OAAO,CAAC,CAAA;AAC1E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,eAAe,EAAE,OAAO,CAAC,CAAA;AACxE,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,aAAa,EAAE,OAAO,CAAC,CAAA;AACtE,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,iBAAiB,EAAE,OAAO,CAAC,CAAA;AAC1E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,0BAA0B,EAAE,OAAO,CAAC,CAAA;AACnF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,uBAAuB,EAAE,OAAO,CAAC,CAAA;AAChF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,cAAc,EAAE,OAAO,CAAC,CAAA;AACvE,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,2BAA2B,EAAE,OAAO,CAAC,CAAA;AACpF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,cAAc,EAAE,OAAO,CAAC,CAAA;AACvE,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,uBAAuB,EAAE,OAAO,CAAC,CAAA;AAChF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,sBAAsB,EAAE,OAAO,CAAC,CAAA;AAC/E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,qBAAqB,EAAE,OAAO,CAAC,CAAA;AAC9E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,+BAA+B,EAAE,OAAO,CAAC,CAAA;AACxF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,iBAAiB,EAAE,OAAO,CAAC,CAAA;AAC1E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,2BAA2B,EAAE,OAAO,CAAC,CAAA;AACpF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,OAAO,EAAE,aAAa,EAAE,OAAO,CAAC,CAAA;AACtE,MAAM,CAAC,OAAO,CAAC,uBAAuB,CAAC,OAAO,EAAE;IAC5C,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE;IAC/B,iBAAiB,EAAE,CAAC,IAAY,EAAE,IAAY,EAAE,GAAW,EAA2B,EAAE;QACpF,IAAI,IAAI,KAAK,wBAAwB,EAAE;YACnC,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,EAAE,CAAC,CAAC;SACpD;QACD,OAAO,IAAI,mBAAQ,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAC;IACvD,CAAC;CACJ,CAAC,CAAC"}
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@pulumi/vault",
|
|
3
|
-
"version": "7.
|
|
3
|
+
"version": "7.1.0",
|
|
4
4
|
"description": "A Pulumi package for creating and managing HashiCorp Vault cloud resources.",
|
|
5
5
|
"keywords": [
|
|
6
6
|
"pulumi",
|
|
@@ -23,6 +23,6 @@
|
|
|
23
23
|
"pulumi": {
|
|
24
24
|
"resource": true,
|
|
25
25
|
"name": "vault",
|
|
26
|
-
"version": "7.
|
|
26
|
+
"version": "7.1.0"
|
|
27
27
|
}
|
|
28
28
|
}
|
|
@@ -0,0 +1,224 @@
|
|
|
1
|
+
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
import * as inputs from "../types/input";
|
|
3
|
+
import * as outputs from "../types/output";
|
|
4
|
+
/**
|
|
5
|
+
* Allows setting the SCEP configuration on a PKI Secret Backend.
|
|
6
|
+
*
|
|
7
|
+
* ## Example Usage
|
|
8
|
+
*
|
|
9
|
+
* ```typescript
|
|
10
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
11
|
+
* import * as vault from "@pulumi/vault";
|
|
12
|
+
*
|
|
13
|
+
* const scep = new vault.AuthBackend("scep", {
|
|
14
|
+
* path: "scep-auth",
|
|
15
|
+
* type: "scep",
|
|
16
|
+
* });
|
|
17
|
+
* const scepChallenge = new vault.ScepAuthBackendRole("scep_challenge", {
|
|
18
|
+
* backend: scep.id,
|
|
19
|
+
* name: "scep-auth",
|
|
20
|
+
* displayName: "Static challenge for SCEP clients",
|
|
21
|
+
* authType: "static-challenge",
|
|
22
|
+
* challenge: "ac7e4ada-c8ef-4393-9098-d69d08736833",
|
|
23
|
+
* });
|
|
24
|
+
* const pki = new vault.Mount("pki", {
|
|
25
|
+
* path: "pki_scep",
|
|
26
|
+
* type: "pki",
|
|
27
|
+
* description: "PKI secret engine mount",
|
|
28
|
+
* });
|
|
29
|
+
* const test = new vault.pkisecret.BackendConfigScep("test", {
|
|
30
|
+
* backend: pki.path,
|
|
31
|
+
* enabled: true,
|
|
32
|
+
* defaultPathPolicy: "sign-verbatim",
|
|
33
|
+
* restrictCaChainToIssuer: true,
|
|
34
|
+
* authenticators: {
|
|
35
|
+
* scep: {
|
|
36
|
+
* accessor: scep.accessor,
|
|
37
|
+
* scep_role: scepChallenge.name,
|
|
38
|
+
* },
|
|
39
|
+
* },
|
|
40
|
+
* });
|
|
41
|
+
* ```
|
|
42
|
+
*
|
|
43
|
+
* ## Import
|
|
44
|
+
*
|
|
45
|
+
* The PKI config cluster can be imported using the resource's `id`.
|
|
46
|
+
* In the case of the example above the `id` would be `pki-root/config/scep`,
|
|
47
|
+
* where the `pki-root` component is the resource's `backend`, e.g.
|
|
48
|
+
*
|
|
49
|
+
* ```sh
|
|
50
|
+
* $ pulumi import vault:pkiSecret/backendConfigScep:BackendConfigScep example pki-root/config/scep
|
|
51
|
+
* ```
|
|
52
|
+
*/
|
|
53
|
+
export declare class BackendConfigScep extends pulumi.CustomResource {
|
|
54
|
+
/**
|
|
55
|
+
* Get an existing BackendConfigScep resource's state with the given name, ID, and optional extra
|
|
56
|
+
* properties used to qualify the lookup.
|
|
57
|
+
*
|
|
58
|
+
* @param name The _unique_ name of the resulting resource.
|
|
59
|
+
* @param id The _unique_ provider ID of the resource to lookup.
|
|
60
|
+
* @param state Any extra arguments used during the lookup.
|
|
61
|
+
* @param opts Optional settings to control the behavior of the CustomResource.
|
|
62
|
+
*/
|
|
63
|
+
static get(name: string, id: pulumi.Input<pulumi.ID>, state?: BackendConfigScepState, opts?: pulumi.CustomResourceOptions): BackendConfigScep;
|
|
64
|
+
/**
|
|
65
|
+
* Returns true if the given object is an instance of BackendConfigScep. This is designed to work even
|
|
66
|
+
* when multiple copies of the Pulumi SDK have been loaded into the same process.
|
|
67
|
+
*/
|
|
68
|
+
static isInstance(obj: any): obj is BackendConfigScep;
|
|
69
|
+
/**
|
|
70
|
+
* List of allowed digest algorithms for SCEP requests.
|
|
71
|
+
*/
|
|
72
|
+
readonly allowedDigestAlgorithms: pulumi.Output<string[]>;
|
|
73
|
+
/**
|
|
74
|
+
* List of allowed encryption algorithms for SCEP requests.
|
|
75
|
+
*/
|
|
76
|
+
readonly allowedEncryptionAlgorithms: pulumi.Output<string[]>;
|
|
77
|
+
/**
|
|
78
|
+
* Lists the mount accessors SCEP should delegate authentication requests towards (see below for nested schema).
|
|
79
|
+
*/
|
|
80
|
+
readonly authenticators: pulumi.Output<outputs.pkiSecret.BackendConfigScepAuthenticators>;
|
|
81
|
+
/**
|
|
82
|
+
* The path to the PKI secret backend to
|
|
83
|
+
* read the SCEP configuration from, with no leading or trailing `/`s.
|
|
84
|
+
*/
|
|
85
|
+
readonly backend: pulumi.Output<string>;
|
|
86
|
+
/**
|
|
87
|
+
* Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
|
|
88
|
+
*/
|
|
89
|
+
readonly defaultPathPolicy: pulumi.Output<string | undefined>;
|
|
90
|
+
/**
|
|
91
|
+
* Specifies whether SCEP is enabled.
|
|
92
|
+
*/
|
|
93
|
+
readonly enabled: pulumi.Output<boolean | undefined>;
|
|
94
|
+
/**
|
|
95
|
+
* Lists the 3rd party validation of SCEP requests (see below for nested schema).
|
|
96
|
+
*/
|
|
97
|
+
readonly externalValidations: pulumi.Output<outputs.pkiSecret.BackendConfigScepExternalValidation[]>;
|
|
98
|
+
/**
|
|
99
|
+
* A read-only timestamp representing the last time the configuration was updated.
|
|
100
|
+
*/
|
|
101
|
+
readonly lastUpdated: pulumi.Output<string>;
|
|
102
|
+
/**
|
|
103
|
+
* The namespace of the target resource.
|
|
104
|
+
* The value should not contain leading or trailing forward slashes.
|
|
105
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
106
|
+
* *Available only for Vault Enterprise*.
|
|
107
|
+
*/
|
|
108
|
+
readonly namespace: pulumi.Output<string | undefined>;
|
|
109
|
+
/**
|
|
110
|
+
* If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
|
|
111
|
+
*
|
|
112
|
+
*
|
|
113
|
+
* <a id="nestedatt--authenticators"></a>
|
|
114
|
+
*/
|
|
115
|
+
readonly restrictCaChainToIssuer: pulumi.Output<boolean | undefined>;
|
|
116
|
+
/**
|
|
117
|
+
* Create a BackendConfigScep resource with the given unique name, arguments, and options.
|
|
118
|
+
*
|
|
119
|
+
* @param name The _unique_ name of the resource.
|
|
120
|
+
* @param args The arguments to use to populate this resource's properties.
|
|
121
|
+
* @param opts A bag of options that control this resource's behavior.
|
|
122
|
+
*/
|
|
123
|
+
constructor(name: string, args: BackendConfigScepArgs, opts?: pulumi.CustomResourceOptions);
|
|
124
|
+
}
|
|
125
|
+
/**
|
|
126
|
+
* Input properties used for looking up and filtering BackendConfigScep resources.
|
|
127
|
+
*/
|
|
128
|
+
export interface BackendConfigScepState {
|
|
129
|
+
/**
|
|
130
|
+
* List of allowed digest algorithms for SCEP requests.
|
|
131
|
+
*/
|
|
132
|
+
allowedDigestAlgorithms?: pulumi.Input<pulumi.Input<string>[]>;
|
|
133
|
+
/**
|
|
134
|
+
* List of allowed encryption algorithms for SCEP requests.
|
|
135
|
+
*/
|
|
136
|
+
allowedEncryptionAlgorithms?: pulumi.Input<pulumi.Input<string>[]>;
|
|
137
|
+
/**
|
|
138
|
+
* Lists the mount accessors SCEP should delegate authentication requests towards (see below for nested schema).
|
|
139
|
+
*/
|
|
140
|
+
authenticators?: pulumi.Input<inputs.pkiSecret.BackendConfigScepAuthenticators>;
|
|
141
|
+
/**
|
|
142
|
+
* The path to the PKI secret backend to
|
|
143
|
+
* read the SCEP configuration from, with no leading or trailing `/`s.
|
|
144
|
+
*/
|
|
145
|
+
backend?: pulumi.Input<string>;
|
|
146
|
+
/**
|
|
147
|
+
* Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
|
|
148
|
+
*/
|
|
149
|
+
defaultPathPolicy?: pulumi.Input<string>;
|
|
150
|
+
/**
|
|
151
|
+
* Specifies whether SCEP is enabled.
|
|
152
|
+
*/
|
|
153
|
+
enabled?: pulumi.Input<boolean>;
|
|
154
|
+
/**
|
|
155
|
+
* Lists the 3rd party validation of SCEP requests (see below for nested schema).
|
|
156
|
+
*/
|
|
157
|
+
externalValidations?: pulumi.Input<pulumi.Input<inputs.pkiSecret.BackendConfigScepExternalValidation>[]>;
|
|
158
|
+
/**
|
|
159
|
+
* A read-only timestamp representing the last time the configuration was updated.
|
|
160
|
+
*/
|
|
161
|
+
lastUpdated?: pulumi.Input<string>;
|
|
162
|
+
/**
|
|
163
|
+
* The namespace of the target resource.
|
|
164
|
+
* The value should not contain leading or trailing forward slashes.
|
|
165
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
166
|
+
* *Available only for Vault Enterprise*.
|
|
167
|
+
*/
|
|
168
|
+
namespace?: pulumi.Input<string>;
|
|
169
|
+
/**
|
|
170
|
+
* If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
|
|
171
|
+
*
|
|
172
|
+
*
|
|
173
|
+
* <a id="nestedatt--authenticators"></a>
|
|
174
|
+
*/
|
|
175
|
+
restrictCaChainToIssuer?: pulumi.Input<boolean>;
|
|
176
|
+
}
|
|
177
|
+
/**
|
|
178
|
+
* The set of arguments for constructing a BackendConfigScep resource.
|
|
179
|
+
*/
|
|
180
|
+
export interface BackendConfigScepArgs {
|
|
181
|
+
/**
|
|
182
|
+
* List of allowed digest algorithms for SCEP requests.
|
|
183
|
+
*/
|
|
184
|
+
allowedDigestAlgorithms?: pulumi.Input<pulumi.Input<string>[]>;
|
|
185
|
+
/**
|
|
186
|
+
* List of allowed encryption algorithms for SCEP requests.
|
|
187
|
+
*/
|
|
188
|
+
allowedEncryptionAlgorithms?: pulumi.Input<pulumi.Input<string>[]>;
|
|
189
|
+
/**
|
|
190
|
+
* Lists the mount accessors SCEP should delegate authentication requests towards (see below for nested schema).
|
|
191
|
+
*/
|
|
192
|
+
authenticators?: pulumi.Input<inputs.pkiSecret.BackendConfigScepAuthenticators>;
|
|
193
|
+
/**
|
|
194
|
+
* The path to the PKI secret backend to
|
|
195
|
+
* read the SCEP configuration from, with no leading or trailing `/`s.
|
|
196
|
+
*/
|
|
197
|
+
backend: pulumi.Input<string>;
|
|
198
|
+
/**
|
|
199
|
+
* Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
|
|
200
|
+
*/
|
|
201
|
+
defaultPathPolicy?: pulumi.Input<string>;
|
|
202
|
+
/**
|
|
203
|
+
* Specifies whether SCEP is enabled.
|
|
204
|
+
*/
|
|
205
|
+
enabled?: pulumi.Input<boolean>;
|
|
206
|
+
/**
|
|
207
|
+
* Lists the 3rd party validation of SCEP requests (see below for nested schema).
|
|
208
|
+
*/
|
|
209
|
+
externalValidations?: pulumi.Input<pulumi.Input<inputs.pkiSecret.BackendConfigScepExternalValidation>[]>;
|
|
210
|
+
/**
|
|
211
|
+
* The namespace of the target resource.
|
|
212
|
+
* The value should not contain leading or trailing forward slashes.
|
|
213
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
214
|
+
* *Available only for Vault Enterprise*.
|
|
215
|
+
*/
|
|
216
|
+
namespace?: pulumi.Input<string>;
|
|
217
|
+
/**
|
|
218
|
+
* If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
|
|
219
|
+
*
|
|
220
|
+
*
|
|
221
|
+
* <a id="nestedatt--authenticators"></a>
|
|
222
|
+
*/
|
|
223
|
+
restrictCaChainToIssuer?: pulumi.Input<boolean>;
|
|
224
|
+
}
|
|
@@ -0,0 +1,119 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
// *** WARNING: this file was generated by pulumi-language-nodejs. ***
|
|
3
|
+
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.BackendConfigScep = void 0;
|
|
6
|
+
const pulumi = require("@pulumi/pulumi");
|
|
7
|
+
const utilities = require("../utilities");
|
|
8
|
+
/**
|
|
9
|
+
* Allows setting the SCEP configuration on a PKI Secret Backend.
|
|
10
|
+
*
|
|
11
|
+
* ## Example Usage
|
|
12
|
+
*
|
|
13
|
+
* ```typescript
|
|
14
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
15
|
+
* import * as vault from "@pulumi/vault";
|
|
16
|
+
*
|
|
17
|
+
* const scep = new vault.AuthBackend("scep", {
|
|
18
|
+
* path: "scep-auth",
|
|
19
|
+
* type: "scep",
|
|
20
|
+
* });
|
|
21
|
+
* const scepChallenge = new vault.ScepAuthBackendRole("scep_challenge", {
|
|
22
|
+
* backend: scep.id,
|
|
23
|
+
* name: "scep-auth",
|
|
24
|
+
* displayName: "Static challenge for SCEP clients",
|
|
25
|
+
* authType: "static-challenge",
|
|
26
|
+
* challenge: "ac7e4ada-c8ef-4393-9098-d69d08736833",
|
|
27
|
+
* });
|
|
28
|
+
* const pki = new vault.Mount("pki", {
|
|
29
|
+
* path: "pki_scep",
|
|
30
|
+
* type: "pki",
|
|
31
|
+
* description: "PKI secret engine mount",
|
|
32
|
+
* });
|
|
33
|
+
* const test = new vault.pkisecret.BackendConfigScep("test", {
|
|
34
|
+
* backend: pki.path,
|
|
35
|
+
* enabled: true,
|
|
36
|
+
* defaultPathPolicy: "sign-verbatim",
|
|
37
|
+
* restrictCaChainToIssuer: true,
|
|
38
|
+
* authenticators: {
|
|
39
|
+
* scep: {
|
|
40
|
+
* accessor: scep.accessor,
|
|
41
|
+
* scep_role: scepChallenge.name,
|
|
42
|
+
* },
|
|
43
|
+
* },
|
|
44
|
+
* });
|
|
45
|
+
* ```
|
|
46
|
+
*
|
|
47
|
+
* ## Import
|
|
48
|
+
*
|
|
49
|
+
* The PKI config cluster can be imported using the resource's `id`.
|
|
50
|
+
* In the case of the example above the `id` would be `pki-root/config/scep`,
|
|
51
|
+
* where the `pki-root` component is the resource's `backend`, e.g.
|
|
52
|
+
*
|
|
53
|
+
* ```sh
|
|
54
|
+
* $ pulumi import vault:pkiSecret/backendConfigScep:BackendConfigScep example pki-root/config/scep
|
|
55
|
+
* ```
|
|
56
|
+
*/
|
|
57
|
+
class BackendConfigScep extends pulumi.CustomResource {
|
|
58
|
+
/**
|
|
59
|
+
* Get an existing BackendConfigScep resource's state with the given name, ID, and optional extra
|
|
60
|
+
* properties used to qualify the lookup.
|
|
61
|
+
*
|
|
62
|
+
* @param name The _unique_ name of the resulting resource.
|
|
63
|
+
* @param id The _unique_ provider ID of the resource to lookup.
|
|
64
|
+
* @param state Any extra arguments used during the lookup.
|
|
65
|
+
* @param opts Optional settings to control the behavior of the CustomResource.
|
|
66
|
+
*/
|
|
67
|
+
static get(name, id, state, opts) {
|
|
68
|
+
return new BackendConfigScep(name, state, Object.assign(Object.assign({}, opts), { id: id }));
|
|
69
|
+
}
|
|
70
|
+
/**
|
|
71
|
+
* Returns true if the given object is an instance of BackendConfigScep. This is designed to work even
|
|
72
|
+
* when multiple copies of the Pulumi SDK have been loaded into the same process.
|
|
73
|
+
*/
|
|
74
|
+
static isInstance(obj) {
|
|
75
|
+
if (obj === undefined || obj === null) {
|
|
76
|
+
return false;
|
|
77
|
+
}
|
|
78
|
+
return obj['__pulumiType'] === BackendConfigScep.__pulumiType;
|
|
79
|
+
}
|
|
80
|
+
constructor(name, argsOrState, opts) {
|
|
81
|
+
let resourceInputs = {};
|
|
82
|
+
opts = opts || {};
|
|
83
|
+
if (opts.id) {
|
|
84
|
+
const state = argsOrState;
|
|
85
|
+
resourceInputs["allowedDigestAlgorithms"] = state ? state.allowedDigestAlgorithms : undefined;
|
|
86
|
+
resourceInputs["allowedEncryptionAlgorithms"] = state ? state.allowedEncryptionAlgorithms : undefined;
|
|
87
|
+
resourceInputs["authenticators"] = state ? state.authenticators : undefined;
|
|
88
|
+
resourceInputs["backend"] = state ? state.backend : undefined;
|
|
89
|
+
resourceInputs["defaultPathPolicy"] = state ? state.defaultPathPolicy : undefined;
|
|
90
|
+
resourceInputs["enabled"] = state ? state.enabled : undefined;
|
|
91
|
+
resourceInputs["externalValidations"] = state ? state.externalValidations : undefined;
|
|
92
|
+
resourceInputs["lastUpdated"] = state ? state.lastUpdated : undefined;
|
|
93
|
+
resourceInputs["namespace"] = state ? state.namespace : undefined;
|
|
94
|
+
resourceInputs["restrictCaChainToIssuer"] = state ? state.restrictCaChainToIssuer : undefined;
|
|
95
|
+
}
|
|
96
|
+
else {
|
|
97
|
+
const args = argsOrState;
|
|
98
|
+
if ((!args || args.backend === undefined) && !opts.urn) {
|
|
99
|
+
throw new Error("Missing required property 'backend'");
|
|
100
|
+
}
|
|
101
|
+
resourceInputs["allowedDigestAlgorithms"] = args ? args.allowedDigestAlgorithms : undefined;
|
|
102
|
+
resourceInputs["allowedEncryptionAlgorithms"] = args ? args.allowedEncryptionAlgorithms : undefined;
|
|
103
|
+
resourceInputs["authenticators"] = args ? args.authenticators : undefined;
|
|
104
|
+
resourceInputs["backend"] = args ? args.backend : undefined;
|
|
105
|
+
resourceInputs["defaultPathPolicy"] = args ? args.defaultPathPolicy : undefined;
|
|
106
|
+
resourceInputs["enabled"] = args ? args.enabled : undefined;
|
|
107
|
+
resourceInputs["externalValidations"] = args ? args.externalValidations : undefined;
|
|
108
|
+
resourceInputs["namespace"] = args ? args.namespace : undefined;
|
|
109
|
+
resourceInputs["restrictCaChainToIssuer"] = args ? args.restrictCaChainToIssuer : undefined;
|
|
110
|
+
resourceInputs["lastUpdated"] = undefined /*out*/;
|
|
111
|
+
}
|
|
112
|
+
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
113
|
+
super(BackendConfigScep.__pulumiType, name, resourceInputs, opts);
|
|
114
|
+
}
|
|
115
|
+
}
|
|
116
|
+
exports.BackendConfigScep = BackendConfigScep;
|
|
117
|
+
/** @internal */
|
|
118
|
+
BackendConfigScep.__pulumiType = 'vault:pkiSecret/backendConfigScep:BackendConfigScep';
|
|
119
|
+
//# sourceMappingURL=backendConfigScep.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"backendConfigScep.js","sourceRoot":"","sources":["../../pkisecret/backendConfigScep.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAgDG;AACH,MAAa,iBAAkB,SAAQ,MAAM,CAAC,cAAc;IACxD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA8B,EAAE,IAAmC;QAC5H,OAAO,IAAI,iBAAiB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACxE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,iBAAiB,CAAC,YAAY,CAAC;IAClE,CAAC;IA0DD,YAAY,IAAY,EAAE,WAA4D,EAAE,IAAmC;QACvH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAiD,CAAC;YAChE,cAAc,CAAC,yBAAyB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,6BAA6B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,2BAA2B,CAAC,CAAC,CAAC,SAAS,CAAC;YACtG,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,yBAAyB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;SACjG;aAAM;YACH,MAAM,IAAI,GAAG,WAAgD,CAAC;YAC9D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,yBAAyB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,6BAA6B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,2BAA2B,CAAC,CAAC,CAAC,SAAS,CAAC;YACpG,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,yBAAyB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,aAAa,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACrD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,iBAAiB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACtE,CAAC;;AArHL,8CAsHC;AAxGG,gBAAgB;AACO,8BAAY,GAAG,qDAAqD,CAAC"}
|
|
@@ -0,0 +1,115 @@
|
|
|
1
|
+
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
import * as outputs from "../types/output";
|
|
3
|
+
/**
|
|
4
|
+
* ## Example Usage
|
|
5
|
+
*
|
|
6
|
+
* ```typescript
|
|
7
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
8
|
+
* import * as vault from "@pulumi/vault";
|
|
9
|
+
*
|
|
10
|
+
* const pki = new vault.Mount("pki", {
|
|
11
|
+
* path: "pki",
|
|
12
|
+
* type: "pki",
|
|
13
|
+
* description: "PKI secret engine mount",
|
|
14
|
+
* });
|
|
15
|
+
* const scepConfig = vault.pkiSecret.getBackendConfigScepOutput({
|
|
16
|
+
* backend: pki.path,
|
|
17
|
+
* });
|
|
18
|
+
* ```
|
|
19
|
+
*/
|
|
20
|
+
export declare function getBackendConfigScep(args: GetBackendConfigScepArgs, opts?: pulumi.InvokeOptions): Promise<GetBackendConfigScepResult>;
|
|
21
|
+
/**
|
|
22
|
+
* A collection of arguments for invoking getBackendConfigScep.
|
|
23
|
+
*/
|
|
24
|
+
export interface GetBackendConfigScepArgs {
|
|
25
|
+
/**
|
|
26
|
+
* The path to the PKI secret backend to
|
|
27
|
+
* read the SCEP configuration from, with no leading or trailing `/`s.
|
|
28
|
+
*/
|
|
29
|
+
backend: string;
|
|
30
|
+
/**
|
|
31
|
+
* The namespace of the target resource.
|
|
32
|
+
* The value should not contain leading or trailing forward slashes.
|
|
33
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
34
|
+
* *Available only for Vault Enterprise*.
|
|
35
|
+
*/
|
|
36
|
+
namespace?: string;
|
|
37
|
+
}
|
|
38
|
+
/**
|
|
39
|
+
* A collection of values returned by getBackendConfigScep.
|
|
40
|
+
*/
|
|
41
|
+
export interface GetBackendConfigScepResult {
|
|
42
|
+
/**
|
|
43
|
+
* List of allowed digest algorithms for SCEP requests.
|
|
44
|
+
*/
|
|
45
|
+
readonly allowedDigestAlgorithms: string[];
|
|
46
|
+
/**
|
|
47
|
+
* List of allowed encryption algorithms for SCEP requests.
|
|
48
|
+
*/
|
|
49
|
+
readonly allowedEncryptionAlgorithms: string[];
|
|
50
|
+
/**
|
|
51
|
+
* Lists the mount accessors SCEP should delegate authentication requests towards (see below for nested schema).
|
|
52
|
+
*/
|
|
53
|
+
readonly authenticators: outputs.pkiSecret.GetBackendConfigScepAuthenticator[];
|
|
54
|
+
readonly backend: string;
|
|
55
|
+
/**
|
|
56
|
+
* Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
|
|
57
|
+
*/
|
|
58
|
+
readonly defaultPathPolicy: string;
|
|
59
|
+
/**
|
|
60
|
+
* Specifies whether SCEP is enabled.
|
|
61
|
+
*/
|
|
62
|
+
readonly enabled: boolean;
|
|
63
|
+
/**
|
|
64
|
+
* Lists the 3rd party validation of SCEP requests (see below for nested schema).
|
|
65
|
+
*/
|
|
66
|
+
readonly externalValidations: outputs.pkiSecret.GetBackendConfigScepExternalValidation[];
|
|
67
|
+
/**
|
|
68
|
+
* The provider-assigned unique ID for this managed resource.
|
|
69
|
+
*/
|
|
70
|
+
readonly id: string;
|
|
71
|
+
/**
|
|
72
|
+
* A read-only timestamp representing the last time the configuration was updated.
|
|
73
|
+
*/
|
|
74
|
+
readonly lastUpdated: string;
|
|
75
|
+
readonly namespace?: string;
|
|
76
|
+
/**
|
|
77
|
+
* If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
|
|
78
|
+
*/
|
|
79
|
+
readonly restrictCaChainToIssuer: boolean;
|
|
80
|
+
}
|
|
81
|
+
/**
|
|
82
|
+
* ## Example Usage
|
|
83
|
+
*
|
|
84
|
+
* ```typescript
|
|
85
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
86
|
+
* import * as vault from "@pulumi/vault";
|
|
87
|
+
*
|
|
88
|
+
* const pki = new vault.Mount("pki", {
|
|
89
|
+
* path: "pki",
|
|
90
|
+
* type: "pki",
|
|
91
|
+
* description: "PKI secret engine mount",
|
|
92
|
+
* });
|
|
93
|
+
* const scepConfig = vault.pkiSecret.getBackendConfigScepOutput({
|
|
94
|
+
* backend: pki.path,
|
|
95
|
+
* });
|
|
96
|
+
* ```
|
|
97
|
+
*/
|
|
98
|
+
export declare function getBackendConfigScepOutput(args: GetBackendConfigScepOutputArgs, opts?: pulumi.InvokeOutputOptions): pulumi.Output<GetBackendConfigScepResult>;
|
|
99
|
+
/**
|
|
100
|
+
* A collection of arguments for invoking getBackendConfigScep.
|
|
101
|
+
*/
|
|
102
|
+
export interface GetBackendConfigScepOutputArgs {
|
|
103
|
+
/**
|
|
104
|
+
* The path to the PKI secret backend to
|
|
105
|
+
* read the SCEP configuration from, with no leading or trailing `/`s.
|
|
106
|
+
*/
|
|
107
|
+
backend: pulumi.Input<string>;
|
|
108
|
+
/**
|
|
109
|
+
* The namespace of the target resource.
|
|
110
|
+
* The value should not contain leading or trailing forward slashes.
|
|
111
|
+
* The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
112
|
+
* *Available only for Vault Enterprise*.
|
|
113
|
+
*/
|
|
114
|
+
namespace?: pulumi.Input<string>;
|
|
115
|
+
}
|