@pulumi/vault 7.8.0-alpha.1774890918 → 7.8.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/database/secretBackendConnection.d.ts +36 -46
- package/database/secretBackendConnection.js +6 -46
- package/database/secretBackendConnection.js.map +1 -1
- package/database/secretBackendStaticRole.d.ts +1 -1
- package/database/secretsMount.d.ts +9 -3
- package/database/secretsMount.js +6 -0
- package/database/secretsMount.js.map +1 -1
- package/kmip/secretBackend.d.ts +1 -1
- package/kmip/secretRole.d.ts +12 -0
- package/kmip/secretRole.js +2 -0
- package/kmip/secretRole.js.map +1 -1
- package/kubernetes/secretBackendRole.d.ts +19 -0
- package/kubernetes/secretBackendRole.js +3 -0
- package/kubernetes/secretBackendRole.js.map +1 -1
- package/ldap/authBackend.d.ts +1 -1
- package/managed/keys.d.ts +42 -0
- package/managed/keys.js +32 -0
- package/managed/keys.js.map +1 -1
- package/okta/authBackend.d.ts +97 -8
- package/okta/authBackend.js +17 -4
- package/okta/authBackend.js.map +1 -1
- package/package.json +2 -2
- package/pkisecret/secretBackendCert.d.ts +12 -0
- package/pkisecret/secretBackendCert.js +2 -0
- package/pkisecret/secretBackendCert.js.map +1 -1
- package/pkisecret/secretBackendRootCert.d.ts +24 -0
- package/pkisecret/secretBackendRootCert.js +4 -0
- package/pkisecret/secretBackendRootCert.js.map +1 -1
- package/pkisecret/secretBackendRootSignIntermediate.d.ts +3 -3
- package/pkisecret/secretBackendSign.d.ts +12 -0
- package/pkisecret/secretBackendSign.js +2 -0
- package/pkisecret/secretBackendSign.js.map +1 -1
- package/raftSnapshotAgentConfig.d.ts +74 -4
- package/raftSnapshotAgentConfig.js +32 -1
- package/raftSnapshotAgentConfig.js.map +1 -1
- package/secrets/syncAwsDestination.d.ts +85 -0
- package/secrets/syncAwsDestination.js +30 -1
- package/secrets/syncAwsDestination.js.map +1 -1
- package/secrets/syncAzureDestination.d.ts +118 -31
- package/secrets/syncAzureDestination.js +51 -8
- package/secrets/syncAzureDestination.js.map +1 -1
- package/secrets/syncGcpDestination.d.ts +96 -0
- package/secrets/syncGcpDestination.js +31 -1
- package/secrets/syncGcpDestination.js.map +1 -1
- package/ssh/secretBackendRole.d.ts +45 -0
- package/ssh/secretBackendRole.js +6 -0
- package/ssh/secretBackendRole.js.map +1 -1
- package/types/input.d.ts +276 -2
- package/types/output.d.ts +276 -2
|
@@ -39,52 +39,6 @@ import * as outputs from "../types/output";
|
|
|
39
39
|
* });
|
|
40
40
|
* ```
|
|
41
41
|
*
|
|
42
|
-
* ### Oracle Connection with Self-Managed Mode (Rootless)
|
|
43
|
-
*
|
|
44
|
-
* For Vault 1.18+ Enterprise, you can configure Oracle connections in self-managed mode,
|
|
45
|
-
* which allows a static role to manage its own database credentials without requiring root access:
|
|
46
|
-
*
|
|
47
|
-
* ```typescript
|
|
48
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
49
|
-
* import * as vault from "@pulumi/vault";
|
|
50
|
-
*
|
|
51
|
-
* const db = new vault.Mount("db", {
|
|
52
|
-
* path: "database",
|
|
53
|
-
* type: "database",
|
|
54
|
-
* });
|
|
55
|
-
* const oracle = new vault.database.SecretBackendConnection("oracle", {
|
|
56
|
-
* backend: db.path,
|
|
57
|
-
* name: "oracle",
|
|
58
|
-
* allowedRoles: ["my-role"],
|
|
59
|
-
* oracle: {
|
|
60
|
-
* connectionUrl: "{{username}}/{{password}}@//host:port/service",
|
|
61
|
-
* selfManaged: true,
|
|
62
|
-
* pluginName: "vault-plugin-database-oracle",
|
|
63
|
-
* },
|
|
64
|
-
* });
|
|
65
|
-
* const oracleRole = new vault.database.SecretBackendStaticRole("oracle_role", {
|
|
66
|
-
* backend: db.path,
|
|
67
|
-
* name: "my-role",
|
|
68
|
-
* dbName: oracle.name,
|
|
69
|
-
* username: "vault_user",
|
|
70
|
-
* passwordWo: "initial-password",
|
|
71
|
-
* passwordWoVersion: 1,
|
|
72
|
-
* rotationPeriod: 3600,
|
|
73
|
-
* });
|
|
74
|
-
* ```
|
|
75
|
-
*
|
|
76
|
-
* ## Ephemeral Attributes Reference
|
|
77
|
-
*
|
|
78
|
-
* The following write-only attributes are supported for all DBs that support username/password:
|
|
79
|
-
*
|
|
80
|
-
* * `passwordWo` - (Optional) The password for the user. Can be updated.
|
|
81
|
-
* **Note**: This property is write-only and will not be read from the API.
|
|
82
|
-
*
|
|
83
|
-
* The following write-only attribute is supported only for Snowflake DB:
|
|
84
|
-
*
|
|
85
|
-
* * `privateKeyWo` - (Optional) The private key associated with the Snowflake user.
|
|
86
|
-
* **Note**: This property is write-only and will not be read from the API.
|
|
87
|
-
*
|
|
88
42
|
* ## Import
|
|
89
43
|
*
|
|
90
44
|
* Database secret backend connections can be imported using the `backend`, `/config/`, and the `name` e.g.
|
|
@@ -191,10 +145,18 @@ export declare class SecretBackendConnection extends pulumi.CustomResource {
|
|
|
191
145
|
* A nested block containing configuration options for Oracle connections.
|
|
192
146
|
*/
|
|
193
147
|
readonly oracle: pulumi.Output<outputs.database.SecretBackendConnectionOracle | undefined>;
|
|
148
|
+
/**
|
|
149
|
+
* The name of the password policy to use when generating passwords for this database. If not specified, this will use a default policy defined as: 20 characters with at least 1 uppercase, 1 lowercase, 1 number, and 1 dash character.
|
|
150
|
+
*/
|
|
151
|
+
readonly passwordPolicy: pulumi.Output<string | undefined>;
|
|
194
152
|
/**
|
|
195
153
|
* Specifies the name of the plugin to use.
|
|
196
154
|
*/
|
|
197
155
|
readonly pluginName: pulumi.Output<string>;
|
|
156
|
+
/**
|
|
157
|
+
* Specifies the semantic version of the plugin to use for this connection.
|
|
158
|
+
*/
|
|
159
|
+
readonly pluginVersion: pulumi.Output<string | undefined>;
|
|
198
160
|
/**
|
|
199
161
|
* A nested block containing configuration options for PostgreSQL connections.
|
|
200
162
|
*/
|
|
@@ -233,6 +195,10 @@ export declare class SecretBackendConnection extends pulumi.CustomResource {
|
|
|
233
195
|
* unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
|
234
196
|
*/
|
|
235
197
|
readonly rotationWindow: pulumi.Output<number | undefined>;
|
|
198
|
+
/**
|
|
199
|
+
* Specifies if a given static account's password should be rotated on creation of the static roles associated with this database config. This can be overridden at the role-level by the static role's skipImportRotation field. The default is false. Requires Vault Enterprise 1.19+.
|
|
200
|
+
*/
|
|
201
|
+
readonly skipStaticRoleImportRotation: pulumi.Output<boolean>;
|
|
236
202
|
/**
|
|
237
203
|
* A nested block containing configuration options for Snowflake connections.
|
|
238
204
|
*/
|
|
@@ -337,10 +303,18 @@ export interface SecretBackendConnectionState {
|
|
|
337
303
|
* A nested block containing configuration options for Oracle connections.
|
|
338
304
|
*/
|
|
339
305
|
oracle?: pulumi.Input<inputs.database.SecretBackendConnectionOracle>;
|
|
306
|
+
/**
|
|
307
|
+
* The name of the password policy to use when generating passwords for this database. If not specified, this will use a default policy defined as: 20 characters with at least 1 uppercase, 1 lowercase, 1 number, and 1 dash character.
|
|
308
|
+
*/
|
|
309
|
+
passwordPolicy?: pulumi.Input<string>;
|
|
340
310
|
/**
|
|
341
311
|
* Specifies the name of the plugin to use.
|
|
342
312
|
*/
|
|
343
313
|
pluginName?: pulumi.Input<string>;
|
|
314
|
+
/**
|
|
315
|
+
* Specifies the semantic version of the plugin to use for this connection.
|
|
316
|
+
*/
|
|
317
|
+
pluginVersion?: pulumi.Input<string>;
|
|
344
318
|
/**
|
|
345
319
|
* A nested block containing configuration options for PostgreSQL connections.
|
|
346
320
|
*/
|
|
@@ -379,6 +353,10 @@ export interface SecretBackendConnectionState {
|
|
|
379
353
|
* unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
|
380
354
|
*/
|
|
381
355
|
rotationWindow?: pulumi.Input<number>;
|
|
356
|
+
/**
|
|
357
|
+
* Specifies if a given static account's password should be rotated on creation of the static roles associated with this database config. This can be overridden at the role-level by the static role's skipImportRotation field. The default is false. Requires Vault Enterprise 1.19+.
|
|
358
|
+
*/
|
|
359
|
+
skipStaticRoleImportRotation?: pulumi.Input<boolean>;
|
|
382
360
|
/**
|
|
383
361
|
* A nested block containing configuration options for Snowflake connections.
|
|
384
362
|
*/
|
|
@@ -475,10 +453,18 @@ export interface SecretBackendConnectionArgs {
|
|
|
475
453
|
* A nested block containing configuration options for Oracle connections.
|
|
476
454
|
*/
|
|
477
455
|
oracle?: pulumi.Input<inputs.database.SecretBackendConnectionOracle>;
|
|
456
|
+
/**
|
|
457
|
+
* The name of the password policy to use when generating passwords for this database. If not specified, this will use a default policy defined as: 20 characters with at least 1 uppercase, 1 lowercase, 1 number, and 1 dash character.
|
|
458
|
+
*/
|
|
459
|
+
passwordPolicy?: pulumi.Input<string>;
|
|
478
460
|
/**
|
|
479
461
|
* Specifies the name of the plugin to use.
|
|
480
462
|
*/
|
|
481
463
|
pluginName?: pulumi.Input<string>;
|
|
464
|
+
/**
|
|
465
|
+
* Specifies the semantic version of the plugin to use for this connection.
|
|
466
|
+
*/
|
|
467
|
+
pluginVersion?: pulumi.Input<string>;
|
|
482
468
|
/**
|
|
483
469
|
* A nested block containing configuration options for PostgreSQL connections.
|
|
484
470
|
*/
|
|
@@ -517,6 +503,10 @@ export interface SecretBackendConnectionArgs {
|
|
|
517
503
|
* unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
|
|
518
504
|
*/
|
|
519
505
|
rotationWindow?: pulumi.Input<number>;
|
|
506
|
+
/**
|
|
507
|
+
* Specifies if a given static account's password should be rotated on creation of the static roles associated with this database config. This can be overridden at the role-level by the static role's skipImportRotation field. The default is false. Requires Vault Enterprise 1.19+.
|
|
508
|
+
*/
|
|
509
|
+
skipStaticRoleImportRotation?: pulumi.Input<boolean>;
|
|
520
510
|
/**
|
|
521
511
|
* A nested block containing configuration options for Snowflake connections.
|
|
522
512
|
*/
|
|
@@ -43,52 +43,6 @@ const utilities = require("../utilities");
|
|
|
43
43
|
* });
|
|
44
44
|
* ```
|
|
45
45
|
*
|
|
46
|
-
* ### Oracle Connection with Self-Managed Mode (Rootless)
|
|
47
|
-
*
|
|
48
|
-
* For Vault 1.18+ Enterprise, you can configure Oracle connections in self-managed mode,
|
|
49
|
-
* which allows a static role to manage its own database credentials without requiring root access:
|
|
50
|
-
*
|
|
51
|
-
* ```typescript
|
|
52
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
53
|
-
* import * as vault from "@pulumi/vault";
|
|
54
|
-
*
|
|
55
|
-
* const db = new vault.Mount("db", {
|
|
56
|
-
* path: "database",
|
|
57
|
-
* type: "database",
|
|
58
|
-
* });
|
|
59
|
-
* const oracle = new vault.database.SecretBackendConnection("oracle", {
|
|
60
|
-
* backend: db.path,
|
|
61
|
-
* name: "oracle",
|
|
62
|
-
* allowedRoles: ["my-role"],
|
|
63
|
-
* oracle: {
|
|
64
|
-
* connectionUrl: "{{username}}/{{password}}@//host:port/service",
|
|
65
|
-
* selfManaged: true,
|
|
66
|
-
* pluginName: "vault-plugin-database-oracle",
|
|
67
|
-
* },
|
|
68
|
-
* });
|
|
69
|
-
* const oracleRole = new vault.database.SecretBackendStaticRole("oracle_role", {
|
|
70
|
-
* backend: db.path,
|
|
71
|
-
* name: "my-role",
|
|
72
|
-
* dbName: oracle.name,
|
|
73
|
-
* username: "vault_user",
|
|
74
|
-
* passwordWo: "initial-password",
|
|
75
|
-
* passwordWoVersion: 1,
|
|
76
|
-
* rotationPeriod: 3600,
|
|
77
|
-
* });
|
|
78
|
-
* ```
|
|
79
|
-
*
|
|
80
|
-
* ## Ephemeral Attributes Reference
|
|
81
|
-
*
|
|
82
|
-
* The following write-only attributes are supported for all DBs that support username/password:
|
|
83
|
-
*
|
|
84
|
-
* * `passwordWo` - (Optional) The password for the user. Can be updated.
|
|
85
|
-
* **Note**: This property is write-only and will not be read from the API.
|
|
86
|
-
*
|
|
87
|
-
* The following write-only attribute is supported only for Snowflake DB:
|
|
88
|
-
*
|
|
89
|
-
* * `privateKeyWo` - (Optional) The private key associated with the Snowflake user.
|
|
90
|
-
* **Note**: This property is write-only and will not be read from the API.
|
|
91
|
-
*
|
|
92
46
|
* ## Import
|
|
93
47
|
*
|
|
94
48
|
* Database secret backend connections can be imported using the `backend`, `/config/`, and the `name` e.g.
|
|
@@ -144,7 +98,9 @@ class SecretBackendConnection extends pulumi.CustomResource {
|
|
|
144
98
|
resourceInputs["name"] = state?.name;
|
|
145
99
|
resourceInputs["namespace"] = state?.namespace;
|
|
146
100
|
resourceInputs["oracle"] = state?.oracle;
|
|
101
|
+
resourceInputs["passwordPolicy"] = state?.passwordPolicy;
|
|
147
102
|
resourceInputs["pluginName"] = state?.pluginName;
|
|
103
|
+
resourceInputs["pluginVersion"] = state?.pluginVersion;
|
|
148
104
|
resourceInputs["postgresql"] = state?.postgresql;
|
|
149
105
|
resourceInputs["redis"] = state?.redis;
|
|
150
106
|
resourceInputs["redisElasticache"] = state?.redisElasticache;
|
|
@@ -153,6 +109,7 @@ class SecretBackendConnection extends pulumi.CustomResource {
|
|
|
153
109
|
resourceInputs["rotationPeriod"] = state?.rotationPeriod;
|
|
154
110
|
resourceInputs["rotationSchedule"] = state?.rotationSchedule;
|
|
155
111
|
resourceInputs["rotationWindow"] = state?.rotationWindow;
|
|
112
|
+
resourceInputs["skipStaticRoleImportRotation"] = state?.skipStaticRoleImportRotation;
|
|
156
113
|
resourceInputs["snowflake"] = state?.snowflake;
|
|
157
114
|
resourceInputs["verifyConnection"] = state?.verifyConnection;
|
|
158
115
|
}
|
|
@@ -180,7 +137,9 @@ class SecretBackendConnection extends pulumi.CustomResource {
|
|
|
180
137
|
resourceInputs["name"] = args?.name;
|
|
181
138
|
resourceInputs["namespace"] = args?.namespace;
|
|
182
139
|
resourceInputs["oracle"] = args?.oracle;
|
|
140
|
+
resourceInputs["passwordPolicy"] = args?.passwordPolicy;
|
|
183
141
|
resourceInputs["pluginName"] = args?.pluginName;
|
|
142
|
+
resourceInputs["pluginVersion"] = args?.pluginVersion;
|
|
184
143
|
resourceInputs["postgresql"] = args?.postgresql;
|
|
185
144
|
resourceInputs["redis"] = args?.redis;
|
|
186
145
|
resourceInputs["redisElasticache"] = args?.redisElasticache;
|
|
@@ -189,6 +148,7 @@ class SecretBackendConnection extends pulumi.CustomResource {
|
|
|
189
148
|
resourceInputs["rotationPeriod"] = args?.rotationPeriod;
|
|
190
149
|
resourceInputs["rotationSchedule"] = args?.rotationSchedule;
|
|
191
150
|
resourceInputs["rotationWindow"] = args?.rotationWindow;
|
|
151
|
+
resourceInputs["skipStaticRoleImportRotation"] = args?.skipStaticRoleImportRotation;
|
|
192
152
|
resourceInputs["snowflake"] = args?.snowflake;
|
|
193
153
|
resourceInputs["verifyConnection"] = args?.verifyConnection;
|
|
194
154
|
}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretBackendConnection.js","sourceRoot":"","sources":["../../database/secretBackendConnection.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"secretBackendConnection.js","sourceRoot":"","sources":["../../database/secretBackendConnection.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA6CG;AACH,MAAa,uBAAwB,SAAQ,MAAM,CAAC,cAAc;IAC9D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAoC,EAAE,IAAmC;QAClI,OAAO,IAAI,uBAAuB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC9E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,uBAAuB,CAAC,YAAY,CAAC;IACxE,CAAC;IA0JD,YAAY,IAAY,EAAE,WAAwE,EAAE,IAAmC;QACnI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAuD,CAAC;YACtE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,0BAA0B,CAAC,GAAG,KAAK,EAAE,wBAAwB,CAAC;YAC7E,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,EAAE,aAAa,CAAC;YACvD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;YACzC,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,EAAE,aAAa,CAAC;YACvD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,EAAE,gBAAgB,CAAC;YAC7D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,EAAE,sBAAsB,CAAC;YACzE,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,EAAE,gBAAgB,CAAC;YAC7D,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,8BAA8B,CAAC,GAAG,KAAK,EAAE,4BAA4B,CAAC;YACrF,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,EAAE,gBAAgB,CAAC;SAChE;aAAM;YACH,MAAM,IAAI,GAAG,WAAsD,CAAC;YACpE,IAAI,IAAI,EAAE,OAAO,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1C,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,0BAA0B,CAAC,GAAG,IAAI,EAAE,wBAAwB,CAAC;YAC5E,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,EAAE,aAAa,CAAC;YACtD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC;YACtC,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC;YACtC,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;YACxC,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC;YACxD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,EAAE,aAAa,CAAC;YACtD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC;YACtC,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,EAAE,gBAAgB,CAAC;YAC5D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,EAAE,sBAAsB,CAAC;YACxE,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC;YACxD,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,EAAE,gBAAgB,CAAC;YAC5D,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC;YACxD,cAAc,CAAC,8BAA8B,CAAC,GAAG,IAAI,EAAE,4BAA4B,CAAC;YACpF,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,EAAE,gBAAgB,CAAC;SAC/D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,uBAAuB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC5E,CAAC;;AAnQL,0DAoQC;AAtPG,gBAAgB;AACO,oCAAY,GAAG,gEAAgE,CAAC"}
|
|
@@ -153,7 +153,7 @@ export declare class SecretBackendStaticRole extends pulumi.CustomResource {
|
|
|
153
153
|
* If set to true, Vault will skip the
|
|
154
154
|
* initial secret rotation on import. Requires Vault 1.18+ Enterprise.
|
|
155
155
|
*/
|
|
156
|
-
readonly skipImportRotation: pulumi.Output<boolean
|
|
156
|
+
readonly skipImportRotation: pulumi.Output<boolean>;
|
|
157
157
|
/**
|
|
158
158
|
* The database username that this static role corresponds to.
|
|
159
159
|
*/
|
|
@@ -32,6 +32,9 @@ import * as outputs from "../types/output";
|
|
|
32
32
|
* password: "super_secret_1",
|
|
33
33
|
* connectionUrl: "sqlserver://{{username}}:{{password}}@127.0.0.1:1433",
|
|
34
34
|
* allowedRoles: ["dev1"],
|
|
35
|
+
* pluginVersion: "v0.20.0",
|
|
36
|
+
* skipStaticRoleImportRotation: true,
|
|
37
|
+
* passwordPolicy: "default",
|
|
35
38
|
* rotationSchedule: "0 * * * SAT",
|
|
36
39
|
* rotationWindow: 3600,
|
|
37
40
|
* }],
|
|
@@ -42,6 +45,9 @@ import * as outputs from "../types/output";
|
|
|
42
45
|
* connectionUrl: "postgresql://{{username}}:{{password}}@127.0.0.1:5432/postgres",
|
|
43
46
|
* verifyConnection: true,
|
|
44
47
|
* allowedRoles: ["dev2"],
|
|
48
|
+
* pluginVersion: "v0.19.0",
|
|
49
|
+
* skipStaticRoleImportRotation: true,
|
|
50
|
+
* passwordPolicy: "default",
|
|
45
51
|
* rotationSchedule: "0 * * * SAT",
|
|
46
52
|
* rotationWindow: 3600,
|
|
47
53
|
* }],
|
|
@@ -244,7 +250,7 @@ export declare class SecretsMount extends pulumi.CustomResource {
|
|
|
244
250
|
*/
|
|
245
251
|
readonly path: pulumi.Output<string>;
|
|
246
252
|
/**
|
|
247
|
-
* Specifies the semantic version of the plugin to use
|
|
253
|
+
* Specifies the semantic version of the plugin to use for this connection.
|
|
248
254
|
*/
|
|
249
255
|
readonly pluginVersion: pulumi.Output<string | undefined>;
|
|
250
256
|
/**
|
|
@@ -435,7 +441,7 @@ export interface SecretsMountState {
|
|
|
435
441
|
*/
|
|
436
442
|
path?: pulumi.Input<string>;
|
|
437
443
|
/**
|
|
438
|
-
* Specifies the semantic version of the plugin to use
|
|
444
|
+
* Specifies the semantic version of the plugin to use for this connection.
|
|
439
445
|
*/
|
|
440
446
|
pluginVersion?: pulumi.Input<string>;
|
|
441
447
|
/**
|
|
@@ -610,7 +616,7 @@ export interface SecretsMountArgs {
|
|
|
610
616
|
*/
|
|
611
617
|
path: pulumi.Input<string>;
|
|
612
618
|
/**
|
|
613
|
-
* Specifies the semantic version of the plugin to use
|
|
619
|
+
* Specifies the semantic version of the plugin to use for this connection.
|
|
614
620
|
*/
|
|
615
621
|
pluginVersion?: pulumi.Input<string>;
|
|
616
622
|
/**
|
package/database/secretsMount.js
CHANGED
|
@@ -36,6 +36,9 @@ const utilities = require("../utilities");
|
|
|
36
36
|
* password: "super_secret_1",
|
|
37
37
|
* connectionUrl: "sqlserver://{{username}}:{{password}}@127.0.0.1:1433",
|
|
38
38
|
* allowedRoles: ["dev1"],
|
|
39
|
+
* pluginVersion: "v0.20.0",
|
|
40
|
+
* skipStaticRoleImportRotation: true,
|
|
41
|
+
* passwordPolicy: "default",
|
|
39
42
|
* rotationSchedule: "0 * * * SAT",
|
|
40
43
|
* rotationWindow: 3600,
|
|
41
44
|
* }],
|
|
@@ -46,6 +49,9 @@ const utilities = require("../utilities");
|
|
|
46
49
|
* connectionUrl: "postgresql://{{username}}:{{password}}@127.0.0.1:5432/postgres",
|
|
47
50
|
* verifyConnection: true,
|
|
48
51
|
* allowedRoles: ["dev2"],
|
|
52
|
+
* pluginVersion: "v0.19.0",
|
|
53
|
+
* skipStaticRoleImportRotation: true,
|
|
54
|
+
* passwordPolicy: "default",
|
|
49
55
|
* rotationSchedule: "0 * * * SAT",
|
|
50
56
|
* rotationWindow: 3600,
|
|
51
57
|
* }],
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretsMount.js","sourceRoot":"","sources":["../../database/secretsMount.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"secretsMount.js","sourceRoot":"","sources":["../../database/secretsMount.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAsFG;AACH,MAAa,YAAa,SAAQ,MAAM,CAAC,cAAc;IACnD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAyB,EAAE,IAAmC;QACvH,OAAO,IAAI,YAAY,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACnE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,YAAY,CAAC,YAAY,CAAC;IAC7D,CAAC;IA2LD,YAAY,IAAY,EAAE,WAAkD,EAAE,IAAmC;QAC7G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA4C,CAAC;YAC3D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,EAAE,kBAAkB,CAAC;YACjE,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,EAAE,sBAAsB,CAAC;YACzE,cAAc,CAAC,yBAAyB,CAAC,GAAG,KAAK,EAAE,uBAAuB,CAAC;YAC3E,cAAc,CAAC,0BAA0B,CAAC,GAAG,KAAK,EAAE,wBAAwB,CAAC;YAC7E,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,EAAE,sBAAsB,CAAC;YACzE,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,EAAE,sBAAsB,CAAC;YACzE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,EAAE,eAAe,CAAC;YAC3D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,EAAE,qBAAqB,CAAC;YACvE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,EAAE,gBAAgB,CAAC;YAC7D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,EAAE,iBAAiB,CAAC;YAC/D,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,EAAE,kBAAkB,CAAC;YACjE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;YACzC,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,EAAE,aAAa,CAAC;YACvD,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;YACzC,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,2BAA2B,CAAC,GAAG,KAAK,EAAE,yBAAyB,CAAC;YAC/E,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,EAAE,aAAa,CAAC;YACvD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,EAAE,iBAAiB,CAAC;YAC/D,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;SACpD;aAAM;YACH,MAAM,IAAI,GAAG,WAA2C,CAAC;YACzD,IAAI,IAAI,EAAE,IAAI,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACvC,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,EAAE,kBAAkB,CAAC;YAChE,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,EAAE,sBAAsB,CAAC;YACxE,cAAc,CAAC,yBAAyB,CAAC,GAAG,IAAI,EAAE,uBAAuB,CAAC;YAC1E,cAAc,CAAC,0BAA0B,CAAC,GAAG,IAAI,EAAE,wBAAwB,CAAC;YAC5E,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,EAAE,sBAAsB,CAAC;YACxE,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,EAAE,sBAAsB,CAAC;YACxE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,EAAE,eAAe,CAAC;YAC1D,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,EAAE,qBAAqB,CAAC;YACtE,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC;YACtC,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,EAAE,gBAAgB,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,EAAE,iBAAiB,CAAC;YAC9D,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC;YACtC,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,EAAE,kBAAkB,CAAC;YAChE,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;YACxC,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,EAAE,aAAa,CAAC;YACtD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;YACxC,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,2BAA2B,CAAC,GAAG,IAAI,EAAE,yBAAyB,CAAC;YAC9E,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,EAAE,aAAa,CAAC;YACtD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC;YACtC,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,EAAE,iBAAiB,CAAC;YAC9D,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,UAAU,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC/C,cAAc,CAAC,aAAa,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACrD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,YAAY,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACjE,CAAC;;AAhTL,oCAiTC;AAnSG,gBAAgB;AACO,yBAAY,GAAG,0CAA0C,CAAC"}
|
package/kmip/secretBackend.d.ts
CHANGED
|
@@ -113,7 +113,7 @@ export declare class SecretBackend extends pulumi.CustomResource {
|
|
|
113
113
|
/**
|
|
114
114
|
* Addresses the KMIP server should listen on (`host:port`).
|
|
115
115
|
*/
|
|
116
|
-
readonly listenAddrs: pulumi.Output<string[]>;
|
|
116
|
+
readonly listenAddrs: pulumi.Output<string[] | undefined>;
|
|
117
117
|
/**
|
|
118
118
|
* Specifies whether to show this mount in the UI-specific listing endpoint
|
|
119
119
|
*/
|
package/kmip/secretRole.d.ts
CHANGED
|
@@ -57,6 +57,10 @@ export declare class SecretRole extends pulumi.CustomResource {
|
|
|
57
57
|
* when multiple copies of the Pulumi SDK have been loaded into the same process.
|
|
58
58
|
*/
|
|
59
59
|
static isInstance(obj: any): obj is SecretRole;
|
|
60
|
+
/**
|
|
61
|
+
* Name of the ca to use, if absent use legacy ca
|
|
62
|
+
*/
|
|
63
|
+
readonly ca: pulumi.Output<string | undefined>;
|
|
60
64
|
/**
|
|
61
65
|
* The namespace to provision the resource in.
|
|
62
66
|
* The value should not contain leading or trailing forward slashes.
|
|
@@ -214,6 +218,10 @@ export declare class SecretRole extends pulumi.CustomResource {
|
|
|
214
218
|
* Input properties used for looking up and filtering SecretRole resources.
|
|
215
219
|
*/
|
|
216
220
|
export interface SecretRoleState {
|
|
221
|
+
/**
|
|
222
|
+
* Name of the ca to use, if absent use legacy ca
|
|
223
|
+
*/
|
|
224
|
+
ca?: pulumi.Input<string>;
|
|
217
225
|
/**
|
|
218
226
|
* The namespace to provision the resource in.
|
|
219
227
|
* The value should not contain leading or trailing forward slashes.
|
|
@@ -363,6 +371,10 @@ export interface SecretRoleState {
|
|
|
363
371
|
* The set of arguments for constructing a SecretRole resource.
|
|
364
372
|
*/
|
|
365
373
|
export interface SecretRoleArgs {
|
|
374
|
+
/**
|
|
375
|
+
* Name of the ca to use, if absent use legacy ca
|
|
376
|
+
*/
|
|
377
|
+
ca?: pulumi.Input<string>;
|
|
366
378
|
/**
|
|
367
379
|
* The namespace to provision the resource in.
|
|
368
380
|
* The value should not contain leading or trailing forward slashes.
|
package/kmip/secretRole.js
CHANGED
|
@@ -75,6 +75,7 @@ class SecretRole extends pulumi.CustomResource {
|
|
|
75
75
|
opts = opts || {};
|
|
76
76
|
if (opts.id) {
|
|
77
77
|
const state = argsOrState;
|
|
78
|
+
resourceInputs["ca"] = state?.ca;
|
|
78
79
|
resourceInputs["namespace"] = state?.namespace;
|
|
79
80
|
resourceInputs["operationActivate"] = state?.operationActivate;
|
|
80
81
|
resourceInputs["operationAddAttribute"] = state?.operationAddAttribute;
|
|
@@ -122,6 +123,7 @@ class SecretRole extends pulumi.CustomResource {
|
|
|
122
123
|
if (args?.scope === undefined && !opts.urn) {
|
|
123
124
|
throw new Error("Missing required property 'scope'");
|
|
124
125
|
}
|
|
126
|
+
resourceInputs["ca"] = args?.ca;
|
|
125
127
|
resourceInputs["namespace"] = args?.namespace;
|
|
126
128
|
resourceInputs["operationActivate"] = args?.operationActivate;
|
|
127
129
|
resourceInputs["operationAddAttribute"] = args?.operationAddAttribute;
|
package/kmip/secretRole.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretRole.js","sourceRoot":"","sources":["../../kmip/secretRole.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAyCG;AACH,MAAa,UAAW,SAAQ,MAAM,CAAC,cAAc;IACjD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAuB,EAAE,IAAmC;QACrH,OAAO,IAAI,UAAU,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACjE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,UAAU,CAAC,YAAY,CAAC;IAC3D,CAAC;
|
|
1
|
+
{"version":3,"file":"secretRole.js","sourceRoot":"","sources":["../../kmip/secretRole.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAyCG;AACH,MAAa,UAAW,SAAQ,MAAM,CAAC,cAAc;IACjD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAuB,EAAE,IAAmC;QACrH,OAAO,IAAI,UAAU,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACjE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,UAAU,CAAC,YAAY,CAAC;IAC3D,CAAC;IA+JD,YAAY,IAAY,EAAE,WAA8C,EAAE,IAAmC;QACzG,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA0C,CAAC;YACzD,cAAc,CAAC,IAAI,CAAC,GAAG,KAAK,EAAE,EAAE,CAAC;YACjC,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,EAAE,iBAAiB,CAAC;YAC/D,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,EAAE,qBAAqB,CAAC;YACvE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,EAAE,eAAe,CAAC;YAC3D,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,EAAE,sBAAsB,CAAC;YACzE,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,EAAE,gBAAgB,CAAC;YAC7D,cAAc,CAAC,0BAA0B,CAAC,GAAG,KAAK,EAAE,wBAAwB,CAAC;YAC7E,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,EAAE,gBAAgB,CAAC;YAC7D,cAAc,CAAC,2BAA2B,CAAC,GAAG,KAAK,EAAE,yBAAyB,CAAC;YAC/E,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,EAAE,gBAAgB,CAAC;YAC7D,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,2BAA2B,CAAC,GAAG,KAAK,EAAE,yBAAyB,CAAC;YAC/E,cAAc,CAAC,wBAAwB,CAAC,GAAG,KAAK,EAAE,sBAAsB,CAAC;YACzE,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,EAAE,eAAe,CAAC;YAC3D,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,EAAE,eAAe,CAAC;YAC3D,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,EAAE,kBAAkB,CAAC;YACjE,cAAc,CAAC,0BAA0B,CAAC,GAAG,KAAK,EAAE,wBAAwB,CAAC;YAC7E,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,EAAE,aAAa,CAAC;YACvD,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,EAAE,iBAAiB,CAAC;YAC/D,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,EAAE,qBAAqB,CAAC;YACvE,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,EAAE,eAAe,CAAC;YAC3D,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,EAAE,oBAAoB,CAAC;YACrE,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,EAAE,gBAAgB,CAAC;YAC7D,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,EAAE,aAAa,CAAC;YACvD,cAAc,CAAC,0BAA0B,CAAC,GAAG,KAAK,EAAE,wBAAwB,CAAC;YAC7E,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,EAAE,gBAAgB,CAAC;YAC7D,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,EAAE,gBAAgB,CAAC;YAC7D,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;SACxD;aAAM;YACH,MAAM,IAAI,GAAG,WAAyC,CAAC;YACvD,IAAI,IAAI,EAAE,IAAI,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACvC,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,IAAI,IAAI,EAAE,IAAI,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACvC,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;aACvD;YACD,IAAI,IAAI,EAAE,KAAK,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACxC,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,cAAc,CAAC,IAAI,CAAC,GAAG,IAAI,EAAE,EAAE,CAAC;YAChC,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,EAAE,iBAAiB,CAAC;YAC9D,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,EAAE,qBAAqB,CAAC;YACtE,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,EAAE,eAAe,CAAC;YAC1D,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,EAAE,sBAAsB,CAAC;YACxE,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,EAAE,gBAAgB,CAAC;YAC5D,cAAc,CAAC,0BAA0B,CAAC,GAAG,IAAI,EAAE,wBAAwB,CAAC;YAC5E,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,EAAE,gBAAgB,CAAC;YAC5D,cAAc,CAAC,2BAA2B,CAAC,GAAG,IAAI,EAAE,yBAAyB,CAAC;YAC9E,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,EAAE,gBAAgB,CAAC;YAC5D,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,2BAA2B,CAAC,GAAG,IAAI,EAAE,yBAAyB,CAAC;YAC9E,cAAc,CAAC,wBAAwB,CAAC,GAAG,IAAI,EAAE,sBAAsB,CAAC;YACxE,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,EAAE,eAAe,CAAC;YAC1D,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,EAAE,eAAe,CAAC;YAC1D,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,EAAE,kBAAkB,CAAC;YAChE,cAAc,CAAC,0BAA0B,CAAC,GAAG,IAAI,EAAE,wBAAwB,CAAC;YAC5E,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,EAAE,aAAa,CAAC;YACtD,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC;YACxD,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,EAAE,iBAAiB,CAAC;YAC9D,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC;YACxD,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,EAAE,qBAAqB,CAAC;YACtE,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,EAAE,eAAe,CAAC;YAC1D,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,EAAE,oBAAoB,CAAC;YACpE,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,EAAE,gBAAgB,CAAC;YAC5D,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,EAAE,aAAa,CAAC;YACtD,cAAc,CAAC,0BAA0B,CAAC,GAAG,IAAI,EAAE,wBAAwB,CAAC;YAC5E,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC;YACtC,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,EAAE,gBAAgB,CAAC;YAC5D,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,EAAE,gBAAgB,CAAC;YAC5D,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;SACvD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,UAAU,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC/D,CAAC;;AApRL,gCAqRC;AAvQG,gBAAgB;AACO,uBAAY,GAAG,kCAAkC,CAAC"}
|
|
@@ -40,6 +40,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
40
40
|
* allowedKubernetesNamespaces: ["*"],
|
|
41
41
|
* tokenMaxTtl: 43200,
|
|
42
42
|
* tokenDefaultTtl: 21600,
|
|
43
|
+
* tokenDefaultAudiences: ["https://kubernetes.default.svc"],
|
|
43
44
|
* serviceAccountName: "test-service-account-with-generated-token",
|
|
44
45
|
* extraLabels: {
|
|
45
46
|
* id: "abc123",
|
|
@@ -231,6 +232,12 @@ export declare class SecretBackendRole extends pulumi.CustomResource {
|
|
|
231
232
|
* Kubernetes token will be created when credentials are requested.
|
|
232
233
|
*/
|
|
233
234
|
readonly serviceAccountName: pulumi.Output<string | undefined>;
|
|
235
|
+
/**
|
|
236
|
+
* The default audiences for generated Kubernetes tokens.
|
|
237
|
+
* If not set, defaults to the Kubernetes cluster's default audiences. This field requires
|
|
238
|
+
* Vault 1.15 or later.
|
|
239
|
+
*/
|
|
240
|
+
readonly tokenDefaultAudiences: pulumi.Output<string[] | undefined>;
|
|
234
241
|
/**
|
|
235
242
|
* The default TTL for generated Kubernetes tokens in seconds.
|
|
236
243
|
*/
|
|
@@ -327,6 +334,12 @@ export interface SecretBackendRoleState {
|
|
|
327
334
|
* Kubernetes token will be created when credentials are requested.
|
|
328
335
|
*/
|
|
329
336
|
serviceAccountName?: pulumi.Input<string>;
|
|
337
|
+
/**
|
|
338
|
+
* The default audiences for generated Kubernetes tokens.
|
|
339
|
+
* If not set, defaults to the Kubernetes cluster's default audiences. This field requires
|
|
340
|
+
* Vault 1.15 or later.
|
|
341
|
+
*/
|
|
342
|
+
tokenDefaultAudiences?: pulumi.Input<pulumi.Input<string>[]>;
|
|
330
343
|
/**
|
|
331
344
|
* The default TTL for generated Kubernetes tokens in seconds.
|
|
332
345
|
*/
|
|
@@ -415,6 +428,12 @@ export interface SecretBackendRoleArgs {
|
|
|
415
428
|
* Kubernetes token will be created when credentials are requested.
|
|
416
429
|
*/
|
|
417
430
|
serviceAccountName?: pulumi.Input<string>;
|
|
431
|
+
/**
|
|
432
|
+
* The default audiences for generated Kubernetes tokens.
|
|
433
|
+
* If not set, defaults to the Kubernetes cluster's default audiences. This field requires
|
|
434
|
+
* Vault 1.15 or later.
|
|
435
|
+
*/
|
|
436
|
+
tokenDefaultAudiences?: pulumi.Input<pulumi.Input<string>[]>;
|
|
418
437
|
/**
|
|
419
438
|
* The default TTL for generated Kubernetes tokens in seconds.
|
|
420
439
|
*/
|
|
@@ -46,6 +46,7 @@ const utilities = require("../utilities");
|
|
|
46
46
|
* allowedKubernetesNamespaces: ["*"],
|
|
47
47
|
* tokenMaxTtl: 43200,
|
|
48
48
|
* tokenDefaultTtl: 21600,
|
|
49
|
+
* tokenDefaultAudiences: ["https://kubernetes.default.svc"],
|
|
49
50
|
* serviceAccountName: "test-service-account-with-generated-token",
|
|
50
51
|
* extraLabels: {
|
|
51
52
|
* id: "abc123",
|
|
@@ -186,6 +187,7 @@ class SecretBackendRole extends pulumi.CustomResource {
|
|
|
186
187
|
resourceInputs["nameTemplate"] = state?.nameTemplate;
|
|
187
188
|
resourceInputs["namespace"] = state?.namespace;
|
|
188
189
|
resourceInputs["serviceAccountName"] = state?.serviceAccountName;
|
|
190
|
+
resourceInputs["tokenDefaultAudiences"] = state?.tokenDefaultAudiences;
|
|
189
191
|
resourceInputs["tokenDefaultTtl"] = state?.tokenDefaultTtl;
|
|
190
192
|
resourceInputs["tokenMaxTtl"] = state?.tokenMaxTtl;
|
|
191
193
|
}
|
|
@@ -206,6 +208,7 @@ class SecretBackendRole extends pulumi.CustomResource {
|
|
|
206
208
|
resourceInputs["nameTemplate"] = args?.nameTemplate;
|
|
207
209
|
resourceInputs["namespace"] = args?.namespace;
|
|
208
210
|
resourceInputs["serviceAccountName"] = args?.serviceAccountName;
|
|
211
|
+
resourceInputs["tokenDefaultAudiences"] = args?.tokenDefaultAudiences;
|
|
209
212
|
resourceInputs["tokenDefaultTtl"] = args?.tokenDefaultTtl;
|
|
210
213
|
resourceInputs["tokenMaxTtl"] = args?.tokenMaxTtl;
|
|
211
214
|
}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secretBackendRole.js","sourceRoot":"","sources":["../../kubernetes/secretBackendRole.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"secretBackendRole.js","sourceRoot":"","sources":["../../kubernetes/secretBackendRole.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA6IG;AACH,MAAa,iBAAkB,SAAQ,MAAM,CAAC,cAAc;IACxD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA8B,EAAE,IAAmC;QAC5H,OAAO,IAAI,iBAAiB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACxE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,iBAAiB,CAAC,YAAY,CAAC;IAClE,CAAC;IAgGD,YAAY,IAAY,EAAE,WAA4D,EAAE,IAAmC;QACvH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAiD,CAAC;YAChE,cAAc,CAAC,oCAAoC,CAAC,GAAG,KAAK,EAAE,kCAAkC,CAAC;YACjG,cAAc,CAAC,6BAA6B,CAAC,GAAG,KAAK,EAAE,2BAA2B,CAAC;YACnF,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,EAAE,gBAAgB,CAAC;YAC7D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,EAAE,kBAAkB,CAAC;YACjE,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,EAAE,kBAAkB,CAAC;YACjE,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,EAAE,kBAAkB,CAAC;YACjE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,EAAE,kBAAkB,CAAC;YACjE,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,EAAE,qBAAqB,CAAC;YACvE,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,EAAE,eAAe,CAAC;YAC3D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;SACtD;aAAM;YACH,MAAM,IAAI,GAAG,WAAgD,CAAC;YAC9D,IAAI,IAAI,EAAE,OAAO,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1C,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,oCAAoC,CAAC,GAAG,IAAI,EAAE,kCAAkC,CAAC;YAChG,cAAc,CAAC,6BAA6B,CAAC,GAAG,IAAI,EAAE,2BAA2B,CAAC;YAClF,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,EAAE,gBAAgB,CAAC;YAC5D,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,EAAE,kBAAkB,CAAC;YAChE,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,EAAE,kBAAkB,CAAC;YAChE,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,EAAE,kBAAkB,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,EAAE,kBAAkB,CAAC;YAChE,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,EAAE,qBAAqB,CAAC;YACtE,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,EAAE,eAAe,CAAC;YAC1D,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;SACrD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,iBAAiB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACtE,CAAC;;AArKL,8CAsKC;AAxJG,gBAAgB;AACO,8BAAY,GAAG,sDAAsD,CAAC"}
|
package/ldap/authBackend.d.ts
CHANGED
|
@@ -81,7 +81,7 @@ export declare class AuthBackend extends pulumi.CustomResource {
|
|
|
81
81
|
/**
|
|
82
82
|
* Password to use with `binddn` when performing user search. Conflicts with `bindpassWo`.
|
|
83
83
|
*/
|
|
84
|
-
readonly bindpass: pulumi.Output<string>;
|
|
84
|
+
readonly bindpass: pulumi.Output<string | undefined>;
|
|
85
85
|
/**
|
|
86
86
|
* **NOTE:** This field is write-only and its value will not be updated in state as part of read operations.
|
|
87
87
|
* Write-only bind password to use for LDAP authentication.
|
package/managed/keys.d.ts
CHANGED
|
@@ -8,6 +8,8 @@ import * as outputs from "../types/output";
|
|
|
8
8
|
*
|
|
9
9
|
* ## Example Usage
|
|
10
10
|
*
|
|
11
|
+
* ### AWS
|
|
12
|
+
*
|
|
11
13
|
* ```typescript
|
|
12
14
|
* import * as pulumi from "@pulumi/pulumi";
|
|
13
15
|
* import * as vault from "@pulumi/vault";
|
|
@@ -43,6 +45,34 @@ import * as outputs from "../types/output";
|
|
|
43
45
|
* });
|
|
44
46
|
* ```
|
|
45
47
|
*
|
|
48
|
+
* ### GCP Cloud KMS
|
|
49
|
+
*
|
|
50
|
+
* ```typescript
|
|
51
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
52
|
+
* import * as std from "@pulumi/std";
|
|
53
|
+
* import * as vault from "@pulumi/vault";
|
|
54
|
+
*
|
|
55
|
+
* const gcpKeys = new vault.managed.Keys("gcp_keys", {gcps: [{
|
|
56
|
+
* name: "gcp-key-1",
|
|
57
|
+
* credentials: std.file({
|
|
58
|
+
* input: "sa-credentials.json",
|
|
59
|
+
* }).then(invoke => invoke.result),
|
|
60
|
+
* project: gcpProject,
|
|
61
|
+
* region: "us-east1",
|
|
62
|
+
* keyRing: "vault-keyring",
|
|
63
|
+
* cryptoKey: "vault-key",
|
|
64
|
+
* algorithm: "rsa_sign_pkcs1_2048_sha256",
|
|
65
|
+
* }]});
|
|
66
|
+
* const pki = new vault.Mount("pki", {
|
|
67
|
+
* path: "pki",
|
|
68
|
+
* type: "pki",
|
|
69
|
+
* description: "Example PKI mount using GCP Cloud KMS managed key",
|
|
70
|
+
* defaultLeaseTtlSeconds: 3600,
|
|
71
|
+
* maxLeaseTtlSeconds: 36000,
|
|
72
|
+
* allowedManagedKeys: [gcpKeys.gcps.apply(gcps => gcps?.[0]?.name)],
|
|
73
|
+
* });
|
|
74
|
+
* ```
|
|
75
|
+
*
|
|
46
76
|
* ## Caveats
|
|
47
77
|
*
|
|
48
78
|
* This single resource handles the lifecycle of _all_ the managed keys that must be created in Vault.
|
|
@@ -81,6 +111,10 @@ export declare class Keys extends pulumi.CustomResource {
|
|
|
81
111
|
* Configuration block for Azure Managed Keys
|
|
82
112
|
*/
|
|
83
113
|
readonly azures: pulumi.Output<outputs.managed.KeysAzure[] | undefined>;
|
|
114
|
+
/**
|
|
115
|
+
* Configuration block for GCP Cloud KMS Managed Keys
|
|
116
|
+
*/
|
|
117
|
+
readonly gcps: pulumi.Output<outputs.managed.KeysGcp[] | undefined>;
|
|
84
118
|
/**
|
|
85
119
|
* Target namespace. (requires Enterprise)
|
|
86
120
|
*/
|
|
@@ -110,6 +144,10 @@ export interface KeysState {
|
|
|
110
144
|
* Configuration block for Azure Managed Keys
|
|
111
145
|
*/
|
|
112
146
|
azures?: pulumi.Input<pulumi.Input<inputs.managed.KeysAzure>[]>;
|
|
147
|
+
/**
|
|
148
|
+
* Configuration block for GCP Cloud KMS Managed Keys
|
|
149
|
+
*/
|
|
150
|
+
gcps?: pulumi.Input<pulumi.Input<inputs.managed.KeysGcp>[]>;
|
|
113
151
|
/**
|
|
114
152
|
* Target namespace. (requires Enterprise)
|
|
115
153
|
*/
|
|
@@ -131,6 +169,10 @@ export interface KeysArgs {
|
|
|
131
169
|
* Configuration block for Azure Managed Keys
|
|
132
170
|
*/
|
|
133
171
|
azures?: pulumi.Input<pulumi.Input<inputs.managed.KeysAzure>[]>;
|
|
172
|
+
/**
|
|
173
|
+
* Configuration block for GCP Cloud KMS Managed Keys
|
|
174
|
+
*/
|
|
175
|
+
gcps?: pulumi.Input<pulumi.Input<inputs.managed.KeysGcp>[]>;
|
|
134
176
|
/**
|
|
135
177
|
* Target namespace. (requires Enterprise)
|
|
136
178
|
*/
|